2009 International Conference on Intelligent Networking and Collaborative Systems最新文献

筛选
英文 中文
Building Hierarchical Switch Network Using OpenFlow 使用OpenFlow构建分层交换网络
H. Shimonishi, H. Ochiai, N. Enomoto, A. Iwata
{"title":"Building Hierarchical Switch Network Using OpenFlow","authors":"H. Shimonishi, H. Ochiai, N. Enomoto, A. Iwata","doi":"10.1109/INCOS.2009.66","DOIUrl":"https://doi.org/10.1109/INCOS.2009.66","url":null,"abstract":"No single layers and technologies can construct a large scale network, thus networks are organized as a physical structure of variety of layers. For example in data center, networks are typically consists of access and aggregation L2 switches and core L2/L3 switches networks. However, new trends for server virtualization can change traffic dynamics, i.e. virtualized host can be located at any locations in the network and connections among servers are set up independently from physical network structure. Therefore static network structure cannot stay optimal and thus, we propose a network architecture whose structure is logically defined and flexibly reconfigurable. The network uniformly consists of OpenFlow switches and constructs a logical routing hierarchy defined by the software at OpenFlow controller. We evaluated our scheme to construct an efficient data center core network. We discussed types of logical structures and path selection algorithms with the constraint of flow table usage, which is one of the most critical constraints for scalable OpenFlow networks. Our simulation evaluation indicates that (1) full-mesh, hypercube and ring-based networks are the realistic logical structure design and that (2) hyperbolic path selection scheme has doubled the path capacity.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection 网络钓鱼网站检测反网络钓鱼工具的实现方法
Abdullah M. Alnajim, M. Munro
{"title":"An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection","authors":"Abdullah M. Alnajim, M. Munro","doi":"10.1109/INCOS.2009.37","DOIUrl":"https://doi.org/10.1109/INCOS.2009.37","url":null,"abstract":"Phishing attacks have become a serious problem for users of online banking and e-commerce websites. A previous study proposed and evaluated a novel anti-Phishing approach that uses training intervention for Phishing websites detection (APTIPWD). The proposed approach showed that it helped users to make correct decisions in distinguishing Phishing and legitimate websites. In this paper, an approach to the implementation of the APTIPWD is presented. It also shows that the APTIPWD is feasible and can be implemented within any proxy-based network easily without writing a single line of a programming code and without undue disruption of the users system.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"84 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120928750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Methods of Locating Mirror Servers with High Connectivity and Small Distances 高连通性和小距离镜像服务器的定位方法
Ryota Nakamura, Akito Hashimoto, H. Miwa
{"title":"Methods of Locating Mirror Servers with High Connectivity and Small Distances","authors":"Ryota Nakamura, Akito Hashimoto, H. Miwa","doi":"10.1109/INCOS.2009.53","DOIUrl":"https://doi.org/10.1109/INCOS.2009.53","url":null,"abstract":"The server mirroring method has extensively used as the technology for contents delivery networks. Several mirror servers that serve same contents are located in a network, and an access is navigated to one of the mirror servers based on the delay time and the load balance. The location of the mirror servers with high reliability against a failure and small delay times of accesses is important.In this paper, we deal with the server location problem, which determines the location of the mirror servers that satisfies the following two constraints: the reachability to at least one server is guaranteed even if a link fails, and the maximum of the sum of the distances to the servers is restricted. We propose two heuristic algorithms for the problem and evaluate the algorithms by applying to some real networks. The results show that the algorithms perform well.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116068657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Simulation and Modelling of a Multi-lane Double Auction Mechanism to Allocate Computational Resources in the Grid 网格中计算资源分配的多车道双竞价机制仿真与建模
Xavier Vilajosana, R. Krishnaswamy, A. Juan, D. Iglesias, J. Marquès
