首页 > 最新文献

Ipsj Digital Courier最新文献

英文 中文
Flexible Interface Mapping for System Cooperation and Its Evaluation 面向系统协作的柔性接口映射及其评价
Pub Date : 2007-09-15 DOI: 10.2197/IPSJDC.3.661
M. Nakatsuji, Y. Miyoshi, Y. Otsuka, Hirano Miki
We model the relationships between the message formats of a business system and their semantics in a machine-processable knowledge base. We describe a message-mapping technique that extracts the relationships between the message formats of several systems semiautomatically by using the class characteristics of the semantics and stores these relationships as past system design knowledge. In addition, we propose process-mapping, which is a technique that discovers suitable software components for system cooperation. We evaluate these methods using the interface specifications of actual service management systems and show that the frequency of interface adjustment can be reduced.
我们在一个机器可处理的知识库中对业务系统的消息格式及其语义之间的关系进行建模。我们描述了一种消息映射技术,该技术利用语义的类特征半自动地提取多个系统的消息格式之间的关系,并将这些关系存储为过去的系统设计知识。此外,我们提出了过程映射,这是一种发现适合系统合作的软件组件的技术。我们使用实际业务管理系统的接口规范来评估这些方法,并表明接口调整的频率可以减少。
{"title":"Flexible Interface Mapping for System Cooperation and Its Evaluation","authors":"M. Nakatsuji, Y. Miyoshi, Y. Otsuka, Hirano Miki","doi":"10.2197/IPSJDC.3.661","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.661","url":null,"abstract":"We model the relationships between the message formats of a business system and their semantics in a machine-processable knowledge base. We describe a message-mapping technique that extracts the relationships between the message formats of several systems semiautomatically by using the class characteristics of the semantics and stores these relationships as past system design knowledge. In addition, we propose process-mapping, which is a technique that discovers suitable software components for system cooperation. We evaluate these methods using the interface specifications of actual service management systems and show that the frequency of interface adjustment can be reduced.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130628918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Properties of Evaluation Metrics for Finding One Highly Relevant Document 高度相关文献检索评价指标的性质研究
Pub Date : 2007-09-15 DOI: 10.2197/IPSJDC.3.643
T. Sakai
Traditional information retrieval evaluation relies on both precision and recall. However, modern search environments such as the Web, in which recall is either unimportant or immeasurable, require precision-oriented evaluation. In particular, finding one highly relevant document is very important for practical tasks such as known-item search and suspected-item search. This paper compares the properties of five evaluation metrics that are applicable to the task of finding one highly relevant document in terms of the underlying assumptions, how the system rankings produced resemble each other, and discriminative power. We employ two existing methods for comparing the discriminative power of these metrics: The Swap Method proposed by Voorhees and Buckley at ACM SIGIR 2002, and the Bootstrap Sensitivity Method proposed by Sakai at SIGIR 2006. We use four data sets from NTCIR to show that, while P(+)-measure, O-measure and NWRR (Normalised Weighted Reciprocal Rank)are reasonably highly correlated to one another, P(+)-measure and O-measure are more discriminative than NWRR, which in turn is more discriminative than Reciprocal Rank. We therefore conclude that P(+)-measure and O-measure, each modelling a different user behaviour, are the most useful evaluation metrics for the task of finding one highly relevant document.
