ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.最新文献

筛选
英文 中文
IPv6Suite: a simulation tool for modeling protocols of the next generation Internet IPv6Suite:下一代互联网协议建模仿真工具
E. Wu, Steve Woon, Johnny Lai, Y. Sekercioglu
{"title":"IPv6Suite: a simulation tool for modeling protocols of the next generation Internet","authors":"E. Wu, Steve Woon, Johnny Lai, Y. Sekercioglu","doi":"10.1109/ITRE.2005.1503159","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503159","url":null,"abstract":"In this paper, we describe our software tool (IPv6Suite) which is capable of simulating IPv6 networks accurately. The IPv6 network components are modeled in detail with important functionalities closely following the relevant protocol standard. The OMNeT++ simulation environment is used, providing a generic and flexible architecture with a strong graphical user interface (GUI) support. This allowed the construction of a comprehensive IPv6 model, which is customizable and easy to use. IPv6Suite is a powerful tool for learning and researching IPv6 networks and protocols.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132810715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frame-based attack representation and real-time first order logic automatic reasoning 基于帧的攻击表示和实时一阶逻辑自动推理
W. Yan, E. Hou, N. Ansari
{"title":"Frame-based attack representation and real-time first order logic automatic reasoning","authors":"W. Yan, E. Hou, N. Ansari","doi":"10.1109/ITRE.2005.1503109","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503109","url":null,"abstract":"Internet has grown by several orders of magnitude in recent years, prompting network security as a great concern. Hence, intrusion detection systems (IDSs) are used to timely detect intrusions and defend against attack attempts. However, the current IDS technology generates a huge volume of alert events due to false alarm alerts, and requires costly alert manual reviewing due to the lack of intelligence in IDS. As a solution, security information management (SIM) is a growing area of interest in network security. In this paper, we propose FAR-FAR (frame-based attack representation and first-order logic automatic reasoning) system in SIM to relieve the administrator from the time-consuming and costly alert manual reviewing. With the backward-chaining, FAR-FAR can make real-time reasoning for network attack scenarios. In FAR-FAR, the aggregated alerts from different IDS agents are converted into uniform frame-structured streams by case grammar. Afterwards, first-order logic production rules are used to extract the hidden attack scenarios. Our simulation results show that FAR-FAR's attack scenario reasoning rate for the incoming alerts are generally far less than the incoming alerts' inter-arrival time. This guarantees FAR-FAR to automatically reason the attack plans in real time and predict possible attack attempts at an early stage.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116202865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A robust watermarking scheme for digital image using self similarity 一种基于自相似性的鲁棒数字图像水印方案
Jieh-Ming Shieh, D. Lou, H. Tso
{"title":"A robust watermarking scheme for digital image using self similarity","authors":"Jieh-Ming Shieh, D. Lou, H. Tso","doi":"10.1109/ITRE.2005.1503079","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503079","url":null,"abstract":"The robust watermarking technique has been generally discussed for protecting the copyright of digital media. The paper proposes a watermarking technique with self similarity to achieve the requirement of robustness. Instead of modifying the original image to embed a watermark into an image, the proposed scheme extract a watermark from a protected image by using self similarity between wavelet sub-bands. In the verification stage, the watermark extracting does not need the original image but the attacked image. Then the extracted watermark is compared with the original watermark for copyright verification. The proposed method has the following advantages. The first one is that the proposed method does not modify the protected image. The second one is that the original image is not necessary in the verification process. The third one is that the proposed method is robust to resist several image processing attacks such as JPEG and JPEG2000 compression, blurring, sharpening, noise adding, and scaling.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122253941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A network layer security mechanism based on collaborative intelligent agents in MANET 一种基于协同智能代理的网络层安全机制
Lu Han, Dongmin Zhao, Manli Zhou
{"title":"A network layer security mechanism based on collaborative intelligent agents in MANET","authors":"Lu Han, Dongmin Zhao, Manli Zhou","doi":"10.1109/ITRE.2005.1503066","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503066","url":null,"abstract":"A new network-layer security mechanism incorporating mobile agent security and grid technology is presented. The architecture of scheme is introduced along with the method to manage sub-network in grid format and the secure routing protocol. The storage space complexity and operational time of the new scheme are then analyzed. Simulation results show that the proposed mechanism is capable of achieving reliable performance in terms of packet delivery ratio when the network environment is insecure.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115538740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of a biology data translation system on grid environments 网格环境下生物数据转换系统的实现
Chao-Tung Yang, Yi-Chun Hsiung, H. Kan
{"title":"Implementation of a biology data translation system on grid environments","authors":"Chao-Tung Yang, Yi-Chun Hsiung, H. Kan","doi":"10.1109/ITRE.2005.1503151","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503151","url":null,"abstract":"Biological data exists all over the world as various Web services, which provide biologists with much useful information. However, heterogeneous data formats present a technical hurdle for biologists to fully take advantage of the information. It needs some power tools to handle this issue. The grid technology could help common biology tools with high performance and high throughput. Even so, the data formats produced from various biology tools are heterogeneous. The process of information integration of heterogeneous biological data is complex and difficult. This paper describes an approach to solve this problem by using XML technologies combine with BioGrid system. We use BioJava to integrate with our system for translating data into XML format. Finally, an example is used to illustrate how these techniques can come together in integrating heterogeneous biological data sources.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115736578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context discovery in sensor networks 传感器网络中的上下文发现
