首页 > 最新文献

Co-Next Student Workshop '09最新文献

英文 中文
Is it me?: understanding the impact of the home network on end-to-end measurements 是我吗?:了解家庭网络对端到端测量的影响
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659016
Lucas DiCioccio, R. Teixeira, C. Rosenberg
End users are often curious to verify the performance of their network connection. Mostly, they accomplish this task with end-to-end active measurements. Unfortunately, the home network can affect end-to-end measurement and can lead to erroneous conclusions. This paper performs measurements in a controlled environment to understand the effect of cross traffic from home on the measurement. We show that although the impact from cross-traffic can be large, it is hard to detect it with active measurements in the home network.
终端用户经常想要验证其网络连接的性能。大多数情况下,它们通过端到端的主动测量来完成这项任务。不幸的是,家庭网络可能会影响端到端的测量,并可能导致错误的结论。本文在受控环境中进行测量,以了解来自家庭的交叉交通对测量的影响。我们表明,尽管交叉流量的影响可能很大,但很难通过家庭网络中的主动测量来检测它。
{"title":"Is it me?: understanding the impact of the home network on end-to-end measurements","authors":"Lucas DiCioccio, R. Teixeira, C. Rosenberg","doi":"10.1145/1658997.1659016","DOIUrl":"https://doi.org/10.1145/1658997.1659016","url":null,"abstract":"End users are often curious to verify the performance of their network connection. Mostly, they accomplish this task with end-to-end active measurements. Unfortunately, the home network can affect end-to-end measurement and can lead to erroneous conclusions. This paper performs measurements in a controlled environment to understand the effect of cross traffic from home on the measurement. We show that although the impact from cross-traffic can be large, it is hard to detect it with active measurements in the home network.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123069785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bloom filters and overlays for routing in pocket switched networks 布隆过滤器和覆盖的路由在口袋交换网络
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659021
Christoph P. Mayer
Pocket Switched Networks (PSN) [3] have become a promising approach for providing communication between scarcely connected human-carried devices. Such devices, e.g. mobile phones or sensor nodes, are exposed to human mobility and can therewith leverage inter-human contacts for store-and-forward routing. Efficiently routing in such delay tolerant networks is complex due to incomplete knowledge about the network, and high dynamics of the network. In this work we want to develop an extension of Bloom filters for resource-efficient routing in pocket switched networks. Furthermore, we argue that PSNs may become densely populated in special situations. We want to exploit such situations to perform collaborative calculations of forwarding-decisions. In this paper we present a simple scheme for distributed decision calculation using overlays and a DHT-based distributed variant of Bloom filters.
口袋交换网络(PSN)[3]已经成为一种很有前途的方法,用于在几乎没有连接的人类携带设备之间提供通信。这些设备,例如移动电话或传感器节点,暴露于人类的移动性,因此可以利用人与人之间的接触进行存储和转发路由。由于对网络的不完全了解和网络的高动态性,使得在此类容错网络中有效路由变得复杂。在这项工作中,我们希望为口袋交换网络中的资源高效路由开发Bloom过滤器的扩展。此外,我们认为psn在特殊情况下可能会变得密集。我们希望利用这种情况来执行转发决策的协作计算。在本文中,我们提出了一个简单的分布式决策计算方案,使用覆盖和基于dht的布隆过滤器的分布式变体。
{"title":"Bloom filters and overlays for routing in pocket switched networks","authors":"Christoph P. Mayer","doi":"10.1145/1658997.1659021","DOIUrl":"https://doi.org/10.1145/1658997.1659021","url":null,"abstract":"Pocket Switched Networks (PSN) [3] have become a promising approach for providing communication between scarcely connected human-carried devices. Such devices, e.g. mobile phones or sensor nodes, are exposed to human mobility and can therewith leverage inter-human contacts for store-and-forward routing. Efficiently routing in such delay tolerant networks is complex due to incomplete knowledge about the network, and high dynamics of the network. In this work we want to develop an extension of Bloom filters for resource-efficient routing in pocket switched networks. Furthermore, we argue that PSNs may become densely populated in special situations. We want to exploit such situations to perform collaborative calculations of forwarding-decisions. In this paper we present a simple scheme for distributed decision calculation using overlays and a DHT-based distributed variant of Bloom filters.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123272012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Random key pre-distribution with transitory master key for wireless sensor networks 基于临时主密钥的无线传感器网络随机密钥预分配
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659012
F. Gandino, B. Montrucchio, M. Rebaudengo
Many Wireless Sensor Networks (WSNs) employ security schemes based on the symmetric encryption, which requires the establishment and management of cryptographic keys. This paper presents a new key management scheme based on Random Key Pre-Distribution. The novelty of the proposed approach is the introduction of a keyed transformation with a Transitory Master Key, which is exploited by the nodes in order to increase the number of different keys employed in the network. The presence of a larger pool of keys provides more robustness and connectivity than previously proposed Random Key Distribution schemes. Furthermore, random pre-distribution allows recovering secure communication also when the master key has been compromised.
