首页 > 最新文献

2009 6th IEEE Consumer Communications and Networking Conference最新文献

英文 中文
On SPAWC: Discussion on a Musical Signal Parser and Well-Formed Composer 论SPAWC:关于音乐信号解析器和格式良好的作曲器的讨论
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784966
S. Ferretti, M. Roccetti, Bruno Zamborlin
We present SPAWC (Signal Parser And Well-Formed Composer), a system for the generation of complex melodies, chords and sounds, based on a simple interaction of the performer with an input instrument, i.e., a modulator. Via modulator, the performer generates inputs which are manipulated by SPAWC and transformed into melodies, chords or complex sounds. Real/virtual instruments, as well as a set of (pre or live) recorded audio samples can be utilized to produce the final output. In this paper, we describe all the system components working inside SPAWC. The final output is dynamically produced based on the utilized carrier, i.e., the exploited real/virtual instrument or the set of audio samples loaded on SPAWC. A real installation of SPAWC has been developed by exploiting a theremin as the modulator. Real experiences have demonstrated that SPAWC can be utilized by artists to produce interactive music generation experiences. Concurrently, the system can be employed for entertainment and educational purposes. The software architecture of SPAWC is designed to allow the distribution of its software components over a network. This would make possible to dynamically exploit different carriers available on the net, and promote novel forms of artistic interactions among users over the Internet.
我们提出了SPAWC(信号解析器和格式良好的作曲家),这是一个基于表演者与输入仪器(即调制器)的简单交互而生成复杂旋律、和弦和声音的系统。通过调制器,表演者产生输入,由SPAWC操纵并转换成旋律,和弦或复杂的声音。真实/虚拟仪器,以及一组(预或现场)录制的音频样本可以用来产生最终输出。在本文中,我们描述了在SPAWC中工作的所有系统组件。最终的输出是基于所利用的载体动态产生的,即被利用的真实/虚拟仪器或加载在SPAWC上的音频样本集。利用特雷门作为调制器,研制了一个实际安装的SPAWC。实际经验表明,艺术家可以利用SPAWC来制作互动式音乐生成体验。同时,该系统可以用于娱乐和教育目的。SPAWC的软件体系结构被设计为允许通过网络分发其软件组件。这将使动态开发网络上可用的不同载体成为可能,并促进互联网上用户之间艺术互动的新形式。
{"title":"On SPAWC: Discussion on a Musical Signal Parser and Well-Formed Composer","authors":"S. Ferretti, M. Roccetti, Bruno Zamborlin","doi":"10.1109/CCNC.2009.4784966","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784966","url":null,"abstract":"We present SPAWC (Signal Parser And Well-Formed Composer), a system for the generation of complex melodies, chords and sounds, based on a simple interaction of the performer with an input instrument, i.e., a modulator. Via modulator, the performer generates inputs which are manipulated by SPAWC and transformed into melodies, chords or complex sounds. Real/virtual instruments, as well as a set of (pre or live) recorded audio samples can be utilized to produce the final output. In this paper, we describe all the system components working inside SPAWC. The final output is dynamically produced based on the utilized carrier, i.e., the exploited real/virtual instrument or the set of audio samples loaded on SPAWC. A real installation of SPAWC has been developed by exploiting a theremin as the modulator. Real experiences have demonstrated that SPAWC can be utilized by artists to produce interactive music generation experiences. Concurrently, the system can be employed for entertainment and educational purposes. The software architecture of SPAWC is designed to allow the distribution of its software components over a network. This would make possible to dynamically exploit different carriers available on the net, and promote novel forms of artistic interactions among users over the Internet.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127295173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stochastic Channel Prioritization for Spectrum Sensing in Cooperative Cognitive Radio 协同认知无线电频谱感知的随机信道优先排序
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784893
Xiaoyu Wang, A. Wong, P. Ho
In this paper, a novel cooperative stochastic channel prioritization algorithm is presented for the purpose of improving spectrum sensing efficiency in cooperative cognitive radio systems. The proposed algorithm achieves the goal by prioritizing the channels for fine sensing based on both local statistics obtained by the cognitive radio as well as long-term spatiotemporal statistics obtained from other cognitive radios. Channel priority is determined in a stochastic manner by performing statistical fusion on the local statistics and statistics from neighboring cognitive radios to obtain a biasing density from which stochastic sampling can be used to identify the likelihood of channel availability. Therefore, the individual cognitive radios collaborate to improve the likelihood of each cognitive radio in obtaining available channels. Simulation results show that the proposed cooperative stochastic channel prioritization algorithm can be used to reduce both sensing overhead and percentage of missed opportunities when implemented in a complimentary manner with existing cooperative cognitive radio systems.
