首页 > 最新文献

2011 Third International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Node Degree-Aware Link Cost for Traffic Load-Distribution in Large-Scale Networks 大规模网络中节点度感知的流量负载分配链路代价
H. Tamura, M. Köppen, M. Uchida, M. Tsuru, Y. Oie
Traffic Engineering (TE) is required for reducing highly-loaded links / nodes in parts of a network, thereby distributing the traffic load in the network. For efficient use of network resources, it is important to efficiently map traffic demands to network resources. Therefore, we should consider an appropriate definition of ``distance'' in networks with the topological features of the network instead of traffic demands. Recent studies have demonstrated a scale-free property of network topology, and node outbound degree distribution is an important factor in the scale-free networks. This paper proposes a new definition of "distance" between two arbitrary communication nodes in the Internet by using node degree information for avoiding congestion in the network. Some simulation results show that the proposed scheme can distribute traffic load from high degree nodes to other nodes, and thus provides robustness of networks.
TE (Traffic Engineering)是一种减少网络中部分高负载链路/节点的技术,从而分散网络中的流量负荷。为了有效地利用网络资源,将流量需求有效地映射到网络资源是非常重要的。因此,我们应该根据网络的拓扑特征而不是流量需求来考虑网络中“距离”的适当定义。近年来的研究表明网络拓扑具有无标度特性,节点出站度分布是影响无标度网络的重要因素。为了避免网络拥塞,本文利用节点度信息,提出了互联网中任意两个通信节点之间的距离的新定义。仿真结果表明,该方案可以将高节点的流量负载分散到其他节点,从而提高了网络的鲁棒性。
{"title":"Node Degree-Aware Link Cost for Traffic Load-Distribution in Large-Scale Networks","authors":"H. Tamura, M. Köppen, M. Uchida, M. Tsuru, Y. Oie","doi":"10.1109/INCoS.2011.126","DOIUrl":"https://doi.org/10.1109/INCoS.2011.126","url":null,"abstract":"Traffic Engineering (TE) is required for reducing highly-loaded links / nodes in parts of a network, thereby distributing the traffic load in the network. For efficient use of network resources, it is important to efficiently map traffic demands to network resources. Therefore, we should consider an appropriate definition of ``distance'' in networks with the topological features of the network instead of traffic demands. Recent studies have demonstrated a scale-free property of network topology, and node outbound degree distribution is an important factor in the scale-free networks. This paper proposes a new definition of \"distance\" between two arbitrary communication nodes in the Internet by using node degree information for avoiding congestion in the network. Some simulation results show that the proposed scheme can distribute traffic load from high degree nodes to other nodes, and thus provides robustness of networks.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposal of an Evolutional Architecture for Metabolic Computing 一种用于代谢计算的进化架构的提出
M. Uehara
In our previous paper, we proposed metabolic computing model in order to realize sustainable information system. We think that metabolic computing model has high fault tolerance and sustainability. We also proposed a realistic architecture of metabolic computing model. Metaboloid is a processing unit in this architecture. A set of metaboloids is organized as mesh connected NORMA. However, in simple metabolism, the specification of architecture is not changed. So, even if manufacturing technology of hardware is innovative, the performance will not be improved. In this paper, we propose an evolutional architecture for metabolic computing model. In this architecture, if the specification is portable and if the difference between specifications is only 1, a set of metaboloids of which specification is different can work together.
