Pub Date : 2008-05-23DOI: 10.1109/ICTTA.2008.4530184
B. Kadri, Mohammed Feham, Abdallah M'hamed
Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Dynamic Source Routing Protocol DSR in order to include some of the aspects of ad hoc networks as mobility and energy by proposing a new metric to evaluate route based on intermediate nodes weight computed by combining the stability an the battery power of nodes to choose the most stable and powered nodes for packet forwarding. The paper is organized into five parts, in the first ones we give an overview of ad hoc networks and routing protocols; and a brief presentation of DSR. However the rest of parts are consecrated for our proposed improvement for DSR and simulation results of Weight Based Dynamic Source Routing Protocol WDBSR finishing the paper by a conclusion and future extension of this work.
{"title":"Weight based DSR for Mobile Ad Hoc Networks","authors":"B. Kadri, Mohammed Feham, Abdallah M'hamed","doi":"10.1109/ICTTA.2008.4530184","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530184","url":null,"abstract":"Routing in ad hoc network is a great problematic, since a good routing protocol must ensure fast and efficient packet forwarding, which isn't evident in ad hoc networks. In literature there exists lot of routing protocols however they don't include all the aspects of ad hoc networks as mobility, device and medium constraints which make these protocols not efficient for some configuration and categories of ad hoc networks. Thus in this paper we propose an improvement of Dynamic Source Routing Protocol DSR in order to include some of the aspects of ad hoc networks as mobility and energy by proposing a new metric to evaluate route based on intermediate nodes weight computed by combining the stability an the battery power of nodes to choose the most stable and powered nodes for packet forwarding. The paper is organized into five parts, in the first ones we give an overview of ad hoc networks and routing protocols; and a brief presentation of DSR. However the rest of parts are consecrated for our proposed improvement for DSR and simulation results of Weight Based Dynamic Source Routing Protocol WDBSR finishing the paper by a conclusion and future extension of this work.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-05-23DOI: 10.1109/ICTTA.2008.4530178
M. Sarram, Mohammad Ghasemzadeh, V. Aghaei
There is always a great concern for network administrators, how to deal with network failure in reasonable time span. Network failure can happen any time of the day and administrator may not be informed in time and even then would not be able to enforce the remedy effectively. This scenario will arise when physical access to the network devices is not possible; i.e. the administrator is away from network locations. In this paper a new approach has been adopted in such a way that, the information on network status is gathered by an application, using SNMP protocol and is sent to network administrator by SMS. This approach also will allow network administrator to apply all necessary commands, using SMS. The short messages are then converted to be used by SNMP protocol to rectify faults, causing network failure.
{"title":"Remote Control and Overall Administration of Computer Networks, Using Short Message Service","authors":"M. Sarram, Mohammad Ghasemzadeh, V. Aghaei","doi":"10.1109/ICTTA.2008.4530178","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530178","url":null,"abstract":"There is always a great concern for network administrators, how to deal with network failure in reasonable time span. Network failure can happen any time of the day and administrator may not be informed in time and even then would not be able to enforce the remedy effectively. This scenario will arise when physical access to the network devices is not possible; i.e. the administrator is away from network locations. In this paper a new approach has been adopted in such a way that, the information on network status is gathered by an application, using SNMP protocol and is sent to network administrator by SMS. This approach also will allow network administrator to apply all necessary commands, using SMS. The short messages are then converted to be used by SNMP protocol to rectify faults, causing network failure.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4529970
G. Ouafia, Marie-Hélène Abel, C. Moulin
Numerous learning resources may be used during e-learning. The access, management and sharing of this resources require their indexing. This paper presents an approach for indexing learning resources by using a specific LOM ontology. We also present the tool that we have built allowing to describe learning objects and helping to search for them.
