首页 > 最新文献

2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
Adaptive Bloom filters for multicast addressing 自适应布隆过滤器的多播寻址
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928802
Zalán Heszberger, János Tapolcai, A. Gulyás, J. Bíró, A. Zahemszky, P. Ho
In-packet Bloom filters are recently proposed as a possible building block of future Internet architectures replacing IP or MPLS addressing that solves efficient multicast routing, security and other functions in a stateless manner. In such frameworks a bloom filter is placed in the header which stores the addresses of the destination nodes or the traversed links. In contrast to the standard Bloom filter, the length of the in-packet Bloom filter must be highly adaptive to the number of stored elements to achieve low communication overhead. In this paper we propose a novel type of Bloom filter called Adaptive Bloom filter, which can adapt its length to the number of elements to be represented with a very fine granularity. The novel filter can significantly reduce the header size for in-packet bloom filter architecture, by eliminating the wasting effect experienced in existing “block-based” approaches which rely on concatenating several standard Bloom filters. Nevertheless, it requires slightly more calculations when adding and removing elements.
包内布隆过滤器最近被提议作为未来互联网架构的可能构建块,取代IP或MPLS寻址,以无状态的方式解决高效的多播路由、安全性和其他功能。在这样的框架中,布隆过滤器被放置在头部,存储目标节点或遍历链接的地址。与标准布隆过滤器相比,包内布隆过滤器的长度必须与存储元素的数量高度自适应,以实现低通信开销。本文提出了一种新型的自适应布隆过滤器,它可以根据要用非常细的粒度表示的元素的数量来调整其长度。通过消除现有的“基于块”的方法所经历的浪费效应,这种新型过滤器可以显著减少包内布隆过滤器架构的报头大小,这种方法依赖于连接几个标准布隆过滤器。然而,在添加和删除元素时需要更多的计算。
{"title":"Adaptive Bloom filters for multicast addressing","authors":"Zalán Heszberger, János Tapolcai, A. Gulyás, J. Bíró, A. Zahemszky, P. Ho","doi":"10.1109/INFCOMW.2011.5928802","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928802","url":null,"abstract":"In-packet Bloom filters are recently proposed as a possible building block of future Internet architectures replacing IP or MPLS addressing that solves efficient multicast routing, security and other functions in a stateless manner. In such frameworks a bloom filter is placed in the header which stores the addresses of the destination nodes or the traversed links. In contrast to the standard Bloom filter, the length of the in-packet Bloom filter must be highly adaptive to the number of stored elements to achieve low communication overhead. In this paper we propose a novel type of Bloom filter called Adaptive Bloom filter, which can adapt its length to the number of elements to be represented with a very fine granularity. The novel filter can significantly reduce the header size for in-packet bloom filter architecture, by eliminating the wasting effect experienced in existing “block-based” approaches which rely on concatenating several standard Bloom filters. Nevertheless, it requires slightly more calculations when adding and removing elements.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125186633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
L-WMxD: Lexical based Webmail XSS Discoverer L-WMxD:基于词法的Webmail XSS发现者
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928954
Zhushou Tang, Haojin Zhu, Z. Cao, Shuai Zhao
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail. This paper proposes a Webmail XSS fuzzer called L-WMxD (Lexical based Webmail XSS Discoverer). L-WMxD , which works on a lexical based mutation engine, is an active defense system to discover XSS before the Webmail application is online for service. The engine is initialized by normal JavaScript code called seed. Then, rules are applied to the sensitive strings in the seed which are picked out through a lexical parser. After that, the mutation engine issues multiple test cases. Newly-generated test cases are used for XSS test. Two prototype tools are realized by us to send the newly-generated test cases to various Webmail servers to discover XSS vulnerability. Experimental results of L-WMxD are quite encouraging. We have run L-WMxD over 26 real-world Webmail applications and found vulnerabilities in 21 Webmail services, including some of the most widely used Yahoo!Mail, Mirapoint Webmail and ORACLE' Collaboration Suite Mail.
