2010 2nd International Conference on Information Technology Convergence and Services最新文献

筛选
英文 中文
Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention 一体化DDoS攻击防范基础设施,有效防范攻击
Yang-Seo Choi, J. Oh, Jongsoo Jang, Jaecheol Ryou
{"title":"Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention","authors":"Yang-Seo Choi, J. Oh, Jongsoo Jang, Jaecheol Ryou","doi":"10.1109/ITCS.2010.5581263","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581263","url":null,"abstract":"Currently attackers are trying to paralyze servers and networks with various types of DDoS attacks. For example, on 7th July in 2009, a DDoS attack occurred against 48 web sites in South Korea and U.S.A. In this attack, the attack traffic pattern and the botnet construction methods are different from that of previous version. Due to the differences of the attack patterns, the 7.7 DDoS attack was not detected easily. These days, such new types of sophisticated attacks occur and it???s not easy to detect those attacks effectively. In fact, it???s been more than ten years since DDoS attacks discovered in late 1990s. However, DDoS attack is still one of the biggest threats in Internet infrastructure and IT environment. It is because almost all the DDoS defense techniques are not focused on general characteristics and infrastructure but on specific characteristics in each attack. In order to develop a general purpose DDoS defense technology, all the attack process and general characteristics should be analyzed. Furthermore, based on the each attack phases and location of network topology also have to be analyzed. For that, in this paper, we show a general DDoS attack process and each phase in this process. For each phase, we propose DDoS attack prevention requirements and finally suggest the integrated DDoS attack defense infrastructure. For the detailed explanation, we classify attack detection techniques into three categories.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127894220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
NPA: Increased Partitioning Approach for Massive Data in Real-Time Data Warehouse NPA:实时数据仓库中海量数据的增强分区方法
Jie Song, Y. Bao
{"title":"NPA: Increased Partitioning Approach for Massive Data in Real-Time Data Warehouse","authors":"Jie Song, Y. Bao","doi":"10.1109/ITCS.2010.5581277","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581277","url":null,"abstract":"In many business and scientific data warehouses, not only the data amount is growing in geometric series, but also the requirement of real-time capability is increasing. Database partitioning technique which adopts ???divide and conquer??? method can efficiently simplify the complexity of managing massive data and improve the performance of the system, especially the range partitioning. The traditional range partitioning approach brings heavy burden to the system without a increased partitioning algorithm, so it does not adapt to the real-time data warehouse partitioning. To speed up the partitioning algorithm, the current partitioning technology is well studied and three effective range partitioning algorithms for the massive data are proposed, which based on allowing the fluctuation of data amount in each range of partitions. At last, some experiments and applications show that the proposed algorithms are more effective and efficient to partitioning and repartitioning tables in the real-time data warehouse.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122654630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Bio-Inspired Self-Reconfigurable Architecture for Mobile Agents in Distributed and Networked Environments 分布式和网络环境下移动代理的仿生自重构体系结构
Ki-Won Yeom
{"title":"Bio-Inspired Self-Reconfigurable Architecture for Mobile Agents in Distributed and Networked Environments","authors":"Ki-Won Yeom","doi":"10.1109/ITCS.2010.5581271","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581271","url":null,"abstract":"This paper presents an approach to develop and manage self organizing distributed components systems in dynamically changing environments. The main idea of this approach is to construct an application by a dynamic association of bio-inspired modular agents that can migrate and reorganize by themselves while the application is being executed. An association of agents can be migrated and transformed according to agents??? local policies including deployment based on biological processes. We have designed an adaptive architecture, which can reorganize and reconfigure agents after several biological concepts and mechanisms, and implemented a platform to host the architecture on the dynamically changing environments. The agents in the proposed framework are designed based on several biological concepts. This paper depicts several key features of the agents in the framework, and describes the design and implementation of the proposed platform. Several simulation results are presented to examine scalability and efficiency of the platform.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131118860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Test Architecture for Asynchronous Network-on-Chip Routing Networks 异步片上网络路由网络的快速测试体系结构
Chul-ki Baek, In-Sub Kim, Jung-Tae Kim, Yong-Hyun Kim, Hyoung B. Min, Jae-Hoon Lee
{"title":"A Fast Test Architecture for Asynchronous Network-on-Chip Routing Networks","authors":"Chul-ki Baek, In-Sub Kim, Jung-Tae Kim, Yong-Hyun Kim, Hyoung B. Min, Jae-Hoon Lee","doi":"10.1109/ITCS.2010.5581281","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581281","url":null,"abstract":"ANoC (Asynchronous Network-on-Chip) has been developed to solve problems of large number of cores in SoC (System-on-Chip) by giving asynchronism to every core. This new architecture requires new Testing methods different from the existing SoC Test, and it freshly needs the test of router and routing networks. This paper first offers high-speed testing architecture that tests more than one routers and networks at the same time in the 2-D mesh topology. Then, the structure of wrapper for realization of this method is explained. We show that the more number of routers is, the more effective performance is by checking the clock count for test of various ANoCs that have several sizes.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115193560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Knowledge Sharings of Social and Digital Networkings 社交网络与数字网络知识共享的比较研究
Sun Moo Kim, Giseob Byun, Hyunsik Seo, Taisiya Kim, B. Lee
