2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
A Case Study and Design of Transformation Architecture in BSS BSS中转换体系结构的案例研究与设计
Teh-Sheng Huang, Chun-Yen Wang, Tsung-Ching Lin, Jeu-Yih Jeng
{"title":"A Case Study and Design of Transformation Architecture in BSS","authors":"Teh-Sheng Huang, Chun-Yen Wang, Tsung-Ching Lin, Jeu-Yih Jeng","doi":"10.1109/WAINA.2015.67","DOIUrl":"https://doi.org/10.1109/WAINA.2015.67","url":null,"abstract":"Recently due to the rapidly changing and strictly competitive in telecom market, there are a variety kinds of products and convergent services to be promoted such as ICT services. There are a serial of conventional BSS constantly face stringent challenges such as time to market as well as quality and cost expectations. Systematic think that if there is a well-established system architect as a strong fundamental infrastructure as a right direction to transform the conventional BSS and to develop a new system. This paper introduces a BSS reengineering framework project include architecture design techniques and processes to produce a well-established architecture as strategy reuse and more flexible one than before. Also this study employs some real world BSS as case study to practice and examine those techniques then derive a BSS transformation to-be architecture.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"700-705"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89437044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Outlier Detection Model Based on One Class Principal Component Classifier in Wireless Sensor Networks 基于一类主成分分类器的无线传感器网络离群点检测模型
Oussama Ghorbel, M. Abid, H. Snoussi
{"title":"A Novel Outlier Detection Model Based on One Class Principal Component Classifier in Wireless Sensor Networks","authors":"Oussama Ghorbel, M. Abid, H. Snoussi","doi":"10.1109/AINA.2015.168","DOIUrl":"https://doi.org/10.1109/AINA.2015.168","url":null,"abstract":"Wireless sensor networks (WSNs) are important platforms for collecting environmental data and monitoring phenomena. So, outlier detection process is a necessary step in building sensor network systems to assure data quality for perfect decision making. Over the last few years Kernel Principal Component Analysis (KPCA) is considered as a natural nonlinear generalization of PCA, which extracts nonlinear structure from the data. Wireless sensor networks had been deployed in the real world to collect large amounts of raw sensed data. Then, the key challenge is to extract high level knowledge from such raw data. So, the accuracy of sensor readings is without a doubt one of the most important measures to evaluate the quality of a sensor and its network. For this case, the task amounts to create a useful model based on KPCA to recognize data as normal or outliers. However, KPCA based reconstruction error (RE) has found several applications in outlier detection but is not perfect to detect outlier. Within this setting, we propose Kernel Principal Component Analysis based Mahalanobis kernel as a new outlier detection method using mahalanobis distance to implicitly calculate the mapping of the data points in the feature space so that we can separate outlier points from normal pattern of data distribution. The use of KPCA based mahalanobis kernel on real word data obtained from three real datasets are reported showing that the proposed method performs better in finding outliers in wireless sensor networks when compared to the original RE based variant and the One-Class SVM detection approach.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"70-76"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90428499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies 流行病学研究中隐私保护线性回归的可扩展性
Hiroaki Kikuchi, H. Hashimoto, H. Yasunaga, Takamichi Saito
{"title":"Scalability of Privacy-Preserving Linear Regression in Epidemiological Studies","authors":"Hiroaki Kikuchi, H. Hashimoto, H. Yasunaga, Takamichi Saito","doi":"10.1109/AINA.2015.229","DOIUrl":"https://doi.org/10.1109/AINA.2015.229","url":null,"abstract":"In many hospitals, data related to patients are observed and collected to a central database for medical research. For instance, DPC dataset, which stands for Disease, Procedure and Combination, covers medical records for more than 7 million patients in more than 1000 hospitals. Using the distributed DPC data set, a number of epidemiological studied are feasible to reveal useful knowledge on medical treatments. Hence, cryptography helps to preserve the privacy of personal data. The study called as Privacy-Preserving Data Mining (PPDM) aims to perform a data mining algorithm with preserving confidentiality of datasets. This paper studies the scalability of privacy-preserving data mining in epidemiological study. As for the data-mining algorithm, we focus to a linear regression since it is used in many applications and simple to be evaluated. We try to identify the linear model to estimate a length of hospital stay from distributed dataset related to the patient and the disease information. Our contributions of this paper include (1) to propose privacy-preserving protocols for linear regression with horizontally or vertically partitioned datasets, and (2) to clarify the limitation of size of problem to be performed. These information are useful to determine the dominant element in PPDM and to figure out the direction of study for further improvement.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"29 1","pages":"510-514"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76550421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Processing and Analytics of Big Data Streams with Yahoo!S4 雅虎大数据流处理与分析S4
