首页 > 最新文献

2014 28th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Optimizing Bit Transmission Power for Link Layer Energy Efficiency 优化链路层能量效率的比特传输功率
A. Ghanavati, D. Lee
In this paper, we study the issue of optimizing transmission power (energy per symbol) for minimizing the expected energy required to deliver a frame to the destination node in a point-to-point link employing an automatic repeat request (ARQ) scheme over a fading channel. We derive the expected energy as a function of the transmission power and derive a simple optimization algorithm based on the properties of this function.
在本文中,我们研究了优化传输功率(每符号能量)的问题,以最小化在衰落信道上采用自动重复请求(ARQ)方案的点对点链路中向目标节点发送帧所需的预期能量。我们导出了期望能量作为传输功率的函数,并基于该函数的性质推导了一个简单的优化算法。
{"title":"Optimizing Bit Transmission Power for Link Layer Energy Efficiency","authors":"A. Ghanavati, D. Lee","doi":"10.1109/WAINA.2014.119","DOIUrl":"https://doi.org/10.1109/WAINA.2014.119","url":null,"abstract":"In this paper, we study the issue of optimizing transmission power (energy per symbol) for minimizing the expected energy required to deliver a frame to the destination node in a point-to-point link employing an automatic repeat request (ARQ) scheme over a fading channel. We derive the expected energy as a function of the transmission power and derive a simple optimization algorithm based on the properties of this function.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of the Film Selection Process for a Film Festival 电影节的电影选择过程分析
Masashi Inoue, Sakie Sakuma
This paper presents the results of our analysis of the film selection process for a film festival. The selection of films characterises the festival, which then attracts audiences. Although the criteria for selection are fundamentally decided by members of the selection committee, we investigate if computation can characterise the selection process by utilising available data in this study. Selections are made by watching films and not by checking the associated information. However, considering the difficulties in semantically understanding the video content for computers, we attempted the analysis of the selection process based solely on associated information, including textual, numerical, or categorical data. Results of the analysis revealed factors that may affect the outcome of the selection.
本文介绍了我们对电影节电影选择过程的分析结果。电影的选择是电影节的特色,吸引着观众。尽管选择的标准基本上是由选择委员会的成员决定的,但我们研究了计算是否可以通过利用本研究中的可用数据来表征选择过程。选择是通过观看电影,而不是通过检查相关信息。然而,考虑到计算机在语义上理解视频内容的困难,我们尝试仅基于相关信息(包括文本、数字或分类数据)来分析选择过程。分析结果揭示了可能影响选择结果的因素。
{"title":"Analysis of the Film Selection Process for a Film Festival","authors":"Masashi Inoue, Sakie Sakuma","doi":"10.1109/WAINA.2014.96","DOIUrl":"https://doi.org/10.1109/WAINA.2014.96","url":null,"abstract":"This paper presents the results of our analysis of the film selection process for a film festival. The selection of films characterises the festival, which then attracts audiences. Although the criteria for selection are fundamentally decided by members of the selection committee, we investigate if computation can characterise the selection process by utilising available data in this study. Selections are made by watching films and not by checking the associated information. However, considering the difficulties in semantically understanding the video content for computers, we attempted the analysis of the selection process based solely on associated information, including textual, numerical, or categorical data. Results of the analysis revealed factors that may affect the outcome of the selection.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127758433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deployment Challenges and Developments in Wireless Sensor Networks Clustering 无线传感器网络集群的部署挑战与发展
Krishna Doddapaneni, Fredrick A. Omondi, E. Ever, P. Shah, O. Gemikonakli, R. Gagliardi
Clustering techniques for wireless sensor networks (WSNs) have been extensively studied and proven to improve the network lifetime, a primary metric, used for performance evaluation of sensor networks. Although introduction of clustering techniques has the potential to reduce energy consumption and extend the lifetime of the network by decreasing the contention through either power control or node scheduling, scalability remains an issue. Therefore, the optimality of the cluster size still needs to be thoroughly investigated. In this paper, a single cluster head (CH) queuing model is presented. Using an event based simulation tool (Castalia), key issues that affect the practical deployment of clustering techniques in wireless sensor networks are analysed. These include identifying the bottlenecks in terms of cluster scalability and predicting the nature of data packets arrival distribution at the CH. Results presented show that this analysis can be used to specify the size of a cluster, when a specific flow of data is expected from the sensing nodes based on a particular application and also the distribution of the inter-arrival times of data packets at the CH follows exponential distribution.
