首页 > 最新文献

2013 16th International Conference on Network-Based Information Systems最新文献

英文 中文
Memory Segmentation and Transfer in Mint Operating System Mint操作系统中的内存分割和传输
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.58
K. Miyazaki, Y. Nomura, H. Taniguchi
In order to utilize computer resources efficiently, technologies have been developed to enable running multiple OSes on a single computer. In our study, we developed the Mint operating system, which enables running multiple Linux instances on a multi-core processor. Mint is different from traditional virtualization technologies in that Mint can achieve performance isolation between Linux instances by segmenting computer resources. Currently, Mint statically segments and assigns its physical memory to each Linux instance. By transferring physical memory ranges among the Linux instances depending on their physical memory utilization, Mint can adapt to the load variations. In this paper, we describe the requirements for segmentation and transfer of physical memory and provide a solution.
为了有效地利用计算机资源,已经开发出能够在一台计算机上运行多个操作系统的技术。在我们的研究中,我们开发了Mint操作系统,它支持在多核处理器上运行多个Linux实例。Mint与传统虚拟化技术的不同之处在于,Mint可以通过分割计算机资源来实现Linux实例之间的性能隔离。目前,Mint静态地将其物理内存分段并分配给每个Linux实例。通过根据Linux实例的物理内存利用率在它们之间传输物理内存范围,Mint可以适应负载变化。在本文中,我们描述了对物理内存的分割和传输的要求,并提供了一个解决方案。
{"title":"Memory Segmentation and Transfer in Mint Operating System","authors":"K. Miyazaki, Y. Nomura, H. Taniguchi","doi":"10.1109/NBiS.2013.58","DOIUrl":"https://doi.org/10.1109/NBiS.2013.58","url":null,"abstract":"In order to utilize computer resources efficiently, technologies have been developed to enable running multiple OSes on a single computer. In our study, we developed the Mint operating system, which enables running multiple Linux instances on a multi-core processor. Mint is different from traditional virtualization technologies in that Mint can achieve performance isolation between Linux instances by segmenting computer resources. Currently, Mint statically segments and assigns its physical memory to each Linux instance. By transferring physical memory ranges among the Linux instances depending on their physical memory utilization, Mint can adapt to the load variations. In this paper, we describe the requirements for segmentation and transfer of physical memory and provide a solution.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114878458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-real Time Data Transmission Mechanism with Mobile Sink in Cluster-Based Wireless Sensor Networks 基于集群的无线传感器网络中带有移动Sink的非实时数据传输机制
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.63
Kuo-Feng Huang, Yi-Hsun Lin, Shao-Wei Tsao, Ying-Hong Wang
In traditional wireless sensor networks, the sensed data will be forwarded to sink by multi-hop, so that the hot spot problem will happen on the nodes near the sink. The power consumption of these nodes is higher than others, these nodes will be dead sooner. It leads to the network lifetime decreasing. We proposed a data transmission mechanism using mobile sink to solve this problem. We use two threshold values to prevent data overflow. If the data buffer of cluster head exceed to 1st threshold, the node will call sink to come and transmit data. If the sink didn't arrive the transmission range of the node, and the data buffer exceed to 2nd threshold. Instead of forwarding data to sink directly by multi-hop, we use forwarding data to cluster head of neighboring cluster to help buffer the exceeded data. It can decrease the number of node which has to help to help to forward data, so that it can decrease the power consumption of network, and prolong the network lifetime.
