首页 > 最新文献

2008 Proceedings of 17th International Conference on Computer Communications and Networks最新文献

英文 中文
Logical Topology Design for IP-over-WDM Networks: A Hybrid Approach for Minimum Protection Capacity IP-over-WDM网络的逻辑拓扑设计:最小保护容量的混合方法
Muhammad S. Javed, K. Thulasiraman, G. Xue
The problem of designing high capacity and high bit rate IP-over-WDM networks, which can provide uninterrupted service in the presence of network equipment failures, continues to attract significant interest from the research community. An IP-over-WDM network implements Internet Protocol (IP) directly over physical WDM network by establishing lightpaths using IP routers, optical crossconnects (OXC) and optical fibers. Generally an optical fiber carries several lightpaths and all of them get disconnected, if the fiber carrying them fails. Such failures can quickly impact the performance of the entire network. If IP routers can find paths to all the nodes in the network, then the network can continue to provide service without significant performance degradation. This can be achieved by reserving network resources (protection) or provisioning the network with some additional capacity (restoration). Such networks are usually called survivable networks. In this paper, we propose four algorithms based on SMART framework proposed by Kurant and Thiran, and a hybrid approach by Shenai and Sivalingam. The algorithms use a combination of protection and restoration mechanisms to make IP-over-WDM networks survivable such that the protection capacity required is not significant.
设计高容量和高比特率的IP-over-WDM网络,使其能够在网络设备出现故障的情况下提供不间断的服务,这一问题一直引起研究界的极大兴趣。IP-over-WDM网络通过使用IP路由器、光交叉连接(OXC)和光纤建立光路,直接在物理WDM网络上实现IP (Internet Protocol)。一般来说,一根光纤携带几个光路,如果携带它们的光纤发生故障,所有的光路都会断开。这种故障会迅速影响整个网络的性能。如果IP路由器可以找到网络中所有节点的路径,那么网络就可以继续提供服务,而不会出现明显的性能下降。这可以通过保留网络资源(保护)或为网络提供一些额外的容量(恢复)来实现。这样的网络通常被称为生存网络。在本文中,我们基于Kurant和Thiran提出的SMART框架以及Shenai和Sivalingam提出的混合方法提出了四种算法。该算法使用保护和恢复机制的组合,使IP-over-WDM网络能够生存,从而所需的保护能力并不显著。
{"title":"Logical Topology Design for IP-over-WDM Networks: A Hybrid Approach for Minimum Protection Capacity","authors":"Muhammad S. Javed, K. Thulasiraman, G. Xue","doi":"10.1109/ICCCN.2008.ECP.78","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.78","url":null,"abstract":"The problem of designing high capacity and high bit rate IP-over-WDM networks, which can provide uninterrupted service in the presence of network equipment failures, continues to attract significant interest from the research community. An IP-over-WDM network implements Internet Protocol (IP) directly over physical WDM network by establishing lightpaths using IP routers, optical crossconnects (OXC) and optical fibers. Generally an optical fiber carries several lightpaths and all of them get disconnected, if the fiber carrying them fails. Such failures can quickly impact the performance of the entire network. If IP routers can find paths to all the nodes in the network, then the network can continue to provide service without significant performance degradation. This can be achieved by reserving network resources (protection) or provisioning the network with some additional capacity (restoration). Such networks are usually called survivable networks. In this paper, we propose four algorithms based on SMART framework proposed by Kurant and Thiran, and a hybrid approach by Shenai and Sivalingam. The algorithms use a combination of protection and restoration mechanisms to make IP-over-WDM networks survivable such that the protection capacity required is not significant.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"219 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129840932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
TCP Over Optical Burst Switching (OBS): To Split or Not To Split? TCP Over光突发交换(OBS):分割还是不分割?
Deepak Padmanabhan, Rajesh R. C. Bikram, V. Vokkarane
TCP-based applications account for a majority of data traffic in the Internet; thus understanding and improving the performance of TCP over OBS network is critical. In this paper, we identify the ill-effects of implementing TCP over a hybrid network (IP-access and OBS-core). We purpose a Split- TCP approach for a hybrid IP-OBS network to improve TCP performance. We propose two Split-TCP approaches, namely, 1:1:1 and N:1:N. We evaluate the performance of the proposed approaches over an IP-OBS hybrid network. Based on the simulation results, N:1:N Split-TCP approach outperforms all other approaches.