传统的信息检索评价既依赖于准确率,又依赖于召回率。然而,像Web这样的现代搜索环境中,召回率要么不重要,要么无法测量,因此需要以精确度为导向的评估。特别是,查找高度相关的文档对于诸如已知项搜索和可疑项搜索等实际任务非常重要。本文比较了五个评估指标的属性,这些指标适用于寻找一个高度相关的文件的任务,包括潜在的假设,系统排名如何产生彼此相似,以及判别能力。我们采用了两种现有的方法来比较这些指标的判别能力:Voorhees和Buckley在ACM SIGIR 2002上提出的Swap方法,以及Sakai在SIGIR 2006上提出的Bootstrap灵敏度方法。我们使用来自NTCIR的四个数据集来表明,虽然P(+)-测度、o -测度和NWRR(归一化加权倒数秩)彼此之间具有相当高的相关性,但P(+)-测度和o -测度比NWRR更具判别性,而NWRR又比倒数秩更具判别性。因此,我们得出结论,P(+)-度量和o -度量(每个度量都模拟不同的用户行为)是寻找高度相关文档的任务中最有用的评估度量。
{"title":"On the Properties of Evaluation Metrics for Finding One Highly Relevant Document","authors":"T. Sakai","doi":"10.2197/IPSJDC.3.643","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.643","url":null,"abstract":"Traditional information retrieval evaluation relies on both precision and recall. However, modern search environments such as the Web, in which recall is either unimportant or immeasurable, require precision-oriented evaluation. In particular, finding one highly relevant document is very important for practical tasks such as known-item search and suspected-item search. This paper compares the properties of five evaluation metrics that are applicable to the task of finding one highly relevant document in terms of the underlying assumptions, how the system rankings produced resemble each other, and discriminative power. We employ two existing methods for comparing the discriminative power of these metrics: The Swap Method proposed by Voorhees and Buckley at ACM SIGIR 2002, and the Bootstrap Sensitivity Method proposed by Sakai at SIGIR 2006. We use four data sets from NTCIR to show that, while P(+)-measure, O-measure and NWRR (Normalised Weighted Reciprocal Rank)are reasonably highly correlated to one another, P(+)-measure and O-measure are more discriminative than NWRR, which in turn is more discriminative than Reciprocal Rank. We therefore conclude that P(+)-measure and O-measure, each modelling a different user behaviour, are the most useful evaluation metrics for the task of finding one highly relevant document.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114065444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On Content Distribution Model and Analyzing Distribution Effectiveness 内容分发模式与分发效果分析
Pub Date : 2007-08-15 DOI: 10.2197/IPSJDC.3.492
Pao Sriprasertsuk, A. Seki, W. Kameyama
Almost all traditional methods of advertisement distribution have been concerned only with primary information distribution via certain kinds of media. However, the rapid growth of the Internet and interactive media have demonstrated the power and efficiency of secondary information distribution of information by consumers such as words of mouth and free-mail. However, an advertisement distribution model which can be used to analyze and measure the effectiveness of such secondary distribution has never been discussed. Therefore, in this paper, we propose an advertisement distribution model and show how to use the model to analyze both primary and secondary information distributions. Our experiment and analytical results are also discussed. The experimental result shows that the proposed model can be used to measure and analyze the effectiveness of advertisement distribution.
几乎所有传统的广告传播方法都只关注通过某种媒介传播主要信息。然而,互联网和互动媒体的快速发展已经证明了消费者通过口口相传和免费电子邮件等渠道传播信息的力量和效率。然而,一个可以用来分析和衡量这种二次分销效果的广告分销模型却从未被讨论过。因此,在本文中,我们提出了一个广告分布模型,并展示了如何使用该模型来分析主要和次要信息的分布。并对实验结果和分析结果进行了讨论。实验结果表明,该模型可用于广告投放效果的度量和分析。
{"title":"On Content Distribution Model and Analyzing Distribution Effectiveness","authors":"Pao Sriprasertsuk, A. Seki, W. Kameyama","doi":"10.2197/IPSJDC.3.492","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.492","url":null,"abstract":"Almost all traditional methods of advertisement distribution have been concerned only with primary information distribution via certain kinds of media. However, the rapid growth of the Internet and interactive media have demonstrated the power and efficiency of secondary information distribution of information by consumers such as words of mouth and free-mail. However, an advertisement distribution model which can be used to analyze and measure the effectiveness of such secondary distribution has never been discussed. Therefore, in this paper, we propose an advertisement distribution model and show how to use the model to analyze both primary and secondary information distributions. Our experiment and analytical results are also discussed. The experimental result shows that the proposed model can be used to measure and analyze the effectiveness of advertisement distribution.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117193506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Low-stretch Object Migration Scheme for Wide-area Environments 一种适用于广域环境的低拉伸目标迁移方案
Pub Date : 2007-08-15 DOI: 10.2197/IPSJDC.3.528
Ken Hironaka, K. Taura, T. Chikayama
We propose a low-stretch scheme for locating mobile objects in wide-area computing environments. Locating mobile objects in distributed computing systems is a non-trivial problem and has been investigated for decades. The forwarding address algorithm, perhaps the most popular algorithm, requires the previous holder of the object to point to the successive holder, and to forward all requests along this pointer. However, this approach cannot provide any access stretch bounds for wide-area settings, and can incur unlimited communication overhead. This is unacceptable when a large number of objects simultaneously move or when numerous referencers attempt to access an object that has moved. We propose an active update method where nodes in the vicinity of the object's location are notified of its new location via localized update messages. Moreover, we will utilize the overlay topology information to minimize these messages. Referencers beyond the scope of the update will still be able to safely access the object. We will demonstrate that these updates maintain access stretches low even in wide-area settings.
