首页 > 最新文献

2004 International Networking and Communication Conference最新文献

英文 中文
A study of host-based IDS using system calls 使用系统调用的基于主机的IDS的研究
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366573
M. Yasin, A.A. Awan
Intrusion detection systems (IDS) are complimentary to other security mechanisms such as access control and authentication. While signature based IDS are limited to known attacks only, anomaly based IDS are capable of detecting novel attacks. However, anomaly based systems usually trade performance for efficiency. We analyze various anomaly based IDS and list the strengths and weaknesses of different schemes. We conclude that the abstract stack model proposed by D. Wagner and D. Dean (see Proc. IEEE Symp. on Security and Privacy, 2001) shows best performance in detecting various types of attacks, while it suffers from substantial runtime overhead owing to its non deterministic nature. In a recently published approach utilizing code instrumentation, J.T. Giffin et al. (see Proc. NDSS Conf., 2004) minimize the runtime overhead while approaching the detection capability of the abstract stack model.
入侵检测系统(IDS)是访问控制和身份验证等其他安全机制的补充。基于签名的入侵检测仅限于已知的攻击,而基于异常的入侵检测则能够检测到新的攻击。然而,基于异常的系统通常以性能换取效率。分析了各种基于异常的入侵检测方案,列出了不同方案的优缺点。我们的结论是,D. Wagner和D. Dean提出的抽象堆栈模型(参见Proc. IEEE Symp)。关于安全和隐私,2001)在检测各种类型的攻击方面表现出最佳性能,但由于其不确定性的性质,它遭受了大量的运行时开销。在最近发表的一种利用代码插装的方法中,J.T. Giffin等人(见Proc. NDSS Conf., 2004)在接近抽象堆栈模型的检测能力的同时最小化了运行时开销。
{"title":"A study of host-based IDS using system calls","authors":"M. Yasin, A.A. Awan","doi":"10.1109/INCC.2004.1366573","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366573","url":null,"abstract":"Intrusion detection systems (IDS) are complimentary to other security mechanisms such as access control and authentication. While signature based IDS are limited to known attacks only, anomaly based IDS are capable of detecting novel attacks. However, anomaly based systems usually trade performance for efficiency. We analyze various anomaly based IDS and list the strengths and weaknesses of different schemes. We conclude that the abstract stack model proposed by D. Wagner and D. Dean (see Proc. IEEE Symp. on Security and Privacy, 2001) shows best performance in detecting various types of attacks, while it suffers from substantial runtime overhead owing to its non deterministic nature. In a recently published approach utilizing code instrumentation, J.T. Giffin et al. (see Proc. NDSS Conf., 2004) minimize the runtime overhead while approaching the detection capability of the abstract stack model.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116746904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Design and analysis of predictive reflected residual vector quantization 预测反射残差矢量量化的设计与分析
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366594
M. Khan, C. M. Imran, M. Shoaib, M. Sikander, H. Khiyal
Image communication is primarily constrained by its large bandwidth requirement. Therefore, researchers have worked on various compression algorithms to achieve low bit rates. Images and video sequences are highly-correlated sources and their correlation should be exploited in a given compression algorithm. Differential pulse code modulation (DPCM) emerged as a means of exploiting the correlation among image pixels. Later, DPCM was improved by predictive vector quantization (PVQ). PVQ employs block by block prediction and results in satisfactory performance at low bit rates. However, its design is complicated and recently an asymptotic closed-loop (ACL) was proposed to stabilize the design. We attempt to replace the VQ with a multistage VQ structure in the hope of further reducing the stress on the closed-loop design. We use the multistage VQ structure called reflected residual vector quantization (RRVQ). RRVQ works by imposing an additional symmetry constraint on the multistage codebook design. RRVQ has been quite popular where large block-length vector quantization is needed due to its very low codebook search capability. Our proposed design goal in replacing VQ with RRVQ in a PVQ design is our wish to use large block lengths like 16/spl times/16 or 32/spl times/32 size vectors to grab any linear/nonlinear correlation among the vector components. The way to incorporate RRVQ within PVQ structure is proposed and simulation results are discussed.
