The proceedings contain 55 papers. The topics discussed include: human resource analysis based on used libraries in eclipse projects on GitHub;modified convolutional network for the identification of COVID-19 with a m...
ISBN:
(纸本)9781665404037
The proceedings contain 55 papers. The topics discussed include: human resource analysis based on used libraries in eclipse projects on GitHub;modified convolutional network for the identification of COVID-19 with a mobile system;which dependency was updated? exploring who changes dependencies in npm packages;developing event routing service to support context-aware service integration;interactive chatbots for software engineering: a case study of code reviewer recommendation;effectiveness of explaining a program to others in finding its bugs;study of microservice execution framework using spoken dialogue agents;association metrics between two continuous variables for software project data;structure-preserving deep autoencoder-based dimensionality reduction for data visualization;Arabic sign language recognition: towards a dual way communication system between deaf and non-deaf people;and an investigation on multiscale normalized deep scattering spectrum with deep residual network for acoustic scene classification.
This extended abstract outlines our research on quantum and emerging computing systems for next-generation wireless networks. The research aims to leverage quantum and quantum-inspired computation to expedite baseband...
详细信息
ISBN:
(纸本)9798400705816
This extended abstract outlines our research on quantum and emerging computing systems for next-generation wireless networks. The research aims to leverage quantum and quantum-inspired computation to expedite baseband processing at base stations. We introduce our system design directions and prototype systems that are implemented on analog quantum processors. The prototypes are designed for quantum-accelerated near-optimal multi-user detection processing in MIMO systems that could drastically increase wireless performance for tomorrow's NextG cellular networking standards, as well as in NextG wireless local area networks (LAN).
Advances in networking andcomputing are moving society towards a cyber space, in which more aspects of our daily lives are being conducted over the Internet. This movement generates concerns regarding trust between t...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Advances in networking andcomputing are moving society towards a cyber space, in which more aspects of our daily lives are being conducted over the Internet. This movement generates concerns regarding trust between the parties involved in these aspects. Nevertheless, trust is a broad topic and thus it is challenging to define a unified mechanism for evaluating trust in communication networks. This article focuses on presenting a general model of trust in communication networks that is flexible enough to be implemented by a wide range of use cases. The model is based on the concept of trust functions, a type of relationship used to evaluate trust. Trust functions are evaluated between two subjects, based on the action that is about to take place and the objects being affected by that action. We use this model to describe a use case of Trust Enhanced networking and present a discussion regarding trust in communication networks and future challenges.
With the fast development of information technology, the databases used as the fundamental storage andcomputing component of information system have to deal with much more complicated scenarios with high frequency an...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
With the fast development of information technology, the databases used as the fundamental storage andcomputing component of information system have to deal with much more complicated scenarios with high frequency and concurrency. distributed databases are becoming more and more common in data-intensive industries such as banking and telecommunications. The selection of distributed database products requires comprehensively consider the function, performance, security, ease of use and stability of the product. The stability of distributed database is known to be difficult in testing and product selection. The method widely used in database testing is TPC-DS (transaction processing performance council-decision support) benchmark, which is only suitable for functional and performance testing. To deal with this drawback, a distributed database stability testing platform based on chaos engineering methodology is developed Through the perturbation injection by using the stability testing platform, the performance fluctuation of the database under pressure condition can be observed, and the stability of the database can then be evaluated
Find My is a crowd-sourced network of hundreds of millions of Apple devices that use Bluetooth Low Energy (BLE) to detect and track the location of items. We explore the limits and opportunities of using this propriet...
详细信息
ISBN:
(纸本)9798400705816
Find My is a crowd-sourced network of hundreds of millions of Apple devices that use Bluetooth Low Energy (BLE) to detect and track the location of items. We explore the limits and opportunities of using this proprietary network for large-scale distributed sensing. The key idea is to let low-cost sensing devices emit specially crafted BLE advertisements that trick nearby Apple devices into generating location reports that carry arbitrary sensor data, which can then be retrieved from the Apple servers. This paper reports on our ongoing work to reverse engineer the Find My system and to design a protocol for the efficient and reliable collection of data from sensing devices via the Find My network. Preliminary results from real-world experiments demonstrate the feasibility of our approach and a several-fold performance improvement compared with the state of the art.
