Selected Papers from ITA 11

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (15 December 2011) | Viewed by 68882

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computing, Wrexham Glyndŵr University, Plas Coch Campus, Mold Road, Wrexham LL11 2AW, UK
Interests: futurology; AI; big data; IoT; automation; technology ethics
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Art, Science and Technology, Wrexham Glyndŵr University, Wrexham LL11 2AW, UK
Interests: human–computer interaction and usability evaluation; assistive technologies especially for older people; applied robotics and how they can benefit society; health informatics and technologies; software engineering; research methodology
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This special issue publishes selected contributions from the ITA 11 conference http://www.ita11.org/ . The scope of ITA 11 was wide and drew together researchers and developers across all fields of Internet computing and engineering.  The purpose of this special issue is to publish extended versions of the best ITA 11 papers.  Such papers will be expected to make significant contributions to key areas on the broad spectrum from Internet technologies to Internet applications.
Suitable topics include, but are by no means limited to:

  • Accessibility and usability
  • Agents
  • AI/Expert systems
  • Collaborative decision systems
  • Congestion control
  • Data-mining
  • Distributed systems
  • e-Business/e-Commerce
  • e-Learning/e-Society
  • Ethical, social and legal issues
  • Filtering
  • HCI
  • Integration
  • Internet applications
  • Internet languages
  • Internet technologies
  • Mobile computing
  • Multimedia
  • Music and audio
  • Network algorithms
  • Network architectures
  • Network management
  • Network optimization
  • Network performance
  • Protocols and standards
  • Routing
  • Routing aggregation
  • Routing performance
  • Scheduling
  • Security
  • Semantics
  • Services
  • Storage
  • Systems failure
  • Traffic
  • Ubiquitous computing
  • Visualization
  • Web hardware
  • Web software
  • Wireless networks

Prof. Dr. Vic Grout
Dr. Rich Picking
Guest Editors

Keywords

  • Accessibility and usability
  • Agents
  • AI/Expert systems
  • Collaborative decision systems
  • Congestion control
  • Data-mining
  • Distributed systems
  • e-Business/e-Commerce
  • e-Learning/e-Society
  • Ethical, social and legal issues
  • Filtering
  • HCI
  • Integration
  • Internet applications
  • Internet languages
  • Internet technologies
  • Mobile computing
  • Multimedia
  • Music and audio
  • Network algorithms
  • Network architectures
  • Network management
  • Network optimization
  • Network performance
  • Protocols and standards
  • Routing
  • Routing aggregation
  • Routing performance
  • Scheduling
  • Security
  • Semantics
  • Services
  • Storage
  • Systems failure
  • Traffic
  • Ubiquitous computing
  • Visualization
  • Web hardware
  • Web software
  • Wireless networks

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (7 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

230 KiB  
Article
Towards Content Neutrality in Wiki Systems
by Clemens H. Cap
Future Internet 2012, 4(4), 1086-1104; https://doi.org/10.3390/fi4041086 - 19 Dec 2012
Cited by 3 | Viewed by 8895
Abstract
The neutral point of view (NPOV) cornerstone of Wikipedia (WP) is challenged for next generation knowledge bases. A case is presented for content neutrality as a new, every point of view (EPOV) guiding principle. The architectural implications of content neutrality are discussed and [...] Read more.
The neutral point of view (NPOV) cornerstone of Wikipedia (WP) is challenged for next generation knowledge bases. A case is presented for content neutrality as a new, every point of view (EPOV) guiding principle. The architectural implications of content neutrality are discussed and translated into novel concepts of Wiki architectures. Guidelines for implementing this architecture are presented. Although NPOV is criticized, the contribution avoids ideological controversy and focuses on the benefits of the novel approach. Full article
(This article belongs to the Special Issue Selected Papers from ITA 11)
345 KiB  
Article
Traceability in Model-Based Testing
by Mathew George, Klaus-Peter Fischer-Hellmann, Martin Knahl, Udo Bleimann and Shirley Atkinson
Future Internet 2012, 4(4), 1026-1036; https://doi.org/10.3390/fi4041026 - 26 Nov 2012
Cited by 3 | Viewed by 7943
Abstract
The growing complexities of software and the demand for shorter time to market are two important challenges that face today’s IT industry. These challenges demand the increase of both productivity and quality of software. Model-based testing is a promising technique for meeting these [...] Read more.
The growing complexities of software and the demand for shorter time to market are two important challenges that face today’s IT industry. These challenges demand the increase of both productivity and quality of software. Model-based testing is a promising technique for meeting these challenges. Traceability modeling is a key issue and challenge in model-based testing. Relationships between the different models will help to navigate from one model to another, and trace back to the respective requirements and the design model when the test fails. In this paper, we present an approach for bridging the gaps between the different models in model-based testing. We propose relation definition markup language (RDML) for defining the relationships between models. Full article
(This article belongs to the Special Issue Selected Papers from ITA 11)
Show Figures