跨站点脚本(XSS)是web应用程序的主要安全威胁。由于web应用程序缺乏源代码,模糊技术已成为除Webmail外的web应用程序中发现跨站攻击的常用方法。本文提出了一种基于词法的Webmail跨站探测器L-WMxD (Lexical based Webmail跨站探测器)。L-WMxD工作在基于词法的突变引擎上,是一个主动防御系统,可以在Webmail应用程序在线服务之前发现XSS。该引擎由称为seed的普通JavaScript代码初始化。然后,规则应用于种子中的敏感字符串,这些字符串是通过词法解析器挑选出来的。之后,突变引擎发出多个测试用例。新生成的测试用例用于XSS测试。我们实现了两种原型工具,将新生成的测试用例发送到各种Webmail服务器,以发现跨站攻击漏洞。L-WMxD的实验结果令人鼓舞。我们在26个真实的Webmail应用程序上运行了L-WMxD,并在21个Webmail服务中发现了漏洞,其中包括一些最广泛使用的Yahoo!邮件,Mirapoint Webmail和ORACLE的协作套件邮件。
{"title":"L-WMxD: Lexical based Webmail XSS Discoverer","authors":"Zhushou Tang, Haojin Zhu, Z. Cao, Shuai Zhao","doi":"10.1109/INFCOMW.2011.5928954","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928954","url":null,"abstract":"XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail. This paper proposes a Webmail XSS fuzzer called L-WMxD (Lexical based Webmail XSS Discoverer). L-WMxD , which works on a lexical based mutation engine, is an active defense system to discover XSS before the Webmail application is online for service. The engine is initialized by normal JavaScript code called seed. Then, rules are applied to the sensitive strings in the seed which are picked out through a lexical parser. After that, the mutation engine issues multiple test cases. Newly-generated test cases are used for XSS test. Two prototype tools are realized by us to send the newly-generated test cases to various Webmail servers to discover XSS vulnerability. Experimental results of L-WMxD are quite encouraging. We have run L-WMxD over 26 real-world Webmail applications and found vulnerabilities in 21 Webmail services, including some of the most widely used Yahoo!Mail, Mirapoint Webmail and ORACLE' Collaboration Suite Mail.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Micropatterning of different kinds of biomaterials as a platform of a molecular communication system 不同种类生物材料的微图案化作为分子通讯系统的平台
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928860
S. Hiyama, Y. Moritani, K. Kuribayashi-Shigetomi, H. Onoe, S. Takeuchi
We aimed to create a method in micropatterning of different kinds of biomaterials as a platform of a molecular communication system onto a single substrate. This paper proposes a multiple poly(para-xylylene) (parylene) simultaneous peel-off process and demonstrates that different kinds of proteins and DNAs were successfully microarrayed onto the single substrate. Further, the functionalities and the contamination-free nature of these microarrayed biomaterials were maintained throughout the micropatterning process. Our results contribute to the development of microarrayed senders and receivers such as DNA-tagged vesicles and/or biological cells in molecular communication, and will help to investigate and visualize the overall of molecular communication processes.