基于tcp的应用程序占互联网数据流量的大部分;因此,理解和提高OBS网络上TCP的性能是至关重要的。在本文中,我们确定了在混合网络(IP-access和OBS-core)上实现TCP的不良影响。为了提高TCP的性能,我们设计了一种用于混合IP-OBS网络的拆分TCP方法。我们提出了两种Split-TCP方式,即1:1:1和N:1:N。我们在IP-OBS混合网络上评估了所提出的方法的性能。仿真结果表明,N:1:N Split-TCP方法的性能优于其他所有方法。
{"title":"TCP Over Optical Burst Switching (OBS): To Split or Not To Split?","authors":"Deepak Padmanabhan, Rajesh R. C. Bikram, V. Vokkarane","doi":"10.1109/ICCCN.2008.ECP.66","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.66","url":null,"abstract":"TCP-based applications account for a majority of data traffic in the Internet; thus understanding and improving the performance of TCP over OBS network is critical. In this paper, we identify the ill-effects of implementing TCP over a hybrid network (IP-access and OBS-core). We purpose a Split- TCP approach for a hybrid IP-OBS network to improve TCP performance. We propose two Split-TCP approaches, namely, 1:1:1 and N:1:N. We evaluate the performance of the proposed approaches over an IP-OBS hybrid network. Based on the simulation results, N:1:N Split-TCP approach outperforms all other approaches.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks 802.11网络去认证/反关联攻击的轻量级防御方案
T. Nguyen, Duc H. M. Nguyen, B.N. Tran, H. Vu, N. Mittal
In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access point. Therefore, an attacker can launch a DoS attack by spoofing these messages and thus disabling the communication between a wireless device and its access point. We propose an efficient solution based on a one way hard function to verify that a deauthentication/disassociation frame is from a legitimate station. We implement our solution on some 802.11 devices and the experimental results show that our protocol is highly effective against this DoS attack.
在本文中,我们研究了基于802.11的网络上的一种特殊类型的拒绝服务(DoS)攻击,即去认证/解关联攻击。在当前的IEEE 802.11标准中,当一个无线站想要离开网络时,它会向接入点发送一个去认证或解除关联的帧。然而,这两个帧是不加密发送的,并且不由接入点进行身份验证。因此,攻击者可以通过欺骗这些消息来发起DoS攻击,从而禁用无线设备与其接入点之间的通信。我们提出了一种基于单向硬函数的有效解决方案来验证去认证/解关联帧来自合法站。我们在一些802.11设备上实现了我们的解决方案,实验结果表明我们的协议对这种DoS攻击是非常有效的。
{"title":"A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks","authors":"T. Nguyen, Duc H. M. Nguyen, B.N. Tran, H. Vu, N. Mittal","doi":"10.1109/ICCCN.2008.ECP.51","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.51","url":null,"abstract":"In this paper we investigate a special type of denial of service (DoS) attack on 802.11-based networks, namely deauthentication/disassociation attack. In the current IEEE 802.11 standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access point. Therefore, an attacker can launch a DoS attack by spoofing these messages and thus disabling the communication between a wireless device and its access point. We propose an efficient solution based on a one way hard function to verify that a deauthentication/disassociation frame is from a legitimate station. We implement our solution on some 802.11 devices and the experimental results show that our protocol is highly effective against this DoS attack.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132634098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Rule Hashing for Efficient Packet Classification in Network Intrusion Detection 用于网络入侵检测中高效数据包分类的规则加密
A. Yoshioka, Shariful Hasan Shaikot, Min Sik Kim
A rule-based intrusion detection system compares the incoming packets against rule set in order to detect intrusion. Unfortunately, it spends the majority of CPU time in packet classification to search for rules that match each packet. A common approach is to build a graph such as rule trees or finite automata for a given rule set, and traverse it using a packet as an input string. Because of the increasing number of security threats and vulnerabilities, the number of rules often exceeds thousands requiring more than hundreds of megabytes of memory. Exploring such a huge graph becomes a major bottleneck in high-speed networks since each packet incurs many memory accesses with little locality. In this paper, we propose rule hashing for fast packet classification in intrusion detection systems. The rule hashing, combined with hierarchical rule trees, saves memory and reduce the number of memory accesses by allowing the whole working set to be accommodated in a cache in most of the time, and thus improves response times in finding matching rules. We implement our algorithm in Snort, a popular open-source intrusion detection system. Experimental results show that our implementation is faster than original Snort to deal with the same real packet traces while consuming an order of magnitude less memory.
