首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
The Contextual Group Recommendation 上下文小组建议
Jing Wang, Hui Li, H Zhao
The context-aware calculation method is applied to the model of recommendation system in this paper. Based on context of scenario analysis and inference, we can implement recommendation for user group. This paper makes use of the context of scenarios aware technology, which fuses multi-source data from smart phones, sensor networks and social networks for the scenario modeling and inference, and then formats the context clues to build the perceptual model of the context scenarios to predict the behavior patterns of the user group for the group recommendation, which meet the needs of the user group. We have analyzed the recommendation process and performed a subjective test to show the usefulness of the proposed system.
本文将上下文感知计算方法应用到推荐系统模型中。在情境分析和推理的基础上,实现对用户群的推荐。本文利用情境感知技术,融合来自智能手机、传感器网络和社交网络的多源数据进行情境建模和推理,然后对情境线索进行格式化,构建情境场景的感知模型,预测用户群体的行为模式,进行群体推荐,满足用户群体的需求。我们分析了推荐过程,并进行了主观测试,以显示所提议系统的有用性。
{"title":"The Contextual Group Recommendation","authors":"Jing Wang, Hui Li, H Zhao","doi":"10.1109/INCoS.2013.27","DOIUrl":"https://doi.org/10.1109/INCoS.2013.27","url":null,"abstract":"The context-aware calculation method is applied to the model of recommendation system in this paper. Based on context of scenario analysis and inference, we can implement recommendation for user group. This paper makes use of the context of scenarios aware technology, which fuses multi-source data from smart phones, sensor networks and social networks for the scenario modeling and inference, and then formats the context clues to build the perceptual model of the context scenarios to predict the behavior patterns of the user group for the group recommendation, which meet the needs of the user group. We have analyzed the recommendation process and performed a subjective test to show the usefulness of the proposed system.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134283026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Implementation of Tate Pairing with Montgomery Ladder Method 用Montgomery阶梯方法有效实现Tate配对
Yulong Tian, Dawu Gu, Haihua Gu
The basic algorithm used in pairing computation was first described by Miller and this algorithm can be named double-and-add and line-and-tangle algorithm. We will describe, in detail sufficient, a variant of Miller's which will replace double-and-add method with Montgomery ladder method. In order to achieve better efficiency, parallel method will be used. We observe that, in many practical settings, affine coordinate are faster than projective coordinate in Miller algorithm. Therefore, we mainly discuss situations in affine coordinate. In affine coordinate, the cost comparison of our algorithm with previously basic algorithms shows an efficiency improvement of around 30% in general elliptic curves.
结对计算中使用的基本算法是由Miller首先描述的,该算法可命名为double and add和line and tangle算法。我们将充分详细地描述米勒的一种变体,它将用蒙哥马利阶梯法取代双加法。为了获得更好的效率,将采用并行方法。我们观察到,在许多实际设置中,仿射坐标比射影坐标在Miller算法中更快。因此,我们主要讨论仿射坐标下的情形。在仿射坐标下,我们的算法与以前的基本算法的成本比较表明,在一般椭圆曲线上,我们的算法的效率提高了30%左右。
{"title":"Efficient Implementation of Tate Pairing with Montgomery Ladder Method","authors":"Yulong Tian, Dawu Gu, Haihua Gu","doi":"10.1109/INCoS.2013.75","DOIUrl":"https://doi.org/10.1109/INCoS.2013.75","url":null,"abstract":"The basic algorithm used in pairing computation was first described by Miller and this algorithm can be named double-and-add and line-and-tangle algorithm. We will describe, in detail sufficient, a variant of Miller's which will replace double-and-add method with Montgomery ladder method. In order to achieve better efficiency, parallel method will be used. We observe that, in many practical settings, affine coordinate are faster than projective coordinate in Miller algorithm. Therefore, we mainly discuss situations in affine coordinate. In affine coordinate, the cost comparison of our algorithm with previously basic algorithms shows an efficiency improvement of around 30% in general elliptic curves.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132743773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network 基于属性多重签名方案的无线网络数据完整性验证
Ximeng Liu, Tao Zhang, Jianfeng Ma, Hui Zhu, Feng Cai
Attribute based signature scheme is an important cryptographic primitive providing a powerful way for user to control their privacy. In wireless environment, the capacity of wireless channel is valuable resources which is limited. More information can be transmitted through the wireless channel when the cost of using signature to verify the message become less. In order to reduce the bandwidth needed to transmit attribute based signatures and keep signer's privacy, attribute based multi-signature scheme(ABMS) was proposed in this paper. Moveover, We formalized and constructed the ABMS. Our scheme is existentially unforgeable against chosen message attack and on Computational Diffie-Hellman(CDH) problem in the standard model. Analysis shows that our ABMS is more appropriate for wireless network to guarantee integrity of the data.