{"title":"Semantic Indexing of e-Learning Resources","authors":"G. Ouafia, Marie-Hélène Abel, C. Moulin","doi":"10.1109/ICTTA.2008.4529970","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4529970","url":null,"abstract":"Numerous learning resources may be used during e-learning. The access, management and sharing of this resources require their indexing. This paper presents an approach for indexing learning resources by using a specific LOM ontology. We also present the tool that we have built allowing to describe learning objects and helping to search for them.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530071
M. A. Tehrani, A. Saghaeian, O.R. Mohajerani
As the need for using and developing three dimensional (3D) surface modeling grows increasingly due to its wide range of applications, new techniques are developed and optimized to fulfill the requirements. The two main image ranging techniques refer to the active and passive approaches. In the active projector ranging technique, a single camera and a pattern projector with high focusing performance are used to obtain reliable measurement on the images taken. The passive projector ranging technique is based on finding correspondence between stereo images taken from the same object surface. Both techniques use a light projector which projects a structured light pattern. One of the advantages of using structured light is adding some extra features to the object which can include inherently featureless objects to be reconstructed in this way. In this study, the significant advantages of the two techniques are combined to implement a practical 3D modeling technique. First, a color slit pattern has been designed to uniquely labeling and precisely extracting the image points along slits edges. The label of any image points is assigned according to hue value of next and previous slits where the sequence of colors has maximum hue value differences on adjacent slits. Then, edge points of slits are extracted along the epipolar lines of stereo images and labeled simultaneously.Applying two strategies together, we've enhanced the unique and precise occurrences of the slits. The first strategy was background elimination which reduced the effects of surface color as a result. The second strategy was a color ordering for light slits which simplified matching of a correct point among corresponding epipolar points. Finally, the designed slit pattern has been applied using a flat wall, an industrial part and a human face. The color point clouds of the three different surfaces have been calculated and the calculated points on the flat wall have represented an acceptable accuracy of the designed pattern. The stability of the point extraction and labeling algorithm has been tested for an industrial part and the point cloud of the human face shows the capability of the proposed algorithm to get and assign the true color of the scene to the point cloud. Therefore, the proposed slit pattern has reduced the effects of imaging and point extraction noises.
{"title":"A New Approach to 3D Modeling Using Structured Light Pattern","authors":"M. A. Tehrani, A. Saghaeian, O.R. Mohajerani","doi":"10.1109/ICTTA.2008.4530071","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530071","url":null,"abstract":"As the need for using and developing three dimensional (3D) surface modeling grows increasingly due to its wide range of applications, new techniques are developed and optimized to fulfill the requirements. The two main image ranging techniques refer to the active and passive approaches. In the active projector ranging technique, a single camera and a pattern projector with high focusing performance are used to obtain reliable measurement on the images taken. The passive projector ranging technique is based on finding correspondence between stereo images taken from the same object surface. Both techniques use a light projector which projects a structured light pattern. One of the advantages of using structured light is adding some extra features to the object which can include inherently featureless objects to be reconstructed in this way. In this study, the significant advantages of the two techniques are combined to implement a practical 3D modeling technique. First, a color slit pattern has been designed to uniquely labeling and precisely extracting the image points along slits edges. The label of any image points is assigned according to hue value of next and previous slits where the sequence of colors has maximum hue value differences on adjacent slits. Then, edge points of slits are extracted along the epipolar lines of stereo images and labeled simultaneously.Applying two strategies together, we've enhanced the unique and precise occurrences of the slits. The first strategy was background elimination which reduced the effects of surface color as a result. The second strategy was a color ordering for light slits which simplified matching of a correct point among corresponding epipolar points. Finally, the designed slit pattern has been applied using a flat wall, an industrial part and a human face. The color point clouds of the three different surfaces have been calculated and the calculated points on the flat wall have represented an acceptable accuracy of the designed pattern. The stability of the point extraction and labeling algorithm has been tested for an industrial part and the point cloud of the human face shows the capability of the proposed algorithm to get and assign the true color of the scene to the point cloud. Therefore, the proposed slit pattern has reduced the effects of imaging and point extraction noises.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123076425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530187
A. Bazregar, A. Movaghar, A. Barati, M. Nejhad, H. Barati
This paper proposes a decentralized algorithm to organize an ad-hoc sensor network into clusters. Each sensor operates independently, monitoring communication among others. Those sensors which have many neighbors that are not already part of a cluster are likely candidates to creating a new cluster by declaring themselves to be a new cluster-head. The clustering algorithm via deadline timer (CADT) provides a protocol whereby this can be achieved and the process continues until all sensors are part of a cluster. Because of the difficulty of analyses simplified models are used to study and abstract its performance. A simple formula to estimate the number of clusters which will be formed in an ad-hoc network is derived based on the analysis, and the results are compared to the behavior of the algorithm in a number of settings.
