2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)最新文献

筛选
英文 中文
Bulk Transfer Capacity Estimation in IPv6 Networks IPv6网络中的批量传输容量估计
Robert Gardner, Francisco Garcia
{"title":"Bulk Transfer Capacity Estimation in IPv6 Networks","authors":"Robert Gardner, Francisco Garcia","doi":"10.1109/ICCGI.2006.2","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.2","url":null,"abstract":"Bulk transfer capacity (BTC) is a measure of the sustainable data throughput on a network path that is subject to congestion control algorithms, such as those used by the transmission control protocol (TCP). BTC is an important network performance metric because the vast majority of all traffic, typically around 95% of all packets, is conveyed by TCP. The performance of many Internet-based services is thus largely dependant on the BTC of the underlying network path. This paper proposes a novel tool, ReturnFlow6, for estimating the BTC of an IPv6 network path, conducted from a single point to a non-instrumented target. In order to verify the realistic operation of ReturnFlow6i a series of BTC measurements are conducted on a test network and a 'live' intranet. The results are presented, analyzed and compared against the output of BTC estimation techniques for IPv4, permitting the relative advantages and disadvantages of each approach to be established","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"154 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132781628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-Attribute Decision Making E-Course 多属性决策电子课程
C. Resteanu, M. Somodi, B. Alexe
{"title":"Multi-Attribute Decision Making E-Course","authors":"C. Resteanu, M. Somodi, B. Alexe","doi":"10.1109/ICCGI.2006.44","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.44","url":null,"abstract":"The \"Education and Training 2010\" European Work Program (http://europa.eu.int/comm/education/policies/2010/et_2010_en.html) has a strong support in Romania. The leaders of the National Excellency Research Program encourage the e-learning domain and so a complex project named, Excellency Level Tools for Multi-Attribute Decision Making Field's Promotion\" has been granted. Pertaining to this project, an electronic course on this subject for enhanced learning in making optimal decisions opens a new era in the instrumentation of the lifelong learning process. The electronic course will contain the entire know-how achieved along the years by the team members involved in the Decision Sciences research and applications projects. It will constitute the expression of the also fundamental but mostly applicative research in this area. It is not designed for the international scientific community, but for individuals having a moderate or strong economical, technical and mathematical background, including well prepared students who want to rapidly assimilate this knowledge area","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Study of IPv6 Multicast Deployment in MPLS Netw IPv6组播在MPLS网络中的部署研究
Wim Verrydt, C. Popoviciu
{"title":"Study of IPv6 Multicast Deployment in MPLS Netw","authors":"Wim Verrydt, C. Popoviciu","doi":"10.1109/ICCGI.2006.67","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.67","url":null,"abstract":"Multi Protocol Label Switching (MPLS) [1] has been widely deployed in both service provider and enterprise networks alike. The main drivers for deploying an MPLS based forwarding mechanism for IPv4 include Layer 2 [2] and Layer 3 [3] Virtual Private Networks, and Traffic Engineering [4] and Fast Reroute [5]. The protocol transparency of MPLS infrastructures can also be leveraged, with minimal core impact, to provide IPv6 services. MPLS 6PE (Provider Edge) [6] has proven to be a popular and widely deployed architecture for forwarding IPv6 unicast packets across an IPv4 / MPLS enabled core infrastructure. Along with unicast connectivity, today¿s networks are more and more often required to support IP multicast services as well. It is estimated that new types of end-user applications will significantly increase the need for deploying IPv4 and IPv6 multicast solutions. This paper discusses two possible architecture options for deploying IPv6 multicast [7] forwarding across an already existing IPv4 / MPLS enabled core infrastructure. In both of the scenarios, IPv6 unicast packets are transported through an MPLS 6PE solution.","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Connection Migration Mechanisms in a Cluster Environment 集群环境下的连接迁移机制
Leila Ismail
{"title":"Connection Migration Mechanisms in a Cluster Environment","authors":"Leila Ismail","doi":"10.1109/ICCGI.2006.57","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.57","url":null,"abstract":"Nowadays, grid applications and Web applications introduce significant high availability and scalability challenges to cluster database servers. In this paper, we describe a connection failover mechanism toward building a highly availably infrastructure that is resistant to partial failure. While available solutions concentrate on client transparency, in our work we achieve server transparency as well. We demonstrate that our solution is transparent to clients and servers without compromising the system efficiency. Our mechanisms do involve neither kernel changes nor changes to the server software","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determinants of IP Version 6 Adoption IP版本6采用的决定因素
A. Hovav, Yoo-Jung Kim
{"title":"Determinants of IP Version 6 Adoption","authors":"A. Hovav, Yoo-Jung Kim","doi":"10.1109/ICCGI.2006.28","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.28","url":null,"abstract":"The implementation of a new Internet standard such as IPv6 depends on the usefulness of the technology to the adopting organizations and the environment in which they operate. The adoption of IPv6 in Korea is mostly driven by a governmental strategy that created high network externalities and developed related technologies. However, the speed of adoption is hindered due to lack of information and limited perceived business value","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Using mixed VR/AR technologies in education 在教育中使用混合VR/AR技术
