首页 > 最新文献

2007 16th International Conference on Computer Communications and Networks最新文献

英文 中文
A Post Deblocking Filter for H.264 Video H.264视频的后块化滤波器
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317972
Yao-Min Huang, Jin-Jang Leou, M. Cheng
For very low bit rate video coding, coarse-quantized DCT coefficients induce discontinuities at block boundaries, namely, blocking artifacts. Furthermore, motion-compensated prediction propagates blocking artifacts to inner-block regions of subsequent video frames. Blocking artifacts caused by motion-compensated prediction (MCP) can be solved by a loop-filter. The main drawback of loop-filter is its in-flexibility. In this study, a post deblocking filter for H.264 video is proposed. In this study, to estimate inner-block discontinuities, a motion-compensated based approach is proposed. A map of detected blocking artifacts within each video frame is stored. Combining motion vectors and blocking artifact maps of previous frames, possible locations of blocking artifacts can be estimated. Cooperating with oriented blocking artifact detection and filtering, a post deblocking filter having loop-filter performance is established. The proposed approach can also used in other DCT/MCP based codecs.
对于非常低比特率的视频编码,粗量化DCT系数在块边界处引起不连续,即块伪影。此外,运动补偿预测将块伪影传播到后续视频帧的内部块区域。由运动补偿预测(MCP)引起的阻塞伪影可以通过环路滤波器解决。环路滤波器的主要缺点是不灵活。本文提出了一种针对H.264视频的后块化滤波器。在这项研究中,提出了一种基于运动补偿的方法来估计块内不连续。存储每个视频帧中检测到的阻塞伪影的映射。结合运动矢量和前一帧的块伪影图,可以估计出块伪影的可能位置。结合定向块伪迹检测和滤波,建立了具有环路滤波性能的后块滤波。该方法也适用于其他基于DCT/MCP的编解码器。
{"title":"A Post Deblocking Filter for H.264 Video","authors":"Yao-Min Huang, Jin-Jang Leou, M. Cheng","doi":"10.1109/ICCCN.2007.4317972","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317972","url":null,"abstract":"For very low bit rate video coding, coarse-quantized DCT coefficients induce discontinuities at block boundaries, namely, blocking artifacts. Furthermore, motion-compensated prediction propagates blocking artifacts to inner-block regions of subsequent video frames. Blocking artifacts caused by motion-compensated prediction (MCP) can be solved by a loop-filter. The main drawback of loop-filter is its in-flexibility. In this study, a post deblocking filter for H.264 video is proposed. In this study, to estimate inner-block discontinuities, a motion-compensated based approach is proposed. A map of detected blocking artifacts within each video frame is stored. Combining motion vectors and blocking artifact maps of previous frames, possible locations of blocking artifacts can be estimated. Cooperating with oriented blocking artifact detection and filtering, a post deblocking filter having loop-filter performance is established. The proposed approach can also used in other DCT/MCP based codecs.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128029503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Achieving Robustness through Caching and Retransmissions in IEEE 802.15.4-based WSNs 基于IEEE 802.15.4的WSNs中通过缓存和重传实现鲁棒性
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317968
D. Messina, M. Ortolani, G. Re
This paper proposes a network-layer protocol for wireless sensor networks based on the IEEE 802.15.4 standard. Our protocol is devised to provide reliable data gathering in latency-constrained applications, and exploits both the flexibility of the IEEE 802.15.4 MAC layer and features of data aggregation techniques, such as implicit acknowledgment of reception. The proposed protocol acts as a routing module and a control entity for the MAC layer and provides reliable communication, while managing power saving and synchronization among nodes. Without relying on MAC-layer acknowledgments, the protocol implements caching and network-layer retransmissions, triggered upon detection of a link failure. The performance of the proposed approach is studied through simulations, in which we evaluate the achieved reliability and the energy consumption with varying network settings.
