首页 > 最新文献

2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications最新文献

英文 中文
Context-Aware Mobile Learning with a Semantic Service-Oriented Infrastructure 基于语义面向服务的基础结构的上下文感知移动学习
Yilun Chia, F. S. Tsai, W. T. Ang, K. Rajaraman
Exploiting mobile technologies for educational purposes has promises of realizing ubiquitous, unobtrusive, personal and situated learning, but is non-trivial due to the challenges in the process of designing, communicating and presenting traditional e-learning resources to mobile learners. In this paper, we propose a generic semantics-based service-oriented infrastructure and show how semantic technologies, when used together with an SOA, can provide mobile users with a fresh learning experience. The proposed architecture comprises a knowledge aggregation subsystem and a querying subsystem that are loosely coupled, and hence enables rapid deployment across domains with suitable domain ontologies. Furthermore, the service-oriented approach enables a pluggable platform that supports seamless integration of legacy content from possibly multiple vendors for customizable delivery. For illustration, we consider a mobile learning scenario in a zoo, and demonstrate how a mobile user can interact with the proposed system for mlearning.
将移动技术用于教育目的有望实现无处不在、不引人注目、个性化和情境化的学习,但由于在设计、交流和向移动学习者呈现传统电子学习资源的过程中存在挑战,因此这并非易事。在本文中,我们提出了一种通用的基于语义的面向服务的基础设施,并展示了当语义技术与SOA一起使用时,如何为移动用户提供全新的学习体验。所提出的体系结构包括一个知识聚合子系统和一个松散耦合的查询子系统,因此可以跨具有合适域本体的域进行快速部署。此外,面向服务的方法支持一个可插入的平台,该平台支持来自多个供应商的遗留内容的无缝集成,以实现可定制的交付。为了说明,我们考虑了一个动物园中的移动学习场景,并演示了移动用户如何与提议的移动学习系统进行交互。
{"title":"Context-Aware Mobile Learning with a Semantic Service-Oriented Infrastructure","authors":"Yilun Chia, F. S. Tsai, W. T. Ang, K. Rajaraman","doi":"10.1109/WAINA.2011.145","DOIUrl":"https://doi.org/10.1109/WAINA.2011.145","url":null,"abstract":"Exploiting mobile technologies for educational purposes has promises of realizing ubiquitous, unobtrusive, personal and situated learning, but is non-trivial due to the challenges in the process of designing, communicating and presenting traditional e-learning resources to mobile learners. In this paper, we propose a generic semantics-based service-oriented infrastructure and show how semantic technologies, when used together with an SOA, can provide mobile users with a fresh learning experience. The proposed architecture comprises a knowledge aggregation subsystem and a querying subsystem that are loosely coupled, and hence enables rapid deployment across domains with suitable domain ontologies. Furthermore, the service-oriented approach enables a pluggable platform that supports seamless integration of legacy content from possibly multiple vendors for customizable delivery. For illustration, we consider a mobile learning scenario in a zoo, and demonstrate how a mobile user can interact with the proposed system for mlearning.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133972646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Selective Encryption Scheme and Mode to Avoid Generating Marker Codes in JPEG2000 Code Streams with Block Cipher 避免JPEG2000码流中标记码产生的分组密码选择加密方案和模式
Hiroki Ikeda, Keiichi Iwamura
In general, JPEG2000 code streams have marker codes in the header, which define particular meanings such as start of packet and end of code stream. Marker codes do not exist in the data part of code streams. The selective encryption of the data part has been considered to avoid generating marker codes. Such encryption is effective in business content exchange. To handle this issue, some schemes have been proposed. However, the security of these schemes has not been evaluated yet. This paper shows that an existing scheme can be broken by cryptanalysis. We describe a secure encryption scheme and mode against cipher-text attacks, known plain-text attacks and chosen plain-text attacks.