无线传感器网络(wsn)的聚类技术已经得到了广泛的研究,并被证明可以提高网络寿命,这是用于传感器网络性能评估的主要指标。虽然引入集群技术有可能通过电源控制或节点调度来减少争用,从而降低能耗并延长网络的生命周期,但可伸缩性仍然是一个问题。因此,集群大小的最优性仍然需要深入研究。本文提出了一种单簇头(CH)排队模型。使用基于事件的仿真工具(Castalia),分析了影响无线传感器网络中聚类技术实际部署的关键问题。其中包括识别集群可扩展性方面的瓶颈,并预测数据包到达CH的分布性质。所提出的结果表明,当基于特定应用的特定数据流期望来自传感节点时,该分析可用于指定集群的大小,并且数据包在CH的间隔到达时间分布遵循指数分布。
{"title":"Deployment Challenges and Developments in Wireless Sensor Networks Clustering","authors":"Krishna Doddapaneni, Fredrick A. Omondi, E. Ever, P. Shah, O. Gemikonakli, R. Gagliardi","doi":"10.1109/WAINA.2014.46","DOIUrl":"https://doi.org/10.1109/WAINA.2014.46","url":null,"abstract":"Clustering techniques for wireless sensor networks (WSNs) have been extensively studied and proven to improve the network lifetime, a primary metric, used for performance evaluation of sensor networks. Although introduction of clustering techniques has the potential to reduce energy consumption and extend the lifetime of the network by decreasing the contention through either power control or node scheduling, scalability remains an issue. Therefore, the optimality of the cluster size still needs to be thoroughly investigated. In this paper, a single cluster head (CH) queuing model is presented. Using an event based simulation tool (Castalia), key issues that affect the practical deployment of clustering techniques in wireless sensor networks are analysed. These include identifying the bottlenecks in terms of cluster scalability and predicting the nature of data packets arrival distribution at the CH. Results presented show that this analysis can be used to specify the size of a cluster, when a specific flow of data is expected from the sensing nodes based on a particular application and also the distribution of the inter-arrival times of data packets at the CH follows exponential distribution.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114867530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the Role of Semantic Descriptions for Adaptable Protocol Stacks in the Internet of Things 语义描述在物联网自适应协议栈中的作用
E. Gazis, K. Sasloglou, A. Merentitis, Kostas Mathioudakis
With Internet of Things applications covering several application domains (e.g., Smart Grid, Smart City, e-Health) with a diverse range of requirements, it is now becoming increasingly recognized that the variety of wireless technologies employed for Machine-to-Machine (M2M) communication is here to stay. Due to the heterogeneity of M2M appliances and communication modes, research has been investigating autonomic principles as an efficient instrument for the integration of large populations of dissimilar M2M devices to the M2M gateway and the overall end-to-end M2M architecture. Herein we present the status of semantic support for the IoT field by briefly surveying research efforts in IoT dealing with semantic concerns at the architecture level. We also summarize the state of the art in adaptable protocol stacks and make the case for their application as an efficiency enabler instrument for IoT. To this end, we present our work in an ontology used to semantically describe the adaptation options of the dynamic protocol stacks for future communication devices. We present the ontology design principles and artifacts and elaborate on the level of semantic support it enables for IoT. Finally, we conclude the paper with our next steps in the area of semantic support for IoT.
