首页 > 最新文献

2017 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
Reducing logistic vehicle kilometers in a city area based on network changes 基于网络变化减少城市区域物流车辆公里数
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024519
P. Vansteenwegen, Corrinne Luteyn
In this research, we look for the possible reduction in vehicle kilometers that can be obtained when a cooperation of delivery companies has the ability to suggest network improvements to the local government. Different network changes are considered in our research: re-opening existing roads for the vehicles of the cooperation, widening roads in the network or converting existing roads into a one-way road with a higher speed. To find the best set of improvements given a fixed budget in a realistic road network, an Adaptive Large Neighborhood Search (ALNS) is proposed. Both the destroy and repair methods in this ALNS are unique for this problem. In order to get an indication of the possible reduction in vehicle kilometers and to test the performance of the heuristic, experiments on a set of 16 benchmark instances are executed. These benchmark instances are generated from a realistic city road network. Based on these experimental results, we can conclude that a set of 1 up to 4 network improvements can lead to a reduction in vehicle kilometers of on average around 2.4% over these 16 benchmark instances, while implementing a set of 2 up to 9 improvements can lead to a reduction of on average around 3.3% over this set of benchmark instances.
在本研究中,我们寻找当快递公司的合作有能力向当地政府提出网络改进建议时,可能获得的车辆公里数减少。在我们的研究中考虑了不同的网络变化:为合作车辆重新开放现有道路,拓宽网络中的道路或将现有道路转换为更高速度的单行道。为了在给定固定预算的现实路网中找到最佳改进方案,提出了一种自适应大邻域搜索方法。该ALNS的破坏和修复方法在该问题中都是独一无二的。为了得到可能减少车辆公里数的指示并测试启发式算法的性能,在一组16个基准实例上进行了实验。这些基准实例是从现实的城市道路网络中生成的。基于这些实验结果,我们可以得出结论,在这16个基准实例中,一组1到4个网络改进可以使车辆公里数平均减少约2.4%,而在这组基准实例中,实施一组2到9个改进可以使车辆公里数平均减少约3.3%。
{"title":"Reducing logistic vehicle kilometers in a city area based on network changes","authors":"P. Vansteenwegen, Corrinne Luteyn","doi":"10.1109/ISCC.2017.8024519","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024519","url":null,"abstract":"In this research, we look for the possible reduction in vehicle kilometers that can be obtained when a cooperation of delivery companies has the ability to suggest network improvements to the local government. Different network changes are considered in our research: re-opening existing roads for the vehicles of the cooperation, widening roads in the network or converting existing roads into a one-way road with a higher speed. To find the best set of improvements given a fixed budget in a realistic road network, an Adaptive Large Neighborhood Search (ALNS) is proposed. Both the destroy and repair methods in this ALNS are unique for this problem. In order to get an indication of the possible reduction in vehicle kilometers and to test the performance of the heuristic, experiments on a set of 16 benchmark instances are executed. These benchmark instances are generated from a realistic city road network. Based on these experimental results, we can conclude that a set of 1 up to 4 network improvements can lead to a reduction in vehicle kilometers of on average around 2.4% over these 16 benchmark instances, while implementing a set of 2 up to 9 improvements can lead to a reduction of on average around 3.3% over this set of benchmark instances.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selective overlay mode operation for D2D communication in dense 5G cellular networks 密集5G蜂窝网络中D2D通信的选择性覆盖模式操作
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024610
G. Swetha, G. R. Murthy
Fifth generation (5G) cellular networks would include millimeter wave (mmWave) for communication which gains the advantage of extensive frequency reuse and directive propagation. The recent trends in device-to-device (D2D) communication have escalated the importance of proximity based services for next generation cellular systems. The integration of mmWave and D2D technology will improve the performance and spectral efficiency greatly. In areas with high call traffic density, D2D communication can operate in overlay mode giving the advantage of low complexity interference avoidance technique. The complexity is decreased as the resources to overlay mode are dedicated resulting in no interference from cellular user unlike in underlay mode. Such a scenario is considered in this paper where interference management between D2D devices sharing same radio resources plays a key role in system performance. Thus, the inband resources for D2D operation selectively switch to overlay mode in based on the call traffic. Two problems are addressed in this paper. Firstly, assigning the resources for overlay mode which is solved using quadratic programming. Next, the problem is formulated to maximize system capacity in overlay mode which is solved using a heuristic algorithm which is simulated. The proposed scheme has optimal performance for dense network in controlled overlay operation for 5G networks. The scheme also overcomes the problem of spectrum wastage in overlay mode by its selective operation.
