2008 Third International Conference on Systems and Networks Communications最新文献

筛选
英文 中文
A Simple Computer Design with Monitor Interface: Integrating Hardware and Software in Early Research in Computer Science 具有监控界面的简单计算机设计:计算机科学早期研究中的软硬件集成
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.57
H. Farhat
{"title":"A Simple Computer Design with Monitor Interface: Integrating Hardware and Software in Early Research in Computer Science","authors":"H. Farhat","doi":"10.1109/ICSNC.2008.57","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.57","url":null,"abstract":"In computer science, the introduction of CAD tools and programmable logic devices makes it feasible to complete the design of a functioning computer during a second course in the hardware track. In earlier we presented a simple instruction set and gave a complete single cycle design as part of grant for early research in computer science. For this we used the Altera CAD package and the UP2 board. The contribution of this paper is to expand on previous work. We adopt a similar instruction set as done in earlier paper. here, however, we interface the design to include a computer monitor. The complete computer design with monitor interface at an early stage in computer science education helps in introducing research early in the curricula.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128574682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of User Experience of Access Selection in Multi-operator Environments 多运营商环境下接入选择的用户体验分析
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.54
Petteri Pöyhönen, J. Markendahl, O. Strandberg
{"title":"Analysis of User Experience of Access Selection in Multi-operator Environments","authors":"Petteri Pöyhönen, J. Markendahl, O. Strandberg","doi":"10.1109/ICSNC.2008.54","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.54","url":null,"abstract":"In future wireless systems can ambient networks technology enable the users to utilize a multitude of networks. Frequent roaming between networks will be a key characteristic of mobile services and the terms \"home\" and \"visited\" networks will be common also at local and national level. In this paper we will investigate cooperation between operators and what benefits the end users can expect. Ambient Networks concepts include new advertising, attachment and composition functionalities providing a set of tools that enable dynamic connectivity establishment. Especially end-user preferences can be taken into account during the evaluation and selection of access networks. The impact of cooperation in the multi-operator environment is analyzed in a scenario with operators that have partially overlapping radio coverage, set of provided services and a large number of moving user terminals. The results indicate substantial gains with cooperation; both for overall network utilization and for the end-user \"up-time\". In order to describe the end-user perception we use a performance metric called user satisfaction index (USI) proposed in the ambient networks project.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129800578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GEMOM - Significant and Measurable Progress beyond the State of the Art GEMOM -超越技术水平的重大和可衡量的进展
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.33
H. Abie, I. Dattani, M. Novkovic, J. Bigham, Shaun Topham, R. Savola
{"title":"GEMOM - Significant and Measurable Progress beyond the State of the Art","authors":"H. Abie, I. Dattani, M. Novkovic, J. Bigham, Shaun Topham, R. Savola","doi":"10.1109/ICSNC.2008.33","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.33","url":null,"abstract":"GEMOM (Genetic Message Oriented Secure Middleware) is an EU FP7 ICT project that focuses on the significant and measurable increase in the end-to-end intelligence, security and resilience of complex, distributed information systems. Complex, distributed software systems are virtually impossible to implement without heavy use of messaging infrastructure. While the existing state of the art achieves arbitrary resilience by a brute-force approach, self-healing is either rudimentary or non-existent. GEMOM, with its fluid, resilient, self-healing and adaptive messaging allows for flexible messaging solutions and offers monitoring, management and maintenance incrementally. Its adaptive security solution will learn and adapt to changing environments during run-time in the face of changing threats without sacrificing the efficiency, flexibility, reliability and security of the system. This paper describes the significant and measurable progress beyond state of the art envisioned by the GEMOM project.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Mechanism for Federated Identification Services for Public Access Portals Using Access-Cards 使用访问卡的公共访问门户的联邦识别服务机制
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.12
S. Encheva, S. Tumin
{"title":"A Mechanism for Federated Identification Services for Public Access Portals Using Access-Cards","authors":"S. Encheva, S. Tumin","doi":"10.1109/ICSNC.2008.12","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.12","url":null,"abstract":"This paper discusses an access control mechanism for public Web portals by sharing users' data from identity providers across organizations boundaries among federated organizations using a lightweight Web-based application framework. Each user can subscribe to a portal and be given an access-card which will be used to identify the subscriber at this particular portal or other portals in collaboration. The framework will also implement single-sign-on for member applications of a federation of portals.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126668456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Analysis Methodology for New Critical Information Infrastructure 新型关键信息基础设施的风险分析方法
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.72
Jun Heo, Jong-Whoi Shin, Wansuk Lee, Yoojae Won
{"title":"Risk Analysis Methodology for New Critical Information Infrastructure","authors":"Jun Heo, Jong-Whoi Shin, Wansuk Lee, Yoojae Won","doi":"10.1109/ICSNC.2008.72","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.72","url":null,"abstract":"In Korea, hacking, computer viruses, such as infringement on electronic systems for protecting Critical Information Infrastructure from the law was enacted. Every year, Specified facilities that Critical Information Infrastructure are analysed system risks and will be submitted to Central Government. This research intends to provide IT service attributes to take into account the methodology that predicts the security of Critical Information Infrastructure. The service provider who wants to offer the new Critical Information Infrastructure service needs to secure appropriate security measures based on threat and vulnerability analysis from IT service attributes and the service planning stage. However, it is difficult to use existing risk methodologies that perform threat analysis as the one that allows Service attributes This paper propose the information security framework that figures out security threats at the new IT Critical Information Infrastructure service planning stage, and easily identifies relevancy between security technologies and IT service attributes.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134323236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Routing and Performance Analysis of Double-Buffered Omega Networks Supporting Multi-class Priority Traffic 支持多优先级流量的双缓冲Omega网络的路由和性能分析
