{"title":"RPB in Software Testing","authors":"Wei Hoo Chong","doi":"10.1109/ICCGI.2007.53","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.53","url":null,"abstract":"Software testing is one of the crucial activities in the system development life cycle. The purpose of testing can be quality assurance, verification and validation, or reliability estimation. In Motorolareg, Automation Testing is a methodology TM uses by GSG-iSGT (Global Software Group - iDENtrade Subcriber Group Testing) to increase the testing volume, productivity and reduce test cycle-time in cell phone software testing. In addition, automated stress testing can make the products become more robust before release to the market. In this paper, the author discuss one of the automation stress testing tools that iSGT use, which is RPB (Record and PlayBack). RPB is a platform specific desktop rapid test-case creation tool. This tool is able to capture all the information on the phone in order to have highest accurately in testing. Furthermore, RPB allows user to do testing at anytime, anywhere provided there is an Internet connection. The authors also discuss the value that automation has bought to iDENtrade phone testing together with the metrics. We will also look into the advantages of the proposed system and some discussion of the future work.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Hoeher, M. Petraschek, S. Tomic, M. Hirschbichler
{"title":"Performance Evaluation of SIPv6 Transitioning","authors":"T. Hoeher, M. Petraschek, S. Tomic, M. Hirschbichler","doi":"10.1109/ICCGI.2007.49","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.49","url":null,"abstract":"Due to the continuous massive growth of the global Internet, available IPv4 network addresses will run out within the next years. The solution to this problem is the IPv6 protocol with its vast address space. During the transition period from IPv4 to IPv6, both protocols will coexist, which makes it necessary to have transition techniques in place to maintain interoperability. These transition techniques have an inevitable impact on network performance. To quantify this impact, we set up a testbed to measure the performance penalties introduced by four transition techniques. In general, measurements of the transition performance can be carried out on different layers. The decision to pick the session initiation protocol (SIP) as application layer protocol is based on the fact that voice over IP may be one of the major drivers for IPv6. This paper presents measurement results and conclusions for transition and native scenarios that we gained in performance studies.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125970821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised Anomaly Detection in Network Traffic by Means of Robust PCA","authors":"R. Kwitt, U. Hofmann","doi":"10.1109/ICCGI.2007.62","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.62","url":null,"abstract":"This paper points out the need for unsupervised anomaly detection in the context of instrusion detection systems. Our work is based on an approach which employs principal component analysis (PCA) in order to detect anomalies in measurements of certain network traffic parameters. We discuss the problem of contaminated training data and propose to use PCA on the basis of robust estimators to overcome the necessity of a supervised preprocessing step.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"245 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114218061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theatrical Place in a 3D CVE: An Online Performance of Plato's Allegory of the Cave in a Distributed 3D CVE","authors":"T. Wyeld, E. Prasolova-Førland, S. Viller","doi":"10.1109/ICCGI.2007.60","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.60","url":null,"abstract":"This paper discusses a theatrical performance in a 3D collaborative virtual environment (3D CVE). Place in a performative 3D CVE is contingent on immersion and presence generated by social interaction. It discusses the production of an online performance of Plato's Allegory of the Cave involving students from three different continents. It was found that theatrical activities in a 3D CVE share some of the characteristics of both cinema and traditional theatre. The paper identifies different types of places in 3D CVE and discusses their role in an educational context.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127591838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Malicious Agents and SK Virii","authors":"C. Patsakis, N. Alexandris","doi":"10.1109/ICCGI.2007.40","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.40","url":null,"abstract":"In this paper possible trends in virus creation are described that might appear in the close future. Specialy, we show that a computer virus can be updated, just like Scipt-Kiddies do. The aim of this paper is mainly to state the problem of the evolution of computer virii, and the need to take precautional measures, if possible.