2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)最新文献

筛选
英文 中文
The Concept of Complex Events as Suitable Means for Biometric System Implementation 复杂事件的概念是生物识别系统实现的合适手段
K. Rabuzin, M. Baca, M. Schatten
{"title":"The Concept of Complex Events as Suitable Means for Biometric System Implementation","authors":"K. Rabuzin, M. Baca, M. Schatten","doi":"10.1109/ICCGI.2007.59","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.59","url":null,"abstract":"Generally speaking, a user (person) can be authorised in three different ways (or their combinations): one can use something that a user knows, something that a user possesses or by measuring some physical or psychological characteristics which are immanent and unique to each person i.e. biometric characteristics. In this paper we are going to put accent on this third possibility. We are going to show how active databases could be used in order to implement multimodal biometric systems, and, due to some capabilities which they possess, reduce the time needed for authorisation (identification). Especially, we will put accent on complex events and show how they can be used for identification (authorisation) purposes.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126461230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mapping Techniques for an Ontology Network 本体网络的映射技术
J. Cremades, M. J. Rodríguez, Carmen Costilla, Antonio Peña
{"title":"Mapping Techniques for an Ontology Network","authors":"J. Cremades, M. J. Rodríguez, Carmen Costilla, Antonio Peña","doi":"10.1109/ICCGI.2007.37","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.37","url":null,"abstract":"We are researching a Web integrated reference architecture based on the mediator-wrapper approach. From a conceptual modeling point of view, this mediator is an architectural component defined by a semantic unification model composed of two layers. The lower layer, the specific ontological network (SON), is tailored to a concise application domain. It networks as many specific ontologies (SOs) (URIs of local semantic resources to collect) as necessary through horizontal mappings. The upper layer, the global ontological kernel (GOK), unifies SON's semantics through some global ontologies (GOs) that attach concepts according to a concise unification criterion through vertical mappings. In this context, this paper proposes mapping techniques to integrate these kinds of ontologies and its main contributions are: (1) a homogeneous mapping definition framework, (2) a technique for networking SOs by translating heterogeneous mapping definitions (resulting from current alignment tools) into C-OWL and (3) a unified semantics by means of GOs.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131292143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Alternative Solution Initiative to Problematic of Computer Science Security of Virus and Malware with Experimentation of Firewalls and Antivirus 基于防火墙和反病毒实验的计算机科学病毒和恶意软件安全问题的替代解决方案
J. Ruiz-Vanoye, O. Díaz-Parra, A.F. Penna, Jessica Castro, Juan C. Olivares-Rojas, J. Olivares-Rojas
{"title":"An Alternative Solution Initiative to Problematic of Computer Science Security of Virus and Malware with Experimentation of Firewalls and Antivirus","authors":"J. Ruiz-Vanoye, O. Díaz-Parra, A.F. Penna, Jessica Castro, Juan C. Olivares-Rojas, J. Olivares-Rojas","doi":"10.1109/ICCGI.2007.12","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.12","url":null,"abstract":"Exist in the computer science market a great amount of antivirus, the election of one of them depends on the company. But truly they are necessary, or with a tool we can be protected of the virus and the accesses no authorized our computer. In this document one sets out to demonstrate that firewall personal formed good will protect to us of the intruders and the virus.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116519289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IPv6 Field Trial over Regular ADSL Access 常规ADSL接入的IPv6现场试验
A. Baudot, P. Levis
{"title":"IPv6 Field Trial over Regular ADSL Access","authors":"A. Baudot, P. Levis","doi":"10.1109/ICCGI.2007.34","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.34","url":null,"abstract":"This paper aims at describing the different means used and deployed to run the Orange/Wanadoo IPv6 field trial, and proposes a very first feedback after more than a year of running time. This field trial consists in providing IPv6 connectivity to customers owing to L2TP facilities or IPv6-in- IPv4 tunneling based on Tunnel Broker and Teredo coexistence tools.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114624320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Architectural Model for Applications Based on Mobile Services 基于移动服务的应用体系结构模型
Fabrício B. Gonçalves, Carlo E. T. Oliveira, Izalmo Silva, L. G. Moura, Eletronic
{"title":"An Architectural Model for Applications Based on Mobile Services","authors":"Fabrício B. Gonçalves, Carlo E. T. Oliveira, Izalmo Silva, L. G. Moura, Eletronic","doi":"10.1109/ICCGI.2007.13","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.13","url":null,"abstract":"Service-oriented computing (SOC) is the computational paradigm that utilizes services as fundamental elements to develop applications/solutions. To build a service model, SOC relies on the service-oriented architecture (SOA), which is a way of reorganizing software applications and infrastructures in a set of interacting services. This paper proposes an architectural model that separates in layers the abstraction levels needed for construction of mobile services platforms. Each layer has been defined based on SOC requirements and deliver functionality to create autonomous reconfiguring distributed systems.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132279061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Complexity of Decontaminating an Hexagonal Mesh Network 关于六边形网格网络去污的复杂性
P. Flocchini, N. Santoro, L. Song