{"title":"A Comparative Study of Knowledge Sharings of Social and Digital Networkings","authors":"Sun Moo Kim, Giseob Byun, Hyunsik Seo, Taisiya Kim, B. Lee","doi":"10.1109/ITCS.2010.5581279","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581279","url":null,"abstract":"The purpose of this study is to investigate the impact of the activities for KM on the knowledge sharing through the social networking and digital networking. The research conducted a survey and analyzed the level of the social and digital networking, and identified the relationships with the factors of KM activities, and the knowledge sharing. As the results, the findings illustrate that the managers focused on digital networking based on IS for knowledge sharing. In contrast, for the employees, they mainly focused on social networking. Moreover, as a result of that all the social and digital networking are positive effect on the knowledge sharing, it is need to establish strategies for knowledge sharing through social networking in their organizations.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130065623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust Modeling Framework for Message Propagation and Evaluation in VANETs VANETs中消息传播与评估的信任建模框架
Cheng Chen, Jie Zhang, R. Cohen, P. Ho
{"title":"A Trust Modeling Framework for Message Propagation and Evaluation in VANETs","authors":"Cheng Chen, Jie Zhang, R. Cohen, P. Ho","doi":"10.1109/ITCS.2010.5581298","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581298","url":null,"abstract":"In this paper, we present a trust-based message propagation and evaluation framework in vehicular ad-hoc networks where peers share information regarding road condition or safety and others provide opinions about whether the information can be trusted. More specifically, our trustbased message propagation model collects and propagates peers??? opinions in an efficient, secure and scalable way by dynamically controlling information dissemination. The trust-based message evaluation model allows peers to evaluate the information in a distributed and collaborative fashion by taking into account others??? opinions. Experimental results demonstrate that our proposed framework promotes network scalability and system effectiveness in information evaluation under the pervasive presence of false information, which are the two essentially important factors for the popularization of vehicular networks.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134614948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
A Fair-Oriented Two-Level Scheduling Scheme for Downlink Traffic in WiMAX Network 面向公平的WiMAX下行流量两级调度方案
W. Nie, N. Xiong, J. Park, Sang-Soo Yeo
{"title":"A Fair-Oriented Two-Level Scheduling Scheme for Downlink Traffic in WiMAX Network","authors":"W. Nie, N. Xiong, J. Park, Sang-Soo Yeo","doi":"10.1109/ITCS.2010.5581291","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581291","url":null,"abstract":"The IEEE 802.16 standard is proposed to provide a wide-range broadband wireless service, but it leaves the implementation of the wireless resource scheduler as an open issue. We study the scheduling algorithm and propose a fairoriented two-level scheduling scheme for downlink traffic in a WiMAX network. A central controller (Base Station) has a number of users, and different mobile subscriber stations have different channel conditions. Even the same mobile subscriber station has different service requirements in the WiMAX network. Our design improves throughput and alleviates the delay and also ensures fairness in the network. Our results show our scheduling algorithm can increase the network throughput, maintain the relative fairness, and lower delay compared with the round robin algorithm.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Preservation in SAT (Single Authentication Through) SAT中的隐私保护(通过单一认证)
G. Kim, SuGil Choi, Deok-Gyu Lee, J. Han
{"title":"Privacy Preservation in SAT (Single Authentication Through)","authors":"G. Kim, SuGil Choi, Deok-Gyu Lee, J. Han","doi":"10.1109/ITCS.2010.5581262","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581262","url":null,"abstract":"In SAT (Single Authentication Through) scheme, each smart camera is capable of identifying, tracking identified objects, and delivering associate ID information to sibling subjects. So in this paper, we suggest a privacy preservation scheme for preventing privacy infringement during propagation of sensitive information.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Model Based Face Recognition Using Inverse Compositional Image Alignment 基于逆组合图像对齐的三维模型人脸识别
Sanghoon Kim, K. Jeong, Hyeonjoon Moon
{"title":"3D Model Based Face Recognition Using Inverse Compositional Image Alignment","authors":"Sanghoon Kim, K. Jeong, Hyeonjoon Moon","doi":"10.1109/ITCS.2010.5581265","DOIUrl":"https://doi.org/10.1109/ITCS.2010.5581265","url":null,"abstract":"3D model based approach for face recognition has been investigated as a robust solution for pose and illumination variation. Since a generative 3D face model consists of a large number of vertices, a 3D model based face recognition system is generally inefficient in computation time and complexity. In this paper we propose a novel 3D face representation algorithm based on pixel to vertex map (PVM) to reduce number of vertices. We explore shape and texture coefficient vectors of the model by fitting it to an input face using inverse compositional image alignment (ICIA) to evaluate face recognition performance. Experimental results show that proposed face recognition system is efficient in computation time while maintaining reasonable accuracy.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"52 361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126160519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Online Auction with Behavioral and Intuitive Functions 开发具有行为和直观功能的网上拍卖
2010 2nd International Conference on Information Technology Convergence and Services Pub Date : 2010-09-23 DOI: 10.1504/IJITCC.2012.045806
Dave E. Marcial, Josel Pasilan, Andrew Glovasa, Alfran Keith Consing, Carl Louie Mamhot, Aine Aira Tomada
{"title":"Developing Online Auction with Behavioral and Intuitive Functions","authors":"Dave E. Marcial, Josel Pasilan, Andrew Glovasa, Alfran Keith Consing, Carl Louie Mamhot, Aine Aira Tomada","doi":"10.1504/IJITCC.2012.045806","DOIUrl":"https://doi.org/10.1504/IJITCC.2012.045806","url":null,"abstract":"This paper discusses the techniques and methods in developing a web-based auction site which integrates behavioral targeting into its design. This paper further presents and explains several theorems in achieving behavioral and intuitive approaches to online auctioning process. The system, called i-BID, is developed using a Web 2.0 standards in its design to demonstrate the implementation of the behavioral and intuitive approaches. This online system is objectively developed to provide users with a rich, intuitive, and efficient interface. i-BID was rated high on the ???Ease and Intuitiveness??? criterion while the general impact of the behavioral targeting functions of the site is fairly high.","PeriodicalId":166169,"journal":{"name":"2010 2nd International Conference on Information Technology Convergence and Services","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126924511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信