第五代(5G)蜂窝网络将包括用于通信的毫米波(mmWave),它具有广泛的频率重用和定向传播的优势。设备对设备(D2D)通信的最新趋势已经提升了下一代蜂窝系统中基于邻近的服务的重要性。毫米波与D2D技术的融合将大大提高系统的性能和频谱效率。在呼叫流量密度较大的地区,D2D通信可以采用覆盖模式,具有低复杂度的抗干扰技术优势。由于覆盖模式的资源是专用的,因此与底层模式不同,不会受到蜂窝用户的干扰,从而降低了复杂度。本文考虑了这种情况,其中共享相同无线电资源的D2D设备之间的干扰管理对系统性能起着关键作用。因此,用于D2D操作的带内资源根据呼叫流量选择性地切换到覆盖模式。本文主要解决两个问题。首先,利用二次规划方法对覆盖模式进行资源分配;其次,提出了叠加模式下系统容量最大化的问题,并利用启发式算法进行了仿真求解。该方案在5G网络控制覆盖操作中具有最优的密集网络性能。该方案还通过选择性操作克服了覆盖模式下频谱浪费的问题。
{"title":"Selective overlay mode operation for D2D communication in dense 5G cellular networks","authors":"G. Swetha, G. R. Murthy","doi":"10.1109/ISCC.2017.8024610","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024610","url":null,"abstract":"Fifth generation (5G) cellular networks would include millimeter wave (mmWave) for communication which gains the advantage of extensive frequency reuse and directive propagation. The recent trends in device-to-device (D2D) communication have escalated the importance of proximity based services for next generation cellular systems. The integration of mmWave and D2D technology will improve the performance and spectral efficiency greatly. In areas with high call traffic density, D2D communication can operate in overlay mode giving the advantage of low complexity interference avoidance technique. The complexity is decreased as the resources to overlay mode are dedicated resulting in no interference from cellular user unlike in underlay mode. Such a scenario is considered in this paper where interference management between D2D devices sharing same radio resources plays a key role in system performance. Thus, the inband resources for D2D operation selectively switch to overlay mode in based on the call traffic. Two problems are addressed in this paper. Firstly, assigning the resources for overlay mode which is solved using quadratic programming. Next, the problem is formulated to maximize system capacity in overlay mode which is solved using a heuristic algorithm which is simulated. The proposed scheme has optimal performance for dense network in controlled overlay operation for 5G networks. The scheme also overcomes the problem of spectrum wastage in overlay mode by its selective operation.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129214499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
LiteSense: An adaptive sensing scheme for WSNs LiteSense:一种针对无线传感器网络的自适应感知方案
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024689
J. M. Silva, K. Bispo, P. Carvalho, S. R. Lima
Adaptability and energy-efficient sensing are essential properties to sustain the easy deployment and lifetime of WSNs. These properties assume a stronger role in autonomous sensing environments where the application objectives or the parameters under measurement vary, and human intervention is not viable. In this context, this paper proposes LiteSense, a self-adaptive sampling scheme for WSNs, which aims at capturing accurately the behavior of the physical parameters of interest in each WSN context yet reducing the overhead in terms of sensing events and, consequently, the energy consumption. For this purpose, a set of low-complexity rules auto-regulates the sensing frequency depending on the observed parameter variation. Resorting to real environmental datasets, we provide statistical results showing the ability of LiteSense in reducing sensing activity and power consumption, while keeping the estimation accuracy of sensing events.