随着物联网应用涵盖多个应用领域(例如,智能电网、智慧城市、电子医疗),具有各种不同的要求,人们越来越认识到,用于机器对机器(M2M)通信的各种无线技术将继续存在。由于M2M设备和通信模式的异质性,研究人员一直在研究自治原则,将其作为一种有效的工具,将大量不同的M2M设备集成到M2M网关和整个端到端M2M架构中。本文通过简要调查物联网在架构层面处理语义问题的研究工作,介绍了物联网领域语义支持的现状。我们还总结了自适应协议栈的最新进展,并说明了它们作为物联网效率促进工具的应用。为此,我们在一个本体中展示了我们的工作,该本体用于从语义上描述未来通信设备的动态协议栈的自适应选项。我们提出了本体设计原则和工件,并详细阐述了它为物联网提供的语义支持级别。最后,我们总结了我们在物联网语义支持领域的下一步工作。
{"title":"On the Role of Semantic Descriptions for Adaptable Protocol Stacks in the Internet of Things","authors":"E. Gazis, K. Sasloglou, A. Merentitis, Kostas Mathioudakis","doi":"10.1109/WAINA.2014.73","DOIUrl":"https://doi.org/10.1109/WAINA.2014.73","url":null,"abstract":"With Internet of Things applications covering several application domains (e.g., Smart Grid, Smart City, e-Health) with a diverse range of requirements, it is now becoming increasingly recognized that the variety of wireless technologies employed for Machine-to-Machine (M2M) communication is here to stay. Due to the heterogeneity of M2M appliances and communication modes, research has been investigating autonomic principles as an efficient instrument for the integration of large populations of dissimilar M2M devices to the M2M gateway and the overall end-to-end M2M architecture. Herein we present the status of semantic support for the IoT field by briefly surveying research efforts in IoT dealing with semantic concerns at the architecture level. We also summarize the state of the art in adaptable protocol stacks and make the case for their application as an efficiency enabler instrument for IoT. To this end, we present our work in an ontology used to semantically describe the adaptation options of the dynamic protocol stacks for future communication devices. We present the ontology design principles and artifacts and elaborate on the level of semantic support it enables for IoT. Finally, we conclude the paper with our next steps in the area of semantic support for IoT.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123063275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effectiveness of DNS-Based Security Approaches in Large-Scale Networks 大规模网络中基于dns的安全方法的有效性
M. Janbeglou, H. Naderi, N. Brownlee
The Domain Name System (DNS) is widely seen as a vital protocol of the modern Internet. For example, popular services like load balancers and Content Delivery Networks heavily rely on DNS. Because of its important role, DNS is also a desirable target for malicious activities such as spamming, phishing, and botnets. To protect networks against these attacks, a number of DNS-based security approaches have been proposed. The key insight of our study is to measure the effectiveness of security approaches that rely on DNS in large-scale networks. For this purpose, we answer the following questions, How often is DNS used? Are most of the Internet flows established after contacting DNS? In this study, we collected data from the University of Auckland campus network with more than 33,000 Internet users and processed it to find out how DNS is being used. Moreover, we studied the flows that were established with and without contacting DNS. Our results show that less than 5 percent of the observed flows use DNS. Therefore, we argue that those security approaches that solely depend on DNS are not sufficient to protect large-scale networks.