我们提出了一种在广域计算环境中定位移动目标的低拉伸方案。在分布式计算系统中定位移动对象是一个非常重要的问题,并且已经研究了几十年。转发地址算法(可能是最流行的算法)要求对象的前一个持有者指向后继持有者,并沿着该指针转发所有请求。然而,这种方法不能为广域设置提供任何访问扩展边界,并且可能导致无限的通信开销。当大量对象同时移动,或者当许多引用试图访问已移动的对象时,这是不可接受的。我们提出了一种主动更新方法,通过本地化更新消息通知对象位置附近的节点其新位置。此外,我们将利用覆盖拓扑信息来最小化这些消息。超出更新范围的引用者仍然能够安全地访问对象。我们将证明,即使在广域设置中,这些更新也会保持低访问延伸。
{"title":"A Low-stretch Object Migration Scheme for Wide-area Environments","authors":"Ken Hironaka, K. Taura, T. Chikayama","doi":"10.2197/IPSJDC.3.528","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.528","url":null,"abstract":"We propose a low-stretch scheme for locating mobile objects in wide-area computing environments. Locating mobile objects in distributed computing systems is a non-trivial problem and has been investigated for decades. The forwarding address algorithm, perhaps the most popular algorithm, requires the previous holder of the object to point to the successive holder, and to forward all requests along this pointer. However, this approach cannot provide any access stretch bounds for wide-area settings, and can incur unlimited communication overhead. This is unacceptable when a large number of objects simultaneously move or when numerous referencers attempt to access an object that has moved. We propose an active update method where nodes in the vicinity of the object's location are notified of its new location via localized update messages. Moreover, we will utilize the overlay topology information to minimize these messages. Referencers beyond the scope of the update will still be able to safely access the object. We will demonstrate that these updates maintain access stretches low even in wide-area settings.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123055705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining Quantitative Rules in a Software Project Data Set 挖掘软件项目数据集中的定量规则
Pub Date : 2007-08-15 DOI: 10.2197/IPSJDC.3.518
Shuji Morisaki, Akito Monden, Haruaki Tamada, Tomoko Matsumura, Ken-ichi Matsumoto
†† † † † This paper proposes a method to mine rules from a software project data set that contains a number of quantitative attributes such as staff months and SLOC. The proposed method extends conventional association analysis methods to treat quantitative variables in two ways: (1) the distribution of a given quantitative variable is described in the consequent part of a rule by its mean value and standard deviation so that conditions producing the distinctive distributions can be discovered. To discover optimized conditions, (2) quantitative values appearing in the antecedent part of a rule are divided into contiguous fine-grained partitions in preprocessing, then rules are merged after mining so that adjacent partitions are combined. The paper also describes a case study using the proposed method on a software project data set collected by Nihon Unisys Ltd. In this case, the method mined rules that can be used for better planning and estimation of the integration and system testing phases, along with criteria or standards that help with planning of outsourcing resources.
