J. Sorribas, A. Barba, E. Trullols, J. del Río, A. Mànuel, M. de la Muela
Sensor networks for environmental data acquisition will play an important role in the development of future large data acquisition systems, particularly in oceanographic observation and operational oceanography. This paper will show the applicability of policy based network management (PBNM) on marine sensor networks (MSN) and networked ocean observatories aiming to overcome the lack of flexibility imposed by more traditional network management paradigms.
{"title":"Marine Sensor Networks and Ocean Observatories. A Policy Based Management Approach","authors":"J. Sorribas, A. Barba, E. Trullols, J. del Río, A. Mànuel, M. de la Muela","doi":"10.1109/ICCGI.2008.49","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.49","url":null,"abstract":"Sensor networks for environmental data acquisition will play an important role in the development of future large data acquisition systems, particularly in oceanographic observation and operational oceanography. This paper will show the applicability of policy based network management (PBNM) on marine sensor networks (MSN) and networked ocean observatories aiming to overcome the lack of flexibility imposed by more traditional network management paradigms.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121793166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Most P2P file-sharing systems are unable to create self- organizing communities of similar nodes that provide good services to their members. In this paper, we propose a Gnutella-like file-sharing protocol based on the premise that each peer only creates links with the best counterparts which the peer has discovered in the network. Termed adaptive Gnutella protocol (AGP), our proposal transforms the overlay topology based on a reputation scheme that evaluates the provided services and offers a mechanism that organizes trusted nodes with similar content. We have implemented the AGP protocol using the PeerSim engine and conducted experiments on diverse network topologies. Over time, the network topology improves as every peer locates counterparts with similar content and good reputation. Moreover, malicious nodes are pushed to the edge of the overlay network and are excluded from participating in the AGP search.
{"title":"Adaptive Management of Communities Based on Peer Content and Reputation","authors":"I. Pogkas, V. Kriakov, Zhongqiang Chen, A. Delis","doi":"10.1109/ICCGI.2008.28","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.28","url":null,"abstract":"Most P2P file-sharing systems are unable to create self- organizing communities of similar nodes that provide good services to their members. In this paper, we propose a Gnutella-like file-sharing protocol based on the premise that each peer only creates links with the best counterparts which the peer has discovered in the network. Termed adaptive Gnutella protocol (AGP), our proposal transforms the overlay topology based on a reputation scheme that evaluates the provided services and offers a mechanism that organizes trusted nodes with similar content. We have implemented the AGP protocol using the PeerSim engine and conducted experiments on diverse network topologies. Over time, the network topology improves as every peer locates counterparts with similar content and good reputation. Moreover, malicious nodes are pushed to the edge of the overlay network and are excluded from participating in the AGP search.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122873966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our goal is to organize the image contents semantically. In this paper, we propose a method to classify the images semantically, using the C-fuzzy algorithm to segment the natural scenes into perceptually uniform regions. The low-level characteristics that are taken into account are: color, texture, shape, absolute spatial arrangement, spatial coherency, and dimension. Since humans are the ultimate users of most image retrieval systems, it is important to organize the contents semantically, according to meaningful categories. This requires an understanding of the important semantic categories that humans use for image classification, and the extraction of meaningful image features that can discriminate between these categories. A lot of experiments, in which the human subjects had to group images into semantic categories and to explain the criteria for their choice, were realized. From these experiments, we identify the semantic categories (landscapes, animals, flowers, etc), the semantic indicators or intermediate descriptors and their visual characteristics.
{"title":"Mapping Image Low-Level Descriptors to Semantic Concepts","authors":"A. Ion, L. Stanescu, D. Burdescu, S. Udristoiu","doi":"10.1109/ICCGI.2008.29","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.29","url":null,"abstract":"Our goal is to organize the image contents semantically. In this paper, we propose a method to classify the images semantically, using the C-fuzzy algorithm to segment the natural scenes into perceptually uniform regions. The low-level characteristics that are taken into account are: color, texture, shape, absolute spatial arrangement, spatial coherency, and dimension. Since humans are the ultimate users of most image retrieval systems, it is important to organize the contents semantically, according to meaningful categories. This requires an understanding of the important semantic categories that humans use for image classification, and the extraction of meaningful image features that can discriminate between these categories. A lot of experiments, in which the human subjects had to group images into semantic categories and to explain the criteria for their choice, were realized. From these experiments, we identify the semantic categories (landscapes, animals, flowers, etc), the semantic indicators or intermediate descriptors and their visual characteristics.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Why does a project team member prefer some colleagues to others in knowledge seeking? Past literature suggests that the physical accessibility of a knowledge source, the knowledge quality of the source and relational concerns are important to such choice. Our social network analysis of an information systems (IS) project team indicates that job interdependence and rank have a significant impact on knowledge sourcing frequency. In contrast, personal relationship and the knowledge quality of source have no significant effect. This finding suggests both the importance of structural factors in knowledge sourcing and the context-dependent nature of knowledge sourcing behavior.
