首页 > 最新文献

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
A Hybrid Anti-Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory Consumption 一种提高吞吐量和降低内存消耗的RFID混合防碰撞算法
Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu
In order to solve the transponder collision problem in a RFID system, this paper proposes a hybrid algorithm which combines strengths of existing high-performance algorithms while avoiding their major drawbacks. Experiments show this hybrid algorithm uses fewer time slots and less total communication time compared to adaptive slot-count algorithm based on ALOHA as well as enhanced anti-collision algorithm based on binary tree, both of which are superior and well accepted algorithms in literature. Meanwhile, high computational intensity of adaptive slot-count algorithm is significantly relieved, and memory consumption of enhanced anti-collision algorithm is reduced to a negligible level. Results from simulations under large number of transponders and long transponder IDs, which is the case in real RFID applications, suggest the advantage of this hybrid algorithm is prominent.
为了解决RFID系统中的应答器碰撞问题,本文提出了一种混合算法,它结合了现有高性能算法的优点,同时避免了它们的主要缺点。实验表明,与基于ALOHA的自适应时隙计数算法和基于二叉树的增强抗碰撞算法相比,该混合算法使用的时隙更少,总通信时间更短,这两种算法都是文献中较好的算法。同时,显著缓解了自适应槽数算法的高计算强度,将增强的防碰撞算法的内存消耗降低到可以忽略不计的水平。在大量应答器和长应答器id下的仿真结果表明,这种混合算法的优势是突出的,这是实际RFID应用中的情况。
{"title":"A Hybrid Anti-Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory Consumption","authors":"Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu","doi":"10.1109/EUC.2008.103","DOIUrl":"https://doi.org/10.1109/EUC.2008.103","url":null,"abstract":"In order to solve the transponder collision problem in a RFID system, this paper proposes a hybrid algorithm which combines strengths of existing high-performance algorithms while avoiding their major drawbacks. Experiments show this hybrid algorithm uses fewer time slots and less total communication time compared to adaptive slot-count algorithm based on ALOHA as well as enhanced anti-collision algorithm based on binary tree, both of which are superior and well accepted algorithms in literature. Meanwhile, high computational intensity of adaptive slot-count algorithm is significantly relieved, and memory consumption of enhanced anti-collision algorithm is reduced to a negligible level. Results from simulations under large number of transponders and long transponder IDs, which is the case in real RFID applications, suggest the advantage of this hybrid algorithm is prominent.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114832629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SARC: A Street-Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment 城市环境下基于街道的匿名车辆自组织路由协议
Hyuncheol Kim, Jungha Paik, Bumhan Lee, Dong Hoon Lee
Position based routing protocols have been a great deal of attention in vehicular ad hoc networks. The routing protocols are very efficient in high mobility ad hoc network since the path to a destination can be proactively determined by location information of neighbor and destination nodes. However, this causes the leakage of the private information of drivers, such as a vehicle identifier or location information of a vehicle. Hence, providing privacy of a user should be considered in the protocol. In this paper, we design a novel routing protocol, called SARC, which provides efficient path discovery and privacy protection in route discovery and data forwarding phase. To achieve this goal we present a street-based path calculation algorithm for route discovery, and define and analyze the identity, location, and route anonymity in our protocol.
基于位置的路由协议在车载自组织网络中受到了广泛的关注。由于路由协议可以根据邻居和目的节点的位置信息主动确定到目的地的路径,因此在高移动性的自组织网络中非常有效。但是,这会导致车辆识别码或车辆位置信息等驾驶员的个人信息泄露。因此,在协议中应该考虑提供用户的隐私。本文设计了一种新的路由协议SARC,该协议在路由发现和数据转发阶段提供了有效的路径发现和隐私保护。为了实现这一目标,我们提出了一种基于街道的路径计算算法用于路由发现,并定义和分析了我们协议中的身份,位置和路由匿名性。
{"title":"SARC: A Street-Based Anonymous Vehicular Ad Hoc Routing Protocol for City Environment","authors":"Hyuncheol Kim, Jungha Paik, Bumhan Lee, Dong Hoon Lee","doi":"10.1109/EUC.2008.97","DOIUrl":"https://doi.org/10.1109/EUC.2008.97","url":null,"abstract":"Position based routing protocols have been a great deal of attention in vehicular ad hoc networks. The routing protocols are very efficient in high mobility ad hoc network since the path to a destination can be proactively determined by location information of neighbor and destination nodes. However, this causes the leakage of the private information of drivers, such as a vehicle identifier or location information of a vehicle. Hence, providing privacy of a user should be considered in the protocol. In this paper, we design a novel routing protocol, called SARC, which provides efficient path discovery and privacy protection in route discovery and data forwarding phase. To achieve this goal we present a street-based path calculation algorithm for route discovery, and define and analyze the identity, location, and route anonymity in our protocol.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127140854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Provably Secure Trusted Access Protocol for WLAN Mesh Networks 无线局域网网状网络的可证明安全可信访问协议
Zhuo Ma, Jianfeng Ma, Yulong Shen
Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy decision point within 4 protocol rounds. Meanwhile, the protocol can realize the platform authentication and platform integrity verification in the first round of protocol interaction, which will improve the efficiency of the protocol and decrease the overhead of the server. We use a provably secure model, named the universally composable secure model, to analyze the security of the protocol. And we use of compare analysis to discover the performance advantages of the protocol. The results show that: the protocol is a UC-secure protocol, and the performance has great advantages over the current protocols.
