首页 > 最新文献

2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
Protecting Location Privacy with Clustering Anonymization in vehicular networks 利用聚类匿名技术保护车辆网络中的位置隐私
Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849249
Bidi Ying, D. Makrakis
Location privacy is an important issue in location-based services. A large number of location cloaking algorithms have been proposed for protecting location privacy of users. However, these algorithms cannot be used in vehicular networks due to constrained vehicular mobility. In this paper, we propose a new method named Protecting Location Privacy with Clustering Anonymization (PLPCA) for location-based services in vehicular networks. This PLPCA algorithm starts with a road network transforming to an edge-cluster graph in order to conceal road information and traffic information, and then provides a cloaking algorithm based on A-anonymity and l-diversity as privacy metrics to further enclose a target vehicle's location. Simulation analysis shows our PLPCA has good performances like the strength of hiding of road information & traffic information.
位置隐私是基于位置的服务中的一个重要问题。为了保护用户的位置隐私,已经提出了大量的位置隐藏算法。然而,由于车辆移动性受限,这些算法不能用于车辆网络。本文针对车载网络中基于位置的服务,提出了一种基于聚类匿名化的位置隐私保护方法。该算法首先将道路网络转换为边缘聚类图,以隐藏道路信息和交通信息,然后提供基于a -匿名和l-多样性作为隐私指标的隐身算法,进一步封闭目标车辆的位置。仿真分析表明,该算法具有良好的道路信息和交通信息隐藏强度。
{"title":"Protecting Location Privacy with Clustering Anonymization in vehicular networks","authors":"Bidi Ying, D. Makrakis","doi":"10.1109/INFCOMW.2014.6849249","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849249","url":null,"abstract":"Location privacy is an important issue in location-based services. A large number of location cloaking algorithms have been proposed for protecting location privacy of users. However, these algorithms cannot be used in vehicular networks due to constrained vehicular mobility. In this paper, we propose a new method named Protecting Location Privacy with Clustering Anonymization (PLPCA) for location-based services in vehicular networks. This PLPCA algorithm starts with a road network transforming to an edge-cluster graph in order to conceal road information and traffic information, and then provides a cloaking algorithm based on A-anonymity and l-diversity as privacy metrics to further enclose a target vehicle's location. Simulation analysis shows our PLPCA has good performances like the strength of hiding of road information & traffic information.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"13 1","pages":"305-310"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84806267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
SecLoc: Encryption system based on compressive sensing measurements for location estimation SecLoc:用于位置估计的基于压缩感知测量的加密系统
Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849210
Dimitris Milioris, P. Jacquet
In this paper we present an efficient encryption system based on Compressive Sensing, without the additional computational cost of a separate encryption protocol, when applied to indoor location estimation problems. The breakthrough of the method is the use of the weakly encrypted measurement matrices which are generated when solving the optimization problem to localize the source. It must be noted that in this method an alternative key is required to secure the system.
在本文中,我们提出了一个有效的基于压缩感知的加密系统,当应用于室内位置估计问题时,没有额外的加密协议的计算成本。该方法的突破点在于利用求解优化问题时生成的弱加密测量矩阵对源进行定位。必须注意的是,在这种方法中,需要一个替代密钥来保护系统。
{"title":"SecLoc: Encryption system based on compressive sensing measurements for location estimation","authors":"Dimitris Milioris, P. Jacquet","doi":"10.1109/INFCOMW.2014.6849210","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849210","url":null,"abstract":"In this paper we present an efficient encryption system based on Compressive Sensing, without the additional computational cost of a separate encryption protocol, when applied to indoor location estimation problems. The breakthrough of the method is the use of the weakly encrypted measurement matrices which are generated when solving the optimization problem to localize the source. It must be noted that in this method an alternative key is required to secure the system.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"78 1","pages":"171-172"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83606068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online multi-resource scheduling for minimum task completion time in cloud servers 在线多资源调度以实现云服务器中任务完成时间的最小化
Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849261
MohammadJavad NoroozOliaee, B. Hamdaoui, M. Guizani, Mahdi Ben Ghorbel
We design a simple and efficient online scheme for scheduling cloud tasks requesting multiple resources, such as CPU and memory. The proposed scheme reduces the queuing delay of the cloud tasks by accounting for their execution time lengths. We also derive bounds on the average queuing delays, and evaluate the performance of our proposed scheme and compare it with those achievable under existing schemes by relying on real Google data traces. Using this data, we show that our scheme outperforms the other schemes in terms of resource utilizations as well as average task queuing delays.