为了实现可持续的信息系统,我们在之前的文章中提出了代谢计算模型。我们认为代谢计算模型具有较高的容错性和可持续性。我们还提出了一个现实的代谢计算模型架构。代谢物是这个体系结构中的一个处理单元。一组代谢物被组织成网状连接的NORMA。然而,在简单的新陈代谢中,架构的规范没有改变。因此,即使硬件的制造技术是创新的,性能也不会得到提高。在本文中,我们提出了一个代谢计算模型的进化架构。在此体系结构中,如果规范是可移植的,并且规范之间的差异仅为1,则不同规范的一组代谢物可以一起工作。
{"title":"Proposal of an Evolutional Architecture for Metabolic Computing","authors":"M. Uehara","doi":"10.1109/INCoS.2011.138","DOIUrl":"https://doi.org/10.1109/INCoS.2011.138","url":null,"abstract":"In our previous paper, we proposed metabolic computing model in order to realize sustainable information system. We think that metabolic computing model has high fault tolerance and sustainability. We also proposed a realistic architecture of metabolic computing model. Metaboloid is a processing unit in this architecture. A set of metaboloids is organized as mesh connected NORMA. However, in simple metabolism, the specification of architecture is not changed. So, even if manufacturing technology of hardware is innovative, the performance will not be improved. In this paper, we propose an evolutional architecture for metabolic computing model. In this architecture, if the specification is portable and if the difference between specifications is only 1, a set of metaboloids of which specification is different can work together.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131486672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A perfSONAR-based Integrated Multi-domain Network Measurement Platform -- Internet Monitoring as a Service 基于personsonar的集成多域网络测量平台——互联网监测即服务
Katsuichi Nakamura, M. Tsuru, Y. Oie
The scale, diversity, and decentralized administration of the Internet mean that to continuously acquire the global status of the network and to timely identify the causes of communication performance degradation is reasonably difficult. However, emerging advanced network applications, which are often sensitive to communication quality and bandwidth consumption, as well as increasing security threats, strongly require a higher quality of network measurement and analysis in terms of granularity (spatial and temporal), timeliness, continuity, coverage, and reliability. Integrating multiple-location, diverse-type, and long-term measurements has been considered a key means for coping with such difficulties. In addition, the measured data and analyzed results should be flexibly shared and reused for efficiency. Therefore, a multi-domain network measurement platform should be realized, as it can provide integrated network monitoring and analysis functionality over the Internet on demand and can adapt to the purposes of the individual users (applications) and operators. In this paper, we thus briefly introduce the design principles and software implementation for a perfSONAR-based integrated network measurement system aiming at gInternet Monitoring As aServiceh, together with a preliminary experiment using a prototype system on the Internet. With help of a function we newly designed and developed, our system can easily utilize new measurement tools and flexibly integrate and provide the measurement results of those tools to users.
Internet的规模、多样性和分散管理意味着持续获取网络的全局状态并及时识别通信性能下降的原因是相当困难的。然而,新兴的高级网络应用通常对通信质量和带宽消耗以及日益增加的安全威胁非常敏感,因此在粒度(空间和时间)、及时性、连续性、覆盖范围和可靠性方面强烈要求更高质量的网络测量和分析。整合多地点、多类型、长期的测量被认为是应对这些困难的关键手段。此外,测量数据和分析结果应灵活共享和重用,以提高效率。因此,需要实现一个多域网络测量平台,它能够在互联网上按需提供综合的网络监控和分析功能,能够适应个体用户(应用)和运营商的目的。因此,本文简要介绍了一种基于personsonar的“互联网监测即服务”综合网络测量系统的设计原理和软件实现,并在互联网上使用原型系统进行了初步实验。通过新设计和开发的功能,本系统可以方便地使用新的测量工具,并灵活地将这些工具的测量结果集成并提供给用户。
{"title":"A perfSONAR-based Integrated Multi-domain Network Measurement Platform -- Internet Monitoring as a Service","authors":"Katsuichi Nakamura, M. Tsuru, Y. Oie","doi":"10.1109/INCoS.2011.1","DOIUrl":"https://doi.org/10.1109/INCoS.2011.1","url":null,"abstract":"The scale, diversity, and decentralized administration of the Internet mean that to continuously acquire the global status of the network and to timely identify the causes of communication performance degradation is reasonably difficult. However, emerging advanced network applications, which are often sensitive to communication quality and bandwidth consumption, as well as increasing security threats, strongly require a higher quality of network measurement and analysis in terms of granularity (spatial and temporal), timeliness, continuity, coverage, and reliability. Integrating multiple-location, diverse-type, and long-term measurements has been considered a key means for coping with such difficulties. In addition, the measured data and analyzed results should be flexibly shared and reused for efficiency. Therefore, a multi-domain network measurement platform should be realized, as it can provide integrated network monitoring and analysis functionality over the Internet on demand and can adapt to the purposes of the individual users (applications) and operators. In this paper, we thus briefly introduce the design principles and software implementation for a perfSONAR-based integrated network measurement system aiming at gInternet Monitoring As aServiceh, together with a preliminary experiment using a prototype system on the Internet. With help of a function we newly designed and developed, our system can easily utilize new measurement tools and flexibly integrate and provide the measurement results of those tools to users.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges in Automating Collaborative Negotiations 自动化协作谈判的挑战