为了提高协作认知无线电系统的频谱感知效率,提出了一种新的协作随机信道优先排序算法。该算法基于认知无线电获得的局部统计信息和其他认知无线电获得的长期时空统计信息,对精细感知信道进行优先级排序,从而实现了这一目标。信道优先级以随机方式确定,通过对本地统计数据和来自相邻认知无线电的统计数据进行统计融合,从而获得一个偏置密度,从中可以使用随机抽样来识别信道可用的可能性。因此,个体认知无线电协作以提高每个认知无线电获得可用信道的可能性。仿真结果表明,所提出的协作式随机信道优先排序算法与现有的协作式认知无线电系统互补实现时,可以减少感知开销和错失机会的百分比。
{"title":"Stochastic Channel Prioritization for Spectrum Sensing in Cooperative Cognitive Radio","authors":"Xiaoyu Wang, A. Wong, P. Ho","doi":"10.1109/CCNC.2009.4784893","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784893","url":null,"abstract":"In this paper, a novel cooperative stochastic channel prioritization algorithm is presented for the purpose of improving spectrum sensing efficiency in cooperative cognitive radio systems. The proposed algorithm achieves the goal by prioritizing the channels for fine sensing based on both local statistics obtained by the cognitive radio as well as long-term spatiotemporal statistics obtained from other cognitive radios. Channel priority is determined in a stochastic manner by performing statistical fusion on the local statistics and statistics from neighboring cognitive radios to obtain a biasing density from which stochastic sampling can be used to identify the likelihood of channel availability. Therefore, the individual cognitive radios collaborate to improve the likelihood of each cognitive radio in obtaining available channels. Simulation results show that the proposed cooperative stochastic channel prioritization algorithm can be used to reduce both sensing overhead and percentage of missed opportunities when implemented in a complimentary manner with existing cooperative cognitive radio systems.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132965847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using SNS as Access Control Mechanism for DLNA Content Sharing System 基于SNS的DLNA内容共享系统访问控制机制
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4785004
TaeYoung Song, Y. Kawahara, T. Asami
The home networking becomes more interesting if users can share high quality contents with friends and colleagues living away from the user. DLNA certified devices allow users to share or access digital media contents on the same home network. However, the sharing of the content is only limited inside local area networks. In this paper, we propose a global content sharing home gateway named DAS (DLNA Agent for SNS). Different from exiting approaches using VPN, DAS enables to share specified contents to selected users with support of access control functionality provided by Social Network web services. As DAS behaves as a DLNA certified server, there is no need to modify commercial DLNA CE devices.
如果用户可以与住在远方的朋友和同事分享高质量的内容,那么家庭网络将变得更加有趣。DLNA认证的设备允许用户在同一个家庭网络上共享或访问数字媒体内容。然而,内容的共享仅限于局域网内部。本文提出了一种全局内容共享家庭网关DAS (DLNA Agent for SNS)。与使用VPN的现有方法不同,DAS可以通过支持社交网络web服务提供的访问控制功能,将指定的内容共享给选定的用户。由于DAS作为DLNA认证服务器,因此不需要修改商用DLNA CE设备。
{"title":"Using SNS as Access Control Mechanism for DLNA Content Sharing System","authors":"TaeYoung Song, Y. Kawahara, T. Asami","doi":"10.1109/CCNC.2009.4785004","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785004","url":null,"abstract":"The home networking becomes more interesting if users can share high quality contents with friends and colleagues living away from the user. DLNA certified devices allow users to share or access digital media contents on the same home network. However, the sharing of the content is only limited inside local area networks. In this paper, we propose a global content sharing home gateway named DAS (DLNA Agent for SNS). Different from exiting approaches using VPN, DAS enables to share specified contents to selected users with support of access control functionality provided by Social Network web services. As DAS behaves as a DLNA certified server, there is no need to modify commercial DLNA CE devices.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"56 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131657345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
QoS Provisioning for Video Streaming over SP-Driven P2P Networks Using Admission Control 利用准入控制为sp驱动的P2P网络视频流提供QoS
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784760
M. Mushtaq, T. Ahmed
In this paper, we present an admission control mechanism for video streaming driven by Service Provider (SP) over P2P networks. SP-driven P2P network is a network in which service provider has a comprehensive control over contracted resources utilisation. SP assures the coordination and the creation of overlay P2P network and it is responsible for admission control and resource allocation among others. Our proposed Quality-of-Service (QoS) provisioning mechanism employs video traffic descriptor (i.e. traffic specification) for performing admission control. The proposed mechanism is evaluated using ns2 simulator and the results show the significance of admission control mechanism for QoS provisioning.