许多无线传感器网络(wsn)采用基于对称加密的安全方案,这就需要建立和管理密钥。提出了一种新的基于随机密钥预分发的密钥管理方案。该方法的新颖之处在于引入了使用临时主密钥的密钥转换,节点利用该转换来增加网络中使用的不同密钥的数量。与之前提出的随机密钥分发方案相比,更大的密钥池的存在提供了更高的鲁棒性和连接性。此外,随机预分发还允许在主密钥被泄露时恢复安全通信。
{"title":"Random key pre-distribution with transitory master key for wireless sensor networks","authors":"F. Gandino, B. Montrucchio, M. Rebaudengo","doi":"10.1145/1658997.1659012","DOIUrl":"https://doi.org/10.1145/1658997.1659012","url":null,"abstract":"Many Wireless Sensor Networks (WSNs) employ security schemes based on the symmetric encryption, which requires the establishment and management of cryptographic keys. This paper presents a new key management scheme based on Random Key Pre-Distribution. The novelty of the proposed approach is the introduction of a keyed transformation with a Transitory Master Key, which is exploited by the nodes in order to increase the number of different keys employed in the network. The presence of a larger pool of keys provides more robustness and connectivity than previously proposed Random Key Distribution schemes. Furthermore, random pre-distribution allows recovering secure communication also when the master key has been compromised.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the utility of rate adaptation for broadcast/multicast media traffic in 802.11 networks 速率自适应在802.11网络中广播/组播媒体流量中的应用
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659026
Kyungsoo Lee, Sangki Yun, Yongtae Park, Hyogon Kim
As there is no MAC layer acknowledgment from the receiver for broadcast/multicast transmission in the 802.11 network, using the lowest transmission rate is understandably the safest approach because it minimizes reception error for clients with the worst channel condition. On the contrary, the transmission rate for receivers with good channel conditions is unnecessarily limited. In the case of video streams being broadcast/multicast via 802.11, this approach will lead to poor received video at all clients. In this paper, we demonstrate that there isutility in activating rate adaptation for broadcast/multicast traffic. In particular, we implement a system that significantly improves the broadcast video quality in 802.11 network. This is achieved through an approach of joined broadcast/multicast rate adaptation and network-coded retransmission.
