首页 > 最新文献

2012 Fourth International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
DCCA-Secure Public-Key Encryptions from Hybrid Paradigms 基于混合范式的dcca安全公钥加密
Yuan Chen, Xiaofeng Chen, Hui Li
Detectable Chosen Cipher text Security (DCCA security) is a security notion for Public-Key Encryptions proposed recently in [1]. A DCCA-secure encryption is not necessarily CCA-secure, but dangerous decryption queries can be detected and are not allowed to be requested to the decryption oracle. DCCA-secure schemes may helps in constructing of CCA-secure ones. In this paper, we show there are already DCCA-secure public-key encryptions from popular KEM+DEM style hybrid paradigms, and passive security for DEM is sufficient for achieving DCCA-secure hybrid PKEs both for KEM+DEM and Tag-KEM/DEM paradigms. Furthermore, two DCCA-secure Public-Key schemes constructed from CCA secure KEMs by using hybrid paradigms are presented, which fall outside any of the three cases pointed out in [1].
可检测选择密文安全(DCCA Security)是b[1]最近提出的一种针对公钥加密的安全概念。dcca安全的加密不一定是cca安全的,但是可以检测到危险的解密查询,并且不允许向解密oracle请求。dcca安全方案有助于构建cca安全方案。在本文中,我们展示了来自流行的KEM+DEM风格混合范例的dcca安全公钥加密,并且DEM的被动安全性足以实现KEM+DEM和标签-KEM/DEM范例的dcca安全混合密钥加密。此外,本文还提出了两种基于CCA安全密钥管理机制的dcca安全公钥方案,它们不属于[1]中所指出的三种情况。
{"title":"DCCA-Secure Public-Key Encryptions from Hybrid Paradigms","authors":"Yuan Chen, Xiaofeng Chen, Hui Li","doi":"10.1109/iNCoS.2012.29","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.29","url":null,"abstract":"Detectable Chosen Cipher text Security (DCCA security) is a security notion for Public-Key Encryptions proposed recently in [1]. A DCCA-secure encryption is not necessarily CCA-secure, but dangerous decryption queries can be detected and are not allowed to be requested to the decryption oracle. DCCA-secure schemes may helps in constructing of CCA-secure ones. In this paper, we show there are already DCCA-secure public-key encryptions from popular KEM+DEM style hybrid paradigms, and passive security for DEM is sufficient for achieving DCCA-secure hybrid PKEs both for KEM+DEM and Tag-KEM/DEM paradigms. Furthermore, two DCCA-secure Public-Key schemes constructed from CCA secure KEMs by using hybrid paradigms are presented, which fall outside any of the three cases pointed out in [1].","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Strong Designated Verifier Signature Scheme with Secure Disavowability 具有安全可否认性的强指定验证者签名方案
Bo Yang, Ying Sun, Yong Yu, Qi Xia
Designated verifier signature (DVS) is a cryptographic primitive, which allows a signer to convince a designated verifier of the validity of a signed statement and prevents the verifier from convincing any third party about the signature. As a variant of DVS, strong DVS (SDVS), which exhibits perfect non-transferability, does not accommodate secure disavow ability (or non-repudiation). It makes a SDVS more like a message authentication code rather than a digital signature. In this situation, the signer has to bear the responsibility of some "forged" signatures produced by the designated verifier. Therefore, it's interesting to construct a strong DVS scheme with secure disavow ability. In this paper, we address this problem with a novel construction of a SDVS scheme with secure disavow ability. The new scheme utilizes a chameleon hash function and supports the signer to have a complete control of his signature. Our scheme achieves unforgeability, non-transferability and secure disavow ability. Comparisons show that the new scheme outperforms the existing one in terms of computational efficiency and signature length.