图像通信主要受到带宽需求大的限制。因此,研究人员研究了各种压缩算法来实现低比特率。图像和视频序列是高度相关的源,在给定的压缩算法中应充分利用它们之间的相关性。差分脉冲编码调制(DPCM)作为一种利用图像像素之间的相关性的手段而出现。随后,采用预测向量量化(PVQ)对DPCM进行改进。PVQ采用逐块预测,在低比特率下获得令人满意的性能。然而,它的设计是复杂的,最近提出了一种渐近闭环(ACL)来稳定设计。我们尝试用多级VQ结构代替VQ结构,希望进一步减少闭环设计的压力。我们使用了称为反射残差矢量量化(RRVQ)的多级VQ结构。RRVQ的工作原理是在多级码本设计上施加额外的对称约束。RRVQ由于其非常低的码本搜索能力,在需要大块长度矢量量化的情况下非常流行。我们在PVQ设计中用RRVQ代替VQ的设计目标是我们希望使用大的块长度,如16/spl倍/16或32/spl倍/32大小向量,以获取向量组件之间的任何线性/非线性相关性。提出了在PVQ结构中加入RRVQ的方法,并对仿真结果进行了讨论。
{"title":"Design and analysis of predictive reflected residual vector quantization","authors":"M. Khan, C. M. Imran, M. Shoaib, M. Sikander, H. Khiyal","doi":"10.1109/INCC.2004.1366594","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366594","url":null,"abstract":"Image communication is primarily constrained by its large bandwidth requirement. Therefore, researchers have worked on various compression algorithms to achieve low bit rates. Images and video sequences are highly-correlated sources and their correlation should be exploited in a given compression algorithm. Differential pulse code modulation (DPCM) emerged as a means of exploiting the correlation among image pixels. Later, DPCM was improved by predictive vector quantization (PVQ). PVQ employs block by block prediction and results in satisfactory performance at low bit rates. However, its design is complicated and recently an asymptotic closed-loop (ACL) was proposed to stabilize the design. We attempt to replace the VQ with a multistage VQ structure in the hope of further reducing the stress on the closed-loop design. We use the multistage VQ structure called reflected residual vector quantization (RRVQ). RRVQ works by imposing an additional symmetry constraint on the multistage codebook design. RRVQ has been quite popular where large block-length vector quantization is needed due to its very low codebook search capability. Our proposed design goal in replacing VQ with RRVQ in a PVQ design is our wish to use large block lengths like 16/spl times/16 or 32/spl times/32 size vectors to grab any linear/nonlinear correlation among the vector components. The way to incorporate RRVQ within PVQ structure is proposed and simulation results are discussed.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131766000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FLeSMA: a firewall level spam mitigation approach through a genetic classifier model FLeSMA:通过遗传分类器模型的防火墙级垃圾邮件缓解方法
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366572
M.N. Shah, M. A. Khan, R. Mahmood
Spamming is a serious issue for the Internet community. As well as incurring financial losses to many organisations, spamming causes mental frustration, and the spam content (much of which includes indecent material) causes embarrassment and presents moral issues. Many techniques and solutions have been presented over the past few years, but most of them cannot effectively deter the spamming issue totally. The major reason for the failure of these solutions is that spammers use the very protocols used for email transmission and forwarding to flood the network. One reason for the failure of new solutions is the high drop rate of legitimate emails by the receiver entity. Various solutions have been tried to deter spamming, but in vain. Although in theoretical tests these techniques provide an effective defence against the email message flood, the practical implementation of 100% spam protection is still far from reality. We describe a technical solution to prevent end users from receiving spam messages. Although our approach is simple and intuitive, it provides significant resistance against spam attack generation. Rather than countering the spamming at the receiver side,our solution counters the spamming attack at the point of origination, making it a more deterrent solution against spam based attacks.
