R. Figueiredo, P. Boykin, P. S. Juste, D. Wolinsky
In this paper we introduce social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, self-managing, yet maintain security against untrusted parties. The key principles in our approach are: (1) self-configuring virtual network overlays enable seamless bi-directional IP-layer connectivity among parties linked by means of social connections; (2) social networking infrastructures greatly facilitate the establishment of trust relationships among parties, and these can be seamlessly integrated with existing public-key cryptography implementations to authenticate and encrypt traffic flows on overlay links end-to-end; and (3) knowledge of social connections can be used to improve the performance of overlay routing. This paper describes the architecture of such Social VPNs and a prototype implementation which integrates the Facebook API, IP-over-P2P virtual networks, and the IPsec security infrastructure in a virtual router. We demonstrate the ability of the prototype to support existing, unmodified TCP/IP applications while transparently dealing with the increasingly common case of users connected to the Internet through network address translators (NATs), and present qualitative and quantitative analysis of its functionality and performance.
{"title":"Integrating Overlay and Social Networks for Seamless P2P Networking","authors":"R. Figueiredo, P. Boykin, P. S. Juste, D. Wolinsky","doi":"10.1109/WETICE.2008.43","DOIUrl":"https://doi.org/10.1109/WETICE.2008.43","url":null,"abstract":"In this paper we introduce social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, self-managing, yet maintain security against untrusted parties. The key principles in our approach are: (1) self-configuring virtual network overlays enable seamless bi-directional IP-layer connectivity among parties linked by means of social connections; (2) social networking infrastructures greatly facilitate the establishment of trust relationships among parties, and these can be seamlessly integrated with existing public-key cryptography implementations to authenticate and encrypt traffic flows on overlay links end-to-end; and (3) knowledge of social connections can be used to improve the performance of overlay routing. This paper describes the architecture of such Social VPNs and a prototype implementation which integrates the Facebook API, IP-over-P2P virtual networks, and the IPsec security infrastructure in a virtual router. We demonstrate the ability of the prototype to support existing, unmodified TCP/IP applications while transparently dealing with the increasingly common case of users connected to the Internet through network address translators (NATs), and present qualitative and quantitative analysis of its functionality and performance.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127879747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Workflow management technology has profoundly transformed the way complex tasks are being handled in modern, large-scale organizations. However, it is mostly those systems' inherent lack of flexibility that hinders their broad acceptance, and that is perceived as annoyance by users. In this context, adaptive process management and case handling provide two very different paradigms, which both attempt to make process management more flexible and user-friendly. In this paper, we compare strengths and weaknesses of these two paradigms, and point out situations in which each is particularly appropriate. We further outline ways, in which either technology can be enhanced by crucial concepts from the other. This integration of flexibility approaches has the potential to remedy fundamental problems still present in each technology on its own.
{"title":"Supporting Flexible Processes with Adaptive Work?ow and Case Handling","authors":"C. Günther, M. Reichert, Wil M.P. van der Aalst","doi":"10.1109/WETICE.2008.15","DOIUrl":"https://doi.org/10.1109/WETICE.2008.15","url":null,"abstract":"Workflow management technology has profoundly transformed the way complex tasks are being handled in modern, large-scale organizations. However, it is mostly those systems' inherent lack of flexibility that hinders their broad acceptance, and that is perceived as annoyance by users. In this context, adaptive process management and case handling provide two very different paradigms, which both attempt to make process management more flexible and user-friendly. In this paper, we compare strengths and weaknesses of these two paradigms, and point out situations in which each is particularly appropriate. We further outline ways, in which either technology can be enhanced by crucial concepts from the other. This integration of flexibility approaches has the potential to remedy fundamental problems still present in each technology on its own.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128757671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In peer-to-peer (P2P) file sharing systems, peers have to choose the files of interest from a very large and rich collection of files. This task is difficult and time consuming. To alleviate the peers from the burden of manually looking for relevant files, recommender systems are used to make personalized recommendations to the peers according to their profile. In this paper, we propose a novel recommender scheme based on peers' similarity and weighted files' popularity. Simulation results confirm the effectiveness of the symmetric peers' similarity with weighted file popularity scheme in providing accurate recommendations, this way, increasing peers' satisfaction and contribution since peers will be motivated to download the recommended files and serve other peers meanwhile.
