Tuesday, August 25, 2009

IEEE TRANSACTIONS ON MULTIMEDIA

GENERALIZED SEQUENCE-BASED AND REVERSE SEQUENCE-BASED MODELS FOR BROADCASTING HOT VIDEOS – 2009

It has been well recognized as an efficient approach for broadcasting popular videos by partitioning a video data stream into multiple segments and launching each segment through an individual channel simultaneously and periodically.

Based on the design premises, some recent studies, including skyscraper broadcasting (SkB), client-centric approach (CCA), greedy disk-conserving broadcasting (GDB), and reverse fast broadcasting (RFB) schemes, etc., have been reported. To study the client segment downloading process, this paper first introduces an applicable sequence-based broadcasting model that can be used to minimize the required buffer size.

By extending RFB, this paper further proposes a reverse sequence-based broadcasting model, which can generally improve the existing schemes such as SkB, CCA, GDB, and FB in terms of the relaxed client buffer size.

To have a deeper understanding on the proposed reverse model, the upper bound of the client buffer requirement is obtained through a comprehensive analysis, which is proved to be much smaller than the conventional sequence model by 25% to 50%. Based on the proposed reverse model, a reverse sequence-based broadcasting scheme is developed for achieving smaller delay than CCA and GDB.

Index Terms

Hot-video broadcasting, video-on-demand (VOD), buffers, cable TV.


IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,

VOL. 35, NO. 3, MAY/JUNE 2009

CHARMY: A FRAMEWORK FOR DESIGNING AND VERIFYING ARCHITECTURAL SPECIFICATIONS PATRIZIO PELLICCIONE, PAOLA INVERARDI, AND HENRY MUCCINI

Introduced in the early stages of software development, the CHARMY framework assists the software architect in making and evaluating architectural choices. Rarely, the software architecture of a system can be established once and forever.

Most likely poorly defined and understood architectural constraints and requirements force the software architect to accept ambiguities and move forward to the construction of a suboptimal software architecture. CHARMY aims to provide an easy and practical tool for supporting the iterative modeling and evaluation of software architectures. From an UML-based architectural design, an executable prototype is automatically created.

CHARMY simulation and model checking features help in understanding the functioning of the system and discovering potential inconsistencies of the design. When a satisfactory and stable software architecture is reached, Java code conforming to structural software architecture constraints is automatically generated through suitable transformations. The overall approach is tool supported.

Index Terms

Software architectures, model checking.


IEEE RANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 19, NO. 5, MAY 2008

COMPUTATION-EFFICIENT MULTICAST KEY DISTRIBUTION

Efficient key distribution is an important problem for secure group communications. The communication and storage complexity of multicast key distribution problem has been studied extensively. In this paper, we propose a new multicast key distribution scheme whose computation complexity is significantly reduced.

Instead of using conventional encryption algorithms, the scheme employs MDS codes, a class of error control codes, to distribute multicast key dynamically. This scheme drastically reduces the computation load of each group member compared to existing schemes employing traditional encryption algorithms.

Such a scheme is desirable for many wireless applications where portable devices or sensors need to reduce their computation as much as possible due to battery power limitations. Easily combined with any key-tree-based schemes, this scheme provides much lower computation complexity while maintaining low and balanced communication complexity and storage complexity for secure dynamic multicast key distribution.

Index Terms

Key distribution, multicast, MDS codes, erasure decoding, computation complexity.


IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 20, NO. 6, JUNE 2008

AN EFFICIENT CLUSTERING SCHEME TO EXPLOIT HIERARCHICAL DATA IN NETWORK TRAFFIC ANALYSIS

There is significant interest in the data mining and network management communities about the need to improve existing techniques for clustering multivariate network traffic flow records so that we can quickly infer underlying traffic patterns.

In this paper, we investigate the use of clustering techniques to identify interesting traffic patterns from network traffic data in an efficient manner.

We develop a framework to deal with mixed type attributes including numerical, categorical, and hierarchical attributes for a one-pass hierarchical clustering algorithm.