我们的目标是创造一种不同种类生物材料的微图案化方法,作为分子通信系统在单一基质上的平台。本文提出了一种多聚对二甲苯(聚二甲苯)同时剥离工艺,并证明了不同种类的蛋白质和dna被成功地微阵列到单一底物上。此外,这些微阵列生物材料的功能和无公害性质在整个微图案化过程中保持不变。我们的研究结果有助于微阵列发送者和接收者的发展,如dna标记囊泡和/或分子通信中的生物细胞,并将有助于研究和可视化分子通信过程的整体。
{"title":"Micropatterning of different kinds of biomaterials as a platform of a molecular communication system","authors":"S. Hiyama, Y. Moritani, K. Kuribayashi-Shigetomi, H. Onoe, S. Takeuchi","doi":"10.1109/INFCOMW.2011.5928860","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928860","url":null,"abstract":"We aimed to create a method in micropatterning of different kinds of biomaterials as a platform of a molecular communication system onto a single substrate. This paper proposes a multiple poly(para-xylylene) (parylene) simultaneous peel-off process and demonstrates that different kinds of proteins and DNAs were successfully microarrayed onto the single substrate. Further, the functionalities and the contamination-free nature of these microarrayed biomaterials were maintained throughout the micropatterning process. Our results contribute to the development of microarrayed senders and receivers such as DNA-tagged vesicles and/or biological cells in molecular communication, and will help to investigate and visualize the overall of molecular communication processes.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131499141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Profiling per-packet and per-byte energy consumption in the NetFPGA Gigabit router 分析NetFPGA千兆路由器中每数据包和每字节的能耗
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928833
V. Sivaraman, A. Vishwanath, Zhi Zhao, Craig Russell
Improving energy efficiency of Internet equipment is becoming an increasingly important research topic, motivated by the need to reduce energy costs (and Carbon footprint) for Internet Service Providers, as well as increase power density to achieve more switching capacity per-rack. While recent research has profiled the power consumption of commercial routing equipment, these profiles are coarse-grained (i.e., at the granularity of per line-card or per port), and moreover such platforms are inflexible for experimentation with new energy-saving mechanisms. In this paper we therefore consider the NetFPGA platform, which is becoming an increasingly popular routing platform for networking research due to its versatility and low-cost. Using a precise hardware-based traffic generator and high-fidelity energy probe, we conduct several experiments that allow us to decompose the energy consumption of the NetFPGA routing card into fine-grained per-packet and per-byte components with reasonable accuracy. Our quantification of energy consumption on this platform opens the doors for estimating network-wide energy footprints at the granularity of traffic sessions and applications (e.g., due to TCP file transfers), and provides a benchmark against which energy improvements arising from new architectures and protocols can be evaluated.
提高互联网设备的能源效率正成为一个日益重要的研究课题,其动机是需要降低互联网服务提供商的能源成本(和碳足迹),以及提高功率密度以实现更大的每机架交换容量。虽然最近的研究概述了商业路由设备的功耗,但这些概述是粗粒度的(即,在每个线路卡或每个端口的粒度上),而且这些平台对于新的节能机制的实验是不灵活的。因此,在本文中,我们考虑了NetFPGA平台,由于其通用性和低成本,它正成为网络研究中越来越流行的路由平台。使用精确的基于硬件的流量生成器和高保真能量探针,我们进行了几次实验,使我们能够以合理的精度将NetFPGA路由卡的能量消耗分解为细粒度的每数据包和每字节组件。我们在这个平台上的能源消耗量化为在流量会话和应用程序(例如,由于TCP文件传输)的粒度上估计网络范围内的能源足迹打开了大门,并提供了一个基准,根据新架构和协议产生的能源改进可以进行评估。
{"title":"Profiling per-packet and per-byte energy consumption in the NetFPGA Gigabit router","authors":"V. Sivaraman, A. Vishwanath, Zhi Zhao, Craig Russell","doi":"10.1109/INFCOMW.2011.5928833","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928833","url":null,"abstract":"Improving energy efficiency of Internet equipment is becoming an increasingly important research topic, motivated by the need to reduce energy costs (and Carbon footprint) for Internet Service Providers, as well as increase power density to achieve more switching capacity per-rack. While recent research has profiled the power consumption of commercial routing equipment, these profiles are coarse-grained (i.e., at the granularity of per line-card or per port), and moreover such platforms are inflexible for experimentation with new energy-saving mechanisms. In this paper we therefore consider the NetFPGA platform, which is becoming an increasingly popular routing platform for networking research due to its versatility and low-cost. Using a precise hardware-based traffic generator and high-fidelity energy probe, we conduct several experiments that allow us to decompose the energy consumption of the NetFPGA routing card into fine-grained per-packet and per-byte components with reasonable accuracy. Our quantification of energy consumption on this platform opens the doors for estimating network-wide energy footprints at the granularity of traffic sessions and applications (e.g., due to TCP file transfers), and provides a benchmark against which energy improvements arising from new architectures and protocols can be evaluated.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128052070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
An OSPF enhancement for energy saving in IP networks 针对IP网络节能的OSPF增强
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928832
A. Cianfrani, V. Eramo, M. Listanti, Marco Polverini
This paper deals with a strategy to save energy in an IP network during low traffic hours allowing a subset of IP router interfaces to be put in sleep mode by means of an Energy Aware Routing (EAR) strategy. The EAR is fully compatible with OSPF and is based on the “Shortest Path Tree (SPT) exportation” mechanism, consisting in sharing the SPTs among couple of routers. The EAR strategy is able to control the set of links to be put in sleep mode through the concept of “move”. This approach gives the network operator the possibility to control the network performance and allows a smoothed QoS degradation strategy to be implemented. A formulation of the EAR problem is presented and will be demonstrated that this problem can be traced back to the well-known problem of the maximum clique search in an undirected weighted graph. A heuristics, called Max Compatibility, is presented and, as shown in the performance evaluation study, it allows to save about 30% of network links with a negligible increase of network path lengths and link loads.