指定验证者签名(DVS)是一种加密原语,它允许签名者使指定验证者相信已签名声明的有效性,并防止验证者向任何第三方证明签名的有效性。强分布式交换机(SDVS)作为分布式交换机的一种变体,具有完全的不可转移性,但不支持安全否认能力(或不可否认性)。它使sdv更像是消息身份验证代码,而不是数字签名。在这种情况下,签名者必须承担由指定的验证者产生的一些“伪造”签名的责任。因此,构建具有安全拒绝能力的强分布式交换机方案是一个有趣的问题。在本文中,我们通过一种具有安全拒绝能力的sdv方案的新结构来解决这个问题。新方案利用变色龙哈希函数,支持签名者完全控制自己的签名。该方案实现了不可伪造性、不可转移性和安全可否认性。比较表明,新方案在计算效率和签名长度方面都优于现有方案。
{"title":"A Strong Designated Verifier Signature Scheme with Secure Disavowability","authors":"Bo Yang, Ying Sun, Yong Yu, Qi Xia","doi":"10.1109/iNCoS.2012.24","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.24","url":null,"abstract":"Designated verifier signature (DVS) is a cryptographic primitive, which allows a signer to convince a designated verifier of the validity of a signed statement and prevents the verifier from convincing any third party about the signature. As a variant of DVS, strong DVS (SDVS), which exhibits perfect non-transferability, does not accommodate secure disavow ability (or non-repudiation). It makes a SDVS more like a message authentication code rather than a digital signature. In this situation, the signer has to bear the responsibility of some \"forged\" signatures produced by the designated verifier. Therefore, it's interesting to construct a strong DVS scheme with secure disavow ability. In this paper, we address this problem with a novel construction of a SDVS scheme with secure disavow ability. The new scheme utilizes a chameleon hash function and supports the signer to have a complete control of his signature. Our scheme achieves unforgeability, non-transferability and secure disavow ability. Comparisons show that the new scheme outperforms the existing one in terms of computational efficiency and signature length.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Composability Model for Efficient Web Service's Connectivity 高效Web服务连接的可组合性模型
Hajar Omrana, Fatima-Zahra Belouadha, O. Roudiès
Web services composition's efficiency strongly depends on the composability paradigm. In this paper, we propose a composability model for Web services that defines a set of composability rules and captures all information needed to verify the interconnection of services. Our proposal essentially deals with functional, non-functional and technical aspects, at both syntactic and semantic levels. It's based on WSDL, SAWSDL and WS-Policy's descriptions.
Web服务组合的效率很大程度上依赖于可组合性范式。在本文中,我们提出了Web服务的可组合性模型,该模型定义了一组可组合性规则,并捕获验证服务互连所需的所有信息。我们的建议主要涉及功能、非功能和技术方面,包括句法和语义层面。它基于WSDL、SAWSDL和WS-Policy的描述。
{"title":"A Composability Model for Efficient Web Service's Connectivity","authors":"Hajar Omrana, Fatima-Zahra Belouadha, O. Roudiès","doi":"10.1109/iNCoS.2012.21","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.21","url":null,"abstract":"Web services composition's efficiency strongly depends on the composability paradigm. In this paper, we propose a composability model for Web services that defines a set of composability rules and captures all information needed to verify the interconnection of services. Our proposal essentially deals with functional, non-functional and technical aspects, at both syntactic and semantic levels. It's based on WSDL, SAWSDL and WS-Policy's descriptions.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive Security Framework for Wireless Sensor Networks 无线传感器网络的自适应安全框架
L. Gheorghe, R. Rughinis, N. Tapus
Wireless Sensor Networks are used in a large number of tracking and monitoring applications. The level of security required by an application depends on the threat level, available resources, and security requirements. In this paper, we present a modular and extensible framework, called Adaptive Security Framework (ASF) that adjusts security to the detected threats, available energy and memory, and application requirements. The framework includes three types of components: the Context modules, the Security Adaptation module, and the Security layer. The security level is modified according to the output of the Context modules, and it is then used to enable the appropriate security primitives available in the Security layer. We evaluate our solution in multiple attack scenarios, we determine its resource consumption and we compare it to other State of the Art solutions. Our framework has the following advantages: it takes into consideration the context, but also allows for manual reconfiguration, it has a global, aggregated view of the context, it provides different authentication and encryption algorithms associated to each security level, it is extensible and modular.