提出了一种基于IEEE 802.15.4标准的无线传感器网络的网络层协议。我们的协议旨在为延迟受限的应用程序提供可靠的数据收集,并利用IEEE 802.15.4 MAC层的灵活性和数据聚合技术的特性,例如隐式接收确认。该协议作为MAC层的路由模块和控制实体,提供可靠的通信,同时管理节点之间的节能和同步。不依赖于mac层的确认,该协议实现缓存和网络层重传,在检测到链路故障时触发。通过仿真研究了该方法的性能,评估了不同网络设置下实现的可靠性和能耗。
{"title":"Achieving Robustness through Caching and Retransmissions in IEEE 802.15.4-based WSNs","authors":"D. Messina, M. Ortolani, G. Re","doi":"10.1109/ICCCN.2007.4317968","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317968","url":null,"abstract":"This paper proposes a network-layer protocol for wireless sensor networks based on the IEEE 802.15.4 standard. Our protocol is devised to provide reliable data gathering in latency-constrained applications, and exploits both the flexibility of the IEEE 802.15.4 MAC layer and features of data aggregation techniques, such as implicit acknowledgment of reception. The proposed protocol acts as a routing module and a control entity for the MAC layer and provides reliable communication, while managing power saving and synchronization among nodes. Without relying on MAC-layer acknowledgments, the protocol implements caching and network-layer retransmissions, triggered upon detection of a link failure. The performance of the proposed approach is studied through simulations, in which we evaluate the achieved reliability and the energy consumption with varying network settings.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"67 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132782485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Study on Context-aware Privacy Protection for Personal Information 情境感知的个人信息隐私保护研究
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4318009
Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Tianhai Zhao, Liang Liu
By using personal information in a pervasive computing environment, context-aware applications can provide appropriate services for people. This personal information is often involved in personal privacy. In order to protect personal privacy concerns about personal information, privacy role is proposed to control access personal information. We also construct an information system about the privacy decision of personal information disclosure based on people's interaction history. In the initial period of personal information disclosure, the privacy decision is made by people and the information system is constructed based on the decision data. Then privacy disclosure policies are extracted from this information system using rough set theory. According to deducing from the privacy disclosure policies and people's context information, the context-aware application is assigned to an adequate privacy role. It reduces the distraction of privacy decision for people. A case study further shows the proposed method is effective. Finally, it provides about the overload performance of privacy role analysis engine.
通过在普适计算环境中使用个人信息,上下文感知应用程序可以为人们提供适当的服务。这些个人信息往往涉及个人隐私。出于对个人信息隐私保护的关注,提出了隐私角色来控制对个人信息的访问。在此基础上,构建了基于人际交往历史的个人信息公开隐私决策信息系统。在个人信息披露的初始阶段,隐私决策是由人做出的,信息系统是基于决策数据构建的。然后利用粗糙集理论从该信息系统中提取隐私披露策略。根据隐私披露策略和人们的上下文信息推断,为上下文感知应用程序分配适当的隐私角色。它减少了人们对隐私决策的分心。实例分析进一步证明了该方法的有效性。最后,给出了隐私角色分析引擎的过载性能。
{"title":"A Study on Context-aware Privacy Protection for Personal Information","authors":"Qingsheng Zhang, Yong Qi, Jizhong Zhao, Di Hou, Tianhai Zhao, Liang Liu","doi":"10.1109/ICCCN.2007.4318009","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4318009","url":null,"abstract":"By using personal information in a pervasive computing environment, context-aware applications can provide appropriate services for people. This personal information is often involved in personal privacy. In order to protect personal privacy concerns about personal information, privacy role is proposed to control access personal information. We also construct an information system about the privacy decision of personal information disclosure based on people's interaction history. In the initial period of personal information disclosure, the privacy decision is made by people and the information system is constructed based on the decision data. Then privacy disclosure policies are extracted from this information system using rough set theory. According to deducing from the privacy disclosure policies and people's context information, the context-aware application is assigned to an adequate privacy role. It reduces the distraction of privacy decision for people. A case study further shows the proposed method is effective. Finally, it provides about the overload performance of privacy role analysis engine.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131769893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research Challenges in Cognitive Radio Networks 认知无线电网络的研究挑战
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317780
V. Bhargava
The cognitive radio technology will allow a group of potential users to identify and access available spectrum resources provided that the interference to users for whom the band has been licensed is kept below a prescribed level. This research area is at an early stage because various research challenges have to be addressed and solved. In this talk we present an overview of some research issues for cognitive radio networks. Specifically, we present some research and developments in cognitive radio networks with focus on: i) information-theoretic aspects, ii) spectrum sensing, iii) link adaptation, iv) advanced transceiver design, and v) admission control. We discuss research problems related to these specific topics that need to be discussed before deployment of cognitive radio systems. The presentation concludes with a rendition of "Ya Moustafa, Ya Moustafa" and its relation to cognitive radios!