垃圾邮件是互联网社区的一个严重问题。除了给许多组织造成经济损失外,垃圾邮件还会造成精神上的沮丧,垃圾邮件的内容(其中大部分包括不雅内容)会造成尴尬并引发道德问题。在过去的几年中,出现了许多技术和解决方案,但其中大多数都不能有效地完全阻止垃圾邮件问题。这些解决方案失败的主要原因是垃圾邮件发送者使用用于电子邮件传输和转发的协议来淹没网络。新解决方案失败的一个原因是接收实体的合法电子邮件丢失率很高。人们尝试了各种解决方案来阻止垃圾邮件,但都是徒劳的。虽然在理论测试中,这些技术提供了一个有效的防御电子邮件信息洪水,100%的垃圾邮件保护的实际实施仍然是遥不可及的。我们描述了一种防止终端用户接收垃圾邮件的技术解决方案。尽管我们的方法简单而直观,但它对垃圾邮件攻击的产生提供了显著的抵抗力。我们的解决方案不是在接收端对抗垃圾邮件,而是在发起点对抗垃圾邮件攻击,使其成为对抗基于垃圾邮件的攻击的更具威慑力的解决方案。
{"title":"FLeSMA: a firewall level spam mitigation approach through a genetic classifier model","authors":"M.N. Shah, M. A. Khan, R. Mahmood","doi":"10.1109/INCC.2004.1366572","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366572","url":null,"abstract":"Spamming is a serious issue for the Internet community. As well as incurring financial losses to many organisations, spamming causes mental frustration, and the spam content (much of which includes indecent material) causes embarrassment and presents moral issues. Many techniques and solutions have been presented over the past few years, but most of them cannot effectively deter the spamming issue totally. The major reason for the failure of these solutions is that spammers use the very protocols used for email transmission and forwarding to flood the network. One reason for the failure of new solutions is the high drop rate of legitimate emails by the receiver entity. Various solutions have been tried to deter spamming, but in vain. Although in theoretical tests these techniques provide an effective defence against the email message flood, the practical implementation of 100% spam protection is still far from reality. We describe a technical solution to prevent end users from receiving spam messages. Although our approach is simple and intuitive, it provides significant resistance against spam attack generation. Rather than countering the spamming at the receiver side,our solution counters the spamming attack at the point of origination, making it a more deterrent solution against spam based attacks.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115438425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of MPLS technology and traffic engineering applications MPLS技术概述及流量工程应用
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366566
I. Hussain
Summary form only given. Multiprotocol label switching (MPLS) employs label information to identify packets, and, unlike conventional IP routing, forwards packets based on label information instead of the packet's IP destination address. Label switched routers (LSRs) use signaling protocols to establish label switched paths (LSPs). In general, LSPs can follow conventionally routed shortest paths or explicit paths that could be different from the shortest paths. When an LSP is established along an explicit path, it is referred to as a traffic engineered (TE) LSP. In addition to allowing high performance forwarding architectures, MPLS technology enables other important applications. MPLS, TE mechanisms in particular, are increasingly being deployed by service providers to guarantee quality of service (QoS), to utilize network resources efficiently and to protect data traffic against network failures. The tutorial includes the following: a brief introduction of fundamental components of the MPLS technology; a brief overview of RSVP (resource reservation protocol) and its traffic engineering enhancements; an illustration of how enhanced RSVP can be used to establish TE LSP; a brief overview of the MPLS fast reroute (FRR) mechanism which can be used to reroute traffic quickly against link/node failures. Some previous exposure to IP routing protocols may be useful, but is not required.
只提供摘要形式。MPLS (Multiprotocol label switching)利用标签信息来识别报文,与传统的IP路由不同,它根据标签信息来转发报文,而不是根据报文的目的IP地址。lsr (Label switched routers)是一种通过信令协议建立lsp (Label switched paths)的路由器。一般来说,lsp可以遵循常规路由的最短路径,也可以遵循不同于最短路径的显式路径。当一条LSP是沿着一条显式路径建立的,我们称之为TE LSP。除了支持高性能转发架构外,MPLS技术还支持其他重要应用。服务提供商越来越多地部署MPLS,特别是TE机制,以保证服务质量(QoS)、有效利用网络资源和保护数据流量免受网络故障的影响。本教程包括以下内容:简要介绍MPLS技术的基本组件;概述了RSVP(资源预留协议)及其流量工程改进;说明如何使用增强的RSVP来建立TE LSP;简要介绍MPLS快速重路由(FRR)机制,该机制可用于在链路/节点故障时快速重路由流量。以前对IP路由协议的一些了解可能是有用的,但不是必需的。
{"title":"Overview of MPLS technology and traffic engineering applications","authors":"I. Hussain","doi":"10.1109/INCC.2004.1366566","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366566","url":null,"abstract":"Summary form only given. Multiprotocol label switching (MPLS) employs label information to identify packets, and, unlike conventional IP routing, forwards packets based on label information instead of the packet's IP destination address. Label switched routers (LSRs) use signaling protocols to establish label switched paths (LSPs). In general, LSPs can follow conventionally routed shortest paths or explicit paths that could be different from the shortest paths. When an LSP is established along an explicit path, it is referred to as a traffic engineered (TE) LSP. In addition to allowing high performance forwarding architectures, MPLS technology enables other important applications. MPLS, TE mechanisms in particular, are increasingly being deployed by service providers to guarantee quality of service (QoS), to utilize network resources efficiently and to protect data traffic against network failures. The tutorial includes the following: a brief introduction of fundamental components of the MPLS technology; a brief overview of RSVP (resource reservation protocol) and its traffic engineering enhancements; an illustration of how enhanced RSVP can be used to establish TE LSP; a brief overview of the MPLS fast reroute (FRR) mechanism which can be used to reroute traffic quickly against link/node failures. Some previous exposure to IP routing protocols may be useful, but is not required.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"107 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113960504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The roadmap to broadband wireless communications - from kbps to Gbps 宽带无线通信的路线图——从kbps到Gbps