现有的WLAN Mesh网络接入协议和可信网络连接协议不能满足可信环境下WLAN Mesh网络的性能和安全要求。提出了一种可证明安全的WLAN Mesh网络可信访问协议MN-TAP。该协议将在4轮协议中实现访问请求者、策略实施点和策略决策点之间的身份验证和密钥确认。同时,该协议可以在第一轮协议交互中实现平台认证和平台完整性验证,从而提高协议的效率,降低服务器的开销。我们使用一个可证明的安全模型——通用可组合安全模型来分析协议的安全性。并通过对比分析来发现协议的性能优势。结果表明:该协议是一种uc安全协议,在性能上比现有协议有很大的优势。
{"title":"Provably Secure Trusted Access Protocol for WLAN Mesh Networks","authors":"Zhuo Ma, Jianfeng Ma, Yulong Shen","doi":"10.1109/EUC.2008.144","DOIUrl":"https://doi.org/10.1109/EUC.2008.144","url":null,"abstract":"Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy decision point within 4 protocol rounds. Meanwhile, the protocol can realize the platform authentication and platform integrity verification in the first round of protocol interaction, which will improve the efficiency of the protocol and decrease the overhead of the server. We use a provably secure model, named the universally composable secure model, to analyze the security of the protocol. And we use of compare analysis to discover the performance advantages of the protocol. The results show that: the protocol is a UC-secure protocol, and the performance has great advantages over the current protocols.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Discovering the Most Trusted Agents without Central Control 在没有中央控制的情况下发现最可信的代理
Tomasz Kaszuba, K. Rządca, A. Wierzbicki
The ability to determine the trust of an agent relative to other agents can be useful for applications that require to select a subset of trusted agents. However, in an open, distributed system, it is difficult to realize this functionality. Selecting agents on the basis of trust can be seen as an extension of the usual Trust Management service. In this paper, we propose a fully distributed method for selection of the most trusted agents. We investigate the sensitivity of this method to adversaries and propose improvements to its security. The performance of the method and the quality of the selection is studied in detail.
对于需要选择受信任代理子集的应用程序,确定代理相对于其他代理的信任程度的能力非常有用。然而,在一个开放的分布式系统中,很难实现这个功能。基于信任选择代理可以看作是通常的信任管理服务的扩展。在本文中,我们提出了一种选择最可信代理的完全分布式方法。我们研究了这种方法对对手的敏感性,并提出了改进其安全性的建议。对该方法的性能和选择质量进行了详细的研究。
{"title":"Discovering the Most Trusted Agents without Central Control","authors":"Tomasz Kaszuba, K. Rządca, A. Wierzbicki","doi":"10.1109/EUC.2008.126","DOIUrl":"https://doi.org/10.1109/EUC.2008.126","url":null,"abstract":"The ability to determine the trust of an agent relative to other agents can be useful for applications that require to select a subset of trusted agents. However, in an open, distributed system, it is difficult to realize this functionality. Selecting agents on the basis of trust can be seen as an extension of the usual Trust Management service. In this paper, we propose a fully distributed method for selection of the most trusted agents. We investigate the sensitivity of this method to adversaries and propose improvements to its security. The performance of the method and the quality of the selection is studied in detail.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UCaS: A Schedulability Analysis Tool for AADL Models UCaS: AADL模型的可调度性分析工具
Shenglin Gui, Lei Luo, Qian Liu, Fulei Guo, Shaopeng Lu
There is more and more the ubiquitous use of different types of real-time embedded (RTE) systems in our daily lives with rapid developments in science and technology. Because design faults might result in injury or even death to human beings who are using these systems, how to ensure the RTE systems are really safe is very important. The schedulability problem is a very important problem needs to be guaranteed in real-time software. In this paper, based on the Architecture Analysis and Design Language (AADL), we present Hybrid Automaton with Relative Time Constraints (HARTC) and Arrival Time Automaton (ATA) to abstract the semantics and external environment of each thread component in AADL respectively. Thus, we translate the schedulability problem in the system modeled by AADL into the reachability problem of locations in the product of HARTCs and ATAs. Then, we study the condition under which the reachability of HARTC is decidable. Under this condition, we develop a schedulability analysis tool called UCaS as a plug-in which can be integrated in the open source tool OSATE. We illustrate the schedulability analysis and simulation result provided by UCaS through an example. Finally, we give future directions need to be solved and our conclusion.
