{"title":"An Approach to Optimizations Links Utilization in MPLS Networks","authors":"M. Huerta, X. Hesselbach, R. Fabregat","doi":"10.1109/ICCGI.2006.64","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.64","url":null,"abstract":"In this paper, we present a study for the optimization of the links utilization in several MPLS network topologies. This information helps in determining the maximum link utilization required, which is a valuable knowledge in balancing load strategies in the network. We present mathematical models that tune the optimal parameters for strategically routing traffic in an MPLS network. We present the optimal link utilization model (OLUM) for different topologies. OLUM provides an approach that would result in optimally balanced link utilization. Finally we compare the results of the model with the interior point and simplex algorithms. Results show that the maximum link utilization required is minimized","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123059371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Technology in Health Care Systems: Barriers to Adoption","authors":"A. Reaz, Mohammed Atiquzzaman","doi":"10.1109/ICCGI.2006.35","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.35","url":null,"abstract":"This presentation provides graph of macro-level data on the efficiency, safety, and health benefits of electronic health record (EHR), global system utilization savings, information expenditures, and medical revenue after operating costs. Game theory suggests that investing in an EHR can be a good strategy even if it has a negative ROI.","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122915154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kataoka, K. Toumura, H. Okita, J. Yamamoto, T. Suzuki
{"title":"Distributed Cache System for Large-Scale Networks","authors":"M. Kataoka, K. Toumura, H. Okita, J. Yamamoto, T. Suzuki","doi":"10.1109/ICCGI.2006.29","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.29","url":null,"abstract":"Network traffic has been rapidly increasing in proportion along with the spread of broadband access networks. The traffic of the core network is predicted to exceed its transmission capability in the near future. Therefore, we propose a centrally controlled cache system with distributed cache storage in the access network. In this system, a cache control server manages a list of all contents cached by multiple cache servers. It can provide content requested by a user if it is cached in any of the cache servers in the access network. Additionally, it can reduce network traffic between the core network and the access network if the requested contents are cached in the cache server of the access network. We examine issues for the implementation of our system, and describe a prototype system. As a result of evaluation of the system, we have made it clear that our system architecture is suitable for an access network that accommodates one million users","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124760796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DNSSEC Operational Impact and Performance","authors":"A. Guillard","doi":"10.1109/ICCGI.2006.22","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.22","url":null,"abstract":"This paper presents the vulnerabilities of the Domain Name System (DNS) and shows the benefits of using a new Internet standard for a more secure DNS, called Domain Name System Security Extensions (DNSSEC). The succeeding section reports on several DNSSEC tests and shows the likely impact of DNSSEC implementation on a typical large ISP's DNS platform","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126310652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Friaças, Miguel Baptista, M. Domingues, P. Ferreira
{"title":"6TO4 versus TUNNELBROKERS","authors":"C. Friaças, Miguel Baptista, M. Domingues, P. Ferreira","doi":"10.1109/ICCGI.2006.38","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.38","url":null,"abstract":"Transition mechanisms are a continuous topic/subset of IPv6 work at a global level. There is a big diversity of mechanisms; however this document is focusing mainly on two of them. It shows the positive usage of one of them and stresses reasons why the other should not be a priori nor used at a wide scale","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121455120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analytical Model for DDoS Attacks and Defense","authors":"Y. Xiang, Wanlei Zhou, Zhongwen Li","doi":"10.1109/ICCGI.2006.6","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.6","url":null,"abstract":"Distributed denial of service (DDoS) attack has been identified as one of the most serious problems on the Internet. While much of the current research focus on DDoS countermeasures, little attention has been paid on DDoS modeling, which is one of the important aspects that can help provide better solutions against DDoS attacks. This paper proposes an analytical model for the interactions between DDoS attack party and defense party, which allows us to have a deep insight of the interactions between the attack and defense parties. Many refinements of the basic analytical model such as reinforcement of the defense party and loss in defense party are given in the paper, which suit for many real DDoS scenarios. Moreover, the applications of this model demonstrate that the model can precisely estimate the effectiveness of a DDoS defense system before it encounters different attacks and quantitatively estimate the optimal level of investment on DDoS defense system. Additionally, it can also be applied to model some other network security problems such as virus and spam defense","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BitTorrent Traffic Characteristics","authors":"D. Erman, D. Die, A. Popescu","doi":"10.1109/ICCGI.2006.77","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.77","url":null,"abstract":"This paper reports on a measurement and modeling study of session and message characteristics of BitTorrent traffic. BitTorrent is a peer-to-peer (P2P) replication and distribution system developed as an alternative to the classical client-server model to reduce the load on content servers and networks. Results are reported on measurement, modeling and analysis of application and link layer traces collected at the Blekinge Institute of Technology (BTH) and a local ISP in Sweden. Link layer traces and application logs were collected, modeled and analyzed using a dedicated measurement infrastructure developed at BTH to collect P2P traffic. New results are reported on important session and message characteristics of BitTorrent, i.e., session inter arrivals, sizes and durations, request rates and response times. Our results show that session interarrivals can be accurately modeled by a second-order hyper-exponential distribution while session durations and sizes can be reasonably well modeled by various mixtures of the log-normal and Weibull distributions. Response times have been observed to be modeled by a dual log-normal mixture, while request rates are modeled as dual Gaussian distributions","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130250165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delivery Context Access for Mobile Browsing","authors":"S. Sathish, Olli Pettay","doi":"10.1109/ICCGI.2006.46","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.46","url":null,"abstract":"The usage of context data to facilitate adaptive applications is gaining widespread prominence. We describe an architecture for adaptive Web applications specially suited for mobile devices. This approach is based on an ongoing standardization effort within World Wide Web Consortium (W3C) for client side device context access. The specification, delivery context: interfaces (DCI) is intended to be used as an access mechanism for context consumers. We augment this approach by providing additional interfaces for context providers towards data provisioning to DCI and usage of a dynamic profile generation mechanism that relies on DCI for data serialization. This complements approaches such as utilizing user agent profiles used in server side adaptation. We also provide details of a proof-of-concept implementation for DCI along with two adaptive applications and outline our future plans for this paper","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129820031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eye Location under Various Illumination Conditions","authors":"Geng Du, Fei Su, A. Cai","doi":"10.1109/ICCGI.2006.4","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.4","url":null,"abstract":"Eye location is an important step in face recognition. Locate eyes under various illumination conditions is also an important step especially for most of illumination normalization algorithms. In this paper, an algorithm uses a group of eigenfeature templates and Gabor feature templates to locate eye under various illumination conditions is proposed. Experiment results show that the performance of this algorithm is good and robust under widely changed illumination conditions","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127593247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Algorithm for Network Anomaly Detection","authors":"Jun Lv, Xing Li, Congsen Ran, Tong Li","doi":"10.1109/ICCGI.2006.60","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.60","url":null,"abstract":"In this paper, a new algorithm is suggested to solve the network traffic anomaly detection problem. Wavelet generalized likelihood ratio (WGLR) algorithm, which smartly combines generalized likelihood ratio algorithm and wavelet method, and captures the failure point in real time. Simulating and network traffic experiment has demonstrated that the algorithm has the better performance in fault detection","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124130889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}