首页 > 最新文献

2012 Fourth International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Context Based Access Control in Pervasive Environments 普适环境中基于上下文的访问控制
Alexandru Petculescu
As current trends show, the Semantic Web is the future interaction environment used in data exchange and integration among homogenous applications. This trend raises new challenges in security models used for access control, and the only acceptable model is to take into account the semantic relations of the interacting entities. In this article we present the access control module used by the Mobile services framework presented in our previous paper: "Web services applied to mobile environments". Finally we present results obtained in the implementation of this module and our conclusions.
正如目前的趋势所示,语义Web是同质应用程序之间用于数据交换和集成的未来交互环境。这一趋势对访问控制使用的安全模型提出了新的挑战,唯一可接受的模型是考虑交互实体的语义关系。在本文中,我们介绍了在我们之前的论文“应用于移动环境的Web服务”中提出的移动服务框架所使用的访问控制模块。最后给出了本模块实施过程中所取得的成果和结论。
{"title":"Context Based Access Control in Pervasive Environments","authors":"Alexandru Petculescu","doi":"10.1109/iNCoS.2012.57","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.57","url":null,"abstract":"As current trends show, the Semantic Web is the future interaction environment used in data exchange and integration among homogenous applications. This trend raises new challenges in security models used for access control, and the only acceptable model is to take into account the semantic relations of the interacting entities. In this article we present the access control module used by the Mobile services framework presented in our previous paper: \"Web services applied to mobile environments\". Finally we present results obtained in the implementation of this module and our conclusions.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Transmission with Broadcasting and Communication 广播通信协同传输
Dongdong Wei, Yun Rui, Yinhui Luo, Mingqi Li, Fang Wang, Yingguan Wang
In this paper, we propose a novel cooperative transmission strategy with broadcasting and cellular communication in a hybrid network system. With the help of cellular base station (CBS), two cooperative schemes are analyzed to improve broadcast performance. We define two thresholds in this paper. For users whose channel quality information (CQI) is less than the low threshold, e.g., the users near the edge of the broadcast cell, we deploy cooperative diversity transmission. Meanwhile, cooperative multiplexing transmission is exploited for users whose CQI is greater than the high threshold, such as those near the broadcasting base station (BBS). Our simulation results validate the effectiveness of our proposed cooperative schemes.
本文提出了一种在混合网络系统中广播和蜂窝通信的协同传输策略。在蜂窝基站(CBS)的帮助下,分析了两种提高广播性能的合作方案。本文定义了两个阈值。对于信道质量信息(CQI)小于低阈值的用户,例如靠近广播小区边缘的用户,我们采用合作分集传输。同时,对于CQI大于高阈值的用户,如靠近广播基站(BBS)的用户,利用协同复用传输。仿真结果验证了所提合作方案的有效性。
{"title":"Cooperative Transmission with Broadcasting and Communication","authors":"Dongdong Wei, Yun Rui, Yinhui Luo, Mingqi Li, Fang Wang, Yingguan Wang","doi":"10.1504/IJES.2013.057086","DOIUrl":"https://doi.org/10.1504/IJES.2013.057086","url":null,"abstract":"In this paper, we propose a novel cooperative transmission strategy with broadcasting and cellular communication in a hybrid network system. With the help of cellular base station (CBS), two cooperative schemes are analyzed to improve broadcast performance. We define two thresholds in this paper. For users whose channel quality information (CQI) is less than the low threshold, e.g., the users near the edge of the broadcast cell, we deploy cooperative diversity transmission. Meanwhile, cooperative multiplexing transmission is exploited for users whose CQI is greater than the high threshold, such as those near the broadcasting base station (BBS). Our simulation results validate the effectiveness of our proposed cooperative schemes.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124993854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards an Ontological Approach to Enrich a Community of Interest in Orthopaedic Specialty 用本体论的方法丰富骨科专业的兴趣共同体
M. E. Riu, David Bañeres, J. Conesa
A community of interest is helpful to professionals to assemble around a common interest and exchange information and experiences. However, the most used communities are too general for some specific areas and they are unable to store and classify relevant information for the community users. In this paper, we propose an approach that can be integrated with existent communities of practice. Moreover, it allows to specify and share the information relevant to the community of practice of orthopaedic based on a wiki. Instead of using a generic wiki where the knowledge is stored in textual format, a semantic wiki is used. This semantic tool, combined with an ontology description of the domain, stores the information in a computer readable format that could provide in the future additional advanced services to the community professionals.
