首页 > 最新文献

2014 28th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Seamless Handoff and Performance Anomaly Reduction Schemes Based on OpenFlow Access Points 基于OpenFlow接入点的无缝切换和性能异常降低方案
Won-Suk Kim, Sang-Hwa Chung, Chang-Woo Ahn, Mi-Rim Do
The enterprise WLANs that are composed of multiple access points (APs) and AP controller, provide wireless backbone networks in the building and campus. In this paper, we propose the Open Flow AP system that is a software-defined enterprise WLAN system based on the Open Flow-based AP and the Open Flow controller. Also, we propose the seamless handoff and performance anomaly reduction schemes based on the Open Flow AP system in order to improve total throughput of the networks while user experience is guaranteed. We deployed the Open Flow AP system in the lab building and performed several experiments to evaluate the efficiency of the proposed system and applications. When the proposed system is compared with the existing WLANs, it performs handoff seamlessly without reassociation and increases total throughput of the network by 26.7% when client is located in overlapped service area.
企业无线局域网由多个接入点(AP)和AP控制器组成,为楼宇和园区提供无线骨干网。本文提出了基于Open Flow的AP和Open Flow控制器的软件定义企业WLAN系统Open Flow AP系统。为了在保证用户体验的同时提高网络的总吞吐量,提出了基于Open Flow AP系统的无缝切换和性能异常降低方案。我们在实验室大楼中部署了Open Flow AP系统,并进行了几个实验来评估所提出的系统和应用程序的效率。与现有的无线局域网相比,当客户端位于重叠的业务区域时,该系统可以实现无重关联的无缝切换,使网络的总吞吐量提高26.7%。
{"title":"Seamless Handoff and Performance Anomaly Reduction Schemes Based on OpenFlow Access Points","authors":"Won-Suk Kim, Sang-Hwa Chung, Chang-Woo Ahn, Mi-Rim Do","doi":"10.1109/WAINA.2014.58","DOIUrl":"https://doi.org/10.1109/WAINA.2014.58","url":null,"abstract":"The enterprise WLANs that are composed of multiple access points (APs) and AP controller, provide wireless backbone networks in the building and campus. In this paper, we propose the Open Flow AP system that is a software-defined enterprise WLAN system based on the Open Flow-based AP and the Open Flow controller. Also, we propose the seamless handoff and performance anomaly reduction schemes based on the Open Flow AP system in order to improve total throughput of the networks while user experience is guaranteed. We deployed the Open Flow AP system in the lab building and performed several experiments to evaluate the efficiency of the proposed system and applications. When the proposed system is compared with the existing WLANs, it performs handoff seamlessly without reassociation and increases total throughput of the network by 26.7% when client is located in overlapped service area.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123485114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Tracking and Abnormal Behavior Detection in Video Surveillance Using Optical Flow and Neural Networks 基于光流和神经网络的视频监控跟踪与异常行为检测
Nida Rasheed, S. Khan, A. Khalid
An abnormal behavior detection algorithm for surveillance is required to correctly identify the targets as being in a normal or chaotic movement. A model is developed here for this purpose. The uniqueness of this algorithm is the use of foreground detection with Gaussian mixture (FGMM) model before passing the video frames to optical flow model using Lucas-Kanade approach. Information of horizontal and vertical displacements and directions associated with each pixel for object of interest is extracted. These features are then fed to feed forward neural network for classification and simulation. The study is being conducted on the real time videos and some synthesized videos. Accuracy of method has been calculated by using the performance parameters for Neural Networks. In comparison of plain optical flow with this model, improved results have been obtained without noise. Classes are correctly identified with an overall performance equal to 3.4e-02 with & error percentage of 2.5.