Raiye Hailu, Takayuki Ito
In this paper we describe the challenges involved in automating collaborative negotiations and propose solution idea that can reduce computational cost of deal identification. We consider negotiations over a matter that has multiple issues and each issue can take any one of the multiple possible values for that issue. Two challenges are discussed in detail. The first one is the difficulty of assigning utility value ( i.e. evaluating) each possible contract in large contract spaces. The second is the computational complexity of locating the optimal contract. Previous work proposed grouping contracts to avoid evaluating each contract and a mediated bidding based deal identification algorithm to reduce the search for the optimal contract. However, the computational cost of exhaustively matching bids from agents grows exponentially with the number of agents and bids. We propose a rule that can be used during grouping of contracts (defining constraints) that reduces the number of possible bids from agents and hence increases the number of agents that could participate in the negotiation. We assume that each constraint corresponds to one evaluation criterion. The rule states that when evaluating contracts by a criterion, only contracts that satisfied previous contracts are considered.
在本文中,我们描述了自动化协作谈判所涉及的挑战,并提出了可以降低交易识别计算成本的解决方案。我们考虑就一个有多个问题的问题进行谈判,每个问题都可以采用该问题的多个可能值中的任何一个。详细讨论了两个挑战。第一个是在大合同空间中分配效用价值(即评估)每个可能的合同的困难。二是定位最优契约的计算复杂度。先前的工作提出了分组契约以避免对每个契约进行评估,并提出了基于中介投标的交易识别算法以减少对最优契约的搜索。然而,代理之间的完全匹配出价的计算成本随着代理和出价的数量呈指数增长。我们提出了一个可以在合同分组(定义约束)期间使用的规则,该规则减少了代理可能的投标数量,从而增加了可以参与谈判的代理数量。我们假设每个约束对应一个评价标准。该规则规定,当按标准评估合同时,只考虑满足先前合同的合同。
{"title":"Challenges in Automating Collaborative Negotiations","authors":"Raiye Hailu, Takayuki Ito","doi":"10.1109/INCoS.2011.61","DOIUrl":"https://doi.org/10.1109/INCoS.2011.61","url":null,"abstract":"In this paper we describe the challenges involved in automating collaborative negotiations and propose solution idea that can reduce computational cost of deal identification. We consider negotiations over a matter that has multiple issues and each issue can take any one of the multiple possible values for that issue. Two challenges are discussed in detail. The first one is the difficulty of assigning utility value ( i.e. evaluating) each possible contract in large contract spaces. The second is the computational complexity of locating the optimal contract. Previous work proposed grouping contracts to avoid evaluating each contract and a mediated bidding based deal identification algorithm to reduce the search for the optimal contract. However, the computational cost of exhaustively matching bids from agents grows exponentially with the number of agents and bids. We propose a rule that can be used during grouping of contracts (defining constraints) that reduces the number of possible bids from agents and hence increases the number of agents that could participate in the negotiation. We assume that each constraint corresponds to one evaluation criterion. The rule states that when evaluating contracts by a criterion, only contracts that satisfied previous contracts are considered.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131961244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electric Field Intensity Computed by DRTM in Relation to the Number of Plate Observation Points and Frequency DRTM计算的电场强度与平板观测点数和频率的关系
M. Takematsu, J. Honda, K. Uchida
After achieving the goal of TV digitalization, having an experience of the great earthquake, the government is promoting development and enhancement of the disaster prevention communication network across the nation. The field estimations is significantly important to design high-performance radio communication networks such as fire and disaster prevention wireless communication network. We have developed and proposed the discrete ray tracing method (DRTM) to compute electric field distributions along the land surface structure. We discuss on the discretization of the terrain surface, dividing by observation plate length, the equal interval size of linear piece wise strips. And we consider the alternative plate length for the shape of the surface, for example, short length is only for the mountain summit and long length is for the other. That enables us to reduce more computation time, adjusting the observation point length, keeping an accuracy of calculated output data.