无线传感器网络被用于大量的跟踪和监控应用。应用程序所需的安全级别取决于威胁级别、可用资源和安全需求。在本文中,我们提出了一个模块化和可扩展的框架,称为自适应安全框架(ASF),它根据检测到的威胁、可用的能量和内存以及应用需求来调整安全性。该框架包括三种类型的组件:上下文模块、安全适配模块和安全层。根据Context模块的输出修改安全级别,然后使用它来启用安全层中可用的适当安全原语。我们在多种攻击场景中评估我们的解决方案,确定其资源消耗,并将其与其他最先进的解决方案进行比较。我们的框架具有以下优点:它考虑了上下文,但也允许手动重新配置,它具有上下文的全局聚合视图,它提供与每个安全级别相关的不同身份验证和加密算法,它是可扩展和模块化的。
{"title":"Adaptive Security Framework for Wireless Sensor Networks","authors":"L. Gheorghe, R. Rughinis, N. Tapus","doi":"10.1109/iNCoS.2012.94","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.94","url":null,"abstract":"Wireless Sensor Networks are used in a large number of tracking and monitoring applications. The level of security required by an application depends on the threat level, available resources, and security requirements. In this paper, we present a modular and extensible framework, called Adaptive Security Framework (ASF) that adjusts security to the detected threats, available energy and memory, and application requirements. The framework includes three types of components: the Context modules, the Security Adaptation module, and the Security layer. The security level is modified according to the output of the Context modules, and it is then used to enable the appropriate security primitives available in the Security layer. We evaluate our solution in multiple attack scenarios, we determine its resource consumption and we compare it to other State of the Art solutions. Our framework has the following advantages: it takes into consideration the context, but also allows for manual reconfiguration, it has a global, aggregated view of the context, it provides different authentication and encryption algorithms associated to each security level, it is extensible and modular.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129253356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Benchmark for Evaluating Approximated Algorithms for Fair Wireless Channel Allocation 评估无线信道公平分配近似算法的基准
Rodrigo Verschae, M. Köppen, M. Tsuru
We present a benchmark for the performance evaluation of heuristic and meta-heuristic approaches to fair distribution of indivisible goods. The specific problem reflected by the benchmark data sets is Wireless Channel Allocation (WCA), and the approach to fair distribution is to choose from feasible allocations by the maximum set of a fairness relation between their corresponding allocation performances. The effort for exhaustive search for such maximum sets is rapidly increasing and even problems with 10 users may already be beyond today's computing capabilities. Here we present the results for up to 7 users and also discuss some general aspects of using fairness relations in the prescribed manner, also indicating the efficiency of the approach in terms of establishing rather small maximum sets with much overlap of maximal elements among different fairness relations.
我们提出了对不可分割商品公平分配的启发式和元启发式方法的性能评估基准。基准数据集反映的具体问题是无线信道分配(Wireless Channel Allocation, WCA),实现公平分配的方法是通过其对应分配性能之间公平关系的最大集从可行分配中进行选择。对这种最大集合进行详尽搜索的努力正在迅速增加,甚至10个用户的问题可能已经超出了今天的计算能力。在这里,我们给出了最多7个用户的结果,并讨论了以规定的方式使用公平关系的一些一般方面,也表明了该方法在建立相当小的最大集方面的效率,在不同的公平关系中最大元素有很多重叠。
{"title":"A Benchmark for Evaluating Approximated Algorithms for Fair Wireless Channel Allocation","authors":"Rodrigo Verschae, M. Köppen, M. Tsuru","doi":"10.1109/iNCoS.2012.109","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.109","url":null,"abstract":"We present a benchmark for the performance evaluation of heuristic and meta-heuristic approaches to fair distribution of indivisible goods. The specific problem reflected by the benchmark data sets is Wireless Channel Allocation (WCA), and the approach to fair distribution is to choose from feasible allocations by the maximum set of a fairness relation between their corresponding allocation performances. The effort for exhaustive search for such maximum sets is rapidly increasing and even problems with 10 users may already be beyond today's computing capabilities. Here we present the results for up to 7 users and also discuss some general aspects of using fairness relations in the prescribed manner, also indicating the efficiency of the approach in terms of establishing rather small maximum sets with much overlap of maximal elements among different fairness relations.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115393483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack 可否认的信息隐藏加密安全的自适应选择密文攻击
Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian
The deniably information-hiding encryption (DIHE) is a type of deniable encryption which can hide an additional information in encrypting a normal message. Even if the sender or the receiver is coerced to show the plaintext and the random coins in the encryption, a DIHE scheme behaves like only an innocent message is encrypted. Because it protects privacy against malicious coercer, the DIHE scheme is very useful in communication systems such as the cloud storage system when the communication channel is eavesdropped by a coercer. Previous DIHE schemes only concern the security under the adversary's chosen plaintext attack (CPA). This paper proposes the first DIHE construction with deniability and indistinguishability against adaptive chosen cipher text attack (CCA) which is stronger than the CPA attack. Our construction is simple and easy to implement. Furthermore, it achieves simultaneous sender and receiver deniability with negligible detection advantage.
