By Topic

Internet Applications, 2001. WIAPP 2001. Proceedings. The Second IEEE Workshop on

Date 24-24 July 2001

Filter Results

Displaying Results 1 - 21 of 21
  • Proceedings. The Second IEEE Workshop on Internet Applications. WIAPP 2001

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 156
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Using performance maps to understand the behavior of Web caching policies

    Publication Year: 2001, Page(s):50 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    One of the most important differences between traditional caching and Web caching is the high variability of the size of Web objects. As a consequence of that variability, we use two metrics to assess performance of Web caching replacement policies: hit ratio (HR) and byte hit ratio (BHR). The paper presents an analytical model relating these two performance metrics. We show that the relation betw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Directions in ubiquitous computing: a position statement

    Publication Year: 2001, Page(s):78 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    One of the visions of ubiquitous computing is the ability to use arbitrary interactive devices such as cell phones and handheld computers to interact with arbitrary remote networked appliances such as TVs, printers, and EKG machines. There are many potential practical benefits of controlling a network appliance using a remote user interface on a mobile computer rather than directly using the nativ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring and controlling Internet based e-services

    Publication Year: 2001, Page(s):41 - 48
    Cited by:  Papers (6)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1420 KB) | HTML iconHTML

    The ever-widening reach of the Internet has led to the proliferation of e-commerce sites. These e-commerce sites, termed e-services are sprouting in the form of portals and e-business Web sites. Some of these e-services interact amongst themselves and undergo service composition to offer other complex services. Next generation e-services would undertake dynamic service composition because of the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital rights management on open and semi-open networks

    Publication Year: 2001, Page(s):154 - 155
    Cited by:  Papers (1)  |  Patents (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Gives an overview of how the openness of the future Internet affects digital rights management (DRM). There will be open and semi-open parts in the future Internet. DRM systems enable many important features of information product distribution on the Internet. At the same time, these systems have significant costs: how should content distributors maintain user friendliness and solve revenue-earnin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The networked physical world: an automated identification architecture

    Publication Year: 2001, Page(s):76 - 77
    Cited by:  Papers (17)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    We have developed an open and scalable network-oriented architecture that integrates the physical world with the virtual world and admits the efficient storage and retrieval of data and information. The architecture works with existing and future network and Automated Identification (Auto-ID) technologies and requires the use of Globally Unique IDentifiers (GUIDes). An Auto-ID tag affixed to a phy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • W@nderland: image-based constructable virtual space on the WWW

    Publication Year: 2001, Page(s):20 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1756 KB) | HTML iconHTML

    The conventional approaches for constructing real-space-based 3D space on the WWW are very costly in initial modeling and in network access in its operation. The image based rendering (IBR) approach focuses on more convenient handling of the real space, but the obtained space is usually constrained by the difficulty in image analysis. As a result, the number of people who use virtual space on the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domain caching: building Web services for live events

    Publication Year: 2001, Page(s):133 - 142
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB) | HTML iconHTML

    Web servers providing live coverage of events are hard to design due to a high degree of variation in the load, variations in geographical distribution of users and the frequency with which content is updated. In this paper, we propose domain caching, a technique that dynamically distributes the load on the server by instructing selected clients (domain caches) to cache server content and service ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BuddyCache: cache coherence for transactional peer group applications

    Publication Year: 2001, Page(s):57 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB) | HTML iconHTML

    Universal network access has enabled a new class of distributed applications that allow collaborating peers to share cached data. Until now these applications had basic limitations: sharing was limited to read-only access, networks were limited to local area networks, and there was no support for fine-grained sharing or transactions. BuddyCache is a caching system for peer applications that provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable and self-organizing (meta) data dissemination for ubiquitous computing

    Publication Year: 2001, Page(s):80 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    One of the promises of ubiquitous computing is the ability to tie heterogeneous computing elements together in a manner where the whole is larger than the sum of the individual parts. Thus, Internet services, file servers (PCs), personal digital assistants, sensors and embedded computers (in appliances ranging from light switches to automobiles) interact with one another based on application requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • True anonymity without mixes