由于在802.11网络中,对于广播/多播传输,接收器没有MAC层的确认,因此使用最低的传输速率是可以理解的最安全的方法,因为它可以最大限度地减少具有最差信道条件的客户端的接收错误。相反,对于信道条件良好的接收机,传输速率受到不必要的限制。在视频流通过802.11广播/多播的情况下,这种方法将导致所有客户端接收到的视频都很差。在本文中,我们证明了在广播/组播业务中激活速率自适应是有用的。特别地,我们实现了一个显著提高802.11网络广播视频质量的系统。这是通过联合广播/组播速率自适应和网络编码重传的方法实现的。
{"title":"On the utility of rate adaptation for broadcast/multicast media traffic in 802.11 networks","authors":"Kyungsoo Lee, Sangki Yun, Yongtae Park, Hyogon Kim","doi":"10.1145/1658997.1659026","DOIUrl":"https://doi.org/10.1145/1658997.1659026","url":null,"abstract":"As there is no MAC layer acknowledgment from the receiver for broadcast/multicast transmission in the 802.11 network, using the lowest transmission rate is understandably the safest approach because it minimizes reception error for clients with the worst channel condition. On the contrary, the transmission rate for receivers with good channel conditions is unnecessarily limited. In the case of video streams being broadcast/multicast via 802.11, this approach will lead to poor received video at all clients.\u0000 In this paper, we demonstrate that there isutility in activating rate adaptation for broadcast/multicast traffic. In particular, we implement a system that significantly improves the broadcast video quality in 802.11 network. This is achieved through an approach of joined broadcast/multicast rate adaptation and network-coded retransmission.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122290199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving roamer retention by exposing weak locations in GSM networks 通过暴露GSM网络中的薄弱位置来提高漫游用户的保留率
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659007
M. Ficek, L. Kencl
One of the most valuable clients of cellular GSM networks are roaming clients, due to the pricing policy set by network operators. Despite that each operator applies a lot of effort in network signal coverage in order to achieve the best conditions for roaming traffic in the network, there still remain hardly detectable locations where roaming clients are getting lost to rival networks. This paper presents a roaming traffic weak locations revealing method based on active tracking of roamer location in a live GSM network. We define the problem scope using formal description of an active tracking process and propose a metrics for network "weakness" evaluation together with intuitive visualization of weak locations. We shortly conclude with plans of our ongoing research.
由于网络运营商制定的定价政策,蜂窝GSM网络最有价值的客户之一是漫游客户。尽管每个运营商都在网络信号覆盖上付出了很大的努力,以实现网络中漫游流量的最佳条件,但仍然存在难以检测到的漫游客户丢失到竞争对手网络的位置。提出了一种基于实时GSM网络中漫游机位置主动跟踪的漫游流量弱位置揭示方法。我们使用主动跟踪过程的形式化描述来定义问题范围,并提出了网络“弱点”评估的度量以及弱点位置的直观可视化。我们很快就结束了我们正在进行的研究计划。
{"title":"Improving roamer retention by exposing weak locations in GSM networks","authors":"M. Ficek, L. Kencl","doi":"10.1145/1658997.1659007","DOIUrl":"https://doi.org/10.1145/1658997.1659007","url":null,"abstract":"One of the most valuable clients of cellular GSM networks are roaming clients, due to the pricing policy set by network operators. Despite that each operator applies a lot of effort in network signal coverage in order to achieve the best conditions for roaming traffic in the network, there still remain hardly detectable locations where roaming clients are getting lost to rival networks. This paper presents a roaming traffic weak locations revealing method based on active tracking of roamer location in a live GSM network. We define the problem scope using formal description of an active tracking process and propose a metrics for network \"weakness\" evaluation together with intuitive visualization of weak locations. We shortly conclude with plans of our ongoing research.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115259787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An adaptive three-party accounting protocol 自适应三方记账协议
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659000
G. Detal, Damien Leroy, O. Bonaventure
Three-party tunnel-based roaming infrastructures may become a future trend to permit mobile users to connect to the Internet when they are not at home. Those solutions takle security issues for both visited networks and mobile users, but require an efficient and scalable accounting protocol. In this paper, we present a lightweight accounting protocol in which the quantity of data that the mobile is allowed to send is gradually increased when cryptographically signed receipts are received.