兴趣社区有助于专业人士围绕共同的兴趣聚集在一起,交流信息和经验。然而,最常用的社区对于某些特定领域来说过于一般化,它们无法为社区用户存储和分类相关信息。在本文中,我们提出了一种可以与现有实践社区相结合的方法。此外,它允许在wiki的基础上指定和共享与骨科实践社区相关的信息。使用语义wiki代替以文本格式存储知识的通用wiki。这个语义工具与领域的本体描述相结合,以计算机可读的格式存储信息,可以在将来为社区专业人员提供额外的高级服务。
{"title":"Towards an Ontological Approach to Enrich a Community of Interest in Orthopaedic Specialty","authors":"M. E. Riu, David Bañeres, J. Conesa","doi":"10.1109/iNCoS.2012.81","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.81","url":null,"abstract":"A community of interest is helpful to professionals to assemble around a common interest and exchange information and experiences. However, the most used communities are too general for some specific areas and they are unable to store and classify relevant information for the community users. In this paper, we propose an approach that can be integrated with existent communities of practice. Moreover, it allows to specify and share the information relevant to the community of practice of orthopaedic based on a wiki. Instead of using a generic wiki where the knowledge is stored in textual format, a semantic wiki is used. This semantic tool, combined with an ontology description of the domain, stores the information in a computer readable format that could provide in the future additional advanced services to the community professionals.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interconnectedness of Complex Systems of Internet of Things through Social Network Analysis for Disaster Management 基于灾害管理社会网络分析的物联网复杂系统互联
Asta Zelenkauskaite, N. Bessis, Stelios Sotiriadis, E. Asimakopoulou
This visionary paper presents the Internet of Things paradigm in terms of interdependent dynamic dimensions of objects and their properties. Given that in its current state Internet of Things (IoT) has been viewed as a paradigm based on hierarchical distribution of objects, evaluation of the dynamic nature of the hierarchical structures faces challenges in its evaluation and analysis. Within this in mind, our focus is on the area of complex social networks and the dynamic social network construction within the context of IoT. This is by highlighting and addressing the tagging issues of the objects to the real-world domain such as in disaster management, these are in relation to their hierarchies and interrelation within the context of social network analysis. Specifically, we suggest to investigate and deepen the understanding of the IoT paradigm through the application of social network analysis as a method for interlinking objects -- and thus, propose ways in which IoT could be subsequently interlinked and analyzed through social network analysis approach - which provides possibilities for linking of the objects, while extends it into real-world domain. With this in mind, we present few applications and key characteristics of disaster management and the social networking analysis approach, as well as, foreseen benefits of its application in the IoT domain.