{"title":"On the Complexity of Decontaminating an Hexagonal Mesh Network","authors":"P. Flocchini, N. Santoro, L. Song","doi":"10.1109/ICCGI.2007.43","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.43","url":null,"abstract":"We consider the problem of decontaminating a network infected by mobile viruses. The goal is to perform the task using as small a team of antiviral agents as possible, avoiding any recontamination of decontaminated areas; other cost measures include the amount of agents' movements across the network and the time required by the decontamination process. The network we consider is a regular cellular space, namely an Hexagonal Mesh. We examine the decontamination problem of such a network in two different settings, depending on the sensorial capabilities of the agents. In the first setting, the only knowledge that an agent has is local to the node in which it is currently residing; in the other setting, each agent can also \"see \" the state of the neighbouring nodes. We examine the complexity of decontamination in both settings; for each, we design strategies that are optimal in terms of number of agents employed and efficient in the other two cost measures. We show that visibility power allows a drastic decrease in time complexity, extending the known results for regular meshes.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121696493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Perceptron Based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks 基于感知器的无线网状网络恶意路由洪水检测分类器
L. Santhanam, Anindo Mukherjee, Raj Bhatnagar, D. Agrawal
{"title":"A Perceptron Based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks","authors":"L. Santhanam, Anindo Mukherjee, Raj Bhatnagar, D. Agrawal","doi":"10.1109/ICCGI.2007.6","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.6","url":null,"abstract":"Wireless mesh networks (WMN) are evolving as a new paradigm for broadband Internet, in which a group of static mesh routers employ multihop forwarding to provide wireless Internet connectivity. All routing protocols in WMNs naively assume nodes to be non- malicious. But, the plug-in-and-play architecture of WMNs paves way for malicious users who could exploit some loopholes of the underlying routing protocol. A malicious node can inundate the network by conducting frequent route discovery which severely reduces the network throughput. In this paper, we investigate the detection of route floods by incorporating a machine learning technique. We use a perceptron training model as a tool for intrusion detection. We train the perceptron model by feeding various network statistics and then use it as a classifier. We illustrate using an experimental wireless network (ns-2) that the proposed scheme can accurately detect route misbehaviors with a very low false positive rate.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Grid Enablement of Applications Using Application Dependency Graph 使用应用程序依赖图实现应用程序的网格化
P. Iyer, A. Nagargadde, S. Gopalan, V. Sridhar
{"title":"Grid Enablement of Applications Using Application Dependency Graph","authors":"P. Iyer, A. Nagargadde, S. Gopalan, V. Sridhar","doi":"10.1109/ICCGI.2007.26","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.26","url":null,"abstract":"Grid enablement of existing applications has been a prime area of research in recent times and numerous solutions have been proposed in this regard. Grid enablement of an application involves conversion of a single (monolithic) application into a set of well coupled grid jobs and services, which can be deployed in a grid. Determining the optimum partitioning of an application is the cornerstone for efficient grid enablement. In this paper, we present the the process of abstracting applications as application structure graphs (ASG) and also provide an in depth analysis of different application level dependencies that affect grid enablement. We also present an extensive study of the steps involved in grid enablement of a Java application, with special attention to application profiling.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127791928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Information Retrieval Algorithms for Onsite Object Service 现场对象服务的加权信息检索算法
Ping Cai, Liang He
{"title":"Weighted Information Retrieval Algorithms for Onsite Object Service","authors":"Ping Cai, Liang He","doi":"10.1109/ICCGI.2007.64","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.64","url":null,"abstract":"Designing proper algorithm is necessary for applications that query and analyze mass-information for high efficiency in various information services. In this paper, we discuss weighted information retrieval algorithms for an newly service, onsite object service. Four retrieval algorithms with one-dimension weight and one retrieval algorithm with multi-dimension weight are proposed to address the requirements of OOS. Detailed performance analysis and comparison about the advantage and disadvantage of these 5 different algorithms are presented later. And at last a conclusion is drawn about the recommendation for these algorithms in different scenarios.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121218391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Main Features of the Web Programming Language OPScript Web编程语言OPScript的主要特点
V.A.R. Zaldivar, J. Elorriaga, M. Brito
{"title":"Main Features of the Web Programming Language OPScript","authors":"V.A.R. Zaldivar, J. Elorriaga, M. Brito","doi":"10.1109/ICCGI.2007.36","DOIUrl":"https://doi.org/10.1109/ICCGI.2007.36","url":null,"abstract":"OPScript is a statically typed object oriented language, created to be executed as client code in Web pages. Among other features, the language supports class persistent additions, verbal communication, first class types and the definition of object models in XML. Class persistent additions are an elegant solution to the problem of the stateless condition of the HTTP protocol and also it reduces interaction with the server. Verbal communication makes transparent to the programmer the communication between objects, being them in the client machine or in the server. This feature makes code reutilization easier and makes the application independent of a specific technology.","PeriodicalId":102568,"journal":{"name":"2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07)","volume":"21 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123697600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信