Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004.

19-21 May 2004

Filter Results

Displaying Results 1 - 25 of 58
  • Provision of QoS in wireless networks

    Publication Year: 2004, Page(s):337 - 340
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    With the advent of different types of wireless technologies a 'vertical multi-tier' architecture is envisioned to provide the wireless user with seamless 'roaming' across different types of networks. Wireless devices will be used not only for transferring data but also for voice and multimedia applications for which QoS (quality of service) support is essential. Different wireless technologies, li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The reconstruction of user sessions from a server log using improved time-oriented heuristics

    Publication Year: 2004, Page(s):315 - 322
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining techniques to discover Web access patterns from Web usage data. In order to discover access patterns, Web usage data should be reconstructed into sessions with or without user identification. However, not all Web server logs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effectiveness of brute force attacks on RC4

    Publication Year: 2004, Page(s):333 - 336
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. We use the RC4 cipher, utilized primarily in the area of data communications, as a test case for determining the effectiveness of exhaustive key-searches implemented on FPGAs using a network on chip (NoC) design architecture. Preliminary results show that a network of key-chec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application of multi-wavelet packets in digital communications

    Publication Year: 2004, Page(s):10 - 18
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    Bandwidth efficiency and the ability to combat the effects of frequency selective channels are critical in the design of digital modulation schemes. To improve bandwidth utilization and to avoid ISI caused by time dispersion in the channel, a new multi-wavelet packet modulation (MWPM) scheme is proposed. The MWPM is based on orthogonal multi-wavelet packets (MWP). In particular, the orthogonality ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PBit - a pattern-based testing framework for iptables

    Publication Year: 2004, Page(s):107 - 112
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    The most recent entry in a series of Linux firewall services is iptables. Because iptables is a security product in widespread use, software faults are a serious concern and firewall testing is an important activity. Firewall testing is hard because there are many parameters, resulting in a huge number of possible parameter combinations. We present a methodology for iptables regression testing bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent ants for adaptive network routing

    Publication Year: 2004, Page(s):255 - 261
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    An adaptive routing algorithm based on the AntNet algorithm is designed and implemented with a new routing table formation scheme. This addresses the unrealistic requirement of the original AntNet algorithm for global information. The new algorithm requires limited routing information in the routing and traffic statistics tables. The routers only have the most popular destinations in their routing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing multitier lightweight techniques for protecting medical images within ubiquitous environments

    Publication Year: 2004, Page(s):225 - 234
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    When one begins to think about security and P2P networks, and in particular, ad-hoc P2P ubiquitous networks with no real centralization, one must take a leap from the accepted, in place, on-the-Internet, security practices into the unknown. The article describes an ongoing project at Lakehead University to establish a secure P2P ubiquitous environment using the JXTA infrastructure. Two important i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weighted PageRank algorithm

    Publication Year: 2004, Page(s):305 - 314
    Cited by:  Papers (75)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    With the rapid growth of the Web, users easily get lost in the rich hyper structure. Providing the relevant information to users to cater to their needs is the primary goal of Website owners. Therefore, finding the content of the Web and retrieving the users' interests and needs from their behavior have become increasingly important. Web mining is used to categorize users and pages by analyzing us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On dataset biases in a learning system with minimum a priori information for intrusion detection

    Publication Year: 2004, Page(s):181 - 189
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    A critical design decision in the construction of intrusion detection systems is often the selection of features describing the characteristics of the data being learnt. Selecting features often requires a priori or expert knowledge and may lead to the introduction of specific attack biases ntended or otherwise. To this end, summarized network connections from the DARPA 98 Lincoln Labs dataset are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency multiplication and QPSK modulation with subharmonic injection-locked active antenna

    Publication Year: 2004, Page(s):329 - 332
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    A subharmonic injection-locked oscillating antenna, operating simultaneously as a frequency doubler and as a QPSK modulator, is presented. A dual-gate MESFET is used with one of its gates integrated with a PIN diode switch controlled patch antenna and the other gate connected to a low-noise subharmonic stabilising signal. The experimental and simulation results demonstrate the possibility of the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted route discovery with TORA protocol

    Publication Year: 2004, Page(s):121 - 130
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally ordered routing algorithm (TORA) is one of the commonly used protocols for ad-hoc wireless networks. Route discovery in TORA is done in a cooperative manner with intermediate nodes contributing to route generation. Precision in route build-up demands ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A validation solution for network configuration

    Publication Year: 2004, Page(s):273 - 275
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    The continuous development of the Internet results in an increased number of network services. The network operators and service providers have to deploy various configuration tools to deliver those network services. The different tools used to configure the same equipments can create network configuration inconsistency. Therefore, it is necessary to enhance the configuration tools with validation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent system for multimedia communications traversing NAT/firewall in next generation networks

    Publication Year: 2004, Page(s):99 - 104
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    The forthcoming next generation network (NGN) is an all IP network. It should guarantee multimedia communications to traverse NAT and firewall. The existing traversal methods are not suitable for a service provider to set up a real system in the NGN. Multi-agent system for multimedia communication traversing NAT (network address translator) and firewall (MASMCT) is presented to resolve the problem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Similarities between voice and high speed Internet traffic provisioning