这篇富有远见的论文从对象及其属性的相互依赖的动态维度方面介绍了物联网范式。鉴于物联网(IoT)在其当前状态下被视为基于对象分层分布的范式,对分层结构动态性质的评估和分析面临挑战。考虑到这一点,我们的重点是复杂社会网络领域和物联网背景下的动态社会网络建设。这是通过突出和解决对象在现实世界领域的标记问题,例如在灾难管理中,这些问题与社会网络分析背景下的层次结构和相互关系有关。具体来说,我们建议通过应用社交网络分析作为相互连接对象的方法来调查和深化对物联网范式的理解——因此,提出了物联网随后可以通过社交网络分析方法相互连接和分析的方法——这提供了连接对象的可能性,同时将其扩展到现实世界领域。考虑到这一点,我们提出了灾害管理和社交网络分析方法的一些应用和关键特征,以及其在物联网领域应用的可预见的好处。
{"title":"Interconnectedness of Complex Systems of Internet of Things through Social Network Analysis for Disaster Management","authors":"Asta Zelenkauskaite, N. Bessis, Stelios Sotiriadis, E. Asimakopoulou","doi":"10.1109/iNCoS.2012.25","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.25","url":null,"abstract":"This visionary paper presents the Internet of Things paradigm in terms of interdependent dynamic dimensions of objects and their properties. Given that in its current state Internet of Things (IoT) has been viewed as a paradigm based on hierarchical distribution of objects, evaluation of the dynamic nature of the hierarchical structures faces challenges in its evaluation and analysis. Within this in mind, our focus is on the area of complex social networks and the dynamic social network construction within the context of IoT. This is by highlighting and addressing the tagging issues of the objects to the real-world domain such as in disaster management, these are in relation to their hierarchies and interrelation within the context of social network analysis. Specifically, we suggest to investigate and deepen the understanding of the IoT paradigm through the application of social network analysis as a method for interlinking objects -- and thus, propose ways in which IoT could be subsequently interlinked and analyzed through social network analysis approach - which provides possibilities for linking of the objects, while extends it into real-world domain. With this in mind, we present few applications and key characteristics of disaster management and the social networking analysis approach, as well as, foreseen benefits of its application in the IoT domain.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125370661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
An Advising System for Supporting Users of Collaborative Activities in LMSs 支持lms中协作活动用户的建议系统
T. Chronopoulos, I. Hatzilygeroudis
Learning management systems (LMSs) provide their users with the appropriate environments and tools to author, monitor and engage in collaborative learning activities. The unstructured collaboration spaces and the domain-independent interfaces of those platforms, pose restrictions to the analysis and the evaluation of the collaboration learning process. In this work is presented the design of an advising system, which aims to guide the users of the collaborative activities in a lesson in a LMS, by issuing recommendations and advices on the collaborative learning process. The system uses a fuzzy model to evaluate the learning behaviors of the learners and groups in the collaborative activities across several dimensions. An intelligent agent issues advices and recommendations to the learners and groups of the lesson based on their learning behaviors. The system aims to facilitate management of the collaborative activities in a LMS, by advising the instructors on the design of the collaborative learning experiences and also the learners on self-regulating their learning behaviors. The intelligent system has been partially developed using the Java Agent Development Framework (JADE) for the collaborative activities of Learning Activity Management System (LAMS).
学习管理系统(lms)为其用户提供适当的环境和工具来编写、监控和参与协作学习活动。这些平台的非结构化协作空间和与领域无关的接口限制了协作学习过程的分析和评估。在这项工作中,提出了一个建议系统的设计,该系统旨在通过发布关于协作学习过程的建议和建议来指导LMS课程中协作活动的用户。该系统采用模糊模型跨多个维度评价学习者和小组在协作活动中的学习行为。智能代理根据学习者和课程组的学习行为向他们发出建议和建议。该系统旨在促进LMS中协作活动的管理,为教师提供协作学习体验的设计建议,并为学习者提供自我调节学习行为的建议。该智能系统的部分开发使用Java代理开发框架(JADE),用于学习活动管理系统(LAMS)的协作活动。
{"title":"An Advising System for Supporting Users of Collaborative Activities in LMSs","authors":"T. Chronopoulos, I. Hatzilygeroudis","doi":"10.1109/iNCoS.2012.73","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.73","url":null,"abstract":"Learning management systems (LMSs) provide their users with the appropriate environments and tools to author, monitor and engage in collaborative learning activities. The unstructured collaboration spaces and the domain-independent interfaces of those platforms, pose restrictions to the analysis and the evaluation of the collaboration learning process. In this work is presented the design of an advising system, which aims to guide the users of the collaborative activities in a lesson in a LMS, by issuing recommendations and advices