scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Adaptive content composition system for Next Generation Networks

TL;DR: A new architecture for the e-learning application called ACCS & Adaptive Content Composition System is proposed, capable of composing a knowledge molecule that can parametrically relate to the underlying IP Multimedia Subsystem (IMS), for ensuring a desired QoS.
Abstract: Composing learning material for online education and ensuring quality of delivery (low latency and high bandwidth) is a challenge to researchers in e-learning The problem is compounded when the computing platforms are heterogeneous Besides, e-learning as an application presents a highly fluctuating load to the underlying IP Multimedia Subsystem Viewed in this light, it appears that an e-learning system with inherent abilities to integrate various multimedia elements that can adapt its output to suit network parameters is the need of the hour In this paper, we propose a new architecture for the e-learning application & called ACCS & Adaptive Content Composition System & which is capable of composing a knowledge molecule (composed of different media elements) that can parametrically relate to the underlying IP Multimedia Subsystem (IMS), for ensuring a desired QoS The ACCS architecture has two dominant layers above the IMS; viz, knowledge management sub-layer and network services adaptation sub-layer We study the performance of ACCS with synthetic workloads under controlled conditions using a network test-bed, called GeNIe
Citations
More filters
Proceedings ArticleDOI
15 Jul 2009
TL;DR: This paper proposes a two stage approach with feedback that quantifies the match between a learning resource and a learner model, and reduces the search space, and optimizes them to form a lesson which is then delivered to the student.
Abstract: Filtering out a subset of learning resources from a large repository to meet the requirements of a particular learning situation is a difficult task, due to the high degree of subjectivity in requirements and the combinatorial complexity of matching. In this paper, we propose a two stage approach with feedback. First, a pair of metrics quantifies the match between a learning resource and a learner model, and reduces the search space. Then, another pair of metrics quantifies the topic overlap and topic coverage, and optimizes them to form a lesson which is then delivered to the student. After each lesson the learner model is updated to reflect the new learning that has taken place. A set of process parameters allows the learner to vary the style of the lesson.

Cites result from "Adaptive content composition system..."

  • ...We also drew inspiration from an earlier work by same authors called “Knowledge Molecule Composition” [6]....

    [...]

References
More filters
Proceedings ArticleDOI
01 Jun 1998
TL;DR: This paper applies a number of observations of Web server usage to create a realistic Web workload generation tool which mimics a set of real users accessing a server and addresses the technical challenges to satisfying this large set of simultaneous constraints on the properties of the reference stream.
Abstract: One role for workload generation is as a means for understanding how servers and networks respond to variation in load. This enables management and capacity planning based on current and projected usage. This paper applies a number of observations of Web server usage to create a realistic Web workload generation tool which mimics a set of real users accessing a server. The tool, called Surge (Scalable URL Reference Generator) generates references matching empirical measurements of 1) server file size distribution; 2) request size distribution; 3) relative file popularity; 4) embedded file references; 5) temporal locality of reference; and 6) idle periods of individual users. This paper reviews the essential elements required in the generation of a representative Web workload. It also addresses the technical challenges to satisfying this large set of simultaneous constraints on the properties of the reference stream, the solutions we adopted, and their associated accuracy. Finally, we present evidence that Surge exercises servers in a manner significantly different from other Web server benchmarks.

1,549 citations

01 Jan 1999
TL;DR: In this paper, the authors present a framework for the emerging Internet Quality of Service (QoS) All the important components of this framework, ie, Integrated Services, RSVP, Differentiated Services, Multi-Protocol Label Switching (MPLS) and Constraint Based Routing are covered.
Abstract: In this paper we present a framework for the emerging Internet Quality of Service (QoS) All the important components of this framework, ie, Integrated Services, RSVP, Differentiated Services, Multi-Protocol Label Switching (MPLS) and Constraint Based Routing are covered We describe what Integrated Services and Differentiated Services are, how they can be implemented, and the problems they have We then describe why MPLS and Constraint Based Routing have been introduced into this framework, how they differ from and relate to each other, and where they fit into the Differentiated Services architecture Two likely service architectures are presented, and the end-to-end service deliveries in these two architectures are illustrated We also compare ATM networks to router networks with Differentiated Services and MPLS Putting all these together, we give the readers a grasp of the big picture of the emerging Internet QoS

803 citations

Journal ArticleDOI
TL;DR: This paper presents a framework for the emerging Internet Quality of Service (QoS), and describes why MPLS and Constraint Based Routing have been introduced into this framework, how they differ from and relate to each other, and where they fit into the Differentiated Services architecture.
Abstract: We present a framework for the emerging Internet quality of service (QoS). All the important components of this framework-integrated services, RSVP, differentiated services, multiprotocol label switching (MPLS), and constraint-based routing-are covered. We describe what integrated services and differentiated services are, how they can be implemented, and the problems they have. We then describe why MPLS and constraint-based routing have been introduced into this framework, how they differ from and relate to each other, and where they fit into the differentiated services architecture. Two likely service architectures are presented, and the end-to-end service deliveries in these two architectures are illustrated. We also compare ATM networks to router networks with differentiated services and MPLS. Putting all these together, we give the readers a grasp of the big picture of the emerging Internet QoS.

751 citations

Proceedings ArticleDOI
09 Apr 1997
TL;DR: This work has developed an empirical model of network traffic produced by HTTP, based on packet traces of HTTP conversations, which can be used by simulations to mimic World Wide Web network applications.
Abstract: The workload of the global Internet is dominated by the Hypertext Transfer Protocol (HTTP), an application protocol used by World Wide Web clients and servers. Simulation studies of IP networks require a model of the traffic patterns of the World Wide Web, in order to investigate the effects of this increasingly popular application. We have developed an empirical model of network traffic produced by HTTP. Instead of relying on server or client logs, our approach is based on packet traces of HTTP conversations. Through traffic analysis, we have determined statistics and distributions for higher-level quantities such as the size of HTTP files, the number of files per "Web page", and user browsing behavior. These quantities form a model can then be used by simulations to mimic World Wide Web network applications.

504 citations

BookDOI
01 Jan 2006
TL;DR: This book will lead you to always think more and more, and in this case, this book will be always right for you.
Abstract: Want to get experience? Want to get any ideas to create new things in your life? Read modeling and simulation tools for emerging telecommunication networks now! By reading this book as soon as possible, you can renew the situation to get the inspirations. Yeah, this way will lead you to always think more and more. In this case, this book will be always right for you. When you can observe more about the book, you will know why you need this.

18 citations