需要一种异常行为检测算法来正确识别目标是正常运动还是混沌运动。本文为此目的开发了一个模型。该算法的独特之处在于使用高斯混合(FGMM)模型进行前景检测,然后使用Lucas-Kanade方法将视频帧传递给光流模型。提取感兴趣对象的每个像素相关的水平和垂直位移和方向信息。然后将这些特征输入前馈神经网络进行分类和仿真。对实时视频和部分合成视频进行了研究。利用神经网络的性能参数对方法的精度进行了计算。将该模型与普通光流模型进行了比较,得到了无噪声的改进结果。正确识别类的总体性能等于3.4e-02,错误率为2.5。
{"title":"Tracking and Abnormal Behavior Detection in Video Surveillance Using Optical Flow and Neural Networks","authors":"Nida Rasheed, S. Khan, A. Khalid","doi":"10.1109/WAINA.2014.18","DOIUrl":"https://doi.org/10.1109/WAINA.2014.18","url":null,"abstract":"An abnormal behavior detection algorithm for surveillance is required to correctly identify the targets as being in a normal or chaotic movement. A model is developed here for this purpose. The uniqueness of this algorithm is the use of foreground detection with Gaussian mixture (FGMM) model before passing the video frames to optical flow model using Lucas-Kanade approach. Information of horizontal and vertical displacements and directions associated with each pixel for object of interest is extracted. These features are then fed to feed forward neural network for classification and simulation. The study is being conducted on the real time videos and some synthesized videos. Accuracy of method has been calculated by using the performance parameters for Neural Networks. In comparison of plain optical flow with this model, improved results have been obtained without noise. Classes are correctly identified with an overall performance equal to 3.4e-02 with & error percentage of 2.5.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Performance Analysis of a Non-preemptive Hybrid WSN Protocol in Mobile Environments 移动环境下非抢占式混合WSN协议性能分析
Israel Leyva Mayorga, M. E. Rivero-Angeles, Chadwick Carreto Arellano
Evolution in Wireless Sensor Networks (WSNs) has allowed new applications that led to an increase in the complexity of communication protocols. Specifically, mobile surveillance applications (where the network is set to monitor mobile objects) require the system to respond in a certain manner so adequate and reliable object tracking and status reporting takes place. Mobile objects can be either independent or controlled by the system, in the former, some sort of transmitter is attached to the mobile entity in order to perform status reporting duties, which, in the case of human beings or specimens may comprise the reporting of vital signs. In view of this, information obtained from mobile objects must be sent with minimal delay and with certain degree of reliability in order to achieve adequate emergency handling when required. Furthermore, mobile environments usually incorporate additional phenomena that creates a multi-event environment, increasing the rate of detection and transmission in the nodes, hence, delaying the report. Hybrid algorithms that allow sensor networks to perform continuous monitoring and event driven applications have proven their ability to enhance performance in different environments where emergency alarms are required while performing a permanent surveillance of the phenomena. Also, these protocols may consider priority assignment in order to reduce report delay and increase reliability in important packets, thus enhancing QoS parameters. In this work, the performance of a non-preemptive hybrid protocol for WSN is studied considering multi-event environments containing mobile targets. Results show that, by using different transmission probabilities, assigned to high and low priority data packets, mobile event reporting delay can be reduced despite the occurrence of other events within the network. As such, a better performance is obtained for critical-time applications where emergency handling is a must.
