Kalman Graffi, A. Kovacevic, N. Liebau, R. Steinmetz
{"title":"From cells to organisms: long-term guarantees on service provisioning in peer-to-peer networks","authors":"Kalman Graffi, A. Kovacevic, N. Liebau, R. Steinmetz","doi":"10.1145/1416729.1416752","DOIUrl":"https://doi.org/10.1145/1416729.1416752","url":null,"abstract":"The peer-to-peer paradigm gained more and more impact in the last years. The reason for P2P arising now is related to the continuous development of device capabilities in the last years, like CPU power, storage space and bandwidth. However, the demand for services and resources is permanently increasing, although the peers have a variety of other resources themselves. In this paper we present the idea of a P2P system acting as a service provider using the resources of participating peers and stating guarantees on the quality of the service it provides. In order to fulfill these service level agreements, the peers confederate to a distributed supervisor of peer resources (DISPRO), monitoring the network, predicting trends on resource availabilities and deciding on resource allocation strategies. This paper discusses the challenges and a solution draft of the concept of DISPRO.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126957211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering protocols and organizational structures in workflows","authors":"C. Hanachi, Imen Khaloul","doi":"10.1145/1416729.1416746","DOIUrl":"https://doi.org/10.1145/1416729.1416746","url":null,"abstract":"Workflow mining consists in analyzing the execution traces of a collaborative system in order to create a workflow. Most of the works in this area focus on the process discovery from log files, while very few of them address the organization aspect. On the other hand, the Agent technology, suitable for the design and development of cooperative systems, offers interaction languages and high-level protocols allowing the representation of fine-grained organizational structures (hierarchy, federation, coalition, market, among others). In this paper, we show how to enrich log files in order to integrate conversations among the actors of processes using a performative-based agent communication language (FIPA-ACL). This enrichment allows us to define algorithms to discover protocols and organizational structures. The organizational structures are represented by graphs where the nodes are the actors and the arcs relations among them (delegation, cooperation, information exchange, and so on). The interaction protocols (auction, contract net) are described by Petri nets. We provide some discovery algorithms as well as a brief description of a Java implementation coupled with a visualization tool called AGNA.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123972020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incidence of the improvement of the transport: MAC protocols interactions on MANET performance","authors":"Sofiane Hamrioui, M. Lalam","doi":"10.1145/1416729.1416748","DOIUrl":"https://doi.org/10.1145/1416729.1416748","url":null,"abstract":"A MANET (Mobile Ad hoc Network) is a collection of terminals equipped with one or several wireless network interfaces. These terminals are potentially mobile and heterogeneous. During their exchanges, every layer of the protocols stack intervenes with its functionality while ignoring its impact on those of other layers. In MANET, functionalities of the MAC (Medium Access Control) layer and the transport layer are very important. In this paper, we study the interactions between MAC protocol and transport protocols notably TCP (Transfer Control Protocol) protocol. We suggest an improvement of these interactions for a better QoS (Quality of service) in MANET. This improvement is based on two solutions. The first one consists on using MAC protocol with a new Backoff algorithm based on a dynamic adaptation of its maximal and minimal bounds in function of the number of nodes used in the network. As for the second solution, it proposes a new TCP acknowledgement mechanism in order to delay these acknowledgements according to the number of nodes. Finally, we end our paper by showing the incidence of this improvement on MANET performance.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125457017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kadda Beghdad Bey, Z. Guessoum, A. Mokhtari, F. Benhammadi
{"title":"Agent based approach for distribution of fingerprint matching in a metacomputing environment","authors":"Kadda Beghdad Bey, Z. Guessoum, A. Mokhtari, F. Benhammadi","doi":"10.1145/1416729.1416766","DOIUrl":"https://doi.org/10.1145/1416729.1416766","url":null,"abstract":"Fingerprint matching is one of the most important problems in an Automatic Fingerprint Identification System. The Fingerprint matching is a high computational task, repetitive and arduous. Moreover, fingerprint databases are by nature large scale. Indeed, there is a need for flexible and independent solution for automatic distribution of fingerprint matching. So, this paper introduces an agent-based distributed matching system. The matching task distributed on a available local Network resources with an optimal way in order to ensure a fast matching process in large scale fingerprint databases. The distribution workload is ensured by our developed middleware allowing the monitoring and prediction of unexploited network computing resources, and designed for the implementation of intensive calculation services.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124174932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal verification of WAHS: an autonomous and wireless P2P auction handling system","authors":"Ines Doghri","doi":"10.1145/1416729.1416754","DOIUrl":"https://doi.org/10.1145/1416729.1416754","url":null,"abstract":"The cross between mobile ad hoc networks (MANETs) and peer to peer (P2P) systems raises interesting capabilities to explore the deployment of various applications. This paper presents a new possibility to bring a mobile commerce application into P2P way. We propose a communication architecture called WAHS (Wireless Auction Handling System) and a communication protocol named BSAP-Protocol (Buyer/Seller Auction Peer) that governs interactions between BSAPs during a P2P auction process. Although tests and simulations give us an excellent overview of the protocol behaviour, the formal verification is needed to prove the correctness of a system. We formally specify and verify the properties of our proposal by the use of PROMELA/SPIN model checker. We implemented P2P auctions over MANETs functionalities' and give the first simulation results that show improvements in comparison to a previously published work.