可否认信息隐藏加密(DIHE)是一种可否认的加密,它可以在对正常消息进行加密时隐藏额外的信息。即使强制发送方或接收方显示加密中的明文和随机硬币,DIHE方案的行为也像只加密无辜的消息一样。由于DIHE方案可以保护隐私免受恶意干扰,因此在通信信道被干扰者窃听时,DIHE方案在云存储系统等通信系统中非常有用。以前的DIHE方案只考虑对手选择的明文攻击(CPA)下的安全性。针对自适应选择密文攻击(CCA),提出了一种具有可否认性和不可区分性的DIHE结构,该结构比自适应选择密文攻击更强。我们的构造简单,易于实现。此外,它实现了同时发送方和接收方的可否认性,而检测优势可以忽略不计。
{"title":"Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack","authors":"Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian","doi":"10.1109/iNCoS.2012.88","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.88","url":null,"abstract":"The deniably information-hiding encryption (DIHE) is a type of deniable encryption which can hide an additional information in encrypting a normal message. Even if the sender or the receiver is coerced to show the plaintext and the random coins in the encryption, a DIHE scheme behaves like only an innocent message is encrypted. Because it protects privacy against malicious coercer, the DIHE scheme is very useful in communication systems such as the cloud storage system when the communication channel is eavesdropped by a coercer. Previous DIHE schemes only concern the security under the adversary's chosen plaintext attack (CPA). This paper proposes the first DIHE construction with deniability and indistinguishability against adaptive chosen cipher text attack (CCA) which is stronger than the CPA attack. Our construction is simple and easy to implement. Furthermore, it achieves simultaneous sender and receiver deniability with negligible detection advantage.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121184162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SOSCast: Location Estimation of Immobilized Persons through SOS Message Propagation SOSCast:通过SOS信息传播来估计固定人员的位置
Noriyuki Suzuki, J. L. Zamora, S. Kashihara, S. Yamaguchi
This paper proposes the design of SOS Cast, an application that will assist the search for immobilized persons in a disaster area. When a catastrophic disaster such as an earthquake or tsunami occurs, people may be injured and trapped in damaged buildings and debris. Note that a prompt rescue operation during the first 72 hours is critical in saving many lives. However, it is difficult for immobilized persons to ask for help because conventional communication services such as cellular phone networks are quite likely to be severely damaged. In a particular affected area, the SOS Cast propagates SOS messages from immobilized persons through a direct communication between smart phones. By collecting these SOS messages, rescuers can estimate the locations of the immobilized persons and view it on their smart phones. We have shown in our preliminary experiment within a residential area that SOS Cast is capable of estimating the location of an immobilized person based on the collected SOS messages.
