首页 > 最新文献

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II最新文献

英文 中文
Customizing a geographical routing protocol for wireless sensor networks 自定义无线传感器网络的地理路由协议
Jing Chen, Y. Guan, U. Pooch
Several problems are required to be fixed in order to apply geographical routing protocol greedy perimeter stateless routing (GPSR) in wireless sensor networks. First, GPSR is designed under the assumption of symmetric links (i.e., bidirectional reachability), which is not realistic for many practical sensor networks, since wireless links in sensor networks often are asymmetric. Second, in sensor networks, packet destinations are often marked with locations instead of identifiers like IP address. Therefore, packets are routed to the home node, which is the node geographically closest to the destined location. Under GPSR, when the target location is outside the exterior perimeter of the sensor network, each packet has to visit all nodes on the boundary of the sensor network topology before it identifies the home node, which results in energy inefficiency. Third, due to the dynamic nature of sensor networks, maintaining data consistency, that is, data retrieved from the home node for a location should be consistent with the data sent to the same location, becomes a challenge when home nodes change. We propose on-demand GPSR (OD-GPSR), a data driven geographical routing protocol customized for sensor networks with solutions to the above three problems. Simulation results show that OD-GPSR performs well in terms of energy efficiency and packet delivery rate at the cost of a little bit more packet delivery delay.
在无线传感器网络中应用地理路由协议贪婪周边无状态路由(GPSR)需要解决几个问题。首先,GPSR是在对称链路(即双向可达)的假设下设计的,这对于许多实际的传感器网络来说是不现实的,因为传感器网络中的无线链路通常是不对称的。其次,在传感器网络中,数据包目的地通常用位置而不是像IP地址这样的标识符来标记。因此,数据包被路由到主节点,这是地理上最接近目标位置的节点。在GPSR下,当目标位置在传感器网络外周外时,每个数据包必须访问传感器网络拓扑边界上的所有节点才能识别出归属节点,这导致能量效率低下。第三,由于传感器网络的动态性,当归属节点发生变化时,保持数据一致性(即从归属节点检索到的某个位置的数据应与发送到同一位置的数据一致)成为一项挑战。我们提出按需GPSR (OD-GPSR),这是一种针对传感器网络定制的数据驱动地理路由协议,解决了上述三个问题。仿真结果表明,OD-GPSR在能量效率和数据包传输速率方面表现良好,但代价是数据包传输延迟稍长。
{"title":"Customizing a geographical routing protocol for wireless sensor networks","authors":"Jing Chen, Y. Guan, U. Pooch","doi":"10.1109/ITCC.2005.118","DOIUrl":"https://doi.org/10.1109/ITCC.2005.118","url":null,"abstract":"Several problems are required to be fixed in order to apply geographical routing protocol greedy perimeter stateless routing (GPSR) in wireless sensor networks. First, GPSR is designed under the assumption of symmetric links (i.e., bidirectional reachability), which is not realistic for many practical sensor networks, since wireless links in sensor networks often are asymmetric. Second, in sensor networks, packet destinations are often marked with locations instead of identifiers like IP address. Therefore, packets are routed to the home node, which is the node geographically closest to the destined location. Under GPSR, when the target location is outside the exterior perimeter of the sensor network, each packet has to visit all nodes on the boundary of the sensor network topology before it identifies the home node, which results in energy inefficiency. Third, due to the dynamic nature of sensor networks, maintaining data consistency, that is, data retrieved from the home node for a location should be consistent with the data sent to the same location, becomes a challenge when home nodes change. We propose on-demand GPSR (OD-GPSR), a data driven geographical routing protocol customized for sensor networks with solutions to the above three problems. Simulation results show that OD-GPSR performs well in terms of energy efficiency and packet delivery rate at the cost of a little bit more packet delivery delay.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128018905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Seamless channel transition for popular video broadcasting 无缝的频道转换,流行的视频广播
S.A. Azad, M. Murshed
The principal goal of near video-on-demand system is to minimize the average user waiting time. The user waiting time of popular videos can be reduced significantly by using broadcasting schemes such as fast broadcasting. Instead of allocating channels uniformly to all the videos, channels are nonuniformly distributed according to the relative popularity of the videos to minimize the average user waiting time. Since the demand for videos changes from time to time, the number of channels allocated to a video needs to be changed dynamically. The channel transition should be seamless so that the users currently watching the video do not experience any disruption due to this transition. Existing seamless channel transition scheme pads a dummy video stream at the end of the original video stream to produce exact correspondence between segments, but this approach causes some wastage of bandwidth. This paper proposes an improved seamless channel transition scheme which minimizes the wastage of bandwidth by preloading a postfix of the original video stream in the client buffer.
