J. Sorribas, A. Barba, E. Trullols, J. del Río, A. Mànuel, M. de la Muela
{"title":"Marine Sensor Networks and Ocean Observatories. A Policy Based Management Approach","authors":"J. Sorribas, A. Barba, E. Trullols, J. del Río, A. Mànuel, M. de la Muela","doi":"10.1109/ICCGI.2008.49","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.49","url":null,"abstract":"Sensor networks for environmental data acquisition will play an important role in the development of future large data acquisition systems, particularly in oceanographic observation and operational oceanography. This paper will show the applicability of policy based network management (PBNM) on marine sensor networks (MSN) and networked ocean observatories aiming to overcome the lack of flexibility imposed by more traditional network management paradigms.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121793166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Management of Communities Based on Peer Content and Reputation","authors":"I. Pogkas, V. Kriakov, Zhongqiang Chen, A. Delis","doi":"10.1109/ICCGI.2008.28","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.28","url":null,"abstract":"Most P2P file-sharing systems are unable to create self- organizing communities of similar nodes that provide good services to their members. In this paper, we propose a Gnutella-like file-sharing protocol based on the premise that each peer only creates links with the best counterparts which the peer has discovered in the network. Termed adaptive Gnutella protocol (AGP), our proposal transforms the overlay topology based on a reputation scheme that evaluates the provided services and offers a mechanism that organizes trusted nodes with similar content. We have implemented the AGP protocol using the PeerSim engine and conducted experiments on diverse network topologies. Over time, the network topology improves as every peer locates counterparts with similar content and good reputation. Moreover, malicious nodes are pushed to the edge of the overlay network and are excluded from participating in the AGP search.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122873966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mapping Image Low-Level Descriptors to Semantic Concepts","authors":"A. Ion, L. Stanescu, D. Burdescu, S. Udristoiu","doi":"10.1109/ICCGI.2008.29","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.29","url":null,"abstract":"Our goal is to organize the image contents semantically. In this paper, we propose a method to classify the images semantically, using the C-fuzzy algorithm to segment the natural scenes into perceptually uniform regions. The low-level characteristics that are taken into account are: color, texture, shape, absolute spatial arrangement, spatial coherency, and dimension. Since humans are the ultimate users of most image retrieval systems, it is important to organize the contents semantically, according to meaningful categories. This requires an understanding of the important semantic categories that humans use for image classification, and the extraction of meaningful image features that can discriminate between these categories. A lot of experiments, in which the human subjects had to group images into semantic categories and to explain the criteria for their choice, were realized. From these experiments, we identify the semantic categories (landscapes, animals, flowers, etc), the semantic indicators or intermediate descriptors and their visual characteristics.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Do People Seek Knowledge in Information System Projects: A New Perspective from Social Network Theory","authors":"Chenghong Zhang, C. Yunjie Xu, Cheng Zhang","doi":"10.1109/ICCGI.2008.22","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.22","url":null,"abstract":"Why does a project team member prefer some colleagues to others in knowledge seeking? Past literature suggests that the physical accessibility of a knowledge source, the knowledge quality of the source and relational concerns are important to such choice. Our social network analysis of an information systems (IS) project team indicates that job interdependence and rank have a significant impact on knowledge sourcing frequency. In contrast, personal relationship and the knowledge quality of source have no significant effect. This finding suggests both the importance of structural factors in knowledge sourcing and the context-dependent nature of knowledge sourcing behavior.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124675356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Access Control in Web Based Communities","authors":"N. Elahi, M. Chowdhury, Josef Noll","doi":"10.1109/ICCGI.2008.46","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.46","url":null,"abstract":"Web based social communities are one of the most widely used applications nowadays. Ubiquitous computing and access capabilities leverage the evolution of highly dynamic social communities. Recently, security and privacy concerns within these communities have increased significantly. This paper addresses these challenges by controlling access to community resources exploiting semantic Web technologies. In this regard, a conceptual community framework and its access control mechanisms are formalised using the Web ontology language. Access to the resources is controlled by defining differential access rights based on the relationships between the individuals and the communities. Instead of an explicit definition, some additional facts of the mechanisms are inferred by executing semantic Web rules using the Jess rule engine over the designed ontology. These information are then passed back into the ontology to enrich the existing ontology.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116474246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kaune, J. Stolzenburg, A. Kovacevic, R. Steinmetz, R. Cuevas
