首页 > 最新文献

2008 Proceedings of 17th International Conference on Computer Communications and Networks最新文献

英文 中文
Improving Load Balancing with Multipath Routing 通过多路径路由改进负载均衡
P. Mérindol, Jean-Jacques Pansiot, S. Cateloin
Internet service providers have to provision network resources to optimize bandwidth utilization. Dynamic routing protocols take traffic variations into account to control the load distribution. Multipath routing protocols attempt to take advantage of the path diversity to bring network robustness and reliability. Indeed, with a specific traffic engineering policy, they enable load balancing across several paths. Our aim is to compute a set of loopfree paths in order to allow routers to share the load on several next hops depending on current load measurement. In this paper, we first describe our original Incoming Interface Multipath Routing technique, DT(p), then we present a scheme for load balancing, DT(p)-TE, based on link monitoring. We evaluate and compare our technique with several existing approaches by a set of simulations, using different scenarios and topologies. The simulations results suggest that the path diversity achieved with our proposition can significantly improve the network response time.
互联网服务提供商必须提供网络资源以优化带宽利用率。动态路由协议考虑流量变化来控制负载分布。多路径路由协议试图利用路径的多样性来提高网络的鲁棒性和可靠性。实际上,通过特定的流量工程策略,它们可以实现跨多条路径的负载平衡。我们的目标是计算一组无环路路径,以便允许路由器根据当前负载测量值在几个下一跳上共享负载。在本文中,我们首先描述了我们最初的入接口多路径路由技术DT(p),然后我们提出了一种基于链路监控的负载均衡方案DT(p)-TE。我们通过一组模拟,使用不同的场景和拓扑,评估并比较了我们的技术与几种现有方法。仿真结果表明,利用该方法实现的路径分集可以显著提高网络响应时间。
{"title":"Improving Load Balancing with Multipath Routing","authors":"P. Mérindol, Jean-Jacques Pansiot, S. Cateloin","doi":"10.1109/ICCCN.2008.ECP.30","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.30","url":null,"abstract":"Internet service providers have to provision network resources to optimize bandwidth utilization. Dynamic routing protocols take traffic variations into account to control the load distribution. Multipath routing protocols attempt to take advantage of the path diversity to bring network robustness and reliability. Indeed, with a specific traffic engineering policy, they enable load balancing across several paths. Our aim is to compute a set of loopfree paths in order to allow routers to share the load on several next hops depending on current load measurement. In this paper, we first describe our original Incoming Interface Multipath Routing technique, DT(p), then we present a scheme for load balancing, DT(p)-TE, based on link monitoring. We evaluate and compare our technique with several existing approaches by a set of simulations, using different scenarios and topologies. The simulations results suggest that the path diversity achieved with our proposition can significantly improve the network response time.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115288704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Modeling and Adapting JPEG to the Energy Requirements of VSN JPEG的建模和适应VSN的能量需求
A. Mammeri, A. Khoumsi, D. Ziou, Brahim Hadjou
We address the problem of modeling and adapting JPEG to the energy requirements of visual sensor networks (VSN). For JPEG modeling purposes, we develop a simplified high-level energy consumption model for each stage of JPEG-like scheme, which can be used to roughly evaluate the energy dissipated by a given visual sensor. This model is based on the basic operations needed at each stage of JPEG, and it does not take into account the complexity of implementation. For JPEG adaptation, we propose to process only a reduced part of each block of 8times8 DCT coefficients of the target image, which minimizes the dissipated energy and maximizes the system lifetime, while preserving an adequate image quality at the sink.