我们设计了一个简单而高效的在线方案,用于调度需要多个资源(如CPU和内存)的云任务。该方案通过计算云任务的执行时间长度来减少云任务的排队延迟。我们还推导了平均排队延迟的界限,并评估了我们提出的方案的性能,并将其与依靠真实的Google数据跟踪在现有方案下可实现的性能进行了比较。使用这些数据,我们表明我们的方案在资源利用率和平均任务队列延迟方面优于其他方案。
{"title":"Online multi-resource scheduling for minimum task completion time in cloud servers","authors":"MohammadJavad NoroozOliaee, B. Hamdaoui, M. Guizani, Mahdi Ben Ghorbel","doi":"10.1109/INFCOMW.2014.6849261","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849261","url":null,"abstract":"We design a simple and efficient online scheme for scheduling cloud tasks requesting multiple resources, such as CPU and memory. The proposed scheme reduces the queuing delay of the cloud tasks by accounting for their execution time lengths. We also derive bounds on the average queuing delays, and evaluate the performance of our proposed scheme and compare it with those achievable under existing schemes by relying on real Google data traces. Using this data, we show that our scheme outperforms the other schemes in terms of resource utilizations as well as average task queuing delays.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"49 1","pages":"375-379"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78326746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Enabling private and non-intrusive smartphone calls with LipTalk 启用私人和非侵入性智能手机通话与LipTalk
Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849220
M. Li, Si Chen, K. Ren
The typical usage for phones is making calls. However, under certain scenarios, phone calls are inappropriate or intrusive when people are having a meeting, impractical when background noise level is too high or insecure under monitoring of other personals/parties. Typical solution to these problems is to send text-based messages. Yet, we argue that the most natural, efficient way for human-beings to communicate is via speech. In this work, we provide envision for our project, a non-intrusive, convenient and secure communication system. We utilize the front camera of smart phones, efficiency of cloud computing environment and state-of-the-art text-to-speech methods to create a robust visual speech recognition system to enable people to chat with lip movements. We present the current challenges, system architecture, initial findings and planned approaches to our problem.
电话的典型用途是打电话。然而,在某些情况下,当人们正在开会时打电话是不合适的或侵入性的,当背景噪音水平过高或在其他人/各方的监视下不安全时是不切实际的。这些问题的典型解决方案是发送基于文本的消息。然而,我们认为人类交流最自然、最有效的方式是通过语言。在这项工作中,我们为我们的项目提供了设想,一个非侵入性,方便和安全的通信系统。我们利用智能手机的前置摄像头、云计算环境的效率和最先进的文本到语音的方法,创建了一个强大的视觉语音识别系统,使人们能够通过嘴唇运动进行聊天。我们介绍了当前的挑战、系统架构、初步发现和解决问题的计划方法。
{"title":"Enabling private and non-intrusive smartphone calls with LipTalk","authors":"M. Li, Si Chen, K. Ren","doi":"10.1109/INFCOMW.2014.6849220","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849220","url":null,"abstract":"The typical usage for phones is making calls. However, under certain scenarios, phone calls are inappropriate or intrusive when people are having a meeting, impractical when background noise level is too high or insecure under monitoring of other personals/parties. Typical solution to these problems is to send text-based messages. Yet, we argue that the most natural, efficient way for human-beings to communicate is via speech. In this work, we provide envision for our project, a non-intrusive, convenient and secure communication system. We utilize the front camera of smart phones, efficiency of cloud computing environment and state-of-the-art text-to-speech methods to create a robust visual speech recognition system to enable people to chat with lip movements. We present the current challenges, system architecture, initial findings and planned approaches to our problem.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"28 1","pages":"191-192"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80643695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Routine-based network deployment 日常组网部署
Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849216
E. M. R. Oliveira, A. C. Viana
The careful deployment of hotspots in metropolitan areas allow to maximize WiFi offloading, a viable solution to the recent boost up of mobile data consumption. Our proposed strategy considers routine characteristics present on people's daily trajectories, the space-time interaction between them urban locations, and their transportation modes. Using a reallife metropolitan trace, we show our routine-based strategy guarantees higher offload ratio than the current approach in the literature while using a realistic traffic model.
