{"title":"EESM for IEEE 802.16e: WiMaX","authors":"S. Mumtaz, A. Gameiro, Jonathan Rodriguez","doi":"10.1109/ICIS.2008.33","DOIUrl":"https://doi.org/10.1109/ICIS.2008.33","url":null,"abstract":"For Link Level interfacing packet switched simulation adopt the AVI (actual value interface) approach for mapping the computed SNR to the Block Error Rate (BLER) Statistics. However in OFDM based system the BLER is invariant within Radio transport channel due to fading channel and adjutant bit carriers mapping, rendering the A VI to be inaccurate. Due to large variability of the channel in frequency domain, two links with same average SNR can experience drastically different performance, thus making it difficult to accurately predict the instantaneous link performance such as Frame Error Rate (FER). To overcome this problem with AVI the EESM has been used as a low complexity approach. In this paper the feasibility of EESM as an abstraction method is investigated, and then calibrated and evaluated for Link Level Interface in WiMax System IEEE802.16e.This methods is then extended to handle more advanced link enhancement such as Alamouti encoding. The Exp-ESM method has better accuracy than the existing link error methods, and preferred link error predictor for system simulator.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129184967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dimensionality Reduction in Hyperbolic Data Spaces: Bounding Reconstructed-Information Loss","authors":"D.A. Iran, K. Vut","doi":"10.1109/ICIS.2008.82","DOIUrl":"https://doi.org/10.1109/ICIS.2008.82","url":null,"abstract":"We have started to see non-Euclidean geometries used in many applications, including visualization, network measurement, and geometric routing. Therefore, we need new mechanisms for managing and exploring non-Euclidean data. In this paper, we specifically address the dimensionality reduction problem for Hyperbolic data that are represented by the Poincare disk model. A desirable property of our solution is its reconstructed boundedness. In other words, we can reconstruct the data from its dimension-reduced version to obtain an approximation whose deviation from the original data is bounded and independent of the boundary measure of the original data space. We also propose a similarity search technique as an application of our reduction approach. We provide both theoretical and simulation analyses to substantiate the findings of our work.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123817426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DBPowder-mdl: Mapping Description Language between Applications and Databases","authors":"Tadashi Murakami","doi":"10.1109/ICIS.2008.68","DOIUrl":"https://doi.org/10.1109/ICIS.2008.68","url":null,"abstract":"A few decade years have passed since the Object/Relational mapping problem was recognized. However, it still remains to be a hard problem. Simple declaration cannot overcome the impedance mismatch, however, detailed declaration tends to get into a number of duplicated definitions of elements. Duplicated definitions are not preferable in order for productivity and maintainability. In this paper, we propose DBPowder-mdl to address the problem above. DBPowder-mdl describes mappings between object models and relational models. Both object models and relational models are derived from the mapping declaration. DBPowder-mdl keeps simple declaration with having a descriptive power of detailed declaration such as inheritance in object models. We developed a prototype system of DBPowder-mdl and evaluated it.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121167484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huiming Yu, Xiangfeng Dai, Thomas Baxley, Jinsheng Xu
{"title":"A Real -Time Interactive Visualization System for DNS Amplification Attack Challenges","authors":"Huiming Yu, Xiangfeng Dai, Thomas Baxley, Jinsheng Xu","doi":"10.1109/ICIS.2008.42","DOIUrl":"https://doi.org/10.1109/ICIS.2008.42","url":null,"abstract":"Domain Name Service (DNS) amplification attack has become a serious issue for network security because small queries can generate massive amounts of UDP packets in response to flood the target server. This paper presents our work to develop a real-time interactive visualization system (RTIVS) for DNS amplification attack to help administrators visualize and analyze traffic, and detect the DNS amplification attack. The design of the RTIVS is based on the characteristics of the DNS amplification attack. It provides two modes that are a manual mode and an automatic mode to support reasoning and identify DNS amplification attacks. A graphic user interface is implemented to allow administrators to easily monitor network activity and analyze the large amount of UDP packets in real time. The interactive GUI also supports combination of the administrator's knowledge, experience and judgment into the system.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124469590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Issues and Models of Security Oriented Systems","authors":"C. Ramamoorthy","doi":"10.1109/ICIS.2008.115","DOIUrl":"https://doi.org/10.1109/ICIS.2008.115","url":null,"abstract":"Summary form only given. Virus infestation is rampant in today's internet based IT activities. The viruses (including worms, and Trojan Horses) are constantly and rapidly created to damage e=commerce and web based application. Importantly, they corrupt communications, valuable databases and disrupt service oriented functions. In the future, they can severely hurt the new applications spanning from health care to home appliance control. We shall present a broad discussion on a few mostly software engineering topics, pointing out their relevance and relationship to IT security issues.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131275935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nitin, D. Chauhan, V. Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, M. Rana, V. Punjabi, S. Vinay, Nakul Sharma
{"title":"Finite-State Modeling and Testing of Image Based Authentication System","authors":"Nitin, D. Chauhan, V. Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, M. Rana, V. Punjabi, S. Vinay, Nakul Sharma","doi":"10.1109/ICIS.2008.88","DOIUrl":"https://doi.org/10.1109/ICIS.2008.88","url":null,"abstract":"Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. This is where image based authentication (IBA) comes into play. IBA enhances the security level in an exceptionally user friendly way. This paper is a comprehensive study and comparison of proposed Jaypee University of Information Technology-IBA System with the University of Florida-IBA System on the subject of using images as the password set. Furthermore the paper introduces a holistic view of completed finite state automation (CFSA) modeling that can be carried out as a complementary step to system modeling, enabling a precise scalability of the test process, revealing much rationalization potential. Finite-state based notions enable to introduce efficient algorithms to generate Legal Interaction Pairs (IPs), Faulty Interaction Pairs, and Regular Expression (RegEx).","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124157206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Dorairaj, D. Bhukya, Lakshminarayana Prasad Kantam, Kishor Arumilli