自适应性和高能效感知是维持无线传感器网络易于部署和使用寿命的基本特性。这些特性在应用目标或测量参数变化的自主传感环境中具有更强的作用,并且人工干预是不可行的。在这种情况下,本文提出了LiteSense,这是一种用于WSN的自适应采样方案,旨在准确捕获每个WSN上下文中感兴趣的物理参数的行为,同时减少感知事件方面的开销,从而减少能耗。为此,一组低复杂度的规则根据观测到的参数变化自动调节传感频率。利用真实的环境数据集,我们提供了统计结果,显示了LiteSense在减少传感活动和功耗的同时保持传感事件估计精度的能力。
{"title":"LiteSense: An adaptive sensing scheme for WSNs","authors":"J. M. Silva, K. Bispo, P. Carvalho, S. R. Lima","doi":"10.1109/ISCC.2017.8024689","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024689","url":null,"abstract":"Adaptability and energy-efficient sensing are essential properties to sustain the easy deployment and lifetime of WSNs. These properties assume a stronger role in autonomous sensing environments where the application objectives or the parameters under measurement vary, and human intervention is not viable. In this context, this paper proposes LiteSense, a self-adaptive sampling scheme for WSNs, which aims at capturing accurately the behavior of the physical parameters of interest in each WSN context yet reducing the overhead in terms of sensing events and, consequently, the energy consumption. For this purpose, a set of low-complexity rules auto-regulates the sensing frequency depending on the observed parameter variation. Resorting to real environmental datasets, we provide statistical results showing the ability of LiteSense in reducing sensing activity and power consumption, while keeping the estimation accuracy of sensing events.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129682530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
MiniWorld: Resource-aware distributed network emulation via full virtualization MiniWorld:通过完全虚拟化实现的资源感知分布式网络仿真
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024628
Nils Schmidt, Lars Baumgärtner, Patrick Lampe, K. Geihs, Bernd Freisleben
In this paper, we present MiniWorld, a novel distributed network emulator. It is based on full virtualization using QEMU/KVM, offers three network backends for emulating both wired and wireless communication, and provides several mobility patterns as well as distance-based link quality models. A snapshot boot mode is offered for accelerated booting of identical environments and repeating emulation runs. To decrease runtimes, MiniWorld supports distributed emulation across multiple computers, based on a resource-aware virtual machine (VM) scheduler. Experimental results demonstrate the performance of MiniWorld with respect to VM boot times, network bandwidth, round trip times, and topology switching times.
本文提出了一种新型的分布式网络仿真器MiniWorld。它基于使用QEMU/KVM的完全虚拟化,提供三个网络后端来模拟有线和无线通信,并提供几种移动模式以及基于距离的链路质量模型。快照引导模式用于加速相同环境的引导和重复模拟运行。为了减少运行时间,MiniWorld支持基于资源感知虚拟机(VM)调度器的跨多台计算机的分布式仿真。实验结果证明了MiniWorld在VM启动时间、网络带宽、往返时间和拓扑切换时间方面的性能。
{"title":"MiniWorld: Resource-aware distributed network emulation via full virtualization","authors":"Nils Schmidt, Lars Baumgärtner, Patrick Lampe, K. Geihs, Bernd Freisleben","doi":"10.1109/ISCC.2017.8024628","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024628","url":null,"abstract":"In this paper, we present MiniWorld, a novel distributed network emulator. It is based on full virtualization using QEMU/KVM, offers three network backends for emulating both wired and wireless communication, and provides several mobility patterns as well as distance-based link quality models. A snapshot boot mode is offered for accelerated booting of identical environments and repeating emulation runs. To decrease runtimes, MiniWorld supports distributed emulation across multiple computers, based on a resource-aware virtual machine (VM) scheduler. Experimental results demonstrate the performance of MiniWorld with respect to VM boot times, network bandwidth, round trip times, and topology switching times.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125014829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real-time Task Scheduling for joint energy efficiency optimization in data centers 面向数据中心联合能效优化的实时任务调度
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024631
Youshi Wang, Fa Zhang, Rui Wang, Yangguang Shi, Hua Guo, Zhiyong Liu
The high energy consumption has become one bottleneck in the development of the data centers (DCs), where the main energy consumers are the cooling system and the servers. Therefore, the joint optimization for the energy efficiency of the cooling system and the servers is a crucial problem, while most of previous works on energy saving only studies one of these two components in an isolated manner. In this paper, we propose a real-time strategy, rTCS (real-time Task Classification and Scheduling strategy), to jointly optimize the energy efficiency of these two components in the scenario where the tasks arrive dynamically. Strategy rTCS first labels the tasks to classify them according to their run time and end time with a time complexity of O(1) and a bounded space complexity. Then, rTCS schedules the tasks in real time based on their labels and the energy consumption model of the DC. Simulation results show that rTCS can effectively improve the energy efficiency of DCs.
