首页 > 最新文献

18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.最新文献

英文 中文
A scalable group rekeying scheme using secret mask patterns 使用秘密掩码模式的可伸缩组密钥更新方案
Y. M. Asem, A. Kara
In this paper, we propose a group rekeying method for changing the multicast group key: matrix-mask based group rekeying "MMGR". In MMGR, the group controller constructs the rekeying message using a numerical matrix and the group members apply secret bit masks on the matrix to get the group key. MMGR does not need computationally expensive encryption of the group key before transmission and hence eliminates the need to decrypt it after receiving the rekeying message. In MMGR, the computational cost for group rekeying is constant with respect to the number of group members up to the capacity of the matrix used, and the rekeying message construction and the group key retrieval processes require simple logical operations.
本文提出了一种改变组播组密钥的组重钥方法:基于矩阵掩码的组重钥“MMGR”。在MMGR中,组控制器使用一个数字矩阵来构造重密消息,组成员在矩阵上应用秘密位掩码来获得组密钥。MMGR不需要在传输前对组密钥进行计算上昂贵的加密,因此不需要在接收到重密消息后对其进行解密。在MMGR中,组重钥的计算成本相对于组成员的数量是恒定的,直至所使用的矩阵的容量,并且重钥消息的构造和组密钥检索过程需要简单的逻辑操作。
{"title":"A scalable group rekeying scheme using secret mask patterns","authors":"Y. M. Asem, A. Kara","doi":"10.1504/IJHPCN.2005.009422","DOIUrl":"https://doi.org/10.1504/IJHPCN.2005.009422","url":null,"abstract":"In this paper, we propose a group rekeying method for changing the multicast group key: matrix-mask based group rekeying \"MMGR\". In MMGR, the group controller constructs the rekeying message using a numerical matrix and the group members apply secret bit masks on the matrix to get the group key. MMGR does not need computationally expensive encryption of the group key before transmission and hence eliminates the need to decrypt it after receiving the rekeying message. In MMGR, the computational cost for group rekeying is constant with respect to the number of group members up to the capacity of the matrix used, and the rekeying message construction and the group key retrieval processes require simple logical operations.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124600882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can streaming of stored playback video be supported on peer to peer infrastructure? 点对点基础设施是否支持存储的播放视频流?
K. Kalapriya, S. Nandy, K. V. Babu
Streaming live video over peers in the Internet is gaining popularity since it has the advantage of reducing the load on the server and enable the server to perform other specialized services more effectively. It also helps reduce the server bandwidth and is therefore no more a limiting factor for the number of clients served. We propose a architecture for 'streaming stored video' over peer-to-peer network. While a given peer continues to receive segments of the stream, simultaneously caching these segments locally renders this peer to inturn act as a source for other peers. These peers are highly transient in nature and the exit of a peer from the network results in loss of video segments. We overcome this in our architecture by exploiting the inherent redundancy of FEC encoding of video streams. Through simulations we establish the novelty of our architecture and show that our proposed solution incurs minimum overhead on the peers and does not increase the playback latency much more than the jitter buffer latency.
