首页 > 最新文献

2007 16th International Conference on Computer Communications and Networks最新文献

英文 中文
A Post Deblocking Filter for H.264 Video H.264视频的后块化滤波器
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317972
Yao-Min Huang, Jin-Jang Leou, M. Cheng
For very low bit rate video coding, coarse-quantized DCT coefficients induce discontinuities at block boundaries, namely, blocking artifacts. Furthermore, motion-compensated prediction propagates blocking artifacts to inner-block regions of subsequent video frames. Blocking artifacts caused by motion-compensated prediction (MCP) can be solved by a loop-filter. The main drawback of loop-filter is its in-flexibility. In this study, a post deblocking filter for H.264 video is proposed. In this study, to estimate inner-block discontinuities, a motion-compensated based approach is proposed. A map of detected blocking artifacts within each video frame is stored. Combining motion vectors and blocking artifact maps of previous frames, possible locations of blocking artifacts can be estimated. Cooperating with oriented blocking artifact detection and filtering, a post deblocking filter having loop-filter performance is established. The proposed approach can also used in other DCT/MCP based codecs.
对于非常低比特率的视频编码,粗量化DCT系数在块边界处引起不连续,即块伪影。此外,运动补偿预测将块伪影传播到后续视频帧的内部块区域。由运动补偿预测(MCP)引起的阻塞伪影可以通过环路滤波器解决。环路滤波器的主要缺点是不灵活。本文提出了一种针对H.264视频的后块化滤波器。在这项研究中,提出了一种基于运动补偿的方法来估计块内不连续。存储每个视频帧中检测到的阻塞伪影的映射。结合运动矢量和前一帧的块伪影图,可以估计出块伪影的可能位置。结合定向块伪迹检测和滤波,建立了具有环路滤波性能的后块滤波。该方法也适用于其他基于DCT/MCP的编解码器。
{"title":"A Post Deblocking Filter for H.264 Video","authors":"Yao-Min Huang, Jin-Jang Leou, M. Cheng","doi":"10.1109/ICCCN.2007.4317972","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317972","url":null,"abstract":"For very low bit rate video coding, coarse-quantized DCT coefficients induce discontinuities at block boundaries, namely, blocking artifacts. Furthermore, motion-compensated prediction propagates blocking artifacts to inner-block regions of subsequent video frames. Blocking artifacts caused by motion-compensated prediction (MCP) can be solved by a loop-filter. The main drawback of loop-filter is its in-flexibility. In this study, a post deblocking filter for H.264 video is proposed. In this study, to estimate inner-block discontinuities, a motion-compensated based approach is proposed. A map of detected blocking artifacts within each video frame is stored. Combining motion vectors and blocking artifact maps of previous frames, possible locations of blocking artifacts can be estimated. Cooperating with oriented blocking artifact detection and filtering, a post deblocking filter having loop-filter performance is established. The proposed approach can also used in other DCT/MCP based codecs.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128029503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Achieving Robustness through Caching and Retransmissions in IEEE 802.15.4-based WSNs 基于IEEE 802.15.4的WSNs中通过缓存和重传实现鲁棒性
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317968
D. Messina, M. Ortolani, G. Re
This paper proposes a network-layer protocol for wireless sensor networks based on the IEEE 802.15.4 standard. Our protocol is devised to provide reliable data gathering in latency-constrained applications, and exploits both the flexibility of the IEEE 802.15.4 MAC layer and features of data aggregation techniques, such as implicit acknowledgment of reception. The proposed protocol acts as a routing module and a control entity for the MAC layer and provides reliable communication, while managing power saving and synchronization among nodes. Without relying on MAC-layer acknowledgments, the protocol implements caching and network-layer retransmissions, triggered upon detection of a link failure. The performance of the proposed approach is studied through simulations, in which we evaluate the achieved reliability and the energy consumption with varying network settings.