We demonstrate the improved accuracy and efficiency of our approach in comparison to previous work on clustering network traffic.

Index Terms

Traffic analysis, network management, network monitoring, clustering, classification and association rules, hierarchical clustering.


A SURVEY OF LEARNING-BASED TECHNIQUES OF EMAIL SPAM FILTERING - 2008

Email spam is one of the major problems of the today’s Internet, bringing financial damage to companies and annoying individual users. Among the approaches developed to stop spam, filtering is an important and popular one.

In this paper we give an overview of the state of the art of machine learning applications for spam filtering, and of the ways of evaluation and comparison of different filtering methods.

We also provide a brief description of other branches of anti-spam protection and discuss the use of various approaches in commercial and noncommercial anti-spam software solutions


BOTMINER: CLUSTERING ANALYSIS OF NETWORK TRAFFIC FOR PROTOCOL- AND STRUCTURE-INDEPENDENT BOTNET DETECTION

Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of the current botnet detection approaches work only on specific botnet command and control (C&C) protocols (e.g., IRC) and structures (e.g., centralized), and can become ineffective as botnets change their C&C techniques.

In this paper, we present a general detection framework that is independent of botnet C&C protocol and structure, and requires no a priori knowledge of botnets (such as captured bot binaries and hence the botnet signatures, and C&C server names/addresses).

We start from the definition and essential properties of botnets. We define a botnet as a coordinated group of malware instances that are controlled via C&C communication channels. The essential properties of a botnet are that the bots communicate with some C&C servers/peers, perform malicious activities, and do so in a similar or correlated way.

Accordingly, our detection framework clusters similar communication traffic and similar malicious traffic, and performs cross cluster correlation to identify the hosts that share both similar communication patterns and similar malicious activity patterns. These hosts are thus bots in the monitored network.

We have implemented our BotMiner prototype system and evaluated it using many real network traces. The results show that it can detect real-world botnets (IRC-based, HTTP-based, and P2P botnets including Nugache and Storm worm), and has a very low false positive rate.


IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1,

FEBRUARY 2008

DUAL-LINK FAILURE RESILIENCY THROUGH BACKUP LINK MUTUAL EXCLUSION

Networks employ link protection to achieve fast recovery from link failures. While the first link failure can be protected using link protection, there are several alternatives for protecting against the second failure.

This paper formally classifies the approaches to dual-link failure resiliency. One of the strategies to recover from dual-link failures is to employ link protection for the two failed links independently, which requires that two links may not use each other in their backup paths if they may fail simultaneously.

Such a requirement is referred to as backup link mutual exclusion (BLME) constraint and the problem of identifying a backup path for every link that satisfies the above requirement is referred to as the BLME problem.

This paper develops the necessary theory to establish the sufficient conditions for existence of a solution to the BLME problem. Solution methodologies for the BLME problem is developed using two approaches by:

1) formulating the backup path selection as an integer linear program;

2) developing a polynomial time heuristic based on minimum cost path routing.

The ILP formulation and heuristic are applied to six networks and their performance is compared with approaches that assume precise knowledge of dual-link failure. It is observed that a solution exists for all of the six networks considered. The heuristic approach is shown to obtain feasible solutions that are resilient to most dual-link failures, although the backup path lengths may be significantly higher than optimal. In addition, the paper illustrates the significance of the knowledge of failure location by illustrating that network with higher connectivity may require lesser capacity than one with a lower connectivity to recover from dual-link failures.

Index Terms

Backup link mutual exclusion, dual-link failures, link protection, optical networks.


IEEE TRANSACTIONS ON NEURAL NETWORKS,
VOL. 20, NO. 3, MARCH 2009

ADAPTIVE NEURAL NETWORK TRACKING CONTROL OF MIMO NONLINEAR SYSTEMS WITH UNKNOWN DEAD ZONES AND CONTROL DIRECTIONS

In this paper, adaptive neural network (NN) tracking control is investigated for a class of uncertain multiple-input–multiple- output (MIMO) nonlinear systems in triangular control structure with unknown nonsymmetric dead zones and control directions.