Figure 1

1873 KiB  
Article
Adaptive Measurement-Based Policy-Driven QoS Management with Fuzzy-Rule-based Resource Allocation
by Suleiman Y. Yerima, Gerard P. Parr, Sally I. McClean and Philip J. Morrow
Future Internet 2012, 4(3), 646-671; https://doi.org/10.3390/fi4030646 - 4 Jul 2012
Cited by 1 | Viewed by 8675
Abstract
Fixed and wireless networks are increasingly converging towards common connectivity with IP-based core networks. Providing effective end-to-end resource and QoS management in such complex heterogeneous converged network scenarios requires unified, adaptive and scalable solutions to integrate and co-ordinate diverse QoS mechanisms of different [...] Read more.
Fixed and wireless networks are increasingly converging towards common connectivity with IP-based core networks. Providing effective end-to-end resource and QoS management in such complex heterogeneous converged network scenarios requires unified, adaptive and scalable solutions to integrate and co-ordinate diverse QoS mechanisms of different access technologies with IP-based QoS. Policy-Based Network Management (PBNM) is one approach that could be employed to address this challenge. Hence, a policy-based framework for end-to-end QoS management in converged networks, CNQF (Converged Networks QoS Management Framework) has been proposed within our project. In this paper, the CNQF architecture, a Java implementation of its prototype and experimental validation of key elements are discussed. We then present a fuzzy-based CNQF resource management approach and study the performance of our implementation with real traffic flows on an experimental testbed. The results demonstrate the efficacy of our resource-adaptive approach for practical PBNM systems. Full article
(This article belongs to the Special Issue Selected Papers from ITA 11)
Show Figures

Figure 1

571 KiB  
Article
Principles of Eliminating Access Control Lists within a Domain
by John N. Davies, Paul Comerford and Vic Grout
Future Internet 2012, 4(2), 413-429; https://doi.org/10.3390/fi4020413 - 19 Apr 2012
Cited by 3 | Viewed by 9954
Abstract
The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay [...] Read more.
The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay associated with packet filtering. When Access Control Lists (ACLs) are used within a router for this purpose then a significant overhead is introduced associated with this process. It is likely that identical checks are made at multiple points within a domain prior to a packet reaching its destination. Therefore by eliminating ACLs within a domain by modifying the ingress/egress points with equivalent functionality an improvement in the overall performance can be obtained. This paper considers the effect of the delays when using router operating systems offering different levels of functionality. It considers factors which contribute to the delay particularly due to ACLs and by using theoretical principles modified by practical calculation a model is created. Additionally this paper provides an example of an optimized solution which reduces the delay through network routers by distributing the security rules to the ingress/egress points of the domain without affecting the security policy. Full article
(This article belongs to the Special Issue Selected Papers from ITA 11)
Show Figures

Figure 1

1211 KiB  
Article
A Semantically Automated Protocol Adapter for Mapping SOAP Web Services to RESTful HTTP Format to Enable the Web Infrastructure, Enhance Web Service Interoperability and Ease Web Service Migration
by Sean Kennedy, Owen Molloy, Robert Stewart, Paul Jacob, Maria Maleshkova and Frank Doheny
Future Internet 2012, 4(2), 372-395; https://doi.org/10.3390/fi4020372 - 11 Apr 2012
Cited by 1 | Viewed by 14488
Abstract
Semantic Web Services (SWS) are Web Service (WS) descriptions augmented with semantic information. SWS enable intelligent reasoning and automation in areas such as service discovery, composition, mediation, ranking and invocation. This paper applies SWS to a previous protocol adapter which, operating within clearly [...] Read more.
Semantic Web Services (SWS) are Web Service (WS) descriptions augmented with semantic information. SWS enable intelligent reasoning and automation in areas such as service discovery, composition, mediation, ranking and invocation. This paper applies SWS to a previous protocol adapter which, operating within clearly defined constraints, maps SOAP Web Services to RESTful HTTP format. However, in the previous adapter, the configuration element is manual and the latency implications are locally based. This paper applies SWS technologies to automate the configuration element and the latency tests are conducted in a more realistic Internet based setting. Full article
(This article belongs to the Special Issue Selected Papers from ITA 11)
Show Figures

Graphical abstract

340 KiB  
Article
Secure Military Social Networking and Rapid Sensemaking in Domain Specific Concept Systems: Research Issues and Future Solutions
by Debbie Garside, Arjun Ponnusamy, Steve Chan and Richard Picking
Future Internet 2012, 4(1), 253-264; https://doi.org/10.3390/fi4010253 - 12 Mar 2012
Cited by 1 | Viewed by 8834
Abstract
This paper identifies the need for a secure military social networking site and the underlying research issues linked to the successful development of such sites. The paper further proposes a solution to the most basic issues by identifying and tackling known potential security [...] Read more.
This paper identifies the need for a secure military social networking site and the underlying research issues linked to the successful development of such sites. The paper further proposes a solution to the most basic issues by identifying and tackling known potential security threats to military personnel and their families. The paper further defines the base platform for this development to facilitate rapid sensemaking to inform critical communications and rapid decision making processes during abrupt governance and eco-system change, and how the plethora of information (termed as Big Data) on social networking sites can be analysed and harnessed. Underlying architectural issues, efficiency and complexity are explored and their future development is considered. Full article
(This article belongs to the Special Issue Selected Papers from ITA 11)
Show Figures

Figure 1

268 KiB  
Article
Readability and the Web
by Ludger Martin and Thomas Gottron
Future Internet 2012, 4(1), 238-252; https://doi.org/10.3390/fi4010238 - 12 Mar 2012
Cited by 9 | Viewed by 9014
Abstract
Readability indices measure how easy or difficult it is to read and comprehend a text. In this paper we look at the relation between readability indices and web documents from two different perspectives. On the one hand we analyse how to reliably measure [...] Read more.
Readability indices measure how easy or difficult it is to read and comprehend a text. In this paper we look at the relation between readability indices and web documents from two different perspectives. On the one hand we analyse how to reliably measure the readability of web documents by applying content extraction techniques and incorporating a bias correction. On the other hand we investigate how web based corpus statistics can be used to measure readability in a novel and language independent way. Full article
(This article belongs to the Special Issue Selected Papers from ITA 11)
Show Figures

Figure 1

Back to TopTop