{"title":"How Do People Seek Knowledge in Information System Projects: A New Perspective from Social Network Theory","authors":"Chenghong Zhang, C. Yunjie Xu, Cheng Zhang","doi":"10.1109/ICCGI.2008.22","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.22","url":null,"abstract":"Why does a project team member prefer some colleagues to others in knowledge seeking? Past literature suggests that the physical accessibility of a knowledge source, the knowledge quality of the source and relational concerns are important to such choice. Our social network analysis of an information systems (IS) project team indicates that job interdependence and rank have a significant impact on knowledge sourcing frequency. In contrast, personal relationship and the knowledge quality of source have no significant effect. This finding suggests both the importance of structural factors in knowledge sourcing and the context-dependent nature of knowledge sourcing behavior.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124675356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web based social communities are one of the most widely used applications nowadays. Ubiquitous computing and access capabilities leverage the evolution of highly dynamic social communities. Recently, security and privacy concerns within these communities have increased significantly. This paper addresses these challenges by controlling access to community resources exploiting semantic Web technologies. In this regard, a conceptual community framework and its access control mechanisms are formalised using the Web ontology language. Access to the resources is controlled by defining differential access rights based on the relationships between the individuals and the communities. Instead of an explicit definition, some additional facts of the mechanisms are inferred by executing semantic Web rules using the Jess rule engine over the designed ontology. These information are then passed back into the ontology to enrich the existing ontology.
{"title":"Semantic Access Control in Web Based Communities","authors":"N. Elahi, M. Chowdhury, Josef Noll","doi":"10.1109/ICCGI.2008.46","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.46","url":null,"abstract":"Web based social communities are one of the most widely used applications nowadays. Ubiquitous computing and access capabilities leverage the evolution of highly dynamic social communities. Recently, security and privacy concerns within these communities have increased significantly. This paper addresses these challenges by controlling access to community resources exploiting semantic Web technologies. In this regard, a conceptual community framework and its access control mechanisms are formalised using the Web ontology language. Access to the resources is controlled by defining differential access rights based on the relationships between the individuals and the communities. Instead of an explicit definition, some additional facts of the mechanisms are inferred by executing semantic Web rules using the Jess rule engine over the designed ontology. These information are then passed back into the ontology to enrich the existing ontology.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116474246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kaune, J. Stolzenburg, A. Kovacevic, R. Steinmetz, R. Cuevas
Peer-to-peer systems have recently emerged as an attractive alternative to client/server approaches, especially in the area of content distribution. By efficiently leveraging the available upload bandwidth of the end users, BitTorrent becomes a de facto standard for scalable content distribution. Inspired by its success, many companies try to shift the major upload burden from their rented source servers to end users by using this protocol, since many hosting sites charge them based on the used egress capacity. In this paper, we perform an in-depth study of the overall performance of BitTorrent in its entirety, in order to get a broader understanding of its suitability for different applications domains. We analyze its performance from a bifocal perspective, namely that of the content providers and that of the end users. In this context, we find that the decrease of the source server's upload capacity has a highly negative impact on the overall protocol performance. In addition, it is shown that giving incentives to peers to stay online after completing downloading does not pay off.
{"title":"Understanding BitTorrent's Suitability in Various Applications and Environments","authors":"S. Kaune, J. Stolzenburg, A. Kovacevic, R. Steinmetz, R. Cuevas","doi":"10.1109/ICCGI.2008.24","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.24","url":null,"abstract":"Peer-to-peer systems have recently emerged as an attractive alternative to client/server approaches, especially in the area of content distribution. By efficiently leveraging the available upload bandwidth of the end users, BitTorrent becomes a de facto standard for scalable content distribution. Inspired by its success, many companies try to shift the major upload burden from their rented source servers to end users by using this protocol, since many hosting sites charge them based on the used egress capacity. In this paper, we perform an in-depth study of the overall performance of BitTorrent in its entirety, in order to get a broader understanding of its suitability for different applications domains. We analyze its performance from a bifocal perspective, namely that of the content providers and that of the end users. In this context, we find that the decrease of the source server's upload capacity has a highly negative impact on the overall protocol performance. In addition, it is shown that giving incentives to peers to stay online after completing downloading does not pay off.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129320540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C.E. Stan, D. Dumitrescu, V. Caras, D. Tiliute, E. Pop, L. E. Anghel
This paper presents an innovative solution in retail activities, named "Intelligent Store - INTELSHOP", based on a technological platform that offers the support for some attractive and efficient services for customers and administrative staff. The technological platform integrates various technologies such as RFID, GPS and GIS, wireless communications, mobile access to information on PDA or SmartPhone, integrated environments for data analysis regarding stocks and customers administration, interfaces with electronic payment systems. The goal pursued is mainly to reduce the time wasted by the customers searching the products on the store's shelf, to offer more and better information about products. On the other hand our solution pursues to maximize the merchant benefit by reducing the provisioning time, to diversify the offer and to create the opportunity to make the best decision in real time.