高能耗已经成为制约数据中心发展的瓶颈之一,而数据中心的主要耗能者是冷却系统和服务器。因此,冷却系统和服务器的能效联合优化是一个至关重要的问题,而以往的节能工作大多只是孤立地研究其中的一个部分。在本文中,我们提出了一种实时策略rTCS(实时任务分类和调度策略),在任务动态到达的情况下,共同优化这两个组件的能源效率。rTCS策略首先对任务进行标注,根据任务的运行时间和结束时间进行分类,时间复杂度为0(1),有界空间复杂度。然后,rTCS根据任务的标签和数据中心的能耗模型实时调度任务。仿真结果表明,rTCS可以有效地提高DCs的能效。
{"title":"Real-time Task Scheduling for joint energy efficiency optimization in data centers","authors":"Youshi Wang, Fa Zhang, Rui Wang, Yangguang Shi, Hua Guo, Zhiyong Liu","doi":"10.1109/ISCC.2017.8024631","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024631","url":null,"abstract":"The high energy consumption has become one bottleneck in the development of the data centers (DCs), where the main energy consumers are the cooling system and the servers. Therefore, the joint optimization for the energy efficiency of the cooling system and the servers is a crucial problem, while most of previous works on energy saving only studies one of these two components in an isolated manner. In this paper, we propose a real-time strategy, rTCS (real-time Task Classification and Scheduling strategy), to jointly optimize the energy efficiency of these two components in the scenario where the tasks arrive dynamically. Strategy rTCS first labels the tasks to classify them according to their run time and end time with a time complexity of O(1) and a bounded space complexity. Then, rTCS schedules the tasks in real time based on their labels and the energy consumption model of the DC. Simulation results show that rTCS can effectively improve the energy efficiency of DCs.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127678027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Non-recursive computation of the probability of more than two people having the same birthday 多于两个人同一天生日的概率的非递归计算
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024698
M. Kounavis, Sergej Deutsch, David M. Durham, Saeedeh Komijani
We address a well known problem of computer science, the problem of computing the probability that a given number of people m > 1 have the same birthday from among the members of a larger set of cardinality n ≥ m. The solution to this problem for m = 2 is well known and is usually referred to as the ‘birthday surprise probability’. A solution for m = 3 is also known and appears in the 2004 paper by DasGupta [The matching, birthday and the strong birthday problem: a contemporary review, Journal of Statistical Planning and Inference]. Further approximations to the solution of the related problem of computing the minimum number of people to interview until m people with the same birthday are found are presented in the seminal work by Klamkin and Newman [Extensions on the birthday surprise, Journal of Combinatorial Theory, 1967]. In this paper we present a new non-recursive approximation for the birthday probability applicable to any value of m > 1, which yields results that are experimentally proven accurate under the assumption that the number of birthdays is significantly larger than the number of people. Our expression is easy to compute, non-recursive, and applicable to values of m that can be arbitrarily larger than 2 or 3. We verify the validity of our result computing the birthday probability for different values of m, over billions of sets of random values generated using the Intel ® RDRAND hardware random number generation instruction. Our solution is based on a novel tree-based description of the event space which, if used, allows for the computation of the birthday probability efficiently and without involving recursions or multinomial distributions.