我们解决了建模和调整JPEG以适应视觉传感器网络(VSN)的能量需求的问题。为了JPEG建模的目的,我们为类JPEG方案的每个阶段开发了一个简化的高级能耗模型,该模型可用于大致评估给定视觉传感器消耗的能量。该模型基于JPEG各阶段所需的基本操作,没有考虑实现的复杂性。对于JPEG适应,我们建议只处理目标图像的8times8 DCT系数的每个块的减少部分,这样可以最小化耗散的能量并最大化系统寿命,同时在接收器处保持足够的图像质量。
{"title":"Modeling and Adapting JPEG to the Energy Requirements of VSN","authors":"A. Mammeri, A. Khoumsi, D. Ziou, Brahim Hadjou","doi":"10.1109/ICCCN.2008.ECP.151","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.151","url":null,"abstract":"We address the problem of modeling and adapting JPEG to the energy requirements of visual sensor networks (VSN). For JPEG modeling purposes, we develop a simplified high-level energy consumption model for each stage of JPEG-like scheme, which can be used to roughly evaluate the energy dissipated by a given visual sensor. This model is based on the basic operations needed at each stage of JPEG, and it does not take into account the complexity of implementation. For JPEG adaptation, we propose to process only a reduced part of each block of 8times8 DCT coefficients of the target image, which minimizes the dissipated energy and maximizes the system lifetime, while preserving an adequate image quality at the sink.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122491702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Maximizing Network Lifetime for Estimation in Multi-Hop Wireless Sensor Networks 多跳无线传感器网络中网络生存期估计的最大化
Junlin Li, G. Al-Regib
In this paper, we consider distributed estimation in energy-limited wireless sensor networks from lifetime-distortion perspective, where the goal is to maximize the network lifetime for a given distortion requirement. To take into account both local quantization and multi-hop transmission, which are essential to save transmission energy and thus prolong the network lifetime, the network lifetime maximization problem is formulated as a nonlinear programming (NLP) problem, where there are three factors needed to be optimized jointly: (i) source coding at each sensor, (ii) source throughput of each sensor, and (iii) multi-hop routing path. Furthermore, we show that this NLP problem can be decoupled without loss of optimality and reformulated as a linear programming (LP) problem. The proposed algorithm is optimal and the simulation results show that a significant gain is achieved by the proposed algorithm compared with heuristic methods.
在本文中,我们从寿命-失真的角度考虑能量有限的无线传感器网络中的分布式估计,其目标是在给定的失真要求下最大化网络寿命。考虑到局部量化和多跳传输对节省传输能量和延长网络生命周期至关重要,网络生命周期最大化问题被表述为一个非线性规划(NLP)问题,其中有三个因素需要共同优化:(i)每个传感器的源编码,(ii)每个传感器的源吞吐量,(iii)多跳路由路径。此外,我们证明该NLP问题可以解耦而不损失最优性,并将其重新表述为线性规划(LP)问题。仿真结果表明,与启发式算法相比,该算法具有显著的增益。
{"title":"Maximizing Network Lifetime for Estimation in Multi-Hop Wireless Sensor Networks","authors":"Junlin Li, G. Al-Regib","doi":"10.1109/ICCCN.2008.ECP.150","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.150","url":null,"abstract":"In this paper, we consider distributed estimation in energy-limited wireless sensor networks from lifetime-distortion perspective, where the goal is to maximize the network lifetime for a given distortion requirement. To take into account both local quantization and multi-hop transmission, which are essential to save transmission energy and thus prolong the network lifetime, the network lifetime maximization problem is formulated as a nonlinear programming (NLP) problem, where there are three factors needed to be optimized jointly: (i) source coding at each sensor, (ii) source throughput of each sensor, and (iii) multi-hop routing path. Furthermore, we show that this NLP problem can be decoupled without loss of optimality and reformulated as a linear programming (LP) problem. The proposed algorithm is optimal and the simulation results show that a significant gain is achieved by the proposed algorithm compared with heuristic methods.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Congestion Control for Scalable VBR Video with Packet Pair Assistance 基于包对辅助的可扩展VBR视频拥塞控制
Bjørnar Libæk, Ø. Kure
The SVC (scalable video coding) extension to the recent video compression standard H.264/MPEG-4 AVC paves the way for video congestion control, by allowing flexible on-the-fly adjustments of the sending rate. We study the interaction between TFRC (TCP-friendly rate control) and application level rate control, and observe that TFRC requires relatively large router buffers to keep packet loss on acceptable levels. In turn, this leads to increased jitter which excludes delay sensitive applications. As a response, the packet pair assisted congestion control is presented and compared with TFRC. The two transport protocols are simulated in a DiffServ environment, and we find that proper congestion control may replace complex admission control mechanisms without sacrificing utilization or QoS guarantees. In fact, the results indicate that semi-elastic video can be sent in an AF (assured forwarding) class with small buffers, leaving the EF (expedited forwarding) class to traffic with more extreme delay requirements.