on the collaborative learning process. The system uses a fuzzy model to evaluate the learning behaviors of the learners and groups in the collaborative activities across several dimensions. An intelligent agent issues advices and recommendations to the learners and groups of the lesson based on their learning behaviors. The system aims to facilitate management of the collaborative activities in a LMS, by advising the instructors on the design of the collaborative learning experiences and also the learners on self-regulating their learning behaviors. The intelligent system has been partially developed using the Java Agent Development Framework (JADE) for the collaborative activities of Learning Activity Management System (LAMS).","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126889402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm 基于两跳中继算法的manet移动模型分析
Ying Cai, Xiaofei Wang, Yuqing Zhang
The lack of available and practical analysis about some regular knowledge of mobility models has limit their applications to mobile ad hoc networks. As the mobility models have the great significance effects on the network performance, and meanwhile, existing in-depth researches are mostly based on the i.i.d. mobility model which is a way of globe move, the desire for the effective and reasonable applications of the two-hop relay algorithms to other more realistic mobility models contributes to this paper. We focus on a time-slotted finite network system in order to simplify the complex probabilistic description process of the non-i.i.d. mobility models and we develop some general probability analysis under various mobility solutions. We further put forward some conditions that can make the behaviors of the special mobility models approximately equivalent to that of the i.i.d mobility model. Related simulation studies are also conducted to demonstrate that the different mobility models might have similar influences on the capacity and delay of a mobile ad hoc network.
由于缺乏对移动模型的一些常规知识的可用和实用分析,限制了它们在移动自组织网络中的应用。由于移动模型对网络性能有重要的影响,同时现有的深入研究大多是基于i.i.d移动模型这一全球移动方式,因此希望将两跳中继算法有效合理地应用到其他更现实的移动模型中,这是本文的出发点。为了简化复杂的概率描述过程,我们研究了一个时隙有限网络系统。并在不同的移动性解下进行了一般概率分析。我们进一步提出了一些条件,使特殊移动模型的行为近似等价于普通移动模型的行为。相关的仿真研究也表明,不同的移动模型对移动自组网的容量和延迟可能有相似的影响。
{"title":"The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm","authors":"Ying Cai, Xiaofei Wang, Yuqing Zhang","doi":"10.1109/iNCoS.2012.12","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.12","url":null,"abstract":"The lack of available and practical analysis about some regular knowledge of mobility models has limit their applications to mobile ad hoc networks. As the mobility models have the great significance effects on the network performance, and meanwhile, existing in-depth researches are mostly based on the i.i.d. mobility model which is a way of globe move, the desire for the effective and reasonable applications of the two-hop relay algorithms to other more realistic mobility models contributes to this paper. We focus on a time-slotted finite network system in order to simplify the complex probabilistic description process of the non-i.i.d. mobility models and we develop some general probability analysis under various mobility solutions. We further put forward some conditions that can make the behaviors of the special mobility models approximately equivalent to that of the i.i.d mobility model. Related simulation studies are also conducted to demonstrate that the different mobility models might have similar influences on the capacity and delay of a mobile ad hoc network.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127378480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing 云计算中高效安全的批量运算外包
Xu Ma, Jin Li, Fangguo Zhang
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for security when users want to securely outsource the computation of cryptographic operations to the untrusted cloud servers. As we know, modular exponentiation is one of basic operations among most of current cryptosystems. In this paper, we present two generic secure outsourcing schemes enabling users to securely outsource the computations of exponentiations to cloud servers. The first one is a secure outsourcing scheme for fixed base-variable exponent exponentiation, while the second is for fixed exponent-variable base exponentiation. With our techniques, a batch of exponentiations (eg. t exponentiations) can be efficiently computed by the user with only (n+t) multiplications, where n is the number of bits of the exponent. Furthermore, there is not any pre-computation on the user side. The schemes are proved to be secure under the Hidden Subset Sum Problem.