近视频点播系统的主要目标是最小化用户的平均等待时间。采用快速播放等播放方案可以显著缩短热门视频的用户等待时间。不是为所有视频统一分配频道,而是根据视频的相对受欢迎程度非均匀地分配频道,以尽量减少用户的平均等待时间。由于对视频的需求是不断变化的,因此分配给一个视频的信道数需要动态变化。频道转换应该是无缝的,以便当前观看视频的用户不会因为这种转换而经历任何中断。现有的无缝信道转换方案在原视频流的末端插入一个虚拟视频流,以产生段间的精确对应关系,但这种方法造成了一定的带宽浪费。本文提出了一种改进的无缝信道转换方案,该方案通过在客户端缓冲区中预加载原始视频流的后缀来最大限度地减少带宽浪费。
{"title":"Seamless channel transition for popular video broadcasting","authors":"S.A. Azad, M. Murshed","doi":"10.1109/ITCC.2005.251","DOIUrl":"https://doi.org/10.1109/ITCC.2005.251","url":null,"abstract":"The principal goal of near video-on-demand system is to minimize the average user waiting time. The user waiting time of popular videos can be reduced significantly by using broadcasting schemes such as fast broadcasting. Instead of allocating channels uniformly to all the videos, channels are nonuniformly distributed according to the relative popularity of the videos to minimize the average user waiting time. Since the demand for videos changes from time to time, the number of channels allocated to a video needs to be changed dynamically. The channel transition should be seamless so that the users currently watching the video do not experience any disruption due to this transition. Existing seamless channel transition scheme pads a dummy video stream at the end of the original video stream to produce exact correspondence between segments, but this approach causes some wastage of bandwidth. This paper proposes an improved seamless channel transition scheme which minimizes the wastage of bandwidth by preloading a postfix of the original video stream in the client buffer.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125462594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Watermark based digital rights management 基于水印的数字版权管理
Piyali Mandal, Ashish Thakral, S. Verma
The business of content providers is being threatened by technology advances in hardware, software and IP networks resulting in an increasing amount of illegal copies available online as well as offline. Digital rights management standards are being developed for the digital content and digital watermarking, a popular technique for content authentication and forgery prevention is viewed as an enabling technology to protect distributed content from unauthorized reuse, or reuse with inadequate credit. This paper establishes the role of an administrative body, by the name of Central Watermarking Body, in sharing the responsibilities of the content providers, in securing the genuine content and in protecting the rights of the customers by allowing them to judge if the content they have paid for, is genuine. The paper also highlights the objectives, technological details, the economic feasibility, the issues pertaining to the practical implementation and the limitations of the watermark based DRM model.
内容提供商的业务正受到硬件、软件和IP网络技术进步的威胁,导致在线和离线的非法拷贝数量不断增加。数字版权管理标准正在为数字内容和数字水印制定,数字水印是一种流行的内容认证和伪造预防技术,被视为一种使能技术,可以保护分布式内容免受未经授权的重用或不充分信用的重用。本文确立了一个名为中央水印机构的管理机构在分担内容提供者的责任、保护正版内容和保护消费者权利方面的作用,允许他们判断他们所购买的内容是否为正版。本文还重点介绍了基于水印的数字版权管理模型的目标、技术细节、经济可行性、实际实施中应注意的问题以及该模型的局限性。
{"title":"Watermark based digital rights management","authors":"Piyali Mandal, Ashish Thakral, S. Verma","doi":"10.1109/ITCC.2005.294","DOIUrl":"https://doi.org/10.1109/ITCC.2005.294","url":null,"abstract":"The business of content providers is being threatened by technology advances in hardware, software and IP networks resulting in an increasing amount of illegal copies available online as well as offline. Digital rights management standards are being developed for the digital content and digital watermarking, a popular technique for content authentication and forgery prevention is viewed as an enabling technology to protect distributed content from unauthorized reuse, or reuse with inadequate credit. This paper establishes the role of an administrative body, by the name of Central Watermarking Body, in sharing the responsibilities of the content providers, in securing the genuine content and in protecting the rights of the customers by allowing them to judge if the content they have paid for, is genuine. The paper also highlights the objectives, technological details, the economic feasibility, the issues pertaining to the practical implementation and the limitations of the watermark based DRM model.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Structure-oriented product versioning 面向结构的产品版本控制
T. Nguyen, E. Munson, J. Boyland, C. Thao
Internal structures of software artifacts, especially program source code, are very important to software engineers in developing a high-quality software. However, many existing version control and configuration management systems often treat program source code as a set of text lines and disregard logical structure. This creates burdensome for developers since the evolution of program structures is not recorded. This makes not only the development but also the maintenance of software systems less efficient. This paper describes a novel approach to fine-grained version control of source code and structured documents, called structure-oriented product versioning. The approach enables flexible management of the evolution of fine-grained units at any structural level in a software document.
