By Topic

2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06)

Date 1-3 Aug. 2006

Filter Results

Displaying Results 1 - 25 of 74
  • International Multi-Conference on Computing in the Global Information Technology - Cover

    Publication Year: 2006, Page(s): c1
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (589 KB)
    Freely Available from IEEE
  • International Multi-Conference on Computing in the Global Information Technology - Title

    Publication Year: 2006, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (589 KB)
    Freely Available from IEEE
  • International Multi-Conference on Computing in the Global Information Technology - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • International Multi-Conference on Computing in the Global Information Technology - Table of content

    Publication Year: 2006, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • ICCGI Committees

    Publication Year: 2006, Page(s):xiii - xx
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s):xxi - xxviii
    Request permission for commercial reuse | PDF file iconPDF (57 KB) | HTML iconHTML
    Freely Available from IEEE
  • 6TO4 versus TUNNELBROKERS

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Transition mechanisms are a continuous topic/subset of IPv6 work at a global level. There is a big diversity of mechanisms; however this document is focusing mainly on two of them. It shows the positive usage of one of them and stresses reasons why the other should not be a priori nor used at a wide scale View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SHISA: The IPv6 Mobility Framework for BSD Operating Systems

    Publication Year: 2006, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Mobile IPv6 and network mobility basic support (NEMO BS) are the IETF standard mobility protocols for IPv6. When we consider the deployment of a new protocol, it is well understood that the existence of a free protocol implementation, which can be used as a reference implementation for both research and operation, plays important roles. SHISA is a free implementation of Mobile IPv6 and NEMO BS pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing and Verifying an IPv6 Based Multicast Network

    Publication Year: 2006, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Today we are witnessing the widespread introduction of the triple play service. The main television broadcasting companies start, or plan to start, their IPTV services. The current data network infrastructure and the unicast communication paradigm are not effective for providing such services. The multicast data communication paradigm is as old as the World Wide Web but, even so, it has no wide ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of IPv6 Multicast Deployment in MPLS Netw

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB) | HTML iconHTML

    Multi Protocol Label Switching (MPLS) [1] has been widely deployed in both service provider and enterprise networks alike. The main drivers for deploying an MPLS based forwarding mechanism for IPv4 include Layer 2 [2] and Layer 3 [3] Virtual Private Networks, and Traffic Engineering [4] and Fast Reroute [5]. The protocol transparency of MPLS infrastructures can also be leveraged, with minimal core... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPv6 as a Practical Solution to Network Management Challenges

    Publication Year: 2006, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1245 KB) | HTML iconHTML

    Over the paste decade, IPv6 community's efforts to promote the next generation of the IP protocol revolved around generating business models that would justify the migration costs. The context, a depleting global address pool, and the target, global services, missed on one interesting opportunity for IPv6. Larger IP Service Provider and Enterprise networks are running out of IPv4 resources to mana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bulk Transfer Capacity Estimation in IPv6 Networks

    Publication Year: 2006, Page(s): 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Bulk transfer capacity (BTC) is a measure of the sustainable data throughput on a network path that is subject to congestion control algorithms, such as those used by the transmission control protocol (TCP). BTC is an important network performance metric because the vast majority of all traffic, typically around 95% of all packets, is conveyed by TCP. The performance of many Internet-based service... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Industrial Control Communication Framework on an IPv6 Infrastructure

    Publication Year: 2006, Page(s): 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    In the distributed industrial control area activities are concentrated around two main directions that are sometimes conflicting: the development of communication tools in order to satisfy specific requirements from industrial control field and the use of the general purpose communication protocols for distributed control applications. We studied the possibilities of using the QoS features of IPv6... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Monitoring Approach for Safe IPv6 Renumbering

    Publication Year: 2006, Page(s): 8
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Network renumbering is a very interesting feature of IPv6. It is also one of the most risky procedures which need special attention in the management plane. In this paper we identify the challenges of renumbering and demonstrate how monitoring can improve this process. We also present an implementation of a monitoring framework and share the experience gained in its deployment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determinants of IP Version 6 Adoption