域名系统(DNS)被广泛认为是现代互联网的重要协议。例如,像负载平衡器和内容交付网络这样的流行服务严重依赖于DNS。由于其重要作用,DNS也是恶意活动(如垃圾邮件、网络钓鱼和僵尸网络)的理想目标。为了保护网络免受这些攻击,已经提出了许多基于dns的安全方法。我们研究的关键观点是衡量在大规模网络中依赖DNS的安全方法的有效性。为此,我们回答以下问题:DNS的使用频率如何?大多数互联网流量是在联系DNS后建立的吗?在这项研究中,我们从奥克兰大学校园网中收集了超过33,000名互联网用户的数据,并对其进行了处理,以了解DNS的使用情况。此外,我们还研究了使用和不使用DNS建立的流。我们的结果表明,在观察到的流中,使用DNS的不到5%。因此,我们认为那些仅仅依赖于DNS的安全方法不足以保护大规模网络。
{"title":"Effectiveness of DNS-Based Security Approaches in Large-Scale Networks","authors":"M. Janbeglou, H. Naderi, N. Brownlee","doi":"10.1109/WAINA.2014.87","DOIUrl":"https://doi.org/10.1109/WAINA.2014.87","url":null,"abstract":"The Domain Name System (DNS) is widely seen as a vital protocol of the modern Internet. For example, popular services like load balancers and Content Delivery Networks heavily rely on DNS. Because of its important role, DNS is also a desirable target for malicious activities such as spamming, phishing, and botnets. To protect networks against these attacks, a number of DNS-based security approaches have been proposed. The key insight of our study is to measure the effectiveness of security approaches that rely on DNS in large-scale networks. For this purpose, we answer the following questions, How often is DNS used? Are most of the Internet flows established after contacting DNS? In this study, we collected data from the University of Auckland campus network with more than 33,000 Internet users and processed it to find out how DNS is being used. Moreover, we studied the flows that were established with and without contacting DNS. Our results show that less than 5 percent of the observed flows use DNS. Therefore, we argue that those security approaches that solely depend on DNS are not sufficient to protect large-scale networks.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121719049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Real-Time Mobile Cloud Computing: A Case Study in Face Recognition 实时移动云计算:人脸识别的案例研究
Marwa Ayad, M. Taher, Ashraf M. Salem
Face recognition has received attention from research communities recently. Law enforcement agencies are using facial recognition software as a crime-fighting tool. The quick increasing of Mobile Devices usage and the explosive growth of the mobile applications Mobile face recognition is one of important application. In the same time the mobile devices are facing many challenges in their resources as low computing power, battery life, limited bandwidth and storage. Mobile Cloud Computing (MCC) has been introduced to be a potential technology for mobile services and to solve the mobile resources problem by moving the processing and the storage of data out from mobile devices to the cloud. MCC offers abundant computing power that can be tapped easily. This paper gives explanation of MCC definition, Building private cloud with Open Source cloud OS, Face recognition as MCC Application with presenting the face detection and face recognition algorithms. Our results demonstrate that the proposed architecture is promising for real-time Mobile cloud computing by reducing the overall processing time.
近年来,人脸识别受到了研究领域的广泛关注。执法机构正在使用面部识别软件作为打击犯罪的工具。随着移动设备使用量的快速增长和移动应用的爆炸式增长,移动人脸识别是其中一个重要的应用。与此同时,移动设备在其资源方面面临着许多挑战,如低计算能力,电池寿命,有限的带宽和存储。移动云计算(MCC)已被引入为移动服务的潜在技术,并通过将数据的处理和存储从移动设备移到云来解决移动资源问题。MCC提供了丰富的计算能力,可以很容易地利用。本文阐述了人脸识别的定义,利用开源云操作系统构建私有云,人脸识别作为人脸识别的应用,并给出了人脸检测和人脸识别算法。我们的结果表明,通过减少整体处理时间,所提出的架构对于实时移动云计算是有希望的。
{"title":"Real-Time Mobile Cloud Computing: A Case Study in Face Recognition","authors":"Marwa Ayad, M. Taher, Ashraf M. Salem","doi":"10.1109/WAINA.2014.22","DOIUrl":"https://doi.org/10.1109/WAINA.2014.22","url":null,"abstract":"Face recognition has received attention from research communities recently. Law enforcement agencies are using facial recognition software as a crime-fighting tool. The quick increasing of Mobile Devices usage and the explosive growth of the mobile applications Mobile face recognition is one of important application. In the same time the mobile devices are facing many challenges in their resources as low computing power, battery life, limited bandwidth and storage. Mobile Cloud Computing (MCC) has been introduced to be a potential technology for mobile services and to solve the mobile resources problem by moving the processing and the storage of data out from mobile devices to the cloud. MCC offers abundant computing power that can be tapped easily. This paper gives explanation of MCC definition, Building private cloud with Open Source cloud OS, Face recognition as MCC Application with presenting the face detection and face recognition algorithms. Our results demonstrate that the proposed architecture is promising for real-time Mobile cloud computing by reducing the overall processing time.