软件构件的内部结构,特别是程序源代码,对于开发高质量软件的软件工程师来说是非常重要的。然而,许多现有的版本控制和配置管理系统经常将程序源代码视为一组文本行,而忽略了逻辑结构。这给开发人员带来了负担,因为程序结构的演变没有记录下来。这不仅降低了软件系统的开发效率,而且降低了软件系统的维护效率。本文描述了一种对源代码和结构化文档进行细粒度版本控制的新方法,称为面向结构的产品版本控制。该方法支持在软件文档的任何结构级别上灵活地管理细粒度单元的演变。
{"title":"Structure-oriented product versioning","authors":"T. Nguyen, E. Munson, J. Boyland, C. Thao","doi":"10.1109/ITCC.2005.263","DOIUrl":"https://doi.org/10.1109/ITCC.2005.263","url":null,"abstract":"Internal structures of software artifacts, especially program source code, are very important to software engineers in developing a high-quality software. However, many existing version control and configuration management systems often treat program source code as a set of text lines and disregard logical structure. This creates burdensome for developers since the evolution of program structures is not recorded. This makes not only the development but also the maintenance of software systems less efficient. This paper describes a novel approach to fine-grained version control of source code and structured documents, called structure-oriented product versioning. The approach enables flexible management of the evolution of fine-grained units at any structural level in a software document.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129974933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of loop reduction to learning program behaviors for anomaly detection 循环约简在异常检测程序行为学习中的应用
J. Long, D. Schwartz, S. Stoecklin, Mahesh K. Patel
Evidence of some attacks can be manifested by abnormal sequences of system calls of programs. Most approaches that have been developed so far mainly concentrate on some program-specific behaviors and ignore some plain behaviors of programs. According to the concept of locality of reference, programs tend to spend most of their time on a few lines of code rather than other parts of the program. We use this finding to propose a method of loop reduction. A loop reduction algorithm, when applied to a series of system calls, eliminates redundant data. We did experiments for the comparison before and after loop reduction with the same detection approach. The preliminary results show that loop reduction improves the quality of training data by removing redundancy.
一些攻击的证据可以通过程序的系统调用的异常序列表现出来。迄今为止开发的大多数方法主要集中在一些特定于程序的行为上,而忽略了程序的一些普通行为。根据引用局部性的概念,程序倾向于将大部分时间花在几行代码上,而不是程序的其他部分。我们利用这一发现提出了一种减少环路的方法。当应用于一系列系统调用时,循环减少算法可以消除冗余数据。我们用同样的检测方法,做了循环还原前后的对比实验。初步结果表明,循环缩减通过去除冗余来提高训练数据的质量。
{"title":"Application of loop reduction to learning program behaviors for anomaly detection","authors":"J. Long, D. Schwartz, S. Stoecklin, Mahesh K. Patel","doi":"10.1109/ITCC.2005.88","DOIUrl":"https://doi.org/10.1109/ITCC.2005.88","url":null,"abstract":"Evidence of some attacks can be manifested by abnormal sequences of system calls of programs. Most approaches that have been developed so far mainly concentrate on some program-specific behaviors and ignore some plain behaviors of programs. According to the concept of locality of reference, programs tend to spend most of their time on a few lines of code rather than other parts of the program. We use this finding to propose a method of loop reduction. A loop reduction algorithm, when applied to a series of system calls, eliminates redundant data. We did experiments for the comparison before and after loop reduction with the same detection approach. The preliminary results show that loop reduction improves the quality of training data by removing redundancy.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Concept-based information access 基于概念的信息访问
R. Ozcan, Y. Aslandogan
Concept-based access to information promises important benefits over keyword-based access. One of these benefits is the ability to take advantage of semantic relationships among concepts in finding relevant documents. Another benefit is the elimination of irrelevant documents by identifying conceptual mismatches. Concepts are mental structures. Words and phrases are the linguistic representatives of concepts. Due to the inherent conciseness of natural language, words can represent multiple concepts and different words may represent the same or very similar concepts. Word sense disambiguation attempts to resolve this ambiguity using contextual information. The use of an ontology facilitates identification of related concepts and their linguistic representatives given a key concept. Latent semantic analysis, on the other hand, attempts to reveal the hidden conceptual relationships among words and phrases based on linguistic usage patterns. In this work we explore the potential of concept-based information access via these two methods. We examine under what circumstances concept-based access becomes feasible and improves user experience.