本文提出了一种从软件项目数据集中挖掘规则的方法,该数据集包含许多定量属性,如员工月数和SLOC。所提出的方法扩展了传统的关联分析方法,以两种方式处理定量变量:(1)给定定量变量的分布通过其平均值和标准差在规则的后续部分描述,从而可以发现产生独特分布的条件。为了发现最优的条件,(2)预处理时将出现在规则前一部分的定量值划分为连续的细粒度分区,挖掘后对规则进行合并,使相邻分区合并。本文还介绍了使用该方法对日本Unisys公司收集的一个软件项目数据集进行的案例研究。在这种情况下,该方法挖掘的规则可用于更好地规划和评估集成和系统测试阶段,以及帮助规划外包资源的标准或标准。
{"title":"Mining Quantitative Rules in a Software Project Data Set","authors":"Shuji Morisaki, Akito Monden, Haruaki Tamada, Tomoko Matsumura, Ken-ichi Matsumoto","doi":"10.2197/IPSJDC.3.518","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.518","url":null,"abstract":"†† † † † This paper proposes a method to mine rules from a software project data set that contains a number of quantitative attributes such as staff months and SLOC. The proposed method extends conventional association analysis methods to treat quantitative variables in two ways: (1) the distribution of a given quantitative variable is described in the consequent part of a rule by its mean value and standard deviation so that conditions producing the distinctive distributions can be discovered. To discover optimized conditions, (2) quantitative values appearing in the antecedent part of a rule are divided into contiguous fine-grained partitions in preprocessing, then rules are merged after mining so that adjacent partitions are combined. The paper also describes a case study using the proposed method on a software project data set collected by Nihon Unisys Ltd. In this case, the method mined rules that can be used for better planning and estimation of the integration and system testing phases, along with criteria or standards that help with planning of outsourcing resources.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130815602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applying Ontology and Probabilistic Model to Human Activity Recognition from Surrounding Things 应用本体和概率模型对周围事物进行人类活动识别
Pub Date : 2007-08-15 DOI: 10.2197/IPSJDC.3.506
Yamada Naoharu, Kenji Sakamoto, G. Kunito, Yoshinori Isoda, K. Yamazaki, Satoshi Tanaka
This paper proposes human activity recognition based on the actual semantics of the human's current location. Since no predefined semantics of location can adequately identify human activity, we automatically identify the semantics from things by focusing on the association between things and human activities with the things. Ontology is used to deal with the various possible representations (terms) of each thing, identified by a RFID tag, and a multi-class Naive Bayesian approach is applied to detect multiple actual semantics from the terms. Our approach is suitable for automatically detecting possible activities even given a variety of object characteristics including multiple representations and variability. Simulations with actual thing datasets and experiments in an actual environment demonstrate its noise tolerance and ability to rapidly detect multiple actual semantics from existing things.
本文提出了基于人类当前位置实际语义的人类活动识别方法。由于没有预定义的位置语义可以充分识别人类活动,我们通过关注事物之间的关联以及人类活动与事物之间的关联来自动识别事物的语义。本体用于处理由RFID标签标识的每个事物的各种可能表示(术语),并应用多类朴素贝叶斯方法从术语中检测多个实际语义。我们的方法适用于自动检测可能的活动,即使给定各种对象特征,包括多个表示和可变性。实际事物数据集的仿真和实际环境中的实验证明了其噪声容忍能力和从现有事物中快速检测多种实际语义的能力。
{"title":"Applying Ontology and Probabilistic Model to Human Activity Recognition from Surrounding Things","authors":"Yamada Naoharu, Kenji Sakamoto, G. Kunito, Yoshinori Isoda, K. Yamazaki, Satoshi Tanaka","doi":"10.2197/IPSJDC.3.506","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.506","url":null,"abstract":"This paper proposes human activity recognition based on the actual semantics of the human's current location. Since no predefined semantics of location can adequately identify human activity, we automatically identify the semantics from things by focusing on the association between things and human activities with the things. Ontology is used to deal with the various possible representations (terms) of each thing, identified by a RFID tag, and a multi-class Naive Bayesian approach is applied to detect multiple actual semantics from the terms. Our approach is suitable for automatically detecting possible activities even given a variety of object characteristics including multiple representations and variability. Simulations with actual thing datasets and experiments in an actual environment demonstrate its noise tolerance and ability to rapidly detect multiple actual semantics from existing things.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126421128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Design and Implementation of Ad Hoc Communication and Applications on Mobile Phone Terminals 移动电话终端上Ad Hoc通信的设计与实现及应用
Pub Date : 2007-07-15 DOI: 10.2197/IPSJDC.3.480
Yujin Noishiki, H. Yokota, A. Idoue
Recent advancements in wireless communication technologies have attracted ad-hoc networking, which enables mobile users to communicate with each other without any infrastructure. While many ad-hoc routing protocols have been proposed, ad-hoc communication and its applications are not widespread. To expedite the widespread use of ad-hoc communications, we turn our attention to the handiest wireless device, namely, a mobile phone terminal. More mobile phones have been equipped with short distance wireless interfaces such as wireless LAN and Bluetooth. When ad-hoc communication is realized on such mobile phones with these wireless interfaces, ad-hoc communications will be available almost anytime and anywhere, which we believe will become a driving force for ad-hoc networking technology. On the other hand, while the performance of mobile phones has improved greatly over the past several years, their resources are still limited compared to laptop PCs. Therefore, to realize ad-hoc communication in mobile phones, this limitation should be considered. In this paper, we first set the design principles for mobile ad-hoc communications based on the assumed use cases and implement ad-hoc networking protocols as well as their applications on mobile phone terminals to verify their effectiveness. Through the performance evaluations, we discuss performance characteristics and potential application areas.