在传统的无线传感器网络中,被感知的数据将通过多跳的方式转发到sink,这样就会在靠近sink的节点上产生热点问题。这些节点的功耗比其他节点高,这些节点会更快死亡。这将导致网络寿命的缩短。为了解决这一问题,我们提出了一种基于移动sink的数据传输机制。我们使用两个阈值来防止数据溢出。如果簇头的数据缓冲区超过第一个阈值,节点将调用sink来传输数据。如果接收器没有到达节点的传输范围,并且数据缓冲区超过第二个阈值。我们采用将数据转发到邻近集群的簇头来缓冲超出的数据,而不是直接通过多跳转发到sink。它可以减少转发数据的节点数量,从而降低网络的功耗,延长网络的生命周期。
{"title":"Non-real Time Data Transmission Mechanism with Mobile Sink in Cluster-Based Wireless Sensor Networks","authors":"Kuo-Feng Huang, Yi-Hsun Lin, Shao-Wei Tsao, Ying-Hong Wang","doi":"10.1109/NBiS.2013.63","DOIUrl":"https://doi.org/10.1109/NBiS.2013.63","url":null,"abstract":"In traditional wireless sensor networks, the sensed data will be forwarded to sink by multi-hop, so that the hot spot problem will happen on the nodes near the sink. The power consumption of these nodes is higher than others, these nodes will be dead sooner. It leads to the network lifetime decreasing. We proposed a data transmission mechanism using mobile sink to solve this problem. We use two threshold values to prevent data overflow. If the data buffer of cluster head exceed to 1st threshold, the node will call sink to come and transmit data. If the sink didn't arrive the transmission range of the node, and the data buffer exceed to 2nd threshold. Instead of forwarding data to sink directly by multi-hop, we use forwarding data to cluster head of neighboring cluster to help buffer the exceeded data. It can decrease the number of node which has to help to help to forward data, so that it can decrease the power consumption of network, and prolong the network lifetime.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124293661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on Hadoop 基于Hadoop的随机自相似性检测异常远程通信
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.43
J. Lee, Sang-Kug Ye, H. Jeong
In recent years, the quantity of teletraffic is rapidly growing because of the explosive increase of Internet users and its applications. The needs of collection, storage, management, analysis, and measurement of the subsequent teletraffic have been emerged as one of very important issues. So far many studies for detecting anomaly teletraffic have been done. However, measurement and analysis studies for big data in cloud computing environments are not actively being made based on Hadoop. Thus, this paper presents for detecting anomaly teletraffic using stochastic self-similarity based on Hadoop. All simulations are conducted under control of our proposed platform, called ATM tool, for anomaly teletraffic intrusion detection system on Hadoop. Our numerical results show that the values of the estimated Hurst parameter obtained from the anomaly teletraffic are much higher when compared to ordinary local area network traffic.
近年来,由于互联网用户及其应用的爆炸式增长,电信通信量迅速增长。对后续通信的采集、存储、管理、分析和测量需求已成为一个非常重要的问题。迄今为止,人们对异常远程通信的检测进行了大量的研究。然而,基于Hadoop的云计算环境下的大数据测量和分析研究并不活跃。为此,本文提出了一种基于Hadoop的随机自相似度检测异常远程通信的方法。所有的仿真都是在我们提出的用于Hadoop异常远程流量入侵检测系统的ATM工具平台的控制下进行的。数值结果表明,从异常话务中得到的赫斯特参数估计值比普通局域网话务高得多。
{"title":"Detecting Anomaly Teletraffic Using Stochastic Self-Similarity Based on Hadoop","authors":"J. Lee, Sang-Kug Ye, H. Jeong","doi":"10.1109/NBiS.2013.43","DOIUrl":"https://doi.org/10.1109/NBiS.2013.43","url":null,"abstract":"In recent years, the quantity of teletraffic is rapidly growing because of the explosive increase of Internet users and its applications. The needs of collection, storage, management, analysis, and measurement of the subsequent teletraffic have been emerged as one of very important issues. So far many studies for detecting anomaly teletraffic have been done. However, measurement and analysis studies for big data in cloud computing environments are not actively being made based on Hadoop. Thus, this paper presents for detecting anomaly teletraffic using stochastic self-similarity based on Hadoop. All simulations are conducted under control of our proposed platform, called ATM tool, for anomaly teletraffic intrusion detection system on Hadoop. Our numerical results show that the values of the estimated Hurst parameter obtained from the anomaly teletraffic are much higher when compared to ordinary local area network traffic.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Federated Identity Access Broker Pattern for Cloud Computing 云计算的联邦身份访问代理模式
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.23
Tim Reimer, P. Abraham, Qing Tan
With the adoption of cloud computing, a multitude of front-end mobile devices are emerging that require access to services in the cloud. Applications in the cloud are now commonly deployed as software as a service (SaaS). However, with the introduction of SaaS new security challenges need to be addressed. The challenge is to provide a single sign-on environment for services through an identity provider plus sufficient authorization granularity for backend services for the client applications to access. Through detailed discussion of the two standards (SAML 2.0 and OAuth 2.0) this paper presents a study how the two standards can provide a single sign-on solution for cloud computing. Furthermore, by outlining a case study/scenario of the two standards, the Federated Identity Access Broker Pattern for cloud computing is developed to present a solution for these security issues.
