Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Telecommunications, 2006. AICT-ICIW '06. International Conference on Internet and Web Applications and Services/Advanced International Conference on

Date 19-25 Feb. 2006

Filter Results

Displaying Results 1 - 25 of 215
  • Committees

    Publication Year: 2006 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2006 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (82 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Designing Mobile Learning

    Publication Year: 2006 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (208 KB)  

    Interest in delivering training, especially via innovative methods (m-learning), has received increasing attention over the past decade [12]. While many believe that there is a global market for m-learning programmes (especially using English), very few have much experience outside of their home market. Although there is considerable work on cross cultural aspects [9], there are few studies that consider how different cultural groups perceive training View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Computer Aided Grading System for Subjective Tests

    Publication Year: 2006 , Page(s): 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (152 KB) |  | HTML iconHTML  

    Computer aided tests replace traditional written answers on paper sheets with electronic records. For subjective tests, computers are not able to do all grading jobs, due to limited comprehensive ability of computers. Subjective answers need be reviewed by different graders in order to improve justice. We propose a distributed computational model for grading electronic subjective answers. Answer data are divided into numerous independent data cells. Computational resources are automatically allocated by the system to do grading jobs and independently report grading results to the system. Since the grading results may vary slightly or magnificently, we assign computational factors to data cells and computational resources to minimize the variation. In addition, rules are defined to obtain a final result. We successfully apply the proposed model in our grading system in computer aided spoken English tests. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fostering Communication Processes in E-Education Scenarios

    Publication Year: 2006 , Page(s): 3
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (256 KB) |  | HTML iconHTML  

    A teacher focused e-learning approach for higher education scenarios is presented. First, so called eteaching scenarios are defined. An example illustrates the main ideas. After that the effects of communication-related aspects on e-teaching processes are discussed. Finally the most important insights are summarized and an outlook is given on possible further developments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Concept Model for Computer-based Spoken Language Tests

    Publication Year: 2006 , Page(s): 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (128 KB) |  | HTML iconHTML  

    Spoken language education plays an important role in modern language courses. Computer-based spoken language test systems provide a convenient, efficient and reliable approach to test and assess individual spoken abilities. But most E-Learning systems concern more about written training and test. Existing models and systems do not completely meet special requirements of spoken language tests. In our study, we have examined distinctive features of spoken language tests and corresponding content resources. In this paper, we propose a concept model which is especially designed for representing, organizing, packaging and delivering E-Learning resources for spoken language tests. A Spoken-English-Test-Oriented (SET-Oriented) architecture is constructed based on this model. A family of commercial spoken language test systems is built for content authoring, online learning, tests and assessment, mostly simplifying the procedure of organizing a spoken language test. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing learning object metadata for mobile devices using CanCore

    Publication Year: 2006 , Page(s): 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (176 KB) |  | HTML iconHTML  

    Pedagogical and other types of metadata are important in the implementation of learning systems for use by mobile devices. Metadata is key to the use of learning objects. Learning objects represent a means of rendering learning content interoperable on a wide range of devices in different formats using XML for usability on small and large screens. To ensure discoverability and repository interoperability, metadata is essential. CanCore is a metadata profile for implementing the IEEE LOM, thus advancing the use of learning objects. With enhancements to the profile and to the LOM, providing for location and time, as well as other contextual information, mobile devices can be used effectively as an extension of the global data infrastructure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach in provision of interoperability of eLearning systems in enlarged EU - the case of iCamp project

    Publication Year: 2006 , Page(s): 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (160 KB) |  | HTML iconHTML  

    The paper addresses the main activities and findings of an EU based initiative for provision of interoperability of eLearning systems in the enlarged EU. The initiative is a project named iCamp1. The project is based on the current research results in several finished and on-going projects such as the Network of Excellence in Professional Learning - PROLEARN. As several surveys of the eLearning market have shown the abundance of eLearning systems that are difficult to be interconnected and used in various environments the need for system interoperability rose. The problem of interconnectivity is especially important for learning resource repositories intended for the widest audience in Europe and worldwide. The paper provides a short insight into the technical, pedagogical and collaborative learning approaches taken within the iCamp initiative. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Project Ubi-Learn: an Intermediation Infrastructure for Multi-channel Accesses to Future LMS

    Publication Year: 2006 , Page(s): 7
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (184 KB) |  | HTML iconHTML  

