By Topic

Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05)

Date 17-20 July 2005

Filter Results

Displaying Results 1 - 25 of 95
  • Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop

    Publication Year: 2005, Page(s):c1 - c2
    Request permission for commercial reuse | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop - Table of contents

    Publication Year: 2005, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (20 KB) | HTML iconHTML
    Freely Available from IEEE
  • AICT Committee

    Publication Year: 2005, Page(s):xiv - xvii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Anti-doping: an approach for grid integrity verification

    Publication Year: 2005, Page(s):2 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Security in traditional computer networks requires authentication, access control, integrity, privacy and non-repudiation, which can be also be applied to assure security in grid computing. Work related to authentication, authorization, and privacy in grids has been presented in the literature. However, there is a need to guarantee to grid users and administrators that grid machines are not corrup... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overlay data plane for PlanetLab

    Publication Year: 2005, Page(s):8 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    PlanetLab is a geographically distributed overlay platform designed to support the deployment and evaluation of planetary-scale network services. It currently includes over 500 machines spanning 252 sites and 29 countries, and has supported over 450 research projects. PlanetLab can support large-scale overlays running in slices (i.e., collections of distributed virtual machines). It has significan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stakes of next-generation communication services

    Publication Year: 2005, Page(s):15 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1480 KB) | HTML iconHTML

    Communications services are facing major technical evolutions with SIP, IMS and NGN. Their usage is also evolving with the convergence between multiple communication modes (voice, vision, instant messaging, etc.) and their seamless management through availability strategies. In this context, three major stakes for service conception are to secure the usage, to include multiple communication modes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of next generation VDSL networks in metro Ethernet backbone environments

    Publication Year: 2005, Page(s):21 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Rapid expansion of cost-effective metropolitan Ethernet in regional backbone environments enables implementation of the FTTC-based next generation VDSL networks operating over the short-distance loop, which support faster speeds than the legacy ADSL networks. Most of the legacy ADSL networks have been implemented in ATM backbone environments, and the protocol architecture is mainly 'ATM over ADSL'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet classification using adaptive rules cutting (ARC)

    Publication Year: 2005, Page(s):28 - 33
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    This paper introduces an advanced packet classification algorithm called adaptive rules cutting (ARC). In the same way as the HiCuts and HyperCuts Algorithm, ARC is based on cutting the multi-dimensional space into smaller segments for rule reduction. Unlike HiCuts where dividing the region takes more than 1 level, and unlike HyperCuts in which each node represents a k-dimensional hypercube, ARC a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast retransmission of real-time traffic in HIPERLAN/2 systems

    Publication Year: 2005, Page(s):34 - 38
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Automatic repeat request (ARQ) schemes are effective to recover non-real-time data corrupted by channel errors, but their use with real-time traffic is seldom considered because packet retransmissions tend to increase the delay beyond the deadline. However, the high-speed of modern wireless local area networks, together with their inherent low propagation times, favors the use of ARQ schemes with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location-based geocasting and forwarding (LGF) routing protocol in mobile ad hoc network

    Publication Year: 2005, Page(s):536 - 541
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Routing in mobile ad hoc networks (MANET) has been a subject of extensive research over the past several years. The location-based geocasting and forwarding routing protocol (LGF) is based on location information to reduce flooding and routing overhead. Unlike other position-based routing protocols, neighboring nodes in LGF that are in the forwarding zone rebroadcast a route request packet and sen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic resource allocation algorithm for metropolitan optical packet-switched ring networks

    Publication Year: 2005, Page(s):39 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    The problem studied in this paper is a wavelength allocation algorithm applied to a metropolitan optical packet-switched ring network. Existing algorithms that provide optimal wavelength allocation generally require excessive computational time even with a small network of 8 to 16 nodes. Therefore, those approaches seem to be inappropriate for providing a dynamic real time wavelength allocation, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service management for end-to-end QoS multimedia content delivery in heterogeneous environment

    Publication Year: 2005, Page(s):46 - 52
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Integrated service management aims to support efficient cooperation between various business entities, in order to offer end-to-end QoS based services to end users. This is challenging, especially in the context of heterogeneous technologies (IP, DVB-TIS, UWS, GSM/GPRS, etc.). This paper proposes a service management (SM) architecture, involving several actors such as service providers (SP), conte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the on-line hose-model VPN provisioning

