Notice
There is currently an issue with the citation download feature. Learn more

Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002)

1-1 Feb. 2002

Filter Results

Displaying Results 1 - 25 of 46
  • Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002)

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The following topics were discussed: Agents on the Internet; collaboration technology; Internet based data engineering; Internet security; mobile computing; multimedia computing; operation technology and performance; parallel and distributed computing; services for information society and e-economy, and software engineering on the Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):281 - 282
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • Service emergence based on relationship among self-organizing entities

    Publication Year: 2002, Page(s):194 - 203
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    In this paper, we describe the Jack-in-the-Net (Ja-Net) architecture for adaptive services in a large scale, open network environment. Using biologically inspired concepts, Ja-Net achieves built-in capabilities to create/emerge services adaptively according to dynamically changing network conditions and user preferences. In Ja-Net, a service is implemented by a collection of autonomous system comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DoCoMo's vision on mobile commerce

    Publication Year: 2002, Page(s):39 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    By the introduction of NIT DoCoMo's "i-mode", mobile Internet access infrastructure has been widely, spread in Japan, and also the increase of rich contents constructed the basis of mobile commerce. In the 3G environment, DoCoMo is planning to support the loading of various applications for the mobile phone by utilizing memory devices such as IC chips, thus enabling a mobile commerce service in bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectedness oriented communication: fostering a sense of connectedness to augment social relationships

    Publication Year: 2002, Page(s):186 - 193
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    This paper proposes a novel concept for network communication media, called "connectedness oriented communication". While traditional network communication technologies focus on how to precisely transmit the contents of messages, "connectedness oriented communication" is intended to support and augment social relationships among people by fostering a sense of connectedness among them. "connectedne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A "single authoring" programming model: the interaction logic

    Publication Year: 2002, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    For the mobile Internet, new content and applications are developed with the intent of delivering it through many different channels with different characteristics. Therefore, such content and applications must be adapted and optimized to each channel. Also, since new devices and content emerge continuously, this adaptation must be made to work for new devices not originally envisioned. In additio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and evaluation of dynamic protocol selection architecture for reliable multicast

    Publication Year: 2002, Page(s):262 - 269
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    IP multicast is an effective technology for one-to-many and many-to-many communications. Multicast applications use UDP (User Datagram Protocol) as transport protocol and have responsibility for reliable communications. It is difficult to apply these implementations to other applications because implementations of multicast protocols have been pushed into application programs. We propose a reliabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous commerce - always on, always aware, always pro-active

    Publication Year: 2002, Page(s):37 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill defined. What will we do with these emerging capabilities? Stock quotes in 3-D on your heads-up display? Sports scores in stereo sound? We believe that the new kinds of services will result from three primary capabilities of ub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Internet search applications based on VLSI associative processors

    Publication Year: 2002, Page(s):230 - 237
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (939 KB) | HTML iconHTML

    A general-purpose intelligent search agent on the Internet has been developed using VLSI associative processor (AP) chips as the hardware accelerator. The agent performs similarity-based search in a large volume of database. Although the similarity-based search processing is computationally very expensive, latency-free search has become possible due to the highly parallel maximum-likelihood search... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On updating in very short time by distributed search engines

    Publication Year: 2002, Page(s):176 - 183
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Conventional search engines employ a centralized architecture. However, such engines are not suitable for fresh information retrieval because they take a long time to collect Web pages using a Web robot (or crawler). There are also distributed search engines such as Harvest etc., but they cannot update in a very short time, e.g. a few minutes. In this paper, we propose a distributed information re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental hoarding and reintegration in mobile environments

    Publication Year: 2002, Page(s):8 - 11
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Disconnection is one of the popular techniques for operating in mobile environments and is here to stay, until long-range wireless connectivity becomes a reality. However, disconnection requires periodic hoarding and reintegration of data, which raises performance issues especially during weak connection. A common hoarding and reintegration mechanism involves complete transfer of contents. In orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inferring traffic flow characteristics from aggregated-flow measurement

    Publication Year: 2002, Page(s):256 - 261
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    In the Internet, a statistical perspective of global traffic flows has been considered as an important key to network management. Nonetheless, it is expensive or sometime difficult to measure statistics of each flow separately. Therefore, it is of practical importance to infer unobservable statistical characteristics of individual flows from characteristics of the aggregated-flows that are easily ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet mail transfer and check system based on intelligence mobile agents

    Publication Year: 2002, Page(s):2 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today's Internet world, but there are many dark clouds at the edge of the sunny sky. The two most well known threats are the "mail SPAM" and the "mail flooding attack". Mobile agents (MAs) are software agents that can transport themselves from a client computer to various servers for remote execution. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile commerce: vision and challenges