在实现电视数字化的目标后,经历了大地震,政府正在推动全国防灾通信网络的发展和加强。现场估计对设计防火、防灾等高性能无线通信网具有重要意义。我们发展并提出了离散射线追踪法(DRTM)来计算沿地表结构的电场分布。我们讨论了地形表面的离散化问题,即按观测板长度除以线性条形条的等距大小。我们考虑了表面形状的可选板块长度,例如,短长度只适用于山顶,长长度适用于其他地方。这使我们能够减少更多的计算时间,调整观测点长度,保持计算输出数据的准确性。
{"title":"Electric Field Intensity Computed by DRTM in Relation to the Number of Plate Observation Points and Frequency","authors":"M. Takematsu, J. Honda, K. Uchida","doi":"10.1109/INCoS.2011.81","DOIUrl":"https://doi.org/10.1109/INCoS.2011.81","url":null,"abstract":"After achieving the goal of TV digitalization, having an experience of the great earthquake, the government is promoting development and enhancement of the disaster prevention communication network across the nation. The field estimations is significantly important to design high-performance radio communication networks such as fire and disaster prevention wireless communication network. We have developed and proposed the discrete ray tracing method (DRTM) to compute electric field distributions along the land surface structure. We discuss on the discretization of the terrain surface, dividing by observation plate length, the equal interval size of linear piece wise strips. And we consider the alternative plate length for the shape of the surface, for example, short length is only for the mountain summit and long length is for the other. That enables us to reduce more computation time, adjusting the observation point length, keeping an accuracy of calculated output data.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128212516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Fish School Algorithm for Improving Turnaround Time: An Experience of Content Retrieval 探索改善周转时间的鱼群算法:一种内容检索的经验
S. Banerjee, S. Caballé
In distributed e-learning paradigm, learning pedagogy demands different content retrieval methodologies after reaching certain boundary of learning. Hence, the learners are expected, to retrieve the contents and they need to improvise at substantially faster rate. The overall learning process converges into a finite time usage and they will return to the same point of access point. The present paper proposes an innovative fish school algorithm to minimize the turnaround time of content retrieval of learner so as to improve learning efficiency. The deployment of fish school contemplates either Prey (the fish perceives the concentration of food in water to determine the movement by vision or sense and then chooses the tendency) swarm ( the fish will assemble in groups naturally in the moving process, which is a kind of living habits in order to guarantee the existence of the colony and avoid dangers) or Follow(in the moving process of the fish swarm, when a single fish or several fish find food, the neighborhood partners will trail and reach the food quickly). In the present problem of content retrieval, these verticals of Fish school are referred to quantify the symbol definition, constraint strategy and stopping criteria for improving turnaround time for the content. The Fish school has the better iterative potential over the other conventional derivative free optimization techniques e.g. Particle Swarm Optimization and Ant Colony Algorithm, and moreover the proposed algorithm can be well interfaced with web portal of e-learning content retrieval. Couples of characteristic results have been included to support the anomalies as the improvement of turnaround time.