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126435928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Design of a Mobile Ad Hoc Network Communication App for Disaster Recovery 一种用于灾难恢复的移动自组织网络通信应用程序设计
Allan Goncalves, Carlos Silva, Patricia Morreale
The utility of mobile ad hoc networks (MANETs) during disaster recovery is well-known. Dynamic networks offer particular advantages in post-disaster circumstances, permitting first-responders to prioritize the use of humanitarian and repair resources in emergency situations caused by extreme weather such as earthquakes, hurricanes, floods, and snow storms. Real-time data and information sharing, using a mobile app, has been expanded from the individual point-to-point communication or 'hot-spots' to dynamically built, with virtual hub-and-spoke topology, mobile ad hoc networks. The MANET approach, supported by a mobile app, makes the disaster recovery more efficient, both in monitoring the scope of the damage and in coordinating appropriate recovery and relief missions. The integrated approach of a mobile app and MANETs can ultimately save lives and reduce the time needed for critical service to be restored.
在灾难恢复过程中,移动自组织网络(manet)的效用是众所周知的。动态网络在灾后情况下提供了特别的优势,允许第一响应者在地震、飓风、洪水和暴风雪等极端天气造成的紧急情况下优先使用人道主义和修复资源。使用移动应用程序的实时数据和信息共享已经从单个点对点通信或“热点”扩展到动态构建的具有虚拟轮辐拓扑的移动自组织网络。MANET方法在移动应用程序的支持下,在监测破坏范围和协调适当的恢复和救济任务方面,使灾难恢复更加有效。移动应用程序和manet的集成方法最终可以挽救生命,并减少恢复关键服务所需的时间。
{"title":"Design of a Mobile Ad Hoc Network Communication App for Disaster Recovery","authors":"Allan Goncalves, Carlos Silva, Patricia Morreale","doi":"10.1109/WAINA.2014.26","DOIUrl":"https://doi.org/10.1109/WAINA.2014.26","url":null,"abstract":"The utility of mobile ad hoc networks (MANETs) during disaster recovery is well-known. Dynamic networks offer particular advantages in post-disaster circumstances, permitting first-responders to prioritize the use of humanitarian and repair resources in emergency situations caused by extreme weather such as earthquakes, hurricanes, floods, and snow storms. Real-time data and information sharing, using a mobile app, has been expanded from the individual point-to-point communication or 'hot-spots' to dynamically built, with virtual hub-and-spoke topology, mobile ad hoc networks. The MANET approach, supported by a mobile app, makes the disaster recovery more efficient, both in monitoring the scope of the damage and in coordinating appropriate recovery and relief missions. The integrated approach of a mobile app and MANETs can ultimately save lives and reduce the time needed for critical service to be restored.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126508559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Game Theory Based Recommendation Mechanism for Taxi-Sharing 基于博弈论的出租车共享推荐机制
Sheng-Tzong Cheng, Jian-Pan Li, G. Horng
This paper presents a recommendation mechanism for taxi-sharing. The first aim of our model is to respectively recommend taxis and passengers for picking up passengers quickly and finding taxis easily. The second purpose is providing taxi-sharing service for passengers who want to save the payment. In our method, we analyze the historical Global Positioning System (GPS) trajectories generated by 10,357 taxis during 110 days and present the service region with time-dependent R-Tree. We formulate the problem of choosing the paths among the taxis in the same region by using non-cooperative game theory, and find out the solution of this game which is known as Nash equilibrium. The results show that our method can find taxis and passengers efficiently. In addition, applying our method can reduce the payment of passengers and increase the taxi revenue by taxi-sharing.
