首页 > 最新文献

2009 International Symposium on Autonomous Decentralized Systems最新文献

英文 中文
A cross-layer approach for data replication and gathering in decentralized long-living wireless sensor networks 分布式长寿命无线传感器网络中数据复制和收集的跨层方法
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207349
M. Brzozowski, K. Piotrowski, P. Langendörfer
Realizing highly reliable wireless sensor networks with a long lifetime is a challenging task. A long lifetime is normally achieved by low duty cycles and rare activity. High reliability requires the replication of data to cope with dying nodes, network fragmentation, etc. These problems become even harder to tackle in networks with no wired sink (decentralized networks), which can synchronize the nodes and store data. We thoroughly investigated the challenges and present a reasonable approach, which adopts cross-layer rendezvous and data dissemination schemes. Our protocol can achieve very good results for lifetime, efficient replication handling and data gathering in decentralized sensor networks. Off-the-shelf sensor nodes based on our approach offer a lifetime of two years. However, our simulation results reveal that very long sleep phases may lead to increased power consumption, which is not expected.
实现高可靠、长寿命的无线传感器网络是一项具有挑战性的任务。长寿命通常是通过低占空比和罕见的活动来实现的。高可靠性要求数据复制以应对节点死亡、网络碎片化等问题。在没有有线接收器(去中心化网络)的网络中,这些问题变得更加难以解决,因为去中心化网络可以同步节点和存储数据。我们深入研究了这些挑战,并提出了一种合理的方法,即采用跨层交会和数据分发方案。在分布式传感器网络中,我们的协议可以在生命周期、高效的复制处理和数据收集方面取得很好的效果。基于我们方法的现成传感器节点的使用寿命为两年。然而,我们的模拟结果显示,非常长的睡眠阶段可能会导致功耗增加,这是意料之外的。
{"title":"A cross-layer approach for data replication and gathering in decentralized long-living wireless sensor networks","authors":"M. Brzozowski, K. Piotrowski, P. Langendörfer","doi":"10.1109/ISADS.2009.5207349","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207349","url":null,"abstract":"Realizing highly reliable wireless sensor networks with a long lifetime is a challenging task. A long lifetime is normally achieved by low duty cycles and rare activity. High reliability requires the replication of data to cope with dying nodes, network fragmentation, etc. These problems become even harder to tackle in networks with no wired sink (decentralized networks), which can synchronize the nodes and store data. We thoroughly investigated the challenges and present a reasonable approach, which adopts cross-layer rendezvous and data dissemination schemes. Our protocol can achieve very good results for lifetime, efficient replication handling and data gathering in decentralized sensor networks. Off-the-shelf sensor nodes based on our approach offer a lifetime of two years. However, our simulation results reveal that very long sleep phases may lead to increased power consumption, which is not expected.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"4 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114049398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Virtual-device framework for autonomous decentralized multi-robot systems 自主分散多机器人系统的虚拟设备框架
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207333
Yansheng Zhang, F. Bastani
Autonomous decentralized multi-robot systems require a large number of robots to interact with each other in real-time to cooperatively perform some tasks. This paper systematically investigates the major issues that need to be addressed in methods of building multi-robot based virtual devices. A hierarchical structure is presented to enable the user to tele-control the system when some contingency occurs. Hence, the virtual device interface makes a user and multiple robots to cooperate seamlessly on various tasks that are difficult for a fully autonomous system or a fully tele-controlled system to perform. Specially, we present the virtual structure for a rigid-body transportation system that employs a large number of robots to lift a rigid body and transport it to a user specified location. Path and motion planners are designed to allow the system to move smoothly along an optimal path.