提出了一种基于IEEE 802.15.4标准的无线传感器网络的网络层协议。我们的协议旨在为延迟受限的应用程序提供可靠的数据收集,并利用IEEE 802.15.4 MAC层的灵活性和数据聚合技术的特性,例如隐式接收确认。该协议作为MAC层的路由模块和控制实体,提供可靠的通信,同时管理节点之间的节能和同步。不依赖于mac层的确认,该协议实现缓存和网络层重传,在检测到链路故障时触发。通过仿真研究了该方法的性能,评估了不同网络设置下实现的可靠性和能耗。
{"title":"Achieving Robustness through Caching and Retransmissions in IEEE 802.15.4-based WSNs","authors":"D. Messina, M. Ortolani, G. Re","doi":"10.1109/ICCCN.2007.4317968","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317968","url":null,"abstract":"This paper proposes a network-layer protocol for wireless sensor networks based on the IEEE 802.15.4 standard. Our protocol is devised to provide reliable data gathering in latency-constrained applications, and exploits both the flexibility of the IEEE 802.15.4 MAC layer and features of data aggregation techniques, such as implicit acknowledgment of reception. The proposed protocol acts as a routing module and a control entity for the MAC layer and provides reliable communication, while managing power saving and synchronization among nodes. Without relying on MAC-layer acknowledgments, the protocol implements caching and network-layer retransmissions, triggered upon detection of a link failure. The performance of the proposed approach is studied through simulations, in which we evaluate the achieved reliability and the energy consumption with varying network settings.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"67 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132782485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Study on Context-aware Privacy Protection for Personal Information 情境感知的个人信息隐私保护研究
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4318009
Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Tianhai Zhao, Liang Liu
By using personal information in a pervasive computing environment, context-aware applications can provide appropriate services for people. This personal information is often involved in personal privacy. In order to protect personal privacy concerns about personal information, privacy role is proposed to control access personal information. We also construct an information system about the privacy decision of personal information disclosure based on people's interaction history. In the initial period of personal information disclosure, the privacy decision is made by people and the information system is constructed based on the decision data. Then privacy disclosure policies are extracted from this information system using rough set theory. According to deducing from the privacy disclosure policies and people's context information, the context-aware application is assigned to an adequate privacy role. It reduces the distraction of privacy decision for people. A case study further shows the proposed method is effective. Finally, it provides about the overload performance of privacy role analysis engine.
通过在普适计算环境中使用个人信息,上下文感知应用程序可以为人们提供适当的服务。这些个人信息往往涉及个人隐私。出于对个人信息隐私保护的关注,提出了隐私角色来控制对个人信息的访问。在此基础上,构建了基于人际交往历史的个人信息公开隐私决策信息系统。在个人信息披露的初始阶段,隐私决策是由人做出的,信息系统是基于决策数据构建的。然后利用粗糙集理论从该信息系统中提取隐私披露策略。根据隐私披露策略和人们的上下文信息推断,为上下文感知应用程序分配适当的隐私角色。它减少了人们对隐私决策的分心。实例分析进一步证明了该方法的有效性。最后,给出了隐私角色分析引擎的过载性能。
{"title":"A Study on Context-aware Privacy Protection for Personal Information","authors":"Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Tianhai Zhao, Liang Liu","doi":"10.1109/ICCCN.2007.4318009","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4318009","url":null,"abstract":"By using personal information in a pervasive computing environment, context-aware applications can provide appropriate services for people. This personal information is often involved in personal privacy. In order to protect personal privacy concerns about personal information, privacy role is proposed to control access personal information. We also construct an information system about the privacy decision of personal information disclosure based on people's interaction history. In the initial period of personal information disclosure, the privacy decision is made by people and the information system is constructed based on the decision data. Then privacy disclosure policies are extracted from this information system using rough set theory. According to deducing from the privacy disclosure policies and people's context information, the context-aware application is assigned to an adequate privacy role. It reduces the distraction of privacy decision for people. A case study further shows the proposed method is effective. Finally, it provides about the overload performance of privacy role analysis engine.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131769893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research Challenges in Cognitive Radio Networks 认知无线电网络的研究挑战
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317780
V. Bhargava
The cognitive radio technology will allow a group of potential users to identify and access available spectrum resources provided that the interference to users for whom the band has been licensed is kept below a prescribed level. This research area is at an early stage because various research challenges have to be addressed and solved. In this talk we present an overview of some research issues for cognitive radio networks. Specifically, we present some research and developments in cognitive radio networks with focus on: i) information-theoretic aspects, ii) spectrum sensing, iii) link adaptation, iv) advanced transceiver design, and v) admission control. We discuss research problems related to these specific topics that need to be discussed before deployment of cognitive radio systems. The presentation concludes with a rendition of "Ya Moustafa, Ya Moustafa" and its relation to cognitive radios!