在分布式电子学习范式中,学习教学法在达到一定的学习边界后,需要不同的内容检索方法。因此,学习者需要检索内容,他们需要以更快的速度即兴创作。整个学习过程收敛到一个有限的时间使用,他们将返回到同一个接入点点。本文提出了一种创新的鱼群算法,以最小化学习器内容检索的周转时间,从而提高学习效率。鱼群的部署既考虑了Prey(鱼通过视觉或感官感知水中食物的集中程度来确定运动方向,然后选择运动趋势)swarm(鱼在运动过程中会自然地聚集在一起,这是一种生存习惯,以保证群体的存在,避免危险),也考虑了Follow(在鱼群运动过程中,当一条鱼或几条鱼找到食物时)。邻居的同伴会尾随而去,很快找到食物)。在当前的内容检索问题中,参考Fish学派的这些垂直方向,量化符号定义、约束策略和停止标准,以提高内容的周转时间。Fish学派算法比粒子群算法和蚁群算法等传统的无导数优化算法具有更好的迭代潜力,而且该算法可以很好地与网络学习内容检索门户接口。包括了一对特征结果来支持异常,以改善周转时间。
{"title":"Exploring Fish School Algorithm for Improving Turnaround Time: An Experience of Content Retrieval","authors":"S. Banerjee, S. Caballé","doi":"10.1109/INCOS.2011.89","DOIUrl":"https://doi.org/10.1109/INCOS.2011.89","url":null,"abstract":"In distributed e-learning paradigm, learning pedagogy demands different content retrieval methodologies after reaching certain boundary of learning. Hence, the learners are expected, to retrieve the contents and they need to improvise at substantially faster rate. The overall learning process converges into a finite time usage and they will return to the same point of access point. The present paper proposes an innovative fish school algorithm to minimize the turnaround time of content retrieval of learner so as to improve learning efficiency. The deployment of fish school contemplates either Prey (the fish perceives the concentration of food in water to determine the movement by vision or sense and then chooses the tendency) swarm ( the fish will assemble in groups naturally in the moving process, which is a kind of living habits in order to guarantee the existence of the colony and avoid dangers) or Follow(in the moving process of the fish swarm, when a single fish or several fish find food, the neighborhood partners will trail and reach the food quickly). In the present problem of content retrieval, these verticals of Fish school are referred to quantify the symbol definition, constraint strategy and stopping criteria for improving turnaround time for the content. The Fish school has the better iterative potential over the other conventional derivative free optimization techniques e.g. Particle Swarm Optimization and Ant Colony Algorithm, and moreover the proposed algorithm can be well interfaced with web portal of e-learning content retrieval. Couples of characteristic results have been included to support the anomalies as the improvement of turnaround time.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130453837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance of a Stable Unit Active Queue Management 稳定单元主动队列管理的性能
Fumihiko Nakamura, T. Nakashima
The purpose of this research is to design a new queue management algorithm effectively controlling for all kinds of traffics. Among active queue managements (AQM), Random Early Detection (RED), has been widely used to improve the TCP throughput. AQM such as the RED can sustain the small delay and jitter performance, even if RED generates the retransmission packets. In this paper, we proposed the Stable time RED (ST-RED) to improve the delay and jitter performance without degradation of throughput and good putt performances. ST-RED enables to stabilize the calculation timing for average queue length leading to suppress the queue fluctuations. We also implemented the ST-RED mechanism on the ns-2 simulator. As the results of simulation, we extracted the following features. Firstly, RED improves the delay performance without the degradation of throughput and good put performances for all different alphas of the Pareto distribution. Secondly, ST-RED with 0.5 msec time interval improves the delay and jitter performances compared to the RED.
