首页 > 最新文献

2010 Second International Conference on Communication Software and Networks最新文献

英文 中文
A New Strategy of Resource Searching in Unstructured P2P Network 一种新的非结构化P2P网络资源搜索策略
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.120
Jianyong Wang, Yuling Li, Futing Gong, Wei Chen
In the unstructured P2P networks, the flooding resource search method may cause much communication overhead, and severely constrains the scalability of network. In order to overcome this disadvantage, a new search strategy named TTL-Search based on the local caching and the scope of searching requests is proposed in this paper. According to this strategy, the searching process is divided into two stages, and each stage adopts different forwarding strategies. Analysis and experimental results show that, TTL-Search can overcome blindness of flooding search, and also can reduce redundancy overhead caused by query to some extend. So it can improve query success rate, and can be efficiently applied in the unstructured P2P network searching.
在非结构化的P2P网络中,泛洪式资源搜索会造成较大的通信开销,严重限制了网络的可扩展性。为了克服这一缺点,本文提出了一种基于本地缓存和搜索请求范围的搜索策略TTL-Search。根据该策略,搜索过程分为两个阶段,每个阶段采用不同的转发策略。分析和实验结果表明,TTL-Search可以克服泛洪搜索的盲目性,并在一定程度上减少查询带来的冗余开销。从而提高了查询的成功率,可以有效地应用于非结构化P2P网络的搜索中。
{"title":"A New Strategy of Resource Searching in Unstructured P2P Network","authors":"Jianyong Wang, Yuling Li, Futing Gong, Wei Chen","doi":"10.1109/ICCSN.2010.120","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.120","url":null,"abstract":"In the unstructured P2P networks, the flooding resource search method may cause much communication overhead, and severely constrains the scalability of network. In order to overcome this disadvantage, a new search strategy named TTL-Search based on the local caching and the scope of searching requests is proposed in this paper. According to this strategy, the searching process is divided into two stages, and each stage adopts different forwarding strategies. Analysis and experimental results show that, TTL-Search can overcome blindness of flooding search, and also can reduce redundancy overhead caused by query to some extend. So it can improve query success rate, and can be efficiently applied in the unstructured P2P network searching.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Index Correlation Adjustment Based on Orthogonalization for Network Damage Assessment 基于正交化的网络损害评估指标相关性平差
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.110
Xing Wang, Binxing Fang, Hong-li Zhang, Hui He, Gang Xu
Existing network damage assessment method fall short because they either lack correlation adjustment among indexes or without conclusive evidence to demonstrated the degree does represent the real situation of the network. This paper proposed a method to adjustment index correlation based on Orthogonalization. The advantages of this method for evaluation damage degree of network have been demonstrated from two simulation experiments. One is damage degree comparisons in difference basic topologies. Another is worm propagation in campus topology. The results show that network suffered by distinct damage with the same packet creation rate and traffic generate model in different basic topologies. The worm propagation experiment has demonstrated that the method can reflected the dynamic process of network availability damage accurately and integrally.
现有的网络损害评估方法要么缺乏指标间的相关性调整,要么缺乏确凿的证据来证明其程度确实反映了网络的真实情况,因此存在不足。提出了一种基于正交化的指标相关性平差方法。通过两个仿真实验验证了该方法对网络损伤程度评估的优越性。一是不同基本拓扑下的损伤度比较。另一个是校园拓扑中的蠕虫传播。结果表明,在不同的基本拓扑结构下,在相同的分组生成速率和流量生成模型下,网络所遭受的损害是不同的。蠕虫传播实验表明,该方法能准确、完整地反映网络可用性破坏的动态过程。
{"title":"Index Correlation Adjustment Based on Orthogonalization for Network Damage Assessment","authors":"Xing Wang, Binxing Fang, Hong-li Zhang, Hui He, Gang Xu","doi":"10.1109/ICCSN.2010.110","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.110","url":null,"abstract":"Existing network damage assessment method fall short because they either lack correlation adjustment among indexes or without conclusive evidence to demonstrated the degree does represent the real situation of the network. This paper proposed a method to adjustment index correlation based on Orthogonalization. The advantages of this method for evaluation damage degree of network have been demonstrated from two simulation experiments. One is damage degree comparisons in difference basic topologies. Another is worm propagation in campus topology. The results show that network suffered by distinct damage with the same packet creation rate and traffic generate model in different basic topologies. The worm propagation experiment has demonstrated that the method can reflected the dynamic process of network availability damage accurately and integrally.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"57 42","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peak to Average Power Ratio Analysis for LTE Systems LTE系统的峰值平均功率比分析
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.53
M. Rana, M. S. Islam, A. Kouzani
The 3rd generation partnership project (3GPP) long term evolution (LTE) standard uses single carrier frequency division multiple access (SCFDMA) scheme for the uplink transmissions and orthogonal frequency division multiplexing access (OFDMA) in downlink. SCFDMA uses DFT spreading prior to OFDMA modulation to map the signal from each user to a subset of the available subcarriers i.e., single carrier modulation. The efficiency of a power amplifier is determined by the peak to average power ratio (PAPR) of the modulated signal. In this paper, we analyze the PAPR in 3GPP LTE systems using root raised cosine based filter. Simulation results show that the SCFDMA subcarrier mapping has a significantly lower PAPR compared to OFDMA. Also comparing the three forms of SCFDMA subcarrier mapping, results show that interleave FDMA (IFDMA) subcarrier mapping with proposed root raised cosine filter reduced PAPR significantly than localized FDMA (LFDMA) and distributed (DFDMA) mapping. This improves its radio frequency (RF) power amplifier efficiency and also the mean power output from a battery driven mobile terminal.
