{"title":"Adaptive Autonomous Agent Models for Open Distributed Systems","authors":"S. Leriche, J. Arcangeli","doi":"10.1109/ICCGI.2007.10","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.10","url":null,"abstract":"Currently, there is a lack of tools to build autonomous software systems in a pervasive and distributed context. In this paper, we present a model and a development tool called Agentphi for building flexible agent architectures from fine-grained components. Reusable components implement non-functional mechanisms such as communication, mobility or adaptation skills. Each agent can dynamically and autonomously change its components to suit its runtime context, improving safety and performances of applications, particularly in open, pervasive or large-scale distributed applications. We also show how to use our agents to build applications from autonomous and adaptable systems.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115388733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xue-Bin Wang, Quan-Yuan Wu, Huai-Min Wang, Dian-xi Shi
{"title":"Research and Implementation of Design Pattern-Oriented Model Transformation","authors":"Xue-Bin Wang, Quan-Yuan Wu, Huai-Min Wang, Dian-xi Shi","doi":"10.1109/ICCGI.2007.52","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.52","url":null,"abstract":"Design pattern describes a repeatedly presenting issue during software designing, as well the solution to it. Applying design pattern enables developers to reuse it to solve a specified designing issue. Applying and maintaining design pattern in models is a duplicating work. In order to automatically apply design patterns in models, we propose a design pattern oriented model transformation approach. In this paper, we designed a set of atom mappings and pattern mappings, as well the combination of them, the model transformation code template. Such a template can generate XSLT based model transformation code, and enable automatically applying design pattern in software models. A case study is provided to demonstrate our approach.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Grid Information Service System","authors":"Hongbin Cai, Fan Min, Qihe Liu, Chunlan Fang","doi":"10.1109/ICCGI.2007.56","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.56","url":null,"abstract":"A Grid Information Service (GIS) stores information about the resources of a distributed computing environment and answers questions about it. Currently, no enough attention has been devoted to the security issue. We are developing SecureGIS, a new GIS pattern combining digital certificate with Universal Description, Discovery, and Integration (UDDI) and Role-Based Access Control (RBAC) technologies. SecureGIS checks user identity, confirms the authenticity of service information and ensures the privacy of private and/or secret grid services. Furthermore, since UDDI is adopted, grid service and web service information can be stored and managed in a unified manner.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122837144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Model for Quantifying Security Based on Services","authors":"E. Serrelis, N. Alexandris","doi":"10.1109/ICCGI.2007.14","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.14","url":null,"abstract":"This paper presents a novel approach for quantifying the security of specific services as well as that of a whole organisation. This is done by reducing the security of any service to five selected security factors which can be measured by posing questions with objective answers. The security of any specific service is the weighted average of those five factors, whereas the overall security is the weighted average of the services.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122902158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Strategy-Based Model for E-Government Planning","authors":"K. A. Shahkooh, A. Abdollahi","doi":"10.1109/ICCGI.2007.8","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.8","url":null,"abstract":"This paper reviews different models in e-government in order to determine important parameters for e-government strategic planning. Lack of appropriate strategies and planning are some of the main challenges in e-government. For developing of e-government in local and national level, appropriate national planning is important. This paper tries to present a strategy based model for e-government planning. A proposed model consists of different dimensions which are strategy, finance, data and information, management, legality, logistics, human resource, technical infrastructure, security, technology, culture and marketing.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126708842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Data Storage with Strong Offline Access Support","authors":"L. Hejtmánek, L. Matyska","doi":"10.1109/ICCGI.2007.21","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.21","url":null,"abstract":"In this paper, we propose a distributed data storage framework that supports unrestricted offline access. The system does not explicitly distinguish between connected and disconnected states. Its design is based on a lock-free distributed framework that avoids update conflicts through file versioning. The feasibility of this framework is confirmed by a proof-of- concept implementation. We also demonstrate that the proposed lock-free replica synchronization algorithm scales well. A future work will include also direct support for non-versioned files.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129106594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Song Jian, Bao-jie Zhang, Sun Wei, Che Rong, Yu Yong
{"title":"An Improved Fast Handover Algorithm Based on HMIPv6","authors":"Song Jian, Bao-jie Zhang, Sun Wei, Che Rong, Yu Yong","doi":"10.1109/ICCGI.2007.15","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.15","url":null,"abstract":"In the next generation Internet and cell networking, the mobility based on IPv6 is meant to be key technology and application. This paper analyses the mobile IPv6 and existing improved mobile IPv6, with the drawbacks showed. By study on hierarchical mobile IPv6 and the nodes' mobility and service characters, a new improved MAP choice scheme is proposed and the multicast mechanism is introduced to macro/micro mobility management. And by comparing the proposed algorithm with current HMIPv6, the excellent performance, for instance, less frequency of macro-mobility handover and more reliable communication, is showed at last.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Pattern Language for Identity Management","authors":"N. Delessy, E. Fernández, M. Larrondo-Petrie","doi":"10.1109/ICCGI.2007.5","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.5","url":null,"abstract":"The development of software has recently changed significantly. With the ubiquity of computing, users may need to access a wider range of applications, which may not know them in advance. Thus there is a need for dynamic trust establishment and identity exchange protocols and whatever security model is used must support these aspects. As a way to make these concepts more precise and concrete, we define architectural patterns for identity management. These patterns can then be used directly in the software development cycle, as proposed by different methodologies. The Identity Provider pattern centralizes the administration of a security domain's subjects. The circle of trust pattern represents a federation of service providers that share trust relationships. The identity federation pattern allows to federate multiple identities across multiple organizations under a common identity. This pattern relies on the SAML assertion pattern, which provides a unifying format for communicating identity information between different security domains.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Feature Learning for Information Pattern Recognition","authors":"Hong Liang","doi":"10.1109/ICCGI.2007.11","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.11","url":null,"abstract":"Adaptive feature learning is an effective method to explore the mechanism of information pattern recognition in information flow. This paper integrates the progresses of expert learning and artificial intelligence to propose a few new learning algorithms for pattern recognition in information flow. For solving high order matrix computing problem, this paper proposes an orthogonal transformation algorithm. For solving frequency modulation (FM) pattern recognition problem, this paper proposes a differential algorithm. For solving unknown pattern recognition in large scale information flow problem, this paper proposes inverse convolution algorithm and probability spectrum algorithm. These feature learning algorithms can extract and recognize pattern fast, efficiently and explicitly, even patterns are complex, confused and incomplete.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128855768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Frédéric Beck, Thibault Cholez, O. Festor, Isabelle Chrisment
{"title":"Monitoring the Neighbor Discovery Protocol","authors":"Frédéric Beck, Thibault Cholez, O. Festor, Isabelle Chrisment","doi":"10.1109/ICCGI.2007.39","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.39","url":null,"abstract":"While IPv6 is increasingly being deployed in networks, including ISPs, the need to monitor and manage the associated protocols increases. In this paper we focus on the Neighbor Discovery Protocol and we motivate the importance to monitor it. We also present our approach for this task together with the functionalities we provide and the software, NDPMon, that we developed.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117339577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}