本研究的目的是设计一种新的队列管理算法,有效地控制各种交通流量。在主动队列管理(AQM)中,随机早期检测(RED)被广泛用于提高TCP吞吐量。即使RED生成重传数据包,RED等AQM也可以维持较小的延迟和抖动性能。在本文中,我们提出了稳定时间RED (ST-RED)来改善延迟和抖动性能,而不会降低吞吐量和良好的推杆性能。ST-RED可以稳定平均队列长度的计算时间,从而抑制队列波动。我们还在ns-2模拟器上实现了ST-RED机制。作为仿真结果,我们提取了以下特征。首先,RED在不降低吞吐量的情况下提高了延迟性能,并且对于Pareto分布的所有不同alpha都具有良好的放置性能。其次,ST-RED的时间间隔为0.5 msec,与RED相比,延迟和抖动性能得到了改善。
{"title":"Performance of a Stable Unit Active Queue Management","authors":"Fumihiko Nakamura, T. Nakashima","doi":"10.1109/INCoS.2011.137","DOIUrl":"https://doi.org/10.1109/INCoS.2011.137","url":null,"abstract":"The purpose of this research is to design a new queue management algorithm effectively controlling for all kinds of traffics. Among active queue managements (AQM), Random Early Detection (RED), has been widely used to improve the TCP throughput. AQM such as the RED can sustain the small delay and jitter performance, even if RED generates the retransmission packets. In this paper, we proposed the Stable time RED (ST-RED) to improve the delay and jitter performance without degradation of throughput and good putt performances. ST-RED enables to stabilize the calculation timing for average queue length leading to suppress the queue fluctuations. We also implemented the ST-RED mechanism on the ns-2 simulator. As the results of simulation, we extracted the following features. Firstly, RED improves the delay performance without the degradation of throughput and good put performances for all different alphas of the Pareto distribution. Secondly, ST-RED with 0.5 msec time interval improves the delay and jitter performances compared to the RED.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132013931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of Power Saving Scheme for Wireless LAN with Station Aggregation 具有站点聚合的无线局域网节能方案的性能评价
Daiki Nobayashi, K. Kumazoe, Y. Fukuda, T. Ikenaga, Tetsuya Ito
The widespread deployment of wireless LANs (WLANs) has increased the importance of developing power-saving technologies. We have been involved in the research and development of Radio-On-Demand Networks (ROD) that reduce energy consumption in the operation of WLANs. In this paper, we evaluate the effectiveness of a power-saving scheme with that uses station aggregation for ROD WLANs by simulations. The simulation results show that our proposed scheme can contribute in reducing the power consumption of access points (APs).
无线局域网(wlan)的广泛部署增加了开发节能技术的重要性。我们参与了无线点播网络(ROD)的研究和开发,以减少无线局域网运行中的能耗。在本文中,我们通过仿真评估了一种基于站点聚合的无线局域网节能方案的有效性。仿真结果表明,该方案能够有效降低接入点的功耗。
{"title":"Performance Evaluation of Power Saving Scheme for Wireless LAN with Station Aggregation","authors":"Daiki Nobayashi, K. Kumazoe, Y. Fukuda, T. Ikenaga, Tetsuya Ito","doi":"10.1109/INCoS.2011.134","DOIUrl":"https://doi.org/10.1109/INCoS.2011.134","url":null,"abstract":"The widespread deployment of wireless LANs (WLANs) has increased the importance of developing power-saving technologies. We have been involved in the research and development of Radio-On-Demand Networks (ROD) that reduce energy consumption in the operation of WLANs. In this paper, we evaluate the effectiveness of a power-saving scheme with that uses station aggregation for ROD WLANs by simulations. The simulation results show that our proposed scheme can contribute in reducing the power consumption of access points (APs).","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116796694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Detecting Suspicious Insiders by Triggering Digital Data Sealing 通过触发数字数据密封来检测可疑内部人员
Takayuki Sasaki
Insider threats, such as information leakages, are big problems in many organizations. They are difficult to detect and control, because insiders such as employees have legitimate rights to access the organization's resources in order to carry out their responsibilities. For this reason, existing security systems such as firewalls, intrusion detection systems, and access control mechanisms are ineffective countermeasures. Therefore, a framework is being developed for detecting suspicious insiders by triggering monitoring and analysis of suspicious actions done to hide digital evidence. This framework first creates an event (called a "trigger") that will impel malicious members to behave suspiciously, for example, deleting digital data that may be evidence of their malicious behavior. In addition, the framework also monitors and analyzes actions by comparing operational logs before/after the trigger. This work is still in progress. Here, a system architecture based on the detection framework and cases in which it is used are described. Also, the effectiveness and the limitations of the proposed framework are discussed.
