首页 > 最新文献

18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.最新文献

英文 中文
Development and evaluation of a minutes system focusing on importance in a meeting 开发和评估会议记录系统,重点关注会议的重要性
Daishiro Hirashima, Michiru Tanaka, Y. Teshigawara
At meetings, a variety of outputs such as presentation materials, text minutes, video/audio data are generated. Both meeting participants and absentees can easily understand meeting minutes easily if these data are mutually referred and extracted important points. Therefore, focusing on participants' importance, we have proposed and developed the system that automatically produces Web pages by collecting and editing meeting data with much labor saving so as to easily understand a sequence of meeting. The importances submitted by participants are automatically collected and showed their status to participants in this system. We developed, first, prototype version 1 and then enhanced to version 2 by taking into consideration of evaluation results obtained from user feedbacks. Finally, we state evaluation results of new version, and show the validity of our developed system.
在会议上,会产生各种输出,如演示材料、文本记录、视频/音频数据。如果这些数据相互引用并提取要点,与会者和缺席者都可以很容易地理解会议记录。因此,针对与会者的重要性,我们提出并开发了通过收集和编辑会议数据来自动生成网页的系统,大大节省了人力,方便人们了解会议序列。系统会自动收集参与者提交的重要性信息,并将其状态显示给参与者。我们首先开发了原型版本1,然后根据用户反馈的评估结果进行了版本2的改进。最后,给出了新版本的评价结果,并说明了所开发系统的有效性。
{"title":"Development and evaluation of a minutes system focusing on importance in a meeting","authors":"Daishiro Hirashima, Michiru Tanaka, Y. Teshigawara","doi":"10.1109/AINA.2004.1283806","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283806","url":null,"abstract":"At meetings, a variety of outputs such as presentation materials, text minutes, video/audio data are generated. Both meeting participants and absentees can easily understand meeting minutes easily if these data are mutually referred and extracted important points. Therefore, focusing on participants' importance, we have proposed and developed the system that automatically produces Web pages by collecting and editing meeting data with much labor saving so as to easily understand a sequence of meeting. The importances submitted by participants are automatically collected and showed their status to participants in this system. We developed, first, prototype version 1 and then enhanced to version 2 by taking into consideration of evaluation results obtained from user feedbacks. Finally, we state evaluation results of new version, and show the validity of our developed system.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123054120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Public-device resource management preventing danger of exposure 公共设备资源管理,防止暴露危险
Ken'ichiro Kanehana, H. Saito, Y. Tobe
In this paper we propose a new scheme of managing resources on public devices used by private devices. Due to the advancement of wireless LAN technologies, wireless hot spots are becoming popular in the cities. In such hot spots, we can expect that public devices such as large displays and printers be available in the future as well. Assuming that these public devices are used by anonymous group of users, there are several threats of group-secret information being exposed or unintentionally left on public devices. To overcome the problems, secure management of personalization association (SAPEA) is introduced. SAPEA has two fundamental mechanisms: accessible-zone based and soft-state management of public devices. In particular, files which are the fundamental resources in SAPEA can be extinguished even when they are being used to avoid exposure to illegitimate users. In this paper we describe the design and implementation of SAPEA on Linux PCs with Bluetooth.