在本文中,我们提出了一种P2P网络上由服务提供商(SP)驱动的视频流的准入控制机制。sp驱动的P2P网络是一种服务提供商对合同资源利用具有全面控制的网络。SP保证了覆盖P2P网络的协调和创建,并负责其中的准入控制和资源分配。我们提出的服务质量(QoS)供应机制采用视频流量描述符(即流量规范)来执行准入控制。利用ns2仿真器对所提出的机制进行了评估,结果表明了接纳控制机制对QoS提供的重要意义。
{"title":"QoS Provisioning for Video Streaming over SP-Driven P2P Networks Using Admission Control","authors":"M. Mushtaq, T. Ahmed","doi":"10.1109/CCNC.2009.4784760","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784760","url":null,"abstract":"In this paper, we present an admission control mechanism for video streaming driven by Service Provider (SP) over P2P networks. SP-driven P2P network is a network in which service provider has a comprehensive control over contracted resources utilisation. SP assures the coordination and the creation of overlay P2P network and it is responsible for admission control and resource allocation among others. Our proposed Quality-of-Service (QoS) provisioning mechanism employs video traffic descriptor (i.e. traffic specification) for performing admission control. The proposed mechanism is evaluated using ns2 simulator and the results show the significance of admission control mechanism for QoS provisioning.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Power Consumption of Security Algorithms Employed in Wireless Networks 无线网络中安全算法的功耗研究
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784732
Dimitrios Meintanis, I. Papaefstathiou
Supporting high levels of security in wireless networks is a challenging issue because of the specific problems this environment poses; the provided security by small mobile systems, such as PDAs and mobile phones, is often restricted by their limited battery power and their limited processing power. Driven by these restrictions, the designer will have to decide whether to implement the wireless network security schemes in software or to add special purpose hardware units to the system, executing those CPU intensive tasks. This paper demonstrates and compares the Hardware and Software implementations of a number of widely used security applications employed in wireless networks. We measured the total energy consumption for each security algorithm when implemented in reconfigurable hardware devices and we compared it with the total energy consumption of the equivalent software applications. We demonstrate, that the hardware implementations on a state-of-the-art FPGA are significantly faster while they consume three orders of magnitude less power when compared with the software implementations executed on a state-of-the-art hard-core CPU which is embedded in the same FPGA device.
在无线网络中支持高水平的安全性是一个具有挑战性的问题,因为这种环境会带来特定的问题;小型移动系统(如pda和移动电话)提供的安全性往往受到其有限的电池功率和有限的处理能力的限制。在这些限制的驱使下,设计者必须决定是在软件中实现无线网络安全方案,还是在系统中添加特殊用途的硬件单元,执行那些CPU密集型任务。本文演示和比较了无线网络中一些广泛使用的安全应用的硬件和软件实现。我们测量了在可重构硬件设备中实现的每种安全算法的总能耗,并将其与等效软件应用程序的总能耗进行了比较。我们证明,在最先进的FPGA上的硬件实现速度要快得多,而与嵌入在同一FPGA设备中的最先进的硬核CPU上执行的软件实现相比,它们消耗的功率要低三个数量级。
{"title":"On the Power Consumption of Security Algorithms Employed in Wireless Networks","authors":"Dimitrios Meintanis, I. Papaefstathiou","doi":"10.1109/CCNC.2009.4784732","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784732","url":null,"abstract":"Supporting high levels of security in wireless networks is a challenging issue because of the specific problems this environment poses; the provided security by small mobile systems, such as PDAs and mobile phones, is often restricted by their limited battery power and their limited processing power. Driven by these restrictions, the designer will have to decide whether to implement the wireless network security schemes in software or to add special purpose hardware units to the system, executing those CPU intensive tasks. This paper demonstrates and compares the Hardware and Software implementations of a number of widely used security applications employed in wireless networks. We measured the total energy consumption for each security algorithm when implemented in reconfigurable hardware devices and we compared it with the total energy consumption of the equivalent software applications. We demonstrate, that the hardware implementations on a state-of-the-art FPGA are significantly faster while they consume three orders of magnitude less power when compared with the software implementations executed on a state-of-the-art hard-core CPU which is embedded in the same FPGA device.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126821029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Reliable Transfer of Variable-Length Coded Correlated Date: An Low Complexity Iterative Joint Source-Channel Decoding Approach 变长度编码相关数据的可靠传输:一种低复杂度迭代源信道联合译码方法
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784738
Yang Yang, Weidong Yi, Yongrui Chen
We propose a trellis-based soft-input-soft-output (SISO) a posteriori probability (APP) decoding technique for variable-length coded correlated sources. This technique allows not only the (ML) sequence estimation but also the computation of bit-based reliability values. The notable feature of the proposed technique is that its calculation complexity and memory space requirement are both low. Moreover, we bring the technique of scaling extrinsic information to the field of iterative joint source-channel decoding (ISCD), and obtain fixed scaling factors (SFs) based on the extrinsic information transfer (EXIT) charts analysis. This technique obviously improves the ISCD performance with increasing neglectable complexity. Simulation results show that the proposed ISCD scheme provides a significant improvement on error protection capability for the variable-length coded correlated sources.
