Bo Lv, Zhen-kai Wang, Tao Huang, Jianya Chen, Yun-jie Liu
{"title":"A Hierarchical Management Architecture for Virtual Network Mapping","authors":"Bo Lv, Zhen-kai Wang, Tao Huang, Jianya Chen, Yun-jie Liu","doi":"10.1109/ITAPP.2010.5566328","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566328","url":null,"abstract":"Network Virtualization is a promising way to deploy future network architectures supporting diverse virtual networks sharing the substrate network. But the increased flexibility poses a daunting challenge to the management and control of the virtual resources to ensure efficient resource utilization and QoS guarantee. In this paper, we propose an architecture based on a hierarchical and multi-domain management mechanism that allows for separate Management Elements responsible for the corresponding domain's resource assignment individually and executing virtual network embedding in parallel. The hierarchical management framework reduces the complexity, improves the efficiency and satisfies the real-time requirement of virtual network embedding to a shared substrate network.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116240516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of RetractionThe Study of Satisfaction Based on System Test Method","authors":"Song Jianbin, Fei Huang","doi":"10.1109/ITAPP.2010.5566387","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566387","url":null,"abstract":"In this paper, the personal financial assessment system of Industrial and Commercial Bank of China branch in Suzhou was used for a example, during the designing and testing in parallel, according to test results, we propose a method to calculate the satisfaction of the software system, to judge the performance of the system and to analysis the extent of the various stages of testing changes, then evaluate the quality of the system changes.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115948996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Markov-Model to Human Resource Planning","authors":"Yanli Wu","doi":"10.1109/ITAPP.2010.5566529","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566529","url":null,"abstract":"Enterprises in achieving long-term development in the process of enterprise development strategy must be established with the corresponding human resource planning system. Rational planning of human resources, on the one hand can guarantee that the manpower needs of enterprise development, it also avoids resulting in oversupply of labor. And how to correctly predict the company's future manpower needs and composition of the situation has become an important issue for management community. In this paper, a high technology companies, for example, using Markov-model of human resource planning, study on the company's human resources within the next three years and predict the supply situation ,and do further analysis of the external supply conditions.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Multi-Fractal Network Traffic Model Based on Video Traffic","authors":"Liya Huang, Suoping Wang, Yu Zhang","doi":"10.1109/ITAPP.2010.5566570","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566570","url":null,"abstract":"After pointing out the limitation of the traditional multifractal wavelet model (MWM), and analyzing multi-resolution characteristics of real video traffic, this paper proposes an adjustable scale coefficient MWM model. The improved MWM can adjust wavelet coefficients and multiplicative coefficients based on their distribution of the real network traffic, which can suit the real network characteristics. Subsequently the scale function and multifractal spectrum of the new model are analyzed. The conclusion proves the new model's accuracy.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk and Prevention on Information Security of E-Governmental Administration","authors":"Jun Wang","doi":"10.1109/ITAPP.2010.5566651","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566651","url":null,"abstract":"Risk points in the physical layer, network layer, system layer, application layer and management layer exist in the information security of E-governmental administration. In order to effectively guard against these security risks,a system including basic safety facilities, technical support, operation management and social services must be constructed.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116612520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Data Mining Techniques in Web-Based Instruction Data Analysis","authors":"M. Yao, Xi-zi Jin, Na Wang","doi":"10.1109/ITAPP.2010.5566101","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566101","url":null,"abstract":"In order to solve practical problems in network teaching data analysis ,the web-based instruction data of mathematical models and model framework was build .In the core process that data scoop out, the main adoption the classification method based on the continuity of data.It firstly gains the class-contained from the sample, and then obtains the standard category through the degree of support, finally marks the degree of strength among the inside members. This approach is only sensitive to the even distribution of the inside sample points, it does not require pre-set parameters . Using the clustering method analysis the web-based instruction data, the problem of web-based instruction data automatically cluster was solved.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116777482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on the Mechanism of the Forming and Evolution of the Firm's Innovation Networks Based on Hypercycle","authors":"Yan-ping Yang","doi":"10.1109/ITAPP.2010.5566337","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566337","url":null,"abstract":"In this paper, the theory of hypercycle is applied to study the mechanism of the forming and evolution of the firm's innovation networks. The networks' genes and enzymes which control the genes' copy are looked into. It is concluded that it is the hypercycle that contributes to the forming and evolution of the firm's innovation networks as it does to the origin and evolution of the life. The forming and evolutionary process of the firm's innovation networks is characterized as self-organization, self-enhancement, mutual enhancement and co-evolution.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125690813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wavelet-Based Surface Texture Image Compression and Construction","authors":"Rongyi He, Muwei Jian","doi":"10.1109/ITAPP.2010.5566644","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566644","url":null,"abstract":"the three-dimensional surface texture can display the texture information varying with scene illumination and the view angles; therefore it is widely used in virtual reality and computer games. The 3D Texture is an important sub-area within the image processing. In this paper, we first introduced the wavelet analysis, and then we proposed our methods based on the wavelet analysis and extended it into 3D surface textures compression and construction. The experimental results demonstrate that the method is effective.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122675179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Dynamic Overlay Routing Mechanism Based on Real-Time Probing Measurements","authors":"Jingyu Ding, Yaohui Jin, Jiajin Le","doi":"10.1109/ITAPP.2010.5566424","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566424","url":null,"abstract":"Recent studies on overlay networks have shown that non-default paths can provide dramatically large performance benefits compared to default ones. In the present paper, we propose a dynamic overlay routing mechanism which chooses paths based on a composite metric determined by actively probed delay and jitter information in a real-time fashion. The effectiveness of this mechanism is examined under overlay emulation environment, which is supported by the performance data collected from a real enterprise overlay network.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121635204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Vulnerability and Solution of TCP Persistent Timer in Linux","authors":"Man-sha Lu","doi":"10.1109/ITAPP.2010.5566250","DOIUrl":"https://doi.org/10.1109/ITAPP.2010.5566250","url":null,"abstract":"As a current main end-to-end communication protocol there are a few vulnerabilities in TCP specification. The paper discusses the theory and vulnerability of TCP persist timer and analyzes the implementation of it in Linux. The vulnerability can lead to the infamous DOS attack. In the end of the paper we give two solutions to defense this type of DOS attack through modifying Linux kernel codes or through application implementation.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132565728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}