2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

筛选
英文 中文
Online Node Cooperation Strategy Design for Hierarchical Federated Learning 层次联邦学习在线节点协作策略设计
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2022-01-01 DOI: 10.1109/INFOCOMWKSHPS54753.2022.9798016
Xin Shen, Zhuo Li, Xin Chen
{"title":"Online Node Cooperation Strategy Design for Hierarchical Federated Learning","authors":"Xin Shen, Zhuo Li, Xin Chen","doi":"10.1109/INFOCOMWKSHPS54753.2022.9798016","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798016","url":null,"abstract":"","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74450834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Features of Brain Network for Anomaly Detection 脑网络异常检测的学习特征
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2020-07-06 DOI: 10.1109/infocomwkshps50562.2020.9162694
Jiaxin Liu, Wei Zhao, Ye Hong, Sheng Gao, Xi Huang, Yingjie Zhou
{"title":"Learning Features of Brain Network for Anomaly Detection","authors":"Jiaxin Liu, Wei Zhao, Ye Hong, Sheng Gao, Xi Huang, Yingjie Zhou","doi":"10.1109/infocomwkshps50562.2020.9162694","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162694","url":null,"abstract":"Brain network is a kind of biological networks, which could express complex connectivity among brain functional components. The node in brain network denotes region of interest, which executes specific function in the brain. The edge in brain network represents the connection relationship between nodes. Neuropsychiatric disorders can cause changes in the brain's nerves, which will further change the related characteristics of brain network. The detection for neuropsychiatric disorders with brain network could be treated as an anomaly detection problem. Recent researches have explored using complex networks or graph mining to deal with the detection problem. However, they neither ignore local structural features in critical regions nor fail to comprehensively extract the structural features for brain network. In this paper, we propose a feature learning method to build effective representations for brain network. By treating the closed frequent graph as a node, these representations contain both connection relationships in critical regions and local/global structural features for critical regions, which could benefit the detection with brain network. Experiments using real world data indicate that the proposed method could improve the detection ability of existing machine learning methods in the literatures.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"46 1","pages":"900-905"},"PeriodicalIF":0.0,"publicationDate":"2020-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74340113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Demo abstract: EL-SEC: ELastic management of security applications on virtualized infrastructure 演示摘要:EL-SEC:虚拟化基础设施上安全应用的弹性管理
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2018-04-01 DOI: 10.1109/INFCOMW.2018.8406988
Nabeel Akhtar, I. Matta, A. Raza, Yuefeng Wang
{"title":"Demo abstract: EL-SEC: ELastic management of security applications on virtualized infrastructure","authors":"Nabeel Akhtar, I. Matta, A. Raza, Yuefeng Wang","doi":"10.1109/INFCOMW.2018.8406988","DOIUrl":"https://doi.org/10.1109/INFCOMW.2018.8406988","url":null,"abstract":"The concept of Virtualized Network Functions (VNFs) aims to move Network Functions (NFs) out of dedicated hardware devices into software that runs on commodity hard-ware. A single NF consists of multiple VNF instances, usually running on virtual machines in a cloud infrastructure. The elastic management of an NF refers to load management across the VNF instances and the autonomic scaling of the number of VNF instances as load on the NF changes. In this demonstration, we present EL-SEC, an autonomic framework to elastically manage security NFs on a virtualized infrastructure. As a use case, we deploy the Snort Intrusion Detection System as the NF on the GENI testbed. Concepts from control theory are used to create an Elastic Manager, which implements various controllers — in this demo, Proportional Integral (PI) and Proportional Integral Derivative (PID) — to direct traffic across the VNF Snort instances by monitoring the current load. RINA (a clean-slate Recursive InterNetwork Architecture) is used to build a distributed application that monitors load and collects Snort alerts, which are processed by the Elastic Manager and an Attack Analyzer, respectively. Software Defined Networking (SDN) is used to steer traffic through the VNF instances, and to block attack traffic. Our demo shows that virtualized security NFs can be easily deployed using our EL-SEC framework. With the help of real-time graphs, we show that PI and PID controllers can be used to easily scale the system, which leads to quicker detection of attacks.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"56 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90986201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring Web Latency in Cellular Networks 测量蜂窝网络中的Web延迟
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2018-01-01 DOI: 10.1109/INFCOMW.2018.8406855
