This paper proposes a method that acquires a more appropriate classification model for label extraction. The model can extract specific labels from articles included in bulletin board sites. The labels represent the contents of the articles and are used to characterize the articles. The method selects two kinds of important examples not including a specific label by using expressions related to the label. The method inductively acquires the classification model from the selected examples and examples including the label. The paper applies the method to articles collected from three bulletin board sites and verifies its effect through comparative experiments.
{"title":"Classification Model Learning for Bulletin Board Site Analysis Based on Unbalanced Textual Examples","authors":"S. Sakurai, R. Orihara","doi":"10.1109/AINA.2008.57","DOIUrl":"https://doi.org/10.1109/AINA.2008.57","url":null,"abstract":"This paper proposes a method that acquires a more appropriate classification model for label extraction. The model can extract specific labels from articles included in bulletin board sites. The labels represent the contents of the articles and are used to characterize the articles. The method selects two kinds of important examples not including a specific label by using expressions related to the label. The method inductively acquires the classification model from the selected examples and examples including the label. The paper applies the method to articles collected from three bulletin board sites and verifies its effect through comparative experiments.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133529843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Valbona Barolli, Heihachiro Fukuda, L. Barolli, M. Takizawa
In this paper, we introduce and evaluate a computing model for marketable quality and profitability of corporations. We discuss the model prediction of the turning and transition periods based on data from two different sources. By applying these real data of some leading manufacturing corporations in Japan, we analyze the model accuracy. From the analysis, we conclude that even there are some differences between two sources data, the proposed model give a good approximation and prediction of the turning and transition periods of Japanese economy.
{"title":"A Computing Model for Marketable Quality and Profitability of Corporations: Model Evaluation Based on Two Different Sources Data","authors":"Valbona Barolli, Heihachiro Fukuda, L. Barolli, M. Takizawa","doi":"10.1109/AINA.2008.59","DOIUrl":"https://doi.org/10.1109/AINA.2008.59","url":null,"abstract":"In this paper, we introduce and evaluate a computing model for marketable quality and profitability of corporations. We discuss the model prediction of the turning and transition periods based on data from two different sources. By applying these real data of some leading manufacturing corporations in Japan, we analyze the model accuracy. From the analysis, we conclude that even there are some differences between two sources data, the proposed model give a good approximation and prediction of the turning and transition periods of Japanese economy.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose an overlay network supporting world-wide geographic messaging. Our approach is based on hierarchical symbolic coordinates like /usa/fl/miami/. Although hierarchical network topologies lend themselves to the implementation of such overlay networks, they may lead to bottlenecks at the root of the hierarchy, long message paths, and inefficient bandwidth utilization. To avoid these problems, we propose an overlay network that adapts its structure to the users' communication patterns by dynamically adding "shortcut" links to the hierarchy leading to a routing mesh. We present an algorithm that carefully selects shortcuts based on their utility to assure short message paths on the one hand and to reduce the induced overhead on the other hand. Through simulations we show that this approach decreases the average path length significantly and reduces network load to about 50% compared to hierarchical routing.
{"title":"An Adaptive Overlay Network for World-Wide Geographic Messaging","authors":"Frank Dürr, K. Rothermel","doi":"10.1109/AINA.2008.67","DOIUrl":"https://doi.org/10.1109/AINA.2008.67","url":null,"abstract":"In this paper, we propose an overlay network supporting world-wide geographic messaging. Our approach is based on hierarchical symbolic coordinates like /usa/fl/miami/. Although hierarchical network topologies lend themselves to the implementation of such overlay networks, they may lead to bottlenecks at the root of the hierarchy, long message paths, and inefficient bandwidth utilization. To avoid these problems, we propose an overlay network that adapts its structure to the users' communication patterns by dynamically adding \"shortcut\" links to the hierarchy leading to a routing mesh. We present an algorithm that carefully selects shortcuts based on their utility to assure short message paths on the one hand and to reduce the induced overhead on the other hand. Through simulations we show that this approach decreases the average path length significantly and reduces network load to about 50% compared to hierarchical routing.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123884568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Osama Al-Jaber, L. Guan, X. Wang, I. Awan, A. Grigg, Xuefen Chi
Delay is arguably one of the most vital Quality of Service (QoS) metrics in computer networks since it has many implications for real time multimedia applications. The congestion and queuing delay of Internet core routers is one of the most important fundamental research topics which plays a vital role in determination of the overall end-to-end delay. In previous works, the control algorithm proposed and modelled in the discrete-time domain, by controlling the value of the threshold within the queue buffer to achieve the required delay, is based on a single arrival in one time slot. In this paper, a new traffic model with the ability to capture the multiple arrivals in a single time slot is described and its application for restraining the delay to a pre-defined value within the network core router is developed. The feasibility of the system is examined using both theoretical analysis and simulation. A statistical evaluation is performed to show both efficiency and accuracy of the results acquired throughout the simulation.
