首页 > 最新文献

2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)最新文献

英文 中文
Privacy Risks in Resource Constrained Smart Micro-Grids 资源受限智能微电网中的隐私风险
Pacome L. Ambassa, Anne Kayem, S. Wolthusen, C. Meinel
In rural/remote areas, resource constrained smart micro-grid (RCSMG) architectures can offer a cost-effective power management and supply alternative to national power grid connections. RCSMG architectures handle communications over distributed lossy networks to minimize operation costs. However, the unreliable nature of lossy networks makes privacy an important consideration. Existing anonymisation works on data perturbation work mainly by distortion with additive noise. Apply these solutions to RCSMGs is problematic, because deliberate noise additions must be distinguishable both from system and adversarial generated noise. In this paper, we present a brief survey of privacy risks in RCSMGs centered on inference, and propose a method of mitigating these risks. The lesson here is that while RCSMGs give users more control over power management and distribution, good anonymisation is essential to protecting personal information on RCSMGs.
在农村/偏远地区,资源受限的智能微电网(RCSMG)架构可以提供具有成本效益的电源管理,并为国家电网连接提供替代方案。RCSMG架构处理分布式有损网络上的通信,以最小化操作成本。然而,有损网络的不可靠特性使得隐私成为一个重要的考虑因素。现有的数据扰动匿名化工作主要是通过加性噪声的失真来实现的。将这些解决方案应用于rcsmg是有问题的,因为故意添加的噪声必须与系统和对抗产生的噪声区分开来。本文简要介绍了以推理为中心的rcsmg中的隐私风险,并提出了一种降低这些风险的方法。这里的教训是,虽然rcsmg让用户对电源管理和分配有更多的控制,但良好的匿名性对于保护rcsmg上的个人信息至关重要。
{"title":"Privacy Risks in Resource Constrained Smart Micro-Grids","authors":"Pacome L. Ambassa, Anne Kayem, S. Wolthusen, C. Meinel","doi":"10.1109/WAINA.2018.00139","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00139","url":null,"abstract":"In rural/remote areas, resource constrained smart micro-grid (RCSMG) architectures can offer a cost-effective power management and supply alternative to national power grid connections. RCSMG architectures handle communications over distributed lossy networks to minimize operation costs. However, the unreliable nature of lossy networks makes privacy an important consideration. Existing anonymisation works on data perturbation work mainly by distortion with additive noise. Apply these solutions to RCSMGs is problematic, because deliberate noise additions must be distinguishable both from system and adversarial generated noise. In this paper, we present a brief survey of privacy risks in RCSMGs centered on inference, and propose a method of mitigating these risks. The lesson here is that while RCSMGs give users more control over power management and distribution, good anonymisation is essential to protecting personal information on RCSMGs.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130002463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EDHBPSO: Enhanced Differential Harmony Binary Particle Swarm Optimization for Demand Side Management in Smart Grid 面向智能电网需求侧管理的改进微分和谐二元粒子群优化
Aqdas Naz, N. Javaid, T. N. Qureshi, M. Imran, Mujahid Ali, Z. Khan
Now a days home energy management system is being used all across the world. Ever increasing energy demands has brought many challenges in aspect of luxury and cost saving. Our work is mainly based on efficient utilization of resources by smart planning. In this aspect scheduling of home electronic devices play vital role. Calculating energy consumption and its timings paved the way to utilize it in most efficient way. In our work we have proposed hybrid of meta heuristic techniques such as HSA, EDE, BPSO. Key feature of state of art techniques has been merged together to evolve a technique that works excellent not only in aspect of cost saving, peak average reduction as well as provision of adequate user comfort. In order to evaluate our proposed technique we have considered set of nine devices includes interruptible, non interruptible and base devices in single home and perform scheduling by advance meter controller (AMC) to further send demand response to utility by smart meters. In response, utility provides real time pricing signals. Two way communication is establish to perform scheduling meticulously.