F. Xhafa, V. Naranjo, S. Caballé
{"title":"Processing and Analytics of Big Data Streams with Yahoo!S4","authors":"F. Xhafa, V. Naranjo, S. Caballé","doi":"10.1109/AINA.2015.194","DOIUrl":"https://doi.org/10.1109/AINA.2015.194","url":null,"abstract":"Many Internet-based applications generate huge data streams, which are known as Big Data Streams. Such applications comprise IoT-based monitoring systems, data analytics from monitoring online learning workspaces and MOOCs, global flight monitoring systems, etc. Differently from Big Data processing in which the data is available in databases, file systems, etc., before processing, in Big Data Streams the data stream is unbounded and it is to be processed as it becomes available. Besides the challenges of processing huge amount of data, the Big Data Stream processing adds further challenges of coping with scalability and high throughput to enable real time decision taking. While for Big Data processing the MapReduce framework has resulted successful, its batch mode processing shows limitations to process Big Data Streams. Therefore there have been proposed alternative frameworks such as Yahoo!S4, Twitter Storm, etc., to Big Data Stream processing. In this paper we implement and evaluate the Yahoo!S4 for Big Data Stream processing and exemplify through the Big Data Stream from global flight monitoring system.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"51 1","pages":"263-270"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76589970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Survey on Interfaces to Network Security Functions in Network Virtualization 网络虚拟化中网络安全功能接口研究
H. Jang, J. Jeong, Hyoungshick Kim, Jungsoo Park
{"title":"A Survey on Interfaces to Network Security Functions in Network Virtualization","authors":"H. Jang, J. Jeong, Hyoungshick Kim, Jungsoo Park","doi":"10.1109/WAINA.2015.103","DOIUrl":"https://doi.org/10.1109/WAINA.2015.103","url":null,"abstract":"Network Functions Virtualization (NFV) opens new opportunities and challenges for security community. Unlike existing physical network infrastructure, in a virtualized network platform, security services can be dynamically deployed and maintained to cope with the threat of sophisticated network attacks that are increasing over time. This paper surveys the activity that many security vendors and Internet service providers are trying to define common interfaces for NFV-based security services through the analysis of use cases and related technologies. This activity is currently lead by Internet Engineering Task Force (IETF) that is an international Internet standardization organization.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"6 1","pages":"160-163"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78320782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Scalable Inter-AS QoS Routing Architecture in Software Defined Network (SDN) 软件定义网络(SDN)中可扩展的as间QoS路由体系结构
Murat Karakus, A. Durresi
{"title":"A Scalable Inter-AS QoS Routing Architecture in Software Defined Network (SDN)","authors":"Murat Karakus, A. Durresi","doi":"10.1109/AINA.2015.179","DOIUrl":"https://doi.org/10.1109/AINA.2015.179","url":null,"abstract":"All new networking architectures come with their own problems. Software Defined Networking (SDN) has its own challenges which are needed to be addressed by researchers as well. One of the crucial problems with SDN is the control plane scalability since it is a bottleneck for its evolution. As the network grows, the number of messages a controller receives also increases. This increase puts the controller scalability in the heart of problems of SDN. In this paper, we propose a hierarchy-based network architecture along with an inter-AS routing approach with QoS. We exploit idea of levels in which networks with controllers reside and a main controller, which works like a broker, is on top of them to keep the global network state and view. Our experiment results indicate that a controller in a hierarchic setting handles 50% less number of traffic than a controller in a non-hierarchic environment.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"14 1","pages":"148-154"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78456750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Multi-path TCP in Real-World Setups -- An Evaluation in the NORNET CORE Testbed 多路径TCP在现实世界的设置——在NORNET CORE测试平台的评估
T. Dreibholz, Xing Zhou, Fu Fa
{"title":"Multi-path TCP in Real-World Setups -- An Evaluation in the NORNET CORE Testbed","authors":"T. Dreibholz, Xing Zhou, Fu Fa","doi":"10.1109/WAINA.2015.74","DOIUrl":"https://doi.org/10.1109/WAINA.2015.74","url":null,"abstract":"Nowadays, cloud applications are becoming more and more popular. However, in order for such applications to work, they need a stable Internet connectivity. To avoid the Internet access becoming a single point of failure, redundancy by multi-homing -- i.e. Simultaneous access to multiple Internet service providers (ISP) -- is becoming increasingly common as well. Multi-homing leads to the desire to utilise all network attachment points simultaneously, which is e.g. Provided by the Multi-Path TCP (MPTCP) extension for TCP. MPTCP is still under development by researchers and standardisation in the IETF. Particularly, it is necessary to evaluate MPTCP under realistic Internet conditions. NORNET CORE is the world's first, large-scale Internet test bed for multi-homed systems and applications. It is therefore a useful platform for evaluating MPTCP. In this paper, we therefore present our NORNET CORE extension that adds MPTCP support to the test bed. Particularly, our extension is now available to all users of NORNET CORE as well, which significantly reduces the effort of MPTCP researchers to evaluate MPTCP and its improvements. In a proof of concept, we furthermore show the strengths and weaknesses of state-of-the-art MPTCP in NORNET CORE, in a configuration covering 29 ISP connections at 14 sites in 5 different countries.