无线传感器网络(wsn)的发展使新的应用成为可能,从而增加了通信协议的复杂性。具体来说,移动监控应用程序(其中网络被设置为监控移动对象)要求系统以某种方式响应,以便进行充分和可靠的对象跟踪和状态报告。移动对象可以是独立的,也可以是由系统控制的,在前者中,某种发射器附着在移动实体上,以执行状态报告职责,在人类或标本的情况下,可能包括生命体征的报告。鉴于此,从移动物体获得的信息必须以最小的延迟和一定程度的可靠性发送,以便在需要时进行适当的紧急处理。此外,移动环境通常包含创建多事件环境的其他现象,从而增加节点中的检测和传输速率,从而延迟报告。混合算法允许传感器网络执行连续监测和事件驱动应用程序,已经证明它们能够在需要紧急警报的不同环境中提高性能,同时对现象进行永久监测。此外,这些协议可以考虑优先级分配,以减少报告延迟和提高重要数据包的可靠性,从而增强QoS参数。研究了包含移动目标的多事件环境下WSN非抢占混合协议的性能。结果表明,通过对高优先级和低优先级数据包分配不同的传输概率,可以在网络中发生其他事件的情况下降低移动事件报告延迟。因此,对于必须进行紧急处理的关键时刻应用程序,可以获得更好的性能。
{"title":"Performance Analysis of a Non-preemptive Hybrid WSN Protocol in Mobile Environments","authors":"Israel Leyva Mayorga, M. E. Rivero-Angeles, Chadwick Carreto Arellano","doi":"10.1109/WAINA.2014.83","DOIUrl":"https://doi.org/10.1109/WAINA.2014.83","url":null,"abstract":"Evolution in Wireless Sensor Networks (WSNs) has allowed new applications that led to an increase in the complexity of communication protocols. Specifically, mobile surveillance applications (where the network is set to monitor mobile objects) require the system to respond in a certain manner so adequate and reliable object tracking and status reporting takes place. Mobile objects can be either independent or controlled by the system, in the former, some sort of transmitter is attached to the mobile entity in order to perform status reporting duties, which, in the case of human beings or specimens may comprise the reporting of vital signs. In view of this, information obtained from mobile objects must be sent with minimal delay and with certain degree of reliability in order to achieve adequate emergency handling when required. Furthermore, mobile environments usually incorporate additional phenomena that creates a multi-event environment, increasing the rate of detection and transmission in the nodes, hence, delaying the report. Hybrid algorithms that allow sensor networks to perform continuous monitoring and event driven applications have proven their ability to enhance performance in different environments where emergency alarms are required while performing a permanent surveillance of the phenomena. Also, these protocols may consider priority assignment in order to reduce report delay and increase reliability in important packets, thus enhancing QoS parameters. In this work, the performance of a non-preemptive hybrid protocol for WSN is studied considering multi-event environments containing mobile targets. Results show that, by using different transmission probabilities, assigned to high and low priority data packets, mobile event reporting delay can be reduced despite the occurrence of other events within the network. As such, a better performance is obtained for critical-time applications where emergency handling is a must.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fast Efficient Fractional-Pixel Displacement for H.264/AVC Motion Compensation H.264/AVC运动补偿中快速有效的分数像素位移
Lung-Jen Wang, Chia-Tzu Shu
The fractional-pixel displacement has been proposed in the motion compensation prediction for the H.264/AVC algorithm. In this paper, a cubic convolution interpolation filter with four coefficients is presented to improve the coding efficiency of fractional-pixel displacement for H.264/AVC. Experimental results show that the proposed cubic convolution interpolation filter can be used to increase the fractional-pixel precisions and also obtain a superior performance for motion compensation.
在H.264/AVC算法的运动补偿预测中提出了分数像素位移。为了提高H.264/AVC中分数像素位移的编码效率,提出了一种四系数三次卷积插值滤波器。实验结果表明,所提出的三次卷积插值滤波器在提高分数像素精度的同时,具有良好的运动补偿性能。
{"title":"A Fast Efficient Fractional-Pixel Displacement for H.264/AVC Motion Compensation","authors":"Lung-Jen Wang, Chia-Tzu Shu","doi":"10.1109/WAINA.2014.13","DOIUrl":"https://doi.org/10.1109/WAINA.2014.13","url":null,"abstract":"The fractional-pixel displacement has been proposed in the motion compensation prediction for the H.264/AVC algorithm. In this paper, a cubic convolution interpolation filter with four coefficients is presented to improve the coding efficiency of fractional-pixel displacement for H.264/AVC. Experimental results show that the proposed cubic convolution interpolation filter can be used to increase the fractional-pixel precisions and also obtain a superior performance for motion compensation.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A 3DCG Distribution System with Personalized Ranking for Augmented Reality User Interface 面向增强现实用户界面的个性化排序3DCG分配系统
Hiroshi Honda, Kosuke Takano
In this paper, we present a 3DCG (three-dimensional computer graphics) distribution system for the augmented reality user interface (UI). Specifically, we create a platform for collecting and managing 3DCG content for the augmented reality UI. The platform mainly consists of local 3DCG distribution servers that are implemented as a Web service, a crawler that collects metadata of 3DCG content from local 3DCG servers, and a global 3DCG distribution system that manages the overall metadata of the 3DCG content collected from local 3DCG servers by the crawler. In addition, we present a method for personalizing additional information related to the user's selected 3DCG in the augmented reality UI based on the user's preferences and metadata-based classification. The feasibility of our system is experimentally evaluated and discussed using a 3DCG content database regarding plants and animals.
