首页 > 最新文献

2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
Online Node Cooperation Strategy Design for Hierarchical Federated Learning 层次联邦学习在线节点协作策略设计
Pub Date : 2022-01-01 DOI: 10.1109/INFOCOMWKSHPS54753.2022.9798016
Xin Shen, Zhuo Li, Xin Chen
{"title":"Online Node Cooperation Strategy Design for Hierarchical Federated Learning","authors":"Xin Shen, Zhuo Li, Xin Chen","doi":"10.1109/INFOCOMWKSHPS54753.2022.9798016","DOIUrl":"https://doi.org/10.1109/INFOCOMWKSHPS54753.2022.9798016","url":null,"abstract":"","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"20 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74450834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Features of Brain Network for Anomaly Detection 脑网络异常检测的学习特征
Pub Date : 2020-07-06 DOI: 10.1109/infocomwkshps50562.2020.9162694
Jiaxin Liu, Wei Zhao, Ye Hong, Sheng Gao, Xi Huang, Yingjie Zhou
Brain network is a kind of biological networks, which could express complex connectivity among brain functional components. The node in brain network denotes region of interest, which executes specific function in the brain. The edge in brain network represents the connection relationship between nodes. Neuropsychiatric disorders can cause changes in the brain's nerves, which will further change the related characteristics of brain network. The detection for neuropsychiatric disorders with brain network could be treated as an anomaly detection problem. Recent researches have explored using complex networks or graph mining to deal with the detection problem. However, they neither ignore local structural features in critical regions nor fail to comprehensively extract the structural features for brain network. In this paper, we propose a feature learning method to build effective representations for brain network. By treating the closed frequent graph as a node, these representations contain both connection relationships in critical regions and local/global structural features for critical regions, which could benefit the detection with brain network. Experiments using real world data indicate that the proposed method could improve the detection ability of existing machine learning methods in the literatures.
脑网络是一种生物网络,可以表达脑功能组分之间复杂的连通性。脑网络中的节点表示感兴趣的区域,它在大脑中执行特定的功能。脑网络中的边缘表示节点之间的连接关系。神经精神障碍会引起大脑神经的变化,进而改变大脑网络的相关特征。神经精神疾病的脑网络检测可视为异常检测问题。最近的研究探索了使用复杂网络或图挖掘来处理检测问题。然而,它们既没有忽略关键区域的局部结构特征,也没有全面提取脑网络的结构特征。在本文中,我们提出了一种特征学习方法来构建有效的脑网络表征。通过将封闭频繁图视为一个节点,这些表征既包含关键区域的连接关系,又包含关键区域的局部/全局结构特征,有利于脑网络检测。使用真实数据的实验表明,该方法可以提高文献中现有机器学习方法的检测能力。
{"title":"Learning Features of Brain Network for Anomaly Detection","authors":"Jiaxin Liu, Wei Zhao, Ye Hong, Sheng Gao, Xi Huang, Yingjie Zhou","doi":"10.1109/infocomwkshps50562.2020.9162694","DOIUrl":"https://doi.org/10.1109/infocomwkshps50562.2020.9162694","url":null,"abstract":"Brain network is a kind of biological networks, which could express complex connectivity among brain functional components. The node in brain network denotes region of interest, which executes specific function in the brain. The edge in brain network represents the connection relationship between nodes. Neuropsychiatric disorders can cause changes in the brain's nerves, which will further change the related characteristics of brain network. The detection for neuropsychiatric disorders with brain network could be treated as an anomaly detection problem. Recent researches have explored using complex networks or graph mining to deal with the detection problem. However, they neither ignore local structural features in critical regions nor fail to comprehensively extract the structural features for brain network. In this paper, we propose a feature learning method to build effective representations for brain network. By treating the closed frequent graph as a node, these representations contain both connection relationships in critical regions and local/global structural features for critical regions, which could benefit the detection with brain network. Experiments using real world data indicate that the proposed method could improve the detection ability of existing machine learning methods in the literatures.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"46 1","pages":"900-905"},"PeriodicalIF":0.0,"publicationDate":"2020-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74340113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Demo abstract: EL-SEC: ELastic management of security applications on virtualized infrastructure 演示摘要:EL-SEC:虚拟化基础设施上安全应用的弹性管理
Pub Date : 2018-04-01 DOI: 10.1109/INFCOMW.2018.8406988
Nabeel Akhtar, I. Matta, A. Raza, Yuefeng Wang
The concept of Virtualized Network Functions (VNFs) aims to move Network Functions (NFs) out of dedicated hardware devices into software that runs on commodity hard-ware. A single NF consists of multiple VNF instances, usually running on virtual machines in a cloud infrastructure. The elastic management of an NF refers to load management across the VNF instances and the autonomic scaling of the number of VNF instances as load on the NF changes. In this demonstration, we present EL-SEC, an autonomic framework to elastically manage security NFs on a virtualized infrastructure. As a use case, we deploy the Snort Intrusion Detection System as the NF on the GENI testbed. Concepts from control theory are used to create an Elastic Manager, which implements various controllers — in this demo, Proportional Integral (PI) and Proportional Integral Derivative (PID) — to direct traffic across the VNF Snort instances by monitoring the current load. RINA (a clean-slate Recursive InterNetwork Architecture) is used to build a distributed application that monitors load and collects Snort alerts, which are processed by the Elastic Manager and an Attack Analyzer, respectively. Software Defined Networking (SDN) is used to steer traffic through the VNF instances, and to block attack traffic. Our demo shows that virtualized security NFs can be easily deployed using our EL-SEC framework. With the help of real-time graphs, we show that PI and PID controllers can be used to easily scale the system, which leads to quicker detection of attacks.
