14 research outputs found
Distributed admission control for QoS and SLS management
This article proposes a distributed admission control (AC) model based on on-line monitoring to manage the quality of Internet services and Service Level Specifications (SLSs) in class-based networks. The AC strategy covers intra- and interdomain operation, without adding significant complexity to the network control plane and involving only edge nodes. While ingress nodes perform implicit or explicit AC resorting to service-oriented rules for SLS and QoS parameters control, egress nodes collect service metrics providing them as inputs for AC. The end-to-end operation is viewed as a cumulative and repetitive process of AC and available service computation.We discuss crucial key points of the model implementation and evaluate its two main components: themonitoring process and the AC criteria. The results show that, using proper AC rules and safety margins, service commitments can be efficiently satisfied, and the simplicity and flexibility of the model can be explored to manage successfully QoS requirements of multiple Internet services.(undefined
Online Expert System for forming Project Team
This report was about the research on how the information and communication
technologies (ICT) and the development of tools can help students in higher education
[earn through communication and collaboration with other learners. The objective of the
study was to assist IT/IS students in forming a project team according to their roles and
sroficiency based on their interest in order to match students ability with the skills needed
n a project team. This report provides some theories which are related to the set of skills
md guidelines on how to build a project team as well as other requirements in forming a
:eam. By providing example of relevant subjects, it helps to create better view in
onderstanding project team needs. Other than that, this report also includes a sample of
nerely similar project done by other university but with different approach. These
findings can be adapted in the implementation phase ofthis project.
\n online expert system such as this particular system is the alternative method in
lelping students to form a better project team. All of these findings were found through
inline research, decision support system book as well as from the information resource
;enter. The results and discussion shows the effectiveness of both methods which are the
;onventional system and the online expert system. In conclusion, identifying students'
;apabilities and interest is important so that the selection of team members can be done
smoothly and accurately. However, without a well-defined set of skills for each team
nember's roles, the selection may be difficult and the results may not be as encouraging
is people always expected a project team to be. Best selection of team members makes
?est productivity from the team as well. Furthermore with the combination of other
;lements such as responsibility, commitment, proficiency and so on will help in gaining
;eam trust and lead towards team effectiveness.
i
Analysis of Windows memory for forensic investigations
Containing most recently accessed data and information about the status of a computer system, physical memory is one of the best sources of digital evidence. This thesis presents new methods to analyze Windows physical memory of compromised computers for cyber forensics. The thesis includes three distinct contributions to cyber forensics investigation. Firstly, by digging into details of Windows memory management, forensically important information and data structures are identified. Secondly, we proposed different methods to find files and extract them out of memory in order to rebuild executable and data files. This helps investigators obtain valuable information available in executable or data files that have been in use at incident time. Thirdly, we presented two methods for extraction of forensically sensitive information such as usernames or passwords from memory. The first method is based on fingerprints of applications in memory. In the second method, we have been able to locate and extract arguments used in function calls. This method, leads to the acquisition of important and forensically sensitive information from the memory stack. Finally, to bring these contributions to application level, a framework for cyber forensics investigations has been developed that helps finding sensitive informatio
Software Engineering Laboratory Series: Proceedings of the Twenty-Second Annual Software Engineering Workshop
The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document
Proceedings of the Air Transportation Management Workshop
The Air Transportation Management (ATM) Workshop was held 31 Jan. - 1 Feb. 1995 at NASA Ames Research Center. The purpose of the workshop was to develop an initial understanding of user concerns and requirements for future ATM capabilities and to initiate discussions of alternative means and technologies for achieving more effective ATM capabilities. The topics for the sessions were as follows: viewpoints of future ATM capabilities, user requirements, lessons learned, and technologies for ATM. In addition, two panel sessions discussed priorities for ATM, and potential contributions of NASA to ATM. The proceedings contain transcriptions of all sessions