首页 > 最新文献

22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)最新文献

英文 中文
Mining and Visualizing the Evolution of the Web Graph Structure Web图结构演变的挖掘与可视化
Masashi Toyoda
{"title":"Mining and Visualizing the Evolution of the Web Graph Structure","authors":"Masashi Toyoda","doi":"10.1109/WAINA.2008.328","DOIUrl":"https://doi.org/10.1109/WAINA.2008.328","url":null,"abstract":"","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125745883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware Reconfiguration Capability for Third Generation Sensor Nodes: Design and Challenges 第三代传感器节点的硬件重构能力:设计与挑战
A. E. Kateeb, L. Azzawi
In this paper, we describe the main capabilities for the third generation of the sensor nodes. The challenges for implementing such nodes is focused on providing the hardware design reconfiguration at minimum power consumption and developing the components library that can be used to develop sensor nodes at short period of time. The impact of using third generation nodes on network level evaluation and next-generation applications is also discussed in this work.
在本文中,我们描述了第三代传感器节点的主要功能。实现这种节点的挑战集中在以最小的功耗提供硬件设计重构和开发可用于在短时间内开发传感器节点的组件库。本文还讨论了使用第三代节点对网络级评估和下一代应用的影响。
{"title":"Hardware Reconfiguration Capability for Third Generation Sensor Nodes: Design and Challenges","authors":"A. E. Kateeb, L. Azzawi","doi":"10.1109/WAINA.2008.176","DOIUrl":"https://doi.org/10.1109/WAINA.2008.176","url":null,"abstract":"In this paper, we describe the main capabilities for the third generation of the sensor nodes. The challenges for implementing such nodes is focused on providing the hardware design reconfiguration at minimum power consumption and developing the components library that can be used to develop sensor nodes at short period of time. The impact of using third generation nodes on network level evaluation and next-generation applications is also discussed in this work.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132542445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
WS-BPEL Process Compiler for Resource-Constrained Embedded Systems 用于资源受限嵌入式系统的WS-BPEL流程编译器
H. Bohn, A. Bobek, F. Golatowski
Process management and workflow systems play an important role in the composition of services in business as well as automation environments. Processes are designed using tools and deployed on a process management engine which control their execution. Unfortunately, the extensive requirements of process management engines on the underlying hard- and software often exceeds the limits of the resources of embedded systems in terms of memory and processing power. This paper proposes an approach of compiling processes to executable programs with very small footprints which can also be run on embedded systems with limited resources. This approach uses the WS-BPEL 2.0 specification for designing the process, XSL transformation and the Apache Axis2 Java architecture for the code generation being flexible and adaptable to future extensions and enhancements of WS-BPEL.
流程管理和工作流系统在业务和自动化环境中的服务组合中扮演着重要的角色。流程是使用工具设计的,并部署在控制其执行的流程管理引擎上。不幸的是,进程管理引擎对底层硬件和软件的广泛需求经常超出嵌入式系统在内存和处理能力方面的资源限制。本文提出了一种将进程编译成占用空间很小的可执行程序的方法,这种方法也可以在资源有限的嵌入式系统上运行。此方法使用WS-BPEL 2.0规范来设计流程、XSL转换和Apache Axis2 Java体系结构,以实现灵活的代码生成,并适应WS-BPEL的未来扩展和增强。
{"title":"WS-BPEL Process Compiler for Resource-Constrained Embedded Systems","authors":"H. Bohn, A. Bobek, F. Golatowski","doi":"10.1109/WAINA.2008.252","DOIUrl":"https://doi.org/10.1109/WAINA.2008.252","url":null,"abstract":"Process management and workflow systems play an important role in the composition of services in business as well as automation environments. Processes are designed using tools and deployed on a process management engine which control their execution. Unfortunately, the extensive requirements of process management engines on the underlying hard- and software often exceeds the limits of the resources of embedded systems in terms of memory and processing power. This paper proposes an approach of compiling processes to executable programs with very small footprints which can also be run on embedded systems with limited resources. This approach uses the WS-BPEL 2.0 specification for designing the process, XSL transformation and the Apache Axis2 Java architecture for the code generation being flexible and adaptable to future extensions and enhancements of WS-BPEL.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Backoff Timer Scheduling for Smart-DCF and Performance Evaluation 智能dcf的回退定时器调度及性能评估
S. Siwamogsatham
In this work, we present a generic backoff-timer scheduling algorithm for the Smart-DCF scheme. In Smart-DCF, the master station schedules the backoff timer value for each client station, and the backoff timer information is sent to the client station via an acknowledgment frame. The proposed backoff-timer scheduling mechanism enables the Smart-DCF access point to provide differentiated services to different classes of wireless stations or traffic. The simulation results demonstrate that the proposed scheduling algorithm is effective. The results also show that the Smart-DCF scheme noticeably outperforms the existing DCF scheme. In addition, the throughput performance of Smart-DCF starts to reach the saturated level when each data burst is longer than 5 frames.