本文研究了一种在IP网络低流量时段,利用能量感知路由(energy Aware Routing, EAR)策略,允许IP路由器接口子集进入休眠模式的节能策略。EAR与OSPF完全兼容,基于“最短路径树(SPT)导出”机制,即在两台路由器之间共享SPT。EAR策略能够通过“移动”的概念来控制要进入休眠模式的链接集。这种方法为网络运营商提供了控制网络性能的可能性,并允许实现平滑的QoS退化策略。给出了EAR问题的一个公式,并将证明该问题可以追溯到无向加权图中的最大团搜索问题。提出了一种称为Max Compatibility的启发式方法,如性能评估研究中所示,它可以节省大约30%的网络链接,而网络路径长度和链接负载的增加可以忽略不计。
{"title":"An OSPF enhancement for energy saving in IP networks","authors":"A. Cianfrani, V. Eramo, M. Listanti, Marco Polverini","doi":"10.1109/INFCOMW.2011.5928832","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928832","url":null,"abstract":"This paper deals with a strategy to save energy in an IP network during low traffic hours allowing a subset of IP router interfaces to be put in sleep mode by means of an Energy Aware Routing (EAR) strategy. The EAR is fully compatible with OSPF and is based on the “Shortest Path Tree (SPT) exportation” mechanism, consisting in sharing the SPTs among couple of routers. The EAR strategy is able to control the set of links to be put in sleep mode through the concept of “move”. This approach gives the network operator the possibility to control the network performance and allows a smoothed QoS degradation strategy to be implemented. A formulation of the EAR problem is presented and will be demonstrated that this problem can be traced back to the well-known problem of the maximum clique search in an undirected weighted graph. A heuristics, called Max Compatibility, is presented and, as shown in the performance evaluation study, it allows to save about 30% of network links with a negligible increase of network path lengths and link loads.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133183569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
Improving the performance of intrusion detection using Dialog-based Payload Aggregation 利用基于对话框的负载聚合改进入侵检测的性能
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928926
Tobias Limmer, F. Dressler
We propose Dialog-based Payload Aggregation (DPA) that extracts relevant payload data from TCP/IP packet streams based on sequence numbers in the TCP header for improved intrusion detection performance. Typical network-based Intrusion Detection Systems (IDSs) like Snort, which use rules for matching payload data, show severe performance problems in high-speed networks. Our detailed analysis based on live network traffic reveals that most of the signature matches either occur at the beginning of TCP connections or directly after direction changes in the data streams. Our DPA approach exploits protocol semantics intrinsic to bidirectional communication, i.e., most application layer protocols rely on requests and associated responses with a direction change in the data stream in between. DPA forwards the next N bytes of payload whenever a connection starts, or when the direction of the data transmission changes. All data transferred after this window is discarded. According to experimental results, our method reduces the amount of data to be analyzed at the IDS to around 3:7% for typical network traffic. At the same time, more than 89% of all potential events can be detected. Assuming a linear relationship between data rate and processing time of an IDS, this results in a speedup of more than one order of magnitude in the best case. Our performance analysis that combines DPA with Snort shows a 400% increase in packet processing throughput on commodity hardware.