无线通信技术的最新进展吸引了ad-hoc网络,它使移动用户无需任何基础设施即可相互通信。虽然已经提出了许多自组织路由协议,但自组织通信及其应用并不广泛。为了加速自组织通信的广泛使用,我们把注意力转向最方便的无线设备,即移动电话终端。越来越多的手机配备了无线局域网和蓝牙等短距离无线接口。当在这些具有无线接口的手机上实现自组织通信时,几乎可以随时随地进行自组织通信,我们相信这将成为自组织网络技术的推动力。另一方面,虽然手机的性能在过去几年中有了很大的提高,但与笔记本电脑相比,它们的资源仍然有限。因此,要在移动电话中实现自组织通信,必须考虑到这一限制。在本文中,我们首先根据假设的用例设定了移动自组织通信的设计原则,并实现了自组织网络协议及其在移动电话终端上的应用,验证了其有效性。通过性能评估,讨论了性能特点和潜在的应用领域。
{"title":"Design and Implementation of Ad Hoc Communication and Applications on Mobile Phone Terminals","authors":"Yujin Noishiki, H. Yokota, A. Idoue","doi":"10.2197/IPSJDC.3.480","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.480","url":null,"abstract":"Recent advancements in wireless communication technologies have attracted ad-hoc networking, which enables mobile users to communicate with each other without any infrastructure. While many ad-hoc routing protocols have been proposed, ad-hoc communication and its applications are not widespread. To expedite the widespread use of ad-hoc communications, we turn our attention to the handiest wireless device, namely, a mobile phone terminal. More mobile phones have been equipped with short distance wireless interfaces such as wireless LAN and Bluetooth. When ad-hoc communication is realized on such mobile phones with these wireless interfaces, ad-hoc communications will be available almost anytime and anywhere, which we believe will become a driving force for ad-hoc networking technology. On the other hand, while the performance of mobile phones has improved greatly over the past several years, their resources are still limited compared to laptop PCs. Therefore, to realize ad-hoc communication in mobile phones, this limitation should be considered. In this paper, we first set the design principles for mobile ad-hoc communications based on the assumed use cases and implement ad-hoc networking protocols as well as their applications on mobile phone terminals to verify their effectiveness. Through the performance evaluations, we discuss performance characteristics and potential application areas.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115829241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Proposal for Service Differentiation by a Link Layer Protocol Based on SR ARQ and Its Evaluation 一种基于SR ARQ的链路层协议服务区分方案及其评价
Pub Date : 2007-07-15 DOI: 10.2197/IPSJDC.3.456
T. Shikama, T. Matsuda, Y. Terashima, Takashi Watanabe, T. Mizuno
This paper studies the situation where multiple IP flows are aggregated over a single wireless channel and an error recovery by retransmissions is performed by Selective-Repeat (SR) ARQ. We propose MQ-PFRS (Multi-QoS Per-Flow Resequencing) ARQ that provides a differentiated service for an IP flow depending on its QoS class, such as real-time or non-real-time. MQ-PFRS ARQ eliminates interferences among IP flows by resequencing received packets independently for each IP flow. It also controls the maximum packet delay by limiting the persistency of retransmissions and the maximum resequencing time for each packet. This paper also presents an analysis of the probability distribution of real-time packet delays. Simulation results show that the delay variation of real-time traffic is effectively controlled by proposed MQ-PFRS ARQ and the packet delay distribution is quite consistent with the results of the analysis. This means that MQ-PFRS is effective for handling multiple QoS classes of IP flows and the quality of real-time traffic transferred by the scheme can be predicted by the analysis.