自治分散式多机器人系统需要大量的机器人实时交互,以协同完成一些任务。本文系统地研究了基于多机器人的虚拟设备构建方法中需要解决的主要问题。提出了一种分层结构,使用户能够在发生意外情况时远程控制系统。因此,虚拟设备接口使用户和多个机器人在各种任务上无缝合作,而这些任务是完全自主系统或完全远程控制系统难以执行的。特别地,我们提出了一个刚体运输系统的虚拟结构,该系统使用大量的机器人将刚体抬起并运输到用户指定的位置。路径和运动规划器的设计是为了使系统沿着最优路径平稳移动。
{"title":"Virtual-device framework for autonomous decentralized multi-robot systems","authors":"Yansheng Zhang, F. Bastani","doi":"10.1109/ISADS.2009.5207333","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207333","url":null,"abstract":"Autonomous decentralized multi-robot systems require a large number of robots to interact with each other in real-time to cooperatively perform some tasks. This paper systematically investigates the major issues that need to be addressed in methods of building multi-robot based virtual devices. A hierarchical structure is presented to enable the user to tele-control the system when some contingency occurs. Hence, the virtual device interface makes a user and multiple robots to cooperate seamlessly on various tasks that are difficult for a fully autonomous system or a fully tele-controlled system to perform. Specially, we present the virtual structure for a rigid-body transportation system that employs a large number of robots to lift a rigid body and transport it to a user specified location. Path and motion planners are designed to allow the system to move smoothly along an optimal path.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121331907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Elliptic Curve generation and key establishment on a 802.11 WLAN embedded device 802.11 WLAN嵌入式设备上的安全椭圆曲线生成和密钥建立
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207355
P. Papaioannou, P. Nastou, Y. Stamatiou, C. Zaroliagis
Elliptic Curve Cryptography (ECC) is one of the most promising alternatives to conventional public key cryptography, such as RSA and ElGamal, since it employs keys of smaller sizes for the same level of cryptographic strength. Smaller key sizes imply smaller hardware units for performing the arithmetic operations required by cryptographic protocols and, thus, ECC is an ideal candidate for implementation in embedded systems where the major computational resources (speed and storage) are limited. In this paper we present a port, written in ANSI C for maximum portability, of an open source ECC-based cryptographic library (ECC-LIB) to ATMEL's AT76C520 802.11 WLAN Access Point. One of the major features of this port, not found in similar ports, is that it supports Complex Multiplication (CM) for the construction of Elliptic Curves with good security properties. We present some experimental results that demonstrate that the port is efficient and can lead to generic embedded systems with robust ECC-based cryptographic protocols using cryptographically strong ECCs generated with CM. As an application of the ported library, an EC Diffie-Hellman key exchange protocol is developed as an alternative of the 4-way key handshake protocol of the 802.11 protocol.
椭圆曲线密码学(ECC)是传统公钥密码学(如RSA和ElGamal)最有前途的替代方案之一,因为它使用较小尺寸的密钥来实现相同级别的加密强度。较小的密钥大小意味着用于执行加密协议所需的算术运算的硬件单元更小,因此,ECC是在主要计算资源(速度和存储)有限的嵌入式系统中实现的理想候选者。在本文中,我们提出了一个端口,用ANSI C编写的最大可移植性,一个开源的基于ecc的加密库(ECC-LIB)到ATMEL的AT76C520 802.11 WLAN接入点。该端口的主要特性之一是支持复数乘法(CM),用于构造具有良好安全性的椭圆曲线,这是同类端口所没有的。我们给出了一些实验结果,证明该端口是有效的,并且可以使用CM生成的密码学强ecc生成具有鲁棒基于ecc的加密协议的通用嵌入式系统。作为端口库的一个应用,开发了EC Diffie-Hellman密钥交换协议,作为802.11协议的4路密钥握手协议的替代方案。
{"title":"Secure Elliptic Curve generation and key establishment on a 802.11 WLAN embedded device","authors":"P. Papaioannou, P. Nastou, Y. Stamatiou, C. Zaroliagis","doi":"10.1109/ISADS.2009.5207355","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207355","url":null,"abstract":"Elliptic Curve Cryptography (ECC) is one of the most promising alternatives to conventional public key cryptography, such as RSA and ElGamal, since it employs keys of smaller sizes for the same level of cryptographic strength. Smaller key sizes imply smaller hardware units for performing the arithmetic operations required by cryptographic protocols and, thus, ECC is an ideal candidate for implementation in embedded systems where the major computational resources (speed and storage) are limited. In this paper we present a port, written in ANSI C for maximum portability, of an open source ECC-based cryptographic library (ECC-LIB) to ATMEL's AT76C520 802.11 WLAN Access Point. One of the major features of this port, not found in similar ports, is that it supports Complex Multiplication (CM) for the construction of Elliptic Curves with good security properties. We present some experimental results that demonstrate that the port is efficient and can lead to generic embedded systems with robust ECC-based cryptographic protocols using cryptographically strong ECCs generated with CM. As an application of the ported library, an EC Diffie-Hellman key exchange protocol is developed as an alternative of the 4-way key handshake protocol of the 802.11 protocol.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126458143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Autonomous information services integration architecture for service assurance in multi-agent systems 多代理系统中服务保障的自主信息服务集成体系结构