在本文中,我们提出了一个用于增强现实用户界面(UI)的3DCG(三维计算机图形)分布系统。具体来说,我们为增强现实UI创建了一个收集和管理3DCG内容的平台。该平台主要由本地3DCG分发服务器(以Web服务的形式实现)、从本地3DCG服务器收集3DCG内容元数据的爬虫和管理爬虫从本地3DCG服务器收集的3DCG内容的整体元数据的全局3DCG分发系统组成。此外,我们提出了一种基于用户偏好和基于元数据分类的增强现实UI中与用户选择的3DCG相关的个性化附加信息的方法。利用一个关于植物和动物的3DCG内容数据库对系统的可行性进行了实验评估和讨论。
{"title":"A 3DCG Distribution System with Personalized Ranking for Augmented Reality User Interface","authors":"Hiroshi Honda, Kosuke Takano","doi":"10.1109/WAINA.2014.42","DOIUrl":"https://doi.org/10.1109/WAINA.2014.42","url":null,"abstract":"In this paper, we present a 3DCG (three-dimensional computer graphics) distribution system for the augmented reality user interface (UI). Specifically, we create a platform for collecting and managing 3DCG content for the augmented reality UI. The platform mainly consists of local 3DCG distribution servers that are implemented as a Web service, a crawler that collects metadata of 3DCG content from local 3DCG servers, and a global 3DCG distribution system that manages the overall metadata of the 3DCG content collected from local 3DCG servers by the crawler. In addition, we present a method for personalizing additional information related to the user's selected 3DCG in the augmented reality UI based on the user's preferences and metadata-based classification. The feasibility of our system is experimentally evaluated and discussed using a 3DCG content database regarding plants and animals.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128876600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RD-TDMA: A Randomized Distributed TDMA Scheduling for Correlated Contention in WSNs RD-TDMA:一种针对无线传感器网络中相关争用的随机分布式TDMA调度方法
Ashutosh Bhatia, R. Hansdah
In wireless sensor networks (WSNs), contention occurs when two or more nodes in a proximity simultaneously try to access the channel. The contention causes collisions, which are very likely to occur when traffic is correlated. The excessive collision not only affects the reliability and the QoS of the application, but also the lifetime of the network. It is well known that random access mechanisms do not efficiently handle correlated-contention, and therefore, suffer from high collision rate. Most of the existing TDMA scheduling techniques try to find an optimal or a sub-optimal schedule. Usually, the situation of correlated-contention persists only for a short duration, and therefore, it is not worthwhile to take a long time to generate an optimal or a sub-optimal schedule. We propose a randomized distributed TDMA scheduling (RD-TDMA) algorithm to quickly generate a feasible schedule (not necessarily optimal) to handle correlated-contention in WSNs. In RD-TDMA, a node in the network negotiates a slot with its neighbors using the message exchange mechanism. The proposed protocol has been simulated using the Castalia simulator to evaluate its runtime performance. Simulation results show that the RD-TDMA algorithm considerably reduces the time required to schedule.