基于三方隧道的漫游基础设施可能成为未来的趋势,允许移动用户在不在家的时候连接到互联网。这些解决方案可以解决访问网络和移动用户的安全问题,但需要高效且可扩展的计费协议。在本文中,我们提出了一种轻量级的计费协议,在该协议中,当收到加密签名的收据时,允许移动设备发送的数据量逐渐增加。
{"title":"An adaptive three-party accounting protocol","authors":"G. Detal, Damien Leroy, O. Bonaventure","doi":"10.1145/1658997.1659000","DOIUrl":"https://doi.org/10.1145/1658997.1659000","url":null,"abstract":"Three-party tunnel-based roaming infrastructures may become a future trend to permit mobile users to connect to the Internet when they are not at home. Those solutions takle security issues for both visited networks and mobile users, but require an efficient and scalable accounting protocol. In this paper, we present a lightweight accounting protocol in which the quantity of data that the mobile is allowed to send is gradually increased when cryptographically signed receipts are received.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116462381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Peer the peers: an overlay id assignment service at internet exchange points 对等:在互联网交换点的覆盖id分配服务
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659022
Matthias Wählisch, T. Schmidt
P2P networks enable end users to establish services relying neither on a dedicated infrastructure nor on an ISP deployment of enhanced services at the network layer. Regrettably, overlay traffic is not optimal with respect to native connections and peering agreements, but may decrease network quality at end users at increased transit costs. This issue has been addressed by traffic localization approaches: The general objective is to keep overlay traffic local and to minimize provider crossing. Current efforts foster provider-assisted solutions. Overlays, which approximate network paths from the underlay, promise to significantly limit inter-domain traffic. However, ISPs offering transits rejoice in additional traffic and may provide localization data to delocalize peers. In this paper, we argue that ISP interaction should be provided by neutral authorities, namely the Internet exchange points. We present an architecture which serves unstructured and structured overlay peers with a generic overlay ID that jointly reflects AS-paths and peering topologies, and is unbiased by unilateral ISP interests.
P2P网络使最终用户能够建立服务,既不依赖于专用的基础设施,也不依赖于在网络层部署增强服务的ISP。遗憾的是,相对于本地连接和对等协议,覆盖流量不是最优的,但可能会降低最终用户的网络质量,增加传输成本。这个问题已经通过流量定位方法得到了解决:总体目标是保持覆盖流量本地化并最小化提供商交叉。目前的努力促进了供应商协助的解决方案。覆盖层,从底层近似网络路径,承诺显著限制域间流量。然而,提供传输服务的isp会享受额外的流量,并可能向非本地化的对等端提供本地化数据。在本文中,我们认为ISP交互应该由中立的机构,即互联网交换点提供。我们提出了一种体系结构,该体系结构为非结构化和结构化的覆盖节点提供服务,具有通用的覆盖ID,可以共同反映as路径和对等拓扑,并且不受单边ISP利益的影响。
{"title":"Peer the peers: an overlay id assignment service at internet exchange points","authors":"Matthias Wählisch, T. Schmidt","doi":"10.1145/1658997.1659022","DOIUrl":"https://doi.org/10.1145/1658997.1659022","url":null,"abstract":"P2P networks enable end users to establish services relying neither on a dedicated infrastructure nor on an ISP deployment of enhanced services at the network layer. Regrettably, overlay traffic is not optimal with respect to native connections and peering agreements, but may decrease network quality at end users at increased transit costs. This issue has been addressed by traffic localization approaches: The general objective is to keep overlay traffic local and to minimize provider crossing. Current efforts foster provider-assisted solutions. Overlays, which approximate network paths from the underlay, promise to significantly limit inter-domain traffic. However, ISPs offering transits rejoice in additional traffic and may provide localization data to delocalize peers. In this paper, we argue that ISP interaction should be provided by neutral authorities, namely the Internet exchange points. We present an architecture which serves unstructured and structured overlay peers with a generic overlay ID that jointly reflects AS-paths and peering topologies, and is unbiased by unilateral ISP interests.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123488189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards systematic traffic annotation 走向系统化的交通标注
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659006
Romain Fontugne, P. Borgnat, P. Abry, K. Fukuda
Maintaining Internet network resources available and se-cured is an unmet challenge. Hence, trac classi cationand anomaly detection received much attention in the lastfew years, and several algorithms have been proposed forbackbone trac. However, the evaluation of these methodsusually lacks rigor, leading to hasty conclusions. Since syn-thetic data is rather criticized and common labeled database(like the data sets from the DARPA Intrusion DetectionEvaluation Program [6]) is not available for backbone traf- c; researchers analyze real data and validate their methodsby manually inspecting their results, or by comparing theirresults with other methods. Our nal goal is to label theMAWI database [2] which is an archive of real backbonetrac traces publicly available. Since manual labeling ofbackbone trac is unpractical, we build this database bycross-validating results from several methods with di erenttheoretical backgrounds. This systematic approach permitsto maintain updated database in which recent trac tracesare regularly added, and labels are improved with upcomingalgorithms. In this paper we discuss the diculties facedin comparing events provided by distinct algorithms, andpropose a methodology to achieve it.This work will also help researchers in understanding re-sults from their algorithms. For instance, while developinganomaly detector, researchers commonly face a problem intuning their parameter set. The correlation between ana-lyzed trac and parameter set is complicated. Therefore,researchers usually run their application with numerous pa-rameter settings, and the best parameter set is selected bylooking at the highest detection rate. Although this processis commonly accepted by the community a crucial issue stillremains. Let say a parameter set A gives a similar detec-tion rate than a parameter set B , but a deeper analysis ofreported events shows that B is more e ective for a certainkind of anomalies not detectable with the parameter set A(and vice versa). This case is important and should notbe ignored, however, it cannot be observed with a simplecomparison of detection rate.
