首页 > 最新文献

2009 6th IEEE Consumer Communications and Networking Conference最新文献

英文 中文
Mobility Modeling for Personal Networks: Properties and its Impact 个人网络的移动性建模:属性及其影响
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784983
Yanying Gu, R. V. Prasad, I. Niemegeers
User centered Personal Network (PN) interconnects various devices belonging to a user in different geographic locations, such as home, office, car, etc., to form one network to improve the quality of life of the user. In PNs, the user's devices move in different groups, where these groups merge and split. A PN Mobility Model (PNMM) has been proposed to model the devices' movements in PNs. In this paper, PNMM has been evaluated: stability evaluation proves that PNMM maintains a long-term steady state. The impact of PNMM on the performance of protocols designed for PNs has been discussed in this paper. Simulation results give insights of the performance of the PN Clustering Protocol, and provide guidelines for future design of clustering in PNs.
以用户为中心的个人网络(PN)将用户在不同地理位置的各种设备,如家庭、办公室、汽车等连接起来,形成一个网络,以提高用户的生活质量。在pn中,用户的设备在不同的组中移动,这些组合并和分裂。提出了一个PN迁移模型(PNMM)来模拟器件在PN中的移动。本文对PNMM进行了评价:稳定性评价证明PNMM保持长期稳态。本文讨论了PNMM对为PNs设计的协议性能的影响。仿真结果揭示了PN聚类协议的性能,并为未来的PN聚类设计提供指导。
{"title":"Mobility Modeling for Personal Networks: Properties and its Impact","authors":"Yanying Gu, R. V. Prasad, I. Niemegeers","doi":"10.1109/CCNC.2009.4784983","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784983","url":null,"abstract":"User centered Personal Network (PN) interconnects various devices belonging to a user in different geographic locations, such as home, office, car, etc., to form one network to improve the quality of life of the user. In PNs, the user's devices move in different groups, where these groups merge and split. A PN Mobility Model (PNMM) has been proposed to model the devices' movements in PNs. In this paper, PNMM has been evaluated: stability evaluation proves that PNMM maintains a long-term steady state. The impact of PNMM on the performance of protocols designed for PNs has been discussed in this paper. Simulation results give insights of the performance of the PN Clustering Protocol, and provide guidelines for future design of clustering in PNs.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133647151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prototype Demonstration: Trojan Detection and Defense System 原型演示:木马检测与防御系统
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4785028
Ting Liu, X. Guan, Q. Zheng, Ke Lu, Yuanfeng Song, Weizhan Zhang
This paper presents a novel Trojan detection and defense system. The prototype searches the important files which contain users' confidential information on the disk. And then, these files will be monitored to find which processes will access them by capturing and analyzing the IRPs (I/O Request Packets). The processes of Trojans will be distinguished from regular ones by evaluating their API-calls with several machine-learning models, rather than traditional signature-based mechanism. Testing results show that this prototype could detect and defend the unknown Trojans quickly and accurately.
提出了一种新型的木马检测与防御系统。原型机在磁盘上搜索包含用户机密信息的重要文件。然后,将监视这些文件,通过捕获和分析irp (I/O请求包)来查找哪些进程将访问它们。通过使用几种机器学习模型来评估其api调用,而不是传统的基于签名的机制,特洛伊木马的过程将与常规木马区分开来。测试结果表明,该原型能够快速准确地检测和防御未知木马。
{"title":"Prototype Demonstration: Trojan Detection and Defense System","authors":"Ting Liu, X. Guan, Q. Zheng, Ke Lu, Yuanfeng Song, Weizhan Zhang","doi":"10.1109/CCNC.2009.4785028","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785028","url":null,"abstract":"This paper presents a novel Trojan detection and defense system. The prototype searches the important files which contain users' confidential information on the disk. And then, these files will be monitored to find which processes will access them by capturing and analyzing the IRPs (I/O Request Packets). The processes of Trojans will be distinguished from regular ones by evaluating their API-calls with several machine-learning models, rather than traditional signature-based mechanism. Testing results show that this prototype could detect and defend the unknown Trojans quickly and accurately.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116502089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hypervisors for Consumer Electronics 消费类电子产品的管理程序
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784922
G. Heiser
Virtualization, well established in enterprise computing, is finding its way into embedded systems. However, the use cases differ dramatically between the domains, and this results in significant differences in the requirements on the virtual-machine technology. This paper examines a number of typical virtualization use cases from the CE domain, and the resulting requirements imposed on the hypervisor. We find that enterprise-style hypervisors are ill-matched to the requirements of the embedded domain, which are characterised by low-overhead communication, real-time capability, small memory footprint, small trusted computing base, and fine-grained control over security. We present the OKL4 hypervisor, a member of the L4 microkernel family, designed for embedded-systems use. We outline OKL4's relevant properties with an emphasis on its security mechanisms, and compare its performance to a version of Xen that has recently been promoted for CE use. We conclude that OKL4 is superior to enterprise-style hypervisors for use in CE devices.