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366563
S. A. Mujtaba
Summary form only given. The success of wireless communications for voice applications is evidenced by the sale of 400 million GSM cellular telephones every year world-wide. Wireless telephony has changed the way we live, work, and play. The emergence of the Internet in the last decade changed the way we share information with each other, be it via e-mail or through Web browsing. Today, all forms of information are available in digital formats, such as digital speech, digital audio, digital images, digital video, and of course digital text. The next revolution in our lives will be access to broadband digital content - anytime and anywhere. The underlying technology enabling this revolution would be seamless, ubiquitous broadband wireless communications. We present the fundamental mechanisms available to increase the data rate of wireless communication systems. These include bandwidth, constellation order, and multiple antennas. We step through the history of wireless communication systems (such as AMPS, IS-136/GSM, IS-95, IEEE 802.11, IEEE 802.15, IEEE 802.16), and show how the various standards have steadily pushed the broadband frontier. We highlight the practical limitations associated with the various signaling techniques (such as TDMA, CDMA, OFDM etc.), and discuss tradeoffs for designing a wireless communication system operating at 1 gigabit per second.
只提供摘要形式。全球每年销售4亿部GSM移动电话证明了语音应用无线通信的成功。无线电话改变了我们生活、工作和娱乐的方式。在过去的十年里,互联网的出现改变了我们彼此分享信息的方式,无论是通过电子邮件还是通过网页浏览。今天,所有形式的信息都以数字格式提供,例如数字语音、数字音频、数字图像、数字视频,当然还有数字文本。我们生活中的下一次革命将是随时随地接入宽带数字内容。实现这场革命的底层技术将是无缝的、无处不在的宽带无线通信。提出了提高无线通信系统数据速率的基本机制。这些包括带宽、星座顺序和多天线。我们将逐步介绍无线通信系统的历史(如AMPS, IS-136/GSM, IS-95, IEEE 802.11, IEEE 802.15, IEEE 802.16),并展示各种标准如何稳步推进宽带前沿。我们强调了与各种信号技术(如TDMA, CDMA, OFDM等)相关的实际限制,并讨论了设计以每秒1千兆比特运行的无线通信系统的权衡。
{"title":"The roadmap to broadband wireless communications - from kbps to Gbps","authors":"S. A. Mujtaba","doi":"10.1109/INCC.2004.1366563","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366563","url":null,"abstract":"Summary form only given. The success of wireless communications for voice applications is evidenced by the sale of 400 million GSM cellular telephones every year world-wide. Wireless telephony has changed the way we live, work, and play. The emergence of the Internet in the last decade changed the way we share information with each other, be it via e-mail or through Web browsing. Today, all forms of information are available in digital formats, such as digital speech, digital audio, digital images, digital video, and of course digital text. The next revolution in our lives will be access to broadband digital content - anytime and anywhere. The underlying technology enabling this revolution would be seamless, ubiquitous broadband wireless communications. We present the fundamental mechanisms available to increase the data rate of wireless communication systems. These include bandwidth, constellation order, and multiple antennas. We step through the history of wireless communication systems (such as AMPS, IS-136/GSM, IS-95, IEEE 802.11, IEEE 802.15, IEEE 802.16), and show how the various standards have steadily pushed the broadband frontier. We highlight the practical limitations associated with the various signaling techniques (such as TDMA, CDMA, OFDM etc.), and discuss tradeoffs for designing a wireless communication system operating at 1 gigabit per second.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122380485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel scalable interactive multiple-rate staggered broadcasting video-on-demand system 一种新型的可扩展交互式多速率交错广播视频点播系统
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366595
S.A. Azad, M. Murshed, L. Dooley
Ideally, video-on-demand (VOD) systems provide the user with the facility to watch any video at the time of their choice and permit interactive (VCR) functionality. Special contingency channels can be allocated in order to provide VCR functions; however; this threatens the scalability of the VOD system. Client buffering is an alternative, but, due to its discrete nature, present algorithms suffer from discontinuous VCR actions. A novel scheme for providing VCR functions is proposed by buffering a multiple-rate video channel. Significant improvements in both the overall percentage of discontinuous VCR actions and destination shifts are achieved, without having a dedicated interaction channel. It also has a simpler video fetching mechanism which leads to a low cost client system.