    Publication Year: 2004, Page(s):83 - 90
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    The paper finds similarities between voice traffic and high speed Internet data traffic characteristics from a facility provisioning perspective. Telephone switch traffic measurements are used to show that self-similarity is present in a voice traffic time series, to identify the factor associated with self-similarity, and then to demonstrate that traditional voice traffic provisioning methods rem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of audio codecs over real-time transmission protocol (RTP) for voice services over Internet protocol

    Publication Year: 2004, Page(s):351 - 356
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    The real-time transmission of voice on a IP network is one of the key techniques in multimedia communication. This paper aims at evaluating the performance of a set of audio codecs best suitable for real-time voice transmission using the real-time transmission protocol (RTP) over an IP network. Voice is encoded using an audio codec and transmission is simulated by means of a RTP media simulator fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-limiting, adaptive protocols for controlled flooding in ad hoc networks

    Publication Year: 2004, Page(s):33 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    The growing popularity of ad hoc networks is making their limitations, such as bandwidth and power restrictions, more apparent. As a result, techniques that reduce power consumption, reduce traffic, and restrict flooding, are of growing importance. A series of adaptive, connectionless protocols are presented, which, when working with location-aware nodes, can reduce the number of nodes involved in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent agents for routing on mobile ad-hoc networks

    Publication Year: 2004, Page(s):249 - 254
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    This paper introduces a new agent-based ad-hoc network routing protocol: mobile agent routing protocol (MAR). Mobile agents are simple packets that carry data and explore the network to collect routing information. They communicate with one another to exchange this routing information. By mobile agent exploration, the intelligence is put across the network, which enables the routing to be distribu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive filtering of spam

    Publication Year: 2004, Page(s):218 - 224
    Cited by:  Papers (19)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB) | HTML iconHTML

    We present a new spam filter which acts as an additional layer in the spam filtering process. This filter is based on what we call a representative vocabulary. Spam e-mails are divided into categories in which each category is represented by a set of tokens which form a representative text (RT). Tokens are strings of characters (words, sentences, or sometimes meaningless strings of characters). Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topic sharing infrastructure for weblog networks

    Publication Year: 2004, Page(s):301 - 304
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Weblogs have recently emerged as a popular means of sharing information on the Web. While they effectively foster the networking of participants on a one-to-one basis, so far they have lacked the capacity of allowing the establishment of many-to-many communication relationships. The paper describes recent work on facilitating group forming processes and the sharing of content among weblog authors ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An authenticated broadcasting scheme for wireless ad hoc network

    Publication Year: 2004, Page(s):69 - 74
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    We propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme that suggested an identity-based cryptosystem for ad hoc networks. Due to the dynamic nature of ad hoc networks, we allow nodes to generate their own broadcast keys for different groups in the network, and change those when associated groups are changed. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A micro-genetic algorithm-based CDMA multi-user detector

    Publication Year: 2004, Page(s):175 - 180
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    A new multi-user detection technique that utilizes only the micro-genetic algorithm (μGA) is developed. In contrast to previous approaches, the micro-genetic algorithm is not hybridized with any detector other than a conventional detector (CD) or a decorrelator as an initial stage. The use of this algorithm considerably reduces the number of operations as well as the total cost of the proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software brokers for quality of services in service-oriented distributed systems

    Publication Year: 2004, Page(s):341 - 344
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    In service-oriented distributed systems, software services are located in different computers; such services collaborate with each other to carry out computation tasks. This paper presents design and implementation of lightweight software brokers for quality of services in service-oriented distributed systems. Such brokers help clients in a distributed system to use software services provided by o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mesh partitioning for computational grids

    Publication Year: 2004, Page(s):325 - 328
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    Computational grids, with a collection of heterogeneous resources connected by heterogeneous networks, are being developed globally. Efficient partitioning of applications to exploit such grids is becoming an emerging area of research. Recent work in our group led to the creation of the PaGrid, an application that partitions meshes onto grids. The first version of PaGrid used a multilevel graph pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The novel decision feedback equalizer for OFDM system with insufficient cyclic prefix

    Publication Year: 2004, Page(s):19 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    If the multipath delay difference is greater than the duration of a cyclic prefix, the performance of an orthogonal frequency division multiplexing (OFDM) system suffers severe degradation. The insufficient cyclic prefix phenomenon incurs two adverse interferences, intersymbol interference (ISI) from the adjacent symbols and intercarrier interference (ICI) from other subcarriers in the same OFDM s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of generative programming based protocol implementation

    Publication Year: 2004, Page(s):113 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    The protocol implementation framework for Linux (PIX) is a protocol development tool using generative programming. It aims at capturing the similarities in behavior among different layers of protocols and grouping solutions to cross-cutting concerns of communication systems. It achieves a high degree of configurability by providing several combinations which could be chosen to generate the desired... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.