随着云计算的采用,大量需要访问云中的服务的前端移动设备正在出现。云中的应用程序现在通常以软件即服务(SaaS)的形式部署。然而,随着SaaS的引入,需要解决新的安全挑战。挑战在于通过身份提供程序为服务提供单点登录环境,并为客户端应用程序访问的后端服务提供足够的授权粒度。通过对两个标准(SAML 2.0和OAuth 2.0)的详细讨论,本文研究了这两个标准如何为云计算提供单点登录解决方案。此外,通过概述这两个标准的案例研究/场景,开发了用于云计算的联邦身份访问代理模式,以提供针对这些安全问题的解决方案。
{"title":"Federated Identity Access Broker Pattern for Cloud Computing","authors":"Tim Reimer, P. Abraham, Qing Tan","doi":"10.1109/NBiS.2013.23","DOIUrl":"https://doi.org/10.1109/NBiS.2013.23","url":null,"abstract":"With the adoption of cloud computing, a multitude of front-end mobile devices are emerging that require access to services in the cloud. Applications in the cloud are now commonly deployed as software as a service (SaaS). However, with the introduction of SaaS new security challenges need to be addressed. The challenge is to provide a single sign-on environment for services through an identity provider plus sufficient authorization granularity for backend services for the client applications to access. Through detailed discussion of the two standards (SAML 2.0 and OAuth 2.0) this paper presents a study how the two standards can provide a single sign-on solution for cloud computing. Furthermore, by outlining a case study/scenario of the two standards, the Federated Identity Access Broker Pattern for cloud computing is developed to present a solution for these security issues.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125774513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Social TV System for the Senior Community: Stimulating Elderly Communication Using Information and Communications Technology 面向老年社区的社会电视系统:利用信息通信技术促进老年交流
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.68
Masaru Miyazaki, Masanori Sano, M. Naemura, H. Sumiyoshi, S. Mitsuya, A. Fujii
The purpose of this study is to stimulate communication among the elderly population of Japan (where more than 21% of the population is aged 65 years and above) and to find ways to use their knowledge and labor skills with the aid of information and communications technology. Toward this end, we launched a joint research project called "Senior Cloud" in which we developed a prototype of a social TV system for the elderly. The first phase of the research project included a three-month field trial using the system in a local senior community. In this paper, we analyze the system log (posting and operational data) and the responses to questionnaires administered to obtain user impressions. These data reveal certain characteristics of communication among the elderly and methods that can stimulate it.
本研究的目的是促进日本老年人口(超过21%的人口年龄在65岁及以上)之间的交流,并找到在信息和通信技术的帮助下使用他们的知识和劳动技能的方法。为此,我们发起了一个名为“老年云”的联合研究项目,在这个项目中,我们为老年人开发了一个社会电视系统的原型。该研究项目的第一阶段包括在当地老年人社区使用该系统进行为期三个月的实地试验。在本文中,我们分析了系统日志(张贴和操作数据)和问卷调查的回应,以获得用户的印象。这些数据揭示了老年人之间交流的某些特点以及刺激这种交流的方法。
{"title":"A Social TV System for the Senior Community: Stimulating Elderly Communication Using Information and Communications Technology","authors":"Masaru Miyazaki, Masanori Sano, M. Naemura, H. Sumiyoshi, S. Mitsuya, A. Fujii","doi":"10.1109/NBiS.2013.68","DOIUrl":"https://doi.org/10.1109/NBiS.2013.68","url":null,"abstract":"The purpose of this study is to stimulate communication among the elderly population of Japan (where more than 21% of the population is aged 65 years and above) and to find ways to use their knowledge and labor skills with the aid of information and communications technology. Toward this end, we launched a joint research project called \"Senior Cloud\" in which we developed a prototype of a social TV system for the elderly. The first phase of the research project included a three-month field trial using the system in a local senior community. In this paper, we analyze the system log (posting and operational data) and the responses to questionnaires administered to obtain user impressions. These data reveal certain characteristics of communication among the elderly and methods that can stimulate it.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122636348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Numerical and Experimental Study on Y-Shaped Branch Waveguide by Post Wall 柱壁y形分支波导的数值与实验研究
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.84
H. Maeda, K. Yasumoto, Huili Chen, Kazuya Tomiura, Daichi Ogata
Post wall wave guide and photonic crystal wave guide are important structure for microwave transmission of integrated circuits with multi-layered substrates. It has simple periodic array of metallic or dielectric cylinders between parallel conducting plates for two-dimensional structure. In this study, return loss from branching part in Y-shaped wave guide was evaluated both numerically and experimentally for microwave. We successfully proposed an improvement method by shifting a post location at the branching part to reduce the return loss.