提出了一种基于网格的软输入-软输出(SISO)后验概率(APP)解码技术。该技术不仅可以估计(ML)序列,还可以计算基于位的可靠性值。该方法的显著特点是计算复杂度低,对存储空间的要求低。此外,我们将外在信息的缩放技术引入到迭代联合源信道解码(ISCD)领域,并基于外在信息传递(EXIT)图分析获得固定的缩放因子(SFs)。该技术明显提高了ISCD的性能,增加了可以忽略不计的复杂性。仿真结果表明,所提出的ISCD方案对变长编码相关信源的错误保护能力有显著提高。
{"title":"Reliable Transfer of Variable-Length Coded Correlated Date: An Low Complexity Iterative Joint Source-Channel Decoding Approach","authors":"Yang Yang, Weidong Yi, Yongrui Chen","doi":"10.1109/CCNC.2009.4784738","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784738","url":null,"abstract":"We propose a trellis-based soft-input-soft-output (SISO) a posteriori probability (APP) decoding technique for variable-length coded correlated sources. This technique allows not only the (ML) sequence estimation but also the computation of bit-based reliability values. The notable feature of the proposed technique is that its calculation complexity and memory space requirement are both low. Moreover, we bring the technique of scaling extrinsic information to the field of iterative joint source-channel decoding (ISCD), and obtain fixed scaling factors (SFs) based on the extrinsic information transfer (EXIT) charts analysis. This technique obviously improves the ISCD performance with increasing neglectable complexity. Simulation results show that the proposed ISCD scheme provides a significant improvement on error protection capability for the variable-length coded correlated sources.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123293028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tendency-Based Geographic Routing for Sensor Networks 基于趋势的传感器网络地理路由
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784706
J. You, D. Lieckfeldt, D. Timmermann
As sensor networks are deployed over various terrains, the complexity of their topology continues to grow. Holes in networks often cause existing geographic routing algorithms to fail. In this paper, we propose a novel geographic routing algorithm called Greedy Forwarding with VIrtual Position (GF-ViP). We introduce virtual position as the middle position of all neighbors of a node. Instead of comparing nodes' geographic position, GF-ViP employs virtual position for selecting the next hop. Such virtual position reflects the neighborhood of a sensor node, as well as the tendency of further forwarding. For network with routing holes, GF-ViP significantly increases success rate of packet routing, while the overhead is kept low. Furthermore, multiple levels of virtual position can be obtained with localized iteration. We propose the Greedy Forwarding with Multi-level Virtual Position (GF-MVP) algorithm. According to various context information of a sensor network, different levels of virtual position can be used alternatively to increase success rate of packet routing in sensor networks.