{"title":"Delay Restraining of Combined Multiple Input Cross Core Router","authors":"Osama Al-Jaber, L. Guan, X. Wang, I. Awan, A. Grigg, Xuefen Chi","doi":"10.1109/AINA.2008.115","DOIUrl":"https://doi.org/10.1109/AINA.2008.115","url":null,"abstract":"Delay is arguably one of the most vital Quality of Service (QoS) metrics in computer networks since it has many implications for real time multimedia applications. The congestion and queuing delay of Internet core routers is one of the most important fundamental research topics which plays a vital role in determination of the overall end-to-end delay. In previous works, the control algorithm proposed and modelled in the discrete-time domain, by controlling the value of the threshold within the queue buffer to achieve the required delay, is based on a single arrival in one time slot. In this paper, a new traffic model with the ability to capture the multiple arrivals in a single time slot is described and its application for restraining the delay to a pre-defined value within the network core router is developed. The feasibility of the system is examined using both theoretical analysis and simulation. A statistical evaluation is performed to show both efficiency and accuracy of the results acquired throughout the simulation.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125392167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sooyong Lee, Myungchul Kim, Kyunghee Lee, Soonuk Seol, Gabsoo Lee
Providing seamless multimedia services to mobile users is one of the important requirements for the current Internet evolution. However, due to the effects of host mobility, it is difficult to achieve seamless QoS guarantees in mobile Internet. Though Next Step In Signaling (NSIS) protocol was recently proposed as an alternative of RSVP, its applicability has not been completely verified particularly in mobile environment. This paper enhances NSIS protocol based on advance resource reservation using layers 2 and 3 complementation for supporting host mobility. Our approach detects a crossover node (CRN) and reserves network resources proactively along the new path which will be used after handoff This significantly reduces the latency of signaling session re-establishment caused by handoff. Only a few modifications are required to the current NSIS protocol for our approach. The experimental results demonstrate that our approach can provide seamless QoS guarantees for multimedia services in mobile Internet.
{"title":"Seamless QoS Guarantees in Mobile Internet Using NSIS with Advance Resource Reservation","authors":"Sooyong Lee, Myungchul Kim, Kyunghee Lee, Soonuk Seol, Gabsoo Lee","doi":"10.1109/AINA.2008.110","DOIUrl":"https://doi.org/10.1109/AINA.2008.110","url":null,"abstract":"Providing seamless multimedia services to mobile users is one of the important requirements for the current Internet evolution. However, due to the effects of host mobility, it is difficult to achieve seamless QoS guarantees in mobile Internet. Though Next Step In Signaling (NSIS) protocol was recently proposed as an alternative of RSVP, its applicability has not been completely verified particularly in mobile environment. This paper enhances NSIS protocol based on advance resource reservation using layers 2 and 3 complementation for supporting host mobility. Our approach detects a crossover node (CRN) and reserves network resources proactively along the new path which will be used after handoff This significantly reduces the latency of signaling session re-establishment caused by handoff. Only a few modifications are required to the current NSIS protocol for our approach. The experimental results demonstrate that our approach can provide seamless QoS guarantees for multimedia services in mobile Internet.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traditional cache invalidation schemes are not suitable to be employed in wireless environments due to the affections of mobility, energy consumption, and limited bandwidth. Cache invalidation report (IR) is proposed to deal with the cache consistency problem. However, the main drawback of IR-based schemes is the long latency of data access because the mobile hosts (MHs) need to wait next IR interval for cache invalidation when the cache hit happens. In this paper, we propose a dynamic invalidation report (DIR) to reduce the latency of data access when the MHs query data. DIR contains an early cache validation mechanism by utilizing the validation messages. Therefore, the MHs can verify their cached data as soon as possible. Next, we design a predictive method to dynamically adjust IR interval to further reduce the latency called DIR-AI (DIR with adjustable interval) scheme. Finally, we evaluate the performance of the DIR and DIR-AI and compare them with the existing invalidation report schemes by using NS2 (network simulator). The experimental results show that DIR reduces averagely 54.3% and 34.3% of latency; DIR-AI reduces averagely 57.35 and 38.6% of latency compared with TS (TimeStamp) and UIR (updated IR) schemes respectively.