第三代合作伙伴计划(3GPP)长期演进(LTE)标准在上行传输中使用单载波频分多址(SCFDMA)方案,在下行传输中使用正交频分多址(OFDMA)方案。SCFDMA在OFDMA调制之前使用DFT扩展将来自每个用户的信号映射到可用子载波的子集,即单载波调制。功率放大器的效率由调制信号的峰值与平均功率比(PAPR)决定。本文采用基于根提升余弦的滤波器对3GPP LTE系统的PAPR进行了分析。仿真结果表明,与OFDMA相比,SCFDMA子载波映射具有明显较低的PAPR。对比了三种形式的SCFDMA子载波映射,结果表明,与局部FDMA (LFDMA)和分布式FDMA (DFDMA)映射相比,采用提高根余弦滤波器的交错FDMA (IFDMA)子载波映射显著降低了PAPR。这提高了其射频(RF)功率放大器效率,也提高了电池驱动移动终端的平均功率输出。
{"title":"Peak to Average Power Ratio Analysis for LTE Systems","authors":"M. Rana, M. S. Islam, A. Kouzani","doi":"10.1109/ICCSN.2010.53","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.53","url":null,"abstract":"The 3rd generation partnership project (3GPP) long term evolution (LTE) standard uses single carrier frequency division multiple access (SCFDMA) scheme for the uplink transmissions and orthogonal frequency division multiplexing access (OFDMA) in downlink. SCFDMA uses DFT spreading prior to OFDMA modulation to map the signal from each user to a subset of the available subcarriers i.e., single carrier modulation. The efficiency of a power amplifier is determined by the peak to average power ratio (PAPR) of the modulated signal. In this paper, we analyze the PAPR in 3GPP LTE systems using root raised cosine based filter. Simulation results show that the SCFDMA subcarrier mapping has a significantly lower PAPR compared to OFDMA. Also comparing the three forms of SCFDMA subcarrier mapping, results show that interleave FDMA (IFDMA) subcarrier mapping with proposed root raised cosine filter reduced PAPR significantly than localized FDMA (LFDMA) and distributed (DFDMA) mapping. This improves its radio frequency (RF) power amplifier efficiency and also the mean power output from a battery driven mobile terminal.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115120683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A Comparative Study of Six Software Packages for Complex Network Research 复杂网络研究中六种软件包的比较研究
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.34
Kaikuo Xu, Changjie Tang, Rong Tang, G. Ali, Jun Zhu
UCINET, Pajek, Networkx, iGraph, JUNG and statnet, are commonly used to perform analysis with complex network model. The scalability, and function coverage of these six software packages are assessed and compared. Some randomly generated datasets are used to evaluate the performance of these software packages with regard to input/output (I/O), basic graph algorithms, statistical metrics computation, graph generation, community detection, and visualization. A metric regarding both numbers of the nodes and the edges of complex networks, which is called Maximum Expected Network Processing Ability (MENPA), is proposed to measure the scalability of software packages. Empirical results show that these six software packages are complementary rather than competitive and the difference on the scalability among these six software packages may be attributed to the varieties in both of the programming languages and the network representations.
