{"title":"Automated Evaluation of Reusable Learning Objects via a Decision Support System","authors":"S. Encheva, S. Tumin","doi":"10.1109/ICSNC.2008.11","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.11","url":null,"abstract":"Learning objects have been of great interest to educational organizations all over the globe. Once developed they need to be classified and presented to interested parties in the most effective and operational way. Serious classification problems have to be dealt with when the metadata attached to a learning object contains incomplete and/or in-consistent information. Many-valued logic is suggested for providing meaningful recommendations.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting the DNS Infrastructure of a Top Level Domain: Dynamic Firewalling with Network Sensors","authors":"João Afonso, P. Veiga","doi":"10.1109/ICSNC.2008.68","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.68","url":null,"abstract":"The security problems that plague network services today are increasing at a dramatic pace especially with the constant improvement of network transmission rates and the sheer amount of data exchanged. This translates to not only more attacks but also new types of attacks with network incidents becoming more and more frequent. A substantial part of the attacks occur at Top Level Domains (TLD) who have the mission of guaranteeing the correct functioning of Domain Name System (DNS) zones. This paper presents a proposal to simplify the detection of attacks, and reduce the number of false reports (negative and positive). Our goal is to create a group of techniques for real time monitoring of network traffic, based on network sensors that allow, in real time, to detect abnormal network behaviour and produce meaningful data that can be used to trigger alarms and anticipate future problems, adding and removing rules at DNS firewalls. This sensors, are working together with the primary DNS servers of the .PT domain, currently monitor all traffic that crosses this service. The data correlation between the sensor and other sources (such as IDS, other sensors or agents), between two different dates, can then be used for statistical purposes and to prevent future possible attacks.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124076690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Routing Protocol Based on Trust Evaluation","authors":"Ben Arbia Anis, Hédi Hamdi, Youssef Habib","doi":"10.1109/ICSNC.2008.74","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.74","url":null,"abstract":"Wireless networks have specific characteristics that are totally different from conventional networks. In fact, ad hoc networks are closely depending on the distributed cooperation among mobile nodes. Deploying trust evaluation in such environment will be an extra challenge. In this paper, we present a newest model permitting trust evaluation and establishment based on ad hoc routing protocol. Trust evaluation and establishment provide representing, evaluating and maintaining trust within the network, and serve as the basis for higher level routing operations. Our model is an events-based according to the routingpsilas relationships between mobile nodes. Logical and computational trust analysis and evaluation are deployed among network nodes. Each node's evaluation of trust on other nodes should be based on experience statistics computed around two routing events: NRE (new route events) and RFE (route failure events). First ones refer to the new requests or responses in order to establish a new route; however, second ones are consequences of a loss or errors due to existing route problems. To ensure efficiency, the experience statistics are computed by being based on linear temporal logic (LTL) model. Finally and in order to prove the applicability of the proposed solution, we further present an adaptive routing protocol (A2ODV: adaptive AODV) and analyze its efficiency around some performances metrics.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133565647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Long Term Management of Private Digital Assets","authors":"H. Jasper","doi":"10.1109/ICSNC.2008.67","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.67","url":null,"abstract":"The lifetime of each individual is accompanied by a growing amount of digital assets, e.g. documents, pictures etc. Important digital assets will exist longer than the typical lifespan of the respective technology used for its creation, i.e. for several decades. We are looking for supportive technologies that help individuals in preserving their digital assets. Furthermore, documents might be involved in transactions with a third party, a topic that has to be handled for long-living digital assets, too. Our work concentrates on basic technologies that treat these digital assets as first class citizens in a changing digital environment called cyberworld in the sequel. Most important for us are ontologies and active agents based on a reliable data management infrastructure. First results provide helpful insight in the next steps to be taken along the road to a secure, trust fully environment that helps individuals in their long term management of digital assets.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capturing User Contexts: Dynamic Profiling for Information Seeking Tasks","authors":"Roman Y. Shtykh, Qun Jin","doi":"10.1109/ICSNC.2008.55","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.55","url":null,"abstract":"Knowing each userpsilas information needs is important for information systems to better facilitate human information activities. This is especially important in the days of information overload we are experiencing today. However, knowing and correctly applying individual information needs is extremely difficult, often impossible. Yet knowing multiple contexts of user information behavior can give us some conception (or a hint) of conceivable information a user tries to obtain in a particular context. In this paper we focus on capturing such information contexts into dynamically changing profiles which are further used to facilitate the userpsilas information seeking activities.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128720860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Il-Woo Lee, Moonok Choi, Ho-Jin Park, Kwang-Roh Park