    Publication Year: 2006, Page(s): 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    The implementation of a new Internet standard such as IPv6 depends on the usefulness of the technology to the adopting organizations and the environment in which they operate. The adoption of IPv6 in Korea is mostly driven by a governmental strategy that created high network externalities and developed related technologies. However, the speed of adoption is hindered due to lack of information and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach for the Administration and Security of IPv6 Transition Mechanisms: An SNMP MIB for 6to4

    Publication Year: 2006, Page(s): 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (130 KB) | HTML iconHTML

    A number of transitional mechanisms are being offered to allow the gradual adoption of IPv6 and prolong the useful operating time of legacy systems and applications. The transition mechanisms perform conversions between versions 4 and 6 of the IP protocol, offer tunnelling functionality and act as connection points between isolated (in the sense of IP versioning) network segments. In this paper we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-Attribute Decision Making E-Course

    Publication Year: 2006, Page(s): 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    The "Education and Training 2010" European Work Program (http://europa.eu.int/comm/education/policies/2010/et_2010_en.html) has a strong support in Romania. The leaders of the National Excellency Research Program encourage the e-learning domain and so a complex project named, Excellency Level Tools for Multi-Attribute Decision Making Field's Promotion" has been granted. Pertaining to this project,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eye Location under Various Illumination Conditions

    Publication Year: 2006, Page(s): 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    Eye location is an important step in face recognition. Locate eyes under various illumination conditions is also an important step especially for most of illumination normalization algorithms. In this paper, an algorithm uses a group of eigenfeature templates and Gabor feature templates to locate eye under various illumination conditions is proposed. Experiment results show that the performance of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The state of e-Government and e-Participation in European Regions

    Publication Year: 2006, Page(s): 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    The aims of this work is to assess how well prepared are European administrations to take full advantage of e-government and e-participation services, and to assess how much are currently benefiting European administrations from e-government and e-participation services. The methodology stems from that used by the United Nations. Specifically, we have built indices to measure e-government readines... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using mixed VR/AR technologies in education

    Publication Year: 2006, Page(s): 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    In this paper, we describe an ongoing project dedicated to kindergarten children. By invoking a narrative context, we propose to children an AR-based virtual environment within which they are expecting to learn by playing each other, as they are doing in a real context. The proposed subjects for the educational contexts are selected by the teacher, and the children are let to improvise in order to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-Based Image Query on Color Feature in the Image Databases Obtained from DICOM Files

    Publication Year: 2006, Page(s): 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    The paper presents a qualitative study of the content-based image query process over the image databases resulting from the standard DICOM files produced by the medical devices used in the diagnosis process. There were implemented and studied several methods of transformation and quantization of the color space (HSV quantized at 166 colors, RGB quantized at 64 colors and CIE-LUV quantized at 512 c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Numerical computation and approximation of the locations and amplitudes of the extrema of (sin^2x)/x

    Publication Year: 2006, Page(s): 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Expressions of the form (sin2x)/x may occur in engineering problems, for instance in signal processing or communications. In this paper, we show that the locations and the amplitudes of the extrema of this function, when expressed under the form of series expansions, can be fastly calculated through recursion formulae. Moreover, very simple accurate algebraic expressions can be derived ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Communication Genre for searching with Small Display Devices

    Publication Year: 2006, Page(s): 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    The problem of searching the Web by using small devices such as PDAs is the subject of great this paper. We present here a solution based in the assumption that use of communication genre may contribute to the reduction of processing and memory burden. Communication genre may also contribute to ease the access to information. It is in this context that we analysed in what extent communication genr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delivery Context Access for Mobile Browsing

    Publication Year: 2006, Page(s): 18
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    The usage of context data to facilitate adaptive applications is gaining widespread prominence. We describe an architecture for adaptive Web applications specially suited for mobile devices. This approach is based on an ongoing standardization effort within World Wide Web Consortium (W3C) for client side device context access. The specification, delivery context: interfaces (DCI) is intended to be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peer-to-Peer Platform for Anytime /Anywhere Connectivity in Educational Environments

    Publication Year: 2006, Page(s): 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Institutions are becoming wireless and most of the population are possessing wireless devices since they are becoming less expensive. Providing advanced services such as context aware applications where the personal devices adapt its behavior to the changing environment is challenging. In this paper we propose a P2P platform for a campus environment View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.