随着科学技术的飞速发展,各种类型的实时嵌入式系统越来越多地应用于我们的日常生活中。由于设计缺陷可能导致使用这些系统的人受伤甚至死亡,因此如何确保RTE系统的真正安全是非常重要的。可调度性问题是实时软件需要保证的一个非常重要的问题。本文在体系结构分析与设计语言(AADL)的基础上,提出了具有相对时间约束的混合自动机(HARTC)和到达时间自动机(ATA),分别对AADL中各线程组件的语义和外部环境进行抽象。因此,我们将AADL建模系统中的可调度性问题转化为HARTCs和ATAs产物中位置的可达性问题。然后,研究了HARTC可达性可判定的条件。在这种情况下,我们开发了一个可调度性分析工具UCaS作为一个插件,可以集成到开源工具OSATE中。通过实例说明UCaS提供的可调度性分析和仿真结果。最后给出了未来需要解决的方向和我们的结论。
{"title":"UCaS: A Schedulability Analysis Tool for AADL Models","authors":"Shenglin Gui, Lei Luo, Qian Liu, Fulei Guo, Shaopeng Lu","doi":"10.1109/EUC.2008.115","DOIUrl":"https://doi.org/10.1109/EUC.2008.115","url":null,"abstract":"There is more and more the ubiquitous use of different types of real-time embedded (RTE) systems in our daily lives with rapid developments in science and technology. Because design faults might result in injury or even death to human beings who are using these systems, how to ensure the RTE systems are really safe is very important. The schedulability problem is a very important problem needs to be guaranteed in real-time software. In this paper, based on the Architecture Analysis and Design Language (AADL), we present Hybrid Automaton with Relative Time Constraints (HARTC) and Arrival Time Automaton (ATA) to abstract the semantics and external environment of each thread component in AADL respectively. Thus, we translate the schedulability problem in the system modeled by AADL into the reachability problem of locations in the product of HARTCs and ATAs. Then, we study the condition under which the reachability of HARTC is decidable. Under this condition, we develop a schedulability analysis tool called UCaS as a plug-in which can be integrated in the open source tool OSATE. We illustrate the schedulability analysis and simulation result provided by UCaS through an example. Finally, we give future directions need to be solved and our conclusion.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121936645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using Context Quality Indicators for Improving Context-Based Access Control in Pervasive Environments 使用上下文质量指标改进普适环境中基于上下文的访问控制
José Bringel Filho, H. Martin
In pervasive computing environments (PCE), context information can have a strong impact on application adaptation, not only at application logic level but also security management level. From a access control perspective, it is required that the access control models take into account context information such as location and time, in determining whether access should be allowed or not. As context information represents real-world situations, it is associated with certain quality indicators that can influence directly in the access control decisions. In this paper, we showed the use of context information and its quality indicators to grant and to adapt access permissions to resources in the PCE.