D. Popovici, L. Serbanati
{"title":"Using mixed VR/AR technologies in education","authors":"D. Popovici, L. Serbanati","doi":"10.1109/ICCGI.2006.26","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.26","url":null,"abstract":"In this paper, we describe an ongoing project dedicated to kindergarten children. By invoking a narrative context, we propose to children an AR-based virtual environment within which they are expecting to learn by playing each other, as they are doing in a real context. The proposed subjects for the educational contexts are selected by the teacher, and the children are let to improvise in order to attend the conclusion. The implementation of the system is based on AReVi API for visual rendering, ARToolki t for interaction support, and classical client-server architecture for the environment distribution between several classrooms","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Toward Reconciling Availability, Consistency and Integrity in Replicated Information Systems 在复制信息系统中协调可用性、一致性和完整性
H. Decker, F. D. Muñoz-Escoí, J. E. Armendáriz-Iñigo
{"title":"Toward Reconciling Availability, Consistency and Integrity in Replicated Information Systems","authors":"H. Decker, F. D. Muñoz-Escoí, J. E. Armendáriz-Iñigo","doi":"10.1109/ICCGI.2006.47","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.47","url":null,"abstract":"The availability of information systems benefits from distributed replication. Different applications and users require different degrees of data availability, consistency and integrity. The latter are perceived as competing objectives that need to be reconciled by appropriate replication strategies. We outline work in progress on a replication architecture for distributed information systems. It simultaneously maintains several protocols, so that it can be re-configured on the fly to the actual needs of availability, consistency and integrity of possibly simultaneous applications and users","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134099133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening ECDSA Verification Algorithm to be More Suitable to Mobile Networks 加强ECDSA验证算法使其更适合移动网络
K. K., Narayanasamy P
{"title":"Strengthening ECDSA Verification Algorithm to be More Suitable to Mobile Networks","authors":"K. K., Narayanasamy P","doi":"10.1109/ICCGI.2006.78","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.78","url":null,"abstract":"The primary objective of the paper is to augment the efficiency of signature process in elliptic curve digital signature algorithm (ECDSA), which turns out to be a bottleneck in mobile devices due to its heavy consumption of resources. An improved algorithm for strengthening the speed of verification process in ECDSA is proposed and evaluated. A comparative study of Comb algorithm with the proposed algorithm for simultaneous multiplication on the NIST-recommended elliptic curves over prime fields is done and a broad analysis of the outcomes is also carried out. Strengthening the pre-computation process with respect to the speed of execution during verification will be the crucial task of this implementation","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134483457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Complex vs. Intensive in Parallel Computation 并行计算中的复杂vs密集
M. Malita, G. Stefan, M. Stoian
{"title":"Complex vs. Intensive in Parallel Computation","authors":"M. Malita, G. Stefan, M. Stoian","doi":"10.1109/ICCGI.2006.65","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.65","url":null,"abstract":"The distinction between complex computation and intensive computation becomes more meaningful now, when all high performance computing machines are de facto parallel machines. The distinction is stated by introducing the concept of integral parallel computation as the most natural and efficient way to increase the performance using all kinds of parallel computations. A new functional taxonomy of parallel machines is used to support the integral approach. Finally, the new concepts and distinctions are exemplified describing the Connex Architecture and its first embodiment: the video-chip CA1024 launched by Connex Technology, Inc.","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133522000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
E-learning: Biometrics as a Security Factor 电子学习:生物识别作为一种安全因素
K. Rabuzin, M. Baca, M. Sajko
{"title":"E-learning: Biometrics as a Security Factor","authors":"K. Rabuzin, M. Baca, M. Sajko","doi":"10.1109/ICCGI.2006.94","DOIUrl":"https://doi.org/10.1109/ICCGI.2006.94","url":null,"abstract":"Nowadays a new form of learning, so called e-learning is being introduced. The motives for this kind of learning are better time use, decrease of educational costs, more effective learning and learning management from the user's side. This form of distance learning is supported by information-communication technology (ICT) and fast computer networks. Biometrics is on the other side becoming a principal method of identification and verification in a \"networked society\". In order to implement absolute security by using biometric features, it is necessary to combine several different biometric traits. There is no ideal biometric feature, nor is it possible to achieve by means of currently available biometric features and available technology. Since the research about the issue of security and privacy in e-learning is still hardly concerned, the objective of this paper is to describe some possibilities of using biometric features and solutions in the field of e-learning systems","PeriodicalId":112974,"journal":{"name":"2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116438312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信