Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375405
O. Ntofon, D. Hunter, D. Simeonidou
Architectures that enable the deployment of large-scale Networked Media Infrastructures (NMIs) to support the increasingly diverse range of media applications, as well as the demand for delivery of user-aware media services have become a necessity. Key to the design of such architectures is the implementation of NMIs that are flexible and support reusability of distributed resources. There is also the requirement to provide a unified description mechanism to cater to the heterogeneous nature of media content, service and infrastructure providers' resources, as well as end-user terminals. This paper describes a service-oriented architecture for implementing future high performance NMIs which are capable of supporting emerging beyond High Definition digital media formats. It focuses mainly on a novel semantic modeling framework based on Resource Description Framework (RDF). This novel framework is being developed to equip the proposed architecture with a unified description mechanism and the capabilities to perform dynamic media service composition.
{"title":"Towards semantic modeling framework for future service oriented Networked Media Infrastructures","authors":"O. Ntofon, D. Hunter, D. Simeonidou","doi":"10.1109/CEEC.2012.6375405","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375405","url":null,"abstract":"Architectures that enable the deployment of large-scale Networked Media Infrastructures (NMIs) to support the increasingly diverse range of media applications, as well as the demand for delivery of user-aware media services have become a necessity. Key to the design of such architectures is the implementation of NMIs that are flexible and support reusability of distributed resources. There is also the requirement to provide a unified description mechanism to cater to the heterogeneous nature of media content, service and infrastructure providers' resources, as well as end-user terminals. This paper describes a service-oriented architecture for implementing future high performance NMIs which are capable of supporting emerging beyond High Definition digital media formats. It focuses mainly on a novel semantic modeling framework based on Resource Description Framework (RDF). This novel framework is being developed to equip the proposed architecture with a unified description mechanism and the capabilities to perform dynamic media service composition.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375371
A. O. Ejeye, S. Walker
Ultra-high definition video content is available in some areas such as the movie industry and scientific research. Streaming of uncompressed video is currently being done at full-high definition (1080p). In this paper we discuss the options for system which streams uncompressed ultra-high definition video content over a wireless network.
{"title":"Uncompressed quad-1080p wireless video streaming","authors":"A. O. Ejeye, S. Walker","doi":"10.1109/CEEC.2012.6375371","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375371","url":null,"abstract":"Ultra-high definition video content is available in some areas such as the movie industry and scientific research. Streaming of uncompressed video is currently being done at full-high definition (1080p). In this paper we discuss the options for system which streams uncompressed ultra-high definition video content over a wireless network.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127478405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375395
N. Suresh, N. Malhotra, R. Kumar, B. Thanudas
Data security in a highly confidential large network is of paramount importance. Confidential data networks belonging to secret agencies and government organizations are common targets for data exfiltration. This has become a growing concern in such networks. Present day intrusion detection and prevention systems and firewalls cannot possibly prevent an insider exfiltrating vital data for ulterior purposes. Hence developing an exfiltration detection tool that exclusively detects data exfiltration is of much importance. In this paper, we present an integrated monitoring tool that detects data exfiltration. This tool employs twofold approach in detecting exfiltration 1) Profiling traffic - in/out correlation 2) Estimating FTP Server access.
{"title":"An integrated data exfiltration monitoring tool for a large organization with highly confidential data source","authors":"N. Suresh, N. Malhotra, R. Kumar, B. Thanudas","doi":"10.1109/CEEC.2012.6375395","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375395","url":null,"abstract":"Data security in a highly confidential large network is of paramount importance. Confidential data networks belonging to secret agencies and government organizations are common targets for data exfiltration. This has become a growing concern in such networks. Present day intrusion detection and prevention systems and firewalls cannot possibly prevent an insider exfiltrating vital data for ulterior purposes. Hence developing an exfiltration detection tool that exclusively detects data exfiltration is of much importance. In this paper, we present an integrated monitoring tool that detects data exfiltration. This tool employs twofold approach in detecting exfiltration 1) Profiling traffic - in/out correlation 2) Estimating FTP Server access.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126450892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375400
Juha-Matti Vanhatupa
Computer role-playing games (CRPGs) aim at offering similar gaming experience as paper-and-pen role-playing games. Modern CRPGs contain of huge fantasy worlds and sophisticated storylines. Therefore programming game content is a very time consuming task for application developers. Use of different kinds of content generation tools is a method to reduce this workload. Those can be used to produce new game areas, items, enemies or quests (individual tasks for the player character to solve). Although use of content generation tools is an excellent method, there are constraints that limit their usefulness: (1) random generated content does not relate to the game storyline, and (2) by exploring generated quests the player character does not advance in the game storyline. In this paper, we present ideas how these constraints could be alleviated, aiming at creating an extensible and personalized fantasy world.