理想情况下,视频点播(VOD)系统为用户提供了在他们选择的时间观看任何视频的设施,并允许交互式(VCR)功能。可分配特别的应急频道,以提供录像机功能;然而;这对视频点播系统的可扩展性构成了威胁。客户端缓冲是另一种选择,但是,由于其离散性,目前的算法受到不连续的VCR动作的影响。提出了一种通过缓冲多速率视频信道来实现VCR功能的新方案。在没有专用交互通道的情况下,实现了不连续VCR操作和目的地转移的总体百分比的显着改善。它还具有更简单的视频获取机制,从而降低了客户端系统的成本。
{"title":"A novel scalable interactive multiple-rate staggered broadcasting video-on-demand system","authors":"S.A. Azad, M. Murshed, L. Dooley","doi":"10.1109/INCC.2004.1366595","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366595","url":null,"abstract":"Ideally, video-on-demand (VOD) systems provide the user with the facility to watch any video at the time of their choice and permit interactive (VCR) functionality. Special contingency channels can be allocated in order to provide VCR functions; however; this threatens the scalability of the VOD system. Client buffering is an alternative, but, due to its discrete nature, present algorithms suffer from discontinuous VCR actions. A novel scheme for providing VCR functions is proposed by buffering a multiple-rate video channel. Significant improvements in both the overall percentage of discontinuous VCR actions and destination shifts are achieved, without having a dedicated interaction channel. It also has a simpler video fetching mechanism which leads to a low cost client system.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128102716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Large block entropy-constrained reflected residual vector quantization 大块熵约束反射残差矢量量化
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366591
M. Khan
Multispectral imagery and video coding applications benefit from the use of large vector sizes. Other applications also require large vector sizes such as variable dimension vector quantizers (VQ) and transform VQ. Entropy-constrained reflected residual vector quantization (EC-RRVQ) is an algorithm that is used to design codebooks for image coding with large vector sizes in addition to high output rate while maintaining a very low complexity in terms of computations and memory requirements. EC-RRVQ has several advantages which are important. It can outperform entropy-constrained residual vector quantization (EC-RVQ) in terms of rate-distortion performance, encoder complexity computations, and memory. Experimental results indicate that good image reproduction quality can be accomplished at relatively low bit rates. For example, a peak signal-to-noise ratio of 29 dB is obtained for the 51/spl times/512 image Lena at a bit rate of 0.2 bpp with vector dimension of 16/spl times/16.