本文提出了一种管理私有设备使用的公共设备资源的新方案。由于无线局域网技术的进步,无线热点在城市中越来越流行。在这样的热点地区,我们可以期待大型显示器和打印机等公共设备在未来也可以使用。假设这些公共设备是由匿名用户组使用的,则存在一些组秘密信息被暴露或无意中留在公共设备上的威胁。为了克服这些问题,引入了个性化关联安全管理(SAPEA)。SAPEA有两个基本机制:基于可访问区域和公共设备的软状态管理。特别是作为SAPEA基础资源的文件,即使在使用时也可以被删除,以避免被非法用户使用。本文介绍了基于蓝牙的Linux pc机SAPEA的设计与实现。
{"title":"Public-device resource management preventing danger of exposure","authors":"Ken'ichiro Kanehana, H. Saito, Y. Tobe","doi":"10.1109/AINA.2004.1283856","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283856","url":null,"abstract":"In this paper we propose a new scheme of managing resources on public devices used by private devices. Due to the advancement of wireless LAN technologies, wireless hot spots are becoming popular in the cities. In such hot spots, we can expect that public devices such as large displays and printers be available in the future as well. Assuming that these public devices are used by anonymous group of users, there are several threats of group-secret information being exposed or unintentionally left on public devices. To overcome the problems, secure management of personalization association (SAPEA) is introduced. SAPEA has two fundamental mechanisms: accessible-zone based and soft-state management of public devices. In particular, files which are the fundamental resources in SAPEA can be extinguished even when they are being used to avoid exposure to illegitimate users. In this paper we describe the design and implementation of SAPEA on Linux PCs with Bluetooth.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131581578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure m-commerce model based on wireless local area network 基于无线局域网的安全移动商务模型
Xiaohui Li, W. Kou
The focus of this paper is on a secure mobile commerce model based on wireless local area network (WLAN). The model is investigated through the accessing procedure, the roaming management procedure, and the electronic trade procedure. To solve the security problem in the WLAN, a novel authentication method is proposed, in which the mobile node (MN) is validated twice by an access point (AP) and a mobile agent (MA), and all the devices are authenticated in a register procedure with the PKI/CA mechanism. Finally, the advantages of the model are analyzed.
本文重点研究了一种基于无线局域网的安全移动商务模型。通过接入流程、漫游管理流程和电子交易流程对该模型进行了研究。为了解决无线局域网中的安全问题,提出了一种新的无线局域网认证方法,该方法通过接入点(AP)和移动代理(MA)对移动节点(MN)进行两次认证,并使用PKI/CA机制在注册过程中对所有设备进行认证。最后,分析了该模型的优点。
{"title":"A secure m-commerce model based on wireless local area network","authors":"Xiaohui Li, W. Kou","doi":"10.1109/AINA.2004.1283857","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283857","url":null,"abstract":"The focus of this paper is on a secure mobile commerce model based on wireless local area network (WLAN). The model is investigated through the accessing procedure, the roaming management procedure, and the electronic trade procedure. To solve the security problem in the WLAN, a novel authentication method is proposed, in which the mobile node (MN) is validated twice by an access point (AP) and a mobile agent (MA), and all the devices are authenticated in a register procedure with the PKI/CA mechanism. Finally, the advantages of the model are analyzed.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"20 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A small IP forwarding table using hashing 一个使用哈希的小IP转发表
Yeim-Kuan Chang, Wen-Hsin Cheng
As the demand for high bandwidth on the Internet increases, it is required to build next generation routers with the capability of forwarding multiple millions of packets per second. Reducing the required memory size of the forwarding table is a possible solution since small forward table can be integrated into the application specific integrated circuit (ASIC). In this paper a hash technique is developed to make the IP forwarding table as small as possible. The experiments show that the required memory size of the proposed scheme is smaller than other existing schemes for a large routing table.
随着互联网对高带宽需求的增加,需要构建每秒转发数百万数据包的下一代路由器。减小转发表所需的内存大小是一种可能的解决方案,因为小的转发表可以集成到专用集成电路(ASIC)中。本文提出了一种使IP转发表尽可能小的哈希技术。实验结果表明,对于大型路由表,该方案所需的内存比现有方案要小。
{"title":"A small IP forwarding table using hashing","authors":"Yeim-Kuan Chang, Wen-Hsin Cheng","doi":"10.1109/AINA.2004.1283956","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283956","url":null,"abstract":"As the demand for high bandwidth on the Internet increases, it is required to build next generation routers with the capability of forwarding multiple millions of packets per second. Reducing the required memory size of the forwarding table is a possible solution since small forward table can be integrated into the application specific integrated circuit (ASIC). In this paper a hash technique is developed to make the IP forwarding table as small as possible. The experiments show that the required memory size of the proposed scheme is smaller than other existing schemes for a large routing table.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"691 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122981575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed replication and caching: a mechanism for architecting responsive Web services 分布式复制和缓存:用于构建响应式Web服务的机制
V. Wietrzyk, R. Lawson, R. Schmid, Vijay K. Khandelwal, M. Takizawa, T. Enokido
The focus is on the mechanism that supports the provision of the adequate service level by relying on Web system architecture with multinode clustering. Replication of Web documents can improve both performance and reliability of the Web service. Server selection algorithms allow Web clients to select one of the replicated servers which is "close " to them and thereby minimize the response time of the Web service.