内部威胁,如信息泄露,是许多组织面临的大问题。它们很难被发现和控制,因为员工等内部人员有合法的权利访问组织的资源,以履行他们的职责。因此,现有的安全系统,如防火墙、入侵检测系统和访问控制机制等都是无效的对策。因此,正在开发一个框架,通过触发对隐藏数字证据的可疑行为的监控和分析来检测可疑的内部人员。该框架首先创建一个事件(称为“触发器”),该事件将促使恶意成员采取可疑行为,例如,删除可能作为其恶意行为证据的数字数据。此外,该框架还通过比较触发前后的操作日志来监视和分析操作。这项工作仍在进行中。在这里,描述了基于检测框架的系统架构和使用它的案例。此外,本文还讨论了该框架的有效性和局限性。
{"title":"Towards Detecting Suspicious Insiders by Triggering Digital Data Sealing","authors":"Takayuki Sasaki","doi":"10.1109/INCoS.2011.157","DOIUrl":"https://doi.org/10.1109/INCoS.2011.157","url":null,"abstract":"Insider threats, such as information leakages, are big problems in many organizations. They are difficult to detect and control, because insiders such as employees have legitimate rights to access the organization's resources in order to carry out their responsibilities. For this reason, existing security systems such as firewalls, intrusion detection systems, and access control mechanisms are ineffective countermeasures. Therefore, a framework is being developed for detecting suspicious insiders by triggering monitoring and analysis of suspicious actions done to hide digital evidence. This framework first creates an event (called a \"trigger\") that will impel malicious members to behave suspiciously, for example, deleting digital data that may be evidence of their malicious behavior. In addition, the framework also monitors and analyzes actions by comparing operational logs before/after the trigger. This work is still in progress. Here, a system architecture based on the detection framework and cases in which it is used are described. Also, the effectiveness and the limitations of the proposed framework are discussed.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122206082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Data Importance Analysis 关于数据重要性分析
S. Kiyomoto, Yutaka Miyake
Accidents of information leakage and insider threats by malicious employee are major issues in enterprise IT system. Data importance analysis methods can resolve this issue, the importance of data is automatically analyzed by the method and confirms whether the operation suits the security policy for the level of importance of the data. Insider threads are also protected by analyzing data importance and data flows. A mechanism to ascertain data importance via automatic analysis is useful for avoiding human error. The mechanism finds the appropriate category for user sent data in terms of data importance, highly secret, important, and unclassified. In this paper, we presented an analysis method and discussed its application. It will apply to information leakage by both human error and insider threads. The method is a combination of data diagnosis and data categorization, and it can analyze whether the transaction to send the data compiles with the security policy.
信息泄露事故和恶意员工的内部威胁是企业IT系统面临的主要问题。数据重要性分析方法可以解决这一问题,该方法自动分析数据的重要性,并根据数据的重要性级别确定操作是否符合安全策略。内部线程还通过分析数据重要性和数据流得到保护。通过自动分析确定数据重要性的机制有助于避免人为错误。该机制根据数据重要性、高度机密、重要和非分类为用户发送的数据找到适当的类别。本文提出了一种分析方法,并对其应用进行了讨论。它将适用于人为错误和内部线程造成的信息泄露。该方法是数据诊断和数据分类相结合的方法,可以分析发送数据的事务是否符合安全策略。
{"title":"On Data Importance Analysis","authors":"S. Kiyomoto, Yutaka Miyake","doi":"10.1109/INCoS.2011.127","DOIUrl":"https://doi.org/10.1109/INCoS.2011.127","url":null,"abstract":"Accidents of information leakage and insider threats by malicious employee are major issues in enterprise IT system. Data importance analysis methods can resolve this issue, the importance of data is automatically analyzed by the method and confirms whether the operation suits the security policy for the level of importance of the data. Insider threads are also protected by analyzing data importance and data flows. A mechanism to ascertain data importance via automatic analysis is useful for avoiding human error. The mechanism finds the appropriate category for user sent data in terms of data importance, highly secret, important, and unclassified. In this paper, we presented an analysis method and discussed its application. It will apply to information leakage by both human error and insider threads. The method is a combination of data diagnosis and data categorization, and it can analyze whether the transaction to send the data compiles with the security policy.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122274538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 Third International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1