2010 International Conference on Internet Technology and Applications最新文献

筛选
英文 中文
A Hierarchical Management Architecture for Virtual Network Mapping 虚拟网络映射的分层管理体系结构
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566328
Bo Lv, Zhen-kai Wang, Tao Huang, Jianya Chen, Yun-jie Liu
{"title":"A Hierarchical Management Architecture for Virtual Network Mapping","authors":"Bo Lv, Zhen-kai Wang, Tao Huang, Jianya Chen, Yun-jie Liu","doi":"10.1109/ITAPP.2010.5566328","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566328","url":null,"abstract":"Network Virtualization is a promising way to deploy future network architectures supporting diverse virtual networks sharing the substrate network. But the increased flexibility poses a daunting challenge to the management and control of the virtual resources to ensure efficient resource utilization and QoS guarantee. In this paper, we propose an architecture based on a hierarchical and multi-domain management mechanism that allows for separate Management Elements responsible for the corresponding domain's resource assignment individually and executing virtual network embedding in parallel. The hierarchical management framework reduces the complexity, improves the efficiency and satisfies the real-time requirement of virtual network embedding to a shared substrate network.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116240516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Notice of RetractionThe Study of Satisfaction Based on System Test Method 基于系统测试方法的满意度研究
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566387
Song Jianbin, Fei Huang
{"title":"Notice of RetractionThe Study of Satisfaction Based on System Test Method","authors":"Song Jianbin, Fei Huang","doi":"10.1109/ITAPP.2010.5566387","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566387","url":null,"abstract":"In this paper, the personal financial assessment system of Industrial and Commercial Bank of China branch in Suzhou was used for a example, during the designing and testing in parallel, according to test results, we propose a method to calculate the satisfaction of the software system, to judge the performance of the system and to analysis the extent of the various stages of testing changes, then evaluate the quality of the system changes.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115948996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Markov-Model to Human Resource Planning 马尔可夫模型在人力资源规划中的应用
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566529
Yanli Wu
{"title":"Application of Markov-Model to Human Resource Planning","authors":"Yanli Wu","doi":"10.1109/ITAPP.2010.5566529","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566529","url":null,"abstract":"Enterprises in achieving long-term development in the process of enterprise development strategy must be established with the corresponding human resource planning system. Rational planning of human resources, on the one hand can guarantee that the manpower needs of enterprise development, it also avoids resulting in oversupply of labor. And how to correctly predict the company's future manpower needs and composition of the situation has become an important issue for management community. In this paper, a high technology companies, for example, using Markov-model of human resource planning, study on the company's human resources within the next three years and predict the supply situation ,and do further analysis of the external supply conditions.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Multi-Fractal Network Traffic Model Based on Video Traffic 基于视频流量的改进多重分形网络流量模型
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566570
Liya Huang, Suoping Wang, Yu Zhang
{"title":"An Improved Multi-Fractal Network Traffic Model Based on Video Traffic","authors":"Liya Huang, Suoping Wang, Yu Zhang","doi":"10.1109/ITAPP.2010.5566570","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566570","url":null,"abstract":"After pointing out the limitation of the traditional multifractal wavelet model (MWM), and analyzing multi-resolution characteristics of real video traffic, this paper proposes an adjustable scale coefficient MWM model. The improved MWM can adjust wavelet coefficients and multiplicative coefficients based on their distribution of the real network traffic, which can suit the real network characteristics. Subsequently the scale function and multifractal spectrum of the new model are analyzed. The conclusion proves the new model's accuracy.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk and Prevention on Information Security of E-Governmental Administration 电子政务信息安全的风险与防范
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566651
Jun Wang
{"title":"Risk and Prevention on Information Security of E-Governmental Administration","authors":"Jun Wang","doi":"10.1109/ITAPP.2010.5566651","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566651","url":null,"abstract":"Risk points in the physical layer, network layer, system layer, application layer and management layer exist in the information security of E-governmental administration. In order to effectively guard against these security risks,a system including basic safety facilities, technical support, operation management and social services must be constructed.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116612520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Data Mining Techniques in Web-Based Instruction Data Analysis 数据挖掘技术在基于web的教学数据分析中的应用