认知无线电技术将允许一组潜在用户识别和访问可用的频谱资源,前提是对已获得频段许可的用户的干扰保持在规定水平以下。这个研究领域还处于早期阶段,因为各种各样的研究挑战需要解决。在这次演讲中,我们概述了认知无线电网络的一些研究问题。具体来说,我们介绍了认知无线电网络的一些研究和发展,重点是:i)信息理论方面,ii)频谱感知,iii)链路自适应,iv)先进的收发器设计,以及v)准入控制。我们讨论了在部署认知无线电系统之前需要讨论的与这些特定主题相关的研究问题。演讲以“Ya Moustafa, Ya Moustafa”及其与认知无线电的关系结束!
{"title":"Research Challenges in Cognitive Radio Networks","authors":"V. Bhargava","doi":"10.1109/ICCCN.2007.4317780","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317780","url":null,"abstract":"The cognitive radio technology will allow a group of potential users to identify and access available spectrum resources provided that the interference to users for whom the band has been licensed is kept below a prescribed level. This research area is at an early stage because various research challenges have to be addressed and solved. In this talk we present an overview of some research issues for cognitive radio networks. Specifically, we present some research and developments in cognitive radio networks with focus on: i) information-theoretic aspects, ii) spectrum sensing, iii) link adaptation, iv) advanced transceiver design, and v) admission control. We discuss research problems related to these specific topics that need to be discussed before deployment of cognitive radio systems. The presentation concludes with a rendition of \"Ya Moustafa, Ya Moustafa\" and its relation to cognitive radios!","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"27 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132285834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
WS-Advisor: A Task Memory for Service Composition Frameworks WS-Advisor:服务组合框架的任务内存
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317874
Rosanna Bova, Hye-young Paik, S. Hassas, S. Benbernou, B. Benatallah
With the proliferation of Web services, it is becoming increasingly important to support the users in selecting the most appropriate compositions of services for a task. We propose a new service discovery and selection framework that utilises the concept of task memories and a social network of task memories. A task memory captures the service composition history and their meta-data such as associated context and user rating. A network of task memories is formed to realise an effective task memory sharing platform among the users.
随着Web服务的激增,支持用户为任务选择最合适的服务组合变得越来越重要。我们提出了一个新的服务发现和选择框架,该框架利用任务记忆的概念和任务记忆的社会网络。任务内存捕获服务组合历史及其元数据,如相关上下文和用户评级。形成任务记忆网络,以实现用户之间有效的任务记忆共享平台。
{"title":"WS-Advisor: A Task Memory for Service Composition Frameworks","authors":"Rosanna Bova, Hye-young Paik, S. Hassas, S. Benbernou, B. Benatallah","doi":"10.1109/ICCCN.2007.4317874","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317874","url":null,"abstract":"With the proliferation of Web services, it is becoming increasingly important to support the users in selecting the most appropriate compositions of services for a task. We propose a new service discovery and selection framework that utilises the concept of task memories and a social network of task memories. A task memory captures the service composition history and their meta-data such as associated context and user rating. A network of task memories is formed to realise an effective task memory sharing platform among the users.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134598558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reduce IP Address Fragmentation through Allocation 通过分配减少IP地址碎片
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317847
Mei Wang, L. Dunn, Wei Mao, Tao Chen
The scalability of Internet addressing and routing has been a serious issue and becomes a more urgent problem today because of driving factors like IPv6. A radical impacting element of the scalability is address allocation, as it directly affects routing table structure, hence, IP lookup and routing efficiency. A key problem in IPv4 today is address fragmentation, i.e., one entity is represented by multiple non-contiguous IP address blocks in the routing table. Address fragmentation increases routing table size, therefore degrades scalability. Existing address allocation practices are a major contributor to address fragmentation. In this paper, we demonstrate that the performance of address allocation can be dramatically improved. We propose a new address allocation algorithm called GAP: Growth-based Address Partitioning. Through real data, we show that GAP can reduce fragmentation by 90% compared to the existing allocation schemes. This is significant for reducing routing table size, increasing scalability, and improving the performance of the Internet. We also introduce a software tool being developed for address allocation.