    Using previous experiences of designing elearning systems, we have started a new project, Ubi- Learn, which aims to support the remote learners in various situations, mobile or fixed. This means a great variety of communication channels such as Web, email, SMS, phone call This leads us to consider a large range of scenarios of use, where channels are combined in a same unit of interaction depending of the context. In the context we capture not only information about the technological and physical contexts of interaction, but also the user profile, and the nature of the activity and its history. Ubi-Learn intermediation is based on the assumption that the learning system is factorised into a collection of dedicated e-Services, and that the user interactions with the channels can be abstracted with a channel independent modelling language. The management of these intermediations is achieved through a multiagents infrastructure combining several sources of contextual knowledge, especially for the dynamic orchestration of the e-Services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Pilot E-Learning Experience on Telecommunications: Towards the E-Campus Concept

    Publication Year: 2006 , Page(s): 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (488 KB) |  | HTML iconHTML  

    The adoption of latest advancements in mobile technology can prove to be successful in transforming current teaching activities into structured learning paths based on completely novel paradigms. In our vision, mobile technology is a means to improve the quality of the interaction among students and among students and teachers, leading to an integrated ecampus environment. In the paper, we describe the pilot experience we are carrying on in this context, by means of the adoption of mobile technology (tablet PCs for both the lecturers and the students paired with proper network infrastructure support) and, far more important, by the complete re-design of the teaching paradigm, orienting to an interactive and highly motivating learning activity, and not limiting to rudimentary unidirectional web-based approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating Heterogeneous E-learning Systems

    Publication Year: 2006 , Page(s): 9
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (136 KB) |  | HTML iconHTML  

    E-learning is a novel education pattern that serves to solve the contradiction between the large amount of social demands and the lack of educational resources. With the popularization of e-learning, various teaching software, tools and e-learning platforms have unceasingly appeared. It is a burning question how to integrate various heterogeneous application systems for e-learning into an organic e-learning system. In this paper, an Integrated Framework for E-learning systems (IFE), which characterizes the reliability, the flexibility and the platform-independence, is proposed. It solves the problems faced while integrating the heterogeneous e-learning systems, such as the heterogeneity, the interoperation and the scalability. The practical application and the testing results on the performance indicate that the design of IFE is in reason and the e-learning system based on IFE can satisfy the concurrency requirements in practice. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The International E-Miage project: from an Isolated Framework to an Architecture Based on Learning Standards

    Publication Year: 2006 , Page(s): 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    In previous work, we presented a tiered architecture based on e-learning standards that includes a middle layer for communication and exchange of learning objects between Learning Management Systems (LMS) and Learning Object Repositories (LOR). Here, we apply this architecture to the International E-Miage (IEM) project, an Information System Engineering curriculum for Miage distant teaching which gathers twenty national sites and delivers official degrees. Thus, we bring IEEE-LOM metadata to the learning modules, together with a single interface allowing for interoperability between the LMS deployed within the IEM framework and the Knowledge Pool System of the Ariadne Foundation. The new architecture is currently experimented in Toulouse, and should be deployed within all others IEM exploitation centers in a few weeks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of a P2P-Based VoIP Software

    Publication Year: 2006 , Page(s): 11
    Cited by:  Papers (7)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (208 KB) |  | HTML iconHTML  

    With the development of network, multimedia will be the main application in next generation network. Voice is one of the most important applications. Recently a kind of P2P-based VoIP software, Skype, has been receiving more and more attention both in academia and industry. Skype claims that it's better than other VoIP software, because of its high call completion rate and superior sound quality. This paper will reveal Skype's technique and have a performance comparison between Skype and MSN Messenger, which uses traditional VoIP protocol. The result indicates that the voice quality of Skype is no better than traditional VoIP software and the great benefit of P2P involved with VoIP is that it can solve NAT and firewall problems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology and Services: Cars and Assistance for E-Learning Roadmaps

    Publication Year: 2006 , Page(s): 12
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (144 KB) |  | HTML iconHTML  