现在,家庭能源管理系统正在世界各地使用。不断增长的能源需求给汽车的豪华化和节约成本带来了诸多挑战。我们的工作主要基于通过智能规划有效利用资源。在这方面,家用电子设备的调度起着至关重要的作用。计算能源消耗及其时间为最有效地利用能源铺平了道路。在我们的工作中,我们提出了混合的元启发式技术,如HSA, EDE, BPSO。最先进的技术的主要特点已被合并在一起,以发展一种技术,不仅在节省成本,峰值平均降低以及提供足够的用户舒适度方面工作出色。为了评估我们提出的技术,我们考虑了一组9个设备,包括单个家庭中的可中断设备、不可中断设备和基本设备,并通过高级仪表控制器(AMC)执行调度,进一步通过智能电表向公用事业发送需求响应。作为响应,公用事业提供实时定价信号。建立双向沟通,精心执行调度。
{"title":"EDHBPSO: Enhanced Differential Harmony Binary Particle Swarm Optimization for Demand Side Management in Smart Grid","authors":"Aqdas Naz, N. Javaid, T. N. Qureshi, M. Imran, Mujahid Ali, Z. Khan","doi":"10.1109/WAINA.2018.00090","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00090","url":null,"abstract":"Now a days home energy management system is being used all across the world. Ever increasing energy demands has brought many challenges in aspect of luxury and cost saving. Our work is mainly based on efficient utilization of resources by smart planning. In this aspect scheduling of home electronic devices play vital role. Calculating energy consumption and its timings paved the way to utilize it in most efficient way. In our work we have proposed hybrid of meta heuristic techniques such as HSA, EDE, BPSO. Key feature of state of art techniques has been merged together to evolve a technique that works excellent not only in aspect of cost saving, peak average reduction as well as provision of adequate user comfort. In order to evaluate our proposed technique we have considered set of nine devices includes interruptible, non interruptible and base devices in single home and perform scheduling by advance meter controller (AMC) to further send demand response to utility by smart meters. In response, utility provides real time pricing signals. Two way communication is establish to perform scheduling meticulously.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Simple Algorithm to Select Energy-Efficient Servers for Storage and Computation Processes 为存储和计算过程选择节能服务器的简单算法
A. Sawada, Dilawaer Duolikun, Ryoma Watanabe, T. Enokido, M. Takizawa
In application processes like Web and databases, files and databases are manipulated on servers. Thus, both CPU and storage resources are used to perform application processes. In this paper, we propose a computation model to give the expected termination time of each application process. Here, computation operations and storage operations of a process are integrated into virtual computation steps. Then, we propose an SGEAG (Simple Globally-Energy-Aware for General processes) algorithm to select a server to perform a new process issued by a client, which is expected to consume the minimum electric energy to perform not only the new process but also every current process. In the evaluation, we show the electric energy consumed by servers and the average execution time of processes can be more reduced in the SGEAG algorithm than the other algorithms.
在Web和数据库等应用程序进程中,文件和数据库是在服务器上操作的。因此,CPU和存储资源都用于执行应用程序进程。在本文中,我们提出了一个计算模型来给出每个应用进程的预期终止时间。在这里,一个进程的计算操作和存储操作被集成到虚拟计算步骤中。然后,我们提出了一种SGEAG (Simple global - energy - aware for General processes)算法,用于选择服务器来执行客户端发出的新进程,该算法期望在执行新进程和每个当前进程时消耗最少的电能。在评估中,我们发现SGEAG算法比其他算法更能减少服务器消耗的电能和进程的平均执行时间。
{"title":"A Simple Algorithm to Select Energy-Efficient Servers for Storage and Computation Processes","authors":"A. Sawada, Dilawaer Duolikun, Ryoma Watanabe, T. Enokido, M. Takizawa","doi":"10.1109/WAINA.2018.00101","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00101","url":null,"abstract":"In application processes like Web and databases, files and databases are manipulated on servers. Thus, both CPU and storage resources are used to perform application processes. In this paper, we propose a computation model to give the expected termination time of each application process. Here, computation operations and storage operations of a process are integrated into virtual computation steps. Then, we propose an SGEAG (Simple Globally-Energy-Aware for General processes) algorithm to select a server to perform a new process issued by a client, which is expected to consume the minimum electric energy to perform not only the new process but also every current process. In the evaluation, we show the electric energy consumed by servers and the average execution time of processes can be more reduced in the SGEAG algorithm than the other algorithms.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
M-SPOT: A Hybrid Multiobjective Evolutionary Algorithm for Node Placement in Wireless Sensor Networks 无线传感器网络中节点定位的混合多目标进化算法M-SPOT
Alfredo J. Perez
We address the problem of the placement of static sensors and relays to monitor specific locations in an area assuming a single-tiered wireless sensor network model with limited communication and sensing constraints. We present a multiobjective optimization model with two conflicting objectives: total number of devices used in the placement and total energy dissipated by the placement. To optimize the model, we propose the Multiobjective Sensor Placement Optimizer (M-SPOT) algorithm, which is a hybrid evolutionary algorithm that combines the Non-Sorting Genetic Algorithm 2 (NSGA2) algorithm with local search heuristics. We evaluate the performance of M-SPOT by simulating the placement of sensors and relays. We found that the utilization of local search heuristics greatly contribute to find better placements when compared to the NSGA2 algorithm.