本文研究了在单个无线信道上聚合多个IP流并通过选择性重复(SR) ARQ进行重传错误恢复的情况。我们提出MQ-PFRS (Multi-QoS Per-Flow Resequencing) ARQ,它根据IP流的QoS类别(如实时或非实时)提供差异化服务。MQ-PFRS ARQ通过对每个IP流独立地重新排序接收到的数据包来消除IP流之间的干扰。它还通过限制重传的持久性和每个数据包的最大重排序时间来控制最大数据包延迟。本文还分析了实时数据包延迟的概率分布。仿真结果表明,所提出的MQ-PFRS ARQ有效地控制了实时流量的时延变化,数据包的时延分布与分析结果非常吻合。这意味着MQ-PFRS可以有效地处理多个QoS类型的IP流,并且通过分析可以预测该方案传输的实时流量的质量。
{"title":"A Proposal for Service Differentiation by a Link Layer Protocol Based on SR ARQ and Its Evaluation","authors":"T. Shikama, T. Matsuda, Y. Terashima, Takashi Watanabe, T. Mizuno","doi":"10.2197/IPSJDC.3.456","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.456","url":null,"abstract":"This paper studies the situation where multiple IP flows are aggregated over a single wireless channel and an error recovery by retransmissions is performed by Selective-Repeat (SR) ARQ. We propose MQ-PFRS (Multi-QoS Per-Flow Resequencing) ARQ that provides a differentiated service for an IP flow depending on its QoS class, such as real-time or non-real-time. MQ-PFRS ARQ eliminates interferences among IP flows by resequencing received packets independently for each IP flow. It also controls the maximum packet delay by limiting the persistency of retransmissions and the maximum resequencing time for each packet. This paper also presents an analysis of the probability distribution of real-time packet delays. Simulation results show that the delay variation of real-time traffic is effectively controlled by proposed MQ-PFRS ARQ and the packet delay distribution is quite consistent with the results of the analysis. This means that MQ-PFRS is effective for handling multiple QoS classes of IP flows and the quality of real-time traffic transferred by the scheme can be predicted by the analysis.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121669829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of Directional MAC Protocols for Deafness Problem in Ad Hoc Networks 针对Ad Hoc网络中失聪问题的定向MAC协议性能评估
Pub Date : 2007-07-15 DOI: 10.2197/IPSJDC.3.468
M. Takata, M. Bandai, Takashi Watanabe
Several directional MAC protocols for ad hoc networks using directional antennas have been proposed recently. Although directional antennas have great potential such as high spatial reuse and range extension, directional MAC protocols inherently introduce new prob- lems arising from directivity. Deafness is one of the major problems and reduces the performance, caused by a lack of state information from neighbor nodes. This paper presents two directional MAC protocols, DMAC/DA (Directional MAC with Deafness Avoidance) and RI-DMAC (Receiver-Initiated Directional MAC), which handle the deafness problem, and mainly evaluates these protocols through extensive simulation study. DMAC/DA is a proactive handling method for deafness. In DMAC/DA, WTS (Wait To Send) frames are transmitted to notify the on-going communication to potential transmitters that may experience deafness. In this paper, DMAC/DA is enhanced by the next packet notification, called DMAC/DA with NPN, to distinguish transmitters from neighbors. On the other hand, RI-DMAC handles deafness reactively using a combination of sender-initiated and receiver-initiated operations. In RI-DMAC, each node polls a potential deafness node using RTR (Ready To Receive) after the completion of every dialog. The experimental results show that our proposed protocols outperform existing directional MAC protocols in terms of throughput, control overhead and packet drop ratio.
近年来,针对定向天线自组织网络提出了几种定向MAC协议。虽然定向天线在空间复用和范围扩展等方面具有很大的潜力,但定向MAC协议本身也引入了指向性带来的新问题。由于缺乏来自邻居节点的状态信息,导致的失聪是影响性能的主要问题之一。本文提出了两种处理失聪问题的定向MAC协议DMAC/DA (directional MAC with Deafness Avoidance)和RI-DMAC (Receiver-Initiated directional MAC),并通过大量的仿真研究对这两种协议进行了评价。DMAC/DA是一种针对耳聋的主动处理方法。在DMAC/DA中,发送WTS(等待发送)帧来通知正在进行的通信到可能经历失聪的潜在发送器。在本文中,DMAC/DA通过下一个数据包通知(称为带NPN的DMAC/DA)来增强,以区分发送者和邻居。另一方面,RI-DMAC使用发送方发起和接收方发起的操作组合来反应性地处理耳聋。在RI-DMAC中,每个节点在每个对话完成后使用RTR (Ready To Receive)轮询一个潜在的耳聋节点。实验结果表明,我们提出的协议在吞吐量、控制开销和丢包率方面都优于现有的定向MAC协议。