    Publication Year: 2001, Page(s):32 - 40
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    Anonymity is an essential part of social structures. In the non-electronic world there are several services that are based on anonymous interactions between individuals. The migration of these services to the Internet world is infeasible without the provision of anonymizers to guarantee anonymity. Anonymizers based on mix computers interposed between the sender and the receiver of an e-mail messag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining replicated redirection services in Web-based information systems

    Publication Year: 2001, Page(s):143 - 152
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB) | HTML iconHTML

    The growth in the commercial use of the Internet and the proliferation of new Web information services has led to a number of problems - overloaded servers, traffic congestion and increasing client latencies. Dynamic replication of information among geographically distributed Web servers is commonly used to address such problems of scale. A key challenge for such systems is to maintain an efficien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring the benefits of a continuous consistency model for wireless Web portals

    Publication Year: 2001, Page(s):65 - 73
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB) | HTML iconHTML

    Wireless devices currently provide real time access to personalized information such as headlines, email, stock quotes, and online auctions. Retrieving all updates to such rapidly changing information is wasteful of both network bandwidth and battery power. Existing consistency models for such services allow for only coarse grained timeouts on how often information should be retrieved. The authors... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Click-once hypertext: now you see it, now you don't

    Publication Year: 2001, Page(s):84 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    SMASH (Self-Modifying As-Selected Hypertext) is a system for automatically removing text from a Web page as hyperlinks are selected. Making links (and, optionally, other related text) click-once allows a system to avoid clutter and provide visual feedback to a user. Unlike other typical adaptive hypertext systems, SMASH generates pages specially on the originating server but allows the browser to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FlexScope: support for browsing multiple pages on the Web

    Publication Year: 2001, Page(s):94 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1188 KB) | HTML iconHTML

    Although the information on the World Wide Web is tremendous, conventional Web browsing still consists of traversing a single Web link at a time. Such browsing can be awkward when a user wants to traverse a list of links or to view several pages of related contents side by side. Moreover, the processes of viewing a page and loading a new page have to be alternated sequentially, which deteriorates ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new TWIST on mobile computing: Two-Way Interactive Session Transfer

    Publication Year: 2001, Page(s):2 - 11
    Cited by:  Papers (6)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1224 KB) | HTML iconHTML

    The ubiquitous use of computer resources for daily productivity is a goal that presently remains unrealised. We believe that the convergence of desktop and mobile applications into a seamless computing experience will provide a strong motivation for future “anytime, anywhere computing”. The authors describe this convergence as the capability to perform the handoff of application sessio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web&: an architecture for non-interactive Web

    Publication Year: 2001, Page(s):104 - 112
    Cited by:  Papers (1)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB) | HTML iconHTML

    The profile of Web use has changed from information access to e-commerce. The current interactive (synchronous) model is time-consuming. Web browsing can become frustrating if the network or servers incur delays or are not accessible, or if the same interaction must be repeated many times. It is even more painful for clients who are disconnected most of the time or are accessing the Web via low-ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stereoscopic video transmission over the Internet

    Publication Year: 2001, Page(s):12 - 19
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB) | HTML iconHTML

    One of the most remarkable features of the human visual system is the ability to perceive three-dimensional depth. This phenomenon is primarily related to the fact that the binocular disparity causes two slightly different images to be projected on the retinas. The images are fused by the human brain into one three-dimensional view. Various stereoscopic display systems have been devised to present... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Server switching: yesterday and tomorrow

    Publication Year: 2001, Page(s):114 - 123
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB) | HTML iconHTML

    Server switches distribute incoming request traffic across the nodes of Internet server clusters and Web proxy cache arrays. These switches are a standard building block for large-scale Internet services, with many commercial products on the market. As Internet applications and service architectures continue to evolve, the role of server switches and the demands on their request routing policies w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content distribution architecture using network layer anycast

    Publication Year: 2001, Page(s):124 - 132
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    Server replication is a common technique for distributing content efficiently and in a scalable manner to many clients. Directing clients to the “best” of these content-equivalent servers is a non-trivial problem. As a solution, we propose CDAA (Content Distribution Architecture using Anycast) that uses replicated servers and leverages the idea of anycast, supported at the network laye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.