一般来说,JPEG2000码流在报头中有标记码,这些标记码定义了特定的含义,如数据包的开始和码流的结束。在代码流的数据部分不存在标记码。考虑了数据部分的选择性加密,以避免产生标记码。这种加密在业务内容交换中是有效的。为了解决这个问题,已经提出了一些方案。然而,这些方案的安全性尚未得到评估。本文证明了现有方案可以被密码分析所破解。我们描述了一种针对密文攻击、已知明文攻击和选择明文攻击的安全加密方案和模式。
{"title":"Selective Encryption Scheme and Mode to Avoid Generating Marker Codes in JPEG2000 Code Streams with Block Cipher","authors":"Hiroki Ikeda, Keiichi Iwamura","doi":"10.1109/WAINA.2011.109","DOIUrl":"https://doi.org/10.1109/WAINA.2011.109","url":null,"abstract":"In general, JPEG2000 code streams have marker codes in the header, which define particular meanings such as start of packet and end of code stream. Marker codes do not exist in the data part of code streams. The selective encryption of the data part has been considered to avoid generating marker codes. Such encryption is effective in business content exchange. To handle this issue, some schemes have been proposed. However, the security of these schemes has not been evaluated yet. This paper shows that an existing scheme can be broken by cryptanalysis. We describe a secure encryption scheme and mode against cipher-text attacks, known plain-text attacks and chosen plain-text attacks.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"53 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130253928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resilient and Secure File Dispersal in a Mobile P2P System 移动P2P系统中弹性和安全的文件分散
K. Ashraf, R. Anane, Nick Blundell
The convergence of mobile networks and P2P systems has led to the deployment of a range of schemes for file storage over a network. This paper presents an approach to resilient file management and network storage through the design and implementation of a file dispersal system for a mobile P2P network, based on distributed hash tables (DHT). Inherent issues of security, reliability and efficiency are addressed by integrating two forms of data redundancy, pure replication and erasure coding. The functionality of the system and its configuration were enhanced at different levels by a variety of security-related techniques. Experimental results on the different stages of the file dispersal process were provided as validation of the proposed system.
移动网络和P2P系统的融合导致了一系列网络文件存储方案的部署。本文通过设计和实现一个基于分布式哈希表(DHT)的移动P2P网络文件分散系统,提出了一种弹性文件管理和网络存储的方法。通过集成两种形式的数据冗余,即纯复制和擦除编码,解决了安全性、可靠性和效率的固有问题。系统的功能及其配置通过各种与安全相关的技术在不同级别上得到增强。在文件分散过程的不同阶段进行了实验,验证了该系统的有效性。
{"title":"Resilient and Secure File Dispersal in a Mobile P2P System","authors":"K. Ashraf, R. Anane, Nick Blundell","doi":"10.1109/WAINA.2011.149","DOIUrl":"https://doi.org/10.1109/WAINA.2011.149","url":null,"abstract":"The convergence of mobile networks and P2P systems has led to the deployment of a range of schemes for file storage over a network. This paper presents an approach to resilient file management and network storage through the design and implementation of a file dispersal system for a mobile P2P network, based on distributed hash tables (DHT). Inherent issues of security, reliability and efficiency are addressed by integrating two forms of data redundancy, pure replication and erasure coding. The functionality of the system and its configuration were enhanced at different levels by a variety of security-related techniques. Experimental results on the different stages of the file dispersal process were provided as validation of the proposed system.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114874165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Concurrent Multipath Transfer over Dissimilar Paths 不同路径上并发多路径传输的评估
Hakim Adhari, T. Dreibholz, M. Becke, E. Rathgeb, M. Tüxen
The steadily growing deployment of resilience-critical Internet services is leading to an increasing number of Multi-Homed network sites. Asymmetric Digital Subscriber Lines (ADSL) are an inexpensive way to add a secondary Internet access connection. With the development of Multi-Path Transport Layer protocols - like Multipath TCP (MPTCP) and the Stream Control Transmission Protocol (SCTP) furnished by a Concurrent Multipath Transfer (CMT-SCTP) extension - there is also a strong interest in utilising all access connections simultaneously to improve the data throughput of the applications. However, combining network paths over ADSL with paths over other access technologies like fibre optic links implies highly dissimilar paths with significantly different bandwidths, delays and queuing behaviours. Efficient Multi-Path transport over such dissimilar paths is a challenging task for the new Transport Layer protocols under development. In this paper, we show the difficulties of Multi-Path transport in a real-world dissimilar path setup which consists of a high-speed fibre optic link and an ADSL connection. After that, we present an optimised buffer handling technique which solves the transport efficiency issues in this setup. Our optimisation is first analysed by simulations. Finally, we also show the usefulness of our approach by experimental evaluation in a real Multi-Homed Internet setup.