为了提高入侵检测性能,我们提出了基于对话框的有效载荷聚合(DPA)技术,该技术基于TCP报头中的序列号从TCP/IP数据包流中提取相关的有效载荷数据。典型的基于网络的入侵检测系统(ids),如Snort,使用规则匹配有效负载数据,在高速网络中会出现严重的性能问题。我们基于实时网络流量的详细分析表明,大多数签名匹配要么发生在TCP连接开始时,要么直接发生在数据流的方向改变之后。我们的DPA方法利用了双向通信固有的协议语义,也就是说,大多数应用层协议依赖于请求和相关响应,并在两者之间的数据流中改变方向。每当连接开始或数据传输方向发生变化时,DPA都会转发下一个N字节的负载。在此窗口之后传输的所有数据将被丢弃。根据实验结果,我们的方法将IDS上需要分析的数据量减少到典型网络流量的3:7%左右。与此同时,超过89%的潜在事件可以被检测到。假设IDS的数据速率和处理时间之间存在线性关系,那么在最好的情况下,这将导致一个数量级以上的加速。我们结合DPA和Snort进行的性能分析显示,在普通硬件上的数据包处理吞吐量提高了400%。
{"title":"Improving the performance of intrusion detection using Dialog-based Payload Aggregation","authors":"Tobias Limmer, F. Dressler","doi":"10.1109/INFCOMW.2011.5928926","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928926","url":null,"abstract":"We propose Dialog-based Payload Aggregation (DPA) that extracts relevant payload data from TCP/IP packet streams based on sequence numbers in the TCP header for improved intrusion detection performance. Typical network-based Intrusion Detection Systems (IDSs) like Snort, which use rules for matching payload data, show severe performance problems in high-speed networks. Our detailed analysis based on live network traffic reveals that most of the signature matches either occur at the beginning of TCP connections or directly after direction changes in the data streams. Our DPA approach exploits protocol semantics intrinsic to bidirectional communication, i.e., most application layer protocols rely on requests and associated responses with a direction change in the data stream in between. DPA forwards the next N bytes of payload whenever a connection starts, or when the direction of the data transmission changes. All data transferred after this window is discarded. According to experimental results, our method reduces the amount of data to be analyzed at the IDS to around 3:7% for typical network traffic. At the same time, more than 89% of all potential events can be detected. Assuming a linear relationship between data rate and processing time of an IDS, this results in a speedup of more than one order of magnitude in the best case. Our performance analysis that combines DPA with Snort shows a 400% increase in packet processing throughput on commodity hardware.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133532046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Identifying bad measurements in compressive sensing 识别压缩感知中的不良测量
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928783
H. Kung, Tsung-Han Lin, D. Vlah
We consider the problem of identifying bad measurements in compressive sensing. These bad measurements can be present due to malicious attacks and system malfunction. Since the system of linear equations in compressive sensing is underconstrained, errors introduced by these bad measurements can result in large changes in decoded solutions. We describe methods for identifying bad measurements so that they can be removed before decoding. In a new separation-based method we separate out top nonzero variables by ranking, eliminate the remaining variables from the system of equations, and then solve the reduced overconstrained problem to identify bad measurements. Comparing to prior methods based on direct or joint ℓ1-minimization, the separation-based method can work under a much smaller number of measurements. In analyzing the method we introduce the notion of inversions which governs the separability of large nonzero variables.