{"title":"Dynamic Cache Invalidation Scheme in IR-Based Wireless Environments","authors":"Yeim-Kuan Chang, Y. Ting, Tai-Hong Lin","doi":"10.1109/AINA.2008.118","DOIUrl":"https://doi.org/10.1109/AINA.2008.118","url":null,"abstract":"Traditional cache invalidation schemes are not suitable to be employed in wireless environments due to the affections of mobility, energy consumption, and limited bandwidth. Cache invalidation report (IR) is proposed to deal with the cache consistency problem. However, the main drawback of IR-based schemes is the long latency of data access because the mobile hosts (MHs) need to wait next IR interval for cache invalidation when the cache hit happens. In this paper, we propose a dynamic invalidation report (DIR) to reduce the latency of data access when the MHs query data. DIR contains an early cache validation mechanism by utilizing the validation messages. Therefore, the MHs can verify their cached data as soon as possible. Next, we design a predictive method to dynamically adjust IR interval to further reduce the latency called DIR-AI (DIR with adjustable interval) scheme. Finally, we evaluate the performance of the DIR and DIR-AI and compare them with the existing invalidation report schemes by using NS2 (network simulator). The experimental results show that DIR reduces averagely 54.3% and 34.3% of latency; DIR-AI reduces averagely 57.35 and 38.6% of latency compared with TS (TimeStamp) and UIR (updated IR) schemes respectively.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131065415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jui-Hung Chen, T. Shih, Chun-Chia Wang, Shu-Wei Yeh, Chen-Yu Lee
Respecting related technologies within e-learning domain, the use of learning management system (LMS) has been considered as the most important and essential component. LMS can manage the curriculum learning content, learner's learning profile and learning process. However it lacks suitable study assistance functions and personalized interface. Accordingly LMS is hard to promote and to be utilized by learners. This paper proposed an integrated framework which combined the personal learning blog functionalities to LMS by using the tools interoperability (TI) architecture in order to develop the suitable learning functionalities and interface in LMS for learners. And we hope the TI-based blog functionalities which can be utilized by other LMS in order to improve the LMS utility rate and to prove the feasibility of TI-based blog system.
{"title":"Combine Personal Blog Functionalities with LMS Using Tools Interoperability Architecture","authors":"Jui-Hung Chen, T. Shih, Chun-Chia Wang, Shu-Wei Yeh, Chen-Yu Lee","doi":"10.1109/AINA.2008.43","DOIUrl":"https://doi.org/10.1109/AINA.2008.43","url":null,"abstract":"Respecting related technologies within e-learning domain, the use of learning management system (LMS) has been considered as the most important and essential component. LMS can manage the curriculum learning content, learner's learning profile and learning process. However it lacks suitable study assistance functions and personalized interface. Accordingly LMS is hard to promote and to be utilized by learners. This paper proposed an integrated framework which combined the personal learning blog functionalities to LMS by using the tools interoperability (TI) architecture in order to develop the suitable learning functionalities and interface in LMS for learners. And we hope the TI-based blog functionalities which can be utilized by other LMS in order to improve the LMS utility rate and to prove the feasibility of TI-based blog system.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128149385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An enormous amount of data needs to be processed in many data mining applications. In addition to algorithmic development, hardware support is imperative to improve the effectiveness and efficiency of these applications. We are investigating various hardware architectural design techniques and methodologies to support data mining at the chip level. In this work, we focus on the design of an FPGA-based processor array for the computation of similarity matrix, a commonly used data structure to represent the similarity among a set of feature vectors, with each matrix element representing the computed similarity measure between two vectors. An algorithm is developed to assign computation efficiently to the array of processing elements. Theoretical performance metrics are derived and compared to the experimental results. Performance gains using the processor array over software implementations are also presented and discussed.