    Publication Year: 2005, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    The allocation of bandwidth for VPNs to meet the requirements specified by customers is now one of the most important research issues in the field of traffic engineering. A VPN resource provisioning model, called hose model, was developed to provide customers with flexible and convenient ways to specify the bandwidth requirement of a VPN. Several hose-model VPN provisioning algorithms have already... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy-based network management in an integrated mobile network

    Publication Year: 2005, Page(s):59 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Through the seamless integration of different kinds of technologies, services and terminals, and with the expected offered bandwidth, the next generation networks will put a new set of challenges related to operation and management. We present a policy-based network management system (PBNMS) that is being developed inside the Daidalos IST project. We evaluate several WBEM (Web based enterprise man... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A service-oriented architecture framework for mobile services

    Publication Year: 2005, Page(s):65 - 70
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Service-oriented architectures and service-oriented computing are the most recent approaches aimed at facilitating the design and development of applications on distributed systems. The paper investigates how the construction of mobile services can benefit from the service-oriented paradigm. The paper provides a presentation of the service-oriented architecture. A general discussion of equivalence... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FRAMESEC: a framework for the application development with end-to-end security provision in the mobile computing environment

    Publication Year: 2005, Page(s):72 - 77
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Mobile devices offer network connectivity through wireless system communication that makes possible for applications to get access to information at any time and any place. However, the wireless link is more vulnerable to passive and active attacks than the fixed medium in traditional networks. This kind of connectivity brings security problems to applications that deal with confidential data, suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of distributed network-based IDS systems in detection of evasion attacks

    Publication Year: 2005, Page(s):78 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    The paper discusses some problems in the use of intrusion detection systems (IDS), especially related to evasion attacks. Important characteristics of this type of attack are presented, and the possibilities for attack analyzed. Characteristics of network and host based IDS systems are compared, and some aspects of a distributed approach to the architecture of IDS are analyzed. On the basis of suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web services: self-adaptable trust mechanisms

    Publication Year: 2005, Page(s):83 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    The scope of the paper is twofold: (i) to study trust models synchronized with levels of security; (ii) to propose an extension to the current WS-Trust mechanisms. The extension considers the evaluation of past interactions between WSs and metrics associated with trust violations of these interactions. The results can be applied to monitor the SLA in WS-based systems and for early threat detection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An enhanced SOS architecture for DDoS attack defense using active network technology

    Publication Year: 2005, Page(s):90 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    After a long time study of DDoS attack, we find that the secure overlay services (SOS) architecture is one of the best ways to protect our service. There is no other reason but the ability to provide reliable communication between authorized clients and a protected target under on-going DDoS attacks. The SOS architecture defines a set of overlay nodes, arranged in four function groups, that contro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RLS adaptation of widely linear minimum output energy algorithm for DS-CDMA systems

    Publication Year: 2005, Page(s):98 - 102
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    In this paper we propose an adaptive widely linear (WL) minimum output energy (MOE) algorithm to suppress interference in DS-CDMA systems. In contrast to prior work which could handle only real-valued modulation, the proposed algorithm is applicable to both real- and complex-valued modulation utilizing the recursive least-squares (RLS) algorithm for adaptive training of the filter taps. SINR of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impacts of packet filling in an optical packet switching architecture

    Publication Year: 2005, Page(s):103 - 108
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Increase in network traffic and emergence of a variety of applications requiring different QoS necessitate scalable and efficient resource utilization. An appealing solution for backbone networks is the optical packet switching architecture. However technological constraints prevent the deployment of such all-optical solutions. Instead, feasible optic-electrical hybrid systems are gaining importan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the effects of burst assembly in optical burst switching under self-similar traffic

    Publication Year: 2005, Page(s):109 - 114
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Optical burst switching is a novel switching concept which is a hybrid of optical packet switching and optical wavelength routing. In order to provide an efficient bandwidth utilization, various burst assembly and scheduling schemes for optical bursts are introduced. In this work, the effects of burst assembly techniques on the performance of the optical burst switching (OBS) technique and the cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.