我们解决了计算机科学中一个众所周知的问题,即从一个较大的基数n≥m的集合中计算给定数量m > 1的人同一天生日的概率问题。对于m = 2的这个问题的解决方案是众所周知的,通常被称为“生日惊喜概率”。m = 3的解也是已知的,并出现在DasGupta 2004年的论文中[匹配,生日和强生日问题:当代评论,统计计划与推断杂志]。Klamkin和Newman的开创性工作[生日惊喜的扩展,Journal of Combinatorial Theory, 1967]提出了进一步近似解决相关问题的方法,即计算在找到m个同一天生日的人之前要采访的最小人数。本文提出了适用于任意m > 1值的生日概率的一种新的非递归近似,在生日数量明显大于人数的假设下,实验证明了该近似的结果是准确的。我们的表达式易于计算,非递归,并且适用于任意大于2或3的m值。我们验证了计算不同m值的生日概率的结果的有效性,使用英特尔®RDRAND硬件随机数生成指令生成了数十亿组随机值。我们的解决方案基于一种新颖的基于树的事件空间描述,如果使用这种描述,可以有效地计算生日概率,而不涉及递归或多项分布。
{"title":"Non-recursive computation of the probability of more than two people having the same birthday","authors":"M. Kounavis, Sergej Deutsch, David M. Durham, Saeedeh Komijani","doi":"10.1109/ISCC.2017.8024698","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024698","url":null,"abstract":"We address a well known problem of computer science, the problem of computing the probability that a given number of people m > 1 have the same birthday from among the members of a larger set of cardinality n ≥ m. The solution to this problem for m = 2 is well known and is usually referred to as the ‘birthday surprise probability’. A solution for m = 3 is also known and appears in the 2004 paper by DasGupta [The matching, birthday and the strong birthday problem: a contemporary review, Journal of Statistical Planning and Inference]. Further approximations to the solution of the related problem of computing the minimum number of people to interview until m people with the same birthday are found are presented in the seminal work by Klamkin and Newman [Extensions on the birthday surprise, Journal of Combinatorial Theory, 1967]. In this paper we present a new non-recursive approximation for the birthday probability applicable to any value of m > 1, which yields results that are experimentally proven accurate under the assumption that the number of birthdays is significantly larger than the number of people. Our expression is easy to compute, non-recursive, and applicable to values of m that can be arbitrarily larger than 2 or 3. We verify the validity of our result computing the birthday probability for different values of m, over billions of sets of random values generated using the Intel ® RDRAND hardware random number generation instruction. Our solution is based on a novel tree-based description of the event space which, if used, allows for the computation of the birthday probability efficiently and without involving recursions or multinomial distributions.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127697234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
You can run but you cannot hide from memory: Extracting IM evidence of Android apps 你可以运行,但你不能从内存中隐藏:提取Android应用程序的IM证据
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024571
Antonia Nisioti, Alexios Mylonas, Vasilios Katos, Paul Yoo, A. Chryssanthou
Smartphones have become a vital part of our business and everyday life, as they constitute the primary communication vector. Android dominates the smartphone market (86.2%) and has become pervasive, running in ‘smart’ devices such as tablets, TV, watches, etc. Nowadays, instant messaging applications have become popular amongst smartphone users and since 2016 are the main way of messaging communication. Consequently, their inclusion in any forensics analysis is necessary as they constitute a source of valuable data, which might be used as (admissible) evidence. Often, their examination involves the extraction and analysis of the applications' databases that reside in the device's internal or external memory. The downfall of this method is the fact that databases can be tampered or erased, therefore the evidence might be accidentally or maliciously modified. In this paper, a methodology for retrieving instant messaging data from the volatile memory of Android smartphones is proposed, instead of the traditional database retrieval. The methodology is demonstrated with the use of a case study of four experiments, which provide insights regarding the behavior of such data in memory. Our experimental results show that a large amount of data can be retrieved from the memory, even if the device's battery is removed for a short time. In addition, the retrieved data are not only recent messages, but also messages sent a few months before data acquisition.
