The proceedings contain 163 papers. The topics discussed include: a dynamic resource scheduling scheme for CDMA2000 systems;maximum lifetime broadcasting in wireless networks;consistent graph layout for weighted graph...
详细信息
ISBN:
(纸本)078038735X
The proceedings contain 163 papers. The topics discussed include: a dynamic resource scheduling scheme for CDMA2000 systems;maximum lifetime broadcasting in wireless networks;consistent graph layout for weighted graphs;autonomous resource management and control algorithms for distributed wireless sensor networks;classification of radiological exams and organs by belief theory;preparing complex data for warehousing;mapping faults to failures in SQL manipulation commands;evaluation of scalable TCP;a fault-tolerant topology control in wireless sensor networks;performance of a shuffle exchange network using Markov chains;an optimal shared protection scheme for optical networks;practical techniques for defending against DDoS attacks;current trends and challenges towards wireless Internet;simulated analysis of server placement on network topology designs;and a new Internet meta-search engine and implementation.
In order to enable a common understanding of context information we introduce a modeling concept that embraces four abstraction layers from meta-metamodel and metamodel to model and instance layer Being compliant to O...
详细信息
ISBN:
(纸本)0769523005
In order to enable a common understanding of context information we introduce a modeling concept that embraces four abstraction layers from meta-metamodel and metamodel to model and instance layer Being compliant to OWL DL we especially consider the ability of reasoning over the information and the modeling of quality attributes.
As the model-checking (which is based on reachability analysis) becomes increasingly used in the industry, there is a big need for efficient new methods to deal with the large real-size designs. This paper presents a ...
详细信息
ISBN:
(纸本)9780780387355
As the model-checking (which is based on reachability analysis) becomes increasingly used in the industry, there is a big need for efficient new methods to deal with the large real-size designs. This paper presents a novel method for improving the performance of reachability analysis using parallelization techniques. We propose a new method for partitioning the large state space modeling industrial designs with hundreds of millions of states and transitions. This method partitions the state space by performing a combination of abstraction-part it ion-refinement on its structure. The reachability analysis is distributed on processes located on the different network machines. Each one owns a partition and executes the reachability analysis on it. The algorithm for parallel reachability analysis is designed by a way reducing the communication overhead between the processes. The experimental results on large real designs show that this method improves the quality of partitions, the communication overhead and then the overall performance of the reachability analysis.
Recently, there has been increasing interest in research of data sharing in peer-to-peer networks. In this paper, we propose a new update propagation strategy that achieves not only load balancing but also delay reduc...
详细信息
ISBN:
(纸本)9780780387355
Recently, there has been increasing interest in research of data sharing in peer-to-peer networks. In this paper, we propose a new update propagation strategy that achieves not only load balancing but also delay reduction, where the update information is immediately notified to all peers holding the replicas when the update occurs. The proposed strategy creates an n-ary tree whose root is the owner of the original data and the other nodes are peers holding its replicas, and propagates the update information according to the trees. Moreover, we verify the effectiveness of the proposed strategy by simulation experiments.
A new concept called Wireless ad-hoc Control Networks (WACNets), designed for distributed and remote monitoring and control is suggested in this work. Such systems represent the next stage in the evolution of distribu...
详细信息
ISBN:
(纸本)0780390946
A new concept called Wireless ad-hoc Control Networks (WACNets), designed for distributed and remote monitoring and control is suggested in this work. Such systems represent the next stage in the evolution of distributed control and monitoring. WACNet explores a framework for organic, evolutionary and scalable method of integrating a large number of nodes with sensing and/or actuation, local intelligence and control, data processing and communication capabilities. The concept is introduced and the design of the network is presented. As an essential element in the operation of WACNet, service discovery developed for WACNet will be described and progress made so far will be reported.
The proceedings contain 18 papers. The topics discussed include: quality-constrained routing in publish/subscribe systems;an aspect-oriented ambient intelligence middleware platform;managing the follow-me semantics to...
ISBN:
(纸本)1595932682
The proceedings contain 18 papers. The topics discussed include: quality-constrained routing in publish/subscribe systems;an aspect-oriented ambient intelligence middleware platform;managing the follow-me semantics to build largescale pervasive applications;functional and architectural adaptation in pervasive computing environments;a contextaware middleware for multimodal dialogue applications with context tracing;evolutionary and efficient context management in heterogeneous environments;a middleware supporting protocol-based coordination in dynamic networks;a reconfigurable group management middleware service for wireless sensor networks;component oriented middleware for distributed collaboration event detection in wireless sensor networks;sensor bean : a component platform for sensor-based services;adaptive query processing in mobile environment;and integrated support for handoff management and context awareness in heterogeneous wireless networks.