The design is based on the principle of sliding mode control and the use of Nussbaum-type functions in solving the problem of the completely unknown control directions. It is shown that the dead-zone output can be represented as a simple linear system with a static time-varying gain and bounded disturbance by introducing characteristic function.

By utilizing the integral-type Lyapunov function and introducing an adaptive compensation term for the upper bound of the optimal approximation error and the dead-zone disturbance, the closed-loop control system is proved to be semiglobally uniformly ultimately bounded, with tracking errors converging to zero under the condition that the slopes of unknown dead zones are equal. Simulation results demonstrate the effectiveness of the approach.

Index Terms

Adaptive control, dead zone, neural network (NN) control, Nussbaum function, sliding mode control.


A FRAMEWORK FOR THE CAPACITY EVALUATION OF MULTIHOP WIRELESS NETWORKS, 2009

The specific challenges of multihop wireles networks lead to a strong research effort on efficient protocols design where the offered capacity is a key objective. More specifically, routing strategy largely impacts the network capacity, i.e. the throughput offered to each flow.

In this work, we propose a complete framework to compute the upper and the lower bounds of the network capacity according to a physical topology and a given routing protocol. The radio resource sharing principles of CSMA-CA is modeled as a set of linear constraints with two models of fairness. The first one assumes that nodes have a fair access to the channel, while the second one assumes that on the radio links.

We then develop a pessimistic and an optimistic scenarios for radio resource sharing, yielding a lower bound and an upper bound on the network capacity for each fairness case. Our approach is independent of the network topology and the routing protocols, and provides therefore a relevant framework for their comparison.

We apply our models to a comparative analysis of a well-known flat routing protocol OLSR against two main self-organized structure approaches, VSR and localized CDS.

Index Terms

Network capacity, multihop wireless networks, upper and lower bounds, linear programing


IEEE TRANSACTIONS ON BROADCASTING, VOL. 55, NO. 2, JUNE 2009

CONTINUOUS FLOW WIRELESS DATA BROADCASTING FOR HIGH-SPEED ENVIRONMENTS

With the increasing popularity of wireless networks and mobile computing, data broadcasting has emerged as an efficient way of delivering data to mobile clients having a high degree of commonality in their demand patterns.

This paper proposes an adaptive wireless push system that operates efficiently in environments characterized by high broadcasting speeds and a-priori unknown client demands for data items.

The proposed system adapts to the demand pattern of the client population in order to reflect the overall popularity of each data item.

We propose a method for feedback collection by the server so that the client population can enjoy a performance increase in proportion to the broadcasting speed used by the server.

Simulation results are presented which reveal satisfactory performance in environments with a-priori unknown client demands and under various high broadcasting speeds.

Index Terms

Adaptive systems, data broadcasting, high-speed, learning automata.

DYNAMIC AND AUTO RESPONSIVE SOLUTION FOR DISTRIBUTED DENIAL-OF-SERVICE ATTACKS DETECTION IN ISP NETWORK, 2009

Denial of service (DoS) attacks and moreparticularly the distributed ones (DDoS) are one of the latestthreat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks.

This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network.

For this, a newly designed flow-volume based approach (FVBA) is used to construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic goes out of profile. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and attack loads in real time.

Six-sigma method is used to identify threshold values accurately for malicious flows haracterization. FVBA has been extensively evaluated in a controlled test-bed environment. Detection thresholds and efficiency is justified using receiver operating characteristics (ROC) curve.

For validation, KDD 99, a publicly available benchmark dataset is used. The results show that our proposed system gives a drastic improvement in terms of detection and false alarm rate.

Index Terms

Distributed Denial of Service Attacks, False Positives, False Negatives, ISP Network, Network Security


IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS,
VOL. 8, NO. 2, FEBRUARY 2009

Efficient Multi-Party Digital Signature using Adaptive Secret Sharing for Low-Power Devices in Wireless Networks

In this paper, we propose an efficient multi-party signature scheme for wireless networks where a given number of signees can jointly sign a document, and it can be verified by any entity who possesses the certified group public key.