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"454 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131917769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Standard Definition to High Definition Migration in Current Digital Video Broadcasting","authors":"K. Bodecek, V. Novotny","doi":"10.1109/ICCGI.2007.25","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.25","url":null,"abstract":"Digital video broadcasting-terrestrial (DVB-T) is important occasion in these days. But HDTV broadcasting is not widely used in Europe in DVB-T nets due high bandwidth requirements. Several solutions of this problem are discussed in this paper. Scalable video coding is the first choice but not very useful. MPEG-4 AVC coding algorithm brings a lot of new features and better compression efficiency also. But differential frame coding is going further. Proposed method can handle a problem with migration from Standard Definition (SD) to High Definition (HD) resolution and saving of the bandwidth in DVB-T nets.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Passive Worm Propagation Modeling and Analysis","authors":"Hanxun Zhou, Yingyou Wen, Hong Zhao","doi":"10.1109/ICCGI.2007.48","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.48","url":null,"abstract":"The target selection algorithm of passive worms makes them difficult to detect, and therefore they threaten the Internet greatly. Modeling the propagation of passive worms can provide profound insight into the passive worm behavior. In this paper we present a mathematical model named as the passive worm propagation (PWP) model. Based on the two-factor model, it represents the propagation of passive worms. The simulation of the model indicates that the spread of passive worms is governed by the initial value of passive worms, the infectious rate of worms, the removal rate of worms and time delay. We also analyze the feasibility of passive worms as one kind of benign worms. To the best of our knowledge, there is no relevant model for the propagation of a passive worm. Therefore, we believe that this paper is the first attempt on modeling passive worms.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"9 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123062095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Metric for Paraphrase Detection","authors":"J. Cordeiro, G. Dias, P. Brazdil","doi":"10.1109/ICCGI.2007.4","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.4","url":null,"abstract":"Monolingual text-to-text generation is an emerging research area in natural language processing. One reason for the interest in such generation systems is the possibility to automatically learn text-to-text generation strategies from aligned monolingual corpora. In this context, paraphrase detection can be seen as the task of aligning sentences that convey the same information but yet are written in different forms, thereby building a training set of rewriting examples. In this paper, we propose a new metric for unsupervised detection of paraphrases and test it over a set of standard paraphrase corpora. The results are promising as they outperform state-of-the-art measures developed for similar tasks.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134572217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Typical DoS/DDoS Threats under IPv6","authors":"Xinyu Yang, Ting Ma, Yi Shi","doi":"10.1109/ICCGI.2007.61","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.61","url":null,"abstract":"The DoS/DDoS attacks are always the leading threats to the Internet. With the development of Internet, IPv6 is inevitably taking the place of IPv4 as the main protocol of Internet. So the security issues of IPv6 become the focus of the present research. In this paper we mainly focus on the typical DoS/DDoS attacks under IPv6, which including the DoS attacks pertinent to IPv6 Neighbor Discovery protocol and DDoS attacks based on the four representative attack modes, they are respectively TCP-Flood, UDP-Flood, ICMP-Flood and Smurf. We do these attack experiments under IPv6 with and without IPSec configuration respectively. The experiments without IPSec validate the effectiveness of the typical DoS/DDoS attacks under IPv6, and those with IPSec show the effectiveness of IPSec against these attacks whose source addresses are spoofed.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimum Design for Wireless Satellite Communication","authors":"Hong Liang","doi":"10.1109/ICCGI.2007.46","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.46","url":null,"abstract":"Satellite wireless communication has following problems which are huge communication amount, atmosphere noise, long distance information transfer, and orbit and position control, etc. This paper proposes some methods for wireless satellite communication which can solve above problems. This paper creates a program control connection method for solving huge communication problem. This paper indicates a FM and FSMA method to purify the atmosphere noise and transfer high quality information flow. This paper shows a paraboloid antenna method for long distance information transference. This paper proposes light year test and adaptive control method to solve correct orbit and position control problems. All these methods are efficient and reliable which can improve the quality of wireless satellite communication significantly.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}