Chia-Hsing Hou, Hung-Chang Hsiao, C. King, Chun-Nan Lu
{"title":"Context discovery in sensor networks","authors":"Chia-Hsing Hou, Hung-Chang Hsiao, C. King, Chun-Nan Lu","doi":"10.1109/ITRE.2005.1503053","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503053","url":null,"abstract":"Context discovery refers loosely to the operations of extraction, aggregation, storage and deduction of environmental information. Such information can be delivered to context-aware applications so that they can adapt their behavior according to the discovered contexts. Context information may be sensed and extracted by various sensors deployed freely in the environment These sensors must be interconnected to allow sensed data be collected. They are often heterogeneous with different sensing and computing capabilities to allow multimodal sensing. To help the interaction among the heterogeneous sensors in a context-aware environment, we need an efficient data-centric communication substrate on top of these sensors. The substrate must be self-organizing, self-tuning, and self-healing. It also needs to exploit the ad hoc interactions among heterogeneous sensors for energy conservation and operation efficiency. In this paper, we introduce such a substrate called TRAILBLAZER to enable the discovery of high-level contexts. We evaluate TRAILBLAZER via simulation. The results show that the communication among sensors is efficient in terms of the consumed energy when compared with an ideal solution and it is also fault-resilient.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115370370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance analysis of the UMTS system for Web traffic over dedicated channels 专用通道上Web流量的UMTS系统性能分析
M. Sarvagya, Ratnam V. Raja Kumar
{"title":"Performance analysis of the UMTS system for Web traffic over dedicated channels","authors":"M. Sarvagya, Ratnam V. Raja Kumar","doi":"10.1109/ITRE.2005.1503155","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503155","url":null,"abstract":"The WCDMA based 3G cellular standards have a great flexibility and a variety of logical and transport channels defined for different types of traffic classes. In this paper performance of the dedicated channel for WWW traffic has been investigated. The UMTS standard specifies the use of dedicated channels (DCH) for the actual traffic, through access requests placed on the random access channel (RACH). Performance of the UMTS MAC on dedicated channel for Web traffic has been studied through simulation models in terms of throughput, transfer delay, collision probability and blocking probability as a function of network load. Also the effect of other parameters like number of users and number of resources on the performance has been analyzed for UTRA- FDD.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126739279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A two-tier on-line learning model for teaching Web services 用于教学Web服务的两层在线学习模型
Cheer-Sun D. Yang
{"title":"A two-tier on-line learning model for teaching Web services","authors":"Cheer-Sun D. Yang","doi":"10.1109/ITRE.2005.1503062","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503062","url":null,"abstract":"Since the advent of the Internet and the World-Wide Web (WWW), the computing model known as business-to-business (B2B) e-commerce has evolved to take advantage of the ubiquitous accessing of the Internet The concept of Web services using extensible Markup Language (XML) and Simple Object Access Protocol (SOAP) has become an essential subject in the curriculum of Computer Science. However, there have been too many standards to be covered in one semester. This paper discusses the pedagogical issues on teaching Web services using a two-tiered approach. This approach is deployed with a Web-based online tutorial to form the main idea of the two-tiered online learning model. This paper describes the details about the two-tiered online learning model first. Then, the teaching experience on using the Java Web Service Developer's Pack (JWSDP) tutorial is provided. Finally, the advantages of the two-tier online learning model are summarized.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121825260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An overview of the project for next generation information communication networks 下一代信息通信网络项目概述
Wen-Tsuen Chen, Wen-Hsiang Tsai, C. King, Yaw-Chung Chen
{"title":"An overview of the project for next generation information communication networks","authors":"Wen-Tsuen Chen, Wen-Hsiang Tsai, C. King, Yaw-Chung Chen","doi":"10.1109/ITRE.2005.1503103","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503103","url":null,"abstract":"The project, \"Advanced Technologies and Applications of Next Generation Information Communication Networks,\" is a four-year, multi-disciplinary research project sponsored by the Ministry of Education, R.O.C., under the \"Program for Promoting Academic Excellence of Universities.\" The project started in January 2000 and completed in March 2004. In this paper, we give an overview of the project and highlight some of the major achievements.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of optimistic and pessimistic pilgrims for concurrency management in CSCW through a probabilistic study 通过概率研究比较CSCW并发管理的乐观和悲观朝圣者
G. Eric, H. Julien, L. Jean-Christophe
{"title":"Comparison of optimistic and pessimistic pilgrims for concurrency management in CSCW through a probabilistic study","authors":"G. Eric, H. Julien, L. Jean-Christophe","doi":"10.1109/ITRE.2005.1503130","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503130","url":null,"abstract":"Concurrency management protocols are required in CSCW applications in which users create, update and delete shared objects. Pessimistic protocols are based on lock-unlock mechanisms before writings, whereas users are allowed to do modifications without having locked the object in optimistic protocols. Our pilgrim protocol is pessimistic since a user has to become the owner of an object before modifying it optimistic protocols minimize the delays before writing. This is the reason why we defined an optimistic protocol based on the pilgrim protocol, using multiversion. After having presenting both of those protocols through a finite state automaton, we make a comparison of them based on a probabilistic study. This study allows us to choose whether the optimistic or the pessimistic pilgrim regarding user activities, types of CSCW and network.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116902508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信