本文提出了SOS Cast的设计,这是一个帮助在灾区寻找无法行动人员的应用程序。当地震或海啸等灾难性灾难发生时,人们可能会受伤或被困在受损的建筑物和废墟中。请注意,在最初72小时内迅速采取救援行动对于挽救许多生命至关重要。但是,行动不便的人很难寻求帮助,因为蜂窝电话网络等传统通信服务很可能受到严重破坏。在特定的受灾地区,SOS Cast通过智能手机之间的直接通信传播来自无法行动的人的SOS信息。通过收集这些SOS信息,救援人员可以估计被困人员的位置,并在智能手机上查看。我们已经在居民区的初步实验中表明,SOS Cast能够根据收集到的SOS信息估计无法移动的人的位置。
{"title":"SOSCast: Location Estimation of Immobilized Persons through SOS Message Propagation","authors":"Noriyuki Suzuki, J. L. Zamora, S. Kashihara, S. Yamaguchi","doi":"10.1109/iNCoS.2012.101","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.101","url":null,"abstract":"This paper proposes the design of SOS Cast, an application that will assist the search for immobilized persons in a disaster area. When a catastrophic disaster such as an earthquake or tsunami occurs, people may be injured and trapped in damaged buildings and debris. Note that a prompt rescue operation during the first 72 hours is critical in saving many lives. However, it is difficult for immobilized persons to ask for help because conventional communication services such as cellular phone networks are quite likely to be severely damaged. In a particular affected area, the SOS Cast propagates SOS messages from immobilized persons through a direct communication between smart phones. By collecting these SOS messages, rescuers can estimate the locations of the immobilized persons and view it on their smart phones. We have shown in our preliminary experiment within a residential area that SOS Cast is capable of estimating the location of an immobilized person based on the collected SOS messages.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114412963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
End-to-End Header Compression over Software-Defined Networks: A Low Latency Network Architecture 端到端报头压缩在软件定义网络:一个低延迟的网络架构
Supalerk Jivorasetkul, M. Shimamura, K. Iida
The overhead portion especially for a small packet is one of the most significant parameters that can lower the efficiency of the link utilization. Therefore, many traditional hop-by-hop header compression techniques were introduced to reduce the amount of packet header before transmission. However, those techniques still cannot overcome the time performance issue as compression mechanism requires longer processing time. In the time-sensitive applications such as VoIP, high network latency can lead to voice quality problems. To improve the time performance, instead of using hop-by-hop basis, the authors propose a new header compression mechanism which can be deployed in end-to-end nodes using the Software-Defined Network concept. This mechanism can reduce both packet size and time delay. This research will show the results of round-trip time between our end-to-end header compression mechanism, multiple hop-by-hop header compression mechanism, and normal IP routing algorithm.
开销部分是降低链路利用率的最重要参数之一,特别是对于小数据包而言。因此,为了减少传输前的包头数量,引入了许多传统的逐跳报头压缩技术。然而,这些技术仍然不能克服时间性能问题,因为压缩机制需要更长的处理时间。在VoIP等对时间敏感的应用中,高网络延迟会导致语音质量问题。为了提高报头压缩的时间性能,作者提出了一种新的报头压缩机制,该机制可以使用软件定义网络的概念部署在端到端节点上。这种机制可以减少数据包大小和时间延迟。本研究将展示端到端报头压缩机制、多跳逐跳报头压缩机制和普通IP路由算法之间往返时间的结果。
{"title":"End-to-End Header Compression over Software-Defined Networks: A Low Latency Network Architecture","authors":"Supalerk Jivorasetkul, M. Shimamura, K. Iida","doi":"10.1109/iNCoS.2012.80","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.80","url":null,"abstract":"The overhead portion especially for a small packet is one of the most significant parameters that can lower the efficiency of the link utilization. Therefore, many traditional hop-by-hop header compression techniques were introduced to reduce the amount of packet header before transmission. However, those techniques still cannot overcome the time performance issue as compression mechanism requires longer processing time. In the time-sensitive applications such as VoIP, high network latency can lead to voice quality problems. To improve the time performance, instead of using hop-by-hop basis, the authors propose a new header compression mechanism which can be deployed in end-to-end nodes using the Software-Defined Network concept. This mechanism can reduce both packet size and time delay. This research will show the results of round-trip time between our end-to-end header compression mechanism, multiple hop-by-hop header compression mechanism, and normal IP routing algorithm.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126728323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Distributed Image Encoding Scheme Using LDPC Codes over GF(q) on Wireless Sensor Networks 无线传感器网络中基于GF(q)的LDPC码分布式图像编码方案
P. N. Huu, Vinh Tran-Quang, T. Miyoshi
This work reports an image encoding scheme that distributes low-density parity-check (LDPC) encoding over a prime field of order q, GF(q), on a wireless sensor network (WSN). In the scheme, we divide the input data into several small parts, which are then distributed to multiple nodes to perform a LDPC encoding task in a cluster. We conducted extensive computational simulations to verify our method and found that the LDPC codes over GF(4) achieve a fair trade off between the bit error rate (BER) and power consumption criteria. As a result, the proposed scheme of using LDPC codes over GF(4) not only solves the energy balance problem by sharing processing tasks but also increases the data quality.