我们解决了静态传感器和继电器的放置问题,以监测区域内的特定位置,假设具有有限通信和传感约束的单层无线传感器网络模型。我们提出了一个多目标优化模型,该模型具有两个相互冲突的目标:放置中使用的设备总数和放置所消耗的总能量。为了优化模型,我们提出了多目标传感器放置优化器(M-SPOT)算法,这是一种将非排序遗传算法2 (NSGA2)算法与局部搜索启发式算法相结合的混合进化算法。我们通过模拟传感器和继电器的放置来评估M-SPOT的性能。我们发现,与NSGA2算法相比,局部搜索启发式的使用极大地有助于找到更好的位置。
{"title":"M-SPOT: A Hybrid Multiobjective Evolutionary Algorithm for Node Placement in Wireless Sensor Networks","authors":"Alfredo J. Perez","doi":"10.1109/WAINA.2018.00096","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00096","url":null,"abstract":"We address the problem of the placement of static sensors and relays to monitor specific locations in an area assuming a single-tiered wireless sensor network model with limited communication and sensing constraints. We present a multiobjective optimization model with two conflicting objectives: total number of devices used in the placement and total energy dissipated by the placement. To optimize the model, we propose the Multiobjective Sensor Placement Optimizer (M-SPOT) algorithm, which is a hybrid evolutionary algorithm that combines the Non-Sorting Genetic Algorithm 2 (NSGA2) algorithm with local search heuristics. We evaluate the performance of M-SPOT by simulating the placement of sensors and relays. We found that the utilization of local search heuristics greatly contribute to find better placements when compared to the NSGA2 algorithm.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133820202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy Saving and Collision-Free Motion Planning for Oblivious Robots 无意识机器人的节能与无碰撞运动规划
A. Navarra, D. Cacciagrano
In distributed computing, many tasks have been studied involving mobile entities - also called robots - with weak capabilities. A well-known scenario is that in which robots operate in Look-Compute-Move (LCM) cycles. During each cycle, a robot acquires a snapshot of the surrounding environment (Look phase), then executes an appropriate algorithm by using the obtained snapshot as input (Compute phase), and finally moves toward a desired destination, if any (Move phase). In this context, we consider robots that have to visit a partially ordered set of locations. A solution to the problem is the assignment to each robot of a trajectory to follow in order to visit the required locations. The resolution of the task is subject to two main constraints. Robots have to minimize the energy spent to accomplish an assigned trajectory, and they have to avoid collisions among each other. The minimization of the energy is expressed in terms of the number of turns a robot has to perform in between two different locations. This equals the number of bends the assigned trajectory contains in between such locations. In general, the problem is known to require Ω(n) bends per connection, with n being the number of locations, even if considering just two robots involved. We study the case where the locations that a single robot has to visit are represented as colored points in the Euclidean plane, and only two colors are provided. This means the partial order among the locations is just based on two colors per robot. In this case, we provide a constructive solution for two robots with five bends per connection.