智能手机已经成为我们商业和日常生活的重要组成部分,因为它们构成了主要的通信媒介。Android在智能手机市场占据主导地位(86.2%),并已普及到平板电脑、电视、手表等“智能”设备中。如今,即时通讯应用程序在智能手机用户中很受欢迎,自2016年以来,它已成为短信通信的主要方式。因此,有必要将它们列入任何法医分析,因为它们构成了宝贵数据的来源,可以用作(可接受的)证据。通常,他们的检查包括提取和分析驻留在设备内部或外部存储器中的应用程序数据库。这种方法的缺点是数据库可能被篡改或删除,因此证据可能被意外或恶意修改。本文提出了一种从Android智能手机的易失性存储器中检索即时通讯数据的方法,取代了传统的数据库检索方法。该方法通过四个实验的案例研究进行了演示,这些实验提供了有关此类数据在内存中的行为的见解。我们的实验结果表明,即使在短时间内取出设备的电池,也可以从存储器中检索到大量数据。此外,检索到的数据不仅是最近的消息,而且是在数据采集前几个月发送的消息。
{"title":"You can run but you cannot hide from memory: Extracting IM evidence of Android apps","authors":"Antonia Nisioti, Alexios Mylonas, Vasilios Katos, Paul Yoo, A. Chryssanthou","doi":"10.1109/ISCC.2017.8024571","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024571","url":null,"abstract":"Smartphones have become a vital part of our business and everyday life, as they constitute the primary communication vector. Android dominates the smartphone market (86.2%) and has become pervasive, running in ‘smart’ devices such as tablets, TV, watches, etc. Nowadays, instant messaging applications have become popular amongst smartphone users and since 2016 are the main way of messaging communication. Consequently, their inclusion in any forensics analysis is necessary as they constitute a source of valuable data, which might be used as (admissible) evidence. Often, their examination involves the extraction and analysis of the applications' databases that reside in the device's internal or external memory. The downfall of this method is the fact that databases can be tampered or erased, therefore the evidence might be accidentally or maliciously modified. In this paper, a methodology for retrieving instant messaging data from the volatile memory of Android smartphones is proposed, instead of the traditional database retrieval. The methodology is demonstrated with the use of a case study of four experiments, which provide insights regarding the behavior of such data in memory. Our experimental results show that a large amount of data can be retrieved from the memory, even if the device's battery is removed for a short time. In addition, the retrieved data are not only recent messages, but also messages sent a few months before data acquisition.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121151740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dealing with user constraints in MCDM based web service selection 基于MCDM的web服务选择中用户约束的处理
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024522
Walid Serrai, A. Abdelli, L. Mokdad, Ashref Serrai
Nowadays, web service selection has become a very challenging issue. As the number of web services is increasing drastically, different QoS parameters are added in their description in addition to their functional parameters (Inputs and outputs) to distinguish them and ease their selection. Hence, web service selection consists to find out among services having the same functionalities the optimal elements that satisfy user QoS requirements. When the user request deals with value constrains on the QoS parameters, the mainstream approach operates by removing from the search space web services that do not satisfy the user constraints. However, such an approach is not always appropriate especially when the resulting search space is empty or very small. In this case, the discarded services may be of interest in the selection process. To tackle this issue, we propose to use a combination of two MCDM (Multi Criteria Decision Making) methods, that are AHP (Analytical Hierarchy Process) and RIM (Reference Ideal Method). AHP is used to encode an normalize weights constraints assigned to QoS criteria at the first stage. Then to deal with user value constraints, we consider RIM to rank discarded web services relatively to their proximity to the required value constraints. We compare our method with existing approaches by performing tests on a real dataset.