重点是通过依赖具有多节点集群的Web系统体系结构来支持提供适当服务级别的机制。Web文档的复制可以提高Web服务的性能和可靠性。服务器选择算法允许Web客户机选择与它们“接近”的复制服务器之一,从而最小化Web服务的响应时间。
{"title":"Distributed replication and caching: a mechanism for architecting responsive Web services","authors":"V. Wietrzyk, R. Lawson, R. Schmid, Vijay K. Khandelwal, M. Takizawa, T. Enokido","doi":"10.1109/AINA.2004.1283805","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283805","url":null,"abstract":"The focus is on the mechanism that supports the provision of the adequate service level by relying on Web system architecture with multinode clustering. Replication of Web documents can improve both performance and reliability of the Web service. Server selection algorithms allow Web clients to select one of the replicated servers which is \"close \" to them and thereby minimize the response time of the Web service.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bandwidth efficiency of an image compression method for information hiding 一种用于信息隐藏的图像压缩方法的带宽效率
Chinchen Chang, T. Lu, Yi-Long Liu
In order to improve the compression rate of vector quantization (VQ) during compression, a re-encoding scheme, called spiral scan re-encoding (SSR), was designed to compact the indices in VQ. Based on the SSR scheme, we propose a novel lossless hiding scheme, called IHSSR. When the scheme is used, information is hidden in the compression code for increasing the bandwidth efficiency of the compressed code. The IHSSR system was developed to test the performance of the IHSSR scheme. According to the experimental results, the IHSSR system can efficiently hide secret information in the compression code of indices without modifying its content. The decoding process can obtain the hidden secret information and the indices. Only a small number of extra bits are needed to record the corresponding information.
为了提高矢量量化(VQ)在压缩过程中的压缩率,设计了一种螺旋扫描重编码(SSR)方案来压缩矢量量化(VQ)中的指标。在此基础上,提出了一种新的无损隐藏方案——IHSSR。该方案将信息隐藏在压缩码中,提高了压缩码的带宽效率。为了测试IHSSR方案的性能,开发了IHSSR系统。实验结果表明,该系统可以在不修改索引压缩码内容的情况下,有效地隐藏索引压缩码中的秘密信息。解码过程可以获得隐藏的秘密信息和索引。只需要少量额外的比特来记录相应的信息。
{"title":"Bandwidth efficiency of an image compression method for information hiding","authors":"Chinchen Chang, T. Lu, Yi-Long Liu","doi":"10.1109/AINA.2004.1283947","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283947","url":null,"abstract":"In order to improve the compression rate of vector quantization (VQ) during compression, a re-encoding scheme, called spiral scan re-encoding (SSR), was designed to compact the indices in VQ. Based on the SSR scheme, we propose a novel lossless hiding scheme, called IHSSR. When the scheme is used, information is hidden in the compression code for increasing the bandwidth efficiency of the compressed code. The IHSSR system was developed to test the performance of the IHSSR scheme. According to the experimental results, the IHSSR system can efficiently hide secret information in the compression code of indices without modifying its content. The decoding process can obtain the hidden secret information and the indices. Only a small number of extra bits are needed to record the corresponding information.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A graph-based methodology for analyzing IP spoofing attack 基于图的IP欺骗攻击分析方法
Voravud Santiraveewan, Y. Permpoontanalarp
Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to ensure the protections is a difficult task. The main reason is the lack of methodology to analyze the security of firewall configurations. IP spoofing attack is an attack in which an attacker can impersonate another person towards a victim. We propose a new methodology for verifying the vulnerability of firewall configurations to IP spoofing attack and for synthesizing IP spoofing-free configurations. Our methodology is based on graph theory, which provides a simple and intuitive approach to the vulnerability analysis of the attack.