认知无线电技术将允许一组潜在用户识别和访问可用的频谱资源,前提是对已获得频段许可的用户的干扰保持在规定水平以下。这个研究领域还处于早期阶段,因为各种各样的研究挑战需要解决。在这次演讲中,我们概述了认知无线电网络的一些研究问题。具体来说,我们介绍了认知无线电网络的一些研究和发展,重点是:i)信息理论方面,ii)频谱感知,iii)链路自适应,iv)先进的收发器设计,以及v)准入控制。我们讨论了在部署认知无线电系统之前需要讨论的与这些特定主题相关的研究问题。演讲以“Ya Moustafa, Ya Moustafa”及其与认知无线电的关系结束!
{"title":"Research Challenges in Cognitive Radio Networks","authors":"V. Bhargava","doi":"10.1109/ICCCN.2007.4317780","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317780","url":null,"abstract":"The cognitive radio technology will allow a group of potential users to identify and access available spectrum resources provided that the interference to users for whom the band has been licensed is kept below a prescribed level. This research area is at an early stage because various research challenges have to be addressed and solved. In this talk we present an overview of some research issues for cognitive radio networks. Specifically, we present some research and developments in cognitive radio networks with focus on: i) information-theoretic aspects, ii) spectrum sensing, iii) link adaptation, iv) advanced transceiver design, and v) admission control. We discuss research problems related to these specific topics that need to be discussed before deployment of cognitive radio systems. The presentation concludes with a rendition of \"Ya Moustafa, Ya Moustafa\" and its relation to cognitive radios!","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"27 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132285834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
WS-Advisor: A Task Memory for Service Composition Frameworks WS-Advisor:服务组合框架的任务内存
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317874
Rosanna Bova, Hye-young Paik, S. Hassas, S. Benbernou, B. Benatallah
With the proliferation of Web services, it is becoming increasingly important to support the users in selecting the most appropriate compositions of services for a task. We propose a new service discovery and selection framework that utilises the concept of task memories and a social network of task memories. A task memory captures the service composition history and their meta-data such as associated context and user rating. A network of task memories is formed to realise an effective task memory sharing platform among the users.
随着Web服务的激增,支持用户为任务选择最合适的服务组合变得越来越重要。我们提出了一个新的服务发现和选择框架,该框架利用任务记忆的概念和任务记忆的社会网络。任务内存捕获服务组合历史及其元数据,如相关上下文和用户评级。形成任务记忆网络,以实现用户之间有效的任务记忆共享平台。
{"title":"WS-Advisor: A Task Memory for Service Composition Frameworks","authors":"Rosanna Bova, Hye-young Paik, S. Hassas, S. Benbernou, B. Benatallah","doi":"10.1109/ICCCN.2007.4317874","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317874","url":null,"abstract":"With the proliferation of Web services, it is becoming increasingly important to support the users in selecting the most appropriate compositions of services for a task. We propose a new service discovery and selection framework that utilises the concept of task memories and a social network of task memories. A task memory captures the service composition history and their meta-data such as associated context and user rating. A network of task memories is formed to realise an effective task memory sharing platform among the users.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134598558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enabling Search and Similarity Search in Small-World-based P2P Systems 基于小世界的P2P系统中搜索和相似搜索的实现
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317806
K. Lin, Shuo-Chan Tsai, Yi-Ting Chang, Cheng-Fu Chou
Recently, peer-to-peer systems have become one of the most popular distributed applications. Many previous works have investigated identifier-based indexing systems that support a query-by-identifier service. However, clients usually have only partial information about an object, and prefer to query by keywords. In this paper, we propose a small-world-based keyword search system (SW-KSS) that provides keyword search and similarity search services simultaneously. The proposed SW-KSS applies the concept of the "small world theory" to the construction of an indexing structure. Such structures mirror the way humans keep track of their friends and acquaintances; hence, they can cluster peers who share common interests. The method enables a peer to And objects of interest from similar neighboring peers efficiently. We evaluate the performance of SW-KSS via simulations. The results show that SW-KSS can achieve both scalability and partial-match look-up capability.