维护Internet网络资源的可用性和安全性是一个尚未解决的挑战。因此,在过去的几年中,trac分类和异常检测受到了广泛的关注,并提出了几种针对主干trac的算法。然而,对这些方法的评价通常缺乏严谨性,导致结论草率。由于合成数据是相当批评和通用标记数据库(如来自DARPA入侵检测评估计划[6]的数据集)不可用于骨干流量- c;研究人员分析真实数据,并通过手工检查结果或将结果与其他方法进行比较来验证他们的方法。我们的最终目标是将mawi数据库[2]标记为公开可用的真实骨干网c跟踪的存档。由于手工标记主干trac是不切实际的,我们通过交叉验证来自不同理论背景的几种方法的结果来建立这个数据库。这种系统的方法允许维护更新的数据库,其中定期添加最近的trac跟踪,并使用即将推出的算法改进标签。在本文中,我们讨论了在比较不同算法提供的事件时所面临的di困难,并提出了一种实现方法。这项工作也将帮助研究人员理解他们的算法的结果。例如,在开发异常检测器时,研究人员通常面临参数集调整的问题。分析后的trac与参数集之间的相关性比较复杂。因此,研究人员通常在运行应用程序时设置多个pa参数,并通过查看最高的检测率来选择最佳参数集。尽管这一过程被社会普遍接受,但仍然存在一个关键问题。假设参数集a的检测率与参数集B相似,但是对报告事件的更深入分析表明,对于参数集a无法检测到的某种异常,B更有效(反之亦然)。这个病例很重要,不容忽视,但不能简单的比较检出率来观察。
{"title":"Towards systematic traffic annotation","authors":"Romain Fontugne, P. Borgnat, P. Abry, K. Fukuda","doi":"10.1145/1658997.1659006","DOIUrl":"https://doi.org/10.1145/1658997.1659006","url":null,"abstract":"Maintaining Internet network resources available and se-cured is an unmet challenge. Hence, tra\u000ec classi cationand anomaly detection received much attention in the lastfew years, and several algorithms have been proposed forbackbone tra\u000ec. However, the evaluation of these methodsusually lacks rigor, leading to hasty conclusions. Since syn-thetic data is rather criticized and common labeled database(like the data sets from the DARPA Intrusion DetectionEvaluation Program [6]) is not available for backbone traf- c; researchers analyze real data and validate their methodsby manually inspecting their results, or by comparing theirresults with other methods. Our nal goal is to label theMAWI database [2] which is an archive of real backbonetra\u000ec traces publicly available. Since manual labeling ofbackbone tra\u000ec is unpractical, we build this database bycross-validating results from several methods with di erenttheoretical backgrounds. This systematic approach permitsto maintain updated database in which recent tra\u000ec tracesare regularly added, and labels are improved with upcomingalgorithms. In this paper we discuss the di\u000eculties facedin comparing events provided by distinct algorithms, andpropose a methodology to achieve it.This work will also help researchers in understanding re-sults from their algorithms. For instance, while developinganomaly detector, researchers commonly face a problem intuning their parameter set. The correlation between ana-lyzed tra\u000ec and parameter set is complicated. Therefore,researchers usually run their application with numerous pa-rameter settings, and the best parameter set is selected bylooking at the highest detection rate. Although this processis commonly accepted by the community a crucial issue stillremains. Let say a parameter set A gives a similar detec-tion rate than a parameter set B , but a deeper analysis ofreported events shows that B is more e ective for a certainkind of anomalies not detectable with the parameter set A(and vice versa). This case is important and should notbe ignored, however, it cannot be observed with a simplecomparison of detection rate.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep diving into BitTorrent locality 深入到BitTorrent本地
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659002
R. C. Rumín, Nikolaos Laoutaris, Xiaoyuan Yang, Georgos Siganos, P. Rodriguez
Localizing BitTorrent traffic within an ISP in order to avoid excessive and often times unnecessary transit costs has recently received a lot of attention. In this work we attempt to answer yet unanswered questions like "what are the boundaries of win-win outcomes for both ISPs and users from locality?", "what does the tradeoff between ISPs and users look like?", and "are some ISPs more in need of locality biasing than others?".