{"title":"Simulation and Modelling of a Multi-lane Double Auction Mechanism to Allocate Computational Resources in the Grid","authors":"Xavier Vilajosana, R. Krishnaswamy, A. Juan, D. Iglesias, J. Marquès","doi":"10.1109/INCOS.2009.18","DOIUrl":"https://doi.org/10.1109/INCOS.2009.18","url":null,"abstract":"Economic models have shown their suitability to allocate resources efficiently, considering an unbalanced supply and demand. As the use of the Grid is extending, a numerous set of distributed resource allocation frameworks have been developed to attain efficient resource management while keeping the scalability of the Grid. However, those frameworks make use of either simple double auction mechanisms or complex approximations to the NP-complete problem of the combinatorial auction. The problem of those mechanisms is that of its generality, that is, they have not been specially designed for the trading of time-leased computational resources. In this paper we present a novel variant of the double auction that has been specially adapted to trade time-differentiated resources as Grid resources can be considered. The paper presents the data structures, algorithms and architecture of the economic mechanism as well as it presents the evaluation of the mechanism through simulation. Simulated results are compared with the main double auction implementations found in the literature. The paper constitutes an approach to improve efficiency of resource allocation in the Grid from the point of view of the economic model and not from architectural aspects addressed by most of the contributions found in the literature.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124857920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECO: Enhanced Reader Collision Avoidance MAC for Reader-Sensor Networks 用于阅读器-传感器网络的增强型阅读器避碰MAC
Doohyun Ko, Hyeong-Jong Ju, Sangbin Lee, Sungjun Kim, Sunshin An
{"title":"ECO: Enhanced Reader Collision Avoidance MAC for Reader-Sensor Networks","authors":"Doohyun Ko, Hyeong-Jong Ju, Sangbin Lee, Sungjun Kim, Sunshin An","doi":"10.1109/INCOS.2009.29","DOIUrl":"https://doi.org/10.1109/INCOS.2009.29","url":null,"abstract":"Abstract—In recent years, one of alternatives for constructing RFID networks that provide mobile services is using wireless sensor networks (WSN) to enhance network capacity,utility and scalability. Due to absence of compatible reader anti-collision control and channel capture phenomenon, the medium access control protocols as used in the RFID networks lead to reader collision and starvation problem. In this paper, we develop a MAC protocol which is called Enhanced Collision Avoidance MAC (ECO) to avoid reader to reader collisions in an integrated RFID network. ECO is a CSMA-based MAC protocol, and operates on integrated nodes which consist of a RFID reader and a mote. Performance evaluation shows superior results to pure-CSMA protocols under dense deployment environments, both in number of failures and in throughput.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-invasive Assessment and Adaptive Interventions in Learning Games 学习游戏中的非侵入性评估和适应性干预
M. Kickmeier-Rust, Christina M. Steiner, D. Albert
{"title":"Non-invasive Assessment and Adaptive Interventions in Learning Games","authors":"M. Kickmeier-Rust, Christina M. Steiner, D. Albert","doi":"10.1109/INCOS.2009.30","DOIUrl":"https://doi.org/10.1109/INCOS.2009.30","url":null,"abstract":"Educational computer games are presently a hot topic in research and development. The idea of utilizing the motivational potential and the rich virtual worlds of today’s computer games is teasing educators as well as technicians. Fully exploiting the educational potential of computer games requires a strong personalization and adaptation to the individual needs and preferences. In the context of games, unfortunately, it is not (easily) possible to apply conventional methods of educational adaptation; methods like curriculum sequencing or adaptive presentation run the risk of seriously compromising the gaming experience and therefore the intrinsic motivation to play (which is considered being the major strength of educational games). In the present paper we present an approach to non-invasively assess knowledge and motivation and to provide the learner with various types of interventions, strongly embedded in the game. The approach is realized and evaluated in the context of the European research project 80Days.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130890807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
QTI for Self-Assessment and Embedded-Assessment in Competence Oriented Scenarios: The Agora Case 能力导向情境中自我评价与嵌入评价的QTI: Agora案例
P. Santos, Wenceslao Llobet, Davinia Hernández Leo, J. Blat
{"title":"QTI for Self-Assessment and Embedded-Assessment in Competence Oriented Scenarios: The Agora Case","authors":"P. Santos, Wenceslao Llobet, Davinia Hernández Leo, J. Blat","doi":"10.1109/INCOS.2009.24","DOIUrl":"https://doi.org/10.1109/INCOS.2009.24","url":null,"abstract":"This paper describes a computer assisted assessment (CAA) case study within the context of an adult school for lifelong learners. The case study shows how to apply eQuestionnaires in competence oriented scenarios, especially for self-assessment activities (where learners have to know their proficiency level in order to further develop a competence) and for embedded-assessment activities (where an eQuestionnaire is contained in the flow of learning activities and is used to promote formative assessment). The assessment specification IMS Question & Test Interoperability (QTI) v2.1 has been used to create the eQuestionnaires. Thanks to the characteristics of the QTI v2.1 compliant tools used during the experience, a competence oriented assessment scenario has been successfully carried out.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130690184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A New Channel in Reo with Fuzzy Method 一种基于模糊方法的Reo新通道