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5208120
Xiaodong Lu, K. Mori
The market and users' requirements have been rapidly changing and diversified. Under these heterogeneous and dynamic situations, not only the system structure itself, but also the accessible information services would be changed constantly. To cope with the continuously changing conditions of service provision and utilization, Faded Information Field (FIF) has been proposed, which is an agent-based distributed information service system architecture. In the case of a mono-service request, the system is designed to improve users' access time and preserve load balancing through the information structure. However, with interdependent requests of multi-service increasing, adaptability, reliability and timeliness have to be assured by the system. In this paper, the relationship between the timeliness and the reliability of correlated services allocation and access is clarified. Based on these factors, the autonomous network-based heterogeneous information services integration technology to provide one-stop service for users' multi-service requests is proposed. The simulation results show the effectiveness of the proposed technology in comparison with the conventional systems.
市场和用户的需求一直在快速变化和多样化。在这种异构和动态的环境下,不仅系统本身的结构会不断变化,而且信息服务的可访问性也会不断变化。为了应对不断变化的服务提供和利用条件,提出了一种基于agent的分布式信息服务系统架构——消褪信息场(褪去信息场)。在单业务请求的情况下,系统通过信息结构来提高用户的访问时间和保持负载均衡。然而,随着多业务相互依赖需求的增加,系统必须保证适应性、可靠性和及时性。本文阐明了相关业务分配和接入的时效性与可靠性之间的关系。基于这些因素,提出了基于自治网络的异构信息服务集成技术,为用户的多种业务请求提供一站式服务。仿真结果表明,与传统系统相比,该技术是有效的。
{"title":"Autonomous information services integration architecture for service assurance in multi-agent systems","authors":"Xiaodong Lu, K. Mori","doi":"10.1109/ISADS.2009.5208120","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5208120","url":null,"abstract":"The market and users' requirements have been rapidly changing and diversified. Under these heterogeneous and dynamic situations, not only the system structure itself, but also the accessible information services would be changed constantly. To cope with the continuously changing conditions of service provision and utilization, Faded Information Field (FIF) has been proposed, which is an agent-based distributed information service system architecture. In the case of a mono-service request, the system is designed to improve users' access time and preserve load balancing through the information structure. However, with interdependent requests of multi-service increasing, adaptability, reliability and timeliness have to be assured by the system. In this paper, the relationship between the timeliness and the reliability of correlated services allocation and access is clarified. Based on these factors, the autonomous network-based heterogeneous information services integration technology to provide one-stop service for users' multi-service requests is proposed. The simulation results show the effectiveness of the proposed technology in comparison with the conventional systems.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hop-by-hop control for reliable data dissemination in wireless sensor networks 无线传感器网络中可靠数据分发的逐跳控制
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207335
Hosung Park, Taehee Kim, Jeongcheol Lee, Min-Sook Jin, Sang-Ha Kim
In many sensor applications such as intruder tracking, reliable data dissemination is necessary. Existing studies in ad hoc networks generally apply end-to-end control for reliability. This approach however could not adapt to wireless sensor networks (WSNs). Existing studies in WSNs generally apply multi-path approach for reliability. This approach however only increases probability but could not assure data dissemination. In typical WSNs, data are delivered from a source node to a destination node on routing path that is fixed within a certain period of time. This routing path is well-matched with notion of virtual circuit. Approaches based on virtual circuit traditionally use hop-by-hop control for reliable data dissemination. In this paper, we apply notion of virtual circuit to WSNs and propose hop-by-hop control for reliable data dissemination. The proposed scheme consists of three major functionalities: virtual circuit construction, hop-by-hop control, and virtual circuit management. Virtual circuit construction make sure constructing fixed routing path by routing table. Hop-by-hop control guarantees data transmission between two nodes, i.e. one hop, on virtual circuit by error detection and retransmission. Virtual circuit management prevents disconnecting circuit by reconstructing circuit. Simulation results show that the proposed scheme is efficient in terms of data delivery ratio and energy consumption.
