2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)最新文献

筛选
英文 中文
Adaptive Autonomous Agent Models for Open Distributed Systems 开放分布式系统的自适应自治Agent模型
S. Leriche, J. Arcangeli
{"title":"Adaptive Autonomous Agent Models for Open Distributed Systems","authors":"S. Leriche, J. Arcangeli","doi":"10.1109/ICCGI.2007.10","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.10","url":null,"abstract":"Currently, there is a lack of tools to build autonomous software systems in a pervasive and distributed context. In this paper, we present a model and a development tool called Agentphi for building flexible agent architectures from fine-grained components. Reusable components implement non-functional mechanisms such as communication, mobility or adaptation skills. Each agent can dynamically and autonomously change its components to suit its runtime context, improving safety and performances of applications, particularly in open, pervasive or large-scale distributed applications. We also show how to use our agents to build applications from autonomous and adaptable systems.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115388733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Research and Implementation of Design Pattern-Oriented Model Transformation 面向设计模式的模型转换研究与实现
Xue-Bin Wang, Quan-Yuan Wu, Huai-Min Wang, Dian-xi Shi
{"title":"Research and Implementation of Design Pattern-Oriented Model Transformation","authors":"Xue-Bin Wang, Quan-Yuan Wu, Huai-Min Wang, Dian-xi Shi","doi":"10.1109/ICCGI.2007.52","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.52","url":null,"abstract":"Design pattern describes a repeatedly presenting issue during software designing, as well the solution to it. Applying design pattern enables developers to reuse it to solve a specified designing issue. Applying and maintaining design pattern in models is a duplicating work. In order to automatically apply design patterns in models, we propose a design pattern oriented model transformation approach. In this paper, we designed a set of atom mappings and pattern mappings, as well the combination of them, the model transformation code template. Such a template can generate XSLT based model transformation code, and enable automatically applying design pattern in software models. A case study is provided to demonstrate our approach.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Secure Grid Information Service System 安全网格信息服务系统
Hongbin Cai, Fan Min, Qihe Liu, Chunlan Fang
{"title":"Secure Grid Information Service System","authors":"Hongbin Cai, Fan Min, Qihe Liu, Chunlan Fang","doi":"10.1109/ICCGI.2007.56","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.56","url":null,"abstract":"A Grid Information Service (GIS) stores information about the resources of a distributed computing environment and answers questions about it. Currently, no enough attention has been devoted to the security issue. We are developing SecureGIS, a new GIS pattern combining digital certificate with Universal Description, Discovery, and Integration (UDDI) and Role-Based Access Control (RBAC) technologies. SecureGIS checks user identity, confirms the authenticity of service information and ensures the privacy of private and/or secret grid services. Furthermore, since UDDI is adopted, grid service and web service information can be stored and managed in a unified manner.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122837144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Model for Quantifying Security Based on Services 基于服务的安全量化经验模型
E. Serrelis, N. Alexandris
{"title":"An Empirical Model for Quantifying Security Based on Services","authors":"E. Serrelis, N. Alexandris","doi":"10.1109/ICCGI.2007.14","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.14","url":null,"abstract":"This paper presents a novel approach for quantifying the security of specific services as well as that of a whole organisation. This is done by reducing the security of any service to five selected security factors which can be measured by posing questions with objective answers. The security of any specific service is the weighted average of those five factors, whereas the overall security is the weighted average of the services.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122902158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Strategy-Based Model for E-Government Planning 基于战略的电子政务规划模型
K. A. Shahkooh, A. Abdollahi
{"title":"A Strategy-Based Model for E-Government Planning","authors":"K. A. Shahkooh, A. Abdollahi","doi":"10.1109/ICCGI.2007.8","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.8","url":null,"abstract":"This paper reviews different models in e-government in order to determine important parameters for e-government strategic planning. Lack of appropriate strategies and planning are some of the main challenges in e-government. For developing of e-government in local and national level, appropriate national planning is important. This paper tries to present a strategy based model for e-government planning. A proposed model consists of different dimensions which are strategy, finance, data and information, management, legality, logistics, human resource, technical infrastructure, security, technology, culture and marketing.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126708842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Distributed Data Storage with Strong Offline Access Support 分布式数据存储,强大的离线访问支持