后壁波导和光子晶体波导是多层衬底集成电路中微波传输的重要结构。它具有简单的金属或介电圆柱体在平行导电板之间的周期性阵列,用于二维结构。本文从数值和实验两方面对y型波导分支部分的回波损耗进行了研究。我们成功地提出了一种改进方法,通过在分支部分移动一个桩的位置来减少回波损耗。
{"title":"Numerical and Experimental Study on Y-Shaped Branch Waveguide by Post Wall","authors":"H. Maeda, K. Yasumoto, Huili Chen, Kazuya Tomiura, Daichi Ogata","doi":"10.1109/NBiS.2013.84","DOIUrl":"https://doi.org/10.1109/NBiS.2013.84","url":null,"abstract":"Post wall wave guide and photonic crystal wave guide are important structure for microwave transmission of integrated circuits with multi-layered substrates. It has simple periodic array of metallic or dielectric cylinders between parallel conducting plates for two-dimensional structure. In this study, return loss from branching part in Y-shaped wave guide was evaluated both numerically and experimentally for microwave. We successfully proposed an improvement method by shifting a post location at the branching part to reduce the return loss.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126572698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure 基于功能信息基础设施的多域功能加密系统的构建
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.19
Y. Niwa, Akira Kanaoka, E. Okamoto
Identity-based encryption (IBE) and cryptographic systems based on IBE, timed-release encryption (TRE), attribute-based encryption (ABE), and functional encryption (FE), use information that identify individuals or groups (e.g., identities, attributes) for encryption and decryption. One significant advantage of FE is the fact that identity and attributes management leads to key management. If an infrastructure for managing identity and attributes existed, we could encrypt a message with identity and attributes (Functional Information, FI) for FE on it. With an infrastructure for FE, we can utilize existing FEs issued for FE and reduce the cost of issuing/managing a new FI only for FE. That is, we could regard FE as a service on the infrastructures in order to delegate management of FI to it. For PKG, a conventional IBE player, we propose a framework that divides it into three entities to enable it to correspond with complex FE systems that federate each function among several FE systems. We also examine use cases in which there are more than one instances of each entity in the same domain, and domain-use cases in which each entity coexists under multi-domain, and apply them to multiple FE systems among different domains. Consequently, we discover challenges that are not described in RFC 5408, also referred to as standardization scalability. On the basis of the use cases, to examine the management of these multi-domains, we develop ABE systems on ID management infrastructure with open protocols for authentication/authorization (OAuth and OpenID Connect) and demonstrate the feasibility of the framework in FE.
基于身份的加密(IBE)和基于IBE、定时释放加密(TRE)、基于属性的加密(ABE)和功能加密(FE)的加密系统使用识别个人或群体(例如身份、属性)的信息进行加密和解密。FE的一个重要优点是身份和属性管理导致密钥管理。如果存在用于管理身份和属性的基础设施,我们就可以用身份和属性(功能性信息,FI)对消息进行加密。有了FE的基础设施,我们可以利用为FE发行的现有FE,并降低仅为FE发行/管理新FI的成本。也就是说,我们可以将FE视为基础设施上的服务,以便将FI的管理委托给它。对于传统的IBE播放器PKG,我们提出了一个框架,将其分为三个实体,使其能够与复杂的FE系统相对应,这些系统将多个FE系统中的每个功能联合起来。我们还检查了在同一域中每个实体有多个实例的用例,以及每个实体共存于多域中的域用例,并将它们应用于不同域中的多个FE系统。因此,我们发现了RFC 5408中没有描述的挑战,也称为标准化可伸缩性。在用例的基础上,为了检查这些多域的管理,我们在ID管理基础设施上开发了ABE系统,并使用开放的身份验证/授权协议(OAuth和OpenID Connect),并演示了该框架在FE中的可行性。
{"title":"Construction of a Multi-domain Functional Encryption System on Functional Information Infrastructure","authors":"Y. Niwa, Akira Kanaoka, E. Okamoto","doi":"10.1109/NBiS.2013.19","DOIUrl":"https://doi.org/10.1109/NBiS.2013.19","url":null,"abstract":"Identity-based encryption (IBE) and cryptographic systems based on IBE, timed-release encryption (TRE), attribute-based encryption (ABE), and functional encryption (FE), use information that identify individuals or groups (e.g., identities, attributes) for encryption and decryption. One significant advantage of FE is the fact that identity and attributes management leads to key management. If an infrastructure for managing identity and attributes existed, we could encrypt a message with identity and attributes (Functional Information, FI) for FE on it. With an infrastructure for FE, we can utilize existing FEs issued for FE and reduce the cost of issuing/managing a new FI only for FE. That is, we could regard FE as a service on the infrastructures in order to delegate management of FI to it. For PKG, a conventional IBE player, we propose a framework that divides it into three entities to enable it to correspond with complex FE systems that federate each function among several FE systems. We also examine use cases in which there are more than one instances of each entity in the same domain, and domain-use cases in which each entity coexists under multi-domain, and apply them to multiple FE systems among different domains. Consequently, we discover challenges that are not described in RFC 5408, also referred to as standardization scalability. On the basis of the use cases, to examine the management of these multi-domains, we develop ABE systems on ID management infrastructure with open protocols for authentication/authorization (OAuth and OpenID Connect) and demonstrate the feasibility of the framework in FE.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Context and the Cloud: Situational Awareness in Mobile Systems 情境与云:移动系统中的态势感知