{"title":"Social Networking Service Based on Peer-to-Peer Network","authors":"Il-Woo Lee, Moonok Choi, Ho-Jin Park, Kwang-Roh Park","doi":"10.1109/ICSNC.2008.37","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.37","url":null,"abstract":"We developed a peer-to-peer (P2P) based networking service and designed a P2P based social networking service method and apparatus capable of appropriately providing a social networking service under P2P environments. This paper proposed a method for easily providing a social networking service, which will be used as a principal service on the basis of a universal P2P platform irrelevant to application characteristics. Also, this paper provides a universal P2P platform which can easily construct a community for a social networking service by using a peer group management function.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Karamitsos, Katerina Vagelatou, Gianna Koliopanou
{"title":"Group Tone Spectrum Management Algorithm (GTSM) for VDSL2 Technology","authors":"I. Karamitsos, Katerina Vagelatou, Gianna Koliopanou","doi":"10.1109/ICSNC.2008.61","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.61","url":null,"abstract":"In this paper presents a simple group tone spectrum management (GTSM) algorithm in order to eliminate the crosstalk that appears in VDSL2 downstream. Simulations results are presented and show that the GTSM performance is close to that of optimal spectrum balancing (OSB) when the number of the grouppsilas increases.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"22 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131860252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nuno Salvador, V. Filipe, Carlos Rabadão, António Pereira
{"title":"Management Model for Wireless Broadband Networks","authors":"Nuno Salvador, V. Filipe, Carlos Rabadão, António Pereira","doi":"10.1109/ICSNC.2008.69","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.69","url":null,"abstract":"Currently, due to questions of financial order, the Internet Service Providers do not invest in rural areas, because the investment does not pay. This fact originates, more and more, the appearance of the so called WBN (Wireless Broadband Networks), that are going to supply Internet access to the populations, discriminated by this circumstance. The aspects related to the management of these networks are normally forgotten and today there is a lack of economically and technical viable solutions, that can efficiently help with this function, without use an enterprise solution. After an intensive research of commercial and opensource solutions of wireless networks management, it was checked an absence of an economically viable solution as well as an absence of a model of management for the WBN. This article contributes to the definition of a management model of these networks, using opensource tools. The proposal model is based on a centralized solution that congregates several modules of opensource tools, which can be able to respond to a wide range of features identified in the model. The simulation shows how the model presented, can be practicable and able to cover several functions in WBN management.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130899857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supports for Identity Management in Ambient Environments - The Hydra Approach","authors":"H. Akram, M. Hoffmann","doi":"10.1109/ICSNC.2008.77","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.77","url":null,"abstract":"Context-aware intelligent homes, body area networks in healthcare as well as holistic and sustainable agriculture are prominent scenarios in the scope of the research field Ambient Environments and Ubiquitous Computing. Such environments where mobile and wireless networks consist of numerous nodes, like sensors, intelligent gateways and mobile devices, require a highly secured and well defined Identity Management framework. Such a framework has to deal with the complete life cycle of identities of users, services and devices as well as userspsila awareness in information disclosure and privacy. The Identity Management Framework introduced in this paper aims at enabling developers of ambient environments to provide identity management mechanisms according to their specific service scenarios transparent of the underlying standards and security details. From the core requirements analysed in the EU-Project Hydra , the need for an autonomous identity management module is evident. Based on an evaluation of existing Identity Management Systems the paper, therefore, introduces an identity management framework that meets those requirements and will be integrated into the Hydra middleware.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131165013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design and Implementation of Profile Management Module Including Policy-Based Repository in the Customer Network Management System for Corporate-Level Network Service Clients","authors":"Eunjin Ko, Il-Gu Jung, Gilhaeng Lee","doi":"10.1109/ICSNC.2008.36","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.36","url":null,"abstract":"In legacy customer network management (CNM) systems, there is no key element to connect between CNM service customers and their network lines because of the absence of customer group identification information. In this condition, some of customers who want to manage all network lines which are requested several corporate departments cannot manage or monitor all their ATM network lines with only one CNM ID. To overcome this problem, this paper proposes the method of building customer profile information based on the policy-based customer information depository which is built by CNM operator and implements the Profile Management Module in CNM System.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134534806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}