Internet寻址和路由的可扩展性一直是一个严重的问题,并且由于IPv6等驱动因素而成为当今更加紧迫的问题。影响可伸缩性的一个根本因素是地址分配,因为它直接影响路由表结构,从而影响IP查找和路由效率。目前IPv4的一个关键问题是地址碎片,即一个实体在路由表中由多个不连续的IP地址块表示。地址碎片增加了路由表的大小,因此降低了可伸缩性。现有的地址分配实践是造成地址碎片的主要原因。在本文中,我们证明了地址分配的性能可以显著提高。我们提出了一种新的地址分配算法,称为GAP:基于增长的地址分区。通过实际数据,我们发现GAP比现有的分配方案可以减少90%的碎片化。这对于减小路由表大小、增加可伸缩性和改进Internet的性能非常重要。我们还介绍了一个正在开发的地址分配软件工具。
{"title":"Reduce IP Address Fragmentation through Allocation","authors":"Mei Wang, L. Dunn, Wei Mao, Tao Chen","doi":"10.1109/ICCCN.2007.4317847","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317847","url":null,"abstract":"The scalability of Internet addressing and routing has been a serious issue and becomes a more urgent problem today because of driving factors like IPv6. A radical impacting element of the scalability is address allocation, as it directly affects routing table structure, hence, IP lookup and routing efficiency. A key problem in IPv4 today is address fragmentation, i.e., one entity is represented by multiple non-contiguous IP address blocks in the routing table. Address fragmentation increases routing table size, therefore degrades scalability. Existing address allocation practices are a major contributor to address fragmentation. In this paper, we demonstrate that the performance of address allocation can be dramatically improved. We propose a new address allocation algorithm called GAP: Growth-based Address Partitioning. Through real data, we show that GAP can reduce fragmentation by 90% compared to the existing allocation schemes. This is significant for reducing routing table size, increasing scalability, and improving the performance of the Internet. We also introduce a software tool being developed for address allocation.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generalized Aho-Corasick Algorithm for Signature Based Anti-Virus Applications 基于签名的反病毒应用的广义Aho-Corasick算法
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317914
Tsern-Huei Lee
Because of its accuracy, signature matching is considered an important technique in anti-virus/worm applications. Among some famous pattern matching algorithms, the Aho-Corasick (AC) algorithm can match multiple patterns simultaneously and guarantee deterministic performance under all circumstances and thus is widely adopted in various systems, especially when worst-case performance such as wire speed requirement is a design factor. However, the AC algorithm was developed only for strings while virus/worm signatures could be specified by simple regular expressions. In this paper, we generalize the AC algorithm to systematically construct a finite state pattern matching machine which can indicate the ending position in a finite input string for the first occurrence of virus/worm signatures that are specified by strings or simple regular expressions. The regular expressions studied in this paper may contain the following operators: * (match any number of symbols), ? (match any symbol), and {min, max} (match minimum of min, maximum of max symbols), which are defined in ClamAV, a popular open source anti-virus/worm software module, for signature specification.