在这项工作中,我们提出了一种适用于Smart-DCF方案的通用回退定时器调度算法。在Smart-DCF中,主站为每个客户端调度回退定时器值,回退定时器信息通过确认帧发送到客户端。所提出的回退定时器调度机制使Smart-DCF接入点能够为不同类别的无线站或业务提供差异化的服务。仿真结果表明,该调度算法是有效的。结果还表明,Smart-DCF方案明显优于现有的DCF方案。此外,当每次数据突发超过5帧时,Smart-DCF的吞吐量性能开始达到饱和水平。
{"title":"On Backoff Timer Scheduling for Smart-DCF and Performance Evaluation","authors":"S. Siwamogsatham","doi":"10.1109/WAINA.2008.240","DOIUrl":"https://doi.org/10.1109/WAINA.2008.240","url":null,"abstract":"In this work, we present a generic backoff-timer scheduling algorithm for the Smart-DCF scheme. In Smart-DCF, the master station schedules the backoff timer value for each client station, and the backoff timer information is sent to the client station via an acknowledgment frame. The proposed backoff-timer scheduling mechanism enables the Smart-DCF access point to provide differentiated services to different classes of wireless stations or traffic. The simulation results demonstrate that the proposed scheduling algorithm is effective. The results also show that the Smart-DCF scheme noticeably outperforms the existing DCF scheme. In addition, the throughput performance of Smart-DCF starts to reach the saturated level when each data burst is longer than 5 frames.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125195620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Computational Intelligence Paradigm for Estimating the Software Project Effort 估算软件项目工作的新计算智能范式
E. A. El-Sebakhy
Recently, there are numerous techniques have been proposed to forecast and identify the software development effort; such prediction has a prominent impact on the success of software development projects. The most common methods for estimating software development efforts that have been proposed in literature are: line of code (LOC)-based constructive cost model (COCOMO), function point- based regression model (FP), neural network model (NN), and case-based reasoning (CBR). Recent research has tended to focus on the use of function points (FPs) in estimating the software development efforts, however, a precise estimation should not only consider the FPs, which represent the size of the software, but should also include various elements of the development environment for its estimation. Therefore, the main benefit of this study is to design and analyze both function points and development environments of recent software development cases. Therefore, this paper presents a new intelligence paradigm scheme based on functional network to forecast that emphasizes on numerous software development elements. Both implementation and learning process are based on the utilization of functional networks as a new modeling scheme and investigate its efficiency as a software development estimation model for predicting the software development efforts.