通过Internet上的对等点传输实时视频正变得越来越流行,因为它具有减少服务器负载并使服务器能够更有效地执行其他专门服务的优势。它还有助于减少服务器带宽,因此不再是所服务客户机数量的限制因素。我们提出了一种基于点对点网络的“流存储视频”架构。当给定的对等体继续接收流段时,同时在本地缓存这些段,使该对等体反过来充当其他对等体的源。这些对等体在本质上是高度瞬态的,一个对等体退出网络会导致视频段的丢失。我们通过利用视频流的FEC编码的固有冗余在我们的架构中克服了这个问题。通过仿真,我们建立了我们的架构的新颖性,并表明我们提出的解决方案在对等体上产生最小的开销,并且不会比抖动缓冲延迟增加更多的播放延迟。
{"title":"Can streaming of stored playback video be supported on peer to peer infrastructure?","authors":"K. Kalapriya, S. Nandy, K. V. Babu","doi":"10.1109/AINA.2004.1283786","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283786","url":null,"abstract":"Streaming live video over peers in the Internet is gaining popularity since it has the advantage of reducing the load on the server and enable the server to perform other specialized services more effectively. It also helps reduce the server bandwidth and is therefore no more a limiting factor for the number of clients served. We propose a architecture for 'streaming stored video' over peer-to-peer network. While a given peer continues to receive segments of the stream, simultaneously caching these segments locally renders this peer to inturn act as a source for other peers. These peers are highly transient in nature and the exit of a peer from the network results in loss of video segments. We overcome this in our architecture by exploiting the inherent redundancy of FEC encoding of video streams. Through simulations we establish the novelty of our architecture and show that our proposed solution incurs minimum overhead on the peers and does not increase the playback latency much more than the jitter buffer latency.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120955193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An efficient clustered architecture for P2P networks 一种高效的P2P网络集群架构
Juan Li, S. Vuong
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some serious challenges. In this paper, we propose an efficient clustered super-peer P2P architecture (ECSP) to overcome the scalability and efficiency problems of existing unstructured P2P system. With ECSP, peers are grouped into clusters according to their topological proximity, and super-peers are selected from regular peers to act as cluster leaders and service providers. These super-peers are also connected to each other, forming a backbone overlay network operating as a distinct, yet integrated, application. To maintain the dynamically adaptive overlay network and to manage the routing on it, we propose an application level broadcasting protocol: Efa. Applying only a small amount of information about the topology of a network, Efa is as simple as flooding, a conventional method used in unstructured P2P systems. By eliminating many duplicated messages, Efa is much more efficient and scalable than flooding, and furthermore, it is completely decentralized and self-organized. Our experimental results prove that ESCP architecture, combined with the super-peer backbone protocol, can generate impressive levels of performance and scalability.
点对点(P2P)计算提供了许多吸引人的特性,例如自组织、负载平衡、可用性、容错和匿名性。然而,它也面临着一些严峻的挑战。本文提出了一种高效的集群超级对等P2P体系结构(ECSP),克服了现有非结构化P2P系统的可扩展性和效率问题。在ECSP中,根据节点的拓扑接近度将节点分组成集群,并从常规节点中选择超级节点作为集群领导者和服务提供者。这些超级对等点也相互连接,形成一个骨干覆盖网络,作为一个独立但集成的应用程序运行。为了维护动态自适应覆盖网络并对其路由进行管理,我们提出了一种应用层广播协议:Efa。Efa只应用关于网络拓扑的少量信息,就像洪水一样简单,这是一种在非结构化P2P系统中使用的传统方法。通过消除许多重复的消息,Efa比洪水更有效和可扩展,而且它是完全分散和自组织的。我们的实验结果证明,ESCP架构与超级对等骨干协议相结合,可以产生令人印象深刻的性能和可扩展性。
{"title":"An efficient clustered architecture for P2P networks","authors":"Juan Li, S. Vuong","doi":"10.1142/S0219265904001179","DOIUrl":"https://doi.org/10.1142/S0219265904001179","url":null,"abstract":"Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some serious challenges. In this paper, we propose an efficient clustered super-peer P2P architecture (ECSP) to overcome the scalability and efficiency problems of existing unstructured P2P system. With ECSP, peers are grouped into clusters according to their topological proximity, and super-peers are selected from regular peers to act as cluster leaders and service providers. These super-peers are also connected to each other, forming a backbone overlay network operating as a distinct, yet integrated, application. To maintain the dynamically adaptive overlay network and to manage the routing on it, we propose an application level broadcasting protocol: Efa. Applying only a small amount of information about the topology of a network, Efa is as simple as flooding, a conventional method used in unstructured P2P systems. By eliminating many duplicated messages, Efa is much more efficient and scalable than flooding, and furthermore, it is completely decentralized and self-organized. Our experimental results prove that ESCP architecture, combined with the super-peer backbone protocol, can generate impressive levels of performance and scalability.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Supervising secret-key agreements in a level-based hierarchy 在基于级别的层次结构中监督密钥协议
Ching-Te Wang, Chu-Hsing Lin, Chinchen Chang
A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can communicate securely with each other by using the session key. In this paper, we will propose an approach to solve the problem of supervising secure communication in a level-based hierarchy. In the proposed scheme, any two users with the same security level can efficiently establish a session key and both of them can apply it to encrypt (or decrypt) the communication messages. Accordingly, a user with higher security level can conveniently derive the session key and supervise the communication. The security of the proposed scheme is based on Diffie-Hellman's key agreement and RSA's scheme. To reveal the session key, a malicious user has to solve the factorization and the discrete logarithm problems.