SVC(可扩展视频编码)扩展到最新的视频压缩标准H.264/MPEG-4 AVC,通过允许灵活的实时调整发送速率,为视频拥塞控制铺平了道路。我们研究了TFRC (tcp友好速率控制)和应用层速率控制之间的相互作用,并观察到TFRC需要相对较大的路由器缓冲区来保持包丢包在可接受的水平上。反过来,这会导致抖动增加,不包括延迟敏感的应用程序。作为响应,提出了包对辅助拥塞控制,并与TFRC进行了比较。在DiffServ环境中模拟了这两种传输协议,我们发现适当的拥塞控制可以取代复杂的准入控制机制,而不会牺牲利用率或QoS保证。事实上,结果表明,半弹性视频可以在具有小缓冲区的AF(保证转发)类中发送,而将EF(加速转发)类留给具有更极端延迟要求的流量。
{"title":"Congestion Control for Scalable VBR Video with Packet Pair Assistance","authors":"Bjørnar Libæk, Ø. Kure","doi":"10.1109/ICCCN.2008.ECP.57","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.57","url":null,"abstract":"The SVC (scalable video coding) extension to the recent video compression standard H.264/MPEG-4 AVC paves the way for video congestion control, by allowing flexible on-the-fly adjustments of the sending rate. We study the interaction between TFRC (TCP-friendly rate control) and application level rate control, and observe that TFRC requires relatively large router buffers to keep packet loss on acceptable levels. In turn, this leads to increased jitter which excludes delay sensitive applications. As a response, the packet pair assisted congestion control is presented and compared with TFRC. The two transport protocols are simulated in a DiffServ environment, and we find that proper congestion control may replace complex admission control mechanisms without sacrificing utilization or QoS guarantees. In fact, the results indicate that semi-elastic video can be sent in an AF (assured forwarding) class with small buffers, leaving the EF (expedited forwarding) class to traffic with more extreme delay requirements.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128545296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Lightweight Protocol Analysis and Modification for Secure RFID System 安全RFID系统的轻量级协议分析与修改
Hyun Seok Kim, Jin-Young Choi
A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important. In this paper, the RFID security protocols (HB++[first] and HB++[second]) presented in Bringer et al. are shown to be vulnerable to active attacks and a modified solution is presented. Some of the security violations that may occur and possible remedies that were provided in the literature are discussed. Finally, the modifications to HB++, a recent variant of HB is proposed.
射频识别(RFID)是移动和无处不在领域的重要组成部分,在需要对象自动识别的应用中带来了巨大的生产力效益。然而,RFID标签的广泛使用为侵犯用户隐私和身份验证的各种攻击提供了可能性。因此,RFID系统的安全机制至关重要。在本文中,Bringer等人提出的RFID安全协议(HB++[第一]和HB++[第二])容易受到主动攻击,并提出了一种改进的解决方案。讨论了文献中提供的一些可能发生的安全违规和可能的补救措施。最后,对HB的最新变体hb++进行了修改。
{"title":"A Lightweight Protocol Analysis and Modification for Secure RFID System","authors":"Hyun Seok Kim, Jin-Young Choi","doi":"10.1109/ICCCN.2008.ECP.177","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.177","url":null,"abstract":"A radio frequency identification (RFID) is an important part in mobile and ubiquitous domain, and brings enormous productivity benefits in applications where objects require automatic identification. However, this pervasive use of RFID tags opens up the possibility of various attacks that violate user privacy and authentication. Security mechanisms for RFID systems are therefore of the utmost important. In this paper, the RFID security protocols (HB++[first] and HB++[second]) presented in Bringer et al. are shown to be vulnerable to active attacks and a modified solution is presented. Some of the security violations that may occur and possible remedies that were provided in the literature are discussed. Finally, the modifications to HB++, a recent variant of HB is proposed.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bandwidth Management For Distributed Systems 分布式系统的带宽管理
A. Tucholski, Agnieszka Francesson, A. Majka, Joanna Sasin, Marcin Pilarski
The method of finding point of bending on efficiency curve in a distributed systems has been presented. The performance of distributed environment was studied as a cost function of mean network throughput and memory buffers availability. The method can be used then to build up an autonomic bandwidth management. The bounding point on efficiency curve was found as well analytically as for testing facility of a distributed laboratory environment. The influence of data replication and scheduling strategy on final results has been included. The computer simulation has been supported by analytical calculation. Two regions of different behavior on universal hyperbolic like dependence of the performance versus mean network throughput was shown up. A method of finding bounding point has been discuss in order to optimize efficiency of the considered system by such parameters like memory buffers and network bandwidth.