{"title":"Notice of Violation of IEEE Publication PrinciplesA New Automatic Clustering Algorithm via Deadline Timer for Wireless Ad-hoc Sensor Networks","authors":"A. Bazregar, A. Movaghar, A. Barati, M. Nejhad, H. Barati","doi":"10.1109/ICTTA.2008.4530187","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530187","url":null,"abstract":"This paper proposes a decentralized algorithm to organize an ad-hoc sensor network into clusters. Each sensor operates independently, monitoring communication among others. Those sensors which have many neighbors that are not already part of a cluster are likely candidates to creating a new cluster by declaring themselves to be a new cluster-head. The clustering algorithm via deadline timer (CADT) provides a protocol whereby this can be achieved and the process continues until all sensors are part of a cluster. Because of the difficulty of analyses simplified models are used to study and abstract its performance. A simple formula to estimate the number of clusters which will be formed in an ad-hoc network is derived based on the analysis, and the results are compared to the behavior of the algorithm in a number of settings.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121829835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530304
H. Mazyad, I. Kerkeni, H. Ajroud
This paper describes an approach of coalition formation in a peer-to-peer multi-agents system. The case study that we present is a collaborative learning application. A strategy of coordination between agents is done to enable good learning. In this work, we propose a new approach of coalition formation.
{"title":"Multi-Agent System Architecture for Managing the Coordination in Peer-to-Peer Systems","authors":"H. Mazyad, I. Kerkeni, H. Ajroud","doi":"10.1109/ICTTA.2008.4530304","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530304","url":null,"abstract":"This paper describes an approach of coalition formation in a peer-to-peer multi-agents system. The case study that we present is a collaborative learning application. A strategy of coordination between agents is done to enable good learning. In this work, we propose a new approach of coalition formation.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115743004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530177
S. El Sawda, R. El Sawda, P. Urien, I. Hajjeh
Session Initiation Protocol (SIP) is an application-layer signaling and control protocol for creating, modifying and terminating sessions including Internet telephone calls, multimedia distribution and multimedia conferences. Flexible, extensible and open, SIP has a complete security mechanism that allows security of both media and signaling. SIP RFC recommends the use of TLS or DTLS (Datagram TLS defined in RFC 4347) to provide an adequate level of protection against attacks. However, missing from these protocols is a way to perform non-repudiation service. In this paper we propose to modify some header fields in the SIP messages in order to allow them to perform non-repudiation service over TLS. This modification provides the User Agents (UAs) the ability to sign their SIP messages using certificates such as X.509.
{"title":"Non Repudiation for SIP Protocol; SIP Sign","authors":"S. El Sawda, R. El Sawda, P. Urien, I. Hajjeh","doi":"10.1109/ICTTA.2008.4530177","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530177","url":null,"abstract":"Session Initiation Protocol (SIP) is an application-layer signaling and control protocol for creating, modifying and terminating sessions including Internet telephone calls, multimedia distribution and multimedia conferences. Flexible, extensible and open, SIP has a complete security mechanism that allows security of both media and signaling. SIP RFC recommends the use of TLS or DTLS (Datagram TLS defined in RFC 4347) to provide an adequate level of protection against attacks. However, missing from these protocols is a way to perform non-repudiation service. In this paper we propose to modify some header fields in the SIP messages in order to allow them to perform non-repudiation service over TLS. This modification provides the User Agents (UAs) the ability to sign their SIP messages using certificates such as X.509.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124276365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4530152
J. Aboujeib, A. Pérennou, V. Quintard, J. Le Bihan
We present theoretical and experimental study of losses and crosstalk in a 2times2 optical switch based on a multi- transducers acousto-optic TeO2 deflector. The deflector is realized by superimposition of two phase gratings in the crystal. This study shows that the losses are not significant and that the crosstalk values at the switch outputs depend on the working frequencies. The appropriate choice of the frequencies allows to carry out the switch with crosstalk less than -50 dB at the two outputs of the switch and in the two configurations. This acousto- optic switch with phased array transducers is suitable for telecommunication applications.