基于属性的签名方案是一种重要的密码原语,为用户提供了一种强大的隐私控制手段。在无线环境下,无线信道的容量是有限的宝贵资源。当使用签名验证消息的成本降低时,可以通过无线信道传输更多的信息。为了减少传输基于属性签名所需的带宽并保护签名者的隐私,提出了基于属性的多重签名方案(ABMS)。此外,我们还形式化并构建了ABMS。该方案对选择消息攻击和标准模型中的计算Diffie-Hellman(CDH)问题具有存在不可伪造性。分析表明,我们的ABMS更适合无线网络,可以保证数据的完整性。
{"title":"Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network","authors":"Ximeng Liu, Tao Zhang, Jianfeng Ma, Hui Zhu, Feng Cai","doi":"10.1109/INCoS.2013.34","DOIUrl":"https://doi.org/10.1109/INCoS.2013.34","url":null,"abstract":"Attribute based signature scheme is an important cryptographic primitive providing a powerful way for user to control their privacy. In wireless environment, the capacity of wireless channel is valuable resources which is limited. More information can be transmitted through the wireless channel when the cost of using signature to verify the message become less. In order to reduce the bandwidth needed to transmit attribute based signatures and keep signer's privacy, attribute based multi-signature scheme(ABMS) was proposed in this paper. Moveover, We formalized and constructed the ABMS. Our scheme is existentially unforgeable against chosen message attack and on Computational Diffie-Hellman(CDH) problem in the standard model. Analysis shows that our ABMS is more appropriate for wireless network to guarantee integrity of the data.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Learning-Based Framework for Image Segmentation Evaluation 基于学习的图像分割评价框架
Jian Lin, Bo Peng, Tianrui Li, Qin Chen
Image segmentation is a fundamental task in automatic image analysis. However, there is still no generally accepted effectiveness measure which is suitable for evaluating the segmentation quality in every application. In this paper, we propose an evaluation framework which benefits from multiple stand-alone measures. To this end, different segmentation evaluation measures are chosen to evaluate segmentation separately, and the results are effectively combined using machine learning methods. We train and implement this framework in the segmentation dataset which contains images of different contents with segmentation ground truth produced by human. In addition, we provide human evaluation of image segmentation pairs to benchmark the evaluation results of the measures. Experimental results show a better performance than the stand-alone methods.
图像分割是图像自动分析的一项基本任务。然而,目前还没有一种普遍接受的、适用于各种应用中分割质量评价的有效性度量。在本文中,我们提出了一个评估框架,受益于多个独立的措施。为此,选择不同的分割评价指标分别对分割进行评价,并利用机器学习方法对结果进行有效的组合。我们在包含不同内容的图像的分割数据集上训练并实现了该框架,该数据集具有人工生成的分割ground truth。此外,我们还提供了对图像分割对的人工评价,以对这些度量的评价结果进行基准测试。实验结果表明,该方法具有较好的性能。
{"title":"A Learning-Based Framework for Image Segmentation Evaluation","authors":"Jian Lin, Bo Peng, Tianrui Li, Qin Chen","doi":"10.1109/INCoS.2013.133","DOIUrl":"https://doi.org/10.1109/INCoS.2013.133","url":null,"abstract":"Image segmentation is a fundamental task in automatic image analysis. However, there is still no generally accepted effectiveness measure which is suitable for evaluating the segmentation quality in every application. In this paper, we propose an evaluation framework which benefits from multiple stand-alone measures. To this end, different segmentation evaluation measures are chosen to evaluate segmentation separately, and the results are effectively combined using machine learning methods. We train and implement this framework in the segmentation dataset which contains images of different contents with segmentation ground truth produced by human. In addition, we provide human evaluation of image segmentation pairs to benchmark the evaluation results of the measures. Experimental results show a better performance than the stand-alone methods.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131006330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved Efficient Priority-and-Activity-Based QoS MAC Protocol 改进的基于优先级和活动的QoS MAC协议
Xiaoyu Li, Nan Chen, Changhua Zhu, Changxing Pei
Wireless network has significantly affected human life. MAC protocols which already existed mostly transmit data without priority so that emergency event data cannot be sent quickly to destination nodes. In this paper, a new protocol called priority-and-activity-based QoS MAC (PAQMAC) protocol is proposed, in which not only the priority of data in transmission is considered, but also the active time is dynamical adjusted by recording the activity degree in a duty cycle. With the priority classified, it provides enough time to deal with emergency event, thus the security and management of network are also improved. Simulation results show that PAQMAC protocol can reduce transmission delay and decrease energy consumption of network.