最近,已经提出了许多技术来预测和识别软件开发工作;这样的预测对软件开发项目的成功有着显著的影响。在文献中提出的评估软件开发工作的最常见方法是:基于代码行(LOC)的构建成本模型(COCOMO)、基于功能点的回归模型(FP)、神经网络模型(NN)和基于案例的推理(CBR)。最近的研究倾向于关注功能点(FPs)在评估软件开发工作中的使用,然而,一个精确的评估不仅应该考虑FPs,它代表了软件的大小,还应该包括用于评估的开发环境的各种元素。因此,这项研究的主要好处是设计和分析最近的软件开发案例的功能点和开发环境。因此,本文提出了一种新的基于功能网络预测的智能范式方案,该方案强调了多种软件开发要素。将功能网络作为一种新的建模方案,并对其作为预测软件开发工作的软件开发评估模型的效率进行了研究。
{"title":"New Computational Intelligence Paradigm for Estimating the Software Project Effort","authors":"E. A. El-Sebakhy","doi":"10.1109/WAINA.2008.257","DOIUrl":"https://doi.org/10.1109/WAINA.2008.257","url":null,"abstract":"Recently, there are numerous techniques have been proposed to forecast and identify the software development effort; such prediction has a prominent impact on the success of software development projects. The most common methods for estimating software development efforts that have been proposed in literature are: line of code (LOC)-based constructive cost model (COCOMO), function point- based regression model (FP), neural network model (NN), and case-based reasoning (CBR). Recent research has tended to focus on the use of function points (FPs) in estimating the software development efforts, however, a precise estimation should not only consider the FPs, which represent the size of the software, but should also include various elements of the development environment for its estimation. Therefore, the main benefit of this study is to design and analyze both function points and development environments of recent software development cases. Therefore, this paper presents a new intelligence paradigm scheme based on functional network to forecast that emphasizes on numerous software development elements. Both implementation and learning process are based on the utilization of functional networks as a new modeling scheme and investigate its efficiency as a software development estimation model for predicting the software development efforts.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132909411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Adaptive Approach to Manage the Number of Virtual Channels 一种自适应的虚拟信道数量管理方法
M. Mirza-Aghatabar, S. Koohi, S. Hessabi, Dara Rahmati
Network-on-chip (NoC) is a precious approach to handle huge number of transistors by virtue of technology scaling to lower than 50 nm. Virtual channels have been introduced in order to improve the performance according to a timing multiplexing concept in each physical channel. The incremental effect of virtual channels on power consumption has been shown in literatures. The issue of power saving has always been controversial to many designers. In this paper, we introduce a new technique which tries to adaptively mange the number of virtual channels in order to reduce the power consumption while not degrading the performance of the network without any reconfiguration. Our experimental results show the efficiency of our method in a torus topology under different traffic models and Duato routing algorithm with 49 % and 30 % power saving in the best and worst conditions, respectively.
片上网络(NoC)是处理大量晶体管的一种宝贵方法,其技术可缩小到50nm以下。引入虚拟信道是为了根据每个物理信道的时序复用概念来提高性能。虚拟信道对功耗的增量效应已在文献中得到证实。对于许多设计师来说,节能问题一直是一个有争议的问题。在本文中,我们介绍了一种新的技术,它试图自适应地管理虚拟信道的数量,以降低功耗,同时不降低网络的性能,而无需重新配置。实验结果表明,在不同流量模型和Duato路由算法的环面拓扑下,该方法在最佳和最差条件下分别节省49%和30%的功率。
{"title":"An Adaptive Approach to Manage the Number of Virtual Channels","authors":"M. Mirza-Aghatabar, S. Koohi, S. Hessabi, Dara Rahmati","doi":"10.1109/WAINA.2008.236","DOIUrl":"https://doi.org/10.1109/WAINA.2008.236","url":null,"abstract":"Network-on-chip (NoC) is a precious approach to handle huge number of transistors by virtue of technology scaling to lower than 50 nm. Virtual channels have been introduced in order to improve the performance according to a timing multiplexing concept in each physical channel. The incremental effect of virtual channels on power consumption has been shown in literatures. The issue of power saving has always been controversial to many designers. In this paper, we introduce a new technique which tries to adaptively mange the number of virtual channels in order to reduce the power consumption while not degrading the performance of the network without any reconfiguration. Our experimental results show the efficiency of our method in a torus topology under different traffic models and Duato routing algorithm with 49 % and 30 % power saving in the best and worst conditions, respectively.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132567127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Detection and Tolerance of Attacks in Storage Area Networks 存储区域网络中攻击的动态检测与容错
Y. Djemaiel, N. Boudriga
Due to the increasing amount of data handled by business applications and the need of an easy way to access data by multiple servers, storage area networks (SANs) have been proposed as a solution to be deployed in enterprises networks. Despite their advantages, a set of security issues are related to these next generation high speed network architectures and that may be a threat to the performance and the availability of such networks. In this paper, we propose an intrusion detection and tolerance system that ensures protection of the SANs against attacks. The proposed solution is based on: (a) the management of two areas (virtual area and protected area) at each storage node; (b) the cooperation of detection modules running on each SAN component; and (c) the use of distributed set of rules that are updated and managed in a secure manner. A case study is given to illustrate the proposed system capabilities in terms of intrusion detection and tolerance.