目前,web服务选择已经成为一个非常具有挑战性的问题。随着web服务数量的急剧增加,除了web服务的功能参数(输入和输出)外,还在web服务的描述中添加了不同的QoS参数,以区分web服务,方便选择web服务。因此,web服务选择包括在具有相同功能的服务中找出满足用户QoS需求的最佳元素。当用户请求处理QoS参数的值约束时,主流的方法是从搜索空间中删除不满足用户约束的web服务。然而,这种方法并不总是合适的,特别是当结果搜索空间是空的或非常小的时候。在这种情况下,选择过程中可能会对丢弃的服务感兴趣。为了解决这个问题,我们建议使用两种MCDM(多标准决策)方法的组合,即AHP(层次分析法)和RIM(参考理想法)。在第一阶段,采用层次分析法对分配给QoS标准的权重约束进行规范化编码。然后,为了处理用户价值约束,我们考虑RIM对丢弃的web服务相对于它们与所需价值约束的接近程度进行排序。我们通过在真实数据集上执行测试,将我们的方法与现有方法进行比较。
{"title":"Dealing with user constraints in MCDM based web service selection","authors":"Walid Serrai, A. Abdelli, L. Mokdad, Ashref Serrai","doi":"10.1109/ISCC.2017.8024522","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024522","url":null,"abstract":"Nowadays, web service selection has become a very challenging issue. As the number of web services is increasing drastically, different QoS parameters are added in their description in addition to their functional parameters (Inputs and outputs) to distinguish them and ease their selection. Hence, web service selection consists to find out among services having the same functionalities the optimal elements that satisfy user QoS requirements. When the user request deals with value constrains on the QoS parameters, the mainstream approach operates by removing from the search space web services that do not satisfy the user constraints. However, such an approach is not always appropriate especially when the resulting search space is empty or very small. In this case, the discarded services may be of interest in the selection process. To tackle this issue, we propose to use a combination of two MCDM (Multi Criteria Decision Making) methods, that are AHP (Analytical Hierarchy Process) and RIM (Reference Ideal Method). AHP is used to encode an normalize weights constraints assigned to QoS criteria at the first stage. Then to deal with user value constraints, we consider RIM to rank discarded web services relatively to their proximity to the required value constraints. We compare our method with existing approaches by performing tests on a real dataset.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127112145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On minimizing memory and computation overheads for binary-tree based data replication 最小化基于二叉树的数据复制的内存和计算开销
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024703
S. Souravlas, Angelo Sifaleras
Data replication is used to track the most popular files (i.e., the ones with most requests) and replicate them in selected nodes. In this way, more requests for such popular files can be completed over a period of time and bandwidth consumption is reduced, since these files do not need to be transferred from remote nodes. In this article, we extend our previous work [1] to make it more efficient in terms of memory and total computation cost, so that it becomes more efficient and suitable for larger grids. To reduce the memory costs, we present a centralized strategy which estimates the potential for selected batches of files. The computations required for these estimations are executed in a pipelined way, so their cost is also reduced.