虚拟化已经在企业计算中建立了良好的基础,它正在寻找进入嵌入式系统的途径。然而,不同领域之间的用例差异很大,这导致对虚拟机技术的需求存在显著差异。本文研究了来自CE域的许多典型虚拟化用例,以及由此产生的强加于管理程序的需求。我们发现企业级管理程序与嵌入式领域的需求不匹配,嵌入式领域的特点是低开销通信、实时能力、小内存占用、小可信计算基础和对安全性的细粒度控制。我们介绍了OKL4管理程序,它是L4微内核家族的一员,专为嵌入式系统使用而设计。我们概述了OKL4的相关属性,重点介绍了它的安全机制,并将其性能与最近被推广用于CE的Xen版本进行了比较。我们得出结论,在CE设备中使用OKL4优于企业级管理程序。
{"title":"Hypervisors for Consumer Electronics","authors":"G. Heiser","doi":"10.1109/CCNC.2009.4784922","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784922","url":null,"abstract":"Virtualization, well established in enterprise computing, is finding its way into embedded systems. However, the use cases differ dramatically between the domains, and this results in significant differences in the requirements on the virtual-machine technology. \u0000 \u0000This paper examines a number of typical virtualization use cases from the CE domain, and the resulting requirements imposed on the hypervisor. We find that enterprise-style hypervisors are ill-matched to the requirements of the embedded domain, which are characterised by low-overhead communication, real-time capability, small memory footprint, small trusted computing base, and fine-grained control over security. We present the OKL4 hypervisor, a member of the L4 microkernel family, designed for embedded-systems use. We outline OKL4's relevant properties with an emphasis on its security mechanisms, and compare its performance to a version of Xen that has recently been promoted for CE use. We conclude that OKL4 is superior to enterprise-style hypervisors for use in CE devices.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Wireless Network Architecture for Diagnosis and Monitoring Applications 用于诊断和监测应用的无线网络架构
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784843
Z. Khan, J. Thiriet, D. Genon-Catalot
This paper describes a distributed wireless network architecture for remote diagnosis and monitoring. A windmill farm is considered as a target application, which is further grouped into small clusters of windmills communicating with each other for the purpose of distributed diagnosis. Wireless links are commonly used for long-range communication in SCADA systems. In order to extend wireless networks for remote diagnosis applications, strict requirements on availability, robustness, reliability and performance have to be satisfied in order to meet industrial standards. This paper is intended to present a wireless network architecture for tele-operation of large industrial applications.
本文介绍了一种用于远程诊断和监测的分布式无线网络体系结构。将一个风车农场作为目标应用,进一步将其分组为相互通信的小风车集群,以便进行分布式诊断。无线链路通常用于SCADA系统的远程通信。为了将无线网络扩展到远程诊断应用,为了满足工业标准,必须满足对可用性、鲁棒性、可靠性和性能的严格要求。本文旨在为大型工业应用的远程操作提供一种无线网络体系结构。
{"title":"Wireless Network Architecture for Diagnosis and Monitoring Applications","authors":"Z. Khan, J. Thiriet, D. Genon-Catalot","doi":"10.1109/CCNC.2009.4784843","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784843","url":null,"abstract":"This paper describes a distributed wireless network architecture for remote diagnosis and monitoring. A windmill farm is considered as a target application, which is further grouped into small clusters of windmills communicating with each other for the purpose of distributed diagnosis. Wireless links are commonly used for long-range communication in SCADA systems. In order to extend wireless networks for remote diagnosis applications, strict requirements on availability, robustness, reliability and performance have to be satisfied in order to meet industrial standards. This paper is intended to present a wireless network architecture for tele-operation of large industrial applications.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Nondisruptive Adaptation Scheme for Peer-to-Peer Live Video Streaming during Vertical Handoff 垂直切换过程中点对点直播视频流的无中断自适应方案
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784811
Seung-Ik Lee, Y. Ko, Dongman Lee, S. Hyun
In this paper, we propose QoS-constrained peer selection and nondisruptive rate adaptation schemes with considering shared bottleneck problem to provide a stable peer-to-peer live video streaming service during vertical handoff. In the proposed scheme, a QoS-constrained peer is selected by estimating bandwidth with active probing, and a reception rate converges to a stable state without any QoS degradation with help of multi-path handoff. The shared bottleneck problem is addressed by adjusting the estimated bandwidth and yielding the redundant bandwidth usage.