基于规则的入侵检测系统将收到的数据包与规则集进行比较,以检测入侵。遗憾的是,在数据包分类过程中,系统需要花费大部分 CPU 时间来搜索与每个数据包相匹配的规则。一种常见的方法是为给定的规则集构建规则树或有限自动机等图形,并将数据包作为输入字符串进行遍历。由于安全威胁和漏洞的数量不断增加,规则的数量往往超过数千条,需要超过数百兆字节的内存。在高速网络中,由于每个数据包都会产生大量内存访问,且几乎没有定位,因此探索这样一个庞大的图成为一个主要瓶颈。在本文中,我们提出了在入侵检测系统中进行快速数据包分类的哈希规则。规则散列与分层规则树相结合,可以节省内存并减少内存访问次数,因为在大多数情况下,整个工作集都可以容纳在缓存中,从而提高了查找匹配规则的响应速度。我们在 Snort(一种流行的开源入侵检测系统)中实现了我们的算法。实验结果表明,在处理相同的真实数据包轨迹时,我们的实现比原始 Snort 更快,同时内存消耗也少了一个数量级。
{"title":"Rule Hashing for Efficient Packet Classification in Network Intrusion Detection","authors":"A. Yoshioka, Shariful Hasan Shaikot, Min Sik Kim","doi":"10.1109/ICCCN.2008.ECP.120","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.120","url":null,"abstract":"A rule-based intrusion detection system compares the incoming packets against rule set in order to detect intrusion. Unfortunately, it spends the majority of CPU time in packet classification to search for rules that match each packet. A common approach is to build a graph such as rule trees or finite automata for a given rule set, and traverse it using a packet as an input string. Because of the increasing number of security threats and vulnerabilities, the number of rules often exceeds thousands requiring more than hundreds of megabytes of memory. Exploring such a huge graph becomes a major bottleneck in high-speed networks since each packet incurs many memory accesses with little locality. In this paper, we propose rule hashing for fast packet classification in intrusion detection systems. The rule hashing, combined with hierarchical rule trees, saves memory and reduce the number of memory accesses by allowing the whole working set to be accommodated in a cache in most of the time, and thus improves response times in finding matching rules. We implement our algorithm in Snort, a popular open-source intrusion detection system. Experimental results show that our implementation is faster than original Snort to deal with the same real packet traces while consuming an order of magnitude less memory.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128135608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Standard-Based Middleware Platform for Medical Sensor Networks and u-Health 基于标准的医疗传感器网络和u-Health中间件平台
I. Martínez, J. Escayola, M. Martínez-Espronceda, L. Serrano, J. Trigo, S. Led, José García
Advances in information and communication technologies, ICT, are bringing new opportunities in the field of middleware systems oriented to ubiquitous environments and wearable devices used for patient telemonitoring. At a time of such challenges, this paper arises from the need to identify robust technical telemonitoring solutions that are both open and interoperable in home or mobile scenarios. These middleware systems demand standardized solutions to be cost effective and to take advantage of standardized operation and interoperability. Thus, a fundamental challenge is to design a plug-&-play platform that, either as individual elements or as components, can be incorporated in a simple way into different telecare systems, perhaps configuring a personal user network. Moreover, there is an increasing market pressure from companies not traditionally involved in medical markets, asking for a standard for personal health devices (PHD), which foresee a vast demand for telemonitoring, wellness, ambient assisted living (AAL) and applications for ubiquitous-health (u-health). However, the newly emerging situations imply very strict requirements for the protocols involved in the communication. The ISO/IEEE 11073 (X73) family of standards is adapting to new personal devices, implementing high quality sensors, and supporting wireless transport (e.g. Bluetooth) and the access to faster and reliable communication network resources. Its optimized version (X73-PHD) is adequate for this new technology snapshot and might appear the best-positioned international standards to reach this goal. This work presents an updated survey of this standard and its implementation in a middleware telemonitoring platform.
