{"title":"Bulk Transfer Capacity Estimation in IPv6 Networks","authors":"Robert Gardner, Francisco Garcia","doi":"10.1109/ICCGI.2006.2","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.2","url":null,"abstract":"Bulk transfer capacity (BTC) is a measure of the sustainable data throughput on a network path that is subject to congestion control algorithms, such as those used by the transmission control protocol (TCP). BTC is an important network performance metric because the vast majority of all traffic, typically around 95% of all packets, is conveyed by TCP. The performance of many Internet-based services is thus largely dependant on the BTC of the underlying network path. This paper proposes a novel tool, ReturnFlow6, for estimating the BTC of an IPv6 network path, conducted from a single point to a non-instrumented target. In order to verify the realistic operation of ReturnFlow6i a series of BTC measurements are conducted on a test network and a 'live' intranet. The results are presented, analyzed and compared against the output of BTC estimation techniques for IPv4, permitting the relative advantages and disadvantages of each approach to be established","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"154 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132781628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Attribute Decision Making E-Course","authors":"C. Resteanu, M. Somodi, B. Alexe","doi":"10.1109/ICCGI.2006.44","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.44","url":null,"abstract":"The \"Education and Training 2010\" European Work Program (http://europa.eu.int/comm/education/policies/2010/et_2010_en.html) has a strong support in Romania. The leaders of the National Excellency Research Program encourage the e-learning domain and so a complex project named, Excellency Level Tools for Multi-Attribute Decision Making Field's Promotion\" has been granted. Pertaining to this project, an electronic course on this subject for enhanced learning in making optimal decisions opens a new era in the instrumentation of the lifelong learning process. The electronic course will contain the entire know-how achieved along the years by the team members involved in the Decision Sciences research and applications projects. It will constitute the expression of the also fundamental but mostly applicative research in this area. It is not designed for the international scientific community, but for individuals having a moderate or strong economical, technical and mathematical background, including well prepared students who want to rapidly assimilate this knowledge area","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of IPv6 Multicast Deployment in MPLS Netw","authors":"Wim Verrydt, C. Popoviciu","doi":"10.1109/ICCGI.2006.67","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.67","url":null,"abstract":"Multi Protocol Label Switching (MPLS) [1] has been widely deployed in both service provider and enterprise networks alike. The main drivers for deploying an MPLS based forwarding mechanism for IPv4 include Layer 2 [2] and Layer 3 [3] Virtual Private Networks, and Traffic Engineering [4] and Fast Reroute [5]. The protocol transparency of MPLS infrastructures can also be leveraged, with minimal core impact, to provide IPv6 services. MPLS 6PE (Provider Edge) [6] has proven to be a popular and widely deployed architecture for forwarding IPv6 unicast packets across an IPv4 / MPLS enabled core infrastructure. Along with unicast connectivity, today¿s networks are more and more often required to support IP multicast services as well. It is estimated that new types of end-user applications will significantly increase the need for deploying IPv4 and IPv6 multicast solutions. This paper discusses two possible architecture options for deploying IPv6 multicast [7] forwarding across an already existing IPv4 / MPLS enabled core infrastructure. In both of the scenarios, IPv6 unicast packets are transported through an MPLS 6PE solution.","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Connection Migration Mechanisms in a Cluster Environment","authors":"Leila Ismail","doi":"10.1109/ICCGI.2006.57","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.57","url":null,"abstract":"Nowadays, grid applications and Web applications introduce significant high availability and scalability challenges to cluster database servers. In this paper, we describe a connection failover mechanism toward building a highly availably infrastructure that is resistant to partial failure. While available solutions concentrate on client transparency, in our work we achieve server transparency as well. We demonstrate that our solution is transparent to clients and servers without compromising the system efficiency. Our mechanisms do involve neither kernel changes nor changes to the server software","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determinants of IP Version 6 Adoption","authors":"A. Hovav, Yoo-Jung Kim","doi":"10.1109/ICCGI.2006.28","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.28","url":null,"abstract":"The implementation of a new Internet standard such as IPv6 depends on the usefulness of the technology to the adopting organizations and the environment in which they operate. The adoption of IPv6 in Korea is mostly driven by a governmental strategy that created high network externalities