{"title":"Evaluation of the crosstalk and losses in a multi-transducer acousto-optic switch","authors":"J. Aboujeib, A. Pérennou, V. Quintard, J. Le Bihan","doi":"10.1109/ICTTA.2008.4530152","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530152","url":null,"abstract":"We present theoretical and experimental study of losses and crosstalk in a 2times2 optical switch based on a multi- transducers acousto-optic TeO2 deflector. The deflector is realized by superimposition of two phase gratings in the crystal. This study shows that the losses are not significant and that the crosstalk values at the switch outputs depend on the working frequencies. The appropriate choice of the frequencies allows to carry out the switch with crosstalk less than -50 dB at the two outputs of the switch and in the two configurations. This acousto- optic switch with phased array transducers is suitable for telecommunication applications.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117149402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/ICTTA.2008.4529934
N. Fawaz, D. Jansen
A new miniaturized capsule with 32bit processor and bidirectional communication system is being developed for multitask application. The capsule is designed to be a platform for medical assistant application inside the body. The processor core SIRIUS has been developed, simulated, synthesized to a netlist and verified. The designed telemetry unit is a synchronous bidirectional communication block using continuous phase DQPSK of 115 kHz low carrier frequency for inductive data transmission suited for human body energy transfer. The communication system can assist the electronic pill to trigger an actuator for drug delivery, to record temperature, or to measure pH of the body. The complete system is designed to fit small-size mass medical application with low power consumption, size of 7x25 mm. The system is designed, simulated, emulated on FPGA, and routed in AMIS Technology.
{"title":"A SoC Electronic Pill (ePille®) with 32bit SIRIUS Processor and Bidirectional Communication System used for Biomedical Telemetry Applications","authors":"N. Fawaz, D. Jansen","doi":"10.1109/ICTTA.2008.4529934","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4529934","url":null,"abstract":"A new miniaturized capsule with 32bit processor and bidirectional communication system is being developed for multitask application. The capsule is designed to be a platform for medical assistant application inside the body. The processor core SIRIUS has been developed, simulated, synthesized to a netlist and verified. The designed telemetry unit is a synchronous bidirectional communication block using continuous phase DQPSK of 115 kHz low carrier frequency for inductive data transmission suited for human body energy transfer. The communication system can assist the electronic pill to trigger an actuator for drug delivery, to record temperature, or to measure pH of the body. The complete system is designed to fit small-size mass medical application with low power consumption, size of 7x25 mm. The system is designed, simulated, emulated on FPGA, and routed in AMIS Technology.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Visualization addresses the problem of making more efficient use of available computer resources. Recently, virtual clusters try either to virtualize a single physical cluster into multiple independent virtual clusters to provide a virtual server as a highly scalable and highly available server built on a cluster of real servers, or to share physical clusters to offer economies of scale and more effective use of resources by multiplexing. However, since programs running on a cluster demonstrate different types of requirements as their executions proceeds, such as support for intensive processing, security, and massive data communications, it is therefore quite unrealistic to assume that a statically configured cluster with a predetermined number of nodes with specific features and support can do any good for such programs. This paper presents a different usage for virtualization in the context of distributed computing using virtual clusters, called virtual cluster engine (VCE), that provides a computing environment that can be both statistically and dynamically (re)organized according to the needs and requirements of programs, so that they can achieve the best possible performance as they suit themselves, indeed within the constraints of available resources. Feasibility of the proposed architecture for VCE has been studied on an experimental platform using seven real machines, VMWare ESX, VMotion, and VMWare programming kit, and a number of virtual machines. On average, 20% improvement on response times under VCE was experienced.
{"title":"VCE: A New Personated Virtual Cluster Engine for Cluster Computing","authors":"Mohsen Sharifi, Masoud Hassani, Ehsan Mousavi, Seyyede Leili Mirtaheri","doi":"10.1109/ICTTA.2008.4530340","DOIUrl":"https://doi.org/10.1109/ICTTA.2008.4530340","url":null,"abstract":"Visualization addresses the problem of making more efficient use of available computer resources. Recently, virtual clusters try either to virtualize a single physical cluster into multiple independent virtual clusters to provide a virtual server as a highly scalable and highly available server built on a cluster of real servers, or to share physical clusters to offer economies of scale and more effective use of resources by multiplexing. However, since programs running on a cluster demonstrate different types of requirements as their executions proceeds, such as support for intensive processing, security, and massive data communications, it is therefore quite unrealistic to assume that a statically configured cluster with a predetermined number of nodes with specific features and support can do any good for such programs. This paper presents a different usage for virtualization in the context of distributed computing using virtual clusters, called virtual cluster engine (VCE), that provides a computing environment that can be both statistically and dynamically (re)organized according to the needs and requirements of programs, so that they can achieve the best possible performance as they suit themselves, indeed within the constraints of available resources. Feasibility of the proposed architecture for VCE has been studied on an experimental platform using seven real machines, VMWare ESX, VMotion, and VMWare programming kit, and a number of virtual machines. On average, 20% improvement on response times under VCE was experienced.","PeriodicalId":330215,"journal":{"name":"2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127272259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}