稳定增长的弹性关键Internet服务的部署导致了多宿主网络站点数量的增加。非对称数字用户线路(ADSL)是一种廉价的增加二级互联网接入连接的方法。随着多路径传输层协议的发展——比如多路径TCP (MPTCP)和由并发多路径传输(CMT-SCTP)扩展提供的流控制传输协议(SCTP)——人们也对同时利用所有访问连接来提高应用程序的数据吞吐量产生了浓厚的兴趣。然而,将通过ADSL的网络路径与通过其他接入技术(如光纤链路)的路径相结合意味着具有显著不同带宽、延迟和排队行为的高度不同的路径。对于正在开发的新传输层协议来说,在如此不同的路径上进行有效的多路径传输是一项具有挑战性的任务。在本文中,我们展示了在现实世界中由高速光纤链路和ADSL连接组成的不同路径设置中多路径传输的困难。之后,我们提出了一种优化的缓冲区处理技术,解决了这种设置中的传输效率问题。我们的优化首先通过模拟进行分析。最后,我们还通过一个真实的多家庭互联网设置的实验评估显示了我们的方法的实用性。
{"title":"Evaluation of Concurrent Multipath Transfer over Dissimilar Paths","authors":"Hakim Adhari, T. Dreibholz, M. Becke, E. Rathgeb, M. Tüxen","doi":"10.1109/WAINA.2011.92","DOIUrl":"https://doi.org/10.1109/WAINA.2011.92","url":null,"abstract":"The steadily growing deployment of resilience-critical Internet services is leading to an increasing number of Multi-Homed network sites. Asymmetric Digital Subscriber Lines (ADSL) are an inexpensive way to add a secondary Internet access connection. With the development of Multi-Path Transport Layer protocols - like Multipath TCP (MPTCP) and the Stream Control Transmission Protocol (SCTP) furnished by a Concurrent Multipath Transfer (CMT-SCTP) extension - there is also a strong interest in utilising all access connections simultaneously to improve the data throughput of the applications. However, combining network paths over ADSL with paths over other access technologies like fibre optic links implies highly dissimilar paths with significantly different bandwidths, delays and queuing behaviours. Efficient Multi-Path transport over such dissimilar paths is a challenging task for the new Transport Layer protocols under development. In this paper, we show the difficulties of Multi-Path transport in a real-world dissimilar path setup which consists of a high-speed fibre optic link and an ADSL connection. After that, we present an optimised buffer handling technique which solves the transport efficiency issues in this setup. Our optimisation is first analysed by simulations. Finally, we also show the usefulness of our approach by experimental evaluation in a real Multi-Homed Internet setup.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
A Novel Bandwidth Estimation Scheme Used in Admission Control for Wireless Mesh Networks 一种用于无线Mesh网络准入控制的带宽估计新方案
Chen Su, Kaiping Xue, P. Hong, Hanchen Lu
An accurate estimation of the available bandwidth of mesh nodes is the essential prerequisite of admission control mechanism, which provides QoS assurance in wireless mesh networks. Existing bandwidth estimation schemes do not accurately consider the influence of parallel transmission due to spatial reuse and act overly conservative. In this study, we proposed an accurate bandwidth estimation scheme, the BEPTC (Bandwidth Estimation with Parallel Transmission Consideration), to reduce the parallel transmission caused estimation accuracy by solving the maximum clique problem in graph theory. The scheme is integrated into an admission control mechanism used in a hop-by-hop routing protocol (AODV). The simulation results demonstrate that the admission control mechanism based on BEPTC can effectively control the traffic load and offer QoS guarantee for admitted new flows, which can lead the network to accommodate more flows with QoS guarantee and obtain higher system throughput compared with other conservative approaches.