在无线传感器网络(wsn)中,当相邻的两个或多个节点同时试图访问信道时,就会发生争用。争用导致碰撞,当流量相关时很可能发生碰撞。过多的碰撞不仅会影响应用的可靠性和QoS,还会影响网络的生命周期。众所周知,随机访问机制不能有效地处理相关争用,因此存在较高的碰撞率。大多数现有的TDMA调度技术都试图找到一个最优或次最优调度。通常,相关争用的情况只会持续很短的时间,因此,不值得花很长时间来生成最优或次最优调度。提出了一种随机分布式TDMA调度(RD-TDMA)算法,以快速生成可行的调度(不一定是最优的)来处理无线传感器网络中的相关争用。在RD-TDMA中,网络中的节点使用消息交换机制与其邻居协商插槽。使用Castalia模拟器对所提出的协议进行了仿真,以评估其运行时性能。仿真结果表明,RD-TDMA算法大大缩短了调度时间。
{"title":"RD-TDMA: A Randomized Distributed TDMA Scheduling for Correlated Contention in WSNs","authors":"Ashutosh Bhatia, R. Hansdah","doi":"10.1109/WAINA.2014.65","DOIUrl":"https://doi.org/10.1109/WAINA.2014.65","url":null,"abstract":"In wireless sensor networks (WSNs), contention occurs when two or more nodes in a proximity simultaneously try to access the channel. The contention causes collisions, which are very likely to occur when traffic is correlated. The excessive collision not only affects the reliability and the QoS of the application, but also the lifetime of the network. It is well known that random access mechanisms do not efficiently handle correlated-contention, and therefore, suffer from high collision rate. Most of the existing TDMA scheduling techniques try to find an optimal or a sub-optimal schedule. Usually, the situation of correlated-contention persists only for a short duration, and therefore, it is not worthwhile to take a long time to generate an optimal or a sub-optimal schedule. We propose a randomized distributed TDMA scheduling (RD-TDMA) algorithm to quickly generate a feasible schedule (not necessarily optimal) to handle correlated-contention in WSNs. In RD-TDMA, a node in the network negotiates a slot with its neighbors using the message exchange mechanism. The proposed protocol has been simulated using the Castalia simulator to evaluate its runtime performance. Simulation results show that the RD-TDMA algorithm considerably reduces the time required to schedule.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130216066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Big Data Obstacle of Lifelogging 生活记录的大数据障碍
Chelsea Dobbins, M. Merabti, P. Fergus, D. Llewellyn-Jones
Living in the digital age has resulted in a data rich society where the ability to log every moment of our lives is now possible. This chronicle is known as a human digital memory and is a heterogeneous record of our lives, which grows alongside its human counterpart. Managing a lifetime of data results in these sets of big data growing to enormous proportions, as these records increase in size the problem of effectively managing them becomes more difficult. This paper explores the challenges of searching such big data sets of human digital memory data and posits a new approach that treats the searching of human digital memory data as a machine learning problem.
生活在数字时代导致了一个数据丰富的社会,在这个社会中,记录我们生活的每一刻的能力现在是可能的。这个编年史被称为人类的数字记忆,是我们生活的异质记录,它与人类的对口物一起成长。管理数据的生命周期导致这些大数据集增长到巨大的比例,随着这些记录的大小增加,有效管理它们的问题变得更加困难。本文探讨了搜索人类数字记忆数据的大数据集所面临的挑战,并提出了一种将人类数字记忆数据的搜索视为机器学习问题的新方法。
{"title":"The Big Data Obstacle of Lifelogging","authors":"Chelsea Dobbins, M. Merabti, P. Fergus, D. Llewellyn-Jones","doi":"10.1109/WAINA.2014.142","DOIUrl":"https://doi.org/10.1109/WAINA.2014.142","url":null,"abstract":"Living in the digital age has resulted in a data rich society where the ability to log every moment of our lives is now possible. This chronicle is known as a human digital memory and is a heterogeneous record of our lives, which grows alongside its human counterpart. Managing a lifetime of data results in these sets of big data growing to enormous proportions, as these records increase in size the problem of effectively managing them becomes more difficult. This paper explores the challenges of searching such big data sets of human digital memory data and posits a new approach that treats the searching of human digital memory data as a machine learning problem.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116349931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Building a Confident Advanced Email System Using a New Correspondence Model 使用新的通信模型建立一个自信的高级电子邮件系统
Laurent Cailleux, A. Bouabdallah, J. Bonnin
Due to its ease of use combined with its efficiency, traditional email service constitutes one of the main success story brought by the Internet. Its popularity hides however significant gaps. Professional email systems usually remedy such deficiencies by compiling a lot of sophisticated features in a single monolithic policy which should ideally take into account security requirements together with various other specific needs. The main drawback of these approaches lies in their inherent rigidity. They indeed grant no place for the concepts of usage and context which are fundamental for any modern communication service. The usage is determined by a user's intention of communication: private, professional, administrative, official, military. Context is clearly orthogonal to usage because a same usage may require different features depending of the context. We propose to define a correspondence model which for a given usage and context allows to dynamically derive a correspondence type encapsulating the exact set of required features. With this model, it becomes possible to define an advanced email system which may dynamically cope with multiple policies instead of a single monolithic one. By allowing a user to select the exact policy matching her needs, we argue that our approach reduces her risk-taking, providing in this way a confident advanced email system.