UCINET、Pajek、Networkx、iGraph、JUNG、statnet等常用工具对复杂网络模型进行分析。对这六个软件包的可扩展性和功能覆盖率进行了评估和比较。使用一些随机生成的数据集来评估这些软件包在输入/输出(I/O)、基本图形算法、统计度量计算、图形生成、社区检测和可视化方面的性能。提出了一种同时考虑复杂网络的节点数和边缘数的度量方法,即最大期望网络处理能力(MENPA)来衡量软件包的可扩展性。实证结果表明,这6个软件包的可扩展性是互补的,而不是竞争的,这6个软件包之间的可扩展性差异可能是由于编程语言和网络表示的不同。
{"title":"A Comparative Study of Six Software Packages for Complex Network Research","authors":"Kaikuo Xu, Changjie Tang, Rong Tang, G. Ali, Jun Zhu","doi":"10.1109/ICCSN.2010.34","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.34","url":null,"abstract":"UCINET, Pajek, Networkx, iGraph, JUNG and statnet, are commonly used to perform analysis with complex network model. The scalability, and function coverage of these six software packages are assessed and compared. Some randomly generated datasets are used to evaluate the performance of these software packages with regard to input/output (I/O), basic graph algorithms, statistical metrics computation, graph generation, community detection, and visualization. A metric regarding both numbers of the nodes and the edges of complex networks, which is called Maximum Expected Network Processing Ability (MENPA), is proposed to measure the scalability of software packages. Empirical results show that these six software packages are complementary rather than competitive and the difference on the scalability among these six software packages may be attributed to the varieties in both of the programming languages and the network representations.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129809724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Decentralized Multi-group Communication Protocol Supporting Causal Order 支持因果顺序的分散多组通信协议
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.47
Chayoung Kim, Jinho Ahn
Previous gossip-based protocols developed for sensor networks or various kinds of P2P networks assume that all processes in a system are interested in all events occurring while communicating among them. Though all query nodes in a large group are running the same application, they might join various multicast groups depending on their interests. However, despite the significant importance of message delivery order guarantees, little work on gossip-based protocols exists supporting multicast groups and satisfying these constraints in a scalable way. In this paper, we present an efficient and scalable causal order guaranteeing multicast protocol to use only local views supporting multi-groups. In the proposed protocol, multicast groups are defined by interests associated with the processes and join/leave messages are disseminated by gossip communication based on local views. So, group memberships are dynamically changing by their own members in multicast groups with high probabilistic reliability. Also, group ID order lists are delivered to possibly overlapping multicast groups to ensure causal order delivery. Therefore, these features of the protocol might result in its very low view management cost compared with the cost incurred by maintaining hierarchical member list for delegate groups in the previous protocols.
以前为传感器网络或各种P2P网络开发的基于八卦的协议假设系统中的所有进程都对它们之间通信时发生的所有事件感兴趣。虽然大组中的所有查询节点都运行相同的应用程序,但它们可能根据自己的兴趣加入不同的多播组。然而,尽管消息传递顺序保证非常重要,但在支持多播组并以可伸缩的方式满足这些约束的基于八卦的协议方面,几乎没有工作。本文提出了一种高效、可扩展的因果顺序,保证多播协议只使用支持多组的本地视图。在该协议中,通过与进程相关的兴趣定义多播组,通过基于本地视图的八卦通信传播加入/离开消息。因此,在具有高概率可靠性的组播组中,组成员关系是由组内成员动态变化的。此外,组ID订单列表被传递到可能重叠的多播组,以确保因果顺序传递。因此,与以前的协议中维护委托组的分层成员列表的成本相比,该协议的这些特性可能导致其视图管理成本非常低。
{"title":"Decentralized Multi-group Communication Protocol Supporting Causal Order","authors":"Chayoung Kim, Jinho Ahn","doi":"10.1109/ICCSN.2010.47","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.47","url":null,"abstract":"Previous gossip-based protocols developed for sensor networks or various kinds of P2P networks assume that all processes in a system are interested in all events occurring while communicating among them. Though all query nodes in a large group are running the same application, they might join various multicast groups depending on their interests. However, despite the significant importance of message delivery order guarantees, little work on gossip-based protocols exists supporting multicast groups and satisfying these constraints in a scalable way. In this paper, we present an efficient and scalable causal order guaranteeing multicast protocol to use only local views supporting multi-groups. In the proposed protocol, multicast groups are defined by interests associated with the processes and join/leave messages are disseminated by gossip communication based on local views. So, group memberships are dynamically changing by their own members in multicast groups with high probabilistic reliability. Also, group ID order lists are delivered to possibly overlapping multicast groups to ensure causal order delivery. Therefore, these features of the protocol might result in its very low view management cost compared with the cost incurred by maintaining hierarchical member list for delegate groups in the previous protocols.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128881091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Degree Control Resistance to Frangibility of Scale-Free Networks 无标度网络抗脆弱性度控制研究
