The proceedings contain 114 papers. The topics discussed include: undersea wireless sensor network for ocean pollution prevention;an effective group-based key establishment scheme for large-scale wireless sensor netwo...
详细信息
ISBN:
(纸本)9781424417971
The proceedings contain 114 papers. The topics discussed include: undersea wireless sensor network for ocean pollution prevention;an effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials;performance evaluation of a new overloading scheme for cellular DS-CDMA with iterative multistage interference cancellation receiver;experiments with low power commodity hardware platforms for challenged networks;smart middleware for mutual service-network awareness in evolving 3GPP networks;power allocation schemes for cognitive radios;communication in personal healthcare;hierarchical modeling of the Axis2 Web services framework with FMC-QE;extracting dense communities from telecom call graphs;OFDM-MAC algorithms and their impact on TCP in next generation mobile networks;and a slotted ALOHA joint MAC-cum-routing protocol for data gathering sensor network applications.
The proceedings contain 39 papers. The special focus in this conference is on Computer Safety, Reliability, and Security. The topics include: Making the case for safety of machine learning in highly automated driving;...
ISBN:
(纸本)9783319662831
The proceedings contain 39 papers. The special focus in this conference is on Computer Safety, Reliability, and Security. The topics include: Making the case for safety of machine learning in highly automated driving;a thought experiment on evolution of assurance cases —from a logical aspect;a thought experiment on evolution of assurance cases from a logical aspect;uniform model interface for assurance case integration with system models;integrated model-based development of system and safety cases;a web based GSN editor for multiple stakeholders;towards combined safety and security constraints analysis;reconciling systems-theoretic and component-centric methods for safety and security co-analysis;reconciling systems-theoretic and component-centric methods for safety and security co-analysis;increasing dependability in safety critical CPSs using reflective statecharts;a survey of hardware technologies for mixed-critical integration explored in the project EMC2;a model-based design approach;GSN support of mixed-criticality systems certification;concepts for reliable communication in a software-defined network architecture and combining safety and security analysis for industrial collaborative automation systems.
In this paper, the Quality of Service (QoS) for multimedia traffic of the Medium Access Control (MAC) protocol for Ultra Wide-Band (UWB) networks is investigated. A protocol is proposed to enhance the network performa...
详细信息
ISBN:
(纸本)9781424417964
In this paper, the Quality of Service (QoS) for multimedia traffic of the Medium Access Control (MAC) protocol for Ultra Wide-Band (UWB) networks is investigated. A protocol is proposed to enhance the network performance and increase its capacity. This enhancement comes from using Wise Algorithm for Link Admission Control (WALAC). The QoS of multimedia transmission is determined in terms of average delay, loss probability, utilization, and the network capacity.
World leading telecom technology manufacturers and network operators have initiated a joint initiative aimed at driving forward the realization of the next generation of high performance mobile broadband networks base...
详细信息
ISBN:
(纸本)9781424417964
World leading telecom technology manufacturers and network operators have initiated a joint initiative aimed at driving forward the realization of the next generation of high performance mobile broadband networks based on 3GPP LTE/SAE specifications [1]. The motivation of 3GPP LTE/SAE was when it became clear that the future telecommunicationsystems was clearly IP with everything (the network, AIPN [2]), and that access to the 3GPP network would ultimately be not only via UTRAN or GERAN but by WiFi, WiMAX, or even wired technologies [3]. In this paper, we propose security mechanisms for secure fast handover during Inter-RAT handover, particularly handover between 3GPP and non-3GPP networks. This paper highlights the possibility and mechanism for security context transfer during Inter-RAT handover between 3GPP and trusted non-3GPP networks and also a pre-authentication mechanism for handover between 3GPP and un-trusted non-3GPP networks.
This paper addresses the stability, bifurcation properties, and performance improvement of the packet reservation multiple access with hindering states (PRMA-HS) protocol, a medium access control scheme suitable for a...
详细信息
ISBN:
(纸本)9781424417964
This paper addresses the stability, bifurcation properties, and performance improvement of the packet reservation multiple access with hindering states (PRMA-HS) protocol, a medium access control scheme suitable for application in low earth orbit mobile satellite systems. The bistable behavior and bifurcation properties of the PRMA-HS protocol for a traffic with voice sources is investigated. A price based bifurcation control scheme is proposed to increase the capacity of the PRMA-HS protocol, defined as the number of simultaneous users sharing the same communication medium. Finally, a brief discussion concerning the extension of the proposed bifurcation control to PRMA-HS protocol over a random packet error channel is also provided.