信息和通信技术(ICT)的进步为面向无处不在的环境和用于患者远程监测的可穿戴设备的中间件系统领域带来了新的机遇。面对这样的挑战,本文提出需要确定在家庭或移动场景中既开放又可互操作的强大技术远程监控解决方案。这些中间件系统需要具有成本效益的标准化解决方案,并利用标准化操作和互操作性。因此,一个基本的挑战是设计一个即插即用平台,该平台可以作为单独的元素或组件,以一种简单的方式集成到不同的远程医疗系统中,也许可以配置个人用户网络。此外,来自传统上不参与医疗市场的公司的市场压力越来越大,要求制定个人健康设备(PHD)标准,这预示着对远程监控、健康、环境辅助生活(AAL)和无处不在的健康(u-health)应用的巨大需求。然而,新出现的情况意味着对通信中涉及的协议有非常严格的要求。ISO/IEEE 11073 (X73)系列标准正在适应新的个人设备,实现高质量的传感器,支持无线传输(例如蓝牙)和访问更快、更可靠的通信网络资源。它的优化版本(X73-PHD)适合这种新技术快照,可能是实现这一目标的最佳国际标准。本文介绍了该标准及其在中间件远程监控平台中的实现的最新概况。
{"title":"Standard-Based Middleware Platform for Medical Sensor Networks and u-Health","authors":"I. Martínez, J. Escayola, M. Martínez-Espronceda, L. Serrano, J. Trigo, S. Led, José García","doi":"10.1109/ICCCN.2008.ECP.135","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.135","url":null,"abstract":"Advances in information and communication technologies, ICT, are bringing new opportunities in the field of middleware systems oriented to ubiquitous environments and wearable devices used for patient telemonitoring. At a time of such challenges, this paper arises from the need to identify robust technical telemonitoring solutions that are both open and interoperable in home or mobile scenarios. These middleware systems demand standardized solutions to be cost effective and to take advantage of standardized operation and interoperability. Thus, a fundamental challenge is to design a plug-&-play platform that, either as individual elements or as components, can be incorporated in a simple way into different telecare systems, perhaps configuring a personal user network. Moreover, there is an increasing market pressure from companies not traditionally involved in medical markets, asking for a standard for personal health devices (PHD), which foresee a vast demand for telemonitoring, wellness, ambient assisted living (AAL) and applications for ubiquitous-health (u-health). However, the newly emerging situations imply very strict requirements for the protocols involved in the communication. The ISO/IEEE 11073 (X73) family of standards is adapting to new personal devices, implementing high quality sensors, and supporting wireless transport (e.g. Bluetooth) and the access to faster and reliable communication network resources. Its optimized version (X73-PHD) is adequate for this new technology snapshot and might appear the best-positioned international standards to reach this goal. This work presents an updated survey of this standard and its implementation in a middleware telemonitoring platform.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128657379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
CAC-RD: A Call Admission Control for UMTS Networks c - rd: UMTS网络的呼叫接纳控制
C. R. Storck, A. Ribeiro, Fátima Duarte-Figueiredo
This work proposes CAC-RD: a call admission control for UMTS (universal mobile terrestrial system) networks. Its main challenge is to guaranty the maximum access/network availability while maintaining satisfactory performance levels. It is based on two schemes: channel reservation and network diagnosis. It reserves dynamically some channels to handovers, based on the network behavior. The diagnosis monitors the network utilization giving information to the CAC-RD decisions. There are some utilization thresholds that drive the blockings, telling CAC-RD when to accept or not a new call. Handovers and the conversational class are the CAC-RD priorities. Simulation results show that CAC-RD can guarantee network availability, reducing priority classes blocking and guarantying some network QoS requirements. Simulations had shown an average reduction of 40% and 11% in handovers and new classes blockings, respectively. Thus, results indicate that CAC-RD can guarantee access and QoS, keeping levels of agreement between performance and availability.
