By Topic

Applications and the Internet, 2008. SAINT 2008. International Symposium on

Date July 28 2008-Aug. 1 2008

Filter Results

Displaying Results 1 - 25 of 126
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2008, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Chair

    Publication Year: 2008, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Workshops Program Welcome Message

    Publication Year: 2008, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the Second International Workshop on SensorWebs, Databases and Mining in Networked Sensing Systems (SWDMNSS)

    Publication Year: 2008, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the Third International Workshop on Dependable and Sustainable Peer-to-Peer Systems (DAS-P2P 2008)

    Publication Year: 2008, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizers' Welcome for the Workshop on Heuristic Methods for the Design, Deployment, and Reliability of Networks and Network Applications (HEUNET 2008)

    Publication Year: 2008, Page(s):xxvi - xxvii
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the Workshop on Middleware Architecture in the Internet (Mid Arch 2008)

    Publication Year: 2008, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the Workshop on Social and Personal Computing for Web-Supported Learning Communities (SPeL 2008)

    Publication Year: 2008, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Organizer of Workshop for Ubiquitous Networking and Enablers to Context-Aware Services (UNECAS)

    Publication Year: 2008, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the Workshop on Power Consumptions in Future Network Systems (PCFNS)

    Publication Year: 2008, Page(s): xxxi
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Organizers of the Second International Workshop on Practical Applications of Sensor Networking (PASN)

    Publication Year: 2008, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop on IT Enabled Services (ITeS)

    Publication Year: 2008, Page(s): xxxiii
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the Workshop on Next Generation Service Platforms for Future Mobile Systems (NGSP-FMS)

    Publication Year: 2008, Page(s): xxxiv
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Performance Measurements and Statistics of Tor Hidden Services

    Publication Year: 2008, Page(s):1 - 7
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB) | HTML iconHTML

    Tor (the onion routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server's IP address. In general the acceptance of services strongly relies on its QoS properties. For potential Tor users, provided the anonymity is secured, probably the most important QoS parameter is the time until they finally get response by such a hidden service. Internally, overal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Relay Node Placement in Wireless Sensor Networks

    Publication Year: 2008, Page(s):8 - 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (614 KB) | HTML iconHTML

    In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the network overload caused by excess concurrent attempts of wireless devices to access the common shared channel. Our algorithm uses the expected transmission delay (ETD) metric based on both current measurements and history obse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DHT Network with Link Access Control Using a Social Network

    Publication Year: 2008, Page(s):18 - 25
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Services on peer-to-peer (P2P) networks tend to be spread throughout the world. However, there are several problems with peer-to-peer networks, such as illegal file sharing or information leaks. These problems are caused by the ability to freely connect many anonymous nodes. The present paper proposes a method of access control applying a social network to a P2P network. We can achieve access cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Web Services Discovery by Matching Temporal Restrictions

    Publication Year: 2008, Page(s):26 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    Matching algorithms for semantic Web services discovery focus on the functional aspects of the services, which are usually given by the function that transforms inputs into outputs. Current approaches do not take into attention the fact that some services may not be available around the clock and, more restrictively, may require exclusive access. In this paper we present an approach to allow the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.