在网络系统中使用密钥协议,使得两个用户能够建立共同共享的密钥。同一安全级别的实体之间可以通过使用会话密钥进行安全通信。在本文中,我们将提出一种方法来解决基于层次结构的安全通信监控问题。在该方案中,任意两个具有相同安全级别的用户都可以有效地建立会话密钥,并且双方都可以使用该密钥对通信消息进行加密(或解密)。因此,更高安全级别的用户可以方便地获得会话密钥并监督通信。该方案的安全性基于Diffie-Hellman密钥协议和RSA方案。为了泄露会话密钥,恶意用户必须解决分解和离散对数问题。
{"title":"Supervising secret-key agreements in a level-based hierarchy","authors":"Ching-Te Wang, Chu-Hsing Lin, Chinchen Chang","doi":"10.1109/AINA.2004.1283929","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283929","url":null,"abstract":"A key agreement protocol is utilized in a network system such that two users are able to establish a commonly shared secret key. Entities within the same security level can communicate securely with each other by using the session key. In this paper, we will propose an approach to solve the problem of supervising secure communication in a level-based hierarchy. In the proposed scheme, any two users with the same security level can efficiently establish a session key and both of them can apply it to encrypt (or decrypt) the communication messages. Accordingly, a user with higher security level can conveniently derive the session key and supervise the communication. The security of the proposed scheme is based on Diffie-Hellman's key agreement and RSA's scheme. To reveal the session key, a malicious user has to solve the factorization and the discrete logarithm problems.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121047093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authenticated autonomous system traceback 经过身份验证的自治系统回溯
V. Paruchuri, A. Durresi, R. Kannan, S. Iyengar
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against distributed denial of service attacks one of the hardest problems on the Internet today. Previous solutions for this problem try to traceback to the exact origin of the attack by requiring every router's participation. For many reasons this requirement is impractical and the victim ends up with an approximate location of the attacker. Reconstruction of the whole path is also very difficult owing to the sheer size of the Internet. This paper presents lightweight schemes for tracing back to the attack-originating AS instead to the exact origin itself. Once the attack-originating AS is determined, all further routers in the path to the attacker are within that AS and under the control of a single entity; which can presumably monitor local traffic in a more direct way than a generalized, Internet scale, packet marking scheme can. We also provide a scheme to prevent compromised routers from forging markings.