由于业务应用程序处理的数据量不断增加,并且需要一种简单的方式来访问多个服务器上的数据,存储区域网络(san)被提出作为一种部署在企业网络中的解决方案。尽管它们具有优势,但与这些下一代高速网络体系结构相关的一系列安全问题可能对此类网络的性能和可用性构成威胁。在本文中,我们提出了一个入侵检测和容忍系统,以确保san免受攻击。提出的解决方案基于:(a)在每个存储节点上管理两个区域(虚拟区域和保护区);(b)运行在每个SAN组件上的检测模块的合作;(c)使用以安全方式更新和管理的分布式规则集。通过一个案例分析,说明了所提出的系统在入侵检测和容错方面的能力。
{"title":"Dynamic Detection and Tolerance of Attacks in Storage Area Networks","authors":"Y. Djemaiel, N. Boudriga","doi":"10.1109/WAINA.2008.34","DOIUrl":"https://doi.org/10.1109/WAINA.2008.34","url":null,"abstract":"Due to the increasing amount of data handled by business applications and the need of an easy way to access data by multiple servers, storage area networks (SANs) have been proposed as a solution to be deployed in enterprises networks. Despite their advantages, a set of security issues are related to these next generation high speed network architectures and that may be a threat to the performance and the availability of such networks. In this paper, we propose an intrusion detection and tolerance system that ensures protection of the SANs against attacks. The proposed solution is based on: (a) the management of two areas (virtual area and protected area) at each storage node; (b) the cooperation of detection modules running on each SAN component; and (c) the use of distributed set of rules that are updated and managed in a secure manner. A case study is given to illustrate the proposed system capabilities in terms of intrusion detection and tolerance.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132693913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detecting Masqueraders Using High Frequency Commands as Signatures 使用高频命令作为签名检测伪装者
M. Wan, Han-Ching Wu, Ying-Wei Kuo, James Marshall, S. S. Huang
Network intruders commonly use stolen passwords or other means to log into legitimate users' computer accounts. To prevent this from happening, it is important that we are able to distinguish a user as a true user or a masquerader. Uniqueness of user command has been used in the past as signature of users. This project explores the high frequency commands to see if they work well as signatures. Experimental result was provided to show that they work as well as the Uniqueness method. Besides, the comparisons with other methods were also presented.
网络入侵者通常使用窃取的密码或其他手段登录合法用户的计算机帐户。为了防止这种情况发生,我们必须能够区分用户是真正的用户还是伪装者。用户唯一性命令过去一直被用作用户的签名。这个项目探索高频命令,看看它们是否能很好地作为签名。实验结果表明,该方法与唯一性方法一样有效。并与其他方法进行了比较。
{"title":"Detecting Masqueraders Using High Frequency Commands as Signatures","authors":"M. Wan, Han-Ching Wu, Ying-Wei Kuo, James Marshall, S. S. Huang","doi":"10.1109/WAINA.2008.38","DOIUrl":"https://doi.org/10.1109/WAINA.2008.38","url":null,"abstract":"Network intruders commonly use stolen passwords or other means to log into legitimate users' computer accounts. To prevent this from happening, it is important that we are able to distinguish a user as a true user or a masquerader. Uniqueness of user command has been used in the past as signature of users. This project explores the high frequency commands to see if they work well as signatures. Experimental result was provided to show that they work as well as the Uniqueness method. Besides, the comparisons with other methods were also presented.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115506872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Capacity Issues in Meshed High Data Rate WPANs 网状高数据速率广域网的容量问题
S. Mahmud, Shahbaz Khan, Q. Ni, H. Al-Raweshidy
Some advantages of meshing Wireless Personal Area Networks (WPAN) are to increase the network coverage without high transmission power, self- configuration and self-healing, increased route redundancy and fewer retransmissions. This paper discusses the capacity issues when meshing high data rate WPANs i.e. IEEE 802.15.3, IEEE 802.15.3a and IEEE 802.15.3c. The capacity bottlenecks are discussed which arise in multihop communication with a shared superframe. The paper provides detailed analysis on the superframe capacity using different transmitter data rates and highlights the importance of frame aggregation to achieve higher throughput and low overhead. The paper concludes by discussing possible approaches to improve the capacity of meshed WPANs.