近年来,点对点系统已成为最流行的分布式应用之一。以前的许多工作都研究了支持按标识符查询服务的基于标识符的索引系统。然而,客户端通常只有关于对象的部分信息,并且更喜欢通过关键字进行查询。本文提出了一种同时提供关键词搜索和相似度搜索服务的基于小世界的关键词搜索系统(SW-KSS)。提出的SW-KSS将“小世界理论”的概念应用于索引结构的构建。这种结构反映了人类追踪朋友和熟人的方式;因此,他们可以聚集有共同兴趣的同伴。该方法使对等体能够有效地从相似的相邻对等体中获取感兴趣的对象。我们通过仿真来评估SW-KSS的性能。结果表明,SW-KSS能够同时实现可扩展性和部分匹配查找能力。
{"title":"Enabling Search and Similarity Search in Small-World-based P2P Systems","authors":"K. Lin, Shuo-Chan Tsai, Yi-Ting Chang, Cheng-Fu Chou","doi":"10.1109/ICCCN.2007.4317806","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317806","url":null,"abstract":"Recently, peer-to-peer systems have become one of the most popular distributed applications. Many previous works have investigated identifier-based indexing systems that support a query-by-identifier service. However, clients usually have only partial information about an object, and prefer to query by keywords. In this paper, we propose a small-world-based keyword search system (SW-KSS) that provides keyword search and similarity search services simultaneously. The proposed SW-KSS applies the concept of the \"small world theory\" to the construction of an indexing structure. Such structures mirror the way humans keep track of their friends and acquaintances; hence, they can cluster peers who share common interests. The method enables a peer to And objects of interest from similar neighboring peers efficiently. We evaluate the performance of SW-KSS via simulations. The results show that SW-KSS can achieve both scalability and partial-match look-up capability.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115311799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reduction of Frame Memory Accesses and Motion Estimation Computations in MPEG Video Encoder MPEG视频编码器中帧内存访问的减少和运动估计计算
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317918
Wei-Cheng Lin, C. Chen
This paper presents an approach that reuses data stored in the frame memory and in the motion estimation (ME) internal buffer to avoid unnecessary memory accesses and redundant ME computations for MPEG video encoders. This work employs a macroblock bitmap table, which can be easily maintained, to locate the reusable data. The experimental results show that the proposed scheme is particularly efficient in low motion video sequences, approximately saving 18% of the frame memory accesses as well as about 16% of the ME computations without any sacrifice in the image quality.
本文提出了一种重用存储在帧存储器和运动估计(ME)内部缓冲区中的数据的方法,以避免对MPEG视频编码器不必要的存储器访问和冗余的ME计算。这项工作采用了一个易于维护的宏块位图表来定位可重用数据。实验结果表明,该方案在低运动视频序列中特别有效,在不牺牲图像质量的情况下,节省了大约18%的帧内存访问和大约16%的ME计算。
{"title":"Reduction of Frame Memory Accesses and Motion Estimation Computations in MPEG Video Encoder","authors":"Wei-Cheng Lin, C. Chen","doi":"10.1109/ICCCN.2007.4317918","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317918","url":null,"abstract":"This paper presents an approach that reuses data stored in the frame memory and in the motion estimation (ME) internal buffer to avoid unnecessary memory accesses and redundant ME computations for MPEG video encoders. This work employs a macroblock bitmap table, which can be easily maintained, to locate the reusable data. The experimental results show that the proposed scheme is particularly efficient in low motion video sequences, approximately saving 18% of the frame memory accesses as well as about 16% of the ME computations without any sacrifice in the image quality.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fair Efficiency, or Low Average Delay without Starvation 公平的效率,或无饥饿的低平均延迟
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317856
Sergey Gorinsky, Christoph Jechlitschek
File transfer, web download, and many other applications are primarily interested in minimal delay achievable for their messages. In this paper, we investigate allocating the bottleneck link capacity to transmit messages efficiently but fairly. While SRPT (Shortest Remaining Processing Time) is an optimally efficient algorithm that minimizes average delay of messages, large messages might starve under SRPT in heavy load conditions. PS (Processor Sharing) and ViFi (Virtual Finish Time First) are fair but yield higher average delays than under SRPT. We explore the class of fair algorithms further and prove that no online algorithm in this class is optimally efficient. Then, we derive a fair algorithm SFS (Shortest Fair Sojourn) and report extensive experimental evidence that SFS is consistently more efficient than PS and even ViFi during either temporal overload or steady-state operation, with largest benefits achieved when average load is around the bottleneck link capacity. Furthermore, average delay under the fair SFS remains close to the minimum attained under the unfair SRPT.