提出了一种出租车共享的推荐机制。我们模型的第一个目标是分别推荐出租车和乘客,以便快速接载乘客和轻松找到出租车。第二个目的是为想省钱的乘客提供拼车服务。在我们的方法中,我们分析了10,357辆出租车在110天内产生的全球定位系统(GPS)历史轨迹,并提出了与时间相关的R-Tree服务区域。利用非合作博弈理论,提出了同一区域内出租车的路径选择问题,并给出了该博弈的解,即纳什均衡。结果表明,该方法能有效地找到出租车和乘客。此外,应用我们的方法可以减少乘客的支付,并通过出租车共享增加出租车收入。
{"title":"Game Theory Based Recommendation Mechanism for Taxi-Sharing","authors":"Sheng-Tzong Cheng, Jian-Pan Li, G. Horng","doi":"10.1109/WAINA.2014.106","DOIUrl":"https://doi.org/10.1109/WAINA.2014.106","url":null,"abstract":"This paper presents a recommendation mechanism for taxi-sharing. The first aim of our model is to respectively recommend taxis and passengers for picking up passengers quickly and finding taxis easily. The second purpose is providing taxi-sharing service for passengers who want to save the payment. In our method, we analyze the historical Global Positioning System (GPS) trajectories generated by 10,357 taxis during 110 days and present the service region with time-dependent R-Tree. We formulate the problem of choosing the paths among the taxis in the same region by using non-cooperative game theory, and find out the solution of this game which is known as Nash equilibrium. The results show that our method can find taxis and passengers efficiently. In addition, applying our method can reduce the payment of passengers and increase the taxi revenue by taxi-sharing.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129309206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of a Mix Network Using Connectivity Index -- A Novel Privacy Enhancement Approach 基于连通性指数的混合网络设计——一种新的隐私增强方法
Rajan Ma, H. Rath, P. Balamuralidhar
Privacy Enhancing Techniques (PET) are key to the success in building the trust among the users of the digital world. Enhancing the communication privacy is getting attention nowadays. In this direction, anonymity schemes such as mix, mix networks, onion routing, crowds etc., have started in roads into the deployment at individual and community network levels. To measure the effectiveness and accuracy of such schemes, degree of anonymity is proposed as a privacy metric in literature. To measure the degree of anonymity, many empirical techniques are proposed. We observe that these techniques are computationally intensive and are infeasible for real-time requirements and thus may not be suitable to measure the degree of anonymity under the dynamic changes in the configuration of the network in real-time. In this direction, we propose a novel lightweight privacy metric to measure the degree of anonymity for mix, mix networks and their variants using graph theoretic approach based on Connectivity Index (CI). Further, we also extend this approach with Weighted Connectivity Index (WCI) and have demonstrated the usefulness of the metric through analytical analysis.