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.10
D. C. Vasiliadis, G. Rizos, C. Vassilakis, E. Glavas
{"title":"Routing and Performance Analysis of Double-Buffered Omega Networks Supporting Multi-class Priority Traffic","authors":"D. C. Vasiliadis, G. Rizos, C. Vassilakis, E. Glavas","doi":"10.1109/ICSNC.2008.10","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.10","url":null,"abstract":"In this paper the modeling of Omega Networks supporting multi-class routing traffic is presented and their performance is analyzed. We compare the performance of multi-class priority mechanism against the single priority one, by gathering metrics for the two most important network performance factors, namely packet throughput and delay under uniform traffic conditions and various offered loads, using simulations. Moreover, two different test-bed setups were used in order to investigate and analyze the performance of all priority-class traffic, under different quality of service (QoS) configurations. In the considered environment, switching elements (SEs) that natively support multi-class priority routing traffic are used for constructing the MIN, while we also consider double-buffered SEs, two configuration parameters that have not been addressed insofar. The rationale behind introducing a multiple-priority scheme is to provide different QoS guarantees to traffic from different applications, which is a highly desired feature for many IP network operators, and particularly for enterprise networks.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132789681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Integration of WiMAX Access Management and Control in a Multi-domain System for Multimedia Distribution 多媒体分发多域系统中WiMAX接入管理与控制的集成
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.51
E. Borcoci, R. Lupu, S. Obreja
{"title":"Integration of WiMAX Access Management and Control in a Multi-domain System for Multimedia Distribution","authors":"E. Borcoci, R. Lupu, S. Obreja","doi":"10.1109/ICSNC.2008.51","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.51","url":null,"abstract":"This paper further refines the architecture and design, introduced in a previous work on the management and control, of the IEEE 802.16/WiMAX access in a multi-domain chain of IP core networks. The high level objective is to manage end-to-end connectivity services in an integrated way, at overlay level, assuring guaranteed QoS for multimedia delivery over networks with heterogeneous access. Flexible solutions are proposed for integration of the WiMAX service flows management and control within an integrated management system (EIMS) developed in the ENTHRONE FP6 project.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133475226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survivability Quantification of Real-Sized Networks Including End-to-End Delay Distributions 包含端到端时延分布的实规模网络的生存性量化
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.14
P. Heegaard, Kishor S. Trivedi
{"title":"Survivability Quantification of Real-Sized Networks Including End-to-End Delay Distributions","authors":"P. Heegaard, Kishor S. Trivedi","doi":"10.1109/ICSNC.2008.14","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.14","url":null,"abstract":"In a telecommunication network it is essential to provide virtual connections between peering nodes with performance guarantees such as minimum throughput, maximum delay or loss. Critical services in telecommunication network should be continuously provided even when undesirable events like sabotage, natural disasters, or network failures happen. The design, construction and management of network infrastructure and service platforms aim at meeting such requirements. In this paper we consider the network's ability to survive major and minor failures in network infrastructure and service platforms that are caused by undesired events that might be external or internal. Survive means that the services provided comply with the requirements even in the presence of failures. The network survivability is quantified as defined by the ANSI T1A1.2 committee defined as the transient performance from the instant an undesirable event occurs until steady state is reached.In this paper we assess the survivability of a network with virtual connections (VCs) exposed to link or node failures. The performance measure of interest here is not just the mean delay but packet delay distributions for each virtual connection. The analytic approach that we use is verified against simulations of a real network topology and the results show very good correspondence between the two.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133731243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Traffic Engineering in NGNs Using Hybrid Genetic Algorithms 基于混合遗传算法的NGNs流量工程实现
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.49
A. Vallejo, A. Zaballos, D. Vernet, David Cutiller, J. Dalmau
{"title":"Implementation of Traffic Engineering in NGNs Using Hybrid Genetic Algorithms","authors":"A. Vallejo, A. Zaballos, D. Vernet, David Cutiller, J. Dalmau","doi":"10.1109/ICSNC.2008.49","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.49","url":null,"abstract":"Traffic engineering, particularly routing optimization, is one of the most important aspects to take into account when providing QoS in next generation networks (NGN). The problem of weight setting with conventional link state routing protocols for routing optimization has been object of study by a few authors. To solve this problem for big networks artificial intelligence heuristics have been used, in concrete genetic algorithms (GA). Some of the proposals incorporate local search procedures in order to optimize the GA results, in the so-called hybrid genetic algorithm (HGA) or memetic algorithm. This paper presents an inedited comparative analysis of the main hybrid genetic algorithms (HGA) proposals, as well as comparing them with other algorithms for the same problem by means of simulations. One of the HGA algorithms was chosen from the results analysis and was implemented over a real testbed with commercial routers with successful OSPFv3 routing optimization.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gateways and Capacity in Ad Hoc Networks Ad Hoc网络中的网关和容量
2008 Third International Conference on Systems and Networks Communications Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.40
Erlend Larsen, Vinh Pham, P. Engelstad, Ø. Kure
{"title":"Gateways and Capacity in Ad Hoc Networks","authors":"Erlend Larsen, Vinh Pham, P. Engelstad, Ø. Kure","doi":"10.1109/ICSNC.2008.40","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.40","url":null,"abstract":"Connectivity with external networks is an essential feature of many ad hoc networks, and such connectivity is enabled by gateway nodes. This paper investigates how the gateways affect the throughput in the ad hoc network. The throughputpsilas dependency on gateway positions, number of gateways and handover properties is sought uncovered by simulations. The results show that the relative positions of gateways in ad hoc networks may have defining impact on the performance of the network. The average path length and the gatewayspsila shared interference coverage are parameters that affect the performance.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127025430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信