2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)最新文献

筛选
英文 中文
RPB in Software Testing 软件测试中的RPB
Wei Hoo Chong
{"title":"RPB in Software Testing","authors":"Wei Hoo Chong","doi":"10.1109/ICCGI.2007.53","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.53","url":null,"abstract":"Software testing is one of the crucial activities in the system development life cycle. The purpose of testing can be quality assurance, verification and validation, or reliability estimation. In Motorolareg, Automation Testing is a methodology TM uses by GSG-iSGT (Global Software Group - iDENtrade Subcriber Group Testing) to increase the testing volume, productivity and reduce test cycle-time in cell phone software testing. In addition, automated stress testing can make the products become more robust before release to the market. In this paper, the author discuss one of the automation stress testing tools that iSGT use, which is RPB (Record and PlayBack). RPB is a platform specific desktop rapid test-case creation tool. This tool is able to capture all the information on the phone in order to have highest accurately in testing. Furthermore, RPB allows user to do testing at anytime, anywhere provided there is an Internet connection. The authors also discuss the value that automation has bought to iDENtrade phone testing together with the metrics. We will also look into the advantages of the proposed system and some discussion of the future work.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of SIPv6 Transitioning SIPv6转换的性能评估
T. Hoeher, M. Petraschek, S. Tomic, M. Hirschbichler
{"title":"Performance Evaluation of SIPv6 Transitioning","authors":"T. Hoeher, M. Petraschek, S. Tomic, M. Hirschbichler","doi":"10.1109/ICCGI.2007.49","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.49","url":null,"abstract":"Due to the continuous massive growth of the global Internet, available IPv4 network addresses will run out within the next years. The solution to this problem is the IPv6 protocol with its vast address space. During the transition period from IPv4 to IPv6, both protocols will coexist, which makes it necessary to have transition techniques in place to maintain interoperability. These transition techniques have an inevitable impact on network performance. To quantify this impact, we set up a testbed to measure the performance penalties introduced by four transition techniques. In general, measurements of the transition performance can be carried out on different layers. The decision to pick the session initiation protocol (SIP) as application layer protocol is based on the fact that voice over IP may be one of the major drivers for IPv6. This paper presents measurement results and conclusions for transition and native scenarios that we gained in performance studies.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125970821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unsupervised Anomaly Detection in Network Traffic by Means of Robust PCA 基于鲁棒PCA的网络流量无监督异常检测
R. Kwitt, U. Hofmann
{"title":"Unsupervised Anomaly Detection in Network Traffic by Means of Robust PCA","authors":"R. Kwitt, U. Hofmann","doi":"10.1109/ICCGI.2007.62","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.62","url":null,"abstract":"This paper points out the need for unsupervised anomaly detection in the context of instrusion detection systems. Our work is based on an approach which employs principal component analysis (PCA) in order to detect anomalies in measurements of certain network traffic parameters. We discuss the problem of contaminated training data and propose to use PCA on the basis of robust estimators to overcome the necessity of a supervised preprocessing step.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"245 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Theatrical Place in a 3D CVE: An Online Performance of Plato's Allegory of the Cave in a Distributed 3D CVE 戏剧的地方在一个3D CVE:柏拉图的洞穴寓言在一个分布式3D CVE的在线表现
T. Wyeld, E. Prasolova-Førland, S. Viller
{"title":"Theatrical Place in a 3D CVE: An Online Performance of Plato's Allegory of the Cave in a Distributed 3D CVE","authors":"T. Wyeld, E. Prasolova-Førland, S. Viller","doi":"10.1109/ICCGI.2007.60","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.60","url":null,"abstract":"This paper discusses a theatrical performance in a 3D collaborative virtual environment (3D CVE). Place in a performative 3D CVE is contingent on immersion and presence generated by social interaction. It discusses the production of an online performance of Plato's Allegory of the Cave involving students from three different continents. It was found that theatrical activities in a 3D CVE share some of the characteristics of both cinema and traditional theatre. The paper identifies different types of places in 3D CVE and discusses their role in an educational context.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127591838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New Malicious Agents and SK Virii 新的恶意代理和SK病毒
C. Patsakis, N. Alexandris
{"title":"New Malicious Agents and SK Virii","authors":"C. Patsakis, N. Alexandris","doi":"10.1109/ICCGI.2007.40","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.40","url":null,"abstract":"In this paper possible trends in virus creation are described that might appear in the close future. Specialy, we show that a computer virus can be updated, just like Scipt-Kiddies do. The aim of this paper is mainly to state the problem of the evolution of computer virii, and the need to take precautional measures, if possible.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"454 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131917769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