    Publication Year: 2002, Page(s): 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient construction of variable-stride multibit tries for IP lookup

    Publication Year: 2002, Page(s):220 - 227
    Cited by:  Papers (26)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Srinivasan and Varghese (1999) have proposed the use of multibit tries to represent routing tables used for Internet (IP) address lookups. They propose an O(n *W2* k) dynamic programming algorithm to determine the strides for an optimal variable-stride trie that has at most k levels. Here, n is the number of prefixes in the routing table and W is the length of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive behaviors of intelligent agents based on neural semantic knowledge

    Publication Year: 2002, Page(s):92 - 99
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    This paper presents a new approach that combines the neural network technology with the semantic network-based knowledge representation in realizing the intelligent, emotional, adaptive and believable behaviors of consulting personal agents. This knowledge representation framework is deployed in the CyMON agent platform to develop intelligent assistant, consultant and marketing agents for a variet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering empirical laws of Web dynamics

    Publication Year: 2002, Page(s):168 - 175
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    The World Wide Web is a complex system that changes over time. However, like any dynamic system, we can attempt to understand it in scientific terms and describe regularities in its behavior. To this end, we have collected measurements for a number of Web-related variables, including the daily changes in Web pages. To the resulting data, we have applied RF6, an algorithm that discovers descriptive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design of a next generation IX using MPLS technology

    Publication Year: 2002, Page(s):238 - 245
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    An IX (Internet Exchange) is a mechanism to interconnect many networks to each other. Currently, an ISP (Internet service provider) establishes numerous interconnections to other ISP. Although 'private peering' is one way for an ISP to interconnect to other ISP with individual links, connecting to an IX is a more efficient way to establish and maintain a large number of peerings (or 'public peerin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaboration among agents in logical network of peer-to-peer services

    Publication Year: 2002, Page(s):6 - 7
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Mobile devices will have enough power to provide various kinds of services on themselves in the Internet. In these services, users buy and sell products by peer-to-peer contact on streets and shops. In order to realize the peer-to-peer services, we need a platform that satisfies the following requirements: describing a service independent of its location, and providing a service under dynamically ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge creation through task model and information organizing method using image/drawing expression

    Publication Year: 2002, Page(s):46 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    The rapid growth of information network technology that led to globalization and leaner organization has made knowledge an important asset. For a business organization to remain on competition, there is a need to acquire knowledge according to the context of their business. This is particularly true in the product design field because designers frequently use images and drawings containing semanti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and improvement of HITS algorithm for detecting Web communities

    Publication Year: 2002, Page(s):132 - 140
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1883 KB) | HTML iconHTML

    We discuss problems with the HITS (Hyperlink-Induced Topic Search) algorithm, which capitalizes on hyperlinks to extract topic-bound communities of Web pages. Despite its theoretically sound foundations, we observed that the HITS algorithm has failed in real applications. In order to understand this problem, we developed a visualization tool LinkViewer, which graphically presents the extraction pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental results of pattern-based automatic program generator

    Publication Year: 2002, Page(s):33 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    We describe the pattern-based automatic program generator. This approach that mitigates restrictions between the general package approach and the application-oriented approach in software development is described. It provides efficient solutions for developing application-oriented systems. Experimental results show that our approach results in significant improvement compared to traditional softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using plain base32 ASCII-compatible encoding in the local part of E-mail addresses

    Publication Year: 2002, Page(s):214 - 219
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    The structure of Internet mails (or called E-mail) is specified in RFC 2822, which specifies message bodies as flat ASCII text. An E-mail address is in the form of local-part@domain. Internet Engineering Task Force (IETF) has set up a working group on internationalized domain names (IDN). A variety of proposals have been proposed for the format of ASCII-compatible encoding (ACE), which utilizes ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge sharing system using XML Linking Language and peer-to-peer technology

    Publication Year: 2002, Page(s):26 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    A knowledge sharing system that enables users to share background information about electronic content has been developed to enhance intellectual creative work and knowledge management. We call the background information "context"; it is composed of links among various contents. We try to handle the context as knowledge that is extracted from users' activities such as referring to, creating, and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • InfoLead - a new concept for cruising navigation technology

    Publication Year: 2002, Page(s):162 - 167
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    A new concept is described for navigating the World Wide Web effectively. Called InfoLead, it assists users in finding their way to target information by helping them to visualize a Web document space (WDS). Each document identified by the search engine as possibly having the target information is rendered into a bitmap image and placed in a WDS, which is three-dimensional. A document is positione... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.