scholarly journals Interest Aware Consistency for Cooperative Editing in Heterogeneous Environments

2014 ◽  
Vol 23 (01) ◽  
pp. 1440002 ◽  
Author(s):  
André Pessoa Negrão ◽  
João Costa ◽  
Paulo Ferreira ◽  
Luís Veiga

Cooperative editing applications enable geographically distributed users to concurrently edit a shared document space over a computer network. These applications present several technical challenges related to the scalability of the system and the promptness with which relevant updates are disseminated to the concerned users. This paper presents Cooperative Semantic Locality Awareness (CoopSLA), a consistency model for cooperative editing applications that is scalable and efficient with regards to user needs. In CoopSLA, updates to different parts of the document have different priorities, depending on the relative interest of the user in the region in which the update is performed; updates that are considered relevant are sent to the user promptly, while less important updates are postponed. As a result, the system makes a more intelligent usage of the network resources, since (1) it saves bandwidth by merging postponed updates and (2) it issues fewer accesses to the network resources as a result of both update merging and message aggregation. We have implemented a collaborative version of the open source Tex editor TexMaker using the CoopSLA approach. We present evaluation results that support our claim that CoopSLA is very effective regarding network usage while fulfilling user needs (e.g. ensuring that relevant updates are disseminated in time).

Game Theory ◽  
2017 ◽  
pp. 383-399
Author(s):  
Sungwook Kim

Computer network bandwidth can be viewed as a limited resource. The users on the network compete for that resource. Their competition can be simulated using game theory models. No centralized regulation of network usage is possible because of the diverse ownership of network resources. Therefore, the problem is of ensuring the fair sharing of network resources. If a centralized system could be developed which would govern the use of the shared resources, each user would get an assigned network usage time or bandwidth, thereby limiting each person's usage of network resources to his or her fair share. As of yet, however, such a system remains an impossibility, making the situation of sharing network resources a competitive game between the users of the network and decreasing everyone's utility. This chapter explores this competitive game.


Computer network bandwidth can be viewed as a limited resource. The users on the network compete for that resource. Their competition can be simulated using game theory models. No centralized regulation of network usage is possible because of the diverse ownership of network resources. Therefore, the problem is of ensuring the fair sharing of network resources. If a centralized system could be developed which would govern the use of the shared resources, each user would get an assigned network usage time or bandwidth, thereby limiting each person's usage of network resources to his or her fair share. As of yet, however, such a system remains an impossibility, making the situation of sharing network resources a competitive game between the users of the network and decreasing everyone's utility. This chapter explores this competitive game.


2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


Author(s):  
Jo-Mae B. Maris

Cross-discipline research requires researchers to understand many concepts outside their own discipline. Computing has increased in our everyday lives to the point that “ubiquitous computing” has become an entry in the Wikipedia (Wikepedia). Research is no different. Researchers outside of computer networkrelated disciplines must account for the effects of network-based information systems on their research. This article presents a model to aid researchers with the tasks of properly identifying the elements and effects of a network-based information system within their studies. The complexity associated with network-based information systems may be seen by considering a study involving the effectiveness of an Enterprise Resource Planning (ERP) system on a mid-sized company. A study becomes muddled when it fails to recognize the differences between the myriad of people, procedures, data, software, and hardware involved in the development, implementation, security, use, and support of an ERP system. If a researcher confuses network security with ERP configuration limitations, then two important aspects of the information system are obscured. Networks limit access to network resources so that only authorized users have access to their data. ERP applications allow an organization to restrict access to data to safeguard the data (Colt & Yang, 2004). Both aspects relate to the availability of data, but they come from different parts of the system. The two aspects should not be addressed as if both are attributable to the same source. Misidentifying network-based information system elements reflects negatively upon the legitimacy of an entire study.


2010 ◽  
pp. 364-370
Author(s):  
Luis Camarinha-Matos ◽  
Hamideh Afsarmanesh

A collaborative network (CN) is an alliance constituted by a variety of entities (e.g., organizations and people) that are largely autonomous, geographically distributed, and heterogeneous in terms of their operating environment, culture, social capital, and goals but that collaborate to better achieve common or compatible goals, and whose interactions are supported by computer network. Some authors see the roots of this paradigm in early works of economists like Oliver Williamson in the 1970s. Along his vast work, Williamson established the study of transaction cost economics (Williamson, 1975) and defended that manufacturing firms should make much greater use of externally purchased goods and services, rather than those internally supplied. These ideas had a more evident impact with the booming of the “outsourcing” wave in the 1980s. Outsourcing became very attractive when managers had to reduce the organization overheads and eliminate the internal inefficient services, the so called lean organization, as it transfers the problem to the outside, namely to other efficient service providers. In this line of developments, the idea of virtual enterprise/virtual organization was not “invented” by a single researcher but rather it is a concept that has matured through a long evolution process. Some of the early references first introducing the terms like virtual company, virtual enterprise, or virtual corporation go back to the early 1990s, including the work of Jan Hopland, Nagel and Dove, and Davidow and Malone (Davidow & Malone, 1992; Introna, More, & Cushman, 1999; Walton & Whicker, 1996). Since then, a large but disjoint body of literature has been produced mainly in two communities: the information and communications technology (ICT) community and the management community.