在许多传感器应用中,如入侵者跟踪,可靠的数据分发是必要的。现有的自组织网络研究一般采用端到端控制来保证可靠性。但该方法不适用于无线传感器网络。现有研究一般采用多路径方法来提高无线传感器网络的可靠性。然而,这种方法只增加了概率,而不能保证数据的传播。在典型的wsn中,数据在一定时间内通过固定的路由路径从源节点传递到目的节点。该路由路径与虚电路的概念很好地匹配。基于虚拟电路的方法传统上采用逐跳控制来实现可靠的数据分发。本文将虚拟电路的概念应用到无线传感器网络中,提出了一跳一跳的控制方法来实现可靠的数据分发。该方案包括三个主要功能:虚拟电路构造、逐跳控制和虚拟电路管理。虚电路构造保证了通过路由表构造固定的路由路径。逐跳控制通过错误检测和重传来保证虚拟电路中两个节点(即一跳)之间的数据传输。虚拟电路管理通过重构电路来防止断开电路。仿真结果表明,该方案在数据传输率和能量消耗方面是有效的。
{"title":"Hop-by-hop control for reliable data dissemination in wireless sensor networks","authors":"Hosung Park, Taehee Kim, Jeongcheol Lee, Min-Sook Jin, Sang-Ha Kim","doi":"10.1109/ISADS.2009.5207335","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207335","url":null,"abstract":"In many sensor applications such as intruder tracking, reliable data dissemination is necessary. Existing studies in ad hoc networks generally apply end-to-end control for reliability. This approach however could not adapt to wireless sensor networks (WSNs). Existing studies in WSNs generally apply multi-path approach for reliability. This approach however only increases probability but could not assure data dissemination. In typical WSNs, data are delivered from a source node to a destination node on routing path that is fixed within a certain period of time. This routing path is well-matched with notion of virtual circuit. Approaches based on virtual circuit traditionally use hop-by-hop control for reliable data dissemination. In this paper, we apply notion of virtual circuit to WSNs and propose hop-by-hop control for reliable data dissemination. The proposed scheme consists of three major functionalities: virtual circuit construction, hop-by-hop control, and virtual circuit management. Virtual circuit construction make sure constructing fixed routing path by routing table. Hop-by-hop control guarantees data transmission between two nodes, i.e. one hop, on virtual circuit by error detection and retransmission. Virtual circuit management prevents disconnecting circuit by reconstructing circuit. Simulation results show that the proposed scheme is efficient in terms of data delivery ratio and energy consumption.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124012990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Node status monitoring and state transition mechanism for network centric X-by-Wire systems 以网络为中心的x线传系统的节点状态监控和状态转换机制
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207325
M. Matsubara, T. Kojima, K. Shimamura, N. Kanekawa, K. Sakurai
X-by-Wire systems are expected to enhance vehicle driving performance and safety. Regarding the dependable and cost-effective electronic platform for X-by-Wire systems, the network centric architecture is proposed based on a concept of autonomous decentralized systems. This architecture enables that, if one node fails, the remaining normal nodes autonomously execute a backup control to maintain the system function. This mechanism is served by a membership functionality implemented in a middleware that is independent from applications so that this mechanism can be applied to any applications. Following the concept proposal, the node status monitoring algorithm is designed because it is essential to identify the failed node accurately to execute the autonomous backup control. In this paper, to obtain a stability of a system throughout a driving, a sequence for autonomous start up and stop of the system is newly designed applying the node status monitoring function.
