首页 > 最新文献

2008 International Symposium on Information Theory and Its Applications最新文献

英文 中文
Stateful public key encryption: How to remove gap assumptions and maintaining tight reductions 有状态公钥加密:如何消除间隙假设并保持严格缩减
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895436
Peng Yang, Rui Zhang, Kanta Matsuura
Stateful public key encryption schemes are introduced recently with improved efficiency over traditional stateless schemes. However, previous proposals are either based on strong assumptions; or admitting very loose security reductions. In this paper, we improve these aspects by presenting a stateful public key encryption scheme with tight security reduction to the computational Diffie-Hellman assumption (cf. gap Diffie-Hellman in [5]), as well as a stateful identity based encryption scheme with tighter security reduction (than [12]) to the computational bilinear Diffie-Hellman problem. It is worth reminding that it is always desirable to have the proofs with tight reductions such that the actual schemes can be practically-meaningful.
最近引入的有状态公钥加密方案比传统的无状态加密方案效率更高。然而,以前的建议要么是基于强有力的假设;或者承认非常松散的安全削减。在本文中,我们改进了这些方面,提出了一种对计算性Diffie-Hellman假设具有严格安全性降低的有状态公钥加密方案(参见[5]中的gap Diffie-Hellman),以及一种对计算性双线性Diffie-Hellman问题具有更严格安全性降低(比[12])的基于状态身份的加密方案。值得提醒的是,总是希望有严格约简的证明,以便实际方案具有实际意义。
{"title":"Stateful public key encryption: How to remove gap assumptions and maintaining tight reductions","authors":"Peng Yang, Rui Zhang, Kanta Matsuura","doi":"10.1109/ISITA.2008.4895436","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895436","url":null,"abstract":"Stateful public key encryption schemes are introduced recently with improved efficiency over traditional stateless schemes. However, previous proposals are either based on strong assumptions; or admitting very loose security reductions. In this paper, we improve these aspects by presenting a stateful public key encryption scheme with tight security reduction to the computational Diffie-Hellman assumption (cf. gap Diffie-Hellman in [5]), as well as a stateful identity based encryption scheme with tighter security reduction (than [12]) to the computational bilinear Diffie-Hellman problem. It is worth reminding that it is always desirable to have the proofs with tight reductions such that the actual schemes can be practically-meaningful.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115378534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An application of linear codes to Slepian-Wolf coding of individual sequences 线性码在单个序列Slepian-Wolf编码中的应用
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895662
S. Kuzuoka
This paper clarifies the adequacy of the linear channel coding approach for the Slepian-Wolf coding of individual sequences. Our result reveals that LDPC code ensembles give optimal code for the Slepian-Wolf coding of individual sequences.
本文阐明了线性信道编码方法对于单个序列的睡眠-狼编码的充分性。结果表明,LDPC编码集合体为单个序列的睡眠-狼编码提供了最优编码。
{"title":"An application of linear codes to Slepian-Wolf coding of individual sequences","authors":"S. Kuzuoka","doi":"10.1109/ISITA.2008.4895662","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895662","url":null,"abstract":"This paper clarifies the adequacy of the linear channel coding approach for the Slepian-Wolf coding of individual sequences. Our result reveals that LDPC code ensembles give optimal code for the Slepian-Wolf coding of individual sequences.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115712686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Asymptotic evaluation of distance measure on high dimensional vector spaces in text mining 文本挖掘中高维向量空间距离测度的渐近求值
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895453
M. Goto, T. Ishida, M. Suzuki, S. Hirasawa
This paper discusses the document classification problems in text mining from the viewpoint of asymptotic statistical analysis. In the problem of text mining, the several heuristics are applied to practical analysis because of its experimental effectiveness in many case studies. The theoretical explanation about the performance of text mining techniques is required and such thinking will give us very clear idea. In this paper, the performances of distance measures used to classify the documents are analyzed from the new viewpoint of asymptotic analysis. We also discuss the asymptotic performance of IDF measure used in the information retrieval field.