数据复制用于跟踪最受欢迎的文件(即请求最多的文件),并在选定的节点中复制它们。通过这种方式,可以在一段时间内完成对此类流行文件的更多请求,并减少带宽消耗,因为这些文件不需要从远程节点传输。在本文中,我们扩展了之前的工作[1],使其在内存和总计算成本方面更高效,从而使其变得更高效,更适合于更大的网格。为了降低内存成本,我们提出了一种集中式策略,该策略估计了选定批文件的潜力。这些估计所需的计算以流水线的方式执行,因此它们的成本也降低了。
{"title":"On minimizing memory and computation overheads for binary-tree based data replication","authors":"S. Souravlas, Angelo Sifaleras","doi":"10.1109/ISCC.2017.8024703","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024703","url":null,"abstract":"Data replication is used to track the most popular files (i.e., the ones with most requests) and replicate them in selected nodes. In this way, more requests for such popular files can be completed over a period of time and bandwidth consumption is reduced, since these files do not need to be transferred from remote nodes. In this article, we extend our previous work [1] to make it more efficient in terms of memory and total computation cost, so that it becomes more efficient and suitable for larger grids. To reduce the memory costs, we present a centralized strategy which estimates the potential for selected batches of files. The computations required for these estimations are executed in a pipelined way, so their cost is also reduced.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126087685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure self-seeding with power-up SRAM states 安全自播种与上电SRAM状态
Pub Date : 2017-07-01 DOI: 10.1109/ISCC.2017.8024696
Konrad-Felix Krentz, C. Meinel, Hendrik Graupner
Generating seeds on Internet of things (IoT) devices is challenging because these devices typically lack common entropy sources, such as user interaction or hard disks. A promising replacement is to use power-up static random-access memory (SRAM) states, which are partly random due to manufacturing deviations. Thus far, there, however, seems to be no method for extracting close-to-uniformly distributed seeds from power-up SRAM states in an information-theoretically secure and practical manner. Moreover, the min-entropy of power-up SRAM states reduces with temperature, thereby rendering this entropy source vulnerable to so-called freezing attacks. In this paper, we mainly make three contributions. First, we propose a new method for extracting uniformly distributed seeds from power-up SRAM states. Unlike current methods, ours is information-theoretically secure, practical, and freezing attack-resistant rolled into one. Second, we point out a trick that enables using power-up SRAM states not only for self-seeding at boot time, but also for reseeding at runtime. Third, we compare the energy consumption of seeding an IoT device either with radio noise or power-up SRAM states. While seeding with power-up SRAM states turned out to be more energy efficient, we argue for mixing both these entropy sources.
在物联网(IoT)设备上生成种子具有挑战性,因为这些设备通常缺乏常见的熵源,例如用户交互或硬盘。一种很有希望的替代方法是使用上电静态随机存取存储器(SRAM)状态,这种状态由于制造偏差部分是随机的。然而,到目前为止,似乎还没有一种从上电的SRAM状态中提取接近均匀分布的种子的方法,在信息理论上是安全和实用的。此外,上电SRAM状态的最小熵随温度降低,从而使该熵源容易受到所谓的冻结攻击。在本文中,我们主要做了三点贡献。首先,提出了一种从上电SRAM状态中提取均匀分布种子的新方法。与目前的方法不同,我们的方法在理论上是信息安全的,实用的,并能抵抗冻结攻击。其次,我们指出了一个技巧,该技巧不仅可以在引导时使用通电SRAM状态进行自播种,还可以在运行时重新播种。第三,我们比较了播种物联网设备与无线电噪声或上电SRAM状态的能耗。虽然用上电的SRAM状态播种被证明是更节能的,但我们认为应该混合这两种熵源。
{"title":"Secure self-seeding with power-up SRAM states","authors":"Konrad-Felix Krentz, C. Meinel, Hendrik Graupner","doi":"10.1109/ISCC.2017.8024696","DOIUrl":"https://doi.org/10.1109/ISCC.2017.8024696","url":null,"abstract":"Generating seeds on Internet of things (IoT) devices is challenging because these devices typically lack common entropy sources, such as user interaction or hard disks. A promising replacement is to use power-up static random-access memory (SRAM) states, which are partly random due to manufacturing deviations. Thus far, there, however, seems to be no method for extracting close-to-uniformly distributed seeds from power-up SRAM states in an information-theoretically secure and practical manner. Moreover, the min-entropy of power-up SRAM states reduces with temperature, thereby rendering this entropy source vulnerable to so-called freezing attacks. In this paper, we mainly make three contributions. First, we propose a new method for extracting uniformly distributed seeds from power-up SRAM states. Unlike current methods, ours is information-theoretically secure, practical, and freezing attack-resistant rolled into one. Second, we point out a trick that enables using power-up SRAM states not only for self-seeding at boot time, but also for reseeding at runtime. Third, we compare the energy consumption of seeding an IoT device either with radio noise or power-up SRAM states. While seeding with power-up SRAM states turned out to be more energy efficient, we argue for mixing both these entropy sources.","PeriodicalId":106141,"journal":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126113002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2017 IEEE Symposium on Computers and Communications (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1