本研究报告了一种在无线传感器网络(WSN)上,将低密度奇偶校验(LDPC)编码分布在q阶素域GF(q)上的图像编码方案。在该方案中,我们将输入数据分成几个小部分,然后将这些小部分分发到多个节点,在集群中执行LDPC编码任务。我们进行了大量的计算模拟来验证我们的方法,并发现GF(4)上的LDPC码在误码率(BER)和功耗标准之间实现了公平的权衡。因此,本文提出的在GF(4)上使用LDPC码的方案不仅通过共享处理任务解决了能量平衡问题,而且提高了数据质量。
{"title":"Distributed Image Encoding Scheme Using LDPC Codes over GF(q) on Wireless Sensor Networks","authors":"P. N. Huu, Vinh Tran-Quang, T. Miyoshi","doi":"10.1109/iNCoS.2012.34","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.34","url":null,"abstract":"This work reports an image encoding scheme that distributes low-density parity-check (LDPC) encoding over a prime field of order q, GF(q), on a wireless sensor network (WSN). In the scheme, we divide the input data into several small parts, which are then distributed to multiple nodes to perform a LDPC encoding task in a cluster. We conducted extensive computational simulations to verify our method and found that the LDPC codes over GF(4) achieve a fair trade off between the bit error rate (BER) and power consumption criteria. As a result, the proposed scheme of using LDPC codes over GF(4) not only solves the energy balance problem by sharing processing tasks but also increases the data quality.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127868446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Biomechanical Validation of Upper-Body and Lower-Body Joint Movements of Kinect Motion Capture Data for Rehabilitation Treatments 用于康复治疗的Kinect动作捕捉数据的上半身和下半身关节运动的生物力学验证
A. Fernández-Baena, A. Susín, Xavier Lligadas
New and powerful hardware like Kinect introduces the possibility of changing biomechanics paradigm, usually based on expensive and complex equipment. Kinect is a markerless and cheap technology recently introduced from videogame industry. In this work we conduct a comparison study of the precision in the computation of joint angles between Kinect and an optical motion capture professional system. We obtain a range of disparity that guaranties enough precision for most of the clinical rehabilitation treatments prescribed nowadays for patients. This way, an easy and cheap validation of these treatments can be obtained automatically, ensuring a better quality control process for the patient's rehabilitation.
像Kinect这样的新型且强大的硬件引入了改变生物力学范式的可能性,通常基于昂贵且复杂的设备。Kinect是最近从视频游戏行业引进的一种无标记且廉价的技术。在这项工作中,我们对Kinect和光学动作捕捉专业系统之间关节角度计算精度进行了比较研究。我们获得的差距范围,保证足够的精度,大多数临床康复治疗规定,目前为患者。通过这种方式,可以轻松、廉价地自动验证这些治疗方法,确保患者康复的质量控制过程更好。
{"title":"Biomechanical Validation of Upper-Body and Lower-Body Joint Movements of Kinect Motion Capture Data for Rehabilitation Treatments","authors":"A. Fernández-Baena, A. Susín, Xavier Lligadas","doi":"10.1109/iNCoS.2012.66","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.66","url":null,"abstract":"New and powerful hardware like Kinect introduces the possibility of changing biomechanics paradigm, usually based on expensive and complex equipment. Kinect is a markerless and cheap technology recently introduced from videogame industry. In this work we conduct a comparison study of the precision in the computation of joint angles between Kinect and an optical motion capture professional system. We obtain a range of disparity that guaranties enough precision for most of the clinical rehabilitation treatments prescribed nowadays for patients. This way, an easy and cheap validation of these treatments can be obtained automatically, ensuring a better quality control process for the patient's rehabilitation.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133624695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 311
期刊
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1