From Standard Definition to High Definition Migration in Current Digital Video Broadcasting 当前数字视频广播中从标清到高清的迁移
K. Bodecek, V. Novotny
{"title":"From Standard Definition to High Definition Migration in Current Digital Video Broadcasting","authors":"K. Bodecek, V. Novotny","doi":"10.1109/ICCGI.2007.25","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.25","url":null,"abstract":"Digital video broadcasting-terrestrial (DVB-T) is important occasion in these days. But HDTV broadcasting is not widely used in Europe in DVB-T nets due high bandwidth requirements. Several solutions of this problem are discussed in this paper. Scalable video coding is the first choice but not very useful. MPEG-4 AVC coding algorithm brings a lot of new features and better compression efficiency also. But differential frame coding is going further. Proposed method can handle a problem with migration from Standard Definition (SD) to High Definition (HD) resolution and saving of the bandwidth in DVB-T nets.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Passive Worm Propagation Modeling and Analysis 被动蠕虫传播建模与分析
Hanxun Zhou, Yingyou Wen, Hong Zhao
{"title":"Passive Worm Propagation Modeling and Analysis","authors":"Hanxun Zhou, Yingyou Wen, Hong Zhao","doi":"10.1109/ICCGI.2007.48","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.48","url":null,"abstract":"The target selection algorithm of passive worms makes them difficult to detect, and therefore they threaten the Internet greatly. Modeling the propagation of passive worms can provide profound insight into the passive worm behavior. In this paper we present a mathematical model named as the passive worm propagation (PWP) model. Based on the two-factor model, it represents the propagation of passive worms. The simulation of the model indicates that the spread of passive worms is governed by the initial value of passive worms, the infectious rate of worms, the removal rate of worms and time delay. We also analyze the feasibility of passive worms as one kind of benign worms. To the best of our knowledge, there is no relevant model for the propagation of a passive worm. Therefore, we believe that this paper is the first attempt on modeling passive worms.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"9 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123062095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Metric for Paraphrase Detection 释义检测的度量
J. Cordeiro, G. Dias, P. Brazdil
{"title":"A Metric for Paraphrase Detection","authors":"J. Cordeiro, G. Dias, P. Brazdil","doi":"10.1109/ICCGI.2007.4","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.4","url":null,"abstract":"Monolingual text-to-text generation is an emerging research area in natural language processing. One reason for the interest in such generation systems is the possibility to automatically learn text-to-text generation strategies from aligned monolingual corpora. In this context, paraphrase detection can be seen as the task of aligning sentences that convey the same information but yet are written in different forms, thereby building a training set of rewriting examples. In this paper, we propose a new metric for unsupervised detection of paraphrases and test it over a set of standard paraphrase corpora. The results are promising as they outperform state-of-the-art measures developed for similar tasks.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134572217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Typical DoS/DDoS Threats under IPv6 IPv6下典型的DoS/DDoS威胁
Xinyu Yang, Ting Ma, Yi Shi
{"title":"Typical DoS/DDoS Threats under IPv6","authors":"Xinyu Yang, Ting Ma, Yi Shi","doi":"10.1109/ICCGI.2007.61","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.61","url":null,"abstract":"The DoS/DDoS attacks are always the leading threats to the Internet. With the development of Internet, IPv6 is inevitably taking the place of IPv4 as the main protocol of Internet. So the security issues of IPv6 become the focus of the present research. In this paper we mainly focus on the typical DoS/DDoS attacks under IPv6, which including the DoS attacks pertinent to IPv6 Neighbor Discovery protocol and DDoS attacks based on the four representative attack modes, they are respectively TCP-Flood, UDP-Flood, ICMP-Flood and Smurf. We do these attack experiments under IPv6 with and without IPSec configuration respectively. The experiments without IPSec validate the effectiveness of the typical DoS/DDoS attacks under IPv6, and those with IPSec show the effectiveness of IPSec against these attacks whose source addresses are spoofed.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Optimum Design for Wireless Satellite Communication 无线卫星通信优化设计
Hong Liang
{"title":"Optimum Design for Wireless Satellite Communication","authors":"Hong Liang","doi":"10.1109/ICCGI.2007.46","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.46","url":null,"abstract":"Satellite wireless communication has following problems which are huge communication amount, atmosphere noise, long distance information transfer, and orbit and position control, etc. This paper proposes some methods for wireless satellite communication which can solve above problems. This paper creates a program control connection method for solving huge communication problem. This paper indicates a FM and FSMA method to purify the atmosphere noise and transfer high quality information flow. This paper shows a paraboloid antenna method for long distance information transference. This paper proposes light year test and adaptive control method to solve correct orbit and position control problems. All these methods are efficient and reliable which can improve the quality of wireless satellite communication significantly.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信