为了在垂直切换过程中提供稳定的点对点视频直播服务,在考虑共享瓶颈问题的情况下,提出了qos约束的对等选择和无中断速率自适应方案。在该方案中,通过主动探测估计带宽来选择QoS约束的对等体,并借助多路径切换将接收速率收敛到不降低QoS的稳定状态。通过调整估计带宽和产生冗余带宽利用率来解决共享瓶颈问题。
{"title":"A Nondisruptive Adaptation Scheme for Peer-to-Peer Live Video Streaming during Vertical Handoff","authors":"Seung-Ik Lee, Y. Ko, Dongman Lee, S. Hyun","doi":"10.1109/CCNC.2009.4784811","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784811","url":null,"abstract":"In this paper, we propose QoS-constrained peer selection and nondisruptive rate adaptation schemes with considering shared bottleneck problem to provide a stable peer-to-peer live video streaming service during vertical handoff. In the proposed scheme, a QoS-constrained peer is selected by estimating bandwidth with active probing, and a reception rate converges to a stable state without any QoS degradation with help of multi-path handoff. The shared bottleneck problem is addressed by adjusting the estimated bandwidth and yielding the redundant bandwidth usage.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115260065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Link Quality Assessment Method for Mobile Multi-Rate Multi-Hop Wireless Networks 一种新的移动多速率多跳无线网络链路质量评估方法
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784751
Jinglong Zhou, M. Jacobsson, E. Onur, I. Niemegeers
Accurate and fast wireless link quality assessment (LQA) for wireless channels would bring huge benefits for mobile multi-hop and multi-rate wireless ad hoc and sensor networks in the form of improved end-to-end performance. In this paper, we propose a novel LQA method based on cross-layer information. The method is implemented in a real test-bed, which is based on IEEE 802.11b/g, and achieved a significant LQA improvement up to 50% in mobile scenarios without introducing overhead. The effectiveness of accurate and fast LQA is demonstrated by feeding it into the routing layer to enable the route decisions to adapt faster during changing situations, especially in mobile scenarios. The experiment results show that the proposed LQA method can lead to faster and smarter routing decisions and higher end-to-end throughput compared to traditional methods, which only use hello packets to determine the link quality in mobile scenario.
准确、快速的无线信道链路质量评估(LQA)将以提高端到端性能的形式为移动多跳、多速率无线自组网和传感器网络带来巨大的好处。本文提出了一种新的基于跨层信息的LQA方法。该方法在基于IEEE 802.11b/g的真实测试平台上实现,在不引入开销的情况下,在移动场景中实现了高达50%的显著LQA改进。通过将准确和快速的LQA馈送到路由层,以使路由决策能够在变化的情况下更快地适应,特别是在移动场景中,从而证明了它的有效性。实验结果表明,在移动场景下,与仅使用hello报文确定链路质量的传统方法相比,提出的LQA方法可以更快、更智能地做出路由决策,提高端到端吞吐量。
{"title":"A Novel Link Quality Assessment Method for Mobile Multi-Rate Multi-Hop Wireless Networks","authors":"Jinglong Zhou, M. Jacobsson, E. Onur, I. Niemegeers","doi":"10.1109/CCNC.2009.4784751","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784751","url":null,"abstract":"Accurate and fast wireless link quality assessment (LQA) for wireless channels would bring huge benefits for mobile multi-hop and multi-rate wireless ad hoc and sensor networks in the form of improved end-to-end performance. In this paper, we propose a novel LQA method based on cross-layer information. The method is implemented in a real test-bed, which is based on IEEE 802.11b/g, and achieved a significant LQA improvement up to 50% in mobile scenarios without introducing overhead. The effectiveness of accurate and fast LQA is demonstrated by feeding it into the routing layer to enable the route decisions to adapt faster during changing situations, especially in mobile scenarios. The experiment results show that the proposed LQA method can lead to faster and smarter routing decisions and higher end-to-end throughput compared to traditional methods, which only use hello packets to determine the link quality in mobile scenario.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116035076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Remuneration Aware Resource Acquisition in P2P Overlay 基于报酬感知的P2P覆盖资源获取
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784860
Joseph C. H. So, P. Wong
In content delivery services, quality of service is greatly affected by the resources provided by the underlying overlay P2P. In order to maintain the level of resources acquired, soliciting peers' resources contributions by giving explicit remunerations is a feasible solution. From the service providers' perspectives, the remuneration should be minimized as long as the guaranteed services are fulfilled for all users. We consider a model defining the objective function to minimize this cost in service provision and a distributed and cost-efficient resource acquisition algorithm. Our results show that, in a network of the heterogeneous peers with limited local information, the service availability can be enhanced by appropriate resource acquisition schemes even in a heavily loaded network and the number of resource providers can be controlled by applying appropriate cost model.