云计算是一种新兴的计算范式,其中IT资源和能力作为服务在互联网上提供。尽管这种模式很有前景,但当用户希望将加密操作的计算安全地外包给不受信任的云服务器时,这种模式也给安全性带来了新的挑战。模幂运算是目前大多数密码系统的基本运算之一。在本文中,我们提出了两种通用的安全外包方案,使用户能够安全地将指数计算外包给云服务器。第一种是固定基数-可变基数求幂的安全外包方案,第二种是固定基数-可变基数求幂的安全外包方案。使用我们的技术,一批幂运算(例如:用户只需(n+ T)次乘法就可以有效地计算T次幂,其中n是指数的位数。此外,在用户端没有任何预计算。在隐子集和问题下证明了该方案的安全性。
{"title":"Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing","authors":"Xu Ma, Jin Li, Fangguo Zhang","doi":"10.1109/iNCoS.2012.31","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.31","url":null,"abstract":"Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for security when users want to securely outsource the computation of cryptographic operations to the untrusted cloud servers. As we know, modular exponentiation is one of basic operations among most of current cryptosystems. In this paper, we present two generic secure outsourcing schemes enabling users to securely outsource the computations of exponentiations to cloud servers. The first one is a secure outsourcing scheme for fixed base-variable exponent exponentiation, while the second is for fixed exponent-variable base exponentiation. With our techniques, a batch of exponentiations (eg. t exponentiations) can be efficiently computed by the user with only (n+t) multiplications, where n is the number of bits of the exponent. Furthermore, there is not any pre-computation on the user side. The schemes are proved to be secure under the Hidden Subset Sum Problem.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115269689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Game-Theoretic Resource Allocation of the Cognitive Base Station in Two-Tie Co-existing Femtocell Networks 双tie共存移动蜂窝网络中认知基站的博弈论资源分配
Jing Song, J. Ge, Jing Li, L. Cong
Femtocells will be widely employed in the next generation wireless networks since they improve indoor capacity and coverage with low cost and low power characteristics. However since macro cells may have to share the same spectrum with femtocells, resource allocation schemes have been a key challenge to manage interference. In this paper, we propose a novel resource allocation scheme based on cognitive technologies and cooperative game theory. The competition among the Femtocell Access Points (FAPs) for spectrum resource and power resource is formulated as a game-theoretic problem. We solve the problem by integrating Dynamic Sub carrier Allocation (DSA) algorithm and Adaptive Power Allocation (APA) algorithm implemented by the cognitive macro cell Base Station, so that the interference is reduced and the transmitting rate is increased. Simulation results show that compared with the max-rate algorithm and max-min fairness algorithm, the scheme we proposed achieves a better trade-off between the transmitting rate and the fairness.
Femtocells将广泛应用于下一代无线网络,因为它们具有低成本和低功率特性,可以提高室内容量和覆盖范围。然而,由于宏基站可能必须与飞基站共享相同的频谱,资源分配方案已成为管理干扰的关键挑战。本文提出了一种基于认知技术和合作博弈论的资源分配方案。无线基站接入点之间对频谱资源和功率资源的竞争是一个博弈论问题。通过集成认知宏蜂窝基站实现的动态子载波分配(DSA)算法和自适应功率分配(APA)算法来解决这一问题,降低了干扰,提高了传输速率。仿真结果表明,与最大速率算法和最大最小公平性算法相比,我们提出的方案在传输速率和公平性之间实现了更好的权衡。
{"title":"Game-Theoretic Resource Allocation of the Cognitive Base Station in Two-Tie Co-existing Femtocell Networks","authors":"Jing Song, J. Ge, Jing Li, L. Cong","doi":"10.1109/iNCoS.2012.49","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.49","url":null,"abstract":"Femtocells will be widely employed in the next generation wireless networks since they improve indoor capacity and coverage with low cost and low power characteristics. However since macro cells may have to share the same spectrum with femtocells, resource allocation schemes have been a key challenge to manage interference. In this paper, we propose a novel resource allocation scheme based on cognitive technologies and cooperative game theory. The competition among the Femtocell Access Points (FAPs) for spectrum resource and power resource is formulated as a game-theoretic problem. We solve the problem by integrating Dynamic Sub carrier Allocation (DSA) algorithm and Adaptive Power Allocation (APA) algorithm implemented by the cognitive macro cell Base Station, so that the interference is reduced and the transmitting rate is increased. Simulation results show that compared with the max-rate algorithm and max-min fairness algorithm, the scheme we proposed achieves a better trade-off between the transmitting rate and the fairness.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126690538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Management of Software Driven Networks - Research Challenges 软件驱动网络的管理-研究挑战
A. Galis, S. Clayman
In this position paper we present a new networking framework -- SdNET - that integrates software driven features with the management features of modern autonomic network management, and many service features from the world of Services. This framework is under development and validation.