由于其准确性,特征匹配被认为是反病毒/蠕虫应用中的一项重要技术。在一些著名的模式匹配算法中,AC (Aho-Corasick)算法可以同时匹配多个模式,并保证在任何情况下的确定性性能,因此被广泛应用于各种系统中,特别是当最坏情况性能(如线速度要求)是一个设计因素时。但是,AC算法只针对字符串开发,而病毒/蠕虫签名可以通过简单的正则表达式来指定。本文对AC算法进行了推广,系统地构造了一个有限状态模式匹配机,该匹配机能够指示由字符串或简单正则表达式指定的病毒/蠕虫签名首次出现时在有限输入字符串中的结束位置。本文研究的正则表达式可能包含以下操作符:*(匹配任意数量的符号),?(匹配任何符号)和{min, max}(匹配最小的最小值,最大的最大符号),这是流行的开源杀毒/蠕虫软件模块ClamAV中定义的签名规范。
{"title":"Generalized Aho-Corasick Algorithm for Signature Based Anti-Virus Applications","authors":"Tsern-Huei Lee","doi":"10.1109/ICCCN.2007.4317914","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317914","url":null,"abstract":"Because of its accuracy, signature matching is considered an important technique in anti-virus/worm applications. Among some famous pattern matching algorithms, the Aho-Corasick (AC) algorithm can match multiple patterns simultaneously and guarantee deterministic performance under all circumstances and thus is widely adopted in various systems, especially when worst-case performance such as wire speed requirement is a design factor. However, the AC algorithm was developed only for strings while virus/worm signatures could be specified by simple regular expressions. In this paper, we generalize the AC algorithm to systematically construct a finite state pattern matching machine which can indicate the ending position in a finite input string for the first occurrence of virus/worm signatures that are specified by strings or simple regular expressions. The regular expressions studied in this paper may contain the following operators: * (match any number of symbols), ? (match any symbol), and {min, max} (match minimum of min, maximum of max symbols), which are defined in ClamAV, a popular open source anti-virus/worm software module, for signature specification.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Coordinate-Based Routing for Overlay Networks 基于坐标的覆盖网络路由
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317900
V. Pappas, V. Hilt, M. Hofmann
Overlay networks are widely used as a way to introduce novel Internet services and to improve the reliability and performance of today's Internet. Traditionally, overlay networks perform routing by mimicking the underlying IP routing protocols, which does not scale well with the system size. In this paper, we propose a fundamentally new approach to overlay routing that is based on network coordinates. Our evaluation shows that this approach is scalable to a large number of overlay nodes with a message complexity of O(N) while providing routing decisions that are close to optimal in terms of error resilience and path delay.
覆盖网络作为一种引入新的互联网服务和提高当今互联网的可靠性和性能的方式被广泛使用。传统上,覆盖网络通过模仿底层IP路由协议来执行路由,这不能很好地随系统大小进行扩展。在本文中,我们提出了一种基于网络坐标的覆盖路由的全新方法。我们的评估表明,这种方法可以扩展到消息复杂度为0 (N)的大量覆盖节点,同时提供在错误弹性和路径延迟方面接近最佳的路由决策。
{"title":"Coordinate-Based Routing for Overlay Networks","authors":"V. Pappas, V. Hilt, M. Hofmann","doi":"10.1109/ICCCN.2007.4317900","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317900","url":null,"abstract":"Overlay networks are widely used as a way to introduce novel Internet services and to improve the reliability and performance of today's Internet. Traditionally, overlay networks perform routing by mimicking the underlying IP routing protocols, which does not scale well with the system size. In this paper, we propose a fundamentally new approach to overlay routing that is based on network coordinates. Our evaluation shows that this approach is scalable to a large number of overlay nodes with a message complexity of O(N) while providing routing decisions that are close to optimal in terms of error resilience and path delay.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132189299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MBAL: A Mobile Beacon-Assisted Localization Scheme for Wireless Sensor Networks 移动信标辅助无线传感器网络定位方案
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317797
Kyunghwi Kim, Wonjun Lee
Localization is one of the critical issues on wireless sensor networks. Localization schemes are classified into range-based and range-free according to the method of whether to use range information. In this paper, we propose a novel range-based localization scheme which involves a movement strategy of mobile beacon, called mobile beacon-assisted localization (MBAL). Contrary to many research activities which have been carried out to design localization schemes using mobile beacons only based on random movement method, we consider totally a new scheme providing movement path selection with a low computational complexity. A new range check technique is also adopted into the MBAL as a useful solution to the position-ambiguity problem of bilateration in order to improve the performance of the proposed localization scheme. Simulation results verify that the MBAL impressively achieves energy efficiency because of its mobile beacon based approach using the proposed movement strategy and range check technique.
