Community Health Information Tracking System using Short Message Service (chitSMS) is an extension of CHITS which is a system that stores health records of patients in the barangay. Another project incorporated a mobi...
详细信息
This paper contains a summary of a significant amount of findings carried out collectively by a global research community specifically aimed at determining mutually beneficial and hot topics for international collabor...
详细信息
This paper contains a summary of a significant amount of findings carried out collectively by a global research community specifically aimed at determining mutually beneficial and hot topics for international collaboration on the research and development of Trustworthy ICT. The paper highlights a sampling of these topics that were deemed to produce the most impact and it provides an introduction to the final recommendations of the INCO-Trust project, which was the main catalyst behind this initiative. The paper doesn't cover the extensive platforms, mechanisms, and systematic consensus building process in working groups based on workshops organised by the project to achieve its goals but instead focuses on the outcomes of the project. The key recommendations of the project will be used as a starting point for the recently start BIC project, whose objective is to include a number of new countries (Brazil, India and South Africa) into this already formed global community of ICT Trust and security researchers.
To manage and monitor their networks in a proper way, network operators are often interested in identifying the applications generating the traffic traveling through their networks, and doing it as fast (i.e., from as...
详细信息
To manage and monitor their networks in a proper way, network operators are often interested in identifying the applications generating the traffic traveling through their networks, and doing it as fast (i.e., from as few packets) as possible. State-of-the-art packet-based traffic classification methods are either based on the costly inspection of the payload of several packets of each flow or on basic flow statistics that do not take into account the packet content. In this paper we consider the intermediate approach of analyzing only the first few bytes of the first (or first few) packets of each flow. We propose automatic, machine-learning-based methods achieving remarkably good early classification performance on real traffic traces generated from a diverse set of applications (including several versions of P2P TV and file sharing), while requiring only limited computational and memory resources.
P2P systems can benefit from reputation mechanisms to promote cooperation and help peers to identify good service providers. However, in spite of a large number of proposed reputation mechanisms, few have been investi...
详细信息
Random scale-free overlay topologies provide a number of properties like for example high resilience against failures of random nodes, small (average) diameter as well as good expansion and congestion characteristics ...
详细信息
The article discusses issues related to the editorial board of the journal, including the outcome of the open meeting held by the board at the Institute of Electrical and Electronics Engineers (IEEE) International Par...
详细信息
The article discusses issues related to the editorial board of the journal, including the outcome of the open meeting held by the board at the Institute of Electrical and Electronics Engineers (IEEE) International Parallel and distributed Processing Symposium (IPDPS) in April 2010.
LEDBAT is a new congestion control algorithm which was proposed in an IETF draft in March 2009. LEDBAT's goal is to provide a less-than-best-effort data transport service, i.e. a LEDBAT flow should back-off in the...
详细信息
ISBN:
(纸本)9781424467259
LEDBAT is a new congestion control algorithm which was proposed in an IETF draft in March 2009. LEDBAT's goal is to provide a less-than-best-effort data transport service, i.e. a LEDBAT flow should back-off in the presence of other competing flows (TCP flows in particular). Because of its intended friendliness to competing flows, LEDBAT has already been implemented in the popular Bittorrent client uTorrent. In this paper we present performance evaluation results for our Python implementation of LEDBAT. We ran tests both in emulated networks as well as in real world networks. One of the tests involved approximately 300 volunteers spread throughout the world.
In the domain of network security, packet filtering for classification purposes is of significant interest. Packet classification provides a mechanism for understanding the composition of packet streams arriving at di...
详细信息
In this paper, we propose a taxonomy that characterizes and classifies different components of autonomic application management in Grids. We also survey several representative Grid systems developed by various project...
详细信息
An important step towards seamless heterogeneous systems is the integration between WLAN and 3G cellular systems. Their interoperability has been frequently discussed in literature, however, there is still room for re...
详细信息
暂无评论