在这篇意见书中,我们提出了一个新的网络框架——SdNET——它集成了软件驱动的特性和现代自主网络管理的管理特性,以及来自服务世界的许多服务特性。该框架正在开发和验证中。
{"title":"Management of Software Driven Networks - Research Challenges","authors":"A. Galis, S. Clayman","doi":"10.1109/iNCoS.2012.122","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.122","url":null,"abstract":"In this position paper we present a new networking framework -- SdNET - that integrates software driven features with the management features of modern autonomic network management, and many service features from the world of Services. This framework is under development and validation.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme 基于身份的多用途cca安全代理重加密方案的安全性分析
Jindan Zhang, Xu An Wang
In proxy re-encryption (PRE), a semi-trusted proxy can convert a cipher text originally intended for Alice into one which can be decrypted by Bob, while the proxy can not know the underlying plaintext. In multi-use PRE schemes, the cipher text can be transformed from Alice to Bob and to Charlie and so on. Due to its cipher text transformation property, it is difficult to achieve chosen cipher text security for PRE, especially for multi-use PRE. IBE is a new kind of public-key encryption where the recipient's public key is an arbitrary string that represents the recipient's identity. Identity based proxy re-encryption (IBPRE) is a primitive combing the feature of IBE and PRE. Recently Wang et al. proposed a multi-use unidirectional CCA-secure identity based proxy re-encryption (IBPRE) scheme. Unfortunately, we show their proposal is not CCA-secure in the corresponding security models by giving concrete attacks.
在代理再加密(PRE)中,一个半可信的代理可以将原本为Alice准备的密文转换为Bob可以解密的密文,而代理不知道底层的明文。在多用途PRE方案中,密文可以从Alice转换为Bob和Charlie等。由于PRE具有密文转换的特性,其选择密文的安全性难以实现,对于多用途PRE尤其如此。IBE是一种新的公钥加密,其中接收者的公钥是表示接收者身份的任意字符串。基于身份的代理再加密(IBPRE)是结合了IBE和代理再加密特性的一种原语。最近,Wang等人提出了一种多用途单向ca安全身份代理重加密(IBPRE)方案。不幸的是,我们通过给出具体的攻击来证明他们的提议在相应的安全模型中不是cca安全的。
{"title":"Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme","authors":"Jindan Zhang, Xu An Wang","doi":"10.1109/iNCoS.2012.52","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.52","url":null,"abstract":"In proxy re-encryption (PRE), a semi-trusted proxy can convert a cipher text originally intended for Alice into one which can be decrypted by Bob, while the proxy can not know the underlying plaintext. In multi-use PRE schemes, the cipher text can be transformed from Alice to Bob and to Charlie and so on. Due to its cipher text transformation property, it is difficult to achieve chosen cipher text security for PRE, especially for multi-use PRE. IBE is a new kind of public-key encryption where the recipient's public key is an arbitrary string that represents the recipient's identity. Identity based proxy re-encryption (IBPRE) is a primitive combing the feature of IBE and PRE. Recently Wang et al. proposed a multi-use unidirectional CCA-secure identity based proxy re-encryption (IBPRE) scheme. Unfortunately, we show their proposal is not CCA-secure in the corresponding security models by giving concrete attacks.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1