By Topic

International Symposium on Applications and the Internet (SAINT'06)

Date 23-27 Jan. 2006

Filter Results

Displaying Results 1 - 25 of 55
  • Proceedings. International Symposium on Applications and the Internet

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • International Symposium on Applications and the Internet - Title Page

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • International Symposium on Applications and the Internet - Copyright Page

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • International Symposium on Applications and the Internet - Table of contents

    Publication Year: 2006, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (24 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2006, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Towards autonomic networks

    Publication Year: 2006, Page(s):6 pp. - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (133 KB) | HTML iconHTML
    Freely Available from IEEE
  • A method of traffic shaping using H/sup /spl infin// filtering

    Publication Year: 2006, Page(s):4 pp. - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB) | HTML iconHTML

    We propose a traffic shaping algorithm based on the estimates of input traffic and trend estimation using Hinfin filter. By this method, we can reduce packet loss rate in the traffic shaper machine itself. Using numerical simulation case studies, we verify the effect of the proposed method compared to the leaky bucket algorithm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fair overload handling using proof-of-work functions

    Publication Year: 2006, Page(s):8 pp. - 21
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Overload can reduce the overall performance of a computer system up to a point where the whole service might collapse. Thus, for example the load on a server must be controlled to achieve optimal system performance. Doing so some requests from clients must be rejected. We show that we can distinguish four different types of user profiles, why micropayments are no suitable solution and how a proof-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fluid-based analysis of a network with DCCP connections and RED routers

    Publication Year: 2006, Page(s):8 pp. - 29
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    In this paper, we model DCCP congestion control mechanism and RED as independent discrete-time systems using fluid-flow approximation. By interconnecting DCCP connections and RED routers, we model the entire network as a feedback system called DCCP/RED. We then analyze the steady state performance and the transient state performance of DCCP/RED. Specifically, we derive the packet transmission rate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic parameter configuration mechanism for data transfer protocol GridFTP

    Publication Year: 2006, Page(s):7 pp. - 38
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    In this paper, we propose an automatic parameter configuration mechanism for GridFTP, which optimizes the number of parallel TCP connections by utilizing analytic results in the work of Ito et al. (2005). The proposed mechanism first measures the network status (e.g., the goodput and the round-trip time of GridFTP data channels) at the GridFTP client. Based on these measurement results, it adjusts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web census is possible

    Publication Year: 2006, Page(s):6 pp. - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    How big is the World Wide Web? Over the last few years, researchers have used various approaches to estimate the size of the Web. The large size of the Web and the technology available at the time dictated that only estimation experiments were feasible. We hypothesize that an exact measurement (i.e., a census) of the Web is now possible. We present evidence for our hypothesis, and describe a censu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of an efficient search mechanism based on the hybrid P2P model for ubiquitous computing systems

    Publication Year: 2006, Page(s):9 pp. - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2905 KB) | HTML iconHTML

    To realize ubiquitous computing using quite a huge number of computing resources on the Internet, this paper presents an effective computing resource search mechanism based on peer-to-peer (P2P) ad-hoc networking that finds appropriate resource providers for each resource user. The main idea of the proposed mechanism is to classify the attributes of computing resources into two groups: a static at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A prototype of a secure autonomous bootstrap mechanism for control networks

    Publication Year: 2006, Page(s):7 pp. - 62
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (building automation), FA (factory automation) and PA (process automation). They are introducing IP and face the issues of security and configuration complexity. The authors have proposed a model which intends to solve the issues while satisfying restrictions, i.e. small embedded devices, iso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FI-RED: AQM mechanism for improving fairness among TCP connections in tandem networks

    Publication Year: 2006, Page(s):8 pp. - 70
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    In this paper, we focus on a tandem network, and design an AQM mechanism called FI-RED (fairness improvement for RED) for improving the fairness among heterogeneous TCP connections. In FI-RED, ECN (explicit congestion notification) mechanism is used for differentiating the packet marking probability of RED according to the CE (congestion experienced) bit of arriving packets. Namely, FI-RED suppres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient flooding control suitable for multiple requests

    Publication Year: 2006, Page(s):6 pp. - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    Flooding algorithm is a fundamental control mechanism to notify all the nodes of some information, to get desired information from all the nodes, or to reserve a route, and so on. Flooding algorithm has merits of robustness and optimality to solutions. However, flooding algorithm has problems which increase the processing time until finishing the flooding control, and cause congestion in the netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adoption of the IPsec-VPN for the ubiquitous network

    Publication Year: 2006, Page(s):4 pp. - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    In the ubiquitous network, it is important to provide not only the continuous connectivity but also the strong security. The IPsec-VPN technology archives some kind of the ubiquitous network with providing one virtual IP address and the encrypted communication channel. However, if the user's terminal moves between networks, its IP address will be changed by roaming process, and the IPsec-VPN conne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting Web servers from octopus attacks

    Publication Year: 2006, Page(s):4 pp. - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Denial-of-service (DoS) attacks are a major threat to the Internet and have not been completely solved in spite of much research effort. This paper deals with an important class of DoS attacks, called octopus attacks, which establish a flood of connections to a victim Web server and prevent legitimate users from connecting to the server. Octopus attacks cause serious performance degradation of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Filtering features for a composite event definition language

    Publication Year: 2006, Page(s):4 pp. - 89
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    This research has enhanced a distributed, rule-based application integration environment with a composite event definition language (CEDL) and detection system. CEDL builds on existing composite event operators and selection modes, adding features to support the filtering of primitive and composite events. The filtering features include basic parameter filtering on primitive and composite events, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority control in receiving e-mails by giving a separate response to each DNS query

    Publication Year: 2006, Page(s):4 pp. - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    Delivering e-mails without unnecessary delay is one of the very important issues as the spread of e-mail service and its use become very common. But in case that a "mail transfer agent (MTA)" is heavily loaded by huge amount of mails sent to the MTA, not only the delay on mail delivery is inevitable but also managing the MTA service becomes difficult. Thus, a delivery method that treats legitimate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel Statement

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Language grid: an infrastructure for intercultural collaboration

    Publication Year: 2006, Page(s):5 pp. - 100
    Cited by:  Papers (45)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (686 KB) | HTML iconHTML

    To increase the accessibility and usability of online language services, this paper proposes the language grid to create composite language services for various communities. The language grid is called "horizontal," when the grid connects the standard languages of nations, or "vertical," when the grid combines the language services generated by communities. Semantic Web service technologies are ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.