虚拟化网络功能(virtual Network Functions, VNFs)的概念旨在将网络功能(Network Functions, NFs)从专用硬件设备转移到运行在商用硬件上的软件中。单个NF由多个VNF实例组成,通常运行在云基础架构中的虚拟机上。弹性管理指的是跨VNF实例的负载管理,以及随着负载的变化自动调整VNF实例的数量。在本演示中,我们介绍EL-SEC,这是一个自治框架,用于在虚拟化基础设施上弹性地管理安全性NFs。作为一个用例,我们将Snort入侵检测系统部署为GENI测试平台上的NF。我们使用控制理论中的概念来创建一个Elastic Manager,它实现了各种控制器——在本演示中是比例积分(PI)和比例积分导数(PID)——通过监视当前负载来引导VNF Snort实例之间的流量。RINA(一种全新的递归互联网体系结构)用于构建一个分布式应用程序,该应用程序监视负载并收集Snort警报,这些警报分别由Elastic Manager和Attack Analyzer处理。SDN (Software Defined Networking)用于引导流量通过VNF实例,并阻断攻击流量。我们的演示表明,可以使用EL-SEC框架轻松部署虚拟化安全NFs。借助实时图,我们表明PI和PID控制器可以很容易地扩展系统,从而更快地检测到攻击。
{"title":"Demo abstract: EL-SEC: ELastic management of security applications on virtualized infrastructure","authors":"Nabeel Akhtar, I. Matta, A. Raza, Yuefeng Wang","doi":"10.1109/INFCOMW.2018.8406988","DOIUrl":"https://doi.org/10.1109/INFCOMW.2018.8406988","url":null,"abstract":"The concept of Virtualized Network Functions (VNFs) aims to move Network Functions (NFs) out of dedicated hardware devices into software that runs on commodity hard-ware. A single NF consists of multiple VNF instances, usually running on virtual machines in a cloud infrastructure. The elastic management of an NF refers to load management across the VNF instances and the autonomic scaling of the number of VNF instances as load on the NF changes. In this demonstration, we present EL-SEC, an autonomic framework to elastically manage security NFs on a virtualized infrastructure. As a use case, we deploy the Snort Intrusion Detection System as the NF on the GENI testbed. Concepts from control theory are used to create an Elastic Manager, which implements various controllers — in this demo, Proportional Integral (PI) and Proportional Integral Derivative (PID) — to direct traffic across the VNF Snort instances by monitoring the current load. RINA (a clean-slate Recursive InterNetwork Architecture) is used to build a distributed application that monitors load and collects Snort alerts, which are processed by the Elastic Manager and an Attack Analyzer, respectively. Software Defined Networking (SDN) is used to steer traffic through the VNF instances, and to block attack traffic. Our demo shows that virtualized security NFs can be easily deployed using our EL-SEC framework. With the help of real-time graphs, we show that PI and PID controllers can be used to easily scale the system, which leads to quicker detection of attacks.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"56 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90986201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring Web Latency in Cellular Networks 测量蜂窝网络中的Web延迟
Pub Date : 2018-01-01 DOI: 10.1109/INFCOMW.2018.8406855
A. Asrese, Ermias Andargie Walelgne, Andra Lutu, O. Alay, J. Ott
—This work presents a new methodology to measure the performance of web browsing over operational Mobile Broadband (MBB) networks. We designed a web performance measurement tool that collects both the web QoS metrics and the web rendering time in a browser window. We used MONROE [1], European wide measurement platform, to deploy our tool and to conduct a web browsing measurement over operational MBB networks. The results from the initial deployment show that different operators across countries and within the same country have a significant difference in web browsing performance (e.g. in the median case TIM is 75 ms faster than I WIND regarding time to first byte (TTFB)).