本工作提出了一种用于UMTS(通用移动地面系统)网络的呼叫接纳控制(CAC-RD)。它的主要挑战是保证最大的访问/网络可用性,同时保持令人满意的性能水平。它基于信道预留和网络诊断两种方案。它根据网络行为动态保留一些通道进行切换。诊断监视网络利用率,为CAC-RD决策提供信息。有一些利用率阈值驱动阻塞,告诉CAC-RD何时接受或不接受新调用。切换和会话类是CAC-RD的优先级。仿真结果表明,ca - rd可以保证网络的可用性,减少优先级阻塞,保证一定的网络QoS要求。模拟显示,在交接和新班级阻塞方面,平均分别减少了40%和11%。因此,结果表明,CAC-RD可以保证访问和QoS,保持性能和可用性之间的一致水平。
{"title":"CAC-RD: A Call Admission Control for UMTS Networks","authors":"C. R. Storck, A. Ribeiro, Fátima Duarte-Figueiredo","doi":"10.1109/ICCCN.2008.ECP.132","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.132","url":null,"abstract":"This work proposes CAC-RD: a call admission control for UMTS (universal mobile terrestrial system) networks. Its main challenge is to guaranty the maximum access/network availability while maintaining satisfactory performance levels. It is based on two schemes: channel reservation and network diagnosis. It reserves dynamically some channels to handovers, based on the network behavior. The diagnosis monitors the network utilization giving information to the CAC-RD decisions. There are some utilization thresholds that drive the blockings, telling CAC-RD when to accept or not a new call. Handovers and the conversational class are the CAC-RD priorities. Simulation results show that CAC-RD can guarantee network availability, reducing priority classes blocking and guarantying some network QoS requirements. Simulations had shown an average reduction of 40% and 11% in handovers and new classes blockings, respectively. Thus, results indicate that CAC-RD can guarantee access and QoS, keeping levels of agreement between performance and availability.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129431326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reliable Automatic Recognition for Pitch-Shifted Audio 可靠的自动识别音高移位音频
C. Bellettini, G. Mazzini
In this paper we present the difficulties involved in recognizing pitch-shifted audio, discussing its usage and implications. In the framework of audio fingerprinting techniques, we address the issue by proposing two complementary solutions, both of which can be exploited without affecting an existing reference database. As fingerprint algorithm, a well-known, robust method is employed in a modified version and providing insights on its peculiarities. Tests were carried out on a vast song library and exhibit an excellent success rate, up to considerable distortion magnitudes.
在本文中,我们提出了识别音高移位音频所涉及的困难,讨论了它的使用和意义。在音频指纹技术的框架中,我们通过提出两种互补的解决方案来解决这个问题,这两种解决方案都可以在不影响现有参考数据库的情况下被利用。作为指纹算法,本文采用了一种众所周知的鲁棒算法,并对其特性进行了改进。在一个巨大的歌曲库上进行了测试,并显示出极好的成功率,高达相当大的失真幅度。
{"title":"Reliable Automatic Recognition for Pitch-Shifted Audio","authors":"C. Bellettini, G. Mazzini","doi":"10.1109/ICCCN.2008.ECP.157","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.157","url":null,"abstract":"In this paper we present the difficulties involved in recognizing pitch-shifted audio, discussing its usage and implications. In the framework of audio fingerprinting techniques, we address the issue by proposing two complementary solutions, both of which can be exploited without affecting an existing reference database. As fingerprint algorithm, a well-known, robust method is employed in a modified version and providing insights on its peculiarities. Tests were carried out on a vast song library and exhibit an excellent success rate, up to considerable distortion magnitudes.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129199392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance Analysis of WiMedia UWB System for Medical Applications with Human Blockage 用于人体阻塞医疗的WiMedia UWB系统性能分析
Yue Shang, Dong Wang, D. Birru
Ultra-wide-band (UWB) is expected to enable highspeed short-range wireless connectivity of numerous devices in the consumer application space. It is also a very promising candidate technology for medical applications. However, a good understanding of the performance of the technology in the medical application environment is essential. In this paper, we present the results of the study on the effects of human body interfering with (blocking) the UWB radio signal, focusing on the performance of the WiMedia UWB technology for medical applications. The study includes channel measurements, modeling and performance evaluation using the channel models. The impact of human blockages on the wireless link is studied via system simulations for different UWB configurations, including the standard WiMedia UWB system with single receive (RX) antenna, (co-located) receive antenna selection system, and the (separately-located) device selection system. Link margin analysis is also performed to quantitatively evaluate the link robustness of different UWB setups against human blockages.