随着传感器网络部署在各种地形上,其拓扑结构的复杂性不断增加。网络中的漏洞常常导致现有的地理路由算法失效。本文提出了一种新的地理路由算法——虚拟位置贪婪转发算法(GF-ViP)。我们引入虚位置作为节点所有邻居的中间位置。GF-ViP采用虚拟位置选择下一跳,而不是比较节点的地理位置。这种虚拟位置反映了传感器节点的邻域,以及进一步转发的趋势。对于存在路由漏洞的网络,GF-ViP可以显著提高分组路由的成功率,同时保持较低的开销。此外,通过局部迭代可以获得多级虚拟位置。提出了多级虚拟位置贪婪转发算法(GF-MVP)。根据传感器网络的各种上下文信息,可以选择使用不同级别的虚拟位置,以提高传感器网络中分组路由的成功率。
{"title":"Tendency-Based Geographic Routing for Sensor Networks","authors":"J. You, D. Lieckfeldt, D. Timmermann","doi":"10.1109/CCNC.2009.4784706","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784706","url":null,"abstract":"As sensor networks are deployed over various terrains, the complexity of their topology continues to grow. Holes in networks often cause existing geographic routing algorithms to fail. In this paper, we propose a novel geographic routing algorithm called Greedy Forwarding with VIrtual Position (GF-ViP). We introduce virtual position as the middle position of all neighbors of a node. Instead of comparing nodes' geographic position, GF-ViP employs virtual position for selecting the next hop. Such virtual position reflects the neighborhood of a sensor node, as well as the tendency of further forwarding. For network with routing holes, GF-ViP significantly increases success rate of packet routing, while the overhead is kept low. \u0000 \u0000Furthermore, multiple levels of virtual position can be obtained with localized iteration. We propose the Greedy Forwarding with Multi-level Virtual Position (GF-MVP) algorithm. According to various context information of a sensor network, different levels of virtual position can be used alternatively to increase success rate of packet routing in sensor networks.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126523207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trust-by-Wire in Packet-Switched IPv6 Networks: Tools and FPGA Prototype for the IPclip System 分组交换IPv6网络中的线传信任:IPclip系统的工具和FPGA原型
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4785006
P. Danielis, S. Kubisch, H. Widiger, Jens Rohrbeck, Vladyslav Altman, J. Skodzik, D. Timmermann, T. Bahls, D. Duchow
This demonstration shows the hardware prototype of the IPclip (IP Calling Line Identification Presentation) mechanism for IPv6 networks. IPclip is a mechanism, which provides Trust-by-Wire in IP-based networks by adding trustworthy location information to IP packets. It is implemented on an FPGA development board and configurable at runtime via a graphical configuration tool. We show IPclip's basic functionality in a localization scenario using an analysis tool and Google Earth and discuss several application scenarios during the demonstration.
本演示展示了IPv6网络IPclip (IP主叫线路标识表示)机制的硬件原型。IPclip是一种在基于IP的网络中通过向IP数据包中添加可信位置信息来提供线路信任的机制。它在FPGA开发板上实现,并通过图形配置工具在运行时进行配置。我们将使用分析工具和Google Earth在本地化场景中展示IPclip的基本功能,并在演示过程中讨论几个应用场景。
{"title":"Trust-by-Wire in Packet-Switched IPv6 Networks: Tools and FPGA Prototype for the IPclip System","authors":"P. Danielis, S. Kubisch, H. Widiger, Jens Rohrbeck, Vladyslav Altman, J. Skodzik, D. Timmermann, T. Bahls, D. Duchow","doi":"10.1109/CCNC.2009.4785006","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4785006","url":null,"abstract":"This demonstration shows the hardware prototype of the IPclip (IP Calling Line Identification Presentation) mechanism for IPv6 networks. IPclip is a mechanism, which provides Trust-by-Wire in IP-based networks by adding trustworthy location information to IP packets. It is implemented on an FPGA development board and configurable at runtime via a graphical configuration tool. We show IPclip's basic functionality in a localization scenario using an analysis tool and Google Earth and discuss several application scenarios during the demonstration.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123074757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Security Camera Control Application for Mobile Phones 手机安全摄像头控制应用的设计与实现
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784908
Takeshi Kato, Tomoyuki Osano, N. Ishikawa
In recent years, due to the rise in crime, growing numbers of governments, companies, and schools are equipping their facilities with security cameras to deter crime and to investigate crimes that have happened. In this study, we investigate a distributed application that provides an efficient access method for security cameras placed in various areas. Peer-to-peer is a suitable technology for such ubiquitous applications since it supports discovery mechanisms, simple one-to-one communication, free and extensible distribution of resources, and distributed search to handle the enormous number of resources expected. Our system uses protocols defined by Peer-to-peer Universal Computing Consortium (PUCC) to control various kinds of devices over a peer-to-peer network. This paper presents the design and implementation of a camera control protocol on the PUCC platform for controlling security cameras from mobile phones. The prototype implementation system consists of a media gateway to deliver streaming video to multiple mobile phones and proxies to serve as peer-to-peer nodes for cameras. Camera control and signaling protocols for video streaming are realized by using PUCC protocols.