IP协议的设计使得可靠地识别IP数据包的发起者变得困难,这使得防御分布式拒绝服务攻击成为当今Internet上最难的问题之一。以前针对这个问题的解决方案试图通过要求每个路由器的参与来追溯攻击的确切起源。由于许多原因,这个要求是不切实际的,受害者最终会得到攻击者的大致位置。由于互联网的庞大规模,整个路径的重建也非常困难。本文提出了一种轻量级的方案,用于跟踪攻击起源的AS,而不是精确的起源本身。一旦确定了发起攻击的自治系统,到达攻击者的路径上的所有路由器都在该自治系统内,并受单个实体的控制;它可以比通用的、互联网规模的分组标记方案更直接地监控本地流量。我们还提供了一种方案来防止受损路由器伪造标记。
{"title":"Authenticated autonomous system traceback","authors":"V. Paruchuri, A. Durresi, R. Kannan, S. Iyengar","doi":"10.1109/AINA.2004.1283944","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283944","url":null,"abstract":"The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against distributed denial of service attacks one of the hardest problems on the Internet today. Previous solutions for this problem try to traceback to the exact origin of the attack by requiring every router's participation. For many reasons this requirement is impractical and the victim ends up with an approximate location of the attacker. Reconstruction of the whole path is also very difficult owing to the sheer size of the Internet. This paper presents lightweight schemes for tracing back to the attack-originating AS instead to the exact origin itself. Once the attack-originating AS is determined, all further routers in the path to the attacker are within that AS and under the control of a single entity; which can presumably monitor local traffic in a more direct way than a generalized, Internet scale, packet marking scheme can. We also provide a scheme to prevent compromised routers from forging markings.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115603524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A multi-agent model of human mind based on mental image directed semantic theory for comprehensible communication between humans and robots 基于心理意象导向语义理论的人与机器人可理解交流的多智能体心智模型
Masato Shiraishi, M. Yokota
Development of robots for practical use has brought the need for more-human friendly intelligent systems. Such an intelligent system should be equipped with a certain model of human mind in order to realize comprehensible communication with humans. Mental image directed semantic theory (MIDST) has proposed a methodology for integrated multimedia information understanding, for example, cross-media translation. This paper describes a multiagent model of human mind based on MIDST and its computer implementation.
实用机器人的发展带来了对更人性化的智能系统的需求。这样的智能系统必须具备一定的人类思维模式,才能实现与人类的可理解交流。心理意象导向语义理论(mid)提出了一种综合多媒体信息理解方法,如跨媒体翻译。本文描述了一种基于mid的人脑多智能体模型及其计算机实现。
{"title":"A multi-agent model of human mind based on mental image directed semantic theory for comprehensible communication between humans and robots","authors":"Masato Shiraishi, M. Yokota","doi":"10.1109/AINA.2004.1283866","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283866","url":null,"abstract":"Development of robots for practical use has brought the need for more-human friendly intelligent systems. Such an intelligent system should be equipped with a certain model of human mind in order to realize comprehensible communication with humans. Mental image directed semantic theory (MIDST) has proposed a methodology for integrated multimedia information understanding, for example, cross-media translation. This paper describes a multiagent model of human mind based on MIDST and its computer implementation.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115869254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MaCC: supporting network formation and routing in wireless personal area networks MaCC:支持无线个人区域网络的网络形成和路由
M. Takizawa, H. Aida, M. Saito, Y. Tobe, H. Tokuda
This paper presents a novel effective scheme of configuring wireless personal area networks (WPANs), called master-driven connection control (MaCC). WPANs are based on a new wireless technology, which enables portable and mobile computing devices, and consumer electronic appliances to communicate with each other. Assuming that WPANs operate in a master-slave style, we exploit the information about master-slave relationships for identifying a network topology in an ad hoc fashion. Specifically, MaCC supports routing, providing the minimum-hop paths that cannot be obtained by flooding algorithms. In addition, it constructs the optimal topology on demand along the minimum-hop paths dynamically, because the performance of routing is dependent on network topologies. These functions need only a few control messages to achieve, and so can avoid excessive message propagation by flooding causing frame collisions in the WPANs. MaCC has several prominent features: self-direction of every node, adaptive formation of networks, and minimization of hop counts for routing control. In this paper, we describe the details of MaCC and analyze its overhead about initialization, routing discovery, and reconfiguration. The results show control messages propagated in a MaCC network at route discovery are reduced to less than one half of those in a network utilizing pure flooding.