隐私增强技术(PET)是在数字世界的用户之间成功建立信任的关键。加强通信隐私是当今社会日益关注的问题。在这个方向上,混合、混合网络、洋葱路由、人群等匿名方案已经开始在个人和社区网络层面进行部署。为了衡量这些方案的有效性和准确性,文献中提出了匿名度作为隐私度量。为了衡量匿名程度,提出了许多经验技术。我们观察到,这些技术计算量大,对实时性要求不可行,因此可能不适合实时测量网络配置动态变化下的匿名程度。在这个方向上,我们提出了一种新的轻量级隐私度量,使用基于连通性指数(CI)的图论方法来衡量混合、混合网络及其变体的匿名程度。此外,我们还使用加权连通性指数(WCI)扩展了该方法,并通过分析分析证明了该度量的有用性。
{"title":"Design of a Mix Network Using Connectivity Index -- A Novel Privacy Enhancement Approach","authors":"Rajan Ma, H. Rath, P. Balamuralidhar","doi":"10.1109/WAINA.2014.86","DOIUrl":"https://doi.org/10.1109/WAINA.2014.86","url":null,"abstract":"Privacy Enhancing Techniques (PET) are key to the success in building the trust among the users of the digital world. Enhancing the communication privacy is getting attention nowadays. In this direction, anonymity schemes such as mix, mix networks, onion routing, crowds etc., have started in roads into the deployment at individual and community network levels. To measure the effectiveness and accuracy of such schemes, degree of anonymity is proposed as a privacy metric in literature. To measure the degree of anonymity, many empirical techniques are proposed. We observe that these techniques are computationally intensive and are infeasible for real-time requirements and thus may not be suitable to measure the degree of anonymity under the dynamic changes in the configuration of the network in real-time. In this direction, we propose a novel lightweight privacy metric to measure the degree of anonymity for mix, mix networks and their variants using graph theoretic approach based on Connectivity Index (CI). Further, we also extend this approach with Weighted Connectivity Index (WCI) and have demonstrated the usefulness of the metric through analytical analysis.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131307845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise Environments 调查企业环境中实时迁移对网络基础设施的影响
Jose Sinti, F. Jiffry, Mahdi Aiash
Live migration of virtual machines (VMs) enables the transfer of a running VM to a new hardware component with minimal and hardly noticeable interruption. It is an important feature of virtualization technology for maintenance, load-balancing and energy reduction, especially for data centers operators and cluster service providers. Recently, virtualization started to find its way into enterprise environments such as large and medium-sized IT companies. However, no feasibility study to highlight the pros and cons of such a trend has been conducted yet. In particular, a seamless live migration requires a reliable network connection and will have an impact on the network infrastructure. Therefore, this paper describes the design and set-up of our test bed to simulate a realistic implementation of virtualization in an enterprise environment. We tested three different scenarios of live migration and checked the impact of each scenario on the network infrastructure. Based on the implementation results, the paper introduces a list of recommendations for IT companies which might be interested in implementing virtualization and live migration.
虚拟机的实时迁移支持将正在运行的虚拟机迁移到新的硬件组件,并且几乎不会出现明显的中断。对于数据中心运营商和集群服务提供商来说,这是虚拟化技术在维护、负载均衡和节能方面的重要特性。最近,虚拟化开始进入大型和中型IT公司等企业环境。然而,目前还没有可行性研究来突出这一趋势的利弊。特别是,无缝的实时迁移需要可靠的网络连接,并且会对网络基础设施产生影响。因此,本文描述了我们的测试平台的设计和设置,以模拟企业环境中虚拟化的实际实现。我们测试了三种不同的实时迁移场景,并检查了每种场景对网络基础设施的影响。根据实现结果,本文为可能对实现虚拟化和实时迁移感兴趣的IT公司提供了一系列建议。
{"title":"Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise Environments","authors":"Jose Sinti, F. Jiffry, Mahdi Aiash","doi":"10.1109/WAINA.2014.34","DOIUrl":"https://doi.org/10.1109/WAINA.2014.34","url":null,"abstract":"Live migration of virtual machines (VMs) enables the transfer of a running VM to a new hardware component with minimal and hardly noticeable interruption. It is an important feature of virtualization technology for maintenance, load-balancing and energy reduction, especially for data centers operators and cluster service providers. Recently, virtualization started to find its way into enterprise environments such as large and medium-sized IT companies. However, no feasibility study to highlight the pros and cons of such a trend has been conducted yet. In particular, a seamless live migration requires a reliable network connection and will have an impact on the network infrastructure. Therefore, this paper describes the design and set-up of our test bed to simulate a realistic implementation of virtualization in an enterprise environment. We tested three different scenarios of live migration and checked the impact of each scenario on the network infrastructure. Based on the implementation results, the paper introduces a list of recommendations for IT companies which might be interested in implementing virtualization and live migration.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121366898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 28th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1