A. Asrese, Ermias Andargie Walelgne, Andra Lutu, O. Alay, J. Ott
{"title":"Measuring Web Latency in Cellular Networks","authors":"A. Asrese, Ermias Andargie Walelgne, Andra Lutu, O. Alay, J. Ott","doi":"10.1109/INFCOMW.2018.8406855","DOIUrl":"https://doi.org/10.1109/INFCOMW.2018.8406855","url":null,"abstract":"—This work presents a new methodology to measure the performance of web browsing over operational Mobile Broadband (MBB) networks. We designed a web performance measurement tool that collects both the web QoS metrics and the web rendering time in a browser window. We used MONROE [1], European wide measurement platform, to deploy our tool and to conduct a web browsing measurement over operational MBB networks. The results from the initial deployment show that different operators across countries and within the same country have a significant difference in web browsing performance (e.g. in the median case TIM is 75 ms faster than I WIND regarding time to first byte (TTFB)).","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78802851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability and maintainability analysis and its toolbased on deep learning for fault big data 基于深度学习的故障大数据可靠性与可维护性分析及其工具
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-09-01 DOI: 10.1109/ICRITO.2017.8342407
Y. Tamura, S. Yamada
{"title":"Reliability and maintainability analysis and its toolbased on deep learning for fault big data","authors":"Y. Tamura, S. Yamada","doi":"10.1109/ICRITO.2017.8342407","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342407","url":null,"abstract":"Recently, many fault data sets are recorded on the bug tracking systems. These bug tracking systems are used on the Website for such as open source project management. The software managers of open source projects can comprehend the fault status by using the bug tracking system. However, these software systems for development support such as the bug tracking system cannot estimate the future trend of fault data. We discuss the methods of reliability and maintainability assessment based on the deep learning for fault big data. In particular, we develop the reliability and maintainability analysis tool based on deep learning for fault big data by using the latest programing technology. Moreover, we show several numerical illustrations of the developed software tool by using the fault big data in the actual software projects.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"2021 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks FloodDefender:保护数据和控制平面资源免受sdn攻击
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-01-01 DOI: 10.1109/INFOCOM.2017.8057009
Shang Gao, Zhe Peng, Bin Xiao, A. Hu, K. Ren
{"title":"FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks","authors":"Shang Gao, Zhe Peng, Bin Xiao, A. Hu, K. Ren","doi":"10.1109/INFOCOM.2017.8057009","DOIUrl":"https://doi.org/10.1109/INFOCOM.2017.8057009","url":null,"abstract":"","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81248144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Virtual private network as a service — A need for discrete cloud architecture 虚拟专用网络即服务——需要离散的云架构
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-09-01 DOI: 10.1109/ICRITO.2016.7785012
Anjum Zameer Bhat, Dalal Khalfan Al Shuaibi, A. Singh
{"title":"Virtual private network as a service — A need for discrete cloud architecture","authors":"Anjum Zameer Bhat, Dalal Khalfan Al Shuaibi, A. Singh","doi":"10.1109/ICRITO.2016.7785012","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785012","url":null,"abstract":"Cloud Computing in recent years has become a buzz word in the world of information technology. Cloud computing also referred as on demand computing has been extensively adapted by various organization irrespective of their scale and nature of work, essentially because of kind of flexibility, ease, scalability, less overhead and cost benefits that cloud computing provides. In recent years we have seen discrete and unique cloud implementations resulting in automation of complicated business processes at a never imaginable cost. Cloud computing provides three basic architecture to cater the needs of different users i.e. IaaS (Infrastructure as a Service), PaaS (Platform as a Service) and SaaS (Software as a Service). As the implementation of cloud computing is exponentially broadening and it is being implemented in newer and newer fields, need is being felt by cloud implementers to have unique service architectures for a specific implementation. In other words a unique cloud service architecture e.g. for Educational Establishments or e.g. a discrete service architecture for Virtual Private Network (VPN) if it is to be deployed through cloud. As Virtual Private Networks are a part of most of the network deployments all over the world connecting branches, business partners and outlets and providing seamless connectivity especially for SME's (Small-Medium sized Enterprises). Most of the organizations with VPN deployments want to reduce the operational cost, implementation cost and overhead associated with VPN's. This research paper is mere effort to study the need for discrete cloud architecture for the implementation of VPN service through cloud computing. This research paper introduces a unique cloud architecture VPNaaS (Virtual Private Network as a Service).","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"37 1","pages":"526-532"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
