Catálogo de publicaciones - libros

Compartir en
redes sociales


Innovations and Advanced Techniques in Computer and Information Sciences and Engineering

Tarek Sobh (eds.)

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Circuits and Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-1-4020-6267-4

ISBN electrónico

978-1-4020-6268-1

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer 2007

Cobertura temática

Tabla de contenidos

Using Service-oriented Architectures towards Rights Management interoperability

Carlos Serrao; Miguel Dias; Jaime Delgado

— In a World where all forms of digital content are growing at an increasing rate, there are some issues that need to be addressed. Intellectual Property Rights (IPR) is one of the most crucial and important one. If in the analogue World the IPR issues are addressed in a fairly well manner, the same doesn’t apply to the digital one. Users are permanently confronted with this important dilemma – to be or not to be a pirate. The choice is not obvious or trivial because it implies choosing between something which freely available on a P2P network or opting by paying an amount of money to get the same content, that is protected and won’t work everywhere. In this paper, we will provide some information about the problems arising from the fact that protected content has obtrusive limitations and we will present part of a solution that can be used to address the DRM interoperability problems based on Service-oriented architectures.

Pp. 519-524

Corrective Actions at the Application Level for Streaming Video in WiFi Ad Hoc Networks

E. M. Macías; A. Suárez; J. Martín

—Efficient video streaming in a mobile ad hoc network (MANET) is a challenging problem due to the dynamic nature of the network that leads to high bit error rates, unpredictable delay, jitter, throughput and packet delivery ratios and frequent short, intermittent and long-term link failures. Despite the MANET research community’s efforts, there are still open problems. For example, protocols and mechanisms that hide these issues to the video streaming applications users are still in early stages. However, these applications must tolerate transparently the dynamic behavior of the network and be able to progress in presence of disconnections. In practice, this is the exception rather the rule. In this paper, we present a multilayer cooperative solution to detect disconnections and reconnections between a video streaming server and a client and we propose corrective actions at the application level. With our transparent approach to the user, the video streaming sessions can tolerate frequent long and short disconnections and use more efficiently the shared wireless bandwidth.

Pp. 525-530

Visual Data Mining of Log Files

Guillermo III Francia; Monica Trifas; Dorothy Brown; Rahjimao Francia; Chrissy Scott

Data mining is based on a simple analogy. The growth of data warehousing has created mountains of data. The mountains represent a valuable resource to the enterprise. But to extract value from these mountains, we must “mine” for the gold in data warehouses and data marts. Everywhere that there are data warehouses, data mines are also constructed. Data visualization has the ability to present a great deal of information in a user friendly format. It is well known that humans comprehend visual information much quicker and more efficiently than verbal information. “A picture is worth a thousand words.” Successful visualizations can reduce the time it takes to get the information, make sense out of it, and enhance creative thinking. Great strides have been made in the area of computer generated data visualizations in recent years. This paper discusses visual data mining techniques for analyzing real forensic data.

Pp. 531-535

ITS: A DDoS Mitigating Architecture

Hikmat Farhat

We propose a DDoS mitigation architecture that protects legitimate traffic from the large volume of malicious packets during a DDoS bandwidth attack. The system keeps a legitimacy list and gives higher priority to those packets that are on the list. The legitimacy list is kept up to date by keeping only the entries that complete the TCP three-way handshake and thus defeats IP spoofing. Entries in the list contain the IP address and the path signature of active TCP connections. A packet obtains high priority if its path signature strongly correlates with the corresponding path signature stored in the legitimacy list. We show that the scheme is efficient when deployed incrementally by using priority queuing at perimeter routers. An autonomous system (AS) can immediately benefit from our proposed system when deployed even if other ASs do not deploy it.

Pp. 537-541

Strong Designated Verifier Ring Signature Scheme

Ji-Seon Lee; Jik Hyun Chang

In this paper, we propose a strong designated verifier ring signature scheme and discuss its security properties. The proposed scheme provides a way that leaks authoritative secrets to only a designated person anonymously by one of the group members and no one knows that the secret is from a group member or the recipient, except the recipient. This group is called a ring. We also propose a strong designated verifier ring signature with message recovery mechanism.

Pp. 543-547

Performance of Enhanced Distance Vector Multipath Routing

Kanwalinder Jit Kaur; Dr Jyotsna Sengupta

In this paper, a new algorithm named Enhanced Distance Vector routing algorithm has been developed to make the existing distance vector routing secure. This algorithm has been extended to multipath routing to make multipath data transmission secure. The performance of this algorithm has been found out by using simulation environment of ns-2 . The results show that multipath Enhanced Distance Vector performs better than single path Enhanced Distance Vector in terms of throughput by 10 times better and cumulative distribution better by about 46%.

Pp. 549-552

Coded 4-PAM OFDM for High Rate Data Links

M.A Nasr; Heba A Shaban; M.A Mangoud

Orthogonal Frequency Division Multiplexing (OFDM) is one of the best solutions for wideband communication applications. M-ary PAM – OFDM achieves comparable power and bandwidth efficiencies with less system complexity to ordinary OFDM systems that use M-ary QAM or M-ary PSK. Basically, OFDM is sensitive to Carrier Frequency Offset (CFO) and to phase noise. Performance evaluation of M-ary PAM OFDM over AWGN impaired with CFO and white phase noise is investigated in this paper with simulation. Also, the coded 4-PAM OFDM is proposed and its performance is evaluated over AWGN impaired with CFO and phase noise with simulation in comparison with un-coded 4-PAM OFDM.

Pp. 553-556