X-by-Wire系统有望提高车辆的驾驶性能和安全性。针对线控系统可靠、经济的电子平台问题,提出了基于自主分散系统概念的网络中心架构。这种架构允许在一个节点发生故障时,其余正常节点自动执行备份控制以维持系统功能。此机制由中间件中实现的成员功能提供,该功能独立于应用程序,因此该机制可以应用于任何应用程序。根据概念建议,设计节点状态监控算法,因为准确识别故障节点是执行自主备份控制的必要条件。为了获得系统在整个行驶过程中的稳定性,本文利用节点状态监测功能,设计了系统的自动启停顺序。
{"title":"Node status monitoring and state transition mechanism for network centric X-by-Wire systems","authors":"M. Matsubara, T. Kojima, K. Shimamura, N. Kanekawa, K. Sakurai","doi":"10.1109/ISADS.2009.5207325","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207325","url":null,"abstract":"X-by-Wire systems are expected to enhance vehicle driving performance and safety. Regarding the dependable and cost-effective electronic platform for X-by-Wire systems, the network centric architecture is proposed based on a concept of autonomous decentralized systems. This architecture enables that, if one node fails, the remaining normal nodes autonomously execute a backup control to maintain the system function. This mechanism is served by a membership functionality implemented in a middleware that is independent from applications so that this mechanism can be applied to any applications. Following the concept proposal, the node status monitoring algorithm is designed because it is essential to identify the failed node accurately to execute the autonomous backup control. In this paper, to obtain a stability of a system throughout a driving, a sequence for autonomous start up and stop of the system is newly designed applying the node status monitoring function.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126794946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Techniques for improved scheduling in optical burst switched networks 改进的光突发交换网络调度技术
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207359
C. Papazoglou, A. Pomportsis, P. Sarigiannidis, G. Papadimitriou
Optical burst switching (OBS) has emerged as a viable switching alternative in backbone optical networks since it can support high data rates with an intermediate granularity compared to wavelength routing and optical packet switching. At the edges of an OBS cloud, packets are assembled to form bursts which enter the network core and are switched on the fly using bandwidth previously reserved by their control packets at each node. A key problem in OBS networks is the assignment of wavelengths to incoming bursts, i.e. the scheduling of bursts. This paper proposes two new techniques which are shown to improve burst scheduling algorithms by lowering their complexity. The first proposed technique is based on a triangular estimator that defines a “drop zone”; bursts that fall into this area are considered to have a very low probability of finding a suitable wavelength and as such, no effort is made to schedule them. According to the second approach, the drop zone is defined dynamically based on the burst drop history. Simulation results show that both approaches yield burst drop rates marginally higher or identical to the LAUC-VF scheduling algorithm while reducing the number of channel or void checks and thus the algorithm complexity and execution time.
