Identifier

View this topic in
An artificially generated or natural feature used to disambiguate things from each other. There can be several IDs for the same Physical Entity. This set of IDs is an attribute of a physical entity. (Wikipedia.org)






Conferences related to Identifier

Back to Top

2023 Annual International Conference of the IEEE Engineering in Medicine & Biology Conference (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.


ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting

The joint meeting is intended to provide an international forum for the exchange of information on state of the art research in the area of antennas and propagation, electromagnetic engineering and radio science


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC)

All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation


More Conferences

Periodicals related to Identifier

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Circuits and Systems I: Regular Papers, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Circuits and Systems II: Express Briefs, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


More Periodicals

Most published Xplore authors for Identifier

Back to Top

Xplore Articles related to Identifier

Back to Top

Network Access Control Mechanism Based on Locator/Identifier Split

2009 IEEE International Conference on Networking, Architecture, and Storage, 2009

Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. ldquolocator/identifier splitrdquo has made it possible to build a network access control mechanism based on the permanent identifier. With the support of ldquolocator/identifier splitrdquo routing and addressing concept, the identifier-based access control (IBAC) makes network access control ...


CIDMS: A security connection identifier mapping system for Universal Network

2011 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2011), 2011

The identifier split is a design principle for new Internet architectures such as Universal Network, Lisp, which make Internet more scalable, reliable and security. One important form of identifier split in Universal Network is connection identifier/access identifier (CID/AID) split which is introduced to improve security isolation during communication. Using CID/AID split, terminals communicate with each other without knowledge of the ...


Dealing With Mobility-Caused Outdated Mappings in Networks With Identifier/Locator Separation

IEEE Transactions on Emerging Topics in Computing, 2016

In networks with identifier/locator separation, packets from a source to a destination are generally tunneled from the source's ingress tunnel router (ITR) to the destination's egress tunnel router (ETR). In addition, the source's ITR often caches the destination's identifier-to-locator mapping for a certain duration, called cache timeout, in order to avoid frequently querying mapping servers. When the destination moves from ...


The applied research on power telecommunication identifier management system based on QR code

2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2017

Power Telecommunication identifier is the basic data in electric power IoT. The accuracy of the telecommunication identifier and the consistency of the site data and system data are crucially important. It's the basis to guarantee the electric power telecommunication network working smoothly. Nowadays, it's a common method for electric power company to manage the telecommunication identifier by using Excel to ...


BILM: A novel BGP-based identifier-to-locator mapping approach

2010 2nd IEEE International Conference on Information Management and Engineering, 2010

The poor scalability is one of the most serious problems restricting the development of the Internet. In the series of solutions, identifier/locator separation technology is a great prospect and has been the mainstream of designs. However, how to design a system to distribute and update identifier- to-locator mapping information effectively in scope of the whole Internet is also a key ...


More Xplore Articles

Educational Resources on Identifier

Back to Top

IEEE-USA E-Books

  • Network Access Control Mechanism Based on Locator/Identifier Split

    Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. ldquolocator/identifier splitrdquo has made it possible to build a network access control mechanism based on the permanent identifier. With the support of ldquolocator/identifier splitrdquo routing and addressing concept, the identifier-based access control (IBAC) makes network access control more accurate and efficient, and fits for mobile nodespsila access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet senderpsilas identity without the third part authentication, which greatly reduces the probability of ldquoidentifier spoofingrdquo.

  • CIDMS: A security connection identifier mapping system for Universal Network

    The identifier split is a design principle for new Internet architectures such as Universal Network, Lisp, which make Internet more scalable, reliable and security. One important form of identifier split in Universal Network is connection identifier/access identifier (CID/AID) split which is introduced to improve security isolation during communication. Using CID/AID split, terminals communicate with each other without knowledge of the opponent's access identifier, so as to eliminate targeted attacks such as denial-of- service attack. This spit relies on a mapping system to resolve a flat connection identifier that identifies a session to one or several appropriate access identifiers in response to mapping requests for specific connection identifier. In this paper we present a secure CID/AID split mechanism and its corresponding mapping system: CIDMS. We also present simulations of mapping system's performance, evaluate its resolution delay and scalability.

  • Dealing With Mobility-Caused Outdated Mappings in Networks With Identifier/Locator Separation

    In networks with identifier/locator separation, packets from a source to a destination are generally tunneled from the source's ingress tunnel router (ITR) to the destination's egress tunnel router (ETR). In addition, the source's ITR often caches the destination's identifier-to-locator mapping for a certain duration, called cache timeout, in order to avoid frequently querying mapping servers. When the destination moves from an old ETR to a new one, its identifier-to-locator mapping changes accordingly, which makes the destination's identifier-to-locator mapping cached at some ITRs outdated. While several approaches have been proposed to address this issue, they either cannot deal with all types of outdated mappings cached at the ITRs or face the triangular routing problem. Accordingly, in this paper, we propose a timer- based pointer forwarding (TBPF) approach that can deal with all types of outdated mappings and avoid the triangular routing problem. We present numerical results to compare TBPF with existing approaches and show that TBPF is a very promising solution for dealing with outdated mappings.