无线网络已经极大地影响了人类的生活。现有的MAC协议在传输数据时大多没有优先级,导致紧急事件数据无法快速发送到目的节点。本文提出了一种新的基于优先级和活动的QoS MAC (PAQMAC)协议,该协议不仅考虑传输数据的优先级,而且通过记录一个占空比内的活动程度来动态调整活动时间。通过对优先级进行分类,为应急事件的处理提供了充足的时间,从而提高了网络的安全性和管理性。仿真结果表明,PAQMAC协议可以减少传输延迟,降低网络能耗。
{"title":"Improved Efficient Priority-and-Activity-Based QoS MAC Protocol","authors":"Xiaoyu Li, Nan Chen, Changhua Zhu, Changxing Pei","doi":"10.1109/INCoS.2013.56","DOIUrl":"https://doi.org/10.1109/INCoS.2013.56","url":null,"abstract":"Wireless network has significantly affected human life. MAC protocols which already existed mostly transmit data without priority so that emergency event data cannot be sent quickly to destination nodes. In this paper, a new protocol called priority-and-activity-based QoS MAC (PAQMAC) protocol is proposed, in which not only the priority of data in transmission is considered, but also the active time is dynamical adjusted by recording the activity degree in a duty cycle. With the priority classified, it provides enough time to deal with emergency event, thus the security and management of network are also improved. Simulation results show that PAQMAC protocol can reduce transmission delay and decrease energy consumption of network.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"37 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114006484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
General Certificateless Strong Designated Verifier Signature Schemes 一般无证书强指定验证者签名方案
Haibo Tian
A certificateless strong designated verifier signature (CL-SDVS) may provide more convenient deployment than other SDVS schemes since user's public keys can be published freely and no key-escrow problem needed to be worried about. However, there are only several CL-SDVS schemes and their security is doubtable. This paper provides general CL-SDVS schemes and instances, and discusses their security briefly.
无证书强指定验证者签名(cl - sdv)可以提供比其他sdv方案更方便的部署,因为用户的公钥可以自由发布,并且不需要担心密钥托管问题。然而,目前只有几种cl - sdv方案,其安全性值得怀疑。本文给出了通用的cl - sdv方案和实例,并简要讨论了它们的安全性。
{"title":"General Certificateless Strong Designated Verifier Signature Schemes","authors":"Haibo Tian","doi":"10.1109/INCoS.2013.74","DOIUrl":"https://doi.org/10.1109/INCoS.2013.74","url":null,"abstract":"A certificateless strong designated verifier signature (CL-SDVS) may provide more convenient deployment than other SDVS schemes since user's public keys can be published freely and no key-escrow problem needed to be worried about. However, there are only several CL-SDVS schemes and their security is doubtable. This paper provides general CL-SDVS schemes and instances, and discusses their security briefly.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115140786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pedestrian Classification Based on Improved Support Vector Machines 基于改进支持向量机的行人分类
Hongmin Xue, Zhijing Liu
We presented a pedestrian classification method based on improved support vector machine in order to solve non-rigid objects are difficult to identify in intelligent monitoring system. The video activity in the prospect is represented by a series of spatio-temporal interest point. Since human posture has the characteristics of uncertainty and illegibility, the clustering centers of each class are computed by fuzzy clustering technique. Then a full-SVM decision tree is constructed based on conventional decision tree. At last, the method is evaluated on the Weizmann action dataset and received comparative high correct recognition rate.