基于概念的信息访问比基于关键字的访问更有优势。其中一个好处是能够利用概念之间的语义关系来查找相关文档。另一个好处是通过识别概念不匹配来消除不相关的文档。概念是心理结构。单词和短语是概念的语言代表。由于自然语言固有的简洁性,单词可以表示多个概念,不同的单词可以表示相同或非常相似的概念。词义消歧试图利用上下文信息来解决这种歧义。本体的使用有助于识别相关概念及其给出的关键概念的语言代表。而隐性语义分析则试图根据语言的使用模式揭示词和短语之间隐藏的概念关系。在这项工作中,我们通过这两种方法探索基于概念的信息访问的潜力。我们研究在什么情况下基于概念的访问变得可行并改善用户体验。
{"title":"Concept-based information access","authors":"R. Ozcan, Y. Aslandogan","doi":"10.1109/ITCC.2005.111","DOIUrl":"https://doi.org/10.1109/ITCC.2005.111","url":null,"abstract":"Concept-based access to information promises important benefits over keyword-based access. One of these benefits is the ability to take advantage of semantic relationships among concepts in finding relevant documents. Another benefit is the elimination of irrelevant documents by identifying conceptual mismatches. Concepts are mental structures. Words and phrases are the linguistic representatives of concepts. Due to the inherent conciseness of natural language, words can represent multiple concepts and different words may represent the same or very similar concepts. Word sense disambiguation attempts to resolve this ambiguity using contextual information. The use of an ontology facilitates identification of related concepts and their linguistic representatives given a key concept. Latent semantic analysis, on the other hand, attempts to reveal the hidden conceptual relationships among words and phrases based on linguistic usage patterns. In this work we explore the potential of concept-based information access via these two methods. We examine under what circumstances concept-based access becomes feasible and improves user experience.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133436662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Digital chips for an on-line casino 网上赌场的数字筹码
Jordi Castellà-Roca, G. Navarro, J. A. Ortega-Ruiz, Joaquín García
Unlike in traditional environments, e-gambling players must make a beforehand payment to start a game. Most on-line casinos currently solve this problem using prepayment systems where the on-line casino has absolute control over all the transactions among the players. However, this solution poses a great number of problems because of the necessary trust relation between players and the on-line casino managers. To reduce this strong trust relationship with the on-line casino, the authors proposed in this paper the use of a reliable digital chips system, which provides auditing facilities, and can be trusted by external parties. Digital chips, just like physical ones, will be used for players instead of legal course money. A set of cryptographic protocols will protect the different actions that players can perform using these digital chips.
与传统环境不同,电子赌博玩家必须事先付款才能开始游戏。大多数在线赌场目前使用预付系统解决了这个问题,其中在线赌场对玩家之间的所有交易拥有绝对控制权。然而,由于玩家和在线赌场经理之间的必要信任关系,这种解决方案带来了许多问题。为了减少与在线赌场的这种强烈信任关系,作者在本文中提出使用可靠的数字芯片系统,该系统提供审计设施,并且可以被外部各方信任。与实体芯片一样,数字芯片将代替合法的球场资金用于球员。一套加密协议将保护玩家使用这些数字芯片可以执行的不同动作。
{"title":"Digital chips for an on-line casino","authors":"Jordi Castellà-Roca, G. Navarro, J. A. Ortega-Ruiz, Joaquín García","doi":"10.1109/ITCC.2005.130","DOIUrl":"https://doi.org/10.1109/ITCC.2005.130","url":null,"abstract":"Unlike in traditional environments, e-gambling players must make a beforehand payment to start a game. Most on-line casinos currently solve this problem using prepayment systems where the on-line casino has absolute control over all the transactions among the players. However, this solution poses a great number of problems because of the necessary trust relation between players and the on-line casino managers. To reduce this strong trust relationship with the on-line casino, the authors proposed in this paper the use of a reliable digital chips system, which provides auditing facilities, and can be trusted by external parties. Digital chips, just like physical ones, will be used for players instead of legal course money. A set of cryptographic protocols will protect the different actions that players can perform using these digital chips.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133229971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on role-network model for e-government affairs 电子政务角色网络模型研究
Han Shengju, Wang Ning, Yu Miao
Constructing an e-gov affairs system requires complex systematic engineering, and it is difficult to be successful. Meanwhile, it is a very practical and independent action, and it is necessary to have a theoretic model suitable for an e-gov affairs environment. In this paper, based on the analysis of characteristics of e-government affairs, a role network model is proposed along with its relation to other relative models discussed. Finally, a formalization description of this model is given.