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566101
M. Yao, Xi-zi Jin, Na Wang
{"title":"Using Data Mining Techniques in Web-Based Instruction Data Analysis","authors":"M. Yao, Xi-zi Jin, Na Wang","doi":"10.1109/ITAPP.2010.5566101","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566101","url":null,"abstract":"In order to solve practical problems in network teaching data analysis ,the web-based instruction data of mathematical models and model framework was build .In the core process that data scoop out, the main adoption the classification method based on the continuity of data.It firstly gains the class-contained from the sample, and then obtains the standard category through the degree of support, finally marks the degree of strength among the inside members. This approach is only sensitive to the even distribution of the inside sample points, it does not require pre-set parameters . Using the clustering method analysis the web-based instruction data, the problem of web-based instruction data automatically cluster was solved.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116777482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on the Mechanism of the Forming and Evolution of the Firm's Innovation Networks Based on Hypercycle 基于超循环的企业创新网络形成与演化机制分析
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566337
Yan-ping Yang
{"title":"Analysis on the Mechanism of the Forming and Evolution of the Firm's Innovation Networks Based on Hypercycle","authors":"Yan-ping Yang","doi":"10.1109/ITAPP.2010.5566337","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566337","url":null,"abstract":"In this paper, the theory of hypercycle is applied to study the mechanism of the forming and evolution of the firm's innovation networks. The networks' genes and enzymes which control the genes' copy are looked into. It is concluded that it is the hypercycle that contributes to the forming and evolution of the firm's innovation networks as it does to the origin and evolution of the life. The forming and evolutionary process of the firm's innovation networks is characterized as self-organization, self-enhancement, mutual enhancement and co-evolution.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125690813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wavelet-Based Surface Texture Image Compression and Construction 基于小波的表面纹理图像压缩与构造
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566644
Rongyi He, Muwei Jian
{"title":"Wavelet-Based Surface Texture Image Compression and Construction","authors":"Rongyi He, Muwei Jian","doi":"10.1109/ITAPP.2010.5566644","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566644","url":null,"abstract":"the three-dimensional surface texture can display the texture information varying with scene illumination and the view angles; therefore it is widely used in virtual reality and computer games. The 3D Texture is an important sub-area within the image processing. In this paper, we first introduced the wavelet analysis, and then we proposed our methods based on the wavelet analysis and extended it into 3D surface textures compression and construction. The experimental results demonstrate that the method is effective.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Dynamic Overlay Routing Mechanism Based on Real-Time Probing Measurements 一种基于实时探测测量的动态叠加路由机制
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566424
Jingyu Ding, Yaohui Jin, Jiajin Le
{"title":"A Novel Dynamic Overlay Routing Mechanism Based on Real-Time Probing Measurements","authors":"Jingyu Ding, Yaohui Jin, Jiajin Le","doi":"10.1109/ITAPP.2010.5566424","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566424","url":null,"abstract":"Recent studies on overlay networks have shown that non-default paths can provide dramatically large performance benefits compared to default ones. In the present paper, we propose a dynamic overlay routing mechanism which chooses paths based on a composite metric determined by actively probed delay and jitter information in a real-time fashion. The effectiveness of this mechanism is examined under overlay emulation environment, which is supported by the performance data collected from a real enterprise overlay network.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121635204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Vulnerability and Solution of TCP Persistent Timer in Linux Linux下TCP持久定时器的漏洞及解决方案
2010 International Conference on Internet Technology and Applications Pub Date : 2010-09-09 DOI: 10.1109/ITAPP.2010.5566250
Man-sha Lu
{"title":"The Vulnerability and Solution of TCP Persistent Timer in Linux","authors":"Man-sha Lu","doi":"10.1109/ITAPP.2010.5566250","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566250","url":null,"abstract":"As a current main end-to-end communication protocol there are a few vulnerabilities in TCP specification. The paper discusses the theory and vulnerability of TCP persist timer and analyzes the implementation of it in Linux. The vulnerability can lead to the infamous DOS attack. In the end of the paper we give two solutions to defense this type of DOS attack through modifying Linux kernel codes or through application implementation.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132565728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信