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.92
P. Moore, Mak Sharma, F. Xhafa, L. Barolli
There has been a paradigm shift in the way users interact with computerized systems and applications. This is driven by the increasing power and ubiquity of 'smart' mobile devices and the traction being generated in Cloud-based systems and the long-term evolution in service provision using Software-as-a-Service. These developments are supported by the rapid and far reaching developments in the related networking infrastructures. This paper considers the nature of Situational Awareness and addresses augmented context, Web 2.0, social media the Internet of Things, and the complexity of context. Mobile networks are considered with large-scale distributed systems and Cloud-based solutions. An illustration of the potential usage of collaborative interactions is presented to demonstrate the benefits which may be derived and the challenges faced. The paper closes with a discussion and conclusions including the identification of future directions for research and open research questions. The paper concludes that augmented context and Situational Awareness forms a central role in the effective provision of services going forward in Cloud-based systems accessed using mobile systems.
用户与计算机系统和应用程序交互的方式已经发生了范式转变。这是由“智能”移动设备的日益强大和无处不在、基于云的系统产生的牵引力以及使用软件即服务的服务提供的长期演变所驱动的。这些发展得到了相关网络基础设施迅速和深远发展的支持。本文考虑了态势感知的本质,并讨论了增强环境、Web 2.0、社交媒体、物联网以及环境的复杂性。移动网络被认为是大规模分布式系统和基于云的解决方案。本文还展示了协作交互的潜在用途,以说明可能产生的好处和面临的挑战。本文以讨论和结论结束,包括确定未来的研究方向和开放的研究问题。本文的结论是,在使用移动系统访问的基于云的系统中,增强的环境和态势感知形成了有效提供服务的核心作用。
{"title":"Context and the Cloud: Situational Awareness in Mobile Systems","authors":"P. Moore, Mak Sharma, F. Xhafa, L. Barolli","doi":"10.1109/NBiS.2013.92","DOIUrl":"https://doi.org/10.1109/NBiS.2013.92","url":null,"abstract":"There has been a paradigm shift in the way users interact with computerized systems and applications. This is driven by the increasing power and ubiquity of 'smart' mobile devices and the traction being generated in Cloud-based systems and the long-term evolution in service provision using Software-as-a-Service. These developments are supported by the rapid and far reaching developments in the related networking infrastructures. This paper considers the nature of Situational Awareness and addresses augmented context, Web 2.0, social media the Internet of Things, and the complexity of context. Mobile networks are considered with large-scale distributed systems and Cloud-based solutions. An illustration of the potential usage of collaborative interactions is presented to demonstrate the benefits which may be derived and the challenges faced. The paper closes with a discussion and conclusions including the identification of future directions for research and open research questions. The paper concludes that augmented context and Situational Awareness forms a central role in the effective provision of services going forward in Cloud-based systems accessed using mobile systems.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126510808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Comparison of Moving Sensors and Sink with Static Sink in WSNs 无线传感器网络中移动传感器和静态接收器的性能比较
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.104
L. Barolli, Tao Yang, Elis Kulla, Shinji Sakamoto, Gjergji Mino
In this paper, we study the effect of mobile sink and mobile sensors in WSN performance. The WSNs should allow a systematic deployment of sensor nodes including mobility among them. The disseminated data from the sensor nodes are gathered at the sink node. Data dissemination is the major source for energy consumption in WSNs. We consider goodput, depletion and Routing Efficiency (RE) parameters to evaluate the performance of WSNs considering different speeds of mobile sink and sensor nodes. The simulation results show that when the network is congested (Tr is higher), the goodput decreases. For Static Sink (SS) scenario, the difference between evaluation parameters is not too much. For Moving Sink (MS) scenario, the goodput is higher for 10 m/s and RE is higher when moving speed is 5 m/s.