Our scheme is based on an efficient threshold key generation scheme which is able to defend against both static and adaptive adversaries. Specifically, our key generation method employs the bit commitment technique to achieve efficiency in key generation and share refreshing; our share refreshing method provides proactive protection to long-lasting secret and allows a new signee to join a signing group.

We demonstrate that previous known approaches are not efficient in wireless networks, and the proposed multi-party signature scheme is exible, efficient, and achieves strong security for low-power devices in wireless networks.

Index Terms

Multi-party signature, distributed key generation, elliptic curve cryptosystems.


GUARANTEED DELIVERY FOR GEOGRAPHICAL ANYCASTING IN WIRELESS MULTI-SINK SENSOR AND SENSOR-ACTOR NETWORKS

In the anycasting problem, a sensor wants to report event information to one of sinks or actors. We describe the first localized anycasting algorithms that guarantee delivery for connected multi-sink sensor-actor networks.

Let S(x) be the closest actor/sink to sensor x, and |xS(x)| be distance between them. In greedy phase, a node s forwards the packet to its neighbor v that minimizes the ratio of cost cost(|sv|) of sending packet to v (here we specifically apply hop-count and power consumption metrics) over the reduction in distance (|sS(s)|−|vS(v)|) to the closest actor/sink.

A variant is to forward to the first neighbor on the shortest weighted path toward v. If none of neighbors reduces that distance then recovery mode is invoked. It is done by face traversal toward the nearest connected actor/sink, where edges are replaced by paths optimizing given cost.

A hop count based and two variants of localized power aware anycasting algorithms are described. We prove guaranteed delivery property analytically and experimentally


IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. ?, NO. ?, 1

HIERARCHICAL BAYESIAN SPARSE IMAGE RECONSTRUCTION WITH APPLICATION TO MRFM

This paper presents a hierarchical Bayesian model to reconstruct sparse images when the observations are obtained from linear transformations and corrupted by an additive white Gaussian noise.

Our hierarchical Bayes model is well suited to such naturally sparse image applications as it seamlessly accounts for properties such as sparsity and positivity of the image via appropriate Bayes priors. We propose a prior that is based on a weighted mixture of a positive exponential distribution and a mass at zero.

The prior has hyperparameters that are tuned automatically by marginalization over the hierarchical Bayesian model. To overcome the complexity of the posterior distribution, a Gibbs sampling strategy is proposed. The Gibbs samples can be used to estimate the image to be recovered, e.g. by maximizing the estimated posterior distribution.

In our fully Bayesian approach the posteriors of all the parameters are available. Thus our algorithm provides more information than other previously proposed sparse reconstruction methods that only give a point estimate.

The performance of the proposed hierarchical Bayesian sparse reconstruction method is illustrated on synthetic data and real data collected from a tobacco virus sample using a prototype MRFM instrument.

Index Terms

Deconvolution, MRFM imaging, sparse representation, Bayesian inference, MCMC methods


IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 31, NO. 2, FEBRUARY 2009

OFFLINE LOOP INVESTIGATION FOR HANDWRITING ANALYSIS

Study of Rough Set and Clustering Algorithm in Network Security Management Getting a better grasp of computer network security is of great significance to protect the normal operation of network system.

Based on rough set (RS), clustering model, security features reduction and clustering algorithm are presented, which provides a basis of network security strategies. Further research is to mine and process the dynamic risks and management of network security. Using the reduction methods, the simplified network security assessment data set is established.

The extraction by the decision-making rules is proposed and verified. Through the results, it is concluded that the method could be in line with the actual situation of decision-making rules.

Keywords

RS, clustering algorighm, network security, K-W method


IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS,

VOL. 8, NO. 5, MAY 2009

HIGH PERFORMANCE COOPERATIVE TRANSMISSION PROTOCOLS BASED ON MULTIUSER DETECTION AND NETWORK CODING

Cooperative transmission is an emerging communication technique that takes advantage of the broadcast nature of wireless channels. However, due to low spectral efficiency and the requirement of orthogonal channels, its potential for use in future wireless networks is limited.