构建电子政务系统是一项复杂的系统工程,很难成功。同时,它又是一项非常实际和独立的行动,需要有一个适合电子政务环境的理论模型。本文在分析电子政务特点的基础上,提出了一个角色网络模型,并讨论了它与其他相关模型的关系。最后,给出了该模型的形式化描述。
{"title":"Research on role-network model for e-government affairs","authors":"Han Shengju, Wang Ning, Yu Miao","doi":"10.1109/ITCC.2005.247","DOIUrl":"https://doi.org/10.1109/ITCC.2005.247","url":null,"abstract":"Constructing an e-gov affairs system requires complex systematic engineering, and it is difficult to be successful. Meanwhile, it is a very practical and independent action, and it is necessary to have a theoretic model suitable for an e-gov affairs environment. In this paper, based on the analysis of characteristics of e-government affairs, a role network model is proposed along with its relation to other relative models discussed. Finally, a formalization description of this model is given.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126582878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MAC layer support for real-time traffic in a SAHN MAC层支持SAHN中的实时流量
M. Islam, R. Pose, C. Kopp
In multi-hop ad-hoc wireless networks with shared medium and a contention based media access control (MAC) protocol, guaranteed quality of service (QoS) support for realtime traffic (e.g. voice, video, interactive applications etc.) is very challenging. Commercially available contention based MAC protocols, e.g. IEEE 802.11e, do not provide any mechanism to prevent a network from getting overloaded. Hence they fail to provide desired QoS (e.g. throughput, end-to-end delay, delivery ratio) for realtime traffic when the network is loaded beyond certain limits. In our previous work we have explained in details why trivial solutions are inadequate to support deterministic QoS for real-time traffic in multi-hop ad-hoc networks. We have also presented an analytical model to offer a distributed admission control and bandwidth reservation scheme by extending the features of the basic channel access mechanism of IEEE 802.11e and coordinating with the network layer. In this paper we have extended our analytical model to make it more effective than the initial one by considering neighboring nodes in bandwidth calculation. We refer to the improved IEEE 802.11e as SAHN-MAC. The proposed admission control mechanism of SAHN-MAC prevents any new data stream from initiating if the new stream saturates or is about to saturate any part of the network. The bandwidth reservation scheme is necessary for the admission control scheme to work properly. The proposed mechanisms have also been verified and evaluated via various simulations.
在具有共享介质和基于争用的媒体访问控制(MAC)协议的多跳自组织无线网络中,对实时流量(如语音、视频、交互式应用等)的有保证的服务质量(QoS)支持是非常具有挑战性的。商用的基于争用的MAC协议,例如IEEE 802.11e,没有提供任何机制来防止网络过载。因此,当网络负载超过一定限制时,它们无法为实时流量提供所需的QoS(例如吞吐量、端到端延迟、交付比)。在我们之前的工作中,我们已经详细解释了为什么平凡的解决方案不足以支持多跳自组织网络中实时流量的确定性QoS。通过扩展IEEE 802.11e基本信道访问机制的特点,并与网络层协调,提出了一种分布式准入控制和带宽预留方案的分析模型。本文通过在带宽计算中考虑相邻节点,对分析模型进行了扩展,使其比初始模型更有效。我们将改进的IEEE 802.11e称为SAHN-MAC。提出的SAHN-MAC允许控制机制可以防止任何新的数据流在网络的任何部分饱和或即将饱和时启动。带宽预留方案是允许控制方案正常工作的必要条件。所提出的机制也已通过各种模拟进行了验证和评估。
{"title":"MAC layer support for real-time traffic in a SAHN","authors":"M. Islam, R. Pose, C. Kopp","doi":"10.1109/ITCC.2005.186","DOIUrl":"https://doi.org/10.1109/ITCC.2005.186","url":null,"abstract":"In multi-hop ad-hoc wireless networks with shared medium and a contention based media access control (MAC) protocol, guaranteed quality of service (QoS) support for realtime traffic (e.g. voice, video, interactive applications etc.) is very challenging. Commercially available contention based MAC protocols, e.g. IEEE 802.11e, do not provide any mechanism to prevent a network from getting overloaded. Hence they fail to provide desired QoS (e.g. throughput, end-to-end delay, delivery ratio) for realtime traffic when the network is loaded beyond certain limits. In our previous work we have explained in details why trivial solutions are inadequate to support deterministic QoS for real-time traffic in multi-hop ad-hoc networks. We have also presented an analytical model to offer a distributed admission control and bandwidth reservation scheme by extending the features of the basic channel access mechanism of IEEE 802.11e and coordinating with the network layer. In this paper we have extended our analytical model to make it more effective than the initial one by considering neighboring nodes in bandwidth calculation. We refer to the improved IEEE 802.11e as SAHN-MAC. The proposed admission control mechanism of SAHN-MAC prevents any new data stream from initiating if the new stream saturates or is about to saturate any part of the network. The bandwidth reservation scheme is necessary for the admission control scheme to work properly. The proposed mechanisms have also been verified and evaluated via various simulations.