为了避免过多的和经常不必要的传输成本,在ISP内本地化BitTorrent流量最近受到了很多关注。在这项工作中,我们试图回答一些尚未解决的问题,比如“互联网服务提供商和本地用户的双赢结果的界限是什么?”,“互联网服务提供商和用户之间的权衡是什么样子的?”,以及“一些互联网服务提供商比其他互联网服务提供商更需要本地偏见吗?”。
{"title":"Deep diving into BitTorrent locality","authors":"R. C. Rumín, Nikolaos Laoutaris, Xiaoyuan Yang, Georgos Siganos, P. Rodriguez","doi":"10.1145/1658997.1659002","DOIUrl":"https://doi.org/10.1145/1658997.1659002","url":null,"abstract":"Localizing BitTorrent traffic within an ISP in order to avoid excessive and often times unnecessary transit costs has recently received a lot of attention. In this work we attempt to answer yet unanswered questions like \"what are the boundaries of win-win outcomes for both ISPs and users from locality?\", \"what does the tradeoff between ISPs and users look like?\", and \"are some ISPs more in need of locality biasing than others?\".","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126366367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical DHT-based location service for wireless mesh networks 实用的基于dht的无线网状网络定位服务
Pub Date : 2009-12-01 DOI: 10.1145/1658997.1659023
Mehdi Bezahaf, M. Amorim, S. Fdida, L. Iannone
Mobility management in Wireless Mesh Networks (WMN) is a hot topic still lacking a final, widely accepted, and deployed solution. The major drawbacks of existing proposals is the fact that they rely on some sort of flooding-based technique and very often they need support from end-users' devices. Flooding in wireless environments leads to increased latency and broadcast storm problems, thus providing low performances. In this paper, we argue that a DHT-based approach can overcome such limitations and provide an effective solution to the mobility management problem. A preliminary evaluation of our DHT-based scheme on a real WMN test-bed shows encouraging results when compared to previous solutions.
无线网状网络(WMN)中的移动性管理是一个热门话题,但仍然缺乏一个最终的、被广泛接受的和部署的解决方案。现有提案的主要缺点是它们依赖于某种基于泛洪的技术,并且经常需要最终用户设备的支持。无线环境中的泛洪导致延迟增加和广播风暴问题,从而提供较低的性能。在本文中,我们认为基于dht的方法可以克服这些限制,并为移动性管理问题提供有效的解决方案。在一个真实的WMN试验台上对我们的基于dht的方案进行了初步评估,与之前的解决方案相比,结果令人鼓舞。
{"title":"Practical DHT-based location service for wireless mesh networks","authors":"Mehdi Bezahaf, M. Amorim, S. Fdida, L. Iannone","doi":"10.1145/1658997.1659023","DOIUrl":"https://doi.org/10.1145/1658997.1659023","url":null,"abstract":"Mobility management in Wireless Mesh Networks (WMN) is a hot topic still lacking a final, widely accepted, and deployed solution. The major drawbacks of existing proposals is the fact that they rely on some sort of flooding-based technique and very often they need support from end-users' devices. Flooding in wireless environments leads to increased latency and broadcast storm problems, thus providing low performances. In this paper, we argue that a DHT-based approach can overcome such limitations and provide an effective solution to the mobility management problem. A preliminary evaluation of our DHT-based scheme on a real WMN test-bed shows encouraging results when compared to previous solutions.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114908185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Co-Next Student Workshop '09
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1