在分布式计算中,许多任务都涉及到能力较弱的移动实体(也称为机器人)。一个众所周知的场景是机器人在看-计算-移动(LCM)循环中运行。在每个周期中,机器人获取周围环境的快照(Look阶段),然后使用获得的快照作为输入(Compute阶段)执行相应的算法,最后向期望的目的地移动(如果有的话)(Move阶段)。在这种情况下,我们考虑机器人必须访问一组部分有序的位置。该问题的一个解决方案是为每个机器人分配一个轨迹,以便访问所需的位置。任务的解决受到两个主要约束。机器人必须将完成指定轨迹所需的能量最小化,并且它们必须避免相互碰撞。能量的最小化是用机器人在两个不同位置之间的转数来表示的。这等于指定轨迹在这些位置之间包含的弯曲次数。一般来说,这个问题已知需要Ω(n)次连接,其中n是位置的数量,即使只考虑两个机器人。我们研究了这样一种情况,其中单个机器人必须访问的位置表示为欧几里得平面上的彩色点,并且只提供两种颜色。这意味着位置之间的偏序只是基于每个机器人的两种颜色。在这种情况下,我们为两个机器人提供了一个建设性的解决方案,每个连接有五个弯曲。
{"title":"Energy Saving and Collision-Free Motion Planning for Oblivious Robots","authors":"A. Navarra, D. Cacciagrano","doi":"10.1109/WAINA.2018.00150","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00150","url":null,"abstract":"In distributed computing, many tasks have been studied involving mobile entities - also called robots - with weak capabilities. A well-known scenario is that in which robots operate in Look-Compute-Move (LCM) cycles. During each cycle, a robot acquires a snapshot of the surrounding environment (Look phase), then executes an appropriate algorithm by using the obtained snapshot as input (Compute phase), and finally moves toward a desired destination, if any (Move phase). In this context, we consider robots that have to visit a partially ordered set of locations. A solution to the problem is the assignment to each robot of a trajectory to follow in order to visit the required locations. The resolution of the task is subject to two main constraints. Robots have to minimize the energy spent to accomplish an assigned trajectory, and they have to avoid collisions among each other. The minimization of the energy is expressed in terms of the number of turns a robot has to perform in between two different locations. This equals the number of bends the assigned trajectory contains in between such locations. In general, the problem is known to require Ω(n) bends per connection, with n being the number of locations, even if considering just two robots involved. We study the case where the locations that a single robot has to visit are represented as colored points in the Euclidean plane, and only two colors are provided. This means the partial order among the locations is just based on two colors per robot. In this case, we provide a constructive solution for two robots with five bends per connection.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Covert Channels in IoT Deployments Through Data Hiding Techniques 通过数据隐藏技术在物联网部署中的隐蔽通道
L. Caviglione, A. Merlo, M. Migliardi
Interconnected and always on devices are continuously and rapidly growing in number and, according to a study from Cisco, will be three times the number of humans on earth in 2021. Unfortunately, recent events such as the DDoS mounted using the Mirai botnet, have shown that the level of resilience to intrusion and hacking of these devices is far from optimal and puts the systems connected to the Internet of Things in serious danger. Among such systems, industrial systems that are now being integrated into the IoT ecosystem, have revealed to be weak against the threat coming from the IT world. Such previously inexistent scenario opens up to a plethora of new attack patterns leveraging previously unexploited techniques. Among these, we argue that convert channels built by leveraging information hiding techniques could be exploited. To this aim, this position paper introduces the usage of convert channels, built on information hiding techniques, in IoT scenarios.
互联和始终在线的设备数量持续快速增长,根据思科的一项研究,到2021年,将是地球上人口数量的三倍。不幸的是,最近的事件,如使用Mirai僵尸网络装载的DDoS攻击,表明这些设备的入侵和黑客攻击的弹性水平远未达到最佳水平,并使连接到物联网的系统处于严重危险之中。在这些系统中,目前正在整合到物联网生态系统中的工业系统,在面对IT世界的威胁时表现出较弱的能力。这种以前不存在的场景为大量利用以前未利用的技术的新攻击模式打开了大门。其中,我们认为利用信息隐藏技术构建的转换通道可以被利用。为此,本文介绍了在物联网场景中基于信息隐藏技术的转换通道的使用。
{"title":"Covert Channels in IoT Deployments Through Data Hiding Techniques","authors":"L. Caviglione, A. Merlo, M. Migliardi","doi":"10.1109/WAINA.2018.00144","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00144","url":null,"abstract":"Interconnected and always on devices are continuously and rapidly growing in number and, according to a study from Cisco, will be three times the number of humans on earth in 2021. Unfortunately, recent events such as the DDoS mounted using the Mirai botnet, have shown that the level of resilience to intrusion and hacking of these devices is far from optimal and puts the systems connected to the Internet of Things in serious danger. Among such systems, industrial systems that are now being integrated into the IoT ecosystem, have revealed to be weak against the threat coming from the IT world. Such previously inexistent scenario opens up to a plethora of new attack patterns leveraging previously unexploited techniques. Among these, we argue that convert channels built by leveraging information hiding techniques could be exploited. To this aim, this position paper introduces the usage of convert channels, built on information hiding techniques, in IoT scenarios.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using Postal Mail System to Teach Packet Switching in Computer Networks 利用邮政邮件系统教授计算机网络中的分组交换
Jianhua Yang, Yongzhong Zhang
In this paper, we propose an approach to use postal mail system to teach computer networking communication. From many years of teaching computer networking class in college, we found that most students are hard to understand some key concepts well in computer networking communication, such as packet, encapsulation, packet switching vs. circuit switching, routing, IP address, and MAC address. We explored to use postal mail system, esp. how a letter travels, to help students understand packet switching in computer network, and received positive feedback. In this paper, we first modeling postal mail system and packet switching computer network, then compare the two systems in terms of layering design, communication architecture, packet encapsulation, IP address, packet routing, datalink layer delivery, and AS. The whole idea is to help college students learn computer networking by referring to a real world system which can be easily understood.