多光谱图像和视频编码应用得益于大矢量尺寸的使用。其他应用程序也需要较大的矢量大小,如可变维矢量量化器(VQ)和变换VQ。熵约束反射残差矢量量化(EC-RRVQ)算法是一种设计码本的算法,用于大矢量尺寸的图像编码,除了高输出速率,同时在计算和内存需求方面保持非常低的复杂度。EC-RRVQ有几个重要的优点。它在速率失真性能、编码器复杂度计算和内存方面优于熵约束残差矢量量化(EC-RVQ)。实验结果表明,在较低的比特率下可以实现较好的图像再现质量。例如,在比特率为0.2 bpp,矢量维数为16/spl倍/16的情况下,51/spl倍/512图像Lena的峰值信噪比为29 dB。
{"title":"Large block entropy-constrained reflected residual vector quantization","authors":"M. Khan","doi":"10.1109/INCC.2004.1366591","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366591","url":null,"abstract":"Multispectral imagery and video coding applications benefit from the use of large vector sizes. Other applications also require large vector sizes such as variable dimension vector quantizers (VQ) and transform VQ. Entropy-constrained reflected residual vector quantization (EC-RRVQ) is an algorithm that is used to design codebooks for image coding with large vector sizes in addition to high output rate while maintaining a very low complexity in terms of computations and memory requirements. EC-RRVQ has several advantages which are important. It can outperform entropy-constrained residual vector quantization (EC-RVQ) in terms of rate-distortion performance, encoder complexity computations, and memory. Experimental results indicate that good image reproduction quality can be accomplished at relatively low bit rates. For example, a peak signal-to-noise ratio of 29 dB is obtained for the 51/spl times/512 image Lena at a bit rate of 0.2 bpp with vector dimension of 16/spl times/16.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133846934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using CSP to model and analyze Transmission Control Protocol vulnerabilities within the broadcast network 利用CSP对广播网络中的传输控制协议漏洞进行建模和分析
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366574
H. Shahriari, R. Jalili
The spread of networks and their increasing complexity have complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. We have modeled a network, including a set of hosts (clients and servers), using the process algebra CSP (communicating sequential processes) in order to verify the Transmission Control Protocol (TCP) behavior against an active intruder. The model is verified using the FDR tool and, as a result, some attack scenarios which violate security are found. The scenarios show how an intruder can compromise the server trust to its clients. As the model is modular, extendable, and scalable, more complex attack scenarios (combinations of simple ones) can be detected using it.
网络的扩展及其日益增加的复杂性使安全分析的任务变得更加复杂。因此,自动核查方法近年来受到越来越多的关注。我们已经建立了一个网络模型,包括一组主机(客户端和服务器),使用进程代数CSP(通信顺序进程)来验证针对活跃入侵者的传输控制协议(TCP)行为。利用FDR工具对模型进行了验证,发现了一些违反安全的攻击场景。这些场景展示了入侵者如何危及对其客户机的服务器信任。由于该模型是模块化的、可扩展的和可伸缩的,因此可以使用它检测更复杂的攻击场景(简单攻击场景的组合)。
{"title":"Using CSP to model and analyze Transmission Control Protocol vulnerabilities within the broadcast network","authors":"H. Shahriari, R. Jalili","doi":"10.1109/INCC.2004.1366574","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366574","url":null,"abstract":"The spread of networks and their increasing complexity have complicated the task of security analysis. Accordingly, automatic verification approaches have received more attention recently. We have modeled a network, including a set of hosts (clients and servers), using the process algebra CSP (communicating sequential processes) in order to verify the Transmission Control Protocol (TCP) behavior against an active intruder. The model is verified using the FDR tool and, as a result, some attack scenarios which violate security are found. The scenarios show how an intruder can compromise the server trust to its clients. As the model is modular, extendable, and scalable, more complex attack scenarios (combinations of simple ones) can be detected using it.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117112342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Inline measurements: a native measurement technique for IPv6 networks 内联测量:IPv6网络的本地测量技术
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366587
D. Pezaros, David Hutchison, Robert Gardner, Francisco Garcia, Joe Sventek
Next generation convergence networks require ubiquitous measurement mechanisms able to assess dynamically the performance quality characteristics experienced by the different, aggregated traffic flows traversing end-to-end Internet paths. Existing service measurements fall into two main categories: active and passive. The paper introduces a complementary technique called 'inline measurements' that makes use of the extendible features of the emerging IPv6. Through the exploitation of native IPv6 extension headers, measurement triggers and minimal measurement data may be carried in the same packets as the payload data itself, providing a high level of probability that the behaviour of the real user traffic flow is being observed. By adding measurement functionality natively, at the network (IPv6) layer, inline measurements can potentially target all transport and application services, providing an accurate performance evaluation framework for next generation networks. The paper also presents the results from a dynamically configurable prototype implementation in which end-to-end, one-way delay and delay variation of real-time video streams have been measured.