防火墙为私有网络提供针对内部和外部攻击的保护。然而,配置防火墙以确保保护是一项艰巨的任务。主要原因是缺乏分析防火墙配置安全性的方法。IP欺骗攻击是攻击者冒充他人攻击受害者的一种攻击。我们提出了一种新的方法来验证防火墙配置对IP欺骗攻击的脆弱性,以及合成无IP欺骗配置。我们的方法基于图论,它为攻击的漏洞分析提供了一种简单直观的方法。
{"title":"A graph-based methodology for analyzing IP spoofing attack","authors":"Voravud Santiraveewan, Y. Permpoontanalarp","doi":"10.1109/AINA.2004.1283792","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283792","url":null,"abstract":"Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to ensure the protections is a difficult task. The main reason is the lack of methodology to analyze the security of firewall configurations. IP spoofing attack is an attack in which an attacker can impersonate another person towards a victim. We propose a new methodology for verifying the vulnerability of firewall configurations to IP spoofing attack and for synthesizing IP spoofing-free configurations. Our methodology is based on graph theory, which provides a simple and intuitive approach to the vulnerability analysis of the attack.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Delay-differentiable fair queueing (D/sup 2/FQ): a low complexity scheduling algorithm for packet-switched networks 延迟可微公平排队(D/sup 2/FQ):一种用于分组交换网络的低复杂度调度算法
M. Yan, C. K. Li
In a packet-switched network, latency is unavoidable and its characteristic always depends on the type of traffic flows and operating conditions. These affect the kind of services that the network can support as well as the quality of service (QoS) that the system can provide. Providing a fair service for users is always the main concern for operators as well as service providers. A fair delay-differentiable queueing algorithm with QoS support called Delay-Differentiable Fair Queueing (D/sup 2/FQ) is proposed. In the proposed algorithm, an additional delay-slot is used to re-order the departure order of flows according to its delay weight. D/sup 2/FQ can also protect the honest flows in delay and throughput when a node is attacked by defense of service (DoS) and the overall computation of the proposed D/sup 2/FQ is shown to be O(1). Algorithm analysis and simulation results are presented and the performance of D/sup 2/FQ is evaluated.
在分组交换网络中,延迟是不可避免的,其特征总是取决于业务流的类型和操作条件。这些会影响网络所能支持的服务种类以及系统所能提供的服务质量(QoS)。为用户提供公平的服务一直是运营商和服务提供商关注的主要问题。提出了一种支持QoS的公平可延迟可微排队算法D/sup 2/FQ。在该算法中,增加了一个延迟槽,根据延迟权值对流的出发顺序进行重新排序。当节点受到DoS攻击时,D/sup 2/FQ在延迟和吞吐量上也能保护诚实流,所提出的D/sup 2/FQ的总计算量为0(1)。给出了算法分析和仿真结果,评价了D/sup 2/FQ的性能。
{"title":"Delay-differentiable fair queueing (D/sup 2/FQ): a low complexity scheduling algorithm for packet-switched networks","authors":"M. Yan, C. K. Li","doi":"10.1109/AINA.2004.1283896","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283896","url":null,"abstract":"In a packet-switched network, latency is unavoidable and its characteristic always depends on the type of traffic flows and operating conditions. These affect the kind of services that the network can support as well as the quality of service (QoS) that the system can provide. Providing a fair service for users is always the main concern for operators as well as service providers. A fair delay-differentiable queueing algorithm with QoS support called Delay-Differentiable Fair Queueing (D/sup 2/FQ) is proposed. In the proposed algorithm, an additional delay-slot is used to re-order the departure order of flows according to its delay weight. D/sup 2/FQ can also protect the honest flows in delay and throughput when a node is attacked by defense of service (DoS) and the overall computation of the proposed D/sup 2/FQ is shown to be O(1). Algorithm analysis and simulation results are presented and the performance of D/sup 2/FQ is evaluated.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PrecePt: a privacy-enhancing license management protocol for digital rights management 规则:用于数字版权管理的增强隐私的许可管理协议
Bok-Nyong Park, Jae-Won Kim, Wonjun Lee
One of the major issues raised by digital rights management (DRM) systems concerns the protection of the user's privacy and anonymous consumption of content. However, most existing DRM systems do not support the protection of each user's personal information. This paper suggests a privacy-enhancing license management protocol, named PrecePt (privacy-enhancing license management protocol), which is a more powerful protocol to protect personal information in DRM. To protect the exposure of user identifier, this protocol uses temporary ID and token to guarantee anonymity. The proposed scheme also uses a session key form ECDH cryptography and public-key so that it can protect the revelation of personal information and user privacy.