研究了压缩感知中不良测量的识别问题。由于恶意攻击和系统故障,可能会出现这些错误的度量。由于压缩感知中的线性方程组是欠约束的,由这些不良测量引入的误差可能导致解码解的巨大变化。我们描述了识别不良测量的方法,以便在解码之前将其删除。在一种新的基于分离的方法中,我们通过排序分离出最重要的非零变量,从方程组中消除剩余的变量,然后解决简化的过约束问题来识别不良测量。与先前基于直接或联合最小化的方法相比,基于分离的方法可以在更少的测量次数下工作。在分析该方法时,我们引入了控制大非零变量可分性的反转概念。
{"title":"Identifying bad measurements in compressive sensing","authors":"H. Kung, Tsung-Han Lin, D. Vlah","doi":"10.1109/INFCOMW.2011.5928783","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928783","url":null,"abstract":"We consider the problem of identifying bad measurements in compressive sensing. These bad measurements can be present due to malicious attacks and system malfunction. Since the system of linear equations in compressive sensing is underconstrained, errors introduced by these bad measurements can result in large changes in decoded solutions. We describe methods for identifying bad measurements so that they can be removed before decoding. In a new separation-based method we separate out top nonzero variables by ranking, eliminate the remaining variables from the system of equations, and then solve the reduced overconstrained problem to identify bad measurements. Comparing to prior methods based on direct or joint ℓ1-minimization, the separation-based method can work under a much smaller number of measurements. In analyzing the method we introduce the notion of inversions which governs the separability of large nonzero variables.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130326065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
In-network content based image recommendation system for Content-aware Networks 面向内容感知网络的基于网络内容的图像推荐系统
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928791
Marta Barrilero, Silvia Uribe, M. Alduán, Faustino Sánchez, F. Álvarez
This paper describes a novel content-based image recommendation system based on new image low level descriptors derived from the well known MPEG-7 parameters. Furthermore, it also proposes the integration of this recommendation system into a content-aware network architecture to enhance and enrich the content delivery and improve user's experience.
本文提出了一种基于MPEG-7参数的图像低级描述符的基于内容的图像推荐系统。进一步提出了将该推荐系统集成到内容感知网络架构中,以增强和丰富内容交付,改善用户体验。
{"title":"In-network content based image recommendation system for Content-aware Networks","authors":"Marta Barrilero, Silvia Uribe, M. Alduán, Faustino Sánchez, F. Álvarez","doi":"10.1109/INFCOMW.2011.5928791","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928791","url":null,"abstract":"This paper describes a novel content-based image recommendation system based on new image low level descriptors derived from the well known MPEG-7 parameters. Furthermore, it also proposes the integration of this recommendation system into a content-aware network architecture to enhance and enrich the content delivery and improve user's experience.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A new enforcement on declassification with reachability analysis 基于可及性分析的解密新方法
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928777
Cong Sun, Liyong Tang, Zhong Chen
Language-based information flow security aims to decide whether an action-observable program can unintentionally leak confidential information if it has the authority to access confidential data. Recent concerns about declassification polices have provided many choices for practical intended information release, but more precise enforcement mechanism for these policies is insufficiently studied. In this paper, we propose a security property on the where-dimension of declassification and present an enforcement based on automated verification. The approach automatically transforms the abstract model with a variant of self-composition, and checks the reachability of illegal-flow state of the model after transformation. The self-composition is equipped with a store-match pattern to reduce the state space and to model the equivalence of declassified expressions in the premise of property. The evaluation shows that our approach is more precise than type-based enforcement.
基于语言的信息流安全的目的是确定一个动作可观察程序是否会在无意中泄露机密信息,如果它有权访问机密数据。近年来对解密政策的关注为实际的有意信息发布提供了许多选择,但对这些政策更精确的执行机制研究不足。在本文中,我们提出了解密的where-dimension的安全属性,并提出了一种基于自动验证的强制执行方法。该方法利用自组合的一种变体对抽象模型进行自动转换,并对转换后的模型非法流状态的可达性进行检测。自组合采用存储-匹配模式,减少状态空间,在属性前提下模拟解密表达式的等价性。评估表明,我们的方法比基于类型的强制执行更精确。
{"title":"A new enforcement on declassification with reachability analysis","authors":"Cong Sun, Liyong Tang, Zhong Chen","doi":"10.1109/INFCOMW.2011.5928777","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928777","url":null,"abstract":"Language-based information flow security aims to decide whether an action-observable program can unintentionally leak confidential information if it has the authority to access confidential data. Recent concerns about declassification polices have provided many choices for practical intended information release, but more precise enforcement mechanism for these policies is insufficiently studied. In this paper, we propose a security property on the where-dimension of declassification and present an enforcement based on automated verification. The approach automatically transforms the abstract model with a variant of self-composition, and checks the reachability of illegal-flow state of the model after transformation. The self-composition is equipped with a store-match pattern to reduce the state space and to model the equivalence of declassified expressions in the premise of property. The evaluation shows that our approach is more precise than type-based enforcement.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stir: Spontaneous social peer-to-peer streaming 轰动:自发的社交点对点流媒体