本文从渐近统计分析的角度讨论了文本挖掘中的文档分类问题。在文本挖掘问题中,由于其在许多案例研究中的实验有效性,几种启发式方法被应用到实际分析中。我们需要对文本挖掘技术的性能进行理论解释,这样的思考将给我们提供非常清晰的思路。本文从渐近分析的新观点出发,分析了用于文档分类的距离测度的性能。我们还讨论了IDF测度在信息检索领域的渐近性能。
{"title":"Asymptotic evaluation of distance measure on high dimensional vector spaces in text mining","authors":"M. Goto, T. Ishida, M. Suzuki, S. Hirasawa","doi":"10.1109/ISITA.2008.4895453","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895453","url":null,"abstract":"This paper discusses the document classification problems in text mining from the viewpoint of asymptotic statistical analysis. In the problem of text mining, the several heuristics are applied to practical analysis because of its experimental effectiveness in many case studies. The theoretical explanation about the performance of text mining techniques is required and such thinking will give us very clear idea. In this paper, the performances of distance measures used to classify the documents are analyzed from the new viewpoint of asymptotic analysis. We also discuss the asymptotic performance of IDF measure used in the information retrieval field.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"311 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124288463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A stream cipher design based on embedding of random bits 一种基于随机位嵌入的流密码设计
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895641
M. Mihaljević, H. Imai
A novel approach for design of stream ciphers based on a combination of pseudo-randomness and randomness is proposed. The core element of the approach is a pseudo-random embedding of the random bits into the ciphertext. This embedding plays a role of a homophonic encoding and implies an additional communications overhead. Before its output to the public communication channel the ciphertext with the embedded random bits is also intentionally degraded via its exposure to a moderate noise binary symmetric channel. The proposed design has potential of providing that complexity of recovering the secret key in the known plaintext attacking scenario is close to the complexity of recovering the secret key via the exhaustive search, i.e. close to the maximal possible one for the given size of secret key. Accordingly, the proposed approach can be considered as a trade-off between the increased security and decreased communications efficiency.
提出了一种基于伪随机性和随机性相结合的流密码设计方法。该方法的核心元素是将随机比特伪随机嵌入到密文中。这种嵌入起着同音编码的作用,并意味着额外的通信开销。在其输出到公共通信信道之前,具有嵌入随机位的密文也通过暴露于中等噪声二进制对称信道有意地降级。提出的设计有可能提供在已知明文攻击场景中恢复密钥的复杂性接近通过穷举搜索恢复密钥的复杂性,即接近给定密钥大小的最大可能复杂度。因此,所提出的方法可以被认为是提高安全性和降低通信效率之间的权衡。
{"title":"A stream cipher design based on embedding of random bits","authors":"M. Mihaljević, H. Imai","doi":"10.1109/ISITA.2008.4895641","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895641","url":null,"abstract":"A novel approach for design of stream ciphers based on a combination of pseudo-randomness and randomness is proposed. The core element of the approach is a pseudo-random embedding of the random bits into the ciphertext. This embedding plays a role of a homophonic encoding and implies an additional communications overhead. Before its output to the public communication channel the ciphertext with the embedded random bits is also intentionally degraded via its exposure to a moderate noise binary symmetric channel. The proposed design has potential of providing that complexity of recovering the secret key in the known plaintext attacking scenario is close to the complexity of recovering the secret key via the exhaustive search, i.e. close to the maximal possible one for the given size of secret key. Accordingly, the proposed approach can be considered as a trade-off between the increased security and decreased communications efficiency.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient optimization for tone reservation OFDM 语音保留OFDM的高效优化
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895430
A. Ghassemi, T. Gulliver
An efficient tone reservation (TR) technique for peak-to-average power ratio (PAPR) reduction in passband multicarrier systems is introduced. This reduces the number of variables in the quadratically constrained quadratic program (QCQP) for passband multicarrier modulation. The proposed PAPR reduction algorithm is developed using the structure of the inverse fast Fourier transform (IFFT). Considerable complexity reduction is achieved compared with existing TR algorithms. Simulation results are presented which demonstrate that the proposed algorithm yields performance close to that with other PAPR reduction solutions.
介绍了一种用于降低通带多载波系统峰均功率比(PAPR)的有效音调保留技术。这减少了在二次约束的二次规划(QCQP)的通带多载波调制变量的数量。利用快速傅里叶反变换(IFFT)的结构,提出了PAPR降低算法。与现有的TR算法相比,该算法大大降低了复杂度。仿真结果表明,该算法的性能与其他PAPR约简方法接近。
{"title":"Efficient optimization for tone reservation OFDM","authors":"A. Ghassemi, T. Gulliver","doi":"10.1109/ISITA.2008.4895430","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895430","url":null,"abstract":"An efficient tone reservation (TR) technique for peak-to-average power ratio (PAPR) reduction in passband multicarrier systems is introduced. This reduces the number of variables in the quadratically constrained quadratic program (QCQP) for passband multicarrier modulation. The proposed PAPR reduction algorithm is developed using the structure of the inverse fast Fourier transform (IFFT). Considerable complexity reduction is achieved compared with existing TR algorithms. Simulation results are presented which demonstrate that the proposed algorithm yields performance close to that with other PAPR reduction solutions.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116190038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Typical performance of irregular LDGM codes for lossy compression 不规则LDGM码有损压缩的典型性能
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895480
Kazushi Mimura
We evaluate typical performance of irregular low-density generator-matrix (LDGM) codes, which is defined by sparse matrices with arbitrary irregular bit degree distribution and arbitrary check degree distribution, for lossy compression. We apply the replica method under one-step replica symmetry breaking (1RSB) ansatz to this problem.