近年来,由于犯罪率的上升,越来越多的政府、公司和学校都在他们的设施中安装了安全摄像头,以阻止犯罪和调查已经发生的犯罪。在本研究中,我们研究了一个分布式应用程序,该应用程序为放置在不同区域的安全摄像机提供了一种有效的访问方法。点对点技术是一种适合这种无处不在的应用程序的技术,因为它支持发现机制、简单的一对一通信、免费和可扩展的资源分布,以及分布式搜索以处理预期的大量资源。我们的系统使用点对点通用计算联盟(PUCC)定义的协议来控制点对点网络上的各种设备。本文提出了一种基于PUCC平台的摄像机控制协议的设计与实现,用于控制手机监控摄像机。原型实现系统包括一个媒体网关,用于将流视频传输到多个移动电话和代理,作为相机的点对点节点。采用PUCC协议实现了摄像机控制和视频流信令协议。
{"title":"Design and Implementation of Security Camera Control Application for Mobile Phones","authors":"Takeshi Kato, Tomoyuki Osano, N. Ishikawa","doi":"10.1109/CCNC.2009.4784908","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784908","url":null,"abstract":"In recent years, due to the rise in crime, growing numbers of governments, companies, and schools are equipping their facilities with security cameras to deter crime and to investigate crimes that have happened. In this study, we investigate a distributed application that provides an efficient access method for security cameras placed in various areas. Peer-to-peer is a suitable technology for such ubiquitous applications since it supports discovery mechanisms, simple one-to-one communication, free and extensible distribution of resources, and distributed search to handle the enormous number of resources expected. Our system uses protocols defined by Peer-to-peer Universal Computing Consortium (PUCC) to control various kinds of devices over a peer-to-peer network. This paper presents the design and implementation of a camera control protocol on the PUCC platform for controlling security cameras from mobile phones. The prototype implementation system consists of a media gateway to deliver streaming video to multiple mobile phones and proxies to serve as peer-to-peer nodes for cameras. Camera control and signaling protocols for video streaming are realized by using PUCC protocols.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Energy-Optimal Scheme for Neighbor Discovery in Opportunistic Networking 机会网络中邻居发现的能量最优方案
Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784754
Dongmin Yang, Jongmin Shin, Jeonggyu Kim, Cheeha Kim
In opportunistic networking, networks are sparse and nodes are moving around, so it is hard to predict when a node gets and how long it keeps in contact with another. For prompt neighbor discovery, a node is assumed to broadcast continuously probing messages to discover another in its vicinity. This kind of persistent probing consumes too much energy for battery-operated devices to afford. One way to save energy for neighbor discovery is simply to turn off radio during non-contact time. In this paper, as the first step toward the general solution, we simplify the problem consisting of one sender and one receiver moving around and present a novel neighbor discovery scheme with radio "on" and "off" which is optimal in a sense that it does not miss a contact with the minimum energy consumed.
在机会主义网络中,网络是稀疏的,节点四处移动,因此很难预测一个节点何时到达,以及它与另一个节点保持联系的时间。对于快速邻居发现,假设一个节点不断广播探测消息以发现其附近的另一个节点。这种持续的探测消耗了太多的能量,对于电池供电的设备来说是负担不起的。为发现邻居节省能量的一种方法就是在非接触时间关掉收音机。在本文中,作为一般解决方案的第一步,我们简化了由一个发送方和一个接收方移动组成的问题,并提出了一种具有无线电“开”和“关”的新邻居发现方案,该方案在某种意义上是最优的,因为它不会以最小的能量消耗错过一个接触。
{"title":"An Energy-Optimal Scheme for Neighbor Discovery in Opportunistic Networking","authors":"Dongmin Yang, Jongmin Shin, Jeonggyu Kim, Cheeha Kim","doi":"10.1109/CCNC.2009.4784754","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784754","url":null,"abstract":"In opportunistic networking, networks are sparse and nodes are moving around, so it is hard to predict when a node gets and how long it keeps in contact with another. For prompt neighbor discovery, a node is assumed to broadcast continuously probing messages to discover another in its vicinity. This kind of persistent probing consumes too much energy for battery-operated devices to afford. One way to save energy for neighbor discovery is simply to turn off radio during non-contact time. In this paper, as the first step toward the general solution, we simplify the problem consisting of one sender and one receiver moving around and present a novel neighbor discovery scheme with radio \"on\" and \"off\" which is optimal in a sense that it does not miss a contact with the minimum energy consumed.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"15 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114092973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2009 6th IEEE Consumer Communications and Networking Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1