提出了分布式系统效率曲线弯曲点的确定方法。将分布式环境的性能作为平均网络吞吐量和内存缓冲区可用性的代价函数进行研究。该方法可用于建立自主带宽管理系统。对分布式实验室环境下的测试设备的效率曲线的边界点进行了分析。考虑了数据复制和调度策略对最终结果的影响。计算机模拟得到了解析计算的支持。给出了性能与平均网络吞吐量在通用双曲曲线上的依赖关系。讨论了一种寻找边界点的方法,以便通过内存缓冲区和网络带宽等参数优化所考虑的系统的效率。
{"title":"Bandwidth Management For Distributed Systems","authors":"A. Tucholski, Agnieszka Francesson, A. Majka, Joanna Sasin, Marcin Pilarski","doi":"10.1109/ICCCN.2008.ECP.158","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.158","url":null,"abstract":"The method of finding point of bending on efficiency curve in a distributed systems has been presented. The performance of distributed environment was studied as a cost function of mean network throughput and memory buffers availability. The method can be used then to build up an autonomic bandwidth management. The bounding point on efficiency curve was found as well analytically as for testing facility of a distributed laboratory environment. The influence of data replication and scheduling strategy on final results has been included. The computer simulation has been supported by analytical calculation. Two regions of different behavior on universal hyperbolic like dependence of the performance versus mean network throughput was shown up. A method of finding bounding point has been discuss in order to optimize efficiency of the considered system by such parameters like memory buffers and network bandwidth.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defocus Estimation from a Single Image 单幅图像的散焦估计
Shiqian Wu, Weisi Lin
This paper derives the formulae for defocus blur parameter from a single image, based upon the line spread function (LSF). To achieve high accuracy and robustness, the over determining strategies are adopted: 1) a number of LSFs on one edge are extracted; 2) more edges in the images are used. The trust-region method is then employed to obtain the optimal estimation of blur parameter. The experimental results have demonstrated the effectiveness of the proposed method. It can be used for blind image quality evaluation in vision-based applications.
本文基于线扩展函数(LSF)导出了单幅图像离焦模糊参数的计算公式。为了达到较高的精度和鲁棒性,采用了以下策略:1)在一条边缘上提取多个lsf;2)使用图像中更多的边缘。然后利用信任域方法得到模糊参数的最优估计。实验结果证明了该方法的有效性。该方法可用于基于视觉的应用中图像质量的盲评价。
{"title":"Defocus Estimation from a Single Image","authors":"Shiqian Wu, Weisi Lin","doi":"10.1109/ICCCN.2008.ECP.173","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.173","url":null,"abstract":"This paper derives the formulae for defocus blur parameter from a single image, based upon the line spread function (LSF). To achieve high accuracy and robustness, the over determining strategies are adopted: 1) a number of LSFs on one edge are extracted; 2) more edges in the images are used. The trust-region method is then employed to obtain the optimal estimation of blur parameter. The experimental results have demonstrated the effectiveness of the proposed method. It can be used for blind image quality evaluation in vision-based applications.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124497270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proactive or Reactive Routing: A Unified Analytical Framework in MANETs 主动或被动路由:manet中的统一分析框架
Xianren Wu, Hui Xu, H. Sadjadpour, J. Garcia-Luna-Aceves
We present a mathematical framework for the performance evaluation of proactive and reactive routing protocols operating in mobile ad hoc networks (MANETs). The model captures the functionality of the routing protocols together with the characterization of the performance of the medium access control protocol (MAC). It reveals the interplay between the protocol functionality and network parameters, and provides new insight on the relative benefits of proactive and on-demand routing in MANETS. The analytical results are corroborated with results obtained using discrete-event simulations.