网状无线个人区域网络(WPAN)的优点是在不需要高传输功率的情况下增加网络覆盖范围、自配置和自修复、增加路由冗余和减少重传。本文讨论了高数据速率无线局域网(ieee802.15.3、ieee802.15.3a和ieee802.15.3)组网时的容量问题。讨论了基于共享超帧的多跳通信中出现的容量瓶颈。本文详细分析了不同传输速率下的超帧容量,强调了帧聚合对实现高吞吐量和低开销的重要性。最后讨论了提高网状无线局域网容量的可能途径。
{"title":"Capacity Issues in Meshed High Data Rate WPANs","authors":"S. Mahmud, Shahbaz Khan, Q. Ni, H. Al-Raweshidy","doi":"10.1109/WAINA.2008.253","DOIUrl":"https://doi.org/10.1109/WAINA.2008.253","url":null,"abstract":"Some advantages of meshing Wireless Personal Area Networks (WPAN) are to increase the network coverage without high transmission power, self- configuration and self-healing, increased route redundancy and fewer retransmissions. This paper discusses the capacity issues when meshing high data rate WPANs i.e. IEEE 802.15.3, IEEE 802.15.3a and IEEE 802.15.3c. The capacity bottlenecks are discussed which arise in multihop communication with a shared superframe. The paper provides detailed analysis on the superframe capacity using different transmitter data rates and highlights the importance of frame aggregation to achieve higher throughput and low overhead. The paper concludes by discussing possible approaches to improve the capacity of meshed WPANs.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115581741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks 一种机会网络中具有主动固化的流行病路由方案
Jonah P. Tower, T. Little
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc networking research. In this paper, we explore contributions in epidemic data dissemination and mobile ad hoc networks applicable to opportunistic networking, and propose an extension to prior work based on active cures. Our scheme, called SERAC, increases the rate at which cure messages are propagated in a fragmented network for the purpose of reducing the overhead of outstanding yet incompletely disseminated messages. Preliminary analyses demonstrate the feasibility of performance gains under the opportunistic networking model.
机会网络作为一种利用移动节点之间偶遇的技术正在兴起,它不同于先前在传感器和自组织网络研究中发现的行为。在本文中,我们探讨了流行病数据传播和适用于机会网络的移动自组织网络的贡献,并提出了基于主动治疗的先前工作的扩展。我们的方案称为SERAC,它提高了治愈消息在碎片网络中的传播速度,目的是减少未完成但未完全传播的消息的开销。初步分析证明了机会网络模型下性能提升的可行性。
{"title":"A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks","authors":"Jonah P. Tower, T. Little","doi":"10.1109/WAINA.2008.247","DOIUrl":"https://doi.org/10.1109/WAINA.2008.247","url":null,"abstract":"Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc networking research. In this paper, we explore contributions in epidemic data dissemination and mobile ad hoc networks applicable to opportunistic networking, and propose an extension to prior work based on active cures. Our scheme, called SERAC, increases the rate at which cure messages are propagated in a fragmented network for the purpose of reducing the overhead of outstanding yet incompletely disseminated messages. Preliminary analyses demonstrate the feasibility of performance gains under the opportunistic networking model.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
期刊
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1