在内容交付服务中,服务质量很大程度上受到底层覆盖P2P所提供资源的影响。为了维持所获得的资源水平,通过给予明确的报酬来征求同行的资源贡献是一种可行的解决方案。从服务提供者的角度来看,只要为所有用户提供保证的服务,就应该尽量减少报酬。我们考虑了一个定义目标函数的模型,以使服务提供中的成本最小化,并考虑了一个分布式和成本高效的资源获取算法。研究结果表明,在本地信息有限的异构节点网络中,即使在高负载网络中,适当的资源获取方案也可以提高服务的可用性,并且可以通过应用适当的成本模型来控制资源提供者的数量。
{"title":"Remuneration Aware Resource Acquisition in P2P Overlay","authors":"Joseph C. H. So, P. Wong","doi":"10.1109/CCNC.2009.4784860","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784860","url":null,"abstract":"In content delivery services, quality of service is greatly affected by the resources provided by the underlying overlay P2P. In order to maintain the level of resources acquired, soliciting peers' resources contributions by giving explicit remunerations is a feasible solution. From the service providers' perspectives, the remuneration should be minimized as long as the guaranteed services are fulfilled for all users. We consider a model defining the objective function to minimize this cost in service provision and a distributed and cost-efficient resource acquisition algorithm. Our results show that, in a network of the heterogeneous peers with limited local information, the service availability can be enhanced by appropriate resource acquisition schemes even in a heavily loaded network and the number of resource providers can be controlled by applying appropriate cost model.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114892219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
U-FIPI: Ubiquitous Sensor Network Service Infra Supporting Bidirectional Location-Awareness between Mobile Nodes and Fixture Nodes U-FIPI:无处不在的传感器网络服务基础设施,支持移动节点和固定节点之间的双向位置感知
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4785011
Baek-Gyu Kim, Tae-Hyon Kim, Soon-Ju Kang, Jae Shin Lee, Jin Ho Shon, Sang Chul Go
We introduce a ubiquitous sensor network system, called U-FIPI, to monitor the early symptom of fire and intruder in indoor environment. Especially, this system adapts a novel approach to provide bidirectional location-awareness service between various mobile nodes and U-FIPI fixture nodes making it suitable for total service as a new concept of building management system.
我们引入了一种称为U-FIPI的无处不在的传感器网络系统,用于监测室内环境中火灾和入侵者的早期症状。特别是,该系统采用了一种新颖的方法,在各种移动节点和U-FIPI固定节点之间提供双向位置感知服务,使其作为一种新的楼宇管理系统概念,适合于全面服务。
{"title":"U-FIPI: Ubiquitous Sensor Network Service Infra Supporting Bidirectional Location-Awareness between Mobile Nodes and Fixture Nodes","authors":"Baek-Gyu Kim, Tae-Hyon Kim, Soon-Ju Kang, Jae Shin Lee, Jin Ho Shon, Sang Chul Go","doi":"10.1109/CCNC.2009.4785011","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785011","url":null,"abstract":"We introduce a ubiquitous sensor network system, called U-FIPI, to monitor the early symptom of fire and intruder in indoor environment. Especially, this system adapts a novel approach to provide bidirectional location-awareness service between various mobile nodes and U-FIPI fixture nodes making it suitable for total service as a new concept of building management system.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Media Delivery to Remote Renderers Controlled by the Mobile Phone 向手机控制的远程渲染器传输媒体
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4785020
A. Fasbender, Martin Gerdes, Takeshi Matsumura, Andreas Häber, F. Reichert
In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.