本文对不规则低密度生成矩阵(LDGM)码的典型有损压缩性能进行了评价。LDGM码是由具有任意不规则位度分布和任意校验度分布的稀疏矩阵定义的。我们将一步复制对称破缺(1RSB)解下的复制方法应用于该问题。
{"title":"Typical performance of irregular LDGM codes for lossy compression","authors":"Kazushi Mimura","doi":"10.1109/ISITA.2008.4895480","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895480","url":null,"abstract":"We evaluate typical performance of irregular low-density generator-matrix (LDGM) codes, which is defined by sparse matrices with arbitrary irregular bit degree distribution and arbitrary check degree distribution, for lossy compression. We apply the replica method under one-step replica symmetry breaking (1RSB) ansatz to this problem.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123955856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vector precoding for singular MIMO channels 奇异MIMO信道的矢量预编码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895552
V. Gardasevic, R. Muller, F. Knudsen
We propose a method for vector precoding suited to singular multiple-input multiple-output (MIMO) channels were the number of data streams is larger than the number of transmit antennas. We calculate the probability that our method, due to the channel singularity, fails to provide the data without crosstalk to the receiver, analytically, and show that this probability goes to zero exponentially with the size of the MIMO system if the number of QPSK data streams in smaller than twice the number of transmit antennas.
提出了一种适用于数据流数量大于发射天线数量的单一多输入多输出(MIMO)信道的矢量预编码方法。我们计算了由于信道奇点导致我们的方法无法向接收机提供无串扰数据的概率,并分析表明,如果QPSK数据流的数量小于发射天线数量的两倍,则该概率随着MIMO系统的大小呈指数增长为零。
{"title":"Vector precoding for singular MIMO channels","authors":"V. Gardasevic, R. Muller, F. Knudsen","doi":"10.1109/ISITA.2008.4895552","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895552","url":null,"abstract":"We propose a method for vector precoding suited to singular multiple-input multiple-output (MIMO) channels were the number of data streams is larger than the number of transmit antennas. We calculate the probability that our method, due to the channel singularity, fails to provide the data without crosstalk to the receiver, analytically, and show that this probability goes to zero exponentially with the size of the MIMO system if the number of QPSK data streams in smaller than twice the number of transmit antennas.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125737539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Noncoherent iterative decoding of symbol insertion systems 符号插入系统的非相干迭代解码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895476
M. Tanahashi, H. Ochiai
We have recently proposed symbol insertion (SI) systems for band-limited single-carrier transmission as a joint approach to channel coding and peak-to-average power ratio (PAR) reduction. At the transmitter, the SI periodically inserts redundant symbols into transmitted symbols to control the envelope fluctuation of the pulse-shaped signals. At the receiver, viewing the inserted symbols as parities, we exploit them for error-correction. Furthermore, concatenation of the SI and another code forms a serially-concatenated turbo system, which produces significant coding gain. In this paper, we show that, with differential encoding, the SI can easily accommodate to noncoherent reception.
我们最近提出了用于限带单载波传输的符号插入(SI)系统,作为信道编码和降低峰值平均功率比(PAR)的联合方法。在发送端,SI周期性地在发送的符号中插入冗余符号,以控制脉冲型信号的包络波动。在接收端,将插入的符号视为对偶,我们利用它们进行纠错。此外,SI和另一种代码的串联形成了串行连接的涡轮系统,这产生了显著的编码增益。在本文中,我们表明,差分编码,SI可以很容易地适应非相干接收。
{"title":"Noncoherent iterative decoding of symbol insertion systems","authors":"M. Tanahashi, H. Ochiai","doi":"10.1109/ISITA.2008.4895476","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895476","url":null,"abstract":"We have recently proposed symbol insertion (SI) systems for band-limited single-carrier transmission as a joint approach to channel coding and peak-to-average power ratio (PAR) reduction. At the transmitter, the SI periodically inserts redundant symbols into transmitted symbols to control the envelope fluctuation of the pulse-shaped signals. At the receiver, viewing the inserted symbols as parities, we exploit them for error-correction. Furthermore, concatenation of the SI and another code forms a serially-concatenated turbo system, which produces significant coding gain. In this paper, we show that, with differential encoding, the SI can easily accommodate to noncoherent reception.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124728087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilevel coded cooperation: Concepts and dsign criteria 多层编码合作:概念和设计标准
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895374
K. Ishii, K. Ishibashi, H. Ochiai
This paper proposes a new coded cooperation protocol based on multilevel coded modulation for the case when the number of cooperative nodes is arbitrary. If the number of cooperative nodes is N, the proposed system makes a cooperative diversity with the multilevel coded 2N-PAM. Multilevel coded 2N-PAM can be decomposed into N parallel binary channels. Thus, the node can assign its own information and the other nodes' information to respective parallel channels. The destination node decodes the information of respective source nodes using the received symbols at N consecutive time-slots. We show that the proposed multilevel coded cooperation can obtain N the diversity gain and outperform the time-division cooperative and signal superposing cooperative transmissions based on the outage probability analyses.