{"title":"Intelligent Store - An Innovative Technological Solution for Retail Activities with Mobile Access","authors":"C.E. Stan, D. Dumitrescu, V. Caras, D. Tiliute, E. Pop, L. E. Anghel","doi":"10.1109/ICCGI.2008.23","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.23","url":null,"abstract":"This paper presents an innovative solution in retail activities, named \"Intelligent Store - INTELSHOP\", based on a technological platform that offers the support for some attractive and efficient services for customers and administrative staff. The technological platform integrates various technologies such as RFID, GPS and GIS, wireless communications, mobile access to information on PDA or SmartPhone, integrated environments for data analysis regarding stocks and customers administration, interfaces with electronic payment systems. The goal pursued is mainly to reduce the time wasted by the customers searching the products on the store's shelf, to offer more and better information about products. On the other hand our solution pursues to maximize the merchant benefit by reducing the provisioning time, to diversify the offer and to create the opportunity to make the best decision in real time.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Most of the current agent systems focus on single issue, such as price, whereas multi-issue negotiation is very essential to electronic commerce. In the multi-issue model, MAUT (Multi-attribute Utility Theory) or its derived theory is mainly used as the evaluation method. However, the application of this theory may cause deviation. To resolve the problem, a two stage negotiation model is presented in this paper. In the first stage, the negotiation theory is used to negotiate over the most important issue or the issues combination. In the second stage we reverse auction the product each issue at one time according to the issue importance from the smallest to the most important using the adjusted auction theory.
{"title":"An Agent-Based Multi-issue Negotiation Model","authors":"Ying Wang, Huamei Sun, Guorui Jiang","doi":"10.1109/ICCGI.2008.32","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.32","url":null,"abstract":"Most of the current agent systems focus on single issue, such as price, whereas multi-issue negotiation is very essential to electronic commerce. In the multi-issue model, MAUT (Multi-attribute Utility Theory) or its derived theory is mainly used as the evaluation method. However, the application of this theory may cause deviation. To resolve the problem, a two stage negotiation model is presented in this paper. In the first stage, the negotiation theory is used to negotiate over the most important issue or the issues combination. In the second stage we reverse auction the product each issue at one time according to the issue importance from the smallest to the most important using the adjusted auction theory.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120966944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Embedded system design is a topic of interest to multidisciplinary fields including electrical engineering and computer science. In order to correctly focus on the correct aspects of embedded system design, be it hardware for electrical engineering students, or software for computer science students, seamless connectivity between the hardware and software aspects needs to be provided. One approach to provide students from both fields with practical experience is to develop a transparent bridge between the hardware and software layers of the embedded system design. In this paper we demonstrate a universal serial bus/serial peripheral interface (USB/SPI) transparent bridge to interface an embedded system to a personal computer. The bridge consists of a hardware module that transmits the embedded system data through SPI to a PC using USB. A device driver for the USB/SPI bridge provides a straightforward application programming interface to the embedded system. The bridge can aide students studying embedded system design and students studying computer software development to collaborate on design projects.
{"title":"Transparent Connectivity for Embedded System Design","authors":"C. Pearson, T. Giuma, A. Harris","doi":"10.1109/ICCGI.2008.10","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.10","url":null,"abstract":"Embedded system design is a topic of interest to multidisciplinary fields including electrical engineering and computer science. In order to correctly focus on the correct aspects of embedded system design, be it hardware for electrical engineering students, or software for computer science students, seamless connectivity between the hardware and software aspects needs to be provided. One approach to provide students from both fields with practical experience is to develop a transparent bridge between the hardware and software layers of the embedded system design. In this paper we demonstrate a universal serial bus/serial peripheral interface (USB/SPI) transparent bridge to interface an embedded system to a personal computer. The bridge consists of a hardware module that transmits the embedded system data through SPI to a PC using USB. A device driver for the USB/SPI bridge provides a straightforward application programming interface to the embedded system. The bridge can aide students studying embedded system design and students studying computer software development to collaborate on design projects.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Using remotely located software or hardware resources for solving various technical problems is presently the main subject of the current emerging technologies such as utility computing, cloud computing, Grid computing and so on. This paper discusses a possible architectural solution and describes a platform built bearing in mind the requirements for solving mathematical-described problems, but potentially useful also for other kinds of technical problems.
{"title":"On Designing an Asynchronous and Dynamic Platform for Solving Single Task Requests of Remote Applications","authors":"M. Frîncu, D. Petcu","doi":"10.1109/ICCGI.2008.14","DOIUrl":"https://doi.org/10.1109/ICCGI.2008.14","url":null,"abstract":"Using remotely located software or hardware resources for solving various technical problems is presently the main subject of the current emerging technologies such as utility computing, cloud computing, Grid computing and so on. This paper discusses a possible architectural solution and describes a platform built bearing in mind the requirements for solving mathematical-described problems, but potentially useful also for other kinds of technical problems.","PeriodicalId":367280,"journal":{"name":"2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128308025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}