由于其易用性和效率,传统的电子邮件服务构成了互联网带来的主要成功故事之一。然而,它的受欢迎程度掩盖了巨大的差距。专业的电子邮件系统通常通过在一个单一的整体策略中编译许多复杂的功能来弥补这些缺陷,该策略应该在理想情况下考虑安全要求以及各种其他特定需求。这些方法的主要缺点在于其固有的刚性。它们确实没有给用法和上下文的概念留出位置,而用法和上下文是任何现代通信服务的基础。它的用法取决于使用者的交流意图:私人的、专业的、行政的、官方的、军事的。上下文显然与用法是正交的,因为相同的用法可能需要不同的特性,这取决于上下文。我们建议定义一个通信模型,对于给定的用法和上下文,它允许动态地派生一个封装所需特性的精确集合的通信类型。有了这个模型,就有可能定义一个高级的电子邮件系统,它可以动态地处理多个策略,而不是单一的单一策略。我们认为,通过允许用户选择与其需求完全匹配的保单,我们的方法降低了用户的风险,从而提供了一个自信的高级电子邮件系统。
{"title":"Building a Confident Advanced Email System Using a New Correspondence Model","authors":"Laurent Cailleux, A. Bouabdallah, J. Bonnin","doi":"10.1109/WAINA.2014.24","DOIUrl":"https://doi.org/10.1109/WAINA.2014.24","url":null,"abstract":"Due to its ease of use combined with its efficiency, traditional email service constitutes one of the main success story brought by the Internet. Its popularity hides however significant gaps. Professional email systems usually remedy such deficiencies by compiling a lot of sophisticated features in a single monolithic policy which should ideally take into account security requirements together with various other specific needs. The main drawback of these approaches lies in their inherent rigidity. They indeed grant no place for the concepts of usage and context which are fundamental for any modern communication service. The usage is determined by a user's intention of communication: private, professional, administrative, official, military. Context is clearly orthogonal to usage because a same usage may require different features depending of the context. We propose to define a correspondence model which for a given usage and context allows to dynamically derive a correspondence type encapsulating the exact set of required features. With this model, it becomes possible to define an advanced email system which may dynamically cope with multiple policies instead of a single monolithic one. By allowing a user to select the exact policy matching her needs, we argue that our approach reduces her risk-taking, providing in this way a confident advanced email system.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122013929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Distributed Monitoring Approach for Trust Assessment Based on Formal Testing 基于形式测试的分布式信任评估监控方法
Jorge López, Xiaoping Che, S. Maag, Gerardo Morales
Communications systems are growing in use and in popularity. While their interactions are becoming more numerous, trust those interactions now becomes a priority. In this paper, we focus on trust management systems based on observations of trustee behaviors. Based on a formal testing methodology, we propose a formal distributed network monitoring approach to analyze the packets exchanged between the trust or, trustee and other points of observation in order to prove the trustee is acting in a trustworthy manner. Based on formal "trust properties", the monitored systems behaviors provide a verdict of trust by analyzing and testing those properties. Finally, our methodology is applied to a real industrial DNS use case scenario.