The construction of information system stability assurance capabilities has a long history of development. However, with the gradually increasing load pressure of the information system, the distributed architecture h...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
The construction of information system stability assurance capabilities has a long history of development. However, with the gradually increasing load pressure of the information system, the distributed architecture has gradually become the mainstream architecture of information system. Furthermore, the stability guarantee of the information system has entered a new stage, which requires extensive optimization in both theoretical and practical aspects. This paper researches on the relevant background, basic principles, key elements, core competencies, and evaluation system of information system stability assurance capacity construction in the new stage. In addition, this paper explores the future development trend of stability assurance work
In recent years, computer networks and telecommunications in general have been shifting paradigms to adopt software-centric approaches. Software Defined networking (SDN) is one of such paradigms that centralizes contr...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
In recent years, computer networks and telecommunications in general have been shifting paradigms to adopt software-centric approaches. Software Defined networking (SDN) is one of such paradigms that centralizes control and intelligent applications can be defined on top of this architecture. In the literature, diverse software-based applications exist, focusing on finding either the shortest paths, balancing the traffic, and others. However, they do not consider the potentially different level of security of links in the network. In this work, we propose an approach for Flow Admission and Routing under Minimal Security Constraints (FARSec) in Software Defined Networks, where network flows must use links which are at least as secure as their required security level. We prove that FARSec can find feasible paths respecting the minimum level of security for each flow. If the latter is not possible FARSec rejects the flow in order not to compromise its security. We show that the computational complexity of the proposed approach is polynomial. Experimental results with semi-random generated graphs confirm the efficiency and correctness of the proposed approach. Finally, we implement the proposed solution using OpenFlow and ONOS - an SDN open-source controller. We validate its functionality using an emulated network with various security levels.
Delay Tolerant Network (DTN) is a network model designed for special environments. It is designed to be used in challenging network environments with high latency levels, bandwidth constraints, and unstable data trans...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Delay Tolerant Network (DTN) is a network model designed for special environments. It is designed to be used in challenging network environments with high latency levels, bandwidth constraints, and unstable data transmission. It plays an important role in extremely special environments such as disaster rescue, maritime communication, and remote areas. Currently, research on DTN mainly focuses on innovative routing protocols, with limited research of the security issues and solutions. In response to the above problems, this paper analyzes and compares the security problems faced by delay tolerance networks and their solutions and security schemes
The proceedings contain 36 papers. The topics discussed include: enterprise data collection and cross-referencing system;data acquisition system for forecasting applications of photovoltaic power production;a conceptu...
ISBN:
(纸本)9798350393651
The proceedings contain 36 papers. The topics discussed include: enterprise data collection and cross-referencing system;data acquisition system for forecasting applications of photovoltaic power production;a conceptual model for a cloud-based digital signing service;malicious short URLs detection technique;removing individuals from video streams through facial recognition;an email classification framework for phishing detection in virtualized network environments;improving network security using DD-WRT as a solution for SOHO routers;the significance of enhancing data fairness in educational recommender systems;a study of GPU memory vulnerabilities;task scheduling policies in a cloud computing environment;and design and implementation of a distributed firewall management system for improved security.
In the Internet of Vehicles, low service delay and fast response are two essential factors to ensure the safety and smooth operation of vehicle networking. As core technologies, the 5G and edge computing networks play...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
In the Internet of Vehicles, low service delay and fast response are two essential factors to ensure the safety and smooth operation of vehicle networking. As core technologies, the 5G and edge computing networks play a fundamental role in reducing the pressure on the backbone network of vehicle networking and decreasing the service exchange delay. The previous edge server placement strategy can not be directly applied to deploying vehicle networking services, resulting in the degradation of system performance and user quality of experience. To solve the above problem, we propose a reliable edge server deployment algorithm called CFD based on Deep Deterministic Policy Gradient (DDPG). Firstly, the Canopy algorithm is used to cluster the location information of roadside units, and the initial cluster number is obtained. Then, the fuzzy C clustering algorithm (FCM) is leveraged to remove the "noise" and acquire the roadside units' initial division and priority matrix. Finally, based on the DDPG algorithm, the optimal division of roadside units is obtained, and the cluster center is utilized as the deployment location of the edge server. Many experiments have been conducted, and the results show that, compared with the benchmark algorithm, the CFD algorithm improves the load balancing degree by 25%.
暂无评论