与波长路由和光分组交换相比,光突发交换(OBS)能够以中等粒度支持高数据速率,因此已成为骨干光网络中可行的交换选择。在OBS云的边缘,分组被组装成进入网络核心的突发,并使用之前由每个节点的控制分组保留的带宽进行动态切换。OBS网络中的一个关键问题是为传入突发分配波长,即突发调度。本文提出了两种新技术,通过降低突发调度算法的复杂度来改进突发调度算法。第一种提出的技术是基于一个三角估计器,它定义了一个“跌落区”;落入这个区域的爆发被认为有非常低的概率找到合适的波长,因此,没有努力去安排它们。根据第二种方法,根据突发跌落历史动态定义跌落区域。仿真结果表明,这两种方法的突发丢包率都略高于或等同于lac - vf调度算法,同时减少了通道或无效检查的次数,从而降低了算法的复杂度和执行时间。
{"title":"Techniques for improved scheduling in optical burst switched networks","authors":"C. Papazoglou, A. Pomportsis, P. Sarigiannidis, G. Papadimitriou","doi":"10.1109/ISADS.2009.5207359","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207359","url":null,"abstract":"Optical burst switching (OBS) has emerged as a viable switching alternative in backbone optical networks since it can support high data rates with an intermediate granularity compared to wavelength routing and optical packet switching. At the edges of an OBS cloud, packets are assembled to form bursts which enter the network core and are switched on the fly using bandwidth previously reserved by their control packets at each node. A key problem in OBS networks is the assignment of wavelengths to incoming bursts, i.e. the scheduling of bursts. This paper proposes two new techniques which are shown to improve burst scheduling algorithms by lowering their complexity. The first proposed technique is based on a triangular estimator that defines a “drop zone”; bursts that fall into this area are considered to have a very low probability of finding a suitable wavelength and as such, no effort is made to schedule them. According to the second approach, the drop zone is defined dynamically based on the burst drop history. Simulation results show that both approaches yield burst drop rates marginally higher or identical to the LAUC-VF scheduling algorithm while reducing the number of channel or void checks and thus the algorithm complexity and execution time.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123034574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ITU-T recommendations on peer-to-peer (P2P) network security ITU-T关于点对点(P2P)网络安全的建议
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207377
T. Hamai, M. Fujii, Yu Watanabe
Peer-to-peer (P2P) networks use diverse connectivity between participants in networks. P2P networks are useful for many purposes. Sharing content files containing audio, video, data or anything in digital format is very common, and real-time data, such as telephony traffic, is also passed using P2P technology. Because the P2P communication model differs from that of conventional server and client system, further security threats emerge, which are not applicable to server and client architecture. The Telecommunication Standardization Sector (ITU-T) developed network security Recommendations for P2P telecommunications on behalf of the International Telecommunication Union (ITU). This paper provides general survey of the Recommendations.
点对点(P2P)网络使用网络参与者之间的多种连接方式。P2P网络在很多方面都很有用。共享包含音频、视频、数据或任何数字格式的内容文件是非常常见的,实时数据,如电话流量,也使用P2P技术传递。由于P2P通信模式不同于传统的服务器和客户端系统,因此产生了更多的安全威胁,这些威胁不适用于服务器和客户端体系结构。电信标准化部门(ITU- t)代表国际电信联盟(ITU)制定了P2P电信的网络安全建议。本文对《建议》进行了概述。
{"title":"ITU-T recommendations on peer-to-peer (P2P) network security","authors":"T. Hamai, M. Fujii, Yu Watanabe","doi":"10.1109/ISADS.2009.5207377","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207377","url":null,"abstract":"Peer-to-peer (P2P) networks use diverse connectivity between participants in networks. P2P networks are useful for many purposes. Sharing content files containing audio, video, data or anything in digital format is very common, and real-time data, such as telephony traffic, is also passed using P2P technology. Because the P2P communication model differs from that of conventional server and client system, further security threats emerge, which are not applicable to server and client architecture. The Telecommunication Standardization Sector (ITU-T) developed network security Recommendations for P2P telecommunications on behalf of the International Telecommunication Union (ITU). This paper provides general survey of the Recommendations.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129481160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A method for Development of collaborative learning by using a neural network and a genetic algorithm 一种基于神经网络和遗传算法的协同学习开发方法
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207353
K. Shin-ike, H. Iima
In school education there are many kinds of learning styles, and it is known that group learning (collaborative learning) is more effective than individual learning. In colllaborative learning it is very important how to deternime the optimal combination of students in order to improve the learning effect In this paper we propose a method to improve the learning effect of collaborative learning resning. A neural network model is fiest applied for predicting learning result of pairs of students in collaborative learning. Then, in order to determine the opptimal pairs of students, a genetic algorithm is applied with the prediction result obtanined from the neural network. Based on this combination of students,we carried out an experiment of collaborative learning at a college in Japan. It was confirmed from the experimental results that the proposed method was effective.