TPC Chair's welcome 欢迎TPC主席
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2016-04-10 DOI: 10.1109/INFCOMW.2016.7561994
Sung-Ju Lee, C. Petrioli, P. Wan, Kai Zeng
{"title":"TPC Chair's welcome","authors":"Sung-Ju Lee, C. Petrioli, P. Wan, Kai Zeng","doi":"10.1109/INFCOMW.2016.7561994","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7561994","url":null,"abstract":"On behalf of the technical program committee, it is our great pleasure to welcome you to San Francisco for the 35th IEEE INFOCOM Conference. In line with its tradition, IEEE INFOCOM 2016 features a high quality technical program across a wide range of traditional and emerging research areas in computer communications and networking. IEEE INFOCOM 2016 received 1644 submissions from 54 countries spread over all continents, of which 300 were accepted to the main technical program after a thorough review process. The competitive acceptance rate of 18% reflects the prestige and popularity of IEEE INFOCOM to our research community. The papers included in this year's program represent the forefront of networking research, as they explore important new ideas and directions in the field.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"24 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90763620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gram Sandesh Transmission-a web based information system for farmers Gram Sandesh传输-一个基于网络的农民信息系统
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2015-09-01 DOI: 10.1109/ICRITO.2015.7359246
Parv Gupta, R. Majumdar, Mrigendra Kumar, Nishant Chauhan, Subhash Chand Gupta
{"title":"Gram Sandesh Transmission-a web based information system for farmers","authors":"Parv Gupta, R. Majumdar, Mrigendra Kumar, Nishant Chauhan, Subhash Chand Gupta","doi":"10.1109/ICRITO.2015.7359246","DOIUrl":"https://doi.org/10.1109/ICRITO.2015.7359246","url":null,"abstract":"This paper presents the experimentation done in order to flourish a low price and impressionable information system to provide useful information to farmers in a timely manner so as to assist their decision making process. The primary reason behind development of this system was to automate the flow of information to farmers since agriculture is the backbone of our country. Gram Sandesh Transmission is a web disciplined system which targets all sort of audience by means of its ios application (for iphone users),android application(for android users), messaging server(for basic mobile handset) and gsm based led boards (for those who don't owe a mobile handset). Farmers are provided with weather related information on daily basis so that necessary decision regarding sowing of seeds, weeding, harvesting, irrigation could be taken. The system warns with any disaster related information so that necessary steps could be taken. Another module of the system deals with providing “Sarkari Mandi Bhaav” (Govt. Market Price) and thus reduces the chances of fraud prices quoted by middleman to farmers.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"69 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimization of Vehicular Ad Hoc Network using Taguchi method 基于田口法的车载Ad Hoc网络优化
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2015-04-21 DOI: 10.1109/I4CT.2015.7219555
Aznor Hanah Abdul Halim, M. N. M. Warip, R. B. Ahmad, S. J. Elias
{"title":"Optimization of Vehicular Ad Hoc Network using Taguchi method","authors":"Aznor Hanah Abdul Halim, M. N. M. Warip, R. B. Ahmad, S. J. Elias","doi":"10.1109/I4CT.2015.7219555","DOIUrl":"https://doi.org/10.1109/I4CT.2015.7219555","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) is quite different from other ad hoc networks in term of functionality because of the variable node density, high node mobility, and unpredictable and harsh communication environment. There are two major applications VANET, namely safety applications and non-safety applications. In addition, network optimization is one way to maintain the existing protocols and other network parameter compare to design and implementing new improved protocols in which it too costly. Motivated with the reasons this paper presents an optimization of vehicular network for throughput, end-to-end delay and packet delivery ratio using Taguchi method. Highway scenario is chosen as the evaluation condition for this paper. For three performances evaluated, the highest rank value shows the different factors. For safety application which is delay-sensitive, routing protocols is the highest rank control factors. Non-safety application which is throughput sensitive, packet size is the main control factors.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"41 1","pages":"147-151"},"PeriodicalIF":0.0,"publicationDate":"2015-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82441248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信