L. Hejtmánek, L. Matyska
{"title":"Distributed Data Storage with Strong Offline Access Support","authors":"L. Hejtmánek, L. Matyska","doi":"10.1109/ICCGI.2007.21","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.21","url":null,"abstract":"In this paper, we propose a distributed data storage framework that supports unrestricted offline access. The system does not explicitly distinguish between connected and disconnected states. Its design is based on a lock-free distributed framework that avoids update conflicts through file versioning. The feasibility of this framework is confirmed by a proof-of- concept implementation. We also demonstrate that the proposed lock-free replica synchronization algorithm scales well. A future work will include also direct support for non-versioned files.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129106594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Fast Handover Algorithm Based on HMIPv6 一种改进的HMIPv6快速切换算法
Song Jian, Bao-jie Zhang, Sun Wei, Che Rong, Yu Yong
{"title":"An Improved Fast Handover Algorithm Based on HMIPv6","authors":"Song Jian, Bao-jie Zhang, Sun Wei, Che Rong, Yu Yong","doi":"10.1109/ICCGI.2007.15","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.15","url":null,"abstract":"In the next generation Internet and cell networking, the mobility based on IPv6 is meant to be key technology and application. This paper analyses the mobile IPv6 and existing improved mobile IPv6, with the drawbacks showed. By study on hierarchical mobile IPv6 and the nodes' mobility and service characters, a new improved MAP choice scheme is proposed and the multicast mechanism is introduced to macro/micro mobility management. And by comparing the proposed algorithm with current HMIPv6, the excellent performance, for instance, less frequency of macro-mobility handover and more reliable communication, is showed at last.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Pattern Language for Identity Management 身份管理的模式语言
N. Delessy, E. Fernández, M. Larrondo-Petrie
{"title":"A Pattern Language for Identity Management","authors":"N. Delessy, E. Fernández, M. Larrondo-Petrie","doi":"10.1109/ICCGI.2007.5","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.5","url":null,"abstract":"The development of software has recently changed significantly. With the ubiquity of computing, users may need to access a wider range of applications, which may not know them in advance. Thus there is a need for dynamic trust establishment and identity exchange protocols and whatever security model is used must support these aspects. As a way to make these concepts more precise and concrete, we define architectural patterns for identity management. These patterns can then be used directly in the software development cycle, as proposed by different methodologies. The Identity Provider pattern centralizes the administration of a security domain's subjects. The circle of trust pattern represents a federation of service providers that share trust relationships. The identity federation pattern allows to federate multiple identities across multiple organizations under a common identity. This pattern relies on the SAML assertion pattern, which provides a unifying format for communicating identity information between different security domains.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Adaptive Feature Learning for Information Pattern Recognition 信息模式识别的自适应特征学习
Hong Liang
{"title":"Adaptive Feature Learning for Information Pattern Recognition","authors":"Hong Liang","doi":"10.1109/ICCGI.2007.11","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.11","url":null,"abstract":"Adaptive feature learning is an effective method to explore the mechanism of information pattern recognition in information flow. This paper integrates the progresses of expert learning and artificial intelligence to propose a few new learning algorithms for pattern recognition in information flow. For solving high order matrix computing problem, this paper proposes an orthogonal transformation algorithm. For solving frequency modulation (FM) pattern recognition problem, this paper proposes a differential algorithm. For solving unknown pattern recognition in large scale information flow problem, this paper proposes inverse convolution algorithm and probability spectrum algorithm. These feature learning algorithms can extract and recognize pattern fast, efficiently and explicitly, even patterns are complex, confused and incomplete.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128855768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monitoring the Neighbor Discovery Protocol 监控邻居发现协议
Frédéric Beck, Thibault Cholez, O. Festor, Isabelle Chrisment
{"title":"Monitoring the Neighbor Discovery Protocol","authors":"Frédéric Beck, Thibault Cholez, O. Festor, Isabelle Chrisment","doi":"10.1109/ICCGI.2007.39","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.39","url":null,"abstract":"While IPv6 is increasingly being deployed in networks, including ISPs, the need to monitor and manage the associated protocols increases. In this paper we focus on the Neighbor Discovery Protocol and we motivate the importance to monitor it. We also present our approach for this task together with the functionalities we provide and the software, NDPMon, that we developed.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117339577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信