通信系统的使用和普及程度都在增长。虽然他们之间的互动越来越多,但信任这些互动现在成为当务之急。本文基于对受托人行为的观察,重点研究信托管理系统。基于一种形式化测试方法,我们提出了一种形式化分布式网络监控方法来分析信任方、受信者和其他观察点之间交换的数据包,以证明受信者的行为是可信的。基于形式化的“信任属性”,被监控的系统行为通过对这些属性的分析和测试来提供信任判断。最后,我们的方法被应用到一个真实的工业DNS用例场景中。
{"title":"A Distributed Monitoring Approach for Trust Assessment Based on Formal Testing","authors":"Jorge López, Xiaoping Che, S. Maag, Gerardo Morales","doi":"10.1109/WAINA.2014.114","DOIUrl":"https://doi.org/10.1109/WAINA.2014.114","url":null,"abstract":"Communications systems are growing in use and in popularity. While their interactions are becoming more numerous, trust those interactions now becomes a priority. In this paper, we focus on trust management systems based on observations of trustee behaviors. Based on a formal testing methodology, we propose a formal distributed network monitoring approach to analyze the packets exchanged between the trust or, trustee and other points of observation in order to prove the trustee is acting in a trustworthy manner. Based on formal \"trust properties\", the monitored systems behaviors provide a verdict of trust by analyzing and testing those properties. Finally, our methodology is applied to a real industrial DNS use case scenario.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling User Interactions in Social Communication Networks with Variable Social Vector Clocks 用可变社会矢量时钟建模社会通信网络中的用户交互
T. Hsu, A. Kshemkalyani, Min Shen
Social communication networks have been widely investigated in recent years. From fine-grained temporal information's point of view, social vector clock (SVC) is a useful mechanism to track the most recent communication with all other local peers in a social network. A modification of conventional social vector clocks has been proposed to deal with the issue of poor scalability without keeping whole temporal views [1]. In this paper, we propose an idea of variable social vector clocks (VSVCs) and the corresponding incremental algorithm. Not only does it maintain the lower bound of how out-of-date each peer can be with respect to others, but it also considers the shortest friendship separation to restrict how far information may be transmitted along time respecting paths. Unless this separation is bounded to be infinite, some communication messages could be lost implicitly. We also focus on studying message inconsistency and reachable in-degree communication distribution in several social networks based on variable social vector clocks.
近年来,社会传播网络得到了广泛的研究。从细粒度时间信息的角度来看,社会矢量时钟(social vector clock, SVC)是一种有用的机制,可以跟踪与社交网络中所有其他本地节点的最新通信。已经提出了一种对传统社会矢量时钟的修改,以解决在不保持整个时间视图的情况下可扩展性差的问题[1]。本文提出了一种可变社会矢量时钟(VSVCs)的思想和相应的增量算法。它不仅保持了每个节点相对于其他节点的过时程度的下限,而且还考虑了最短的友谊分离,以限制信息沿时间尊重路径传输的距离。除非这种分离被限定为无限,否则一些通信消息可能会隐式丢失。我们还重点研究了基于可变社交矢量时钟的不同社交网络中的消息不一致性和可达度通信分布。
{"title":"Modeling User Interactions in Social Communication Networks with Variable Social Vector Clocks","authors":"T. Hsu, A. Kshemkalyani, Min Shen","doi":"10.1109/WAINA.2014.29","DOIUrl":"https://doi.org/10.1109/WAINA.2014.29","url":null,"abstract":"Social communication networks have been widely investigated in recent years. From fine-grained temporal information's point of view, social vector clock (SVC) is a useful mechanism to track the most recent communication with all other local peers in a social network. A modification of conventional social vector clocks has been proposed to deal with the issue of poor scalability without keeping whole temporal views [1]. In this paper, we propose an idea of variable social vector clocks (VSVCs) and the corresponding incremental algorithm. Not only does it maintain the lower bound of how out-of-date each peer can be with respect to others, but it also considers the shortest friendship separation to restrict how far information may be transmitted along time respecting paths. Unless this separation is bounded to be infinite, some communication messages could be lost implicitly. We also focus on studying message inconsistency and reachable in-degree communication distribution in several social networks based on variable social vector clocks.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124136102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2014 28th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1