在大都市地区精心部署热点,可以最大限度地减少WiFi流量,这是最近移动数据消费激增的可行解决方案。我们提出的策略考虑了人们日常轨迹上的常规特征、他们之间的时空相互作用、城市位置和他们的交通方式。通过现实生活中的都市轨迹,我们展示了在使用现实交通模型的情况下,我们基于常规的策略比目前文献中的方法保证了更高的卸载率。
{"title":"Routine-based network deployment","authors":"E. M. R. Oliveira, A. C. Viana","doi":"10.1109/INFCOMW.2014.6849216","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849216","url":null,"abstract":"The careful deployment of hotspots in metropolitan areas allow to maximize WiFi offloading, a viable solution to the recent boost up of mobile data consumption. Our proposed strategy considers routine characteristics present on people's daily trajectories, the space-time interaction between them urban locations, and their transportation modes. Using a reallife metropolitan trace, we show our routine-based strategy guarantees higher offload ratio than the current approach in the literature while using a realistic traffic model.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"154 1","pages":"183-184"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86650393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-dimensional OFDMA scheduling in a wireless network with relay nodes 具有中继节点的无线网络中的多维OFDMA调度
Pub Date : 2014-07-08 DOI: 10.1109/INFOCOM.2014.6848188
R. Cohen, G. Grebla
{"title":"Multi-dimensional OFDMA scheduling in a wireless network with relay nodes","authors":"R. Cohen, G. Grebla","doi":"10.1109/INFOCOM.2014.6848188","DOIUrl":"https://doi.org/10.1109/INFOCOM.2014.6848188","url":null,"abstract":"","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"2427-2435"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90861298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Performance evaluation of streaming algorithms for network cameras 网络摄像机流算法的性能评价
Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849245
Gonzalo Ferrer, H. Méric, José M. Piquer, Javier Bustos-Jiménez
In this article we present the performance evaluation of different algorithms to distribute video frames from network cameras to multiple concurrent clients in real-time. The algorithms evaluated in this paper rely on a pool of buffers shared by all the clients. We implement these algorithms in the VLC media player and study their performance in terms of frame rate, hardware resource usage and decoding errors. Moreover, we compare their performance to the VLC streaming algorithm. Experimental results show that well designed algorithms combined with a sufficient number of buffers significantly outperform the VLC streaming algorithm.
在本文中,我们给出了不同算法的性能评估,以实时地将视频帧从网络摄像机分发到多个并发客户端。本文评估的算法依赖于所有客户端共享的缓冲区池。我们在VLC媒体播放器中实现了这些算法,并从帧率、硬件资源使用和解码错误等方面研究了它们的性能。此外,我们将它们的性能与VLC流算法进行了比较。实验结果表明,设计良好的算法与足够数量的缓冲区相结合,显著优于VLC流算法。
{"title":"Performance evaluation of streaming algorithms for network cameras","authors":"Gonzalo Ferrer, H. Méric, José M. Piquer, Javier Bustos-Jiménez","doi":"10.1109/INFCOMW.2014.6849245","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849245","url":null,"abstract":"In this article we present the performance evaluation of different algorithms to distribute video frames from network cameras to multiple concurrent clients in real-time. The algorithms evaluated in this paper rely on a pool of buffers shared by all the clients. We implement these algorithms in the VLC media player and study their performance in terms of frame rate, hardware resource usage and decoding errors. Moreover, we compare their performance to the VLC streaming algorithm. Experimental results show that well designed algorithms combined with a sufficient number of buffers significantly outperform the VLC streaming algorithm.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"21 1","pages":"281-286"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84731199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic objects removal for scene completion 自动对象移除场景完成
Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849291
Jianjun Yang, Kun Hua, Yin Wang, Wei Wang, Honggang Wang, Ju Shen
With the explosive growth of Web-based cameras and mobile devices, billions of photographs are uploaded to the Internet. We can trivially collect a huge number of photo streams for various goals, such as 3D scene reconstruction and other big data applications. However, this is not an easy task due to the fact the retrieved photos are neither aligned nor calibrated. Furthermore, with the occlusion of unexpected foreground objects like people, vehicles, it is even more challenging to find feature correspondences and reconstruct realistic scenes. In this paper, we propose a structure-based image completion algorithm for object removal that produces visually plausible content with consistent structure and scene texture. We use an edge matching technique to infer the potential structure of the unknown region. Driven by the estimated structure, texture synthesis is performed automatically along the estimated curves. We evaluate the proposed method on different types of images: from highly structured indoor environment to the natural scenes. Our experimental results demonstrate satisfactory performance that can be potentially used for subsequent big data processing: 3D scene reconstruction and location recognition.
