2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
Why Internet Protocols Need Incentives 为什么互联网协议需要激励
David Murray
{"title":"Why Internet Protocols Need Incentives","authors":"David Murray","doi":"10.1109/WAINA.2015.48","DOIUrl":"https://doi.org/10.1109/WAINA.2015.48","url":null,"abstract":"Internet routers are a commons. While modest regulatory measures have generally been successful for Information Communication Technologies (ICT), this paper argues that the lack of regulation has hindered the technological evolution of the Internet in some areas. This issue is examined through five Internet problems, and the technological solutions adopted. The key contribution of this paper is the explanation of these issues and the identification of areas where misaligned incentives promote inadequate solutions or inaction. The paper reviews the available measures to encourage the adoption of globally beneficial Internet technologies.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"104 1","pages":"261-266"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86944110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System 基于软件定义和认知无线网络的容灾系统性能评估
Goshi Sato, Noriki Uchida, Y. Shibata
{"title":"Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient System","authors":"Goshi Sato, Noriki Uchida, Y. Shibata","doi":"10.1109/AINA.2015.262","DOIUrl":"https://doi.org/10.1109/AINA.2015.262","url":null,"abstract":"Through the information network recovery experience on the East Japan Great Earthquake on March 11, 2011, we learned that the combination of various existing wireless network technologies such as satellite IP network, 3G/LTE, Wi-Fi was useful in term of network connectivity. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best performance network among the possible network links even though the serious disaster occurred and some of those network links were seriously damaged. We also introduce an Open Flow based access network to automatically control link and route selections within the cognitive wireless network to Internet by periodically monitoring and evaluating their network states. In order to verify the usefulness of our proposed system, a prototype of Open Flow based cognitive wireless network system is constructed by connecting the disaster areas in the East Japan Great Earthquake and its performance is evaluated.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"10 1","pages":"741-746"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87187448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Tabu Search Based Approach to Solve the TAs Reconfiguration Problem in LTE Networks 基于禁忌搜索的LTE网络TAs重构方法
H. Safa, Nadine Ahmad
{"title":"Tabu Search Based Approach to Solve the TAs Reconfiguration Problem in LTE Networks","authors":"H. Safa, Nadine Ahmad","doi":"10.1109/AINA.2015.241","DOIUrl":"https://doi.org/10.1109/AINA.2015.241","url":null,"abstract":"In LTE networks, tracking areas (TAs) design affects the signaling cost of user equipments (UEs) during mobility. Indeed, when the latter are called, the mobility management entity (MME), which records the TA in which the UE is registered, broadcasts a paging message in the UE's TA to determine the exact cell through which the call should be delivered. When a UE moves to a new TA, a TA update might be performed either to update the MME or the home subscriber server (HSS) depending on whether the move is intra-or inter-MME. TA update and paging result in a significant amount of signaling overhead. The TA design is usually optimized during the network planning phase. However, the mobility of UEs might turn the initial TA configuration inefficient requiring TA reconfiguration. In this paper we use the tabu search (TS) heuristic to solve TAs reconfiguration problem in LTE networks taking into consideration both signaling overhead and reconfiguration cost. We compare our solution with a variation of the genetic algorithm (GA) based solution found in the literature. Preliminary numerical results showed that the TS algorithm outperformed the GA due to the TS different memory mechanisms used to avoid moves that might lead to non-feasible solutions.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"593-599"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81526735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of Cloud Infrastructure Monitor Platform with Power Saving Method 基于节电方法的云基础设施监控平台的实现
Chao-Tung Yang, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, W. Chu