这项工作提出了一种新的方法来测量在移动宽带(MBB)网络上浏览网页的性能。我们设计了一个web性能测量工具,它可以收集web QoS指标和浏览器窗口中的web渲染时间。我们使用欧洲宽测量平台MONROE[1]来部署我们的工具,并在运行的MBB网络上进行网页浏览测量。最初部署的结果表明,不同国家和同一国家内的不同运营商在网页浏览性能上存在显著差异(例如,在中位数情况下,TIM在第一个字节(TTFB)的时间上比I WIND快75毫秒)。
{"title":"Measuring Web Latency in Cellular Networks","authors":"A. Asrese, Ermias Andargie Walelgne, Andra Lutu, O. Alay, J. Ott","doi":"10.1109/INFCOMW.2018.8406855","DOIUrl":"https://doi.org/10.1109/INFCOMW.2018.8406855","url":null,"abstract":"—This work presents a new methodology to measure the performance of web browsing over operational Mobile Broadband (MBB) networks. We designed a web performance measurement tool that collects both the web QoS metrics and the web rendering time in a browser window. We used MONROE [1], European wide measurement platform, to deploy our tool and to conduct a web browsing measurement over operational MBB networks. The results from the initial deployment show that different operators across countries and within the same country have a significant difference in web browsing performance (e.g. in the median case TIM is 75 ms faster than I WIND regarding time to first byte (TTFB)).","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78802851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability and maintainability analysis and its toolbased on deep learning for fault big data 基于深度学习的故障大数据可靠性与可维护性分析及其工具
Pub Date : 2017-09-01 DOI: 10.1109/ICRITO.2017.8342407
Y. Tamura, S. Yamada
Recently, many fault data sets are recorded on the bug tracking systems. These bug tracking systems are used on the Website for such as open source project management. The software managers of open source projects can comprehend the fault status by using the bug tracking system. However, these software systems for development support such as the bug tracking system cannot estimate the future trend of fault data. We discuss the methods of reliability and maintainability assessment based on the deep learning for fault big data. In particular, we develop the reliability and maintainability analysis tool based on deep learning for fault big data by using the latest programing technology. Moreover, we show several numerical illustrations of the developed software tool by using the fault big data in the actual software projects.
近年来,在缺陷跟踪系统中记录了大量的故障数据集。这些漏洞跟踪系统用于网站上的开源项目管理等。开源项目的软件管理者可以通过bug跟踪系统来了解故障状态。然而,这些用于开发支持的软件系统,如bug跟踪系统,无法估计故障数据的未来趋势。探讨了基于深度学习的故障大数据可靠性和可维护性评估方法。特别是,我们利用最新的编程技术,开发了基于深度学习的故障大数据可靠性和可维护性分析工具。并通过实际软件项目中故障大数据的应用,对所开发的软件工具进行了数值演示。
{"title":"Reliability and maintainability analysis and its toolbased on deep learning for fault big data","authors":"Y. Tamura, S. Yamada","doi":"10.1109/ICRITO.2017.8342407","DOIUrl":"https://doi.org/10.1109/ICRITO.2017.8342407","url":null,"abstract":"Recently, many fault data sets are recorded on the bug tracking systems. These bug tracking systems are used on the Website for such as open source project management. The software managers of open source projects can comprehend the fault status by using the bug tracking system. However, these software systems for development support such as the bug tracking system cannot estimate the future trend of fault data. We discuss the methods of reliability and maintainability assessment based on the deep learning for fault big data. In particular, we develop the reliability and maintainability analysis tool based on deep learning for fault big data by using the latest programing technology. Moreover, we show several numerical illustrations of the developed software tool by using the fault big data in the actual software projects.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"2021 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks FloodDefender:保护数据和控制平面资源免受sdn攻击
Pub Date : 2017-01-01 DOI: 10.1109/INFOCOM.2017.8057009
Shang Gao, Zhe Peng, Bin Xiao, A. Hu, K. Ren
{"title":"FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks","authors":"Shang Gao, Zhe Peng, Bin Xiao, A. Hu, K. Ren","doi":"10.1109/INFOCOM.2017.8057009","DOIUrl":"https://doi.org/10.1109/INFOCOM.2017.8057009","url":null,"abstract":"","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81248144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Virtual private network as a service — A need for discrete cloud architecture 虚拟专用网络即服务——需要离散的云架构