本文提出了一种利用邮政邮件系统进行计算机网络通信教学的方法。从多年的大学计算机网络教学中,我们发现大多数学生很难很好地理解计算机网络通信中的一些关键概念,如分组、封装、分组交换与电路交换、路由、IP地址和MAC地址。我们探索了利用邮政邮件系统,特别是信件的传输方式,帮助学生了解计算机网络中的分组交换,并得到了积极的反馈。本文首先对邮政邮件系统和分组交换计算机网络进行了建模,然后从分层设计、通信体系结构、分组封装、IP地址、分组路由、数据链路层传输和AS等方面对两者进行了比较。整个想法是通过参考一个容易理解的真实世界系统来帮助大学生学习计算机网络。
{"title":"Using Postal Mail System to Teach Packet Switching in Computer Networks","authors":"Jianhua Yang, Yongzhong Zhang","doi":"10.1109/WAINA.2018.00054","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00054","url":null,"abstract":"In this paper, we propose an approach to use postal mail system to teach computer networking communication. From many years of teaching computer networking class in college, we found that most students are hard to understand some key concepts well in computer networking communication, such as packet, encapsulation, packet switching vs. circuit switching, routing, IP address, and MAC address. We explored to use postal mail system, esp. how a letter travels, to help students understand packet switching in computer network, and received positive feedback. In this paper, we first modeling postal mail system and packet switching computer network, then compare the two systems in terms of layering design, communication architecture, packet encapsulation, IP address, packet routing, datalink layer delivery, and AS. The whole idea is to help college students learn computer networking by referring to a real world system which can be easily understood.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact of Data Residency on Cloud Computing 数据驻留对云计算的影响
C. Baudoin
Cloud computing could be on a collision course with the increasingly complex and restrictive web of laws and regulations that govern where certain types of data may be located. This paper reviews the definition of data residency, the risks it poses to cloud customers and cloud providers, and actions they can take to manage those risks.
云计算可能会与日益复杂和限制性的法律和法规网络发生冲突,这些法律和法规管理着某些类型的数据可能位于何处。本文回顾了数据驻留的定义,它给云客户和云提供商带来的风险,以及他们可以采取的管理这些风险的措施。
{"title":"The Impact of Data Residency on Cloud Computing","authors":"C. Baudoin","doi":"10.1109/WAINA.2018.00124","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00124","url":null,"abstract":"Cloud computing could be on a collision course with the increasingly complex and restrictive web of laws and regulations that govern where certain types of data may be located. This paper reviews the definition of data residency, the risks it poses to cloud customers and cloud providers, and actions they can take to manage those risks.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121114878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Adaptive Typing Biometric System with Varying users Model 一种具有变用户模型的自适应打字生物识别系统
C. Ferrari, D. Marini, M. Moro
Keystroke dynamics is a behavioral biometric parameter that can be fully exploit in order to build a continuous biometric authentication system that must comply with strict constraints in the use of computational resources, as well as energy, without lowering the security required level. This paper introduces a typing biometric system that continuously adjourns the users models for taking into account both short term amd long term modification in their habits. The system relies on a reduced space features that mainly uses the hold time and both the keyUp-keyDown and keyDown-keyUp time for some selected keys. An Adaptive Continuous Biometric Authentication Scheme, recomputes each user model according to his/her most recent typing history in a temporal sliding window of fixed dimension. Contrary to the most recent work in the literature, we do not limit to adapt the model of the user under authentication but we consider the potential evolution of the model of the other enrolled users, forecasting their possible evolution, again from the data in the sliding window. System performances have been tested with different window size and under different distance metric (namely Euclidean distance, Manhattan distance and cosine similarity). Moreover, it has been considered the balancing among used computational resource and accuracy. Experimentations on the usability of this approach are also reported.