{"title":"Implementation of Cloud Infrastructure Monitor Platform with Power Saving Method","authors":"Chao-Tung Yang, Chih-Liang Chuang, Jung-Chun Liu, Chien-Chih Chen, W. Chu","doi":"10.1109/WAINA.2015.49","DOIUrl":"https://doi.org/10.1109/WAINA.2015.49","url":null,"abstract":"With the popularity of cloud computing due to increasing requests for cloud services, the demand for building better cloud infrastructure is increasing. Many services on cloud infrastructure are not being accessed all the time, during periods of low usage, if lots of servers keep working, it will cause unnecessary power waste. The aim of this paper is based on the Cloud service Infrastructure as a Service, use KVM and libvirt to build cloud environments. By giving every host and VM a power cap, we perform live-migration on VMs and shutdown idle hosts to save power. We also build an interface that enables users to monitor virtual machines and physical machines. In the experiment, we use PDU to record the power consumption information, and from analysis of these data we prove that we can more effectively utilize hardware resources and save power.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"33 1","pages":"223-228"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82852036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transmitting Scalable Video Streaming over Wireless Ad Hoc Networks 通过无线自组织网络传输可扩展的视频流
Walayat Hussain, F. Hussain, O. Hussain
{"title":"Transmitting Scalable Video Streaming over Wireless Ad Hoc Networks","authors":"Walayat Hussain, F. Hussain, O. Hussain","doi":"10.1109/AINA.2015.186","DOIUrl":"https://doi.org/10.1109/AINA.2015.186","url":null,"abstract":"Due to the rapid increase in the use of social networking websites and applications, the need to stream video over wireless networks has increased. There are a number of considerations when transmitting streaming video between the nodes connected through wireless networks, such as throughput, the size of the multimedia file, response time, delay, scalability and loss of data. The scalability of ad-hoc networks needs to be analyzed by considering various aspects, such as self-organization, security, routing flexibility, availability of bandwidth, data distribution, Quality of Service, throughput, response time and efficiency. In this paper, we discuss the existing approaches to multimedia routing and transmission over wireless ad-hoc networks by considering scalability. The study draws several conclusions and makes recommendations for future directions.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"35 1","pages":"201-206"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89450986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor Networks 无线传感器网络ruheed旋转不相等聚类算法
Nueraili Aierken, R. Gagliardi, L. Mostarda, Zaib Ullah
{"title":"RUHEED-Rotated Unequal Clustering Algorithm for Wireless Sensor Networks","authors":"Nueraili Aierken, R. Gagliardi, L. Mostarda, Zaib Ullah","doi":"10.1109/WAINA.2015.86","DOIUrl":"https://doi.org/10.1109/WAINA.2015.86","url":null,"abstract":"Prolonging the network lifetime, scalability and balancing are very important requirements when implementing a wireless sensor network (WSN). Clustering is a technique that has been widely applied for achieving these goals. However, there exists the energy hole problem which causes an unbalanced energy consumption in equally formed clusters. More specifically, nodes near the base station (BS) die very quickly since they, not only transmit their own data, but also forwards the rest of the network data. In this article, we propose a rotated unequal clustering protocol RUHEED in order to mitigate the energy hole problem. Our experiments show that RUHEED improves the network lifetime when compared to other clustering protocols.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"14 1","pages":"170-174"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89605692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Exploring Stock Market Using Twitter Trust Network 利用Twitter信任网络探索股票市场
Yefeng Ruan, L. Alfantoukh, A. Durresi
{"title":"Exploring Stock Market Using Twitter Trust Network","authors":"Yefeng Ruan, L. Alfantoukh, A. Durresi","doi":"10.1109/AINA.2015.217","DOIUrl":"https://doi.org/10.1109/AINA.2015.217","url":null,"abstract":"As social networks are becoming more and more popular, more and more data are available from them. Researchers are now trying to extract useful information from these big data. One possible usage of social media is to investigate stock market. There are two major events to measure in stock market - price change and trade volume. In this paper, we firstly use our trust framework to build up trust network among Twitter users in a stock market group. We compare trust information extracted from Twitter group with Dow Jones Industrial Average (DJIA) get from Yahoo! Finance. Our results show that by taking trust information into account, they are more correlated than just counting the number of tweets. Also it shows us that trade volume is stronger correlated than price change.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"428-433"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82472310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
An Endorsement-Based Mobile Payment System for a Disaster Area 基于背书的灾区移动支付系统
B. Ojetunde, N. Shibata, Juntao Gao, Minoru Ito