在学校教育中有许多种学习方式,众所周知,小组学习(协作学习)比个人学习更有效。在协作学习中,如何确定学生的最佳组合以提高学习效果是非常重要的,本文提出了一种提高协作学习效果的方法。在协作学习中,神经网络模型被应用于对学生对学习结果的预测。然后,根据神经网络的预测结果,应用遗传算法确定最优的学生对。基于这样的学生组合,我们在日本的一所大学进行了协作学习的实验。实验结果表明,该方法是有效的。
{"title":"A method for Development of collaborative learning by using a neural network and a genetic algorithm","authors":"K. Shin-ike, H. Iima","doi":"10.1109/ISADS.2009.5207353","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207353","url":null,"abstract":"In school education there are many kinds of learning styles, and it is known that group learning (collaborative learning) is more effective than individual learning. In colllaborative learning it is very important how to deternime the optimal combination of students in order to improve the learning effect In this paper we propose a method to improve the learning effect of collaborative learning resning. A neural network model is fiest applied for predicting learning result of pairs of students in collaborative learning. Then, in order to determine the opptimal pairs of students, a genetic algorithm is applied with the prediction result obtanined from the neural network. Based on this combination of students,we carried out an experiment of collaborative learning at a college in Japan. It was confirmed from the experimental results that the proposed method was effective.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Approaches to evaluate performance of MICO as distributed automotive software platform MICO作为分布式汽车软件平台的性能评价方法
Pub Date : 2009-03-23 DOI: 10.1109/ISADS.2009.5207388
I. Abe, Y. Nakamoto, Hiroyuki Terada, Tatsunori Osaki
The size and complexity of large-scale distributed embedded systems such as automotive and process control have increased recently. Sophisticated systems in distributed systems that are safe and environment friendly require numerous types of sensor data, which are collected from various devices and sent to computers through networks. In order to develop large-scale distributed embedded systems, distributed object technology such as CORBA is widely used. In this study, we focus our attention on MICO, an implementation of CORBA; we study the performance of MICO and the overhead of a sample distributed system. MICO can be used for developing an execution environment platform for distributed embedded system software.
大规模分布式嵌入式系统(如汽车和过程控制)的规模和复杂性最近有所增加。分布式系统中的复杂系统既安全又环保,需要多种类型的传感器数据,这些数据从各种设备收集并通过网络发送到计算机。为了开发大规模分布式嵌入式系统,CORBA等分布式对象技术得到了广泛的应用。在本研究中,我们将重点放在CORBA的MICO实现上;我们研究了MICO的性能和一个样本分布式系统的开销。MICO可用于开发分布式嵌入式系统软件的执行环境平台。
{"title":"Approaches to evaluate performance of MICO as distributed automotive software platform","authors":"I. Abe, Y. Nakamoto, Hiroyuki Terada, Tatsunori Osaki","doi":"10.1109/ISADS.2009.5207388","DOIUrl":"https://doi.org/10.1109/ISADS.2009.5207388","url":null,"abstract":"The size and complexity of large-scale distributed embedded systems such as automotive and process control have increased recently. Sophisticated systems in distributed systems that are safe and environment friendly require numerous types of sensor data, which are collected from various devices and sent to computers through networks. In order to develop large-scale distributed embedded systems, distributed object technology such as CORBA is widely used. In this study, we focus our attention on MICO, an implementation of CORBA; we study the performance of MICO and the overhead of a sample distributed system. MICO can be used for developing an execution environment platform for distributed embedded system software.","PeriodicalId":342911,"journal":{"name":"2009 International Symposium on Autonomous Decentralized Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133337597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 International Symposium on Autonomous Decentralized Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1