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.59
Jingju Gao, Yongwei Meng
Since the small-world effect and the scale-free characteristic discovery, the research of complex network obtained rapidly development in the past several years, the complex networks’ anti-frangibility is one of research focal points. This article analysised the scale-free networks’ frangibility, and obtained that the scale-free networks’ frangibility is mainly caused by combining attack to the hubs. From the two aspects of minimum degree and hubs, through setting maximum degree and minimum degree to control the hubs and the stochastic production connections separately, established the scale-free networks’ anti-frangibity model based on this. The simulation experiment indicated that through setting the minimum degree and controlling to hubs, can strengthen the scale-free networks’ anti-rangibility ability
由于小世界效应和无标度特征的发现,复杂网络的研究在过去几年得到了迅速发展,复杂网络的抗脆弱性是研究的热点之一。本文对无标度网络的脆弱性进行了分析,得出无标度网络的脆弱性主要由集线器的组合攻击引起。从最小度和枢纽两个方面出发,通过设置最大度和最小度分别对枢纽和随机生产连接进行控制,在此基础上建立了无标度网络的抗脆弱性模型。仿真实验表明,通过设置最小度并对集线器进行控制,可以增强无标度网络的抗可变性能力
{"title":"Research on Degree Control Resistance to Frangibility of Scale-Free Networks","authors":"Jingju Gao, Yongwei Meng","doi":"10.1109/ICCSN.2010.59","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.59","url":null,"abstract":"Since the small-world effect and the scale-free characteristic discovery, the research of complex network obtained rapidly development in the past several years, the complex networks’ anti-frangibility is one of research focal points. This article analysised the scale-free networks’ frangibility, and obtained that the scale-free networks’ frangibility is mainly caused by combining attack to the hubs. From the two aspects of minimum degree and hubs, through setting maximum degree and minimum degree to control the hubs and the stochastic production connections separately, established the scale-free networks’ anti-frangibity model based on this. The simulation experiment indicated that through setting the minimum degree and controlling to hubs, can strengthen the scale-free networks’ anti-rangibility ability","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130712451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Modulation Classification of MQAM Signals Using Joint Moments 基于关节矩的MQAM信号调制分类研究
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.32
Ning An, Bingbing Li, M. Huang
Automatic modulation classification (AMC) is a scheme to identify the data samples automatically. Usually, in wireless communication, especially through the Rayleigh fading channel, AMC performance will severe degrade. This paper presents a new method for AMC, using a modified Joint Power Estimation and modulation types of the transmitted signals by observing the receive Modulation Classification (JPEMC) algorithm. The advantage of our new algorithm is we don’t need the channel information as a priori. The Monte Carlo simulation shows that the performance of our algorithm can be better than the existing AMC algorithms.
自动调制分类(AMC)是一种自动识别数据样本的方案。通常在无线通信中,特别是通过瑞利衰落信道时,AMC的性能会严重下降。本文通过观察接收调制分类(JPEMC)算法,提出了一种改进的联合功率估计和发送信号调制类型的AMC方法。新算法的优点是我们不需要先验的信道信息。蒙特卡罗仿真表明,该算法的性能优于现有的AMC算法。
{"title":"Research on Modulation Classification of MQAM Signals Using Joint Moments","authors":"Ning An, Bingbing Li, M. Huang","doi":"10.1109/ICCSN.2010.32","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.32","url":null,"abstract":"Automatic modulation classification (AMC) is a scheme to identify the data samples automatically. Usually, in wireless communication, especially through the Rayleigh fading channel, AMC performance will severe degrade. This paper presents a new method for AMC, using a modified Joint Power Estimation and modulation types of the transmitted signals by observing the receive Modulation Classification (JPEMC) algorithm. The advantage of our new algorithm is we don’t need the channel information as a priori. The Monte Carlo simulation shows that the performance of our algorithm can be better than the existing AMC algorithms.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130973991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Preventing of SYN Flood Attack with Iptables Firewall Iptables防火墙防范SYN Flood攻击
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.74
Sara Mirzaie, Alireza Karimi Elyato, M. Sarram
Denial of services attacks prevents legitimate users from using a service. One particular type of this attack is known as SYN flood, where external hosts attempt to overwhelm the server machine by sending a constant stream of TCP connection request. There are several approaches for dealing with this attack that firewall is one of them. In this paper we attempt to prevent of this attack with iptables firewalls.