{"title":"Personalized Recommendations in Peer-to-Peer Systems","authors":"Loubna Mekouar, Y. Iraqi, R. Boutaba","doi":"10.1109/WETICE.2008.45","DOIUrl":"https://doi.org/10.1109/WETICE.2008.45","url":null,"abstract":"In peer-to-peer (P2P) file sharing systems, peers have to choose the files of interest from a very large and rich collection of files. This task is difficult and time consuming. To alleviate the peers from the burden of manually looking for relevant files, recommender systems are used to make personalized recommendations to the peers according to their profile. In this paper, we propose a novel recommender scheme based on peers' similarity and weighted files' popularity. Simulation results confirm the effectiveness of the symmetric peers' similarity with weighted file popularity scheme in providing accurate recommendations, this way, increasing peers' satisfaction and contribution since peers will be motivated to download the recommended files and serve other peers meanwhile.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116978314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person creates many node identifiers and possibly chooses some of them in order to disrupt availability or integrity in the P2P network. In this paper, we propose a sybil-resistant distributed admission control system which combines SybilGuard with distributed certification. A new node can join the network if, using SybilGuard, a fixed ratio of the nodes think this new node is genuine and so participate in its distributed certification. This fully distributed system tackles each described aspect of the sybil attack, preventing users from creating many identifiers and enforcing the use of truly random identifiers.
{"title":"A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification","authors":"François Lesueur, L. Mé, Valérie Viet Triem Tong","doi":"10.1109/WETICE.2008.7","DOIUrl":"https://doi.org/10.1109/WETICE.2008.7","url":null,"abstract":"Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person creates many node identifiers and possibly chooses some of them in order to disrupt availability or integrity in the P2P network. In this paper, we propose a sybil-resistant distributed admission control system which combines SybilGuard with distributed certification. A new node can join the network if, using SybilGuard, a fixed ratio of the nodes think this new node is genuine and so participate in its distributed certification. This fully distributed system tackles each described aspect of the sybil attack, preventing users from creating many identifiers and enforcing the use of truly random identifiers.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115179188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Artificial agents modeled by evolutionary neural networks have been diffusely described in the specific case of static architectures and synaptic weights coded in genetic strings. At present, more attractive theories devoted to a general theory of mind consider the biological and structural levels as necessary elements for an appropriate natural information processing. In this paper, an evolutionary approach has been taken into account for the selection of neural architectures of agents embedded in an artificial environment. Several correspondences between natural and artificial neural behavior has been detected (perception, multimodal integration, memory). Moreover, a cooperative social behavior emerged among the agents for a suitable exploration of the environment and the exploitation of the resources.
{"title":"Cooperative Behavior of Artificial Neural Agents Based on Evolutionary Architectures","authors":"A. Londei, Piero Savastano, M. O. Belardinelli","doi":"10.1109/WETICE.2008.17","DOIUrl":"https://doi.org/10.1109/WETICE.2008.17","url":null,"abstract":"Artificial agents modeled by evolutionary neural networks have been diffusely described in the specific case of static architectures and synaptic weights coded in genetic strings. At present, more attractive theories devoted to a general theory of mind consider the biological and structural levels as necessary elements for an appropriate natural information processing. In this paper, an evolutionary approach has been taken into account for the selection of neural architectures of agents embedded in an artificial environment. Several correspondences between natural and artificial neural behavior has been detected (perception, multimodal integration, memory). Moreover, a cooperative social behavior emerged among the agents for a suitable exploration of the environment and the exploitation of the resources.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115473246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper the concept of emergent behaviour in manufacturing multi-agent based systems is briefly introduced, and tools used in the characterization of chaotic systems are discussed. Considering a simple multi-agent model in use in a distributed flexible manufacturing project, we investigate how its dynamical behaviour strongly depends on some parameters inherent to the agent's negotiation rules. We show that, depending on the values of these parameters, chaotic dynamics may occur.
{"title":"Emergent Chaotic Behaviour in Agent Based Manufacturing Systems","authors":"Kamel Benaissa, D. Diep, A. Dolgui","doi":"10.1109/WETICE.2008.42","DOIUrl":"https://doi.org/10.1109/WETICE.2008.42","url":null,"abstract":"In this paper the concept of emergent behaviour in manufacturing multi-agent based systems is briefly introduced, and tools used in the characterization of chaotic systems are discussed. Considering a simple multi-agent model in use in a distributed flexible manufacturing project, we investigate how its dynamical behaviour strongly depends on some parameters inherent to the agent's negotiation rules. We show that, depending on the values of these parameters, chaotic dynamics may occur.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129625715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Provisioning specific level of QoS in a grid environment represents a central concern in obtaining a flexible and dynamic services management on large scale distributed systems. The recent orientation of grid middlewares towards the concept of trading services, wherein providers and consumers of services are able to negotiate all services parameters, confirms this trend. The introduction of mechanisms to handle the advance reservation in grid, allows the system administrator to manage the resources in an optimal way and guarantees to users about the possibility to obtain a specific resources for a specific time range. This paper proposes a model of advance reservation, integrated within an more general architecture able to manage SLA in a grid environment, based on a priority mechanism for the management of the allocation request. The developed reservation component has been integrated into OpenPBS scheduler.