Pub Date : 2016-09-01 DOI: 10.1109/ICRITO.2016.7785012
Anjum Zameer Bhat, Dalal Khalfan Al Shuaibi, A. Singh
Cloud Computing in recent years has become a buzz word in the world of information technology. Cloud computing also referred as on demand computing has been extensively adapted by various organization irrespective of their scale and nature of work, essentially because of kind of flexibility, ease, scalability, less overhead and cost benefits that cloud computing provides. In recent years we have seen discrete and unique cloud implementations resulting in automation of complicated business processes at a never imaginable cost. Cloud computing provides three basic architecture to cater the needs of different users i.e. IaaS (Infrastructure as a Service), PaaS (Platform as a Service) and SaaS (Software as a Service). As the implementation of cloud computing is exponentially broadening and it is being implemented in newer and newer fields, need is being felt by cloud implementers to have unique service architectures for a specific implementation. In other words a unique cloud service architecture e.g. for Educational Establishments or e.g. a discrete service architecture for Virtual Private Network (VPN) if it is to be deployed through cloud. As Virtual Private Networks are a part of most of the network deployments all over the world connecting branches, business partners and outlets and providing seamless connectivity especially for SME's (Small-Medium sized Enterprises). Most of the organizations with VPN deployments want to reduce the operational cost, implementation cost and overhead associated with VPN's. This research paper is mere effort to study the need for discrete cloud architecture for the implementation of VPN service through cloud computing. This research paper introduces a unique cloud architecture VPNaaS (Virtual Private Network as a Service).
近年来,云计算已经成为信息技术领域的一个热门词汇。云计算也被称为随需应变计算,已被各种组织广泛采用,无论其规模和工作性质如何,主要是因为云计算提供的灵活性、易用性、可伸缩性、更少的开销和成本优势。近年来,我们看到离散的、独特的云实现以难以想象的成本实现了复杂业务流程的自动化。云计算提供了三种基本架构来满足不同用户的需求,即IaaS(基础设施即服务)、PaaS(平台即服务)和SaaS(软件即服务)。随着云计算的实现呈指数级扩展,并且在越来越新的领域中实现,云实现者感到需要为特定实现提供独特的服务体系结构。换句话说,一个独特的云服务架构,例如用于教育机构,或者用于虚拟专用网(VPN)的离散服务架构,如果它要通过云部署的话。虚拟专用网是世界上大多数网络部署的一部分,用于连接分支机构、业务合作伙伴和网点,并为中小型企业提供无缝连接。大多数部署VPN的组织都希望降低与VPN相关的运营成本、实现成本和开销。本文旨在研究通过云计算实现VPN业务对离散云架构的需求。本文介绍了一种独特的云架构VPNaaS(虚拟专用网即服务)。
{"title":"Virtual private network as a service — A need for discrete cloud architecture","authors":"Anjum Zameer Bhat, Dalal Khalfan Al Shuaibi, A. Singh","doi":"10.1109/ICRITO.2016.7785012","DOIUrl":"https://doi.org/10.1109/ICRITO.2016.7785012","url":null,"abstract":"Cloud Computing in recent years has become a buzz word in the world of information technology. Cloud computing also referred as on demand computing has been extensively adapted by various organization irrespective of their scale and nature of work, essentially because of kind of flexibility, ease, scalability, less overhead and cost benefits that cloud computing provides. In recent years we have seen discrete and unique cloud implementations resulting in automation of complicated business processes at a never imaginable cost. Cloud computing provides three basic architecture to cater the needs of different users i.e. IaaS (Infrastructure as a Service), PaaS (Platform as a Service) and SaaS (Software as a Service). As the implementation of cloud computing is exponentially broadening and it is being implemented in newer and newer fields, need is being felt by cloud implementers to have unique service architectures for a specific implementation. In other words a unique cloud service architecture e.g. for Educational Establishments or e.g. a discrete service architecture for Virtual Private Network (VPN) if it is to be deployed through cloud. As Virtual Private Networks are a part of most of the network deployments all over the world connecting branches, business partners and outlets and providing seamless connectivity especially for SME's (Small-Medium sized Enterprises). Most of the organizations with VPN deployments want to reduce the operational cost, implementation cost and overhead associated with VPN's. This research paper is mere effort to study the need for discrete cloud architecture for the implementation of VPN service through cloud computing. This research paper introduces a unique cloud architecture VPNaaS (Virtual Private Network as a Service).","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"37 1","pages":"526-532"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