我们提出了一个数学框架,用于在移动自组织网络(manet)中运行的主动和被动路由协议的性能评估。该模型捕获路由协议的功能以及介质访问控制协议(MAC)的性能表征。它揭示了协议功能和网络参数之间的相互作用,并对主动路由和按需路由在MANETS中的相对优势提供了新的见解。分析结果与离散事件模拟结果相吻合。
{"title":"Proactive or Reactive Routing: A Unified Analytical Framework in MANETs","authors":"Xianren Wu, Hui Xu, H. Sadjadpour, J. Garcia-Luna-Aceves","doi":"10.1109/ICCCN.2008.ECP.125","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.125","url":null,"abstract":"We present a mathematical framework for the performance evaluation of proactive and reactive routing protocols operating in mobile ad hoc networks (MANETs). The model captures the functionality of the routing protocols together with the characterization of the performance of the medium access control protocol (MAC). It reveals the interplay between the protocol functionality and network parameters, and provides new insight on the relative benefits of proactive and on-demand routing in MANETS. The analytical results are corroborated with results obtained using discrete-event simulations.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126551547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Traffic Data Processing in Vehicular Sensor Networks 车载传感器网络中的交通数据处理
Xu Li, W. Shu, Minglu Li, Pei'en Luo, Hongyu Huang, Minyou Wu
The existing vehicular sensors of taxi companies in most of cities can be used for traffic monitoring, however sensors are always set with a long sampling interval because of communication cost saving and network congestion avoidance. In this paper, we focus on the traffic data processing in vehicular sensor networks providing sparse and incomplete information. A performance evaluation study has been carried out in Shanghai by utilizing the sensors installed on 4000 taxis. Two types of traffic status estimation algorithms, the link-based and the vehicle-based, are introduced based on such data basis. The results from large-scale testing cases show that the traffic status can be fairly well estimated based on these imperfect data and we demonstrate the feasibility of such application in most of cities.
大多数城市出租车公司现有的车载传感器都可以用于交通监控,但出于节省通信成本和避免网络拥塞的考虑,传感器通常设置较长的采样间隔。本文主要研究了信息稀疏且不完全的车载传感器网络中交通数据的处理问题。在上海,利用安装在4000辆出租车上的传感器进行了性能评估研究。在此基础上,介绍了基于链路和基于车辆的两种交通状态估计算法。大规模测试案例的结果表明,基于这些不完善的数据可以很好地估计交通状况,并且我们证明了这种应用在大多数城市的可行性。
{"title":"Traffic Data Processing in Vehicular Sensor Networks","authors":"Xu Li, W. Shu, Minglu Li, Pei'en Luo, Hongyu Huang, Minyou Wu","doi":"10.1109/ICCCN.2008.ECP.42","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.42","url":null,"abstract":"The existing vehicular sensors of taxi companies in most of cities can be used for traffic monitoring, however sensors are always set with a long sampling interval because of communication cost saving and network congestion avoidance. In this paper, we focus on the traffic data processing in vehicular sensor networks providing sparse and incomplete information. A performance evaluation study has been carried out in Shanghai by utilizing the sensors installed on 4000 taxis. Two types of traffic status estimation algorithms, the link-based and the vehicle-based, are introduced based on such data basis. The results from large-scale testing cases show that the traffic status can be fairly well estimated based on these imperfect data and we demonstrate the feasibility of such application in most of cities.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128074264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Robust Video Transmission Over Packet Erasure Wireless Channels Based on Wyner-Ziv Coding of Motion Regions 基于运动区域Wyner-Ziv编码的分组擦除无线信道鲁棒视频传输
Tao Sheng, B. Oh, Guogang Hua, Hongxing Guo, Jing-li Zhou, C. Chen