在今天的内容交付解决方案中,服务交付和控制仍然是紧密耦合的,服务通常被交付到控制会话的同一设备。我们提出了一个解决方案,其设计目标是将服务控制和交付解耦。使用我们的方法,多媒体流媒体服务可以交付到访问网络中的现成DLNA设备。服务提供者通过移动电话接收有关远程媒体播放器和访问环境的信息。控制设备的接近技术(例如条形码,NFC)用于交换所需的凭据。本文描述了一个典型的场景和我们的原型实现。
{"title":"Media Delivery to Remote Renderers Controlled by the Mobile Phone","authors":"A. Fasbender, Martin Gerdes, Takeshi Matsumura, Andreas Häber, F. Reichert","doi":"10.1109/CCNC.2009.4785020","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785020","url":null,"abstract":"In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121171832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Collusion-Resistant Automation Scheme for Social Moderation Systems 社会调节系统的抗合谋自动化方案
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784911
Jing-Kai Lou, Kuan-Ta Chen, C. Lei
For current Web 2.0 services, manual examination of user uploaded content is normally required to ensure its legitimacy and appropriateness, which is a substantial burden to service providers. To reduce labor costs and the delays caused by content censoring, social moderation has been proposed as a front-line mechanism, whereby user moderators are encouraged to examine content before system moderation is required. Given the immerse amount of new content added to the Web each day, there is a need for automation schemes to facilitate rear system moderation. This kind of mechanism is expected to automatically summarize reports from user moderators and ban misbehaving users or remove inappropriate content whenever possible. However, the accuracy of such schemes may be reduced by collusion attacks, where some work together to mislead the automatic summarization in order to obtain shared benefits. In this paper, we propose a collusion-resistant automation scheme for social moderation systems. Because some user moderators may collude and dishonestly claim that a user misbehaves, our scheme detects whether an accusation from a user moderator is fair or malicious based on the structure of mutual accusations of all users in the system. Through simulations we show that collusion attacks are likely to succeed if an intuitive count-based automation scheme is used. The proposed scheme, which is based on the community structure of the user accusation graph, achieves a decent performance in most scenarios.
对于当前的Web 2.0服务,通常需要对用户上传的内容进行人工检查,以确保其合法性和适当性,这对服务提供商来说是一个很大的负担。为了减少人工成本和内容审查造成的延迟,社会审核被提议作为一线机制,在需要系统审核之前,鼓励用户审核内容。由于每天都有大量新内容添加到Web中,因此需要自动化方案来促进后台系统调节。这种机制有望自动总结用户版主的报告,并尽可能禁止行为不端的用户或删除不适当的内容。然而,这些方案的准确性可能会因共谋攻击而降低,共谋攻击是指一些人为了获得共享利益而共同误导自动摘要。在本文中,我们提出了一种社会调节系统的抗合谋自动化方案。由于一些用户版主可能串通并不诚实地声称用户行为不当,因此我们的方案基于系统中所有用户相互指控的结构来检测用户版主的指控是公平的还是恶意的。通过仿真,我们表明,如果使用直观的基于计数的自动化方案,合谋攻击很可能成功。该方案基于用户指控图的社区结构,在大多数场景下都取得了不错的性能。
{"title":"A Collusion-Resistant Automation Scheme for Social Moderation Systems","authors":"Jing-Kai Lou, Kuan-Ta Chen, C. Lei","doi":"10.1109/CCNC.2009.4784911","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784911","url":null,"abstract":"For current Web 2.0 services, manual examination of user uploaded content is normally required to ensure its legitimacy and appropriateness, which is a substantial burden to service providers. To reduce labor costs and the delays caused by content censoring, social moderation has been proposed as a front-line mechanism, whereby user moderators are encouraged to examine content before system moderation is required. Given the immerse amount of new content added to the Web each day, there is a need for automation schemes to facilitate rear system moderation. This kind of mechanism is expected to automatically summarize reports from user moderators and ban misbehaving users or remove inappropriate content whenever possible. However, the accuracy of such schemes may be reduced by collusion attacks, where some work together to mislead the automatic summarization in order to obtain shared benefits. \u0000 \u0000In this paper, we propose a collusion-resistant automation scheme for social moderation systems. Because some user moderators may collude and dishonestly claim that a user misbehaves, our scheme detects whether an accusation from a user moderator is fair or malicious based on the structure of mutual accusations of all users in the system. Through simulations we show that collusion attacks are likely to succeed if an intuitive count-based automation scheme is used. The proposed scheme, which is based on the community structure of the user accusation graph, achieves a decent performance in most scenarios.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128350832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2009 6th IEEE Consumer Communications and Networking Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1