{"title":"Understanding BitTorrent's Suitability in Various Applications and Environments","authors":"S. Kaune, J. Stolzenburg, A. Kovacevic, R. Steinmetz, R. Cuevas","doi":"10.1109/ICCGI.2008.24","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.24","url":null,"abstract":"Peer-to-peer systems have recently emerged as an attractive alternative to client/server approaches, especially in the area of content distribution. By efficiently leveraging the available upload bandwidth of the end users, BitTorrent becomes a de facto standard for scalable content distribution. Inspired by its success, many companies try to shift the major upload burden from their rented source servers to end users by using this protocol, since many hosting sites charge them based on the used egress capacity. In this paper, we perform an in-depth study of the overall performance of BitTorrent in its entirety, in order to get a broader understanding of its suitability for different applications domains. We analyze its performance from a bifocal perspective, namely that of the content providers and that of the end users. In this context, we find that the decrease of the source server's upload capacity has a highly negative impact on the overall protocol performance. In addition, it is shown that giving incentives to peers to stay online after completing downloading does not pay off.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129320540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C.E. Stan, D. Dumitrescu, V. Caras, D. Tiliute, E. Pop, L. E. Anghel
{"title":"Intelligent Store - An Innovative Technological Solution for Retail Activities with Mobile Access","authors":"C.E. Stan, D. Dumitrescu, V. Caras, D. Tiliute, E. Pop, L. E. Anghel","doi":"10.1109/ICCGI.2008.23","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.23","url":null,"abstract":"This paper presents an innovative solution in retail activities, named \"Intelligent Store - INTELSHOP\", based on a technological platform that offers the support for some attractive and efficient services for customers and administrative staff. The technological platform integrates various technologies such as RFID, GPS and GIS, wireless communications, mobile access to information on PDA or SmartPhone, integrated environments for data analysis regarding stocks and customers administration, interfaces with electronic payment systems. The goal pursued is mainly to reduce the time wasted by the customers searching the products on the store's shelf, to offer more and better information about products. On the other hand our solution pursues to maximize the merchant benefit by reducing the provisioning time, to diversify the offer and to create the opportunity to make the best decision in real time.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Agent-Based Multi-issue Negotiation Model","authors":"Ying Wang, Huamei Sun, Guorui Jiang","doi":"10.1109/ICCGI.2008.32","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.32","url":null,"abstract":"Most of the current agent systems focus on single issue, such as price, whereas multi-issue negotiation is very essential to electronic commerce. In the multi-issue model, MAUT (Multi-attribute Utility Theory) or its derived theory is mainly used as the evaluation method. However, the application of this theory may cause deviation. To resolve the problem, a two stage negotiation model is presented in this paper. In the first stage, the negotiation theory is used to negotiate over the most important issue or the issues combination. In the second stage we reverse auction the product each issue at one time according to the issue importance from the smallest to the most important using the adjusted auction theory.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120966944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of Research towards Efficient Social Peer-to-Peer Networks","authors":"Lu Liu, N. Antonopoulos, J. Xu, D. Russell","doi":"10.1109/ICCGI.2008.15","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.15","url":null,"abstract":"Peer-to-peer (P2P) networks attract attentions worldwide with their great success in file sharing networks (e.g. Napster, Gnutella, BitTorrent, and Kazaa). In the last decade, numerous studies have been devoted to the problem of resource discovery in P2P networks. However, efficient resource discovery remains a key challenge for large-scale P2P networks. An investigation of existing research on resource discovery towards efficient social P2P networks will be given in this paper.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129985547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Investigation into Small World Phenomenon in Engineering Informatics","authors":"Zhengxu Zhao, Jinsheng Fan","doi":"10.1109/ICCGI.2008.9","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.9","url":null,"abstract":"Product information is complex and discrete in terms of design methods and manufacturing processes, its long term retention has for time been a great challenge. This paper presents an initial investigation into the small world phenomenon within product information with an emphasis on computer-aided design (CAD) data and its generating systems. The objective is to construct a networking model in the notion of six degrees separation and thereafter to produce useful findings for future reference in information organization. It is expected that this model will be an essence for effective CAD data translation, exchange, index and migration and for helping to deal with the key problems in long term retention of product data.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129997938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}