准确估计mesh节点的可用带宽是无线mesh网络准入控制机制的必要前提,它为无线mesh网络提供了QoS保证。现有的带宽估计方案没有准确考虑空间复用对并行传输的影响,过于保守。在本研究中,我们提出了一种精确的带宽估计方案BEPTC (bandwidth estimation with Parallel Transmission Consideration),通过解决图论中的最大团问题来降低并行传输引起的估计精度。该方案集成到AODV(逐跳路由协议)中使用的准入控制机制中。仿真结果表明,基于BEPTC的允许控制机制能够有效地控制流量负载,并为允许的新流提供QoS保证,使网络能够容纳更多具有QoS保证的流,获得比其他保守方法更高的系统吞吐量。
{"title":"A Novel Bandwidth Estimation Scheme Used in Admission Control for Wireless Mesh Networks","authors":"Chen Su, Kaiping Xue, P. Hong, Hanchen Lu","doi":"10.1109/WAINA.2011.57","DOIUrl":"https://doi.org/10.1109/WAINA.2011.57","url":null,"abstract":"An accurate estimation of the available bandwidth of mesh nodes is the essential prerequisite of admission control mechanism, which provides QoS assurance in wireless mesh networks. Existing bandwidth estimation schemes do not accurately consider the influence of parallel transmission due to spatial reuse and act overly conservative. In this study, we proposed an accurate bandwidth estimation scheme, the BEPTC (Bandwidth Estimation with Parallel Transmission Consideration), to reduce the parallel transmission caused estimation accuracy by solving the maximum clique problem in graph theory. The scheme is integrated into an admission control mechanism used in a hop-by-hop routing protocol (AODV). The simulation results demonstrate that the admission control mechanism based on BEPTC can effectively control the traffic load and offer QoS guarantee for admitted new flows, which can lead the network to accommodate more flows with QoS guarantee and obtain higher system throughput compared with other conservative approaches.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Providing Secure Integrity in Peer-to-Peer Oriented Mobile Environments 在面向点对点的移动环境中提供安全完整性
Masayuki Terada, Takayasu Yamaguchi, S. Hongo
Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels are unstable, is not a simple task. This is mainly because of the difficulty of solving the agreement problem securely in these environments due to the unreliability of channels, and the passivity of smartcards that complicates the implementation of distributed protocols among them. In this paper, we propose an optimistic approach to address these problems. This approach introduces an optimistic non-blocking atomic commitment (NBAC) protocol for smartcards to secure reliable agreements, and implements the protocol on a distributed framework for inter-smartcard communication to relax the implementation complexity. Our implementation results show the feasibility of this approach: current smartcards can conduct the protocol in no more than about a half second, which should be enough performance to support commerce transactions, the application most likely to need secure integrity.
提供机密性、完整性和可用性对于安全系统是必不可少的。特别是,几乎每个商业应用程序都要求以安全的方式提供完整性,这样即使数据的所有者是恶意的,也可以保留数据的完整性。然而,在参与节点及其通信通道不稳定的移动环境中提供安全的完整性并不是一项简单的任务。这主要是因为在这些环境中,由于通道的不可靠性,很难安全地解决协议问题,而智能卡的被动性使得在这些环境中实现分布式协议变得复杂。在本文中,我们提出了一个乐观的方法来解决这些问题。该方法为智能卡引入了乐观非阻塞原子承诺(NBAC)协议,保证了协议的可靠性,并在分布式框架上实现了智能卡间通信,降低了实现的复杂性。我们的实现结果表明了这种方法的可行性:目前的智能卡可以在不超过半秒的时间内执行协议,这样的性能应该足以支持商业交易,最可能需要安全完整性的应用程序。
{"title":"Providing Secure Integrity in Peer-to-Peer Oriented Mobile Environments","authors":"Masayuki Terada, Takayasu Yamaguchi, S. Hongo","doi":"10.1109/WAINA.2011.17","DOIUrl":"https://doi.org/10.1109/WAINA.2011.17","url":null,"abstract":"Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels are unstable, is not a simple task. This is mainly because of the difficulty of solving the agreement problem securely in these environments due to the unreliability of channels, and the passivity of smartcards that complicates the implementation of distributed protocols among them. In this paper, we propose an optimistic approach to address these problems. This approach introduces an optimistic non-blocking atomic commitment (NBAC) protocol for smartcards to secure reliable agreements, and implements the protocol on a distributed framework for inter-smartcard communication to relax the implementation complexity. Our implementation results show the feasibility of this approach: current smartcards can conduct the protocol in no more than about a half second, which should be enough performance to support commerce transactions, the application most likely to need secure integrity.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Generic Approach to the Services Delivery in Enterprise eBusiness Platforms 企业电子商务平台中服务交付的通用方法
N. Kryvinska, C. Strauss, M. Younas, D. Thanh
The contemporary business environment can be seen as a logical effect of eBusiness, advanced integrated networks, and software services. In such an environment application deployment models have revolutionized the way businesses interact, collaborate and transact with customers, suppliers, partners, employees and shareholders. The purpose of our work is to develop a generic model for performance analysis of software services in order to facilitate enterprises to attach their customers more tightly by an effective service delivery which in turn optimizes business processes at different steps. This communications enablement allows not only greater synergy and velocity among vendors, suppliers and partners within the value creation and delivery chain of the business, but also, creates responsive and seamless customer service.