A distributed Denial of Service (DDoS) attack is an explicit attempt to interrupt an online service by generating a high volume of malicious traffic. These attacks consume all available network resources, thus renderi...
详细信息
ISBN:
(纸本)9780780387355
A distributed Denial of Service (DDoS) attack is an explicit attempt to interrupt an online service by generating a high volume of malicious traffic. These attacks consume all available network resources, thus rendering legitimate users unable to access the services. Most existing solutions propose to detect and drop attack packets at or near the destination network where the attack packets have already traversed the network and consumed considerable bandwidth. The aggregate traffic at the destination router may consist of hundreds of thousands of flows making it hard for the router to distinguish between legitimate and malicious packets. So, collateral damage is unavoidable. In this paper, we present a Source Router Preferential Dropping (SRPD) scheme to detect possible DDoS attacks and defeat them at their sources. SRPD monitors only high-rate outgoing flows at source networks and preferentially drops the packets belonging to these flows when it senses the existence of an attack. A simulation model is constructed and a number of simulation experiments have been conducted to evaluate the performance of the proposed scheme. Simulation results show that SRPD effectively controls DDoS attacks at their sources and reduces collateral damage to a minimum level.
Hybrid sensor networks comprise of mobile and static sensor nodes setup for the purpose of collaboratively performing tasks like sensing a phenomenon or monitoring a region. In this paper we present a novel approach f...
详细信息
ISBN:
(纸本)0769522998
Hybrid sensor networks comprise of mobile and static sensor nodes setup for the purpose of collaboratively performing tasks like sensing a phenomenon or monitoring a region. In this paper we present a novel approach for navigating a mobile sensor node (MSN) through such a hybrid sensor network. The static sensor nodes in the sensor network guide the MSN to the phenomenon. One or more MSN's are selected based on their proximity to the detected phenomenon. Navigation is accomplished using the concepts of credit based field setup and navigation force from static sensor nodes. Our approach does not require any prior maps of the environment thus, cutting down the cost of the overall system. The simulation results have verified the effectiveness of the proposed approach. In each of the simulation runs, the static sensor nodes were able to successfully guide the MSN towards the phenomenon.
The proceedings contain 101 papers. The topics discussed include: state assignment for low-leakage finite state machines;a low-voltage low-noise CMOS instrumentation amplifier for portable medical monitoring systems;i...
详细信息
ISBN:
(纸本)0780389344
The proceedings contain 101 papers. The topics discussed include: state assignment for low-leakage finite state machines;a low-voltage low-noise CMOS instrumentation amplifier for portable medical monitoring systems;implementation and error performance evaluation of an iterative decoding algorithm;multiplexer-based binary incrementer/decrementers;linearity enhancement in a configurable sigma-delta modulator;optimized distributed processing of scaling factor in COrdIC;multipath greedy algorithm for canonical representation of numbers in the double base number system;minimization of delay sensitivity to process induced voltage threshold variations;distortion in RF CMOS short channel low noise amplifiers;and a high precision and linearity differential capacitive sensor circuit dedicated to bioparticles detection.
Load balance can reduce hot spots, maintain network connectivity and prolong lifetime of wireless sensor networks. In large scale and randomly deployed wireless sensor networks, the energy consumption is sharply uneve...
详细信息
ISBN:
(纸本)3540281029
Load balance can reduce hot spots, maintain network connectivity and prolong lifetime of wireless sensor networks. In large scale and randomly deployed wireless sensor networks, the energy consumption is sharply uneven among sensor nodes. We propose a new routing mechanism to achieve load balance through constructing a dynamic load-balancing tree (DLBT) in wireless sensor networks. The DLBT structure is a tree-like topology with a critical character that one node may have more than one candidates of parent node. DLBT achieves load balance by adjusting the forwarding probability to each parent candidate according to its traffic burden. We also provide a distributed algorithm to construct and maintain the DLBT structure. Simulation results show that our DLBT routing provides much higher load balance than the shortest path tree mechanism.
暂无评论