and developed related technologies. However, the speed of adoption is hindered due to lack of information and limited perceived business value","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using mixed VR/AR technologies in education","authors":"D. Popovici, L. Serbanati","doi":"10.1109/ICCGI.2006.26","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.26","url":null,"abstract":"In this paper, we describe an ongoing project dedicated to kindergarten children. By invoking a narrative context, we propose to children an AR-based virtual environment within which they are expecting to learn by playing each other, as they are doing in a real context. The proposed subjects for the educational contexts are selected by the teacher, and the children are let to improvise in order to attend the conclusion. The implementation of the system is based on AReVi API for visual rendering, ARToolki t for interaction support, and classical client-server architecture for the environment distribution between several classrooms","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Decker, F. D. Muñoz-Escoí, J. E. Armendáriz-Iñigo
{"title":"Toward Reconciling Availability, Consistency and Integrity in Replicated Information Systems","authors":"H. Decker, F. D. Muñoz-Escoí, J. E. Armendáriz-Iñigo","doi":"10.1109/ICCGI.2006.47","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.47","url":null,"abstract":"The availability of information systems benefits from distributed replication. Different applications and users require different degrees of data availability, consistency and integrity. The latter are perceived as competing objectives that need to be reconciled by appropriate replication strategies. We outline work in progress on a replication architecture for distributed information systems. It simultaneously maintains several protocols, so that it can be re-configured on the fly to the actual needs of availability, consistency and integrity of possibly simultaneous applications and users","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134099133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strengthening ECDSA Verification Algorithm to be More Suitable to Mobile Networks","authors":"K. K., Narayanasamy P","doi":"10.1109/ICCGI.2006.78","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.78","url":null,"abstract":"The primary objective of the paper is to augment the efficiency of signature process in elliptic curve digital signature algorithm (ECDSA), which turns out to be a bottleneck in mobile devices due to its heavy consumption of resources. An improved algorithm for strengthening the speed of verification process in ECDSA is proposed and evaluated. A comparative study of Comb algorithm with the proposed algorithm for simultaneous multiplication on the NIST-recommended elliptic curves over prime fields is done and a broad analysis of the outcomes is also carried out. Strengthening the pre-computation process with respect to the speed of execution during verification will be the crucial task of this implementation","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134483457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex vs. Intensive in Parallel Computation","authors":"M. Malita, G. Stefan, M. Stoian","doi":"10.1109/ICCGI.2006.65","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.65","url":null,"abstract":"The distinction between complex computation and intensive computation becomes more meaningful now, when all high performance computing machines are de facto parallel machines. The distinction is stated by introducing the concept of integral parallel computation as the most natural and efficient way to increase the performance using all kinds of parallel computations. A new functional taxonomy of parallel machines is used to support the integral approach. Finally, the new concepts and distinctions are exemplified describing the Connex Architecture and its first embodiment: the video-chip CA1024 launched by Connex Technology, Inc.","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133522000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-learning: Biometrics as a Security Factor","authors":"K. Rabuzin, M. Baca, M. Sajko","doi":"10.1109/ICCGI.2006.94","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.94","url":null,"abstract":"Nowadays a new form of learning, so called e-learning is being introduced. The motives for this kind of learning are better time use, decrease of educational costs, more effective learning and learning management from the user's side. This form of distance learning is supported by information-communication technology (ICT) and fast computer networks. Biometrics is on the other side becoming a principal method of identification and verification in a \"networked society\". In order to implement absolute security by using biometric features, it is necessary to combine several different biometric traits. There is no ideal biometric feature, nor is it possible to achieve by means of currently available biometric features and available technology. Since the research about the issue of security and privacy in e-learning is still hardly concerned, the objective of this paper is to describe some possibilities of using biometric features and solutions in the field of e-learning systems","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}