{"title":"Performance Evaluation of Directional MAC Protocols for Deafness Problem in Ad Hoc Networks","authors":"M. Takata, M. Bandai, Takashi Watanabe","doi":"10.2197/IPSJDC.3.468","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.468","url":null,"abstract":"Several directional MAC protocols for ad hoc networks using directional antennas have been proposed recently. Although directional antennas have great potential such as high spatial reuse and range extension, directional MAC protocols inherently introduce new prob- lems arising from directivity. Deafness is one of the major problems and reduces the performance, caused by a lack of state information from neighbor nodes. This paper presents two directional MAC protocols, DMAC/DA (Directional MAC with Deafness Avoidance) and RI-DMAC (Receiver-Initiated Directional MAC), which handle the deafness problem, and mainly evaluates these protocols through extensive simulation study. DMAC/DA is a proactive handling method for deafness. In DMAC/DA, WTS (Wait To Send) frames are transmitted to notify the on-going communication to potential transmitters that may experience deafness. In this paper, DMAC/DA is enhanced by the next packet notification, called DMAC/DA with NPN, to distinguish transmitters from neighbors. On the other hand, RI-DMAC handles deafness reactively using a combination of sender-initiated and receiver-initiated operations. In RI-DMAC, each node polls a potential deafness node using RTR (Ready To Receive) after the completion of every dialog. The experimental results show that our proposed protocols outperform existing directional MAC protocols in terms of throughput, control overhead and packet drop ratio.","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"21 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120998968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On-the-fly Model Checking of Security Protocols and Its Implementation by Maude 安全协议的动态模型检测及其Maude实现
Pub Date : 2007-06-15 DOI: 10.2197/IPSJDC.3.343
Guoqiang Li, Mizuhito Ogawa
Trace analysis for a security protocol represents every possible run as a trace and analyzes whether any insecure run is reachable. The number of traces will be infinite due to (1) infinitely many sessions of a protocol, (2) infinitely many principals in the network, and (3) infinitely many messages that intruders can generate. This paper presents an on-the-fly model checking method by restricting/abstracting these infinite factors to a finite model. First, we restrict a typed process calculus to avoid recursive operations, so that only finitely many sessions are considered. Next, a bound variable is introduced as an index of a message to represent its intended destination, so that an unbounded number of principals are finitely described. Then, messages in which irrelevant parts are reduced in a protocol are unified to a parametric message based on the type information. We implement the on-the-fly model checking method using Maude, and automatically detect the flaws of several security protocols, such as the NSPK protocol and the Woo-Lam protocol, etc..
安全协议的跟踪分析将每个可能的运行表示为跟踪,并分析是否有不安全的运行可达。由于(1)协议的无限多个会话,(2)网络中的无限多个主体,以及(3)入侵者可以生成的无限多个消息,因此跟踪的数量将是无限的。本文提出了一种将这些无限因素限制/抽象为有限模型的动态模型检验方法。首先,我们限制类型化过程演算以避免递归操作,因此只考虑有限多个会话。接下来,引入绑定变量作为消息的索引,以表示其预期目的地,这样就可以有限地描述无限数量的主体。然后,根据类型信息将协议中不相关部分减少的消息统一为参数消息。我们利用Maude实现了动态模型检测方法,并自动检测了NSPK协议、Woo-Lam协议等几种安全协议的缺陷。
{"title":"On-the-fly Model Checking of Security Protocols and Its Implementation by Maude","authors":"Guoqiang Li, Mizuhito Ogawa","doi":"10.2197/IPSJDC.3.343","DOIUrl":"https://doi.org/10.2197/IPSJDC.3.343","url":null,"abstract":"Trace analysis for a security protocol represents every possible run as a trace and analyzes whether any insecure run is reachable. The number of traces will be infinite due to (1) infinitely many sessions of a protocol, (2) infinitely many principals in the network, and (3) infinitely many messages that intruders can generate. This paper presents an on-the-fly model checking method by restricting/abstracting these infinite factors to a finite model. First, we restrict a typed process calculus to avoid recursive operations, so that only finitely many sessions are considered. Next, a bound variable is introduced as an index of a message to represent its intended destination, so that an unbounded number of principals are finitely described. Then, messages in which irrelevant parts are reduced in a protocol are unified to a parametric message based on the type information. We implement the on-the-fly model checking method using Maude, and automatically detect the flaws of several security protocols, such as the NSPK protocol and the Woo-Lam protocol, etc..","PeriodicalId":432390,"journal":{"name":"Ipsj Digital Courier","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Ipsj Digital Courier
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1