击键动力学是一个行为生物特征参数,可以充分利用,以建立一个连续的生物特征认证系统,必须遵守严格的限制,在使用计算资源,以及能源,而不降低安全要求的水平。本文介绍了一种可以考虑用户习惯的短期和长期变化的连续延期用户模型的分型生物识别系统。该系统依赖于减少空间的特征,主要使用保持时间以及某些选定键的up - keydown和keyDown-keyUp时间。一种自适应连续生物识别认证方案,根据用户最近的打字历史,在固定维度的时间滑动窗口中重新计算每个用户的模型。与文献中最近的工作相反,我们并不局限于适应认证下的用户模型,而是考虑其他注册用户模型的潜在演变,再次从滑动窗口中的数据预测他们可能的演变。在不同的窗口大小和不同的距离度量(即欧氏距离、曼哈顿距离和余弦相似度)下测试了系统的性能。此外,还考虑了使用的计算资源和精度之间的平衡。本文还报道了该方法的可用性实验。
{"title":"An Adaptive Typing Biometric System with Varying users Model","authors":"C. Ferrari, D. Marini, M. Moro","doi":"10.1109/WAINA.2018.00145","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00145","url":null,"abstract":"Keystroke dynamics is a behavioral biometric parameter that can be fully exploit in order to build a continuous biometric authentication system that must comply with strict constraints in the use of computational resources, as well as energy, without lowering the security required level. This paper introduces a typing biometric system that continuously adjourns the users models for taking into account both short term amd long term modification in their habits. The system relies on a reduced space features that mainly uses the hold time and both the keyUp-keyDown and keyDown-keyUp time for some selected keys. An Adaptive Continuous Biometric Authentication Scheme, recomputes each user model according to his/her most recent typing history in a temporal sliding window of fixed dimension. Contrary to the most recent work in the literature, we do not limit to adapt the model of the user under authentication but we consider the potential evolution of the model of the other enrolled users, forecasting their possible evolution, again from the data in the sliding window. System performances have been tested with different window size and under different distance metric (namely Euclidean distance, Manhattan distance and cosine similarity). Moreover, it has been considered the balancing among used computational resource and accuracy. Experimentations on the usability of this approach are also reported.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114211155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
How to use MEC and ML to Improve Resources Allocation in SDN Networks ? 如何利用MEC和ML改善SDN网络的资源分配?
M. Abderrahim, Asma BEN LETAIFA, Amel Haji, S. Tabbane
One of the important objectives of service providers in the 5G network is to improve the use of network resources to provide multiple types of services with a good quality of service. In this context, the MEC (Mobile Edge Computing) presents a new opportunity that allows hosting applications close to end users with a reduction of latency and performance improvement. In this article we will propose a new architecture that improves the fast and efficient delivery of new applications, based on the concept of MEC and the important role of machine learning algorithms. The proposed architecture will help network operators to better exploit network resources and improve their services. Indeed, it ensures the collection of radio information, the prediction of necessary needs and the dynamic and efficient sharing of network resources.
运营商在5G网络中的重要目标之一是提高网络资源的利用率,以良好的服务质量提供多种类型的业务。在这种情况下,MEC(移动边缘计算)提供了一个新的机会,允许托管应用程序靠近最终用户,减少延迟并提高性能。在本文中,我们将基于MEC的概念和机器学习算法的重要作用,提出一种新的架构,以提高新应用程序的快速高效交付。建议的架构将有助于网络运营商更好地利用网络资源和改善其服务。实际上,它保证了无线电信息的收集,必要需求的预测和网络资源的动态和有效共享。
{"title":"How to use MEC and ML to Improve Resources Allocation in SDN Networks ?","authors":"M. Abderrahim, Asma BEN LETAIFA, Amel Haji, S. Tabbane","doi":"10.1109/WAINA.2018.00126","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00126","url":null,"abstract":"One of the important objectives of service providers in the 5G network is to improve the use of network resources to provide multiple types of services with a good quality of service. In this context, the MEC (Mobile Edge Computing) presents a new opportunity that allows hosting applications close to end users with a reduction of latency and performance improvement. In this article we will propose a new architecture that improves the fast and efficient delivery of new applications, based on the concept of MEC and the important role of machine learning algorithms. The proposed architecture will help network operators to better exploit network resources and improve their services. Indeed, it ensures the collection of radio information, the prediction of necessary needs and the dynamic and efficient sharing of network resources.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133927199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1