{"title":"Parallel Computation of Similarity Measures Using an FPGA-Based Processor Array","authors":"D. Perera, K. F. Li","doi":"10.1109/AINA.2008.97","DOIUrl":"https://doi.org/10.1109/AINA.2008.97","url":null,"abstract":"An enormous amount of data needs to be processed in many data mining applications. In addition to algorithmic development, hardware support is imperative to improve the effectiveness and efficiency of these applications. We are investigating various hardware architectural design techniques and methodologies to support data mining at the chip level. In this work, we focus on the design of an FPGA-based processor array for the computation of similarity matrix, a commonly used data structure to represent the similarity among a set of feature vectors, with each matrix element representing the computed similarity measure between two vectors. An algorithm is developed to assign computation efficiently to the array of processing elements. Theoretical performance metrics are derived and compared to the experimental results. Performance gains using the processor array over software implementations are also presented and discussed.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The critical requirement on reliability, fault-tolerance and security of network devices highlights the necessity of protocol robustness testing. Mutation testing of protocol messages is an important part of robustness testing, but related theory and practices are not well developed. This paper builds a NFSM model for mutation testing of protocol messages and proposes two types of normal-verification sequence to enhance verdict mechanism. For single-field mutation testing of protocol messages, we propose the concept of compound anomalous test case to further simplify test sequences. As a standard test specification language, TTCN-3 reveals strong excellence in conformance testing, so we apply TTCN-3 to mutation testing and extend it according to test requirements. Using our method we test OSPFv2 sufficiently with a test system based on extended TTCN-3. The results indicate that our method has good capability of error-finding.
{"title":"Mutation Testing of Protocol Messages Based on Extended TTCN-3","authors":"Chuanming Jing, Zhiliang Wang, Xingang Shi, Xia Yin, Jianping Wu","doi":"10.1109/AINA.2008.98","DOIUrl":"https://doi.org/10.1109/AINA.2008.98","url":null,"abstract":"The critical requirement on reliability, fault-tolerance and security of network devices highlights the necessity of protocol robustness testing. Mutation testing of protocol messages is an important part of robustness testing, but related theory and practices are not well developed. This paper builds a NFSM model for mutation testing of protocol messages and proposes two types of normal-verification sequence to enhance verdict mechanism. For single-field mutation testing of protocol messages, we propose the concept of compound anomalous test case to further simplify test sequences. As a standard test specification language, TTCN-3 reveals strong excellence in conformance testing, so we apply TTCN-3 to mutation testing and extend it according to test requirements. Using our method we test OSPFv2 sufficiently with a test system based on extended TTCN-3. The results indicate that our method has good capability of error-finding.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127101308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we analyze the common problems of link state routing protocols along with an evolution of the Optimized Link State Routing protocol, called BATMAN. BATMAN uses a weighted and auto-selective flooding which makes it a sort of gossip protocol. The flooding uses short control packets to make every mesh node aware of network topology. However, there is no topology information dissemination and no multi-point relaying node selection. While routing loops are easily avoided by this modified flooding mechanism, there are still problems about self-interference. Due the broadcast nature of the radio channel, traffic data can disturb control data, and localized control data may cause interference on neighboring control data as well. In fact there is a complicated interaction between MAC and routing protocols. We demonstrate this fact by extensive field tests carried out by our measurement framework based on statistical tests. In particular, we show that the so called hop horizon of multi-hop network can be due to the routing and MAC protocols. These analysis can be a useful hint for the design of more intelligent routing, or rather a less cross-layer dependence of protocols.
{"title":"A BAT in the Lab: Experimental Results of New Link State Routing Protocol","authors":"Makoto Ikeda, G. Marco, L. Barolli, M. Takizawa","doi":"10.1109/AINA.2008.60","DOIUrl":"https://doi.org/10.1109/AINA.2008.60","url":null,"abstract":"In this paper, we analyze the common problems of link state routing protocols along with an evolution of the Optimized Link State Routing protocol, called BATMAN. BATMAN uses a weighted and auto-selective flooding which makes it a sort of gossip protocol. The flooding uses short control packets to make every mesh node aware of network topology. However, there is no topology information dissemination and no multi-point relaying node selection. While routing loops are easily avoided by this modified flooding mechanism, there are still problems about self-interference. Due the broadcast nature of the radio channel, traffic data can disturb control data, and localized control data may cause interference on neighboring control data as well. In fact there is a complicated interaction between MAC and routing protocols. We demonstrate this fact by extensive field tests carried out by our measurement framework based on statistical tests. In particular, we show that the so called hop horizon of multi-hop network can be due to the routing and MAC protocols. These analysis can be a useful hint for the design of more intelligent routing, or rather a less cross-layer dependence of protocols.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121866631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}