数字版权管理(DRM)系统提出的主要问题之一涉及用户隐私的保护和内容的匿名消费。但是,大多数现有的DRM系统不支持对每个用户的个人信息进行保护。本文提出了一种隐私增强许可管理协议,命名为PrecePt (privacy- enhanced license management protocol,隐私增强许可管理协议),它是一种在DRM中对个人信息进行更强大保护的协议。为了保护用户标识符的暴露,该协议使用临时ID和令牌来保证匿名性。该方案还使用了ECDH加密形式的会话密钥和公钥,以保护个人信息的泄露和用户隐私。
{"title":"PrecePt: a privacy-enhancing license management protocol for digital rights management","authors":"Bok-Nyong Park, Jae-Won Kim, Wonjun Lee","doi":"10.1109/AINA.2004.1283971","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283971","url":null,"abstract":"One of the major issues raised by digital rights management (DRM) systems concerns the protection of the user's privacy and anonymous consumption of content. However, most existing DRM systems do not support the protection of each user's personal information. This paper suggests a privacy-enhancing license management protocol, named PrecePt (privacy-enhancing license management protocol), which is a more powerful protocol to protect personal information in DRM. To protect the exposure of user identifier, this protocol uses temporary ID and token to guarantee anonymity. The proposed scheme also uses a session key form ECDH cryptography and public-key so that it can protect the revelation of personal information and user privacy.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117353519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
RED with optimized dynamic threshold deployment on shared buffer RED在共享缓冲区上优化了动态阈值部署
Chengchen Hu, B. Liu
Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, our goal is to deploy the Random Early Detection (RED) algorithm in routers on shared buffer and solve these problems. A novel buffer management scheme that dynamically adjusts the parameters of RED named RED-ODT is proposed. Simulations under uniform traffic load and nonuniform traffic load are given, the results of which ascertain and demonstrate the superiority of the proposed scheme in terms of low packet drop ratio, satisfying buffer utilization and fairness. Simulation also shows that RED-ODT is insensitive to congestion level.
以往的研究表明,RED算法在共享缓冲区的多队列系统上的部署存在不公平的问题,并且通过静态设置参数对拥塞程度敏感。在本文中,我们的目标是在共享缓冲区上的路由器上部署随机早期检测(RED)算法并解决这些问题。提出了一种动态调整RED参数的缓冲区管理方案RED- odt。给出了均匀流量负载和非均匀流量负载下的仿真结果,验证了该方案在低丢包率、满足缓冲区利用率和公平性方面的优越性。仿真还表明,RED-ODT对拥塞程度不敏感。
{"title":"RED with optimized dynamic threshold deployment on shared buffer","authors":"Chengchen Hu, B. Liu","doi":"10.1109/AINA.2004.1283842","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283842","url":null,"abstract":"Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, our goal is to deploy the Random Early Detection (RED) algorithm in routers on shared buffer and solve these problems. A novel buffer management scheme that dynamically adjusts the parameters of RED named RED-ODT is proposed. Simulations under uniform traffic load and nonuniform traffic load are given, the results of which ascertain and demonstrate the superiority of the proposed scheme in terms of low packet drop ratio, satisfying buffer utilization and fairness. Simulation also shows that RED-ODT is insensitive to congestion level.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115693266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1