Reza Tavoli, A. Rahmani, M. Teshnehlab
{"title":"A New Channel in Reo with Fuzzy Method","authors":"Reza Tavoli, A. Rahmani, M. Teshnehlab","doi":"10.1109/INCOS.2009.81","DOIUrl":"https://doi.org/10.1109/INCOS.2009.81","url":null,"abstract":"Reo is a Coordination Language which is Channel Based that is used in order to connect components and is able to send certain Data through connectors. Most simple Connectors in Reo are Channels. Reo proffers a pattern for composition of Components that can be used as a language for coordinating parallel applications. Reo has been stated crisp for communication and connecting Components and cooperation of Data and non-crisp side of sending Data has not been proffered. Whereas certain applications have non-crisp side and it is not possible to apply them by Reo, therefore in this paper non-crisp side of sending Data by making fuzzy Reo Channel by using fuzzy rules is proposed.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132256265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distortion-Free Watermarking Scheme for Wireless Sensor Networks 无线传感器网络的无失真水印方案
I. Kamel, Osama AlKoky, A. Dakkak
{"title":"Distortion-Free Watermarking Scheme for Wireless Sensor Networks","authors":"I. Kamel, Osama AlKoky, A. Dakkak","doi":"10.1109/INCOS.2009.67","DOIUrl":"https://doi.org/10.1109/INCOS.2009.67","url":null,"abstract":"Wireless sensor networks have spread widely in the recent years. They have a very wide range of applications such as environment monitoring and military applications like battlefield monitoring. Sensors and their data are vulnerable to various attacks, like data injection, deletion, modification or even node replacement. Because of the resource limitation, security mechanisms that are based on traditional security techniques like public key cryptography and digital signatures are too heavy for wireless sensor networks. Watermarking is considered an attractive alternative because of its light resource requirements. This paper proposes a new technique for providing data integrity for wireless sensor network. The proposed scheme is based on distortion free watermarking. Most of the prior works embed the watermark by replacing the least significant bits of the data. While some applications can tolerate small errors in the data readings, other applications are sensitive to errors. The proposed watermarking technique embeds the watermark in the order of the data elements, and thus, does not cause distortion to the data items. We provide a detailed security analysis to show the robustness of the proposed techniques against various types of attacks. The proposed technique is implemented and the performance, in terms of the attack detection rate and the ability to identify the victim element is evaluated. In case of single attack the proposed technique can identify the victim data reading with high probability (up to 95%). The cost in terms of the execution time of the watermark calculation and embedding is also measured.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131944942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Mobile Learning by the Example of the Carnuntum Scenario 以Carnuntum场景为例的移动学习
Manfred Lohr
{"title":"Mobile Learning by the Example of the Carnuntum Scenario","authors":"Manfred Lohr","doi":"10.1109/INCOS.2009.26","DOIUrl":"https://doi.org/10.1109/INCOS.2009.26","url":null,"abstract":"This paper describes the pedagogical and technological approach to the design of learning activities that can be conducted outside the classroom by using mobile devices. The concept was realized by a role-play applied in the collaborative and mobile learning platform COLLAGE, which was developed in the framework of an EU project. The Collage project was co-financed by the European Commission within the framework of eLearning. The game-like scenario enriches the field experience during outdoor excursions in the Archaeological site of Carnuntum. In order to demonstrate that mobile technology games can generate high degrees of engagement and enthusiasm in children the outcomes of the implementation conducted with three classes consisting of 13-year old children, 16-year old pupils and 17-year old students are described.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"1593 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133818507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信