{"title":"Towards extensible and personalized computer role-playing game fantasy worlds","authors":"Juha-Matti Vanhatupa","doi":"10.1109/CEEC.2012.6375400","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375400","url":null,"abstract":"Computer role-playing games (CRPGs) aim at offering similar gaming experience as paper-and-pen role-playing games. Modern CRPGs contain of huge fantasy worlds and sophisticated storylines. Therefore programming game content is a very time consuming task for application developers. Use of different kinds of content generation tools is a method to reduce this workload. Those can be used to produce new game areas, items, enemies or quests (individual tasks for the player character to solve). Although use of content generation tools is an excellent method, there are constraints that limit their usefulness: (1) random generated content does not relate to the game storyline, and (2) by exploring generated quests the player character does not advance in the game storyline. In this paper, we present ideas how these constraints could be alleviated, aiming at creating an extensible and personalized fantasy world.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130569908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375389
H. Nia, Huosheng Hu
Peak detection is a general problem in a wide range of applications. In many advanced signal processing systems, peak detection is used as a pre-processing step, and hence its accuracy for validation of output is crucial. The problem of peak detection can be divided into two stages, peak detection and peak selection and validation. Peak detection can be used in finding peaks in signals and extracting them. The second stage is peak validation in which only those peaks that are representing a special feature or event in signal should be chosen. This paper investigates peak selection and validation problems. A novel peak selection algorithm based on Bayesian decision theory is proposed. It is implemented in Matlab and experimental results show that the proposed peak detection algorithm can detect and select peaks reliably.
{"title":"Applying Bayesian decision theory to peak detection of stochastic signals","authors":"H. Nia, Huosheng Hu","doi":"10.1109/CEEC.2012.6375389","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375389","url":null,"abstract":"Peak detection is a general problem in a wide range of applications. In many advanced signal processing systems, peak detection is used as a pre-processing step, and hence its accuracy for validation of output is crucial. The problem of peak detection can be divided into two stages, peak detection and peak selection and validation. Peak detection can be used in finding peaks in signals and extracting them. The second stage is peak validation in which only those peaks that are representing a special feature or event in signal should be chosen. This paper investigates peak selection and validation problems. A novel peak selection algorithm based on Bayesian decision theory is proposed. It is implemented in Matlab and experimental results show that the proposed peak detection algorithm can detect and select peaks reliably.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134382218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375384
L. Al-Jobouri, M. Fleury
This paper proposes an adaptive channel coding scheme for data-partitioned video streaming over a mobile access network, namely IEEE 802.16e (WiMAX). Raptor coding, for reduced latency, is applied at the byte-level rather than the block level. Adaptation is achieved by a single retransmission, when necessary, of extra redundant data to reconstruct corrupted packets. Packet drops are responded to through the error resiliency inherent in partitioned source coding. The paper finds that operation of the proposed scheme depends on: choice of group-of-pictures structure; selection of an appropriate quantization parameter; and configuration of data partitioning to reduce inter-partition dependencies.