针对智能监控系统中难以识别的非刚体物体,提出了一种基于改进支持向量机的行人分类方法。前景中的视频活动由一系列时空兴趣点表示。针对人体姿态具有不确定性和不可辨识性的特点,采用模糊聚类技术计算每一类的聚类中心。然后在传统决策树的基础上构造全支持向量机决策树。最后,在Weizmann动作数据集上对该方法进行了验证,获得了较高的正确识别率。
{"title":"Pedestrian Classification Based on Improved Support Vector Machines","authors":"Hongmin Xue, Zhijing Liu","doi":"10.1109/INCoS.2013.140","DOIUrl":"https://doi.org/10.1109/INCoS.2013.140","url":null,"abstract":"We presented a pedestrian classification method based on improved support vector machine in order to solve non-rigid objects are difficult to identify in intelligent monitoring system. The video activity in the prospect is represented by a series of spatio-temporal interest point. Since human posture has the characteristics of uncertainty and illegibility, the clustering centers of each class are computed by fuzzy clustering technique. Then a full-SVM decision tree is constructed based on conventional decision tree. At last, the method is evaluated on the Weizmann action dataset and received comparative high correct recognition rate.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115354570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GRTR: A Geocasting Routing Based Target Region for VANET GRTR:一种基于地理投射路由的VANET目标区域
Xiaoqing Li, Wei-dong Sun, Xuejun Li, Jicheng Liu
Vehicular ad hoc networks (VANET) are characterized by the frequent changes and constrained by pre-existing roads in network topology compared with mobile ad hoc network (MANET). Therefore, the method of geocasting routing can not be widely applied to VANET. This paper proposes a geocasting routing based target region for VANET (GRTR) to make match road topology in VANET. That is setting a target region in the intersections from source node to destination region and using the method of VD-GREEDY (Voronoi diagram-greedy) builds forward zones to transmit information between the target regions. The method of VD-GREEDY expands forward zone to ensure the existence of next-hop nodes and limits the numbers of next Chop nodes to lower overhead. At the same time, to lower overload, we use the way of opportunistic routing in the target region where we choose the best node to go on transmitting for next target region. The proposed method matches the road conditions and lowers the overload in VANET.
与移动自组织网络(MANET)相比,车辆自组织网络(VANET)具有网络拓扑变化频繁且受既有道路约束的特点。因此,地质浇筑布线方法不能广泛应用于VANET。为了匹配VANET中的道路拓扑结构,提出了一种基于目标区域的地理浇筑路由算法。即在源节点到目的节点的交点处设置一个目标区域,利用vvd -greedy (Voronoi图贪婪)的方法建立转发区域,在目标区域之间传输信息。VD-GREEDY方法通过扩展转发区域来保证下一跳节点的存在,并限制下一跳节点的数量以降低开销。同时,为了降低过载,我们在目标区域采用机会路由的方式,选择最佳节点继续下一个目标区域的传输。该方法符合道路条件,降低了VANET的过载。
{"title":"GRTR: A Geocasting Routing Based Target Region for VANET","authors":"Xiaoqing Li, Wei-dong Sun, Xuejun Li, Jicheng Liu","doi":"10.1109/INCoS.2013.92","DOIUrl":"https://doi.org/10.1109/INCoS.2013.92","url":null,"abstract":"Vehicular ad hoc networks (VANET) are characterized by the frequent changes and constrained by pre-existing roads in network topology compared with mobile ad hoc network (MANET). Therefore, the method of geocasting routing can not be widely applied to VANET. This paper proposes a geocasting routing based target region for VANET (GRTR) to make match road topology in VANET. That is setting a target region in the intersections from source node to destination region and using the method of VD-GREEDY (Voronoi diagram-greedy) builds forward zones to transmit information between the target regions. The method of VD-GREEDY expands forward zone to ensure the existence of next-hop nodes and limits the numbers of next Chop nodes to lower overhead. At the same time, to lower overload, we use the way of opportunistic routing in the target region where we choose the best node to go on transmitting for next target region. The proposed method matches the road conditions and lowers the overload in VANET.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116227448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ternary Method in Elliptic Curve Scalar Multiplication 椭圆曲线标量乘法的三元法
Ning Zhang, Xiaotong Fu
Based on ternary method, we proposed a new scalar multiplication with high performance and security. Fast computation formulae of 3P ±Q is developed for ternary method, balanced ternary coding is used to improve the efficiency of scalar multiplication, signed ternary with lowest hamming weight is used to further improve the efficiency. For the elliptic curves in GF(3m), compared with Binary Scalar Multiplication, the efficiency of the new scalar multiplication is improved with the increase of the ratio of inversion and multiplication without pre-computations and other registers.
