Now 702 visitors
Today:4 Yesterday:409
Total: 3228 413S 88P 97R
2026-04-07, Week 15
Member Login
Welcome Message
Statistics & History
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration & Invoice
Paper Archives
Outstanding Papers
Program & Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors




















Paper Number Author:
Paper Title
Keyword
Q&A Number **Select your question number !!
Questioner eMail:
Question
Answer
by
Author
Save Q&A

* Edit or answer any Q&A by selecting Q&A number Hyper Link below + Write button (Save)
ICACT20220362 Question.1
Questioner: yongj@gsic.titech.ac.jp    2022-02-16 ¿ÀÈÄ 3:45:03
ICACT20220362 Answer.1
Answer by Auhor dasuni@korea.ac.kr   2022-02-16 ¿ÀÈÄ 3:45:03
Chrome Click!!
As the authors described, a network topology and configuration can be changed in real time including the SDN-based networks. In the proposed verification framework, how to detect the change of network topology and configuration and how to confirm the changes are from the SDN controllers? Thank you very much for your questions. The method of automatically detecting the change of network topology and configuration is currently being studied. However, as a prior study, the network topology and environment change in real time, so the Framework is needed to verify that the behavior of the changed environment is equivalent.
ICACT20220362 Question.2
Questioner: holdenhu1234@yahoo.com.tw    2022-02-16 ¿ÀÈÄ 1:37:04
ICACT20220362 Answer.2
Answer by Auhor dasuni@korea.ac.kr   2022-02-16 ¿ÀÈÄ 1:37:04
Chrome Click!!
To verify the networks resilience, the study proposed a resilience verification process verifies readability, safety and liveness. Is it possible to integrate visualization technology for displaying a inventive visual information to support users understand the states? Thank you very much for your questions. We will consider visualization technology that allows users to understand states as a future works.
ICACT20220362 Question.3
Questioner: holdenhu1234@yahoo.com.tw    2022-02-16 ¿ÀÈÄ 2:02:44
ICACT20220362 Answer.3
Answer by Auhor dasuni@korea.ac.kr   2022-02-16 ¿ÀÈÄ 2:02:44
Chrome Click!!
Can the Software-Defined Networking framework provide the usage profiles for frequent services and applications for selecting? Thank you very much for your questions. The usage profiles can be provided as XML documents.
ICACT20220362 Question.4
Questioner: tomayoon@ieee.org    2022-02-16 ¿ÀÈÄ 2:43:59
ICACT20220362 Answer.4
Answer by Auhor dasuni@korea.ac.kr   2022-02-16 ¿ÀÈÄ 2:43:59
Chrome Click!!
First of all, thank you for the good research paper and presentation contents. I would like to know more about the research environment used in this study, and also in detail about the equipment & operating systems, development languages and software libraries you used. Thank you very much for your questions. UPPAAL 4.1.24 was used to implement the Verification Framework and time computation tree logic (TCTL) was used for Verification Properties to verify the properties such as readability, safety, and liveness.
ICACT20220362 Question.5
Questioner: chau@etri.re.kr    2022-02-16 ¿ÀÈÄ 2:45:36
ICACT20220362 Answer.5
Answer by Auhor dasuni@korea.ac.kr   2022-02-16 ¿ÀÈÄ 2:45:36
Chrome Click!!
Dear author, you have a very interesting research. Could you please let me know more about the future work of this research? Thank you and stay safe. Thank you very much for your questions. For out future research, we will conduct realistic models base on the verification framework and focus on game theory applied to the SDN and NFV based on VNF¡¯s rule verification tool.
ICACT20220362 Question.6
Questioner: ehtm94@korea.ac.kr    2022-02-16 ¿ÀÈÄ 3:13:31
ICACT20220362 Answer.6
Answer by Auhor dasuni@korea.ac.kr   2022-02-16 ¿ÀÈÄ 3:13:31
Chrome Click!!
Dear author, you have a very interesting research. In addition to OpenFlow protocol, I wonder if there are any other documents that have been investigated and organized on protocol. Thank you very much for your questions. OpenFlow is the most representative Southbound protocol, and there are also I2RS9 (Interface to Routing System) and NETCONF.
ICACT20220362 Question.7
Questioner: namacabale@gmail.com    2022-02-16 ¿ÀÈÄ 3:20:30
ICACT20220362 Answer.7
Answer by Auhor dasuni@korea.ac.kr   2022-02-16 ¿ÀÈÄ 3:20:30
Chrome Click!!
Dear Author, you have a very good research. I would like to know if the technology today is capable of implementing your proposed scheme? Is there an existing technology almost similar to your proposal that has been deployed in real world environment? Thank you and stay safe. Thank you very much for your questions. The proposed scheme can be used in reality. It is not used in the currently implemented system, but it is expected to be used as further research proceeds.
ICACT20220362 Question.8
Questioner: Annette.Chen@ttc.org.tw    2022-02-16 ¿ÀÈÄ 10:40:29
ICACT20220362 Answer.8
Answer by Auhor dasuni@korea.ac.kr   2022-02-16 ¿ÀÈÄ 10:40:29
Chrome Click!!
Your research is very impression to me. To verify the networks resilience, the study proposed a resilience verification process verifies readability, safety and liveness. What will be your future work? Thank you very much for your questions. For out future research, we will conduct realistic models base on the verification framework and focus on game theory applied to the SDN and NFV based on VNF¡¯s rule verification tool.