在普适计算环境(PCE)中,上下文信息不仅在应用程序逻辑层,而且在安全管理层对应用程序的适应性有很大的影响。从访问控制的角度来看,在决定是否允许访问时,访问控制模型需要考虑诸如位置和时间之类的上下文信息。由于上下文信息表示现实世界的情况,因此它与某些质量指标相关联,这些指标可以直接影响访问控制决策。在本文中,我们展示了如何使用上下文信息及其质量指标来授予和调整PCE中资源的访问权限。
{"title":"Using Context Quality Indicators for Improving Context-Based Access Control in Pervasive Environments","authors":"José Bringel Filho, H. Martin","doi":"10.1109/EUC.2008.171","DOIUrl":"https://doi.org/10.1109/EUC.2008.171","url":null,"abstract":"In pervasive computing environments (PCE), context information can have a strong impact on application adaptation, not only at application logic level but also security management level. From a access control perspective, it is required that the access control models take into account context information such as location and time, in determining whether access should be allowed or not. As context information represents real-world situations, it is associated with certain quality indicators that can influence directly in the access control decisions. In this paper, we showed the use of context information and its quality indicators to grant and to adapt access permissions to resources in the PCE.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122186364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication Framework ALHACF:一个匿名级选择分层匿名通信框架
Xin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang
With the more emphasis paid on network security and privacy, the research on anonymous communication system has developed quickly. In the past, researchers mainly focused on how to improve the anonymity, but few focused on the usability. This paper presents an anonymity-level selected hierarchical anonymous communication framework (ALHACF). In this framework, firstly the anonymity-level is selected by users according to his requirement, and then the path length and set of relay routers will be determined by the anonymity-level. The anonymity and communication performance of ALHACF are analyzed. The analysis indicates that ALHACF inherits the merit of HLLACF, and it can prevent some kinds of attack, keep good anonymity and increase the communication performance markedly.
随着人们对网络安全和隐私的日益重视,匿名通信系统的研究得到了迅速发展。过去的研究主要集中在如何提高匿名性,而很少关注可用性。提出了一种匿名级选择分层匿名通信框架(ALHACF)。在该框架中,首先由用户根据自己的需求选择匿名级别,然后由匿名级别决定路径长度和中继路由器的设置。分析了ALHACF的匿名性和通信性能。分析表明,ALHACF继承了HLLACF的优点,能够有效地防止各种攻击,保持良好的匿名性,显著提高通信性能。
{"title":"ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication Framework","authors":"Xin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang","doi":"10.1109/EUC.2008.132","DOIUrl":"https://doi.org/10.1109/EUC.2008.132","url":null,"abstract":"With the more emphasis paid on network security and privacy, the research on anonymous communication system has developed quickly. In the past, researchers mainly focused on how to improve the anonymity, but few focused on the usability. This paper presents an anonymity-level selected hierarchical anonymous communication framework (ALHACF). In this framework, firstly the anonymity-level is selected by users according to his requirement, and then the path length and set of relay routers will be determined by the anonymity-level. The anonymity and communication performance of ALHACF are analyzed. The analysis indicates that ALHACF inherits the merit of HLLACF, and it can prevent some kinds of attack, keep good anonymity and increase the communication performance markedly.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123229972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CayleyChord: A Novel P2P Overlay Network CayleyChord:一种新颖的P2P覆盖网络
W. Xiao, Mingxin He, Wenhong Wei
Almost all recent researches on P2P system focus on how to build a highly usable P2P overlay network. Small routing table, short query path and robustness are included into their design objectives of overlay topology. In this paper, we define a new Cayley graph and propose a novel P2P overlay network CayleyChord based on it. The new overlay network has many excellent properties such as small routing table and short query path and high clustering and robustness. Our system has simpler routing (searching) and many other excellent properties than the most former systems such as Chord and Ulysses because of its symmetry. The performance is evaluated in this paper, indicating that CayleyChord can reach low routing table size and query path length. Furthermore, the robustness of CayleyChord based on the new Cayley graph model is also better than most the P2P overlay networks recently proposed.