文件传输、web下载和许多其他应用程序主要对其消息的最小延迟感兴趣。本文研究了如何合理分配瓶颈链路容量,从而有效而公平地传输消息。虽然SRPT(最短剩余处理时间)是一种最有效的算法,可以最小化消息的平均延迟,但是在重负载条件下,使用SRPT可能会饿死大消息。PS(处理器共享)和ViFi(虚拟完成时间优先)是公平的,但产生比SRPT更高的平均延迟。我们进一步探讨了公平算法,并证明了这类算法中没有最优效率的在线算法。然后,我们推导了一个公平的算法SFS(最短公平逗留),并报告了大量的实验证据,表明SFS在时间过载或稳态运行期间始终比PS甚至ViFi更有效,当平均负载在瓶颈链路容量附近时获得最大的收益。此外,公平SFS下的平均延迟仍然接近于不公平SRPT下的最小延迟。
{"title":"Fair Efficiency, or Low Average Delay without Starvation","authors":"Sergey Gorinsky, Christoph Jechlitschek","doi":"10.1109/ICCCN.2007.4317856","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317856","url":null,"abstract":"File transfer, web download, and many other applications are primarily interested in minimal delay achievable for their messages. In this paper, we investigate allocating the bottleneck link capacity to transmit messages efficiently but fairly. While SRPT (Shortest Remaining Processing Time) is an optimally efficient algorithm that minimizes average delay of messages, large messages might starve under SRPT in heavy load conditions. PS (Processor Sharing) and ViFi (Virtual Finish Time First) are fair but yield higher average delays than under SRPT. We explore the class of fair algorithms further and prove that no online algorithm in this class is optimally efficient. Then, we derive a fair algorithm SFS (Shortest Fair Sojourn) and report extensive experimental evidence that SFS is consistently more efficient than PS and even ViFi during either temporal overload or steady-state operation, with largest benefits achieved when average load is around the bottleneck link capacity. Furthermore, average delay under the fair SFS remains close to the minimum attained under the unfair SRPT.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Large-Scale QoS-Aware Service-Oriented Networking with a Clustering-Based Approach 基于集群方法的大规模qos感知服务网络
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317872
Jingwen Jin, Jin Liang, Jingyi Jin, K. Nahrstedt
Motivated by the fact that most of the existing QoS service composition solutions have limited scalability, we develop a hierarchical-based solution framework to achieve scalability by means of topology abstraction and routing state aggregation. The paper presents and solves several unique challenges associated with the hierarchical-based QoS service composition solution in overlay networks, including topology formation (cluster detection and dynamic reclustering), QoS and service state aggregation and distribution, and QoS service path computation in a hierarchically structured network topology. In our framework, we (1) cluster network nodes based on their Internet distances and maintain clustering optimality at low cost by means of local reclustering operations when dealing with dynamic membership; (2) use data clustering and Bloom filter techniques to jointly reduce complexity of data representation associated with services within a cluster; and (3) investigate a top-down approach for computing QoS service paths in a hierarchical topology.