{"title":"Adaptive raptor coded video streaming for a WiMAX channel","authors":"L. Al-Jobouri, M. Fleury","doi":"10.1109/CEEC.2012.6375384","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375384","url":null,"abstract":"This paper proposes an adaptive channel coding scheme for data-partitioned video streaming over a mobile access network, namely IEEE 802.16e (WiMAX). Raptor coding, for reduced latency, is applied at the byte-level rather than the block level. Adaptation is achieved by a single retransmission, when necessary, of extra redundant data to reconstruct corrupted packets. Packet drops are responded to through the error resiliency inherent in partitioned source coding. The paper finds that operation of the proposed scheme depends on: choice of group-of-pictures structure; selection of an appropriate quantization parameter; and configuration of data partitioning to reduce inter-partition dependencies.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127029547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375377
D. Crompton, A. Vickers
In this paper we characterize an in house attenuated total reflection (ATR) sample cell unit, for use with a table top Terahertz-Time domain system (THz-TDS) spectrometer. The custom designed ATR unit offers several key advantages compared to conventional transmission spectrometry. Solid, liquid and powdered samples can easily be prepared for analysis and are easily removed and accessed without the need of dismantling the sample cell. Multiple reflections between the windows in transmission cells are no longer present with the ATR setup. If required the prism can be removed and replaced with a more traditional transmission cell without interfering with the spectrometers optics and optical beam path. The ATR unit was tested with a series of water-isopropyl alcohol (IPA) mixtures, to measure the performance and sensitivity of the ATR unit. The series of mixtures ranged from 0-100% IPA with increments of 10%. The ATR unit was shown to define each increment, with a steady and linear drop of in THz absorbance with added IPA. The real and imaginary parts of the refractive index and therefore, dielectric constants were also calculated at each sample interval. The refractive index increased linearly at the measured THz range from 0.5 and 1 THz from a refractive index of 1 at pure IPA to a maximum of 3 at pure water. To further our understanding of the ATR results, molecular dynamic simulations of the IPA mixtures were performed using an OPLS/AA force field. These simulations produced a series of trajectories from which the auto correlated Fourier transform was calculated from the total dipole moment magnitude of each frame. This gives us the spectral density of each IPA-water mixture which is directly comparable to the THz spectrum experimentally seen with the ATR unit. These simulations repeated the same pattern showing a decrease in THz absorbance with increasing IPA solute. From these results, we conclude the ATR unit is an effective tool in terahertz spectroscopy. The agreement with the simulated results gives us confidence the ATR unit is performing as designed.
{"title":"Assigning the characteristics of an ATR dove prism for use with terahertz frequencies: Supplemented with molecular dynamic simulations","authors":"D. Crompton, A. Vickers","doi":"10.1109/CEEC.2012.6375377","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375377","url":null,"abstract":"In this paper we characterize an in house attenuated total reflection (ATR) sample cell unit, for use with a table top Terahertz-Time domain system (THz-TDS) spectrometer. The custom designed ATR unit offers several key advantages compared to conventional transmission spectrometry. Solid, liquid and powdered samples can easily be prepared for analysis and are easily removed and accessed without the need of dismantling the sample cell. Multiple reflections between the windows in transmission cells are no longer present with the ATR setup. If required the prism can be removed and replaced with a more traditional transmission cell without interfering with the spectrometers optics and optical beam path. The ATR unit was tested with a series of water-isopropyl alcohol (IPA) mixtures, to measure the performance and sensitivity of the ATR unit. The series of mixtures ranged from 0-100% IPA with increments of 10%. The ATR unit was shown to define each increment, with a steady and linear drop of in THz absorbance with added IPA. The real and imaginary parts of the refractive index and therefore, dielectric constants were also calculated at each sample interval. The refractive index increased linearly at the measured THz range from 0.5 and 1 THz from a refractive index of 1 at pure IPA to a maximum of 3 at pure water. To further our understanding of the ATR results, molecular dynamic simulations of the IPA mixtures were performed using an OPLS/AA force field. These simulations produced a series of trajectories from which the auto correlated Fourier transform was calculated from the total dipole moment magnitude of each frame. This gives us the spectral density of each IPA-water mixture which is directly comparable to the THz spectrum experimentally seen with the ATR unit. These simulations repeated the same pattern showing a decrease in THz absorbance with increasing IPA solute. From these results, we conclude the ATR unit is an effective tool in terahertz spectroscopy. The agreement with the simulated results gives us confidence the ATR unit is performing as designed.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126777773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375399
Zhenfei Wang, Kun Yang, D. Hunter
Multi-sink wireless sensor networks (WSNs) are required by an increasing number of applications due to their advantages such as saving energy and higher reliability. However, little modeling work has taken place for this type of network, particularly with mathematical analysis. Firstly, we show that the input process of the WSN sink node can be modeled as a Poisson process. Then we study the M/G/1/∞ queue model and make an attempt to use it instead of M/G/c/∞ model to analyze the multi-sink WSN. As far as we know, it is the first time it has been shown in this application that the input process is approximately a Poisson Process, and it is the first time that a queuing model has been used to analyze a multi-sink WSN. Simulation results show that it is reasonable to use M/G/1/∞ queue model when the load is not high.