现代商业环境可以看作是电子商务、先进的集成网络和软件服务的逻辑结果。在这样的环境中,应用程序部署模型已经彻底改变了企业与客户、供应商、合作伙伴、员工和股东进行交互、协作和交易的方式。我们工作的目的是为软件服务的性能分析开发一个通用模型,以便通过有效的服务交付来促进企业更紧密地联系客户,从而在不同的步骤上优化业务流程。这种通信支持不仅允许在业务的价值创造和交付链内的供应商、供应商和合作伙伴之间更大的协同和速度,而且还可以创建响应性和无缝的客户服务。
{"title":"A Generic Approach to the Services Delivery in Enterprise eBusiness Platforms","authors":"N. Kryvinska, C. Strauss, M. Younas, D. Thanh","doi":"10.1109/WAINA.2011.29","DOIUrl":"https://doi.org/10.1109/WAINA.2011.29","url":null,"abstract":"The contemporary business environment can be seen as a logical effect of eBusiness, advanced integrated networks, and software services. In such an environment application deployment models have revolutionized the way businesses interact, collaborate and transact with customers, suppliers, partners, employees and shareholders. The purpose of our work is to develop a generic model for performance analysis of software services in order to facilitate enterprises to attach their customers more tightly by an effective service delivery which in turn optimizes business processes at different steps. This communications enablement allows not only greater synergy and velocity among vendors, suppliers and partners within the value creation and delivery chain of the business, but also, creates responsive and seamless customer service.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131919286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Protocol Data Parts Inclusion in a Formal Passive Testing Approach 协议数据部分在正式被动测试方法中的包含
F. Lalanne, S. Maag
Commonly, two main classes of formal testing techniques are applied to check the conformance of protocols and software: active and passive testing (monitoring) techniques. Because of many industrial constraints such as the necessity to achieve implementation black box testing, passive testing techniques become highly relevant in several cases. Besides, most of the passive testing techniques only consider control portions of exchanged packets and ignores data parts. However, since systems become more complex, testing for data constraints and relations between packets is now essential. In this paper we propose a novel approach for defining data oriented invariants and show how they can be tested in a trace set by using logic programming. Experimental results on SIP protocol traces are provided.
通常,两类主要的正式测试技术被用于检查协议和软件的一致性:主动测试和被动测试(监视)技术。由于许多工业限制,例如实现黑盒测试的必要性,被动测试技术在一些情况下变得高度相关。此外,大多数被动测试技术只考虑交换包的控制部分,而忽略了数据部分。然而,由于系统变得越来越复杂,测试数据约束和数据包之间的关系现在是必不可少的。在本文中,我们提出了一种定义面向数据不变量的新方法,并展示了如何使用逻辑编程在跟踪集中对它们进行测试。给出了SIP协议跟踪的实验结果。
{"title":"Protocol Data Parts Inclusion in a Formal Passive Testing Approach","authors":"F. Lalanne, S. Maag","doi":"10.1109/WAINA.2011.21","DOIUrl":"https://doi.org/10.1109/WAINA.2011.21","url":null,"abstract":"Commonly, two main classes of formal testing techniques are applied to check the conformance of protocols and software: active and passive testing (monitoring) techniques. Because of many industrial constraints such as the necessity to achieve implementation black box testing, passive testing techniques become highly relevant in several cases. Besides, most of the passive testing techniques only consider control portions of exchanged packets and ignores data parts. However, since systems become more complex, testing for data constraints and relations between packets is now essential. In this paper we propose a novel approach for defining data oriented invariants and show how they can be tested in a trace set by using logic programming. Experimental results on SIP protocol traces are provided.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133116856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quality of Service in Large Scale Mobile Distributed Systems Based on Opportunistic Networks 基于机会网络的大规模移动分布式系统的服务质量
Mihai Tanase, V. Cristea
Delay Tolerant Networks formed by mobile devices users carry in their everyday life are starting to be an interesting alternative for message transmissions between users. However, the reliability of the DTNs is an important research topic, one of the main causes of poor DTN reliability being the selfishness of the network nodes. In this paper, we evaluate the impact of selfishness on the efficiency of several types of DTN routing protocols and determine what are the conditions that have to be met in order to provide some level of QoS in a DTN architecture. We also investigate which is the most suitable routing protocol, given a realistic scenario in which nodes move in a non-random way and manifest a typical human movement model (home-work-home/evening activity). We also suggest two ways for the improvement of the performance of such a protocol: the use of monetary incentives and the use of social incentives.