针对现有QoS服务组合解决方案的可扩展性有限的问题,提出了一种基于层次结构的解决方案框架,通过拓扑抽象和路由状态聚合实现可扩展性。本文提出并解决了覆盖网络中基于分层的QoS服务组合解决方案所面临的几个独特挑战,包括拓扑形成(聚类检测和动态重聚)、QoS和服务状态的聚合和分布,以及分层结构网络拓扑中的QoS服务路径计算。在我们的框架中,我们(1)基于网络节点的互联网距离聚类,并在处理动态隶属关系时通过局部重聚操作以低成本保持聚类的最优性;(2)利用数据聚类和布隆过滤技术共同降低集群内服务相关数据表示的复杂性;(3)研究在分层拓扑中计算QoS服务路径的自顶向下方法。
{"title":"Large-Scale QoS-Aware Service-Oriented Networking with a Clustering-Based Approach","authors":"Jingwen Jin, Jin Liang, Jingyi Jin, K. Nahrstedt","doi":"10.1109/ICCCN.2007.4317872","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317872","url":null,"abstract":"Motivated by the fact that most of the existing QoS service composition solutions have limited scalability, we develop a hierarchical-based solution framework to achieve scalability by means of topology abstraction and routing state aggregation. The paper presents and solves several unique challenges associated with the hierarchical-based QoS service composition solution in overlay networks, including topology formation (cluster detection and dynamic reclustering), QoS and service state aggregation and distribution, and QoS service path computation in a hierarchically structured network topology. In our framework, we (1) cluster network nodes based on their Internet distances and maintain clustering optimality at low cost by means of local reclustering operations when dealing with dynamic membership; (2) use data clustering and Bloom filter techniques to jointly reduce complexity of data representation associated with services within a cluster; and (3) investigate a top-down approach for computing QoS service paths in a hierarchical topology.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114581427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluating Fairness In Heterogeneous Wireless Ad Hoc Networks 异构无线自组织网络公平性评估
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317960
R. Awdeh
When both TCP Vegas and TCP Reno share the same wired network, TCP Reno dominates and obtains most of the bandwidth due to its more aggressive mechanisms. In this paper, a simulation study of the compatibility of TCP Reno and TCP Vegas in wireless IEEE 802.11 ad hoc networks using both static and mobile network configurations, is presented. It is shown that when both coexist in the same static ad hoc network, TCP Vegas generally dominates and gets most of the wireless bandwidth. The main reason is that the static wireless ad hoc network environment does not favor the aggressive nature of TCP Reno. However, using a mobile network model, it is shown that TCP Reno is slightly more dominant than TCP Vegas. This is because TCP Vegas is more sensitive to node mobility and the resulting high variability of RTT caused by re-routing. This causes TCP Vegas to lose some of its advantages in mobile environments. In all scenarios examined, it is shown that better fairness can be achieved, while not sacrificing goodput performance, via the use of a small TCP maximum window size.
当TCP Vegas和TCP Reno共享同一有线网络时,TCP Reno由于其更激进的机制而占据主导地位并获得大部分带宽。本文在静态和移动网络配置下,对无线IEEE 802.11自组织网络中的TCP Reno和TCP Vegas的兼容性进行了仿真研究。结果表明,当两者共存于同一静态自组织网络中时,TCP Vegas通常占主导地位,并获得大部分无线带宽。主要原因是静态无线自组织网络环境不支持TCP Reno的侵略性。然而,使用移动网络模型,表明TCP Reno比TCP Vegas略占优势。这是因为TCP Vegas对节点移动性和由此引起的重路由RTT的高可变性更敏感。这导致TCP Vegas在移动环境中失去了一些优势。在所有测试的场景中,通过使用较小的TCP最大窗口大小,可以在不牺牲良好性能的情况下实现更好的公平性。
{"title":"Evaluating Fairness In Heterogeneous Wireless Ad Hoc Networks","authors":"R. Awdeh","doi":"10.1109/ICCCN.2007.4317960","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317960","url":null,"abstract":"When both TCP Vegas and TCP Reno share the same wired network, TCP Reno dominates and obtains most of the bandwidth due to its more aggressive mechanisms. In this paper, a simulation study of the compatibility of TCP Reno and TCP Vegas in wireless IEEE 802.11 ad hoc networks using both static and mobile network configurations, is presented. It is shown that when both coexist in the same static ad hoc network, TCP Vegas generally dominates and gets most of the wireless bandwidth. The main reason is that the static wireless ad hoc network environment does not favor the aggressive nature of TCP Reno. However, using a mobile network model, it is shown that TCP Reno is slightly more dominant than TCP Vegas. This is because TCP Vegas is more sensitive to node mobility and the resulting high variability of RTT caused by re-routing. This causes TCP Vegas to lose some of its advantages in mobile environments. In all scenarios examined, it is shown that better fairness can be achieved, while not sacrificing goodput performance, via the use of a small TCP maximum window size.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2007 16th International Conference on Computer Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1