本文提出了一种新的配置无线个人区域网络(wpan)的有效方案——主驱动连接控制(MaCC)。无线广域网基于一种新的无线技术,它使便携式和移动计算设备以及消费电子设备能够相互通信。假设wwan以主从方式运行,我们利用有关主从关系的信息,以一种特别的方式识别网络拓扑。具体来说,MaCC支持路由,提供泛洪算法无法获得的最小跳数路径。此外,由于路由的性能依赖于网络拓扑结构,该算法还沿着最小跳数路径动态地按需构建最优拓扑。这些功能只需要少量的控制消息就可以实现,因此可以避免过量的消息传播而导致wwan中的帧冲突。MaCC有几个突出的特点:每个节点的自导向、网络的自适应形成和路由控制的跳数最小化。在本文中,我们描述了MaCC的细节,并分析了它在初始化、路由发现和重新配置方面的开销。结果表明,路由发现时在MaCC网络中传播的控制消息减少到使用纯泛洪的网络中的控制消息的一半以下。
{"title":"MaCC: supporting network formation and routing in wireless personal area networks","authors":"M. Takizawa, H. Aida, M. Saito, Y. Tobe, H. Tokuda","doi":"10.1109/AINA.2004.1283893","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283893","url":null,"abstract":"This paper presents a novel effective scheme of configuring wireless personal area networks (WPANs), called master-driven connection control (MaCC). WPANs are based on a new wireless technology, which enables portable and mobile computing devices, and consumer electronic appliances to communicate with each other. Assuming that WPANs operate in a master-slave style, we exploit the information about master-slave relationships for identifying a network topology in an ad hoc fashion. Specifically, MaCC supports routing, providing the minimum-hop paths that cannot be obtained by flooding algorithms. In addition, it constructs the optimal topology on demand along the minimum-hop paths dynamically, because the performance of routing is dependent on network topologies. These functions need only a few control messages to achieve, and so can avoid excessive message propagation by flooding causing frame collisions in the WPANs. MaCC has several prominent features: self-direction of every node, adaptive formation of networks, and minimization of hop counts for routing control. In this paper, we describe the details of MaCC and analyze its overhead about initialization, routing discovery, and reconfiguration. The results show control messages propagated in a MaCC network at route discovery are reduced to less than one half of those in a network utilizing pure flooding.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QoS control function based on user's information on the 3D virtual shared space 基于用户对三维虚拟共享空间信息的QoS控制功能
S. Oikawa, K. Hashimoto, Y. Shibata
Recently many communication systems based on three dimensional spaces have been proposed. In those systems, in order to support many users in the same space, the QoS control function based on the distance between avatars has mainly been applied. For this reason, computing and network resources in the communication systems are wasted. We suggest a new QOS control to take account of a user's interest and status information in addition to the distance between avatars. Using this method, unnecessary communication and resources can be reduced and more useful communication can be attained with higher priority in the large communication space.
近年来,人们提出了许多基于三维空间的通信系统。在这些系统中,为了支持同一空间内的多个用户,主要采用了基于虚拟角色之间距离的QoS控制功能。因此,通信系统中的计算资源和网络资源被浪费了。我们建议一种新的QOS控制,除了考虑用户的兴趣和状态信息之外,还考虑虚拟角色之间的距离。利用这种方法,可以减少不必要的通信和资源,在大的通信空间中获得更高优先级的更有用的通信。
{"title":"QoS control function based on user's information on the 3D virtual shared space","authors":"S. Oikawa, K. Hashimoto, Y. Shibata","doi":"10.1109/AINA.2004.1283759","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283759","url":null,"abstract":"Recently many communication systems based on three dimensional spaces have been proposed. In those systems, in order to support many users in the same space, the QoS control function based on the distance between avatars has mainly been applied. For this reason, computing and network resources in the communication systems are wasted. We suggest a new QOS control to take account of a user's interest and status information in addition to the distance between avatars. Using this method, unnecessary communication and resources can be reduced and more useful communication can be attained with higher priority in the large communication space.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123755392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Guard channel sharing strategies in integrated voice/data mobile networks 集成话音/数据移动网络中的守卫信道共享策略
Hung-Huan Liu
Wireless mobile multimedia networks trend to adopt micro/picocellular architectures in order to earn higher spectral efficiency and support higher data rate than that of macrocellular systems. Using small cell size architecture results in an increase of call handoffs. The guard-channel strategies are adopted to reduce the force terminating probability of handoff calls. Meanwhile, in mobile multimedia networks, guard channels are also used to guarantee the QoS of data service. However, reserving too many guard channels, on the other hand, results in bandwidth inefficiency. The number of guard channels is reduced to increase the bandwidth utilization. We proposed that parts of voice guard channels share with data traffic but the voice traffic has higher priority in an integrated voice/data mobile network. This scheme keeps the QoS of both on the voice and data service and increase the bandwidth utilization.