用户在日常生活中携带的移动设备形成的容错网络开始成为用户之间消息传输的一种有趣的选择。然而,DTN的可靠性是一个重要的研究课题,导致DTN可靠性差的主要原因之一是网络节点的自私自利。在本文中,我们评估了自私对几种DTN路由协议效率的影响,并确定了在DTN架构中提供某种程度的QoS必须满足的条件。我们还研究了最合适的路由协议,给出了一个现实的场景,其中节点以非随机的方式移动,并表现出典型的人类运动模型(家庭-工作-家庭/晚上活动)。我们还建议两种方法来改善这种协议的绩效:使用货币激励和使用社会激励。
{"title":"Quality of Service in Large Scale Mobile Distributed Systems Based on Opportunistic Networks","authors":"Mihai Tanase, V. Cristea","doi":"10.1109/WAINA.2011.122","DOIUrl":"https://doi.org/10.1109/WAINA.2011.122","url":null,"abstract":"Delay Tolerant Networks formed by mobile devices users carry in their everyday life are starting to be an interesting alternative for message transmissions between users. However, the reliability of the DTNs is an important research topic, one of the main causes of poor DTN reliability being the selfishness of the network nodes. In this paper, we evaluate the impact of selfishness on the efficiency of several types of DTN routing protocols and determine what are the conditions that have to be met in order to provide some level of QoS in a DTN architecture. We also investigate which is the most suitable routing protocol, given a realistic scenario in which nodes move in a non-random way and manifest a typical human movement model (home-work-home/evening activity). We also suggest two ways for the improvement of the performance of such a protocol: the use of monetary incentives and the use of social incentives.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133258085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Steady/Unsteady Communication Performance in Large-Scale Regular Networks 大规模规则网络中的稳态/非稳态通信性能
T. Yokota, K. Ootsu, T. Baba
State-of-the-art supercomputers consist of a huge number of computing nodes that are connected by an interconnection network. Although such large-scale systems have regular organizations, scaling study on the network is not sufficient so far. This paper focuses on two-dimensional torus network with two typical routing algorithms, i.e., dimension-order and Duato's protocol, and presents steady and unsteady performance results. We introduce quantitative evaluation methodology and discuss scaling issues quantitatively. Evaluation results by our parallelized simulator reveal that any size of networks have similar performance features when the performance metrics are properly normalized. This paper gives a scaling view of the interconnection network for future huge-scale systems.
最先进的超级计算机由大量的计算节点组成,这些节点通过互连网络连接起来。虽然这种大规模的系统有规律的组织,但目前对网络的规模化研究还不充分。本文重点研究了二维环面网络的两种典型路由算法,即维序和Duato协议,并给出了稳态和非稳态的性能结果。我们介绍了定量评价方法,并定量地讨论了尺度问题。我们的并行模拟器的评估结果表明,当性能指标适当规范化时,任何大小的网络都具有相似的性能特征。本文给出了未来大型系统互联网络的尺度视图。
{"title":"Steady/Unsteady Communication Performance in Large-Scale Regular Networks","authors":"T. Yokota, K. Ootsu, T. Baba","doi":"10.1109/WAINA.2011.37","DOIUrl":"https://doi.org/10.1109/WAINA.2011.37","url":null,"abstract":"State-of-the-art supercomputers consist of a huge number of computing nodes that are connected by an interconnection network. Although such large-scale systems have regular organizations, scaling study on the network is not sufficient so far. This paper focuses on two-dimensional torus network with two typical routing algorithms, i.e., dimension-order and Duato's protocol, and presents steady and unsteady performance results. We introduce quantitative evaluation methodology and discuss scaling issues quantitatively. Evaluation results by our parallelized simulator reveal that any size of networks have similar performance features when the performance metrics are properly normalized. This paper gives a scaling view of the interconnection network for future huge-scale systems.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132445713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1