针对任意节点数量的情况,提出了一种基于多级编码调制的编码协作协议。当合作节点数为N时,采用多层编码2N-PAM进行合作分集。多电平编码2N-PAM可分解为N个并行二进制信道。因此,节点可以将自己的信息和其他节点的信息分配给各自的并行通道。目的节点使用连续N个时隙的接收符号对各自源节点的信息进行解码。结果表明,基于中断概率分析的多级编码合作传输方式可以获得N倍的分集增益,优于时分合作传输和信号叠加合作传输。
{"title":"Multilevel coded cooperation: Concepts and dsign criteria","authors":"K. Ishii, K. Ishibashi, H. Ochiai","doi":"10.1109/ISITA.2008.4895374","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895374","url":null,"abstract":"This paper proposes a new coded cooperation protocol based on multilevel coded modulation for the case when the number of cooperative nodes is arbitrary. If the number of cooperative nodes is N, the proposed system makes a cooperative diversity with the multilevel coded 2N-PAM. Multilevel coded 2N-PAM can be decomposed into N parallel binary channels. Thus, the node can assign its own information and the other nodes' information to respective parallel channels. The destination node decodes the information of respective source nodes using the received symbols at N consecutive time-slots. We show that the proposed multilevel coded cooperation can obtain N the diversity gain and outperform the time-division cooperative and signal superposing cooperative transmissions based on the outage probability analyses.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of one-way mode of hybrid reservation on slotted optical burst switching networks 单向混合保留模式对开槽光突发交换网络的影响
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895397
H. Noguchi, K. Kamakura
We introduce a hybrid of one-way and two-way reservations for slotted optical burst switching (S-OBS). Our hybrid method adds one-way mode to the two-way reservation, which has the idle time for ingress nodes to wait outcomes on preparing and scheduling at each node on the routes to egress nodes for the data segment used in S-OBS. The one-way mode enables ingress nodes to transmit data segments without waiting any outcome of the reservation of the channel resources on routes to egress nodes, though data segments are transmitted with waiting such outcomes in the two-way mode. The addition of the one-way mode reduces the idle time for ingress nodes to wait the acknowledgements of data segments in the two-way reservation method of S-OBS. We also explain the order of transmitting at the ingress node and receiving at the egress node for the correct order of the data segment. We analyze the end-to-end delay of the hybrid method, and show that the hybrid method decreases the end-to-end delay.
我们介绍了一种用于开槽光突发交换(S-OBS)的单向和双向混合保留。我们的混合方法在双向预约的基础上增加了单向模式,使进入节点有空闲时间等待S-OBS中使用的数据段在通往出口节点的路由上的准备和调度结果。单向模式允许入口节点传输数据段,而无需等待到出口节点的路由上通道资源保留的任何结果,而在双向模式下,数据段的传输需要等待这种结果。单向模式的加入减少了S-OBS双向保留方式中入口节点等待数据段确认的空闲时间。为了保证数据段的正确顺序,我们还解释了在入口节点发送和在出口节点接收的顺序。对混合方法的端到端时延进行了分析,结果表明混合方法降低了端到端时延。
{"title":"Effect of one-way mode of hybrid reservation on slotted optical burst switching networks","authors":"H. Noguchi, K. Kamakura","doi":"10.1109/ISITA.2008.4895397","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895397","url":null,"abstract":"We introduce a hybrid of one-way and two-way reservations for slotted optical burst switching (S-OBS). Our hybrid method adds one-way mode to the two-way reservation, which has the idle time for ingress nodes to wait outcomes on preparing and scheduling at each node on the routes to egress nodes for the data segment used in S-OBS. The one-way mode enables ingress nodes to transmit data segments without waiting any outcome of the reservation of the channel resources on routes to egress nodes, though data segments are transmitted with waiting such outcomes in the two-way mode. The addition of the one-way mode reduces the idle time for ingress nodes to wait the acknowledgements of data segments in the two-way reservation method of S-OBS. We also explain the order of transmitting at the ingress node and receiving at the egress node for the correct order of the data segment. We analyze the end-to-end delay of the hybrid method, and show that the hybrid method decreases the end-to-end delay.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129636406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2008 International Symposium on Information Theory and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1