14 research outputs found

    Distributed admission control for QoS and SLS management

    Get PDF
    This article proposes a distributed admission control (AC) model based on on-line monitoring to manage the quality of Internet services and Service Level Specifications (SLSs) in class-based networks. The AC strategy covers intra- and interdomain operation, without adding significant complexity to the network control plane and involving only edge nodes. While ingress nodes perform implicit or explicit AC resorting to service-oriented rules for SLS and QoS parameters control, egress nodes collect service metrics providing them as inputs for AC. The end-to-end operation is viewed as a cumulative and repetitive process of AC and available service computation.We discuss crucial key points of the model implementation and evaluate its two main components: themonitoring process and the AC criteria. The results show that, using proper AC rules and safety margins, service commitments can be efficiently satisfied, and the simplicity and flexibility of the model can be explored to manage successfully QoS requirements of multiple Internet services.(undefined

    Online Expert System for forming Project Team

    Get PDF
    This report was about the research on how the information and communication technologies (ICT) and the development of tools can help students in higher education [earn through communication and collaboration with other learners. The objective of the study was to assist IT/IS students in forming a project team according to their roles and sroficiency based on their interest in order to match students ability with the skills needed n a project team. This report provides some theories which are related to the set of skills md guidelines on how to build a project team as well as other requirements in forming a :eam. By providing example of relevant subjects, it helps to create better view in onderstanding project team needs. Other than that, this report also includes a sample of nerely similar project done by other university but with different approach. These findings can be adapted in the implementation phase ofthis project. \n online expert system such as this particular system is the alternative method in lelping students to form a better project team. All of these findings were found through inline research, decision support system book as well as from the information resource ;enter. The results and discussion shows the effectiveness of both methods which are the ;onventional system and the online expert system. In conclusion, identifying students' ;apabilities and interest is important so that the selection of team members can be done smoothly and accurately. However, without a well-defined set of skills for each team nember's roles, the selection may be difficult and the results may not be as encouraging is people always expected a project team to be. Best selection of team members makes ?est productivity from the team as well. Furthermore with the combination of other ;lements such as responsibility, commitment, proficiency and so on will help in gaining ;eam trust and lead towards team effectiveness. i

    Re-new - IMAC 2011 Proceedings

    Get PDF

    (re)new configurations:Beyond the HCI/Art Challenge: Curating re-new 2011

    Get PDF

    Wissenschaftlich-Technischer Jahresbericht 1992

    Get PDF

    Analysis of Windows memory for forensic investigations

    Get PDF
    Containing most recently accessed data and information about the status of a computer system, physical memory is one of the best sources of digital evidence. This thesis presents new methods to analyze Windows physical memory of compromised computers for cyber forensics. The thesis includes three distinct contributions to cyber forensics investigation. Firstly, by digging into details of Windows memory management, forensically important information and data structures are identified. Secondly, we proposed different methods to find files and extract them out of memory in order to rebuild executable and data files. This helps investigators obtain valuable information available in executable or data files that have been in use at incident time. Thirdly, we presented two methods for extraction of forensically sensitive information such as usernames or passwords from memory. The first method is based on fingerprints of applications in memory. In the second method, we have been able to locate and extract arguments used in function calls. This method, leads to the acquisition of important and forensically sensitive information from the memory stack. Finally, to bring these contributions to application level, a framework for cyber forensics investigations has been developed that helps finding sensitive informatio

    Software Engineering Laboratory Series: Proceedings of the Twenty-Second Annual Software Engineering Workshop

    Get PDF
    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document

    Proceedings of the Air Transportation Management Workshop

    Get PDF
    The Air Transportation Management (ATM) Workshop was held 31 Jan. - 1 Feb. 1995 at NASA Ames Research Center. The purpose of the workshop was to develop an initial understanding of user concerns and requirements for future ATM capabilities and to initiate discussions of alternative means and technologies for achieving more effective ATM capabilities. The topics for the sessions were as follows: viewpoints of future ATM capabilities, user requirements, lessons learned, and technologies for ATM. In addition, two panel sessions discussed priorities for ATM, and potential contributions of NASA to ATM. The proceedings contain transcriptions of all sessions
    corecore