{"title":"A New Operational Framework for Benchmarking the SAN Products","authors":"P. Dorairaj, D. Bhukya, Lakshminarayana Prasad Kantam, Kishor Arumilli","doi":"10.1109/ICIS.2008.103","DOIUrl":"https://doi.org/10.1109/ICIS.2008.103","url":null,"abstract":"The novel framework presented in this paper provides a comprehensive methodology and statistical approach for benchmarking two Storage Area Network (SAN) products. This framework has the ability to assess the complexity of the SAN products benchmarking characteristics. This approach enables us to explore the complex interactions and relationships between the SAN products in the same environment. There are many evaluation techniques available for testing, but their results and evaluations may lack maturity and are not statistically sound. This novel unified framework provides a cost effective way that quantifies the benchmarking and interaction level of two SAN products by using single Design of Experiments (DOE) analysis. This novel approach provides good SAN product comparative analysis to customer's with high degree of accuracy with good predictabilities in product improvement, product marketing and product selection.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114628188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Approach for QoS-Aware Service Selection Based on a Tree-Based Algorithm","authors":"Min-seok Oh, Jongmoon Baik, Sungwon Kang, Ho‐Jin Choi","doi":"10.1109/ICIS.2008.8","DOIUrl":"https://doi.org/10.1109/ICIS.2008.8","url":null,"abstract":"Service oriented architecture (SOA) has become a new software development paradigm because it provides a flexible framework that can help reduce development cost and time. SOA also promises loosely coupled, interoperable, and composable services. In order to maximize these benefits, many researchers have focused on service composition techniques, especially in terms of providing quality of services (QoS) to consumers in a dynamic environment. In current literature, many approaches, such as the genetic algorithm, integer programming, and the Pinsinger algorithm approaches, have been proposed for service compositions to provide quality of services to consumers. However, these approaches are inefficient when any problem occurs during service executions since the problem causes the current execution stop, and service rebinding is required for the unexecuted path. In addition, even if a better service is discovered, it cannot be easily replaced in these approaches because replacing a single service causes a problem on global QoS constraints. In this paper, we focus on these problems by proposing a tree-based algorithm in order to provide optimal services to consumers consistently and efficiently even when the status of selected services have changed. As a result, consumers can always use the optimal services of high qualities.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116025989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Manual Specific Testing and Quality Evaluation for Embedded Software","authors":"Seon-Jae Jang, H. Kim, Youn-ky Chung","doi":"10.1109/ICIS.2008.98","DOIUrl":"https://doi.org/10.1109/ICIS.2008.98","url":null,"abstract":"Higher performance for embedded software with the intent of decreasing cost of hardware made widespread and development of hardware. Higher performance makes embedded software more complex, but to satisfy user demands and that of time-to-market, it has to be developed fast and achieve quality. Testing is the most important factor in embedded software development. Increasing complexity of the embedded system makes difficult to test manually and properly evaluate quality. This made automated testing becoming popular and in turn decline of manual testing. Because of the characteristics of embedded software, automated testing has difficulty performing all relevant tests and evaluation of the areas of concern. Manual testing of embedded software is affective in these areas and can directly affect quality of software. To properly test software manually it is necessary to have the proper testing procedures and personnel along with a well defined description of the system. In this paper we propose a manual testing mechanism that is more structured, effective and will improve quality of embedded software. We describe the model which is based on the existing problem of manual testing and analysis requirements. The model and technique we propose will make testing on software and related hardware areas more effective, and the way to share the testing experience and using quality evaluation.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"815 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132038914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Song, Anan Liu, Lin Pang, Shouxun Lin, Yongdong Zhang, Sheng Tang
{"title":"A Novel Image Text Extraction Method Based on K-Means Clustering","authors":"Yan Song, Anan Liu, Lin Pang, Shouxun Lin, Yongdong Zhang, Sheng Tang","doi":"10.1109/ICIS.2008.31","DOIUrl":"https://doi.org/10.1109/ICIS.2008.31","url":null,"abstract":"Texts in web pages, images and videos contain important clues for information indexing and retrieval. Most existing text extraction methods depend on the language type and text appearance. In this paper, a novel and universal method of image text extraction is proposed. A coarse-to-fine text location method is implemented. Firstly, a multi-scale approach is adopted to locate texts with different font sizes. Secondly, projection profiles are used in location refinement step. Color-based k-means clustering is adopted in text segmentation. Compared to grayscale image which is used in most existing methods, color image is more suitable for segmentation based on clustering. It treats corner-points, edge-points and other points equally so that it solves the problem of handling multilingual text. It is demonstrated in experimental results that best performance is obtained when k is 3. Comparative experimental results on a large number of images show that our method is accurate and robust in various conditions.","PeriodicalId":382781,"journal":{"name":"Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127629569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}