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127411153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A framework and process for curricular integration and innovation using project based interdisciplinary teams 课程整合和跨学科团队创新的框架和过程
F. Coyle, M. Thornton
This paper describes a framework and process for ongoing curricular integration and innovation based on feedback from the performance of undergraduate interdisciplinary teams working on problems that reflect the needs of industry. The five-step process is based on a top-down, objectives-based approach to bringing the computer science and engineering curriculum in line with computing practice. Critical to the effort is the selection of projects for undergraduate teams since project definitions serve both as an opportunity to challenge students and to lay the foundation for departmental direction. Each project is associated with a set of capability requirements that reflect what team members should both know and be able to do to meet project requirements. Upon project completion, expectations and actual performance are used in a curricular feedback loop to identify possible curricular modifications. We report on an ongoing implementation of this framework at Southern Methodist University (SMU) where integration between computer science and computer engineering serves as a testbed for the framework. At SMU, undergraduate students from computer science and computer engineering are teamed to develop applications that serve to bring core curricula in line with current trends in computing and industry needs.
本文描述了一个基于本科跨学科团队在反映行业需求的问题上的表现反馈的正在进行的课程整合和创新的框架和过程。五个步骤的过程是基于自上而下的,目标为基础的方法,使计算机科学和工程课程与计算实践相一致。这一努力的关键是为本科生团队选择项目,因为项目定义既是挑战学生的机会,也是为部门方向奠定基础的机会。每个项目都与一组能力需求相关联,这些需求反映了团队成员应该知道并能够做什么来满足项目需求。在项目完成后,期望和实际表现被用于课程反馈回路,以确定可能的课程修改。我们报告了南卫理公会大学(SMU)正在进行的该框架的实现,其中计算机科学和计算机工程之间的集成充当了该框架的测试平台。在新大,计算机科学和计算机工程专业的本科生合作开发应用程序,使核心课程符合当前计算和行业需求的趋势。
{"title":"A framework and process for curricular integration and innovation using project based interdisciplinary teams","authors":"F. Coyle, M. Thornton","doi":"10.1109/ITCC.2005.9","DOIUrl":"https://doi.org/10.1109/ITCC.2005.9","url":null,"abstract":"This paper describes a framework and process for ongoing curricular integration and innovation based on feedback from the performance of undergraduate interdisciplinary teams working on problems that reflect the needs of industry. The five-step process is based on a top-down, objectives-based approach to bringing the computer science and engineering curriculum in line with computing practice. Critical to the effort is the selection of projects for undergraduate teams since project definitions serve both as an opportunity to challenge students and to lay the foundation for departmental direction. Each project is associated with a set of capability requirements that reflect what team members should both know and be able to do to meet project requirements. Upon project completion, expectations and actual performance are used in a curricular feedback loop to identify possible curricular modifications. We report on an ongoing implementation of this framework at Southern Methodist University (SMU) where integration between computer science and computer engineering serves as a testbed for the framework. At SMU, undergraduate students from computer science and computer engineering are teamed to develop applications that serve to bring core curricula in line with current trends in computing and industry needs.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133837558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1