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128125397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic classification of security messages based on text categorization","authors":"F. Benali, S. Ubéda, V. Legrand","doi":"10.1145/1416729.1416741","DOIUrl":"https://doi.org/10.1145/1416729.1416741","url":null,"abstract":"The generated messages by the security devices are the necessary data for the detection of the malicious activities in an information system. The heterogeneity of the devices and the lack of a standard for the security messages make the automatic processing of the messages difficult. The messages are short, use a very wide vocabulary and have different formats. We propose in this article the application of the text categorization technics for the automatic classification of security log files messages, in categories defined by an ontology. We develop an extraction module for the message attributes to reduce the vocabulary size. Then we apply two training algorithms: the k-nearest neighbour algorithm and the naive bayes, on two corpus of security log messages.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123069022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending orchids for intrusion detection in 802.11 wireless networks","authors":"R. B. Younes, G. Tremblay, G. Bégin","doi":"10.1145/1416729.1416740","DOIUrl":"https://doi.org/10.1145/1416729.1416740","url":null,"abstract":"In recent years, wireless equipment and services have become close to ubiquitous. Unfortunately, these services are more often than not ill configured security-wise, with minimal protection against potentially damaging attacks. To alleviate this problem, intrusion detection techniques may be used to help identify suspicious behaviour and counter intrusion attempts.\u0000 In this paper, we describe an extension to the Orchids intrusion detection tool, aimed at detecting intrusions in wireless networks. First, an event analysis module specialized for 802.1 wireless network events has been developed and integrated into Orchids. Next, a number of known attacks (e.g., deauthentication flooding, rogue access points and ChopChop) were modelized and described using declarative signatures. Then, within a simplified but realistic environment, the attacks were reenacted and successfully detected. To our knowledge, our team is the first to detect the ChopChop attack.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133875292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed strict strong coloring algorithm for broadcast applications in ad hoc networks","authors":"Mohammed Haddad, Lyes Dekar, H. Kheddouci","doi":"10.1145/1416729.1416759","DOIUrl":"https://doi.org/10.1145/1416729.1416759","url":null,"abstract":"A challenging research area in computer networks is ad hoc networks. These are defined to be spontaneous and totally autonomous networks. Many communication protocols (like routing, resources sharing, ...) use broadcasting mechanism to diffuse or gather information. A strict strong coloring of a graph G is a vertex proper coloring of G such that each vertex of G is adjacent to at least one non empty color class. In this paper, we give a novel broadcasting approach based on a distributed algorithm for strict strong coloring.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133704425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khouloud Boukadi, C. Ghedira, Sodki Chaari, L. Vincent, Emad Bataineh
{"title":"CWSC4EC: how to employ context, web service, and community in enterprise collaboration","authors":"Khouloud Boukadi, C. Ghedira, Sodki Chaari, L. Vincent, Emad Bataineh","doi":"10.1145/1416729.1416737","DOIUrl":"https://doi.org/10.1145/1416729.1416737","url":null,"abstract":"Web services are becoming an essential support for inter-enterprise collaborative business process. Nevertheless, in spite of the crucial progress in Web service technologies there is some shortage especially in the discovery and selection phase. In fact, Web services are selected based on functional criteria. But, in the case of business process collaboration there is a need to consider more pragmatic criteria such as context parameters. In this work we present a framework for collaboration process creation. It enables Web services selection based on contextual description. For this end, we present a novel categorization for the context suitable to the inter-enterprise collaboration. The context categorization is represented using a flexible and dynamic ontology-based model. In order to enhance Web service selection and to improve the manageability of a high number of Web services, we use the community concept in order to gather specific domain Web services. The presented framework uses abstract templates called Goal templates to insure an abstract description of required web services. Goal templates gather both functional and contextual parameters used to select suitable services.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123885728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mercury: a platform for the execution of multiagent systems","authors":"M. Huget","doi":"10.1145/1416729.1416768","DOIUrl":"https://doi.org/10.1145/1416729.1416768","url":null,"abstract":"JADE and to a lesser extent MadKit are the two most used platforms for the execution of multiagent. This is because these two platforms exist for a long time and are simple to use. In this paper, we present a new proposal called Mercury so as to complete the above mentionned platforms. We describe here the platform architecture, its features related to organization, communication and environment and finally an example.","PeriodicalId":321308,"journal":{"name":"NOuvelles TEchnologies de la REpartition","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}