无线移动多媒体网络为了获得比宏蜂窝系统更高的频谱效率和支持更高的数据速率,将采用微/微蜂窝架构。使用小单元大小的架构会导致呼叫切换的增加。为了降低切换呼叫的强制终止概率,采用了保护通道策略。同时,在移动多媒体网络中,也采用了保护通道来保证数据服务的QoS。然而,另一方面,保留过多的保护通道会导致带宽效率低下。减少保护通道的数量,提高带宽利用率。我们提出部分话音保护通道与数据业务共享,但话音业务在话音/数据集成移动网络中具有更高的优先级。该方案兼顾了语音业务和数据业务的QoS,提高了带宽利用率。
{"title":"Guard channel sharing strategies in integrated voice/data mobile networks","authors":"Hung-Huan Liu","doi":"10.1109/AINA.2004.1283760","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283760","url":null,"abstract":"Wireless mobile multimedia networks trend to adopt micro/picocellular architectures in order to earn higher spectral efficiency and support higher data rate than that of macrocellular systems. Using small cell size architecture results in an increase of call handoffs. The guard-channel strategies are adopted to reduce the force terminating probability of handoff calls. Meanwhile, in mobile multimedia networks, guard channels are also used to guarantee the QoS of data service. However, reserving too many guard channels, on the other hand, results in bandwidth inefficiency. The number of guard channels is reduced to increase the bandwidth utilization. We proposed that parts of voice guard channels share with data traffic but the voice traffic has higher priority in an integrated voice/data mobile network. This scheme keeps the QoS of both on the voice and data service and increase the bandwidth utilization.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123176940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Virtual real-time 3D object sharing for supporting distance education and training 用于支持远程教育和培训的虚拟实时3D对象共享
H. Suzuki, Runhe Huang
This paper presents a virtual real-time 3D objects sharing system. There are many potential applications that include housing design, car design, and computer art design. Moreover, it can be used for supporting distance education and training of young/junior designers. This paper describes functionality and implementation of the system with underlying considerations: avoiding the bottleneck network problem and avoiding collisions of operations shared objects.
提出了一种虚拟实时三维物体共享系统。有许多潜在的应用,包括房屋设计、汽车设计和计算机艺术设计。此外,它可以用于支持远程教育和培训年轻/初级设计师。本文描述了系统的功能和实现,并考虑了避免瓶颈网络问题和避免操作共享对象的冲突。
{"title":"Virtual real-time 3D object sharing for supporting distance education and training","authors":"H. Suzuki, Runhe Huang","doi":"10.1109/AINA.2004.1283950","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283950","url":null,"abstract":"This paper presents a virtual real-time 3D objects sharing system. There are many potential applications that include housing design, car design, and computer art design. Moreover, it can be used for supporting distance education and training of young/junior designers. This paper describes functionality and implementation of the system with underlying considerations: avoiding the bottleneck network problem and avoiding collisions of operations shared objects.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1