Nowadays, communication network turns to be more complex, once there occurs a failure, there will result in multi-alarm-events which require relevant transactions. This paper describes the alarm correlation in communi...
详细信息
ISBN:
(纸本)9781424417964
Nowadays, communication network turns to be more complex, once there occurs a failure, there will result in multi-alarm-events which require relevant transactions. This paper describes the alarm correlation in communication networks based on data mining. The association rules from self-adaptation for dynamic net-work resource and service that build new rule by fully utilizing and maintaining rules formed before while transactions grow/delete or minimum support changes which enables the framework is easily updated and new discovery methods be readily incorporated within it. Both theoretical analysis and computer simulations illustrate outstanding performance of the proposed models, which can be further optimized by experiments for specific environment.
We have designed a smart middleware and are working on implementing and deploying it as a landmark architectural piece run by nodes of the Future Internet. The middleware we propose aims as a main goal at making appli...
详细信息
ISBN:
(纸本)9781424417964
We have designed a smart middleware and are working on implementing and deploying it as a landmark architectural piece run by nodes of the Future Internet. The middleware we propose aims as a main goal at making applications and services fully network-aware in the sense that they utilize network resources and tune their own demands based on what the underlying networks can offer. On the other hand, the smart middleware makes networks service aware in the sense that networks also adapt their configuration to service demands. Challenges of the Future Internet such as scalability, increased interoperability, and smart collaboration between engines are addressed by our middleware. Focusing on 3GPP networks including IP Multimedia Subsystem (IMS) networks, this paper presents the architectural design of our middleware and shows in two showcases how and why it is capable of addressing future challenges. Scenarios such as service and network-aware coordinated load balancing and "always-best-connected" as a service verify the merits of our smart middleware design.
Wireless opportunistic connections are the primary mechanism for transferring data between disconnected nodes, such as vehicles, remote sensors, or village kiosks [6], [7] in a Delay Tolerant Network (DTN)[2]. Energy,...
详细信息
ISBN:
(纸本)9781424417964
Wireless opportunistic connections are the primary mechanism for transferring data between disconnected nodes, such as vehicles, remote sensors, or village kiosks [6], [7] in a Delay Tolerant Network (DTN)[2]. Energy, being a scarce resource for such challenged environments, requires efficient management. We highlight the potential for accurate software-level energy modeling and prediction on commodity embedded computers for DTN deployments, such as KioskNet [6]. Our experiments confirm that accurate prediction of energy consumption, without relying on any hardware power measurement tool, is feasible. We performed controlled micro-benchmarks on the three major components of an embedded computing device: the processor, the storage, and the communication sub-systems. Results show that energy consumption in all three follow simple models. Analysis of such measurements provide strong hints to the system designers about potential areas of optimization to make the device operations more power-aware.
Theoretically, MIMO offers significant capacity benefits, but realizing these gains in deployed wireless systems remains a very challenging problem. MIMO has been used in wireless LAN systems with great success. Howev...
详细信息
ISBN:
(纸本)9781424417964
Theoretically, MIMO offers significant capacity benefits, but realizing these gains in deployed wireless systems remains a very challenging problem. MIMO has been used in wireless LAN systems with great success. However, due to the hugely varying spatial profiles and velocity patterns of the Access Terminals, integrating MIMO techniques in a wireless WAN system has been a difficult design problem. This paper introduces the design paradigms of Ultra-Mobile Broadband, which is poised to become the successor of EVDO as the next generation of high speed wireless system. UMB allows the use of MEMO in various forms to suit the deployment scenario, and elicit as much gain as possible.
In this paper, we have designed and implemented the system architecture for extensible mobile instant messaging and presence service over the IMS. More specifically, we have implemented the SIP proxy servers for IMS P...
详细信息
ISBN:
(纸本)9781424417964
In this paper, we have designed and implemented the system architecture for extensible mobile instant messaging and presence service over the IMS. More specifically, we have implemented the SIP proxy servers for IMS P-CSCF and S-CSCF for the realization of extensible mobile instant messaging and presence service. The salient feature of the proposed system architecture is that the architecture is based on IETF SIMPLE standard, and the extensibility of the presence service is achieved by implementing the OMA IMPS specification. An efficient algorithm is presented for achieving the extensible presence service over IMS. The implementation results show that the proposed system architecture can effectively provide not only interoperability but also extensibility for representing users' status information in the 3G mobile communication environment.
暂无评论