本文研究了移动接收器和移动传感器对无线传感器网络性能的影响。wsn应该允许系统地部署传感器节点,包括它们之间的移动性。来自传感器节点的散布数据被收集到汇聚节点。数据传播是无线传感器网络能耗的主要来源。考虑移动sink和传感器节点的不同速度,我们考虑了goodput, depletion和Routing Efficiency (RE)参数来评估WSNs的性能。仿真结果表明,当网络拥塞(Tr较高)时,goodput减小。对于静态汇(SS)场景,评估参数之间的差异不会太大。对于移动Sink (Moving Sink)场景,10m /s时goodput较高,5m /s时RE较高。
{"title":"Performance Comparison of Moving Sensors and Sink with Static Sink in WSNs","authors":"L. Barolli, Tao Yang, Elis Kulla, Shinji Sakamoto, Gjergji Mino","doi":"10.1109/NBiS.2013.104","DOIUrl":"https://doi.org/10.1109/NBiS.2013.104","url":null,"abstract":"In this paper, we study the effect of mobile sink and mobile sensors in WSN performance. The WSNs should allow a systematic deployment of sensor nodes including mobility among them. The disseminated data from the sensor nodes are gathered at the sink node. Data dissemination is the major source for energy consumption in WSNs. We consider goodput, depletion and Routing Efficiency (RE) parameters to evaluate the performance of WSNs considering different speeds of mobile sink and sensor nodes. The simulation results show that when the network is congested (Tr is higher), the goodput decreases. For Static Sink (SS) scenario, the difference between evaluation parameters is not too much. For Moving Sink (MS) scenario, the goodput is higher for 10 m/s and RE is higher when moving speed is 5 m/s.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122853988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Faster Scalar Multiplication for Elliptic Curve Cryptosystems 椭圆曲线密码系统的快速标量乘法
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.87
Y. Sakemi, T. Izu, Masaaki Shirase
In Elliptic Curve Cryptosystems (ECC), a scalar multiplication of a base point is the most time-consuming operation. Thus, a lot of improvemnets on the scalar multiplication algorithms have been proposed. In TwC 2013, Shirase introduced a new strategy for computing a scalar multiplication efficiently by transforming a base point to a new base point with its x-coordinate value 0 [Shi13]. In fact, Shirase showed that the strategy is efficient for ECADD in the projective coordinates. This paper applies Shirase's strategy to ECDBL in the projective coordinates, and to ECADD and ECDBL in the Jacobian coordinates, and evaluates the efficiency of Shirase's strategy for computing a scalar multiplication.
在椭圆曲线密码系统(ECC)中,基点的标量乘法是最耗时的运算。因此,对标量乘法算法提出了许多改进。在TwC 2013中,Shirase引入了一种新的策略,通过将基点转换为x坐标值为0的新基点来高效地计算标量乘法[Shi13]。事实上,Shirase证明了该策略在射影坐标下对ECADD是有效的。本文将Shirase策略应用于射影坐标系下的ECDBL,并将其应用于雅可比坐标系下的ECADD和ECDBL,并对Shirase策略计算标量乘法的效率进行了评价。
{"title":"Faster Scalar Multiplication for Elliptic Curve Cryptosystems","authors":"Y. Sakemi, T. Izu, Masaaki Shirase","doi":"10.1109/NBiS.2013.87","DOIUrl":"https://doi.org/10.1109/NBiS.2013.87","url":null,"abstract":"In Elliptic Curve Cryptosystems (ECC), a scalar multiplication of a base point is the most time-consuming operation. Thus, a lot of improvemnets on the scalar multiplication algorithms have been proposed. In TwC 2013, Shirase introduced a new strategy for computing a scalar multiplication efficiently by transforming a base point to a new base point with its x-coordinate value 0 [Shi13]. In fact, Shirase showed that the strategy is efficient for ECADD in the projective coordinates. This paper applies Shirase's strategy to ECDBL in the projective coordinates, and to ECADD and ECDBL in the Jacobian coordinates, and evaluates the efficiency of Shirase's strategy for computing a scalar multiplication.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 16th International Conference on Network-Based Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1