    ELViRA, the University e-learning network of Verona, has been growing, but its context also needs to be welldesigned. Thus, after the starting-up phase, intended to define the strategic planning and service models for the project, follow-up efforts will focus on service analysis. In this account we will describe the planning of these. To do this, we will identify a development structure and the required skills, and assign typical roles to them structuring the different activities of an elearning roadmap for an organization. The service analysis reported in this paper also addresses the costs involved, whereby cost drivers are identified and ranked according to their growth behaviour. The launching of a University e-learning centre is expected to provide a definite start to the implementation of the University e-learning policy. The first objective of the centre will be to support and to promote the activation of a series of pilot courses, thus focusing on content production and experimentation. Their online availability will be possible also thanks to the ELViRA network architecture, designed and structured according to security and stability requirements that prove fundamental in guaranteeing the continuity of the target e-learning services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Code Application for Web-Based Remote Measurements

    Publication Year: 2006 , Page(s): 13
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    An application based on open source resources was developed to allow remote operation of test instruments over the web. The application was deployed using Linux, Java and CamServ and shows a potential use as a didactic tool and also in laboratories dealing with different types of test instruments. The tool is an alternative to commercial applications used with the same purposes. Specification and development issues are described, as well testing and validation schemes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and data protection in technology-enhanced professional learning

    Publication Year: 2006 , Page(s): 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (144 KB) |  | HTML iconHTML  

    Privacy provision and data protection are basic requirements for professional learning, especially when personalized systems are used that adapt to sensitive learner personal data. In this paper we discuss important topics that need to be investigated before technology-enhanced professional learning is introduced in corporate settings. Although the paper is focused on privacy and personal data protection, specific issues such as digital rights management are also briefly described. As an example of introducing privacy-enhancing technologies into learning environments we give a Smart Space for Learning that has been developed in the context of the ELENA1 project. Future research issues related to privacy and data protection in professional learning, one of the topics of the PROLEARN network of excellence in professional learning, are presented as well. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an agent-based Approach for Service Emergence in Pervasive Computing

    Publication Year: 2006 , Page(s): 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    Pervasive computing is a new paradigm with a goal to provide computing and communication services all the time and everywhere. In this paper, a service emergence model for the implementation of pervasive computing applications is presented. Inspired by natural immune system concepts, the model allows the emergence of ad hoc services on the fly according to dynamically changing context environments such as computing context and user context. In this model, ad hoc or composite services are represented by an organization or group of autonomous agents. Agents establish relationships based on affinities to form groups of agents to provide the composite services. Affinities are parameters that represent priorities between agents. They help to distinguish between agents that can satisfy certain conditions or criteria. Affinity adjustments are based on two level of satisfaction. The first level is a local satisfaction depending on available services offered by neighboring agents together with respect to dynamic changes in network resources. The second level is a global satisfaction determined by the user satisfaction regarding the end service provided. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of One-Way Transit Time in IP Routers

    Publication Year: 2006 , Page(s): 16
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1904 KB) |  | HTML iconHTML  

    A novel measurement system is reported for delay measurements in IP routers, which follows specifications of the IETF RFC 2679. The system employs both passive measurements and active probing and offers the possibility to measure and analyze the One-Way Transit Time (OWTT) in routers as well as different delay components of a router, e.g., packet processing delay, packet transmission time and queueing delay at the output link. The reported results are in the form of important summary statistics of the OWTT as well as the associated distributional properties. It is observed that OWTT has several component delays and the component delay distribution that is most dominant and heavy-tailed has a decisive influence on OWTT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Resource Dimensioning in Third Generation Networks

    Publication Year: 2006 , Page(s): 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    This paper considers optimization of resource dimensioning in data communication networks, with the aim to provide Quality of Service (QoS) while maximizing resource utilization. The concept of QoS is briefly reviewed. The Differentiated Services (DiffServ) environment is introduced. By means of simulations optimal Provisioning Factors were derived. For simulations the Markov Modulated Poisson Process (MMPP) model was used for UDP traffic, and the Multi-fractal Wavelet Model (MWM) for TCP traffic. These choices were based on network traffic phenomena like self-similarity, long range dependency and burstiness. A test bed was developed and the traffic models were used to simulate single class traffic and to derive optimal Provisioning Factors (PF) for bandwidth dimensioning for four traffic classes. These Provisioning Factors were evaluated in simulated multiclass traffic. Results conclude that 87% link bandwidth utilization can be achieved while complying with QoS parameters defined for the 4 concerned traffic classes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Absolute End-to-End QoS in Ad Hoc Networks

    Publication Year: 2006 , Page(s): 18
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (296 KB) |  | HTML iconHTML  