{"title":"An Endorsement-Based Mobile Payment System for a Disaster Area","authors":"B. Ojetunde, N. Shibata, Juntao Gao, Minoru Ito","doi":"10.1109/AINA.2015.225","DOIUrl":"https://doi.org/10.1109/AINA.2015.225","url":null,"abstract":"A payment system in a disaster area is essential for people to buy necessities such as groceries, clothing, and medical supplies. However, existing payment systems require the needed communication infrastructures (like wired networks and cellular networks) to enable transactions, so that these systems cannot be relied on in disaster areas, where these communication infrastructures may be destroyed. In this paper, we propose a mobile payment system, adopting infrastructure less mobile adhoc networks (MANETs), which allow users to shop in disaster areas while providing secure transactions. Specifically, we propose an endorsement-based scheme to guarantee each transaction and a scheme to provide monitoring based on location information, and thus achieve transaction validity and reliability. Our mobile payment system can also prevent collusion between two parties and reset and recover attacks by any user. Security is ensured by using location-based mutual monitoring by nearby users, avoiding thereby double spending in the system.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"14 1","pages":"482-489"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82070833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Protocol for End-to-End Key Establishment During Route Discovery in MANETs 一种基于路由发现的端到端密钥建立协议
Shrikant H. Talawar, R. Hansdah
{"title":"A Protocol for End-to-End Key Establishment During Route Discovery in MANETs","authors":"Shrikant H. Talawar, R. Hansdah","doi":"10.1109/AINA.2015.183","DOIUrl":"https://doi.org/10.1109/AINA.2015.183","url":null,"abstract":"An end-to-end shared secret key between two distant nodes in a mobile ad hoc network (MANET) is essential for providing secure communication between them. However, to provide effective security in a MANET, end-to-end key establishment should be secure against both internal as well as external malicious nodes. An external malicious node in a MANET does not possess any valid security credential related to the MANET, whereas an internal malicious node would possess some valid security credentials related to the MANET. Most of the protocols for end-to-end key establishment in MANETs either make an unrealistic assumption that an end-to-end secure channel exists between source and destination or use bandwidth consuming multi-path schemes. In this paper, we propose a simple and efficient protocol for end-to-end key establishment during route discovery (E2-KDR) in MANETs. Unlike many other existing schemes, the protocol establishes end-to-end key using trust among the nodes which, during initial stage, is established using public key certificate issued by an off-line membership granting authority. However, the use of public key in the proposed protocol is minimal to make it efficient. Since the key is established during route discovery phase, it reduces the key establishment time. The proposed protocol exploits mobility to establish end-to-end key, and provides comprehensive solution by making use of symmetric keys for protecting routing control messages and end-to-end communication. Moreover, as the end-to-end keys are established during route discovery phase, the protocol is on-demand and only necessary keys are established, which makes the protocol storage scalable. The protocol is shown to be secure using security analysis, and its efficiency is confirmed by the results obtained from simulation experiments.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 1","pages":"176-184"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78453064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Use of POS Sequence for Analyzing Sentence Pattern in Twitter Sentiment Analysis POS序列在推特情感分析中句型分析的应用
Fajri Koto, M. Adriani
{"title":"The Use of POS Sequence for Analyzing Sentence Pattern in Twitter Sentiment Analysis","authors":"Fajri Koto, M. Adriani","doi":"10.1109/WAINA.2015.58","DOIUrl":"https://doi.org/10.1109/WAINA.2015.58","url":null,"abstract":"As one of the largest Social Media in providing public data every day, Twitter has attracted the attention of researcher to investigate, in order to mine public opinion, which is known as Sentiment Analysis. Consequently, many techniques and studies related to Sentiment Analysis over Twitter have been proposed in recent years. However, there is no study that discuss about sentence pattern of positive/negative sentence and neither subjective/objective sentence. In this paper we propose POS sequence as feature to investigate pattern or word combination of tweets in two domains of Sentiment Analysis: subjectivity and polarity. Specifically we utilize Information Gain to extract POS sequence in three forms: sequence of 2-tags, 3-tags, and 5-tags. The results reveal that there are some tendencies of sentence pattern which distinguish between positive, negative, subjective and objective tweets. Our approach also shows that feature of POS sequence can improve Sentiment Analysis accuracy.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"274 1","pages":"547-551"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76742779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信