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928925
A. Nguyen, Baochun Li, M. Welzl, F. Eliassen
Dealing with a high churn rate is very challenging in live peer-to-peer streaming. State-of-the-art studies try to mitigate the problem by exploiting peer dynamic models, analyzing traces from real world systems, or using enhanced coding techniques, e.g., network coding. Applications of social networking in peer-to-peer systems, especially on file sharing, have recently received research attention. In such systems, the establishment of connections among peers is based on social relationships among users, which are, however, not formed in the context of a peer-to-peer session but, e.g., imported from other social networks. Since friends in such a separate social network do not always have similar interests, they may not necessarily join or stay long in the same peer-to-peer session. We believe that a tight integration between the high level social network of users and the low level overlay of peers would bring significant benefits in dealing with high churn rates and providing personalized streaming services. This paper presents Stir, the first attempt towards an integrated social peer-to-peer streaming system. The key feature of Stir is that social relationships among users are spontaneously formed in a streaming session, and can be exploited directly by the underlying streaming protocol. Stir users, who join the same session, can make friends by means of spontaneous communication, e.g., instant messaging. Such social network formation provides a reliable indication to deal with high churn rate. Our simulations with real social data and peer dynamic traces have demonstrated the benefits of Stir and shed light on building such a system in practice.
处理高流失率在实时点对点流媒体中是非常具有挑战性的。最先进的研究试图通过利用对等动态模型、分析来自现实世界系统的痕迹或使用增强的编码技术(例如网络编码)来缓解这个问题。社交网络在点对点系统中的应用,特别是在文件共享方面的应用,近年来受到了研究的关注。在这样的系统中,对等体之间的连接建立基于用户之间的社会关系,然而,这种关系不是在点对点会话的上下文中形成的,而是,例如,从其他社会网络导入的。由于在这样一个独立的社交网络中的朋友并不总是有相似的兴趣,他们可能不一定会加入或在同一个点对点会话中呆很长时间。我们相信,在高层次的用户社交网络和低层次的用户社交网络之间的紧密整合,将为处理高流失率和提供个性化的流媒体服务带来显著的好处。本文提出了Stir,这是一个集成的社会点对点流媒体系统的第一次尝试。Stir的主要特点是用户之间的社交关系是在流媒体会话中自发形成的,并且可以被底层流媒体协议直接利用。加入同一会话的Stir用户可以通过即时通讯等自发交流方式结交朋友。这种社交网络的形成为处理高流失率提供了可靠的指示。我们对真实社会数据和同伴动态轨迹的模拟已经证明了Stir的好处,并为在实践中构建这样一个系统提供了启示。
{"title":"Stir: Spontaneous social peer-to-peer streaming","authors":"A. Nguyen, Baochun Li, M. Welzl, F. Eliassen","doi":"10.1109/INFCOMW.2011.5928925","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928925","url":null,"abstract":"Dealing with a high churn rate is very challenging in live peer-to-peer streaming. State-of-the-art studies try to mitigate the problem by exploiting peer dynamic models, analyzing traces from real world systems, or using enhanced coding techniques, e.g., network coding. Applications of social networking in peer-to-peer systems, especially on file sharing, have recently received research attention. In such systems, the establishment of connections among peers is based on social relationships among users, which are, however, not formed in the context of a peer-to-peer session but, e.g., imported from other social networks. Since friends in such a separate social network do not always have similar interests, they may not necessarily join or stay long in the same peer-to-peer session. We believe that a tight integration between the high level social network of users and the low level overlay of peers would bring significant benefits in dealing with high churn rates and providing personalized streaming services. This paper presents Stir, the first attempt towards an integrated social peer-to-peer streaming system. The key feature of Stir is that social relationships among users are spontaneously formed in a streaming session, and can be exploited directly by the underlying streaming protocol. Stir users, who join the same session, can make friends by means of spontaneous communication, e.g., instant messaging. Such social network formation provides a reliable indication to deal with high churn rate. Our simulations with real social data and peer dynamic traces have demonstrated the benefits of Stir and shed light on building such a system in practice.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"8 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132388444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1