拒绝服务攻击阻止合法用户使用服务。这种攻击的一种特殊类型被称为SYN flood,外部主机试图通过发送恒定的TCP连接请求流来压倒服务器机器。有几种方法可以处理这种攻击,防火墙就是其中之一。在本文中,我们尝试用iptables防火墙来防止这种攻击。
{"title":"Preventing of SYN Flood Attack with Iptables Firewall","authors":"Sara Mirzaie, Alireza Karimi Elyato, M. Sarram","doi":"10.1109/ICCSN.2010.74","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.74","url":null,"abstract":"Denial of services attacks prevents legitimate users from using a service. One particular type of this attack is known as SYN flood, where external hosts attempt to overwhelm the server machine by sending a constant stream of TCP connection request. There are several approaches for dealing with this attack that firewall is one of them. In this paper we attempt to prevent of this attack with iptables firewalls.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131699913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Dynamic Privacy Management in Ubiquitous Computing Environments 泛在计算环境下的动态隐私管理
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.122
Jiho Kim, Jungyu Lee, Soonhyung Park, Ohyoung Song
Ubiquitous computing environment pursues context-aware in order words personalized service by collecting contexts through sensors located over wide area and presenting the service automatically depending not on the user’s request but on the situations that are needed. But in order to provide the personalized service, contexts collected through various sensors are needed and they include private information. Therefore, it is important to keep a balance between the convenience by presenting service and protecting private information. In this paper, we classify and grade user’s various contexts requested in ubiquitous computing environment. Based on these, we make decisions on whether to present the service or not by profile-matching between user profile and privacy requirements for providing service.
泛在计算环境通过位于广阔区域的传感器收集上下文,并根据需要的情况而不是用户的请求自动提供服务,从而实现上下文感知的有序词个性化服务。但是,为了提供个性化服务,需要通过各种传感器收集上下文,其中包括私人信息。因此,在提供服务的便利性和保护私人信息之间保持平衡是很重要的。本文对普适计算环境下用户所需要的各种上下文进行了分类和分级。在此基础上,我们通过用户配置文件与提供服务的隐私需求之间的配置文件匹配来决定是否提供服务。
{"title":"Dynamic Privacy Management in Ubiquitous Computing Environments","authors":"Jiho Kim, Jungyu Lee, Soonhyung Park, Ohyoung Song","doi":"10.1109/ICCSN.2010.122","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.122","url":null,"abstract":"Ubiquitous computing environment pursues context-aware in order words personalized service by collecting contexts through sensors located over wide area and presenting the service automatically depending not on the user’s request but on the situations that are needed. But in order to provide the personalized service, contexts collected through various sensors are needed and they include private information. Therefore, it is important to keep a balance between the convenience by presenting service and protecting private information. In this paper, we classify and grade user’s various contexts requested in ubiquitous computing environment. Based on these, we make decisions on whether to present the service or not by profile-matching between user profile and privacy requirements for providing service.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125583436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of Web Service Based on P2P 基于P2P的Web服务研究
Pub Date : 2010-02-26 DOI: 10.1109/ICCSN.2010.24
Baohua Jin, Dongyao Zou
This paper presents a brief introduction to Web Service and P2P technology and analyzes their advantages and disadvantages, and gets the conclusion that P2P computing platform based Web Service is an ideal Web Service implementation. The cost of establishment and maintenance of system will reduce after adopting the service integration and resource autonomy of P2P. A P2P based Web Service architecture is proposed and the working mechanism is designed in the paper. This architecture can not only provide Web Service efficiently but also guarantee the robust system.
本文简要介绍了Web Service和P2P技术,分析了它们的优缺点,得出基于P2P计算平台的Web Service是一种理想的Web Service实现。采用P2P的服务集成和资源自治,降低了系统的建立和维护成本。提出了一种基于P2P的Web Service体系结构,并设计了其工作机制。该体系结构既能高效地提供Web服务,又能保证系统的健壮性。
{"title":"Research of Web Service Based on P2P","authors":"Baohua Jin, Dongyao Zou","doi":"10.1109/ICCSN.2010.24","DOIUrl":"https://doi.org/10.1109/ICCSN.2010.24","url":null,"abstract":"This paper presents a brief introduction to Web Service and P2P technology and analyzes their advantages and disadvantages, and gets the conclusion that P2P computing platform based Web Service is an ideal Web Service implementation. The cost of establishment and maintenance of system will reduce after adopting the service integration and resource autonomy of P2P. A P2P based Web Service architecture is proposed and the working mechanism is designed in the paper. This architecture can not only provide Web Service efficiently but also guarantee the robust system.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122952397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2010 Second International Conference on Communication Software and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1