定位是无线传感器网络的关键问题之一。根据是否使用距离信息的方式,将定位方案分为基于距离和无距离两种。本文提出了一种新的基于距离的定位方案,该方案采用移动信标的运动策略,称为移动信标辅助定位(MBAL)。与以往仅基于随机运动方法设计移动信标定位方案的研究不同,本文提出了一种计算复杂度较低的移动信标定位方案。为了提高定位方案的性能,在MBAL中引入了一种新的距离校验技术,有效地解决了双边定位的位置模糊问题。仿真结果验证了基于移动信标的MBAL方法在使用所提出的运动策略和距离检测技术的情况下取得了令人印象深刻的能源效率。
{"title":"MBAL: A Mobile Beacon-Assisted Localization Scheme for Wireless Sensor Networks","authors":"Kyunghwi Kim, Wonjun Lee","doi":"10.1109/ICCCN.2007.4317797","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317797","url":null,"abstract":"Localization is one of the critical issues on wireless sensor networks. Localization schemes are classified into range-based and range-free according to the method of whether to use range information. In this paper, we propose a novel range-based localization scheme which involves a movement strategy of mobile beacon, called mobile beacon-assisted localization (MBAL). Contrary to many research activities which have been carried out to design localization schemes using mobile beacons only based on random movement method, we consider totally a new scheme providing movement path selection with a low computational complexity. A new range check technique is also adopted into the MBAL as a useful solution to the position-ambiguity problem of bilateration in order to improve the performance of the proposed localization scheme. Simulation results verify that the MBAL impressively achieves energy efficiency because of its mobile beacon based approach using the proposed movement strategy and range check technique.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Load-Balanced Routing in Ad hoc Networks Ad hoc网络中的负载均衡路由
Pub Date : 2007-09-24 DOI: 10.1109/ICCCN.2007.4317877
S. Rangarajan, J. Garcia-Luna-Aceves
Many multipath routing protocols proposed to date have used destination sequence numbers to provide multiple loop-free paths to destinations. We present the first on-demand multipath routing protocol for ad hoc networks that uses source sequence numbers to maintain loop-free routes. We propose a novel load-balancing scheme that incurs very little control overhead. Extensive simulations illustrate that the proposed multipath protocol performs better than single-path approaches and that the proposed load-balancing scheme performs better than basic round-robin scheduling.
迄今提出的许多多路径路由协议都使用目的地序列号来提供到目的地的多条无环路路径。我们提出了第一个针对自组织网络的按需多路径路由协议,该协议使用源序列号来维持无环路路由。我们提出了一种新的负载平衡方案,它的控制开销很小。大量的仿真表明,所提出的多路径协议优于单路径方法,所提出的负载均衡方案优于基本的轮循调度。
{"title":"Load-Balanced Routing in Ad hoc Networks","authors":"S. Rangarajan, J. Garcia-Luna-Aceves","doi":"10.1109/ICCCN.2007.4317877","DOIUrl":"https://doi.org/10.1109/ICCCN.2007.4317877","url":null,"abstract":"Many multipath routing protocols proposed to date have used destination sequence numbers to provide multiple loop-free paths to destinations. We present the first on-demand multipath routing protocol for ad hoc networks that uses source sequence numbers to maintain loop-free routes. We propose a novel load-balancing scheme that incurs very little control overhead. Extensive simulations illustrate that the proposed multipath protocol performs better than single-path approaches and that the proposed load-balancing scheme performs better than basic round-robin scheduling.","PeriodicalId":388763,"journal":{"name":"2007 16th International Conference on Computer Communications and Networks","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115974520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2007 16th International Conference on Computer Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1