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"32 1","pages":"617-622"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75254365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Will ToR Achieve Its Goals in the "Future Internet"? An Empirical Study of Using ToR with Cloud Computing ToR会在“未来互联网”中实现其目标吗?基于云计算的ToR应用实证研究
A. Carnielli, Mahdi Aiash
{"title":"Will ToR Achieve Its Goals in the \"Future Internet\"? An Empirical Study of Using ToR with Cloud Computing","authors":"A. Carnielli, Mahdi Aiash","doi":"10.1109/WAINA.2015.78","DOIUrl":"https://doi.org/10.1109/WAINA.2015.78","url":null,"abstract":"With the wide development and deployment of mobile devices and gadgets, a larger number of users go online in so many aspects of their daily lives. The challenge is to enjoy the conveniences of online activities while limiting privacy scarifies. In response to the increasing number of online-hacking scandals, mechanisms for protecting users privacy continue to evolve. An example of such mechanisms is the Onion Router (ToR), a free software for enabling online anonymity and resisting censorship. Despite the fact that ToR is a dominant anonymizerin the current Internet, the emergence of new communication and inter-networking trends such as Cloud Computing, Software Defined Networks and Information Centric Networks places a question mark whether ToR will fulfil its promises with these trend of the \"Future Internet\". This paper aims at answering the question by implementing ToR on a number of Cloud platforms and discussing the security properties of ToR.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"48 1","pages":"135-140"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74806184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Usable and Secure Crime Reporting System for Technology Resource Constrained Context 技术资源受限环境下可用且安全的犯罪报告系统
A. Sakpere, Anne Kayem, T. Ndlovu
{"title":"A Usable and Secure Crime Reporting System for Technology Resource Constrained Context","authors":"A. Sakpere, Anne Kayem, T. Ndlovu","doi":"10.1109/WAINA.2015.97","DOIUrl":"https://doi.org/10.1109/WAINA.2015.97","url":null,"abstract":"Crime in technology resource constrained environments has been shown to adversely affect economic growth by deterring investment and triggering emigration. To address this secure reporting channels are being investigated to encouraging anonymous crime reporting. In this paper, we present a system (Cry Help App) developed to enable residents of a university community situated in technology resource constrained environment to facilitate secure and covert crime reporting. We focus primarily on the usability of the application. The system was developed on the basis of user centric iterative approach. Deployment and evaluation results of our prototype system demonstrate that overall the system scored a 77.06% usability rating with a standard deviation of 0.05 for contributing scores on System Use, Information Quality and Interface Quality. This is indicative of the fact that users found the system to be very usable.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"110 1","pages":"424-429"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72936235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Investigation of Message Suppression Method Considering TCP in Vehicular-DTN 考虑TCP的车载dtn报文抑制方法研究
S. Ishikawa, Taiki Honda, Makoto Ikeda, L. Barolli
{"title":"Investigation of Message Suppression Method Considering TCP in Vehicular-DTN","authors":"S. Ishikawa, Taiki Honda, Makoto Ikeda, L. Barolli","doi":"10.1109/WAINA.2015.60","DOIUrl":"https://doi.org/10.1109/WAINA.2015.60","url":null,"abstract":"The Delay/Disruption Tolerant Networking (DTN) aims to provide inter-operable communications with wide range of networks which have poor performance characteristics. In previous work, we proposed a message suppression method for Vehicular-DTN (VDTN) considering UDP traffic. In this paper, we evaluate the proposed method for VDTN considering TCP traffic. The simulations for two scenarios are conducted considering obstacles (buildings), where Message Suppression with Road side units (MSRs) are present or not present. We consider 802.11p standard and send bundle messages in urban scenario. We use the packet delivery ratio, duplicated bundle received and end-to-end delay as evaluation metrics. We can found that our proposed method can reduce the duplicated bundle messages, even if vehicles send a bundle message using TCP to other vehicles. Also, our proposed method have a good performance compared with Epidemic conventional method for all cases.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"12 1","pages":"370-375"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74314918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信