    In this paper we propose a new model for providing QoS guarantees to real time multimedia applications in mobile ad hoc networks. Our model assures equal delay for each packet at every hop in the path, and handles network congestion through the use of call admission control and congestion control mechanisms. The effectiveness of our proposed solution in meeting desired QoS differentiation at a specific node and from end-to-end are assessed by simulation using a queueing network model implemented in QNAP. The experiments results show that our proposed solution provides consistent proportional differentiation for any service class and validates our claim even under bursty traffic and fading channel conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Network and Data Link Layer Infrastructure Design to Improve QoS for Real Time Collaborative Systems

    Publication Year: 2006 , Page(s): 19
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (360 KB) |  | HTML iconHTML  

    Currently, there are a lot of e-learning and collaborative platforms to support distance and collaborative learning, however, all of them were designed without considering the network infrastructure below. Under these circumstances when the platform is installed and runs in a campus, sometimes it has very poor performance. This paper presents a network and data link layer infrastructure design that classifies and prioritizes the voice and video traffic in order to improve the performance of the collaborative system applications. This infrastructure has been designed taking in consideration a typical network of a university campus, so that in this way it can be implemented in any campus. After making the design we have made some tests in a laboratory network demonstrating that our design improves 70- 130% the performance of these real time collaborative systems which transmit voice and video. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deterministic and Probabilistic QoS Guarantees in a Bluetooth Piconet with 1-RR/FIFO Scheduling

    Publication Year: 2006 , Page(s): 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (296 KB) |  | HTML iconHTML  

    In this paper, we focus on the ability of Bluetooth to support Quality of Service (QoS) requirements expressed by QoS sensitive applications. We focus on the quantitative QoS guarantee that can be granted to an uplink or downlink flow in terms of end-to-end delay. Two approaches are presented. The deterministic one is based on a worst case analysis and leads to a deterministic bound which is unfrequently reached. The probabilistic approach, based on the probability density function of the response time, is then introduced to evaluate the probability of missing a given deadline. This study shows that delays much smaller than the deterministic bound can be guaranteed with probabilities close to one. An admission control derived from these results is then proposed, providing a probabilistic QoS guarantee to uplink or downlink flows in a Bluetooth piconet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blocking Probability Calculation in Virtual Circuit Switching Node with Finite Source Population and Multicast Connections

    Publication Year: 2006 , Page(s): 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (208 KB) |  | HTML iconHTML  

    This paper presents a new approximate recurrent calculation method of the blocking probability in a switching node of virtual circuit networks which is offered a mixture of different traffic streams, including multicast traffic streams, generated by a finite population of two-state sources. The method is based on transforming a multi-dimensional service process in the system into a one-dimensional Markov chain. The basis of the proposed calculation algorithm is an assumption about equality of reverse transition rates in both infinite and finite population models. Such an assumption allows us to determine the number of idle sources of particular traffic classes, which consequently leads to determination of offered traffic load in particular states of the group occupancy. Analytical results of the blocking probabilities in exemplary switching nodes are compared with simulation results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Schema Congestion Control to Promote Fairness in the Internet Traffic

    Publication Year: 2006 , Page(s): 22
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    This paper describes and evaluates a new schema to reduce the network congestion and the unfair bandwidth allocation for competing flows. These two problems can be caused by unresponsive flows or not TCP-friendly flows. Unresponsive flows don’t have their rate transmission regulated by the network congestion, like an UDP flow. A not TCP-friendly flow is, for example, a TCP flow with small roundtrip time (RTT). These flows can consume a large part of the network bandwidth, resulting in a degradation of the network performance. This new schema uses the TCP behavior to estimate the packet drop probability of each flow, decreasing the problem of unfair share of network bandwidth among TCP flows with different RTTs. As for UDP flows, which consume a large bandwidth, the algorithm will drop packets before entering to the network. One of the advantages of this new schema is to decrease the number of drop packets inside the network. Another advantage is to fairly regulate the bandwidth share among the flows. And the last advantage is to improve the link utilization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Protection Using Traffic Grooming Techniques

    Publication Year: 2006 , Page(s): 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (160 KB) |  | HTML iconHTML  

    We propose using traffic grooming for backup, instead of doing grooming on working lightpaths, so that resources are used efficiently while fast recovery and good scaling is maintained. Throughput and grooming port cost are analysed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.