TPC Chair's welcome 欢迎TPC主席
Pub Date : 2016-04-10 DOI: 10.1109/INFCOMW.2016.7561994
Sung-Ju Lee, C. Petrioli, P. Wan, Kai Zeng
On behalf of the technical program committee, it is our great pleasure to welcome you to San Francisco for the 35th IEEE INFOCOM Conference. In line with its tradition, IEEE INFOCOM 2016 features a high quality technical program across a wide range of traditional and emerging research areas in computer communications and networking. IEEE INFOCOM 2016 received 1644 submissions from 54 countries spread over all continents, of which 300 were accepted to the main technical program after a thorough review process. The competitive acceptance rate of 18% reflects the prestige and popularity of IEEE INFOCOM to our research community. The papers included in this year's program represent the forefront of networking research, as they explore important new ideas and directions in the field.
我谨代表技术计划委员会,非常高兴地欢迎您来到旧金山参加第35届IEEE INFOCOM会议。按照其传统,IEEE INFOCOM 2016在计算机通信和网络的传统和新兴研究领域提供了高质量的技术方案。IEEE INFOCOM 2016收到了来自各大洲54个国家的1644份意见书,其中300份经过全面审查后被接受为主要技术项目。具有竞争力的18%的录取率反映了IEEE INFOCOM在我们的研究界的声望和知名度。今年项目中的论文代表了网络研究的前沿,因为它们探索了该领域的重要新思想和方向。
{"title":"TPC Chair's welcome","authors":"Sung-Ju Lee, C. Petrioli, P. Wan, Kai Zeng","doi":"10.1109/INFCOMW.2016.7561994","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7561994","url":null,"abstract":"On behalf of the technical program committee, it is our great pleasure to welcome you to San Francisco for the 35th IEEE INFOCOM Conference. In line with its tradition, IEEE INFOCOM 2016 features a high quality technical program across a wide range of traditional and emerging research areas in computer communications and networking. IEEE INFOCOM 2016 received 1644 submissions from 54 countries spread over all continents, of which 300 were accepted to the main technical program after a thorough review process. The competitive acceptance rate of 18% reflects the prestige and popularity of IEEE INFOCOM to our research community. The papers included in this year's program represent the forefront of networking research, as they explore important new ideas and directions in the field.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"24 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90763620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gram Sandesh Transmission-a web based information system for farmers Gram Sandesh传输-一个基于网络的农民信息系统
Pub Date : 2015-09-01 DOI: 10.1109/ICRITO.2015.7359246
Parv Gupta, R. Majumdar, Mrigendra Kumar, Nishant Chauhan, Subhash Chand Gupta
This paper presents the experimentation done in order to flourish a low price and impressionable information system to provide useful information to farmers in a timely manner so as to assist their decision making process. The primary reason behind development of this system was to automate the flow of information to farmers since agriculture is the backbone of our country. Gram Sandesh Transmission is a web disciplined system which targets all sort of audience by means of its ios application (for iphone users),android application(for android users), messaging server(for basic mobile handset) and gsm based led boards (for those who don't owe a mobile handset). Farmers are provided with weather related information on daily basis so that necessary decision regarding sowing of seeds, weeding, harvesting, irrigation could be taken. The system warns with any disaster related information so that necessary steps could be taken. Another module of the system deals with providing “Sarkari Mandi Bhaav” (Govt. Market Price) and thus reduces the chances of fraud prices quoted by middleman to farmers.