In this paper, by making use of multi-user detection (MUD) and network coding, cooperative transmission protocols with high spectral efficiency, diversity order, and coding gain are developed.

Compared with the traditional cooperative transmission protocols with single user detection, in which the diversity gain is only for one source user, the proposed MUD cooperative transmission protocols have the merit that the improvement of one user’s link can also benefit the other users.

In addition, using MUD at the relay provides an environment in which network coding can be employed. The coding gain and high diversity order can be obtained by fully utilizing the link between the relay and the destination.

From the analysis and simulation results, it is seen that the proposed protocols achieve higher diversity gain, better asymptotic efficiency, and lower bit error rate, compared to traditional MUD schemes and to existing cooperative transmission protocols.

From the simulation results, the performance of the proposed scheme is near optimal as the performance gap is 0.12dB for average bit error rate (BER) 10 −6 and 1.04dB for average BER 10 −3, compared to two performance upper bounds.

Index Terms

Detection, coding, communication networks, and cooperative systems.


IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS

VOL. 8, NO. 2, FEBRUARY 2009

NOVEL PACKET-LEVEL RESOURCE ALLOCATION WITH EFFECTIVE QOS PROVISIONING FOR WIRELESS MESH NETWORKS

Joint power-subcarrier-time resource allocation is imperative for wireless mesh networks due to the necessity of packet scheduling for quality-of-service (QoS) provisioning, multi-channel communications, and opportunistic power allocation.

In this work, we propose an efficient intra-cluster packet-level resource allocation approach. Our approach takes power allocation, subcarrier allocation, packet scheduling, and QoS support into account.

The proposed approach combines the merits of a Karush-Kuhn-Tucker (KKT)-driven approach and a genetic algorithm (GA)-based approach.

It is shown to achieve a desired balance between time complexity and system performance. Bounds for the throughputs obtained by real-time and non-real-time traffic are also derived analytically.

Index Terms

Genetic algorithm (GA), Karush-Kuhn-Tucker (KKT), quality-of-service (QoS) provisioning, resource allocation, wireless mesh network (WMN).


IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS,

VOL. 8, NO. 2, FEBRUARY 2009

MULTI-SERVICE LOAD SHARING FOR RESOURCE MANAGEMENT IN THE CELLULAR/WLAN INTEGRATED NETWORK

With the interworking between a cellular network and wireless local area networks (WLANs), an essential aspect of resource management is taking advantage of the overlay network structure to efficiently share the multi-service traffic load between the interworked systems.

In this study, we propose a new load sharing scheme for voice and elastic data services in a cellular/WLAN integrated network. Admission control and dynamic vertical handoff are applied to pool the free bandwidths of the two systems to effectively serve elastic data traffic and improve the multiplexing gain.

To further combat the cell bandwidth limitation, data calls in the cell are served under an efficient service discipline, referred to as shortest remaining processing time (SRPT) [1]. The SRPT can well exploit the heavy-tailedness of data call size to improve the resource utilization.

An accurate analytical model is developed to determine an appropriate size threshold so that data calls are properly distributed to the integrated cell and WLAN, taking into account the load conditions and traffic characteristics.

It is observed from extensive simulation and numerical analysis that the new scheme significantly improves the overall system performance.

Index Terms

Cellular/WLAN interworking, resource management, quality of service, load sharing, vertical handoff, admission control.


SOBIE:A NOVEL SUPER-NODE P2P OVERLAY BASED ON INFORMATION EXCHANGE

In order to guarantee both the efficiency and robustness in the Peer-to-Peer (P2P) network, the paper designs a novel Super-node Overlay Based on Information Exchange called SOBIE.

Differing from current structured and unstructured, or meshed and tree-like P2P overlay, the SOBIE is a whole new structure to improve the efficiency of searching in the P2P network.