下一代融合网络需要无处不在的测量机制,能够动态评估穿越端到端互联网路径的不同聚合流量所经历的性能质量特征。现有的服务度量分为两大类:主动和被动。本文介绍了一种称为“内联测量”的补充技术,该技术利用了新兴IPv6的可扩展特性。通过利用本地IPv6扩展报头,测量触发器和最小的测量数据可以作为有效载荷数据本身在相同的数据包中携带,提供了一个高水平的概率,即真实用户流量的行为被观察到。通过在网络(IPv6)层本地添加测量功能,内联测量可以潜在地针对所有传输和应用服务,为下一代网络提供准确的性能评估框架。本文还介绍了一个动态配置的原型实现的结果,其中测量了实时视频流的端到端、单向延迟和延迟变化。
{"title":"Inline measurements: a native measurement technique for IPv6 networks","authors":"D. Pezaros, David Hutchison, Robert Gardner, Francisco Garcia, Joe Sventek","doi":"10.1109/INCC.2004.1366587","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366587","url":null,"abstract":"Next generation convergence networks require ubiquitous measurement mechanisms able to assess dynamically the performance quality characteristics experienced by the different, aggregated traffic flows traversing end-to-end Internet paths. Existing service measurements fall into two main categories: active and passive. The paper introduces a complementary technique called 'inline measurements' that makes use of the extendible features of the emerging IPv6. Through the exploitation of native IPv6 extension headers, measurement triggers and minimal measurement data may be carried in the same packets as the payload data itself, providing a high level of probability that the behaviour of the real user traffic flow is being observed. By adding measurement functionality natively, at the network (IPv6) layer, inline measurements can potentially target all transport and application services, providing an accurate performance evaluation framework for next generation networks. The paper also presents the results from a dynamically configurable prototype implementation in which end-to-end, one-way delay and delay variation of real-time video streams have been measured.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134367688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Efficient use of multipliers in microprocessor implementation of Hamming distance for binary sequence correlation 利用乘法器在微处理器上实现汉明距离对二值序列的相关
Pub Date : 2004-06-11 DOI: 10.1109/INCC.2004.1366592
M. A. Tahir, A. Munawar, I. Taj
The paper focuses on a microprocessor implementation of the Hamming distance for binary correlation. It uses the fact that the binary correlation result can be derived from binary convolution (i.e., modeled with AND gates instead of XOR); as a result, convolution of multiple bits with multiple bits can be computed by a single multiplication instruction. This follows from a general proof for base-n convolution that is presented. Furthermore, using a hierarchical shift-addition approach, we can also reduce the number of additions in the subsequent step. The paper also shows that this approach can also be used in the frequency domain where an N/spl times/N point binary circular convolution can be modeled using an N/spl times/M double precision FFT, where M is a sub-multiple of N depending on the kernel size. Comparison of the time/frequency approaches is presented for different kernel/image sizes, with the help of benchmarking results.
本文主要研究一种基于汉明距离的二值相关的微处理器实现。它利用了二进制相关结果可以从二进制卷积中得到的事实(即,用与门而不是异或建模);因此,通过一条乘法指令就可以计算出多比特与多比特的卷积。这是从对以n为基底的卷积的一般证明中得出的。此外,使用分层移位加法方法,我们还可以减少后续步骤中的加法数量。本文还表明,这种方法也可以用于频域,其中N/spl乘以/N点二进制圆卷积可以使用N/spl乘以/M的双精度FFT来建模,其中M是N的子倍,取决于核大小。在基准测试结果的帮助下,对不同核/图像大小的时间/频率方法进行了比较。
{"title":"Efficient use of multipliers in microprocessor implementation of Hamming distance for binary sequence correlation","authors":"M. A. Tahir, A. Munawar, I. Taj","doi":"10.1109/INCC.2004.1366592","DOIUrl":"https://doi.org/10.1109/INCC.2004.1366592","url":null,"abstract":"The paper focuses on a microprocessor implementation of the Hamming distance for binary correlation. It uses the fact that the binary correlation result can be derived from binary convolution (i.e., modeled with AND gates instead of XOR); as a result, convolution of multiple bits with multiple bits can be computed by a single multiplication instruction. This follows from a general proof for base-n convolution that is presented. Furthermore, using a hierarchical shift-addition approach, we can also reduce the number of additions in the subsequent step. The paper also shows that this approach can also be used in the frequency domain where an N/spl times/N point binary circular convolution can be modeled using an N/spl times/M double precision FFT, where M is a sub-multiple of N depending on the kernel size. Comparison of the time/frequency approaches is presented for different kernel/image sizes, with the help of benchmarking results.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2004 International Networking and Communication Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1