2013 ◽  
Vol 9 (2) ◽  
pp. 48-57
Author(s):  
Jassim Abdul-Jabbar ◽  
Omar Hazim

In this paper, a modified wavelet neural network (WNN) (or wavenet)-based predictor is introduced to predict link status (congestion with load indication) of each link in the computer network. On the contrary of previous wavenet-based predictors, the proposed modified wavenet-based link state predictor (MWBLSP) generates two indicating outputs for congestion and load status of each link based on the premeasured power burden (square values) of utilization on each link in the previous time intervals. Fortunately, WNNs possess all learning and generalization capabilities of traditional neural networks. In addition, the ability of such WNNs are efficiently enhanced by the local characteristics of wavelet functions to deal with sudden changes and burst network load. The use of power burden utilization at the predictor input supports some non-linear distributions of the predicted values in a more efficient manner. The proposed MWBLSP predictor can be used in the context of active congestion control and link load balancing techniques to improve the performance of all links in the network with best utilization of network resources.


2018 ◽  
Vol 10 (2) ◽  
pp. 58-74 ◽  
Author(s):  
Kavita Sharma ◽  
B. B. Gupta

This article describes how in the summer of 1999, the Computer Incident Advisory Capability first reported about Distributed Denial of Service (DDoS) attack incidents and the nature of Denial of Service (DoS) attacks in a distributed environment that eliminates the availability of resources or data on a computer network. DDoS attack exhausts the network resources and disturbs the legitimate user. This article provides an explanation on DDoS attacks and nature of these attacks against Smartphones and Wi-Fi Technology and presents a taxonomy of various defense mechanisms. The smartphone is chosen for this study, as they have now become a necessity rather than a luxury item for the common people.


2008 ◽  
pp. 1562-1579
Author(s):  
Ronald C. Dodge Jr. ◽  
Daniel Ragsdale

When competent computer network system administrators are faced with malicious activity on their networks, they think of the problem in terms of four distinct but related activities: detection, prevention, mitigation, and response. The greatest challenge of these four phases is detection. Typically, detection comes in the form of intrusion detection system (IDS) alerts and automated application and log monitors. These however are fraught with mischaracterized alerts that leave administrators looking for a needle in a haystack. One of the most promising emerging security tools is the honeynet Honeynets are designed to divert the malicious user or attacker to non-production systems that are carefully monitored and configured to allow detailed analysis of the attackers’ actions and also protection of other network resources. Honeynets can be configured in many different ways and implemented from a full DMZ to a carefully placed file that is monitored for access.


Author(s):  
Luis M. Camarinha-Matos ◽  
Hamideh Afsarmanes

A collaborative network (CN) is an alliance constituted by a variety of entities (e.g., organizations and people) that are largely autonomous, geographically distributed, and heterogeneous in terms of their operating environment, culture, social capital, and goals but that collaborate to better achieve common or compatible goals, and whose interactions are supported by computer network. Some authors see the roots of this paradigm in early works of economists like Oliver Williamson in the 1970s. Along his vast work, Williamson established the study of transaction cost economics (Williamson, 1975) and defended that manufacturing firms should make much greater use of externally purchased goods and services, rather than those internally supplied. These ideas had a more evident impact with the booming of the “outsourcing” wave in the 1980s. Outsourcing became very attractive when managers had to reduce the organization overheads and eliminate the internal inefficient services, the so called lean organization, as it transfers the problem to the outside, namely to other efficient service providers. In this line of developments, the idea of virtual enterprise/virtual organization was not “invented” by a single researcher but rather it is a concept that has matured through a long evolution process. Some of the early references first introducing the terms like virtual company, virtual enterprise, or virtual corporation go back to the early 1990s, including the work of Jan Hopland, Nagel and Dove, and Davidow and Malone (Davidow & Malone, 1992; Introna, More, & Cushman, 1999; Walton & Whicker, 1996). Since then, a large but disjoint body of literature has been produced mainly in two communities: the information and communications technology (ICT) community and the management community.


Author(s):  
Ronald C. Dodge Jr. ◽  
Daniel Ragsdale

When competent computer network system administrators are faced with malicious activity on their networks, they think of the problem in terms of four distinct but related activities: detection, prevention, mitigation, and response. The greatest challenge of these four phases is detection. Typically, detection comes in the form of intrusion detection system (IDS) alerts and automated application and log monitors. These however are fraught with mischaracterized alerts that leave administrators looking for a needle in a haystack. One of the most promising emerging security tools is the honeynet Honeynets are designed to divert the malicious user or attacker to non-production systems that are carefully monitored and configured to allow detailed analysis of the attackers’ actions and also protection of other network resources. Honeynets can be configured in many different ways and implemented from a full DMZ to a carefully placed file that is monitored for access.


Sign in / Sign up

Export Citation Format

Share Document