{"title":"Advanced Reservation in Grid Using PBS","authors":"A. Stefano, G. Morana, D. Zito","doi":"10.1109/WETICE.2008.27","DOIUrl":"https://doi.org/10.1109/WETICE.2008.27","url":null,"abstract":"Provisioning specific level of QoS in a grid environment represents a central concern in obtaining a flexible and dynamic services management on large scale distributed systems. The recent orientation of grid middlewares towards the concept of trading services, wherein providers and consumers of services are able to negotiate all services parameters, confirms this trend. The introduction of mechanisms to handle the advance reservation in grid, allows the system administrator to manage the resources in an optimal way and guarantees to users about the possibility to obtain a specific resources for a specific time range. This paper proposes a model of advance reservation, integrated within an more general architecture able to manage SLA in a grid environment, based on a priority mechanism for the management of the allocation request. The developed reservation component has been integrated into OpenPBS scheduler.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128902790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, while large-scale distributed computing frameworks, including the Grid, have proven their ability of attacking large scientific problems. We believe, however, that the potential of the P2P approach has not been completely exploited yet. The goal of this position paper is to propose another scientific area where the P2P cooperation paradigm could be profitably adopted: network analysis, i.e. the mathematical characterization of the main graph-theoretic properties of a large-scale network. We discuss the potential issues that must be confronted with when a decentralized approach to network analysisis taken, and we propose a preliminary research plan.
{"title":"Decentralized Network Analysis: A Proposal","authors":"A. Montresor","doi":"10.1109/WETICE.2008.36","DOIUrl":"https://doi.org/10.1109/WETICE.2008.36","url":null,"abstract":"In recent years, the peer-to-peer paradigm has gained momentum in several application areas: file-sharing and VoIP applications have been able to attract millions of end users, while large-scale distributed computing frameworks, including the Grid, have proven their ability of attacking large scientific problems. We believe, however, that the potential of the P2P approach has not been completely exploited yet. The goal of this position paper is to propose another scientific area where the P2P cooperation paradigm could be profitably adopted: network analysis, i.e. the mathematical characterization of the main graph-theoretic properties of a large-scale network. We discuss the potential issues that must be confronted with when a decentralized approach to network analysisis taken, and we propose a preliminary research plan.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131576738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The goal of the ProGility workshop is to bring together practitioners and researchers from different communities such as BPM, software engineering, service-oriented computing, artificial intelligence, and CSCW/Groupware who share an interest in flexibility of cooperative process-aware information systems and team support in both an intra- and inter-organizational setting. This report of the third edition of the workshop gives an overview of the presented papers, which address various flexibility issues of process-aware information systems.
{"title":"Agile Cooperative Process-Aware Information Systems (ProGility 2008)","authors":"B. Weber, Rik Eshuis, J. Mendling, Mirjam Minor","doi":"10.1109/WETICE.2008.56","DOIUrl":"https://doi.org/10.1109/WETICE.2008.56","url":null,"abstract":"The goal of the ProGility workshop is to bring together practitioners and researchers from different communities such as BPM, software engineering, service-oriented computing, artificial intelligence, and CSCW/Groupware who share an interest in flexibility of cooperative process-aware information systems and team support in both an intra- and inter-organizational setting. This report of the third edition of the workshop gives an overview of the presented papers, which address various flexibility issues of process-aware information systems.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Francesco Galluppi, C. Urdiales, A. Poncela, Isabel Sánchez-Tato, F. Hernández, M. O. Belardinelli
This paper presents a study on human performance when people are assisted by a purely reactive navigation control system. The goal of such a system is to achieve collaborative human/robot navigation, so that the human driver is always in control but his/her performance is improved by the machine. This Shared Control approach is meant to be implemented on a power robotic wheelchair, so it is important that the human feels in control and safe all the time despite any potential control error caused by disability. Human and robots inputs are continuously mixed and weighted by local efficiency factors to generate an emergent behaviour in a mobile robot. Technical, medical,psychological and ergonomic issues are treated. Tests with a Pioneer AT robot driven by volunteers are finally presented, along with results and analysis.
{"title":"A Study on Human Performance in a Cooperative Local Navigation Robotic System","authors":"Francesco Galluppi, C. Urdiales, A. Poncela, Isabel Sánchez-Tato, F. Hernández, M. O. Belardinelli","doi":"10.1109/WETICE.2008.16","DOIUrl":"https://doi.org/10.1109/WETICE.2008.16","url":null,"abstract":"This paper presents a study on human performance when people are assisted by a purely reactive navigation control system. The goal of such a system is to achieve collaborative human/robot navigation, so that the human driver is always in control but his/her performance is improved by the machine. This Shared Control approach is meant to be implemented on a power robotic wheelchair, so it is important that the human feels in control and safe all the time despite any potential control error caused by disability. Human and robots inputs are continuously mixed and weighted by local efficiency factors to generate an emergent behaviour in a mobile robot. Technical, medical,psychological and ergonomic issues are treated. Tests with a Pioneer AT robot driven by volunteers are finally presented, along with results and analysis.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132046682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}