随着基于网络的相机和移动设备的爆炸式增长,数十亿张照片被上传到互联网上。我们可以轻松地收集大量的照片流,用于各种目的,例如3D场景重建和其他大数据应用。然而,这不是一件容易的事情,因为检索到的照片既没有对齐也没有校准。此外,随着意外前景对象(如人、车辆)的遮挡,寻找特征对应并重建真实场景更具挑战性。在本文中,我们提出了一种基于结构的图像补全算法,用于产生具有一致结构和场景纹理的视觉上可信的内容。我们使用边缘匹配技术来推断未知区域的潜在结构。在估计的结构驱动下,沿着估计的曲线自动进行纹理合成。我们对不同类型的图像进行了评估:从高度结构化的室内环境到自然场景。我们的实验结果显示了令人满意的性能,可以潜在地用于后续的大数据处理:3D场景重建和位置识别。
{"title":"Automatic objects removal for scene completion","authors":"Jianjun Yang, Kun Hua, Yin Wang, Wei Wang, Honggang Wang, Ju Shen","doi":"10.1109/INFCOMW.2014.6849291","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849291","url":null,"abstract":"With the explosive growth of Web-based cameras and mobile devices, billions of photographs are uploaded to the Internet. We can trivially collect a huge number of photo streams for various goals, such as 3D scene reconstruction and other big data applications. However, this is not an easy task due to the fact the retrieved photos are neither aligned nor calibrated. Furthermore, with the occlusion of unexpected foreground objects like people, vehicles, it is even more challenging to find feature correspondences and reconstruct realistic scenes. In this paper, we propose a structure-based image completion algorithm for object removal that produces visually plausible content with consistent structure and scene texture. We use an edge matching technique to infer the potential structure of the unknown region. Driven by the estimated structure, texture synthesis is performed automatically along the estimated curves. We evaluate the proposed method on different types of images: from highly structured indoor environment to the natural scenes. Our experimental results demonstrate satisfactory performance that can be potentially used for subsequent big data processing: 3D scene reconstruction and location recognition.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"32 4","pages":"553-558"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91552644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A management model for SDN-based data center networks 基于sdn的数据中心网络管理模型
Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849181
Yifei Xu, Yue Yan, Zhuyun Dai, Xiaolin Wang
Current data centers often employ SDNs (Software-Defined Networks) that are layered in most cases. However, information overwhelming has been a limitation to SDN deployment. We present a management model for data center networks. In this approach, regional networks on lower layers will be aggregated and viewed as single switches to upper layers. Management information will be divided into three parts, which can be seen by network managers, regional controllers and tenants, respectively.
当前的数据中心通常采用sdn(软件定义网络),在大多数情况下是分层的。然而,信息泛滥一直是SDN部署的一个限制。提出了一种数据中心网络管理模型。在这种方法中,较低层的区域网络将被聚合,并被视为通往上层的单个交换机。管理信息将分为三部分,分别由网络管理员、区域控制器和租户看到。
{"title":"A management model for SDN-based data center networks","authors":"Yifei Xu, Yue Yan, Zhuyun Dai, Xiaolin Wang","doi":"10.1109/INFCOMW.2014.6849181","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849181","url":null,"abstract":"Current data centers often employ SDNs (Software-Defined Networks) that are layered in most cases. However, information overwhelming has been a limitation to SDN deployment. We present a management model for data center networks. In this approach, regional networks on lower layers will be aggregated and viewed as single switches to upper layers. Management information will be divided into three parts, which can be seen by network managers, regional controllers and tenants, respectively.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"6 1","pages":"113-114"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90214639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SD-ICN: An interoperable deployment framework for software-defined information-centric networks SD-ICN:用于软件定义的信息中心网络的可互操作部署框架
Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849199
Jinfan Wang, Wei Gao, Yuqing Liang, Rui Qin, Jianping Wang, Shucheng Liu
In the past couple of years, various information-centric networking (ICN) architectures have been proposed to address the existing problems of the current Internet, each of which from a different perspective. Thus, it becomes critical to deploy and interoperate different ICNs on top of the same physical network infrastructure. This demo presents SD-ICN, a software-defined interoperable deployment framework based on Open vSwitch (OVS) for ICN architectures.
在过去的几年中,已经提出了各种以信息为中心的网络(ICN)体系结构来解决当前Internet存在的问题,每种体系结构都从不同的角度提出。因此,在相同的物理网络基础设施上部署和互操作不同的ICNs变得至关重要。本演示展示了SD-ICN,这是一种基于Open vSwitch (OVS)的ICN架构的软件定义的可互操作部署框架。
{"title":"SD-ICN: An interoperable deployment framework for software-defined information-centric networks","authors":"Jinfan Wang, Wei Gao, Yuqing Liang, Rui Qin, Jianping Wang, Shucheng Liu","doi":"10.1109/INFCOMW.2014.6849199","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849199","url":null,"abstract":"In the past couple of years, various information-centric networking (ICN) architectures have been proposed to address the existing problems of the current Internet, each of which from a different perspective. Thus, it becomes critical to deploy and interoperate different ICNs on top of the same physical network infrastructure. This demo presents SD-ICN, a software-defined interoperable deployment framework based on Open vSwitch (OVS) for ICN architectures.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"89 1","pages":"149-150"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84428265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1