目前关于P2P系统的研究几乎都集中在如何构建一个高可用性的P2P覆盖网络上。覆盖拓扑的设计目标包括路由表小、查询路径短和鲁棒性。本文定义了一种新的Cayley图,并在此基础上提出了一种新的P2P覆盖网络CayleyChord。该网络具有路由表小、查询路径短、聚类和鲁棒性强等优点。由于其对称性,我们的系统比Chord和Ulysses等大多数以前的系统具有更简单的路由(搜索)和许多其他优秀的特性。本文对性能进行了评价,表明CayleyChord可以达到较低的路由表大小和查询路径长度。此外,基于新的cayleygraph模型的CayleyChord的鲁棒性也优于目前提出的大多数P2P覆盖网络。
{"title":"CayleyChord: A Novel P2P Overlay Network","authors":"W. Xiao, Mingxin He, Wenhong Wei","doi":"10.1109/EUC.2008.141","DOIUrl":"https://doi.org/10.1109/EUC.2008.141","url":null,"abstract":"Almost all recent researches on P2P system focus on how to build a highly usable P2P overlay network. Small routing table, short query path and robustness are included into their design objectives of overlay topology. In this paper, we define a new Cayley graph and propose a novel P2P overlay network CayleyChord based on it. The new overlay network has many excellent properties such as small routing table and short query path and high clustering and robustness. Our system has simpler routing (searching) and many other excellent properties than the most former systems such as Chord and Ulysses because of its symmetry. The performance is evaluated in this paper, indicating that CayleyChord can reach low routing table size and query path length. Furthermore, the robustness of CayleyChord based on the new Cayley graph model is also better than most the P2P overlay networks recently proposed.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Reasonable Approach for Defining Load Index in Parallel Computing 一种确定并行计算中负载指标的合理方法
Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng
Load balancing plays a key role in workload scheduling policies which count in the performance improvement of parallel applications. A critical problem of load balancing is to make a reasonable definition of load index. Unfortunately, few studies provided enough scientific justifications for the choice of load indices. In this paper, a reasonable approach for defining a load index based on factor analysis theory is introduced, which is helpful to reasonable designs of workload scheduling algorithms. An example testing on an accounting log of the CM-5 parallel machine is presented to show the usage of this method.
负载平衡在工作负载调度策略中起着关键作用,这对并行应用程序的性能提高至关重要。负载均衡的一个关键问题是合理定义负载指标。遗憾的是,很少有研究为荷载指标的选择提供足够的科学依据。本文介绍了一种基于因子分析理论的负荷指标的合理定义方法,这有助于负荷调度算法的合理设计。最后以CM-5并行机的会计日志为例,说明了该方法的应用。
{"title":"A Reasonable Approach for Defining Load Index in Parallel Computing","authors":"Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng","doi":"10.1109/EUC.2008.83","DOIUrl":"https://doi.org/10.1109/EUC.2008.83","url":null,"abstract":"Load balancing plays a key role in workload scheduling policies which count in the performance improvement of parallel applications. A critical problem of load balancing is to make a reasonable definition of load index. Unfortunately, few studies provided enough scientific justifications for the choice of load indices. In this paper, a reasonable approach for defining a load index based on factor analysis theory is introduced, which is helpful to reasonable designs of workload scheduling algorithms. An example testing on an accounting log of the CM-5 parallel machine is presented to show the usage of this method.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131712897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Key Management Scheme for WEP 改进的WEP密钥管理方案
Zhang Long-jun, Zou Tao
Wireless local area network (WLAN) standards use the wired equivalent privacy (WEP) protocol to secure wireless communication standards. WEP uses RC4 stream cipher encrypt technique. But due to the leaks of the protocol, attackers may easily wiretap and attack the network. In recent years, the experts have proposed many schemes to mend the leak of WLAN security. A powerful key management solution is a comparatively efficient method. The enhancement of security of WLAN key management scheme may improve the security of the whole WLAN system. Moreover, under the current IEEE802.11 family standard, this scheme is more practical and effective.
无线局域网(WLAN)标准使用有线等效隐私(WEP)协议来保护无线通信标准。WEP采用RC4流密码加密技术。但是由于协议的泄露,攻击者很容易窃听和攻击网络。近年来,专家们提出了许多解决无线局域网安全漏洞的方案。强大的密钥管理解决方案是一种相对有效的方法。提高无线局域网密钥管理方案的安全性可以提高整个无线局域网系统的安全性。而且,在现行的IEEE802.11家族标准下,该方案更加实用和有效。
{"title":"An Improved Key Management Scheme for WEP","authors":"Zhang Long-jun, Zou Tao","doi":"10.1109/EUC.2008.67","DOIUrl":"https://doi.org/10.1109/EUC.2008.67","url":null,"abstract":"Wireless local area network (WLAN) standards use the wired equivalent privacy (WEP) protocol to secure wireless communication standards. WEP uses RC4 stream cipher encrypt technique. But due to the leaks of the protocol, attackers may easily wiretap and attack the network. In recent years, the experts have proposed many schemes to mend the leak of WLAN security. A powerful key management solution is a comparatively efficient method. The enhancement of security of WLAN key management scheme may improve the security of the whole WLAN system. Moreover, under the current IEEE802.11 family standard, this scheme is more practical and effective.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115112134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1