在三元法的基础上,提出了一种高性能、安全的标量乘法。开发了三元法的3P±Q快速计算公式,采用平衡三元编码提高标量乘法的效率,采用最小汉明权值的有符号三元进一步提高效率。对于GF(3m)中的椭圆曲线,与二元标量乘法相比,新的标量乘法的效率随着反演和乘法的比例的增加而提高,无需预计算和其他寄存器。
{"title":"Ternary Method in Elliptic Curve Scalar Multiplication","authors":"Ning Zhang, Xiaotong Fu","doi":"10.1109/INCoS.2013.93","DOIUrl":"https://doi.org/10.1109/INCoS.2013.93","url":null,"abstract":"Based on ternary method, we proposed a new scalar multiplication with high performance and security. Fast computation formulae of 3P ±Q is developed for ternary method, balanced ternary coding is used to improve the efficiency of scalar multiplication, signed ternary with lowest hamming weight is used to further improve the efficiency. For the elliptic curves in GF(3m), compared with Binary Scalar Multiplication, the efficiency of the new scalar multiplication is improved with the increase of the ratio of inversion and multiplication without pre-computations and other registers.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116250578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Delivering a File by Multipath-Multicast on OpenFlow Networks OpenFlow网络中多路径组播的文件传输
Akira Nagata, Yoshiaki Tsukiji, M. Tsuru
Rapid penetration of cloud computing has resulted in increasingly large file transfers among distributed data centers, leading to increased transmission delays. We propose a multipath multicast (MPMC) file transfer scheme to reduce transmission delays of one-to-many file transfers. The proposed scheme aims to (i) fully utilize the possible network bandwidth by transmitting segments (chunks) of a file simultaneously on multiple paths and (ii) reduce the bandwidth required to deliver a file to multiple receivers by multicasting the segments. On the basis of the maxflow problem, the scheme performs file segmentation, construction of multiple multicast trees, and segment transfer scheduling using multiple multicasts. To demonstrate the feasibility of MPMC file transfer, we develop a prototype system of our proposal for MPMC file transfers on OpenFlow networks.
云计算的快速渗透导致分布式数据中心之间的文件传输越来越大,从而导致传输延迟增加。为了减少一对多文件传输的传输延迟,提出了一种多路径组播(MPMC)文件传输方案。提出的方案旨在:(i)通过在多条路径上同时传输文件的段(块)来充分利用可能的网络带宽;(ii)通过组播段来减少将文件发送给多个接收者所需的带宽。该方案在maxflow问题的基础上,实现了文件分割、多组播树的构建和多组播的段传输调度。为了证明MPMC文件传输的可行性,我们在OpenFlow网络上开发了一个MPMC文件传输的原型系统。
{"title":"Delivering a File by Multipath-Multicast on OpenFlow Networks","authors":"Akira Nagata, Yoshiaki Tsukiji, M. Tsuru","doi":"10.1109/INCoS.2013.160","DOIUrl":"https://doi.org/10.1109/INCoS.2013.160","url":null,"abstract":"Rapid penetration of cloud computing has resulted in increasingly large file transfers among distributed data centers, leading to increased transmission delays. We propose a multipath multicast (MPMC) file transfer scheme to reduce transmission delays of one-to-many file transfers. The proposed scheme aims to (i) fully utilize the possible network bandwidth by transmitting segments (chunks) of a file simultaneously on multiple paths and (ii) reduce the bandwidth required to deliver a file to multiple receivers by multicasting the segments. On the basis of the maxflow problem, the scheme performs file segmentation, construction of multiple multicast trees, and segment transfer scheduling using multiple multicasts. To demonstrate the feasibility of MPMC file transfer, we develop a prototype system of our proposal for MPMC file transfers on OpenFlow networks.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1