The main contributions are

1) to select the super-nodes by considering the aggregation of not only the delay, distance, but also the information exchange frequency, exchange time and query similarity especially;

2) to set a score mechanism to identify and prevent the free-riders. Meanwhile, the SOBIE also guarantees the matching between the physical network and logical network and has small-world characteristic to improve the efficiency.

Large number of experiment results show the advantages of the SOBIE including high efficiency and robustness by such different factors as the query success rate, the average query hops, the total number of query messages, the coverage rate and system connectivity.

Index Terms

P2P overlay, super node, information exchange, topology matching, free-ridding


AD HOC NETWORKS (ELSEVIER), VOL. 7, NO. 5, PP. 862-881, JULY 2009

OPTIMAL BACKPRESSURE ROUTING FOR WIRELESS NETWORKS WITH MULTI-RECEIVER DIVERSITY

We consider the problem of optimal scheduling and routing in an ad-hoc wireless network with multiple traffic streams and time varying channel reliability.

Each packet transmission can be overheard by a subset of receiver nodes, with a transmission success probability that may vary from receiver to receiver and may also vary with time. We develop a simple backpressure routing algorithm that maximizes network throughput and expends an average power that can be pushed arbitrarily close to the minimum average power required for network stability, with a corresponding tradeoff in network delay.

When channels are orthogonal, the algorithm can be implemented in a distributed manner using only local link error probability information, and supports a “blind transmission” mode (where error probabilities are not required) in special cases when the power metric is neglected and when there is only a single destination for all traffic streams.

For networks with general inter-channel interference, we present a distributed algorithm with constant-factor optimality guarantees.

Index Terms

Broadcast advantage, distributed algorithms, dynamic control, mobility, queueing analysis, scheduling


IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. X, XXXXXX 2009

RANDOMCAST: AN ENERGY-EFFICIENT COMMUNICATION SCHEME FOR MOBILE AD HOC NETWORKS

In mobile ad hoc networks (MANETs), every node overhears every data transmission occurring in its vicinity and thus, consumes energy unnecessarily. In IEEE 802.11 Power Saving Mechanism (PSM), a packet must be advertised before it is actually transmitted.

When a node receives an advertised packet that is not destined to itself, it switches to a low-power sleep state during the data transmission period, and thus, avoids overhearing and conserves energy. However, since some MANET routing protocols such as Dynamic Source Routing (DSR) collect route information via overhearing, they would suffer if they are used in combination with 802.11 PSM.

Allowing no overhearing may critically deteriorate the performance of the underlying routing protocol, while unconditional overhearing may offset the advantage of using PSM. This paper proposes a new communication mechanism, called RandomCast, via which a sender can specify the desired level of overhearing, making a prudent balance between energy and routing performance.

In addition, it reduces redundant rebroadcasts for a broadcast packet, and thus, saves more energy. Extensive simulation using ns-2 shows that RandomCast is highly energy-efficient compared to conventional 802.11 as well as 802.11 PSM-based schemes, in terms of total energy consumption, energy goodput, and energy balance.

Index Terms

Energy balance, energy efficiency, mobile ad hoc networks, network lifetime, overhearing, power saving mechanism.


IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 6, JUNE 2009

ADAPTIVE FUZZY FILTERING FOR ARTIFACT REDUCTIONIN COMPRESSED IMAGES AND VIDEOS

A fuzzy filter adaptive to both sample’s activity and the relative position between samples is proposed to reduce the artifacts in compressed multidimensional signals.

For JPEG images, the fuzzy spatial filter is based on the directional characteristics of ringing artifacts along the strong edges. For compressed video sequences, the motion compensated spatiotemporal filter (MCSTF) is applied to intraframe and interframe pixels to deal with both spatial and temporal artifacts.

A new metric which considers the tracking characteristic of human eyes is proposed to evaluate the flickering artifacts.

Simulations on compressed images and videos show improvement in artifact reduction of the proposed adaptive fuzzy filter over other conventional spatial or temporal filtering approaches.

Index Terms

Artifact reduction, flickering metric, fuzzy filter, motion compensated spatio-temporal filter.