{"title":"Modelling and analysis of multi-sink wireless sensor networks using queuing theory","authors":"Zhenfei Wang, Kun Yang, D. Hunter","doi":"10.1109/CEEC.2012.6375399","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375399","url":null,"abstract":"Multi-sink wireless sensor networks (WSNs) are required by an increasing number of applications due to their advantages such as saving energy and higher reliability. However, little modeling work has taken place for this type of network, particularly with mathematical analysis. Firstly, we show that the input process of the WSN sink node can be modeled as a Poisson process. Then we study the M/G/1/∞ queue model and make an attempt to use it instead of M/G/c/∞ model to analyze the multi-sink WSN. As far as we know, it is the first time it has been shown in this application that the input process is approximately a Poisson Process, and it is the first time that a queuing model has been used to analyze a multi-sink WSN. Simulation results show that it is reasonable to use M/G/1/∞ queue model when the load is not high.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116862792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375401
M. M. Khan, I. Mobin, G. Palikaras, E. Kallos
In this paper, the performance parameters of a small printed quasi-self-complementary ultra wideband (UWB) antenna in close proximity to the human body is investigated. The return loss response, impedance, radiation pattern and gain are investigated. The antenna shows good on-body performance, and therefore it will be suitable for on-body applications in UWB wireless body area networks.
{"title":"Study of a small printed quasi-self-complementary ultra wideband antenna for on-body applications","authors":"M. M. Khan, I. Mobin, G. Palikaras, E. Kallos","doi":"10.1109/CEEC.2012.6375401","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375401","url":null,"abstract":"In this paper, the performance parameters of a small printed quasi-self-complementary ultra wideband (UWB) antenna in close proximity to the human body is investigated. The return loss response, impedance, radiation pattern and gain are investigated. The antenna shows good on-body performance, and therefore it will be suitable for on-body applications in UWB wireless body area networks.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-12-06DOI: 10.1109/CEEC.2012.6375402
A. Hammad, Bo Peng, R. Nejabati, S. Azodolmolky, D. Simeonidou
Future Internet services are characterized by global delivery of heterogeneous network-based applications over high performance dynamic networks. To meet these applications needs, architectural enhancements and changes in the current Internet are essential. However, since there exists multiple stakeholders in the current Internet, it is almost impossible to reach an agreement among them on necessary architecture alterations and improvements. Network virtualization has been proposed as a technology that aims at solving this limitation enabling Infrastructure Providers to partition their physical network infrastructures based on user/application requirements into virtual networks. This paper proposes a novel architectural solution for future IP networks based on the concept of Infrastructure as a Service (IaaS) framework and core IP network virtualization. Virtual IP network composition and virtual IP infrastructure Marketplace are two key innovative mechanisms, which are proposed in this architecture. The proposed virtual IP network composition instantiates multiple concurrent and isolated virtual networks coexisting over the same underlying physical infrastructure. Each of these network instances has its own distinctive topology and independent control/routing mechanism. The proposed Marketplace performs IP resource brokering between IP infrastructure providers and their users (i.e. service providers) as well as virtual IP network composition. Design and performance evaluation of the required mechanisms along with the functional building blocks of the proposed architecture with focus on Marketplace functionality are presented in this paper.
{"title":"A novel framework for IP infrastructure virtualization","authors":"A. Hammad, Bo Peng, R. Nejabati, S. Azodolmolky, D. Simeonidou","doi":"10.1109/CEEC.2012.6375402","DOIUrl":"https://doi.org/10.1109/CEEC.2012.6375402","url":null,"abstract":"Future Internet services are characterized by global delivery of heterogeneous network-based applications over high performance dynamic networks. To meet these applications needs, architectural enhancements and changes in the current Internet are essential. However, since there exists multiple stakeholders in the current Internet, it is almost impossible to reach an agreement among them on necessary architecture alterations and improvements. Network virtualization has been proposed as a technology that aims at solving this limitation enabling Infrastructure Providers to partition their physical network infrastructures based on user/application requirements into virtual networks. This paper proposes a novel architectural solution for future IP networks based on the concept of Infrastructure as a Service (IaaS) framework and core IP network virtualization. Virtual IP network composition and virtual IP infrastructure Marketplace are two key innovative mechanisms, which are proposed in this architecture. The proposed virtual IP network composition instantiates multiple concurrent and isolated virtual networks coexisting over the same underlying physical infrastructure. Each of these network instances has its own distinctive topology and independent control/routing mechanism. The proposed Marketplace performs IP resource brokering between IP infrastructure providers and their users (i.e. service providers) as well as virtual IP network composition. Design and performance evaluation of the required mechanisms along with the functional building blocks of the proposed architecture with focus on Marketplace functionality are presented in this paper.","PeriodicalId":142286,"journal":{"name":"2012 4th Computer Science and Electronic Engineering Conference (CEEC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128614022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}