超宽带(UWB)有望实现消费者应用领域众多设备的高速短距离无线连接。它也是一种非常有前途的医学应用候选技术。然而,很好地理解该技术在医疗应用环境中的性能是至关重要的。在本文中,我们介绍了人体干扰(阻挡)超宽带无线电信号影响的研究结果,重点介绍了WiMedia超宽带技术在医疗应用中的性能。该研究包括通道测量、建模和使用通道模型的性能评估。通过不同UWB配置的系统仿真,研究了人为阻塞对无线链路的影响,包括具有单接收(RX)天线的标准WiMedia UWB系统,(共置)接收天线选择系统和(分开放置)设备选择系统。还进行了链路裕度分析,以定量评估不同超宽带设置对人为阻塞的链路鲁棒性。
{"title":"Performance Analysis of WiMedia UWB System for Medical Applications with Human Blockage","authors":"Yue Shang, Dong Wang, D. Birru","doi":"10.1109/ICCCN.2008.ECP.118","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.118","url":null,"abstract":"Ultra-wide-band (UWB) is expected to enable highspeed short-range wireless connectivity of numerous devices in the consumer application space. It is also a very promising candidate technology for medical applications. However, a good understanding of the performance of the technology in the medical application environment is essential. In this paper, we present the results of the study on the effects of human body interfering with (blocking) the UWB radio signal, focusing on the performance of the WiMedia UWB technology for medical applications. The study includes channel measurements, modeling and performance evaluation using the channel models. The impact of human blockages on the wireless link is studied via system simulations for different UWB configurations, including the standard WiMedia UWB system with single receive (RX) antenna, (co-located) receive antenna selection system, and the (separately-located) device selection system. Link margin analysis is also performed to quantitatively evaluate the link robustness of different UWB setups against human blockages.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic QoS Adaptation for Multimedia Traffic 多媒体流量动态QoS适配
Laercio Cruvinel, T. Vazão, Fernando M. Silva, António Fonseca
Quality of service for video and audio transmissions over IP is bound by the best-effort nature of this protocol. The road for achieving optimal behavior for selected flows of traffic includes better controlling and tuning one or more elements of the transmission - the characteristics of the traffic itself or the supporting hardware and software. This tuning may be static or dynamic, profile-based or adaptive. This paper presents results and insights of using an architecture for adapting QoS parameters in a DiffServ-enabled network, in an effort to dynamically reach the best choice of values in each given situation. The architecture is named distributed dynamic quality of service - DDQoS - and includes separate, but interoperating, models for the core and for the edge of the network. The momentum experienced by the transmission of multimedia content over the Internet, and the extended range of options for adapting this kind of traffic, derived from its particular characteristics when compared with other data, motivate this work on adaptation mechanisms for improving the quality of service.