This paper presents a new scheme for robust video transmission over packet erasure wireless channels based on Wyner-Ziv coding of motion regions. The multipath fading and shading of the wireless channels usually lead to loss or erroneous video packets which on occasions result in some spontaneous drop in video quality. Existing approaches with forward error correction (FEC) and error concealment have not been able to provide the desired robustness in video transmission. We develop a new scheme with a motion-based Wyner-Ziv coding (MWZC) by leveraging distributed source coding (DSC) ideas for error robustness. This new scheme is based on the fact that motion regions of a given video frame are particularly important in both objective and perceptual video quality and hence should be given preferential Wyner-Ziv coding based embedded protection. To achieve high coding efficiency, we determine the underlining motion regions based on a rate-distortion model. Within the framework of H.264/AVC specification, motion region determination can be efficiently implemented using flexible macroblock ordering (FMO) and data partitioning (DP). The bit stream generated by the proposed scheme consists two parts: the systematic portion generated from conventional H.264/AVC bit stream and the supplementary bit stream for error robust video transmission generated by the Wyner-Ziv coding of motion regions. Experimental results demonstrate that the proposed scheme significantly outperforms both decoder-based error concealment (DBEC) and conventional FEC with DBEC approaches.
提出了一种基于运动区域Wyner-Ziv编码的无线信道鲁棒视频传输方案。无线信道的多径衰落和阴影通常会导致丢失或错误的视频数据包,有时会导致视频质量的自发下降。现有的前向纠错(FEC)和错误隐藏方法在视频传输中不能提供理想的鲁棒性。我们利用分布式源编码(DSC)思想开发了一种基于运动的wner - ziv编码(MWZC)的新方案。这种新方案是基于这样一个事实,即给定视频帧的运动区域在客观和感知视频质量中都特别重要,因此应该优先考虑基于Wyner-Ziv编码的嵌入式保护。为了提高编码效率,我们基于率失真模型确定了下划线运动区域。在H.264/AVC规范框架下,采用灵活的宏块排序(FMO)和数据分区(DP)可以有效地实现运动区域的确定。该方案生成的码流由两部分组成:由传统H.264/AVC码流生成的系统码流和由运动区域的Wyner-Ziv编码生成的用于差错鲁棒视频传输的补充码流。实验结果表明,该方案明显优于基于解码器的错误隐藏(DBEC)和基于DBEC的传统FEC方法。
{"title":"Robust Video Transmission Over Packet Erasure Wireless Channels Based on Wyner-Ziv Coding of Motion Regions","authors":"Tao Sheng, B. Oh, Guogang Hua, Hongxing Guo, Jing-li Zhou, C. Chen","doi":"10.1109/ICCCN.2008.ECP.138","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.138","url":null,"abstract":"This paper presents a new scheme for robust video transmission over packet erasure wireless channels based on Wyner-Ziv coding of motion regions. The multipath fading and shading of the wireless channels usually lead to loss or erroneous video packets which on occasions result in some spontaneous drop in video quality. Existing approaches with forward error correction (FEC) and error concealment have not been able to provide the desired robustness in video transmission. We develop a new scheme with a motion-based Wyner-Ziv coding (MWZC) by leveraging distributed source coding (DSC) ideas for error robustness. This new scheme is based on the fact that motion regions of a given video frame are particularly important in both objective and perceptual video quality and hence should be given preferential Wyner-Ziv coding based embedded protection. To achieve high coding efficiency, we determine the underlining motion regions based on a rate-distortion model. Within the framework of H.264/AVC specification, motion region determination can be efficiently implemented using flexible macroblock ordering (FMO) and data partitioning (DP). The bit stream generated by the proposed scheme consists two parts: the systematic portion generated from conventional H.264/AVC bit stream and the supplementary bit stream for error robust video transmission generated by the Wyner-Ziv coding of motion regions. Experimental results demonstrate that the proposed scheme significantly outperforms both decoder-based error concealment (DBEC) and conventional FEC with DBEC approaches.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"57 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113961703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 Proceedings of 17th International Conference on Computer Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1