本文介绍了为建立一个价格低廉、易受影响的信息系统而进行的试验,该系统可以及时向农民提供有用的信息,以协助他们的决策过程。开发该系统的主要原因是为了使农民的信息流自动化,因为农业是我国的支柱。Gram Sandesh Transmission是一个网络纪律系统,通过其ios应用程序(针对iphone用户),android应用程序(针对android用户),消息服务器(针对基本手机)和基于gsm的led板(针对那些不欠手机的人)针对所有类型的受众。每天向农民提供与天气有关的信息,以便在播种、除草、收获和灌溉方面做出必要的决定。该系统警告任何与灾害有关的信息,以便采取必要的措施。该系统的另一个模块涉及提供“Sarkari Mandi Bhaav”(政府市场价格),从而减少中间商向农民提供欺诈价格的可能性。
{"title":"Gram Sandesh Transmission-a web based information system for farmers","authors":"Parv Gupta, R. Majumdar, Mrigendra Kumar, Nishant Chauhan, Subhash Chand Gupta","doi":"10.1109/ICRITO.2015.7359246","DOIUrl":"https://doi.org/10.1109/ICRITO.2015.7359246","url":null,"abstract":"This paper presents the experimentation done in order to flourish a low price and impressionable information system to provide useful information to farmers in a timely manner so as to assist their decision making process. The primary reason behind development of this system was to automate the flow of information to farmers since agriculture is the backbone of our country. Gram Sandesh Transmission is a web disciplined system which targets all sort of audience by means of its ios application (for iphone users),android application(for android users), messaging server(for basic mobile handset) and gsm based led boards (for those who don't owe a mobile handset). Farmers are provided with weather related information on daily basis so that necessary decision regarding sowing of seeds, weeding, harvesting, irrigation could be taken. The system warns with any disaster related information so that necessary steps could be taken. Another module of the system deals with providing “Sarkari Mandi Bhaav” (Govt. Market Price) and thus reduces the chances of fraud prices quoted by middleman to farmers.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"69 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimization of Vehicular Ad Hoc Network using Taguchi method 基于田口法的车载Ad Hoc网络优化
Pub Date : 2015-04-21 DOI: 10.1109/I4CT.2015.7219555
Aznor Hanah Abdul Halim, M. N. M. Warip, R. B. Ahmad, S. J. Elias
Vehicular Ad Hoc Network (VANET) is quite different from other ad hoc networks in term of functionality because of the variable node density, high node mobility, and unpredictable and harsh communication environment. There are two major applications VANET, namely safety applications and non-safety applications. In addition, network optimization is one way to maintain the existing protocols and other network parameter compare to design and implementing new improved protocols in which it too costly. Motivated with the reasons this paper presents an optimization of vehicular network for throughput, end-to-end delay and packet delivery ratio using Taguchi method. Highway scenario is chosen as the evaluation condition for this paper. For three performances evaluated, the highest rank value shows the different factors. For safety application which is delay-sensitive, routing protocols is the highest rank control factors. Non-safety application which is throughput sensitive, packet size is the main control factors.
车辆自组织网络(VANET)由于节点密度可变、节点移动性高、通信环境不可预测和恶劣,在功能上与其他自组织网络有很大的不同。VANET主要有两种应用,即安全应用和非安全应用。此外,网络优化是维护现有协议和其他网络参数的一种方法,而设计和实现新的改进协议的成本太高。基于此,本文提出了一种基于田口法的车载网络吞吐量、端到端时延和分组传输比优化方法。本文选取公路场景作为评价条件。对于所评估的三个性能,最高排名值表示不同的因素。对于延迟敏感的安全应用,路由协议是最重要的控制因素。非安全应用是吞吐量敏感的,数据包大小是主要的控制因素。
{"title":"Optimization of Vehicular Ad Hoc Network using Taguchi method","authors":"Aznor Hanah Abdul Halim, M. N. M. Warip, R. B. Ahmad, S. J. Elias","doi":"10.1109/I4CT.2015.7219555","DOIUrl":"https://doi.org/10.1109/I4CT.2015.7219555","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) is quite different from other ad hoc networks in term of functionality because of the variable node density, high node mobility, and unpredictable and harsh communication environment. There are two major applications VANET, namely safety applications and non-safety applications. In addition, network optimization is one way to maintain the existing protocols and other network parameter compare to design and implementing new improved protocols in which it too costly. Motivated with the reasons this paper presents an optimization of vehicular network for throughput, end-to-end delay and packet delivery ratio using Taguchi method. Highway scenario is chosen as the evaluation condition for this paper. For three performances evaluated, the highest rank value shows the different factors. For safety application which is delay-sensitive, routing protocols is the highest rank control factors. Non-safety application which is throughput sensitive, packet size is the main control factors.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"41 1","pages":"147-151"},"PeriodicalIF":0.0,"publicationDate":"2015-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82441248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1