通过IP传输的视频和音频的服务质量受到该协议的最大努力性质的约束。为选定的交通流实现最佳行为的途径包括更好地控制和调整传输的一个或多个要素——交通本身的特性或支持的硬件和软件。这种调优可以是静态的,也可以是动态的,基于概要文件的,也可以是自适应的。本文介绍了在启用diffserv的网络中使用一种架构来调整QoS参数的结果和见解,以努力在每种给定情况下动态地达到最佳值选择。该体系结构被命名为分布式动态服务质量(DDQoS),包括用于核心网络和边缘网络的独立但可互操作的模型。在互联网上传输多媒体内容所经历的势头,以及适应这种流量的选择范围的扩大,源于其与其他数据相比的特殊特性,激励了这项关于改进服务质量的适应机制的工作。
{"title":"Dynamic QoS Adaptation for Multimedia Traffic","authors":"Laercio Cruvinel, T. Vazão, Fernando M. Silva, António Fonseca","doi":"10.1109/ICCCN.2008.ECP.172","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.172","url":null,"abstract":"Quality of service for video and audio transmissions over IP is bound by the best-effort nature of this protocol. The road for achieving optimal behavior for selected flows of traffic includes better controlling and tuning one or more elements of the transmission - the characteristics of the traffic itself or the supporting hardware and software. This tuning may be static or dynamic, profile-based or adaptive. This paper presents results and insights of using an architecture for adapting QoS parameters in a DiffServ-enabled network, in an effort to dynamically reach the best choice of values in each given situation. The architecture is named distributed dynamic quality of service - DDQoS - and includes separate, but interoperating, models for the core and for the edge of the network. The momentum experienced by the transmission of multimedia content over the Internet, and the extended range of options for adapting this kind of traffic, derived from its particular characteristics when compared with other data, motivate this work on adaptation mechanisms for improving the quality of service.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124027501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A System Architecture for Evolving Protocol Stacks (Invited Paper) 演进协议栈的系统架构(特邀论文)
A. Keller, T. Hossmann, M. May, Ghazi Bouabene, Christophe Jelger, C. Tschudin
A majority of network architectures aim at solving specific shortcomings of the original Internet architecture. While providing solutions for the particular problems, they often lack in flexibility and do not provide general concepts for future networking requirements. In contrast, we introduce a network architecture that aims to be versatile enough to serve as a foundation for the future Internet. The main pillars of our architecture are communication pivots called information dispatch points (IDPs) which embed the concept of modularity at all levels of the architecture. IDPs completely decouple functional entities by means of indirection thus enabling evolving protocol stacks. Our architecture also provides a consistent application programming interface (API) to access node-local or network-wide functionality. In addition to the description of this architecture, we report about a working prototype of the architecture and we give examples of its application.
大多数网络架构旨在解决原有互联网架构的特定缺点。在为特定问题提供解决方案的同时,它们往往缺乏灵活性,并且不能为未来的网络需求提供一般概念。相反,我们引入了一种网络架构,其目标是足够通用,可以作为未来互联网的基础。我们体系结构的主要支柱是称为信息调度点(idp)的通信枢纽,它在体系结构的所有级别嵌入了模块化的概念。idp通过间接方式完全解耦功能实体,从而支持不断发展的协议栈。我们的体系结构还提供了一致的应用程序编程接口(API)来访问节点本地或网络范围的功能。除了对该体系结构的描述之外,我们还报告了该体系结构的工作原型,并给出了其应用的示例。
{"title":"A System Architecture for Evolving Protocol Stacks (Invited Paper)","authors":"A. Keller, T. Hossmann, M. May, Ghazi Bouabene, Christophe Jelger, C. Tschudin","doi":"10.1109/ICCCN.2008.ECP.44","DOIUrl":"https://doi.org/10.1109/ICCCN.2008.ECP.44","url":null,"abstract":"A majority of network architectures aim at solving specific shortcomings of the original Internet architecture. While providing solutions for the particular problems, they often lack in flexibility and do not provide general concepts for future networking requirements. In contrast, we introduce a network architecture that aims to be versatile enough to serve as a foundation for the future Internet. The main pillars of our architecture are communication pivots called information dispatch points (IDPs) which embed the concept of modularity at all levels of the architecture. IDPs completely decouple functional entities by means of indirection thus enabling evolving protocol stacks. Our architecture also provides a consistent application programming interface (API) to access node-local or network-wide functionality. In addition to the description of this architecture, we report about a working prototype of the architecture and we give examples of its application.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2008 Proceedings of 17th International Conference on Computer Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1