  • The applied research on power telecommunication identifier management system based on QR code

    Power Telecommunication identifier is the basic data in electric power IoT. The accuracy of the telecommunication identifier and the consistency of the site data and system data are crucially important. It's the basis to guarantee the electric power telecommunication network working smoothly. Nowadays, it's a common method for electric power company to manage the telecommunication identifier by using Excel to save data and FTP to transmit in China. The accuracy, real-time and security of data exists hidden risks. Aiming at the problems above, this project establishes a telecommunication identifier database management mode and develops a telecommunication identifier management system based on QR code technology, which can guarantee the site date and system database synchronization. The major work of this paper including: the background of the Power Company identifier management; introducing the QR code technology and designing a power telecommunication tag base on QR code; designing and implementing the power telecommunication identifier management system; finally introducing the system security mechanism.

  • BILM: A novel BGP-based identifier-to-locator mapping approach

    The poor scalability is one of the most serious problems restricting the development of the Internet. In the series of solutions, identifier/locator separation technology is a great prospect and has been the mainstream of designs. However, how to design a system to distribute and update identifier- to-locator mapping information effectively in scope of the whole Internet is also a key issue not solved perfectly. In this article, we propose a novel identifier-to-locator mapping approach (called as BILM) by extending the border gateway protocol (BGP). Comparing with current schemes, BILM is déployable and operable. We also implement BILM in ns2 and the results of our simulation show that: BILM has good convergence and can make the identifier- to-locator mapping information synchronized quickly.

  • Security analysis of m-to-n mapping against eavesdropping in identifier-based universal network

    It is commonly recognized that the dual semantics of IP address has brought about serious scaling and security problems in today's Internet. Aiming at addressing these problems, several recent researches propose identifier-based universal network to replace the IP namespace with an identity namespace and a locator namespace. In this architecture, it successfully introduces the mapping idea to accomplish m-to-n mapping between Access IDentifier (AID) and Routing IDentifier (RID). By the use of attack graph, this paper presents a comparative analysis against eavesdropping between today's Internet and identifier-based universal network. From the security analysis we can generalize a conclusion that identifier-based universal network with m-to-n mapping is significantly superior to today's Internet for defending eavesdropping.

  • A Framework for Identifier-Based Routing for Future Internet

    The current routing system has been facing serious scalability problem, mobility supporting issue, multi-homing and traffic engineering supporting issue, and provider lock-in problem. Locator/identifier split idea is considered as a promising way to solve the mentioned issue. However, how to design a proper framework for identifier-based routing in the locator/identifier split context is still an unresolved problem. In this paper, we present a scalable and secure framework to tackle the above problem. There are three main contributions of our work. First, we analyze the design challenges in detail. Second, we propose a novel routing framework for future Internet, including the design schemes of main components. Third, we adopt some approaches to enhance the security and improve the lookup efficiency.

  • IEEE Standard for Wireless Access in Vehicular Environments (WAVE) - Identifier Allocations

    Wireless Access in Vehicular Environments (WAVE) is specified in the IEEE 1609 family of standards, within which a number of identifiers are used. The use of these identifiers is described, identifier values that have been allocated for use by WAVE systems are indicated, and the allocation of values of identifiers specified in the WAVE standards is specified.

  • INVocD: Identifier name vocabulary dataset

    INVocD is a database of the identifier name declarations and vocabulary found in 60 FLOSS Java projects where the source code structure is recorded and the identifier name vocabulary is made directly available, offering advantages for identifier name research over conventional source code models. The database has been used to support a range of research projects from identifier name analysis to concept location, and provides many opportunities to researchers. INVocD may be downloaded from http://oro.open.ac.uk/36992.

  • Mining Java class identifier naming conventions

    Classes represent key elements of knowledge in object-orientated source code. Class identifier names describe the knowledge recorded in the class and, much of the time, record some detail of the lineage of the class. We investigate the structure of Java class names identifying common patterns of naming and the way components of class identifier names are repeated in inheritance hierarchies. Detailed knowledge of class identifier name structures can be used to improve the accuracy of concept location tools, to support reverse engineering of domain models and requirements traceability, and to support development teams through class identifier naming recommendation systems.



Standards related to Identifier

Back to Top

IEEE Recommended Practice for System Identification in Nuclear Power Plants and Related Facilities


IEEE Recommended Practice for Unique Identification in Power Plants and Related Facilities--Component Function Identifiers


IEEE Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications

The project defines a standard for high-speed (>100 Mbps at the physical layer) communication devices via electric power lines, so-called broadband over power line (BPL) devices. This standard uses transmission frequencies below 100 MHz. It is usable by all classes of BPL devices, including BPL devices used for the first-mile/last-mile connection (<1500 m to the premise) to broadband services as ...


IEEE Standard for Data Delivery and Logical Channels for IEEE Std 1284 Interfaces

The packet protocol described by this standard allows a device to carry on multiple, concurrent exchanges of data and/or control information with another device across a single point-to-point link. the protocol is not a device control language. The protocol provides basic transportlevel flow control and multiplexing services. The multiplexed information exchanges are independent and blocking of one has no effect ...


IEEE Standard for Heterogeneous InterConnect (HIC), (Low-Cost, Low-Latency Scalable Serial Interconnect for Parallel System Construction)

Physical connectors and cables, electrical properties, and logical protocols for point to point serial scaleable interconnect, operating at speeds of 10-200 Mbit/sec and at 1 Gbit/sec in copper and optic technologies (as developed in Open Microprocessor systems Initiative/heterogeneous InterConnect Project (OMI/HIC).


More Standards