By Topic

Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002)

1-1 Feb. 2002

Filter Results

Displaying Results 1 - 25 of 46
  • Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002)

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The following topics were discussed: Agents on the Internet; collaboration technology; Internet based data engineering; Internet security; mobile computing; multimedia computing; operation technology and performance; parallel and distributed computing; services for information society and e-economy, and software engineering on the Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):281 - 282
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • Technological and business challenges in pervasive computing

    Publication Year: 2002, Page(s):41 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Pervasive computing deals with environments where computing and communication capabilities are embedded in everyday objects and gracefully integrated with human users. At the front end of a pervasive environment, devices are installed to collect information from the physical world and react to actions from human users or other devices. Behind the front layer, information is continuously received, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service emergence based on relationship among self-organizing entities

    Publication Year: 2002, Page(s):194 - 203
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    In this paper, we describe the Jack-in-the-Net (Ja-Net) architecture for adaptive services in a large scale, open network environment. Using biologically inspired concepts, Ja-Net achieves built-in capabilities to create/emerge services adaptively according to dynamically changing network conditions and user preferences. In Ja-Net, a service is implemented by a collection of autonomous system comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DoCoMo's vision on mobile commerce

    Publication Year: 2002, Page(s):39 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    By the introduction of NIT DoCoMo's "i-mode", mobile Internet access infrastructure has been widely, spread in Japan, and also the increase of rich contents constructed the basis of mobile commerce. In the 3G environment, DoCoMo is planning to support the loading of various applications for the mobile phone by utilizing memory devices such as IC chips, thus enabling a mobile commerce service in bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectedness oriented communication: fostering a sense of connectedness to augment social relationships

    Publication Year: 2002, Page(s):186 - 193
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    This paper proposes a novel concept for network communication media, called "connectedness oriented communication". While traditional network communication technologies focus on how to precisely transmit the contents of messages, "connectedness oriented communication" is intended to support and augment social relationships among people by fostering a sense of connectedness among them. "connectedne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of unauthorized access tracing system

    Publication Year: 2002, Page(s):74 - 81
    Cited by:  Papers (5)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    We propose a hop-by-hop IP traceback method that can reliably trace the source of an attack. In this paper, we describe the development and the evaluation of our prototype system. The main features of our proposed method are the packet feature, which is composed of specific packet information contained in a packet for identification of an unauthorized packet, and an algorithm using the datalink id... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous commerce - always on, always aware, always pro-active

    Publication Year: 2002, Page(s):37 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill defined. What will we do with these emerging capabilities? Stock quotes in 3-D on your heads-up display? Sports scores in stereo sound? We believe that the new kinds of services will result from three primary capabilities of ub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On updating in very short time by distributed search engines

    Publication Year: 2002, Page(s):176 - 183
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Conventional search engines employ a centralized architecture. However, such engines are not suitable for fresh information retrieval because they take a long time to collect Web pages using a Web robot (or crawler). There are also distributed search engines such as Harvest etc., but they cannot update in a very short time, e.g. a few minutes. In this paper, we propose a distributed information re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Internet search applications based on VLSI associative processors

    Publication Year: 2002, Page(s):230 - 237
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (939 KB) | HTML iconHTML

    A general-purpose intelligent search agent on the Internet has been developed using VLSI associative processor (AP) chips as the hardware accelerator. The agent performs similarity-based search in a large volume of database. Although the similarity-based search processing is computationally very expensive, latency-free search has become possible due to the highly parallel maximum-likelihood search... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge creation through task model and information organizing method using image/drawing expression

    Publication Year: 2002, Page(s):46 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    The rapid growth of information network technology that led to globalization and leaner organization has made knowledge an important asset. For a business organization to remain on competition, there is a need to acquire knowledge according to the context of their business. This is particularly true in the product design field because designers frequently use images and drawings containing semanti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive behaviors of intelligent agents based on neural semantic knowledge

    Publication Year: 2002, Page(s):92 - 99
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    This paper presents a new approach that combines the neural network technology with the semantic network-based knowledge representation in realizing the intelligent, emotional, adaptive and believable behaviors of consulting personal agents. This knowledge representation framework is deployed in the CyMON agent platform to develop intelligent assistant, consultant and marketing agents for a variet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A virtual overlay network for integrating home appliances

    Publication Year: 2002, Page(s):246 - 253
    Cited by:  Papers (27)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1529 KB) | HTML iconHTML

    Various home appliances and personal appliances are expected to be connected to the Internet in the near future. However, the conventional IP protocol is not expected to be sufficient for connecting these appliances without protocol translation. Since adding new functionalities to the IP protocol is too generic for most applications, we believe that future networks should be customized according t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile commerce: vision and challenges

    Publication Year: 2002, Page(s): 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering empirical laws of Web dynamics

    Publication Year: 2002, Page(s):168 - 175
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    The World Wide Web is a complex system that changes over time. However, like any dynamic system, we can attempt to understand it in scientific terms and describe regularities in its behavior. To this end, we have collected measurements for a number of Web-related variables, including the daily changes in Web pages. To the resulting data, we have applied RF6, an algorithm that discovers descriptive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient construction of variable-stride multibit tries for IP lookup

    Publication Year: 2002, Page(s):220 - 227
    Cited by:  Papers (26)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Srinivasan and Varghese (1999) have proposed the use of multibit tries to represent routing tables used for Internet (IP) address lookups. They propose an O(n *W2* k) dynamic programming algorithm to determine the strides for an optimal variable-stride trie that has at most k levels. Here, n is the number of prefixes in the routing table and W is the length of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile commerce: vision and challenges (location and its management)

    Publication Year: 2002, Page(s):43 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Mobile computing is distributed computing that involves elements whose location changes in the course of computation. Elements may be software components such as mobile agents or moving objects-data or hardware such as palmtops and wireless phones, or users. This being a very broad definition, the common underlying issue is location and its management. The term mobile computing is very often used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in mobile agent systems

    Publication Year: 2002, Page(s):4 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    There are four possible security attacks: Attacks from host to host, from agents to hosts, from agents to agents and finally from hosts to agents. Our main concern is attacks from a malicious host on an agent. These attacks can take many forms including rerouting, spying out code, spying out data, spying out control flow, manipulation of code, manipulation of data, manipulation of control flow, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and evaluation of dynamic protocol selection architecture for reliable multicast

    Publication Year: 2002, Page(s):262 - 269
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    IP multicast is an effective technology for one-to-many and many-to-many communications. Multicast applications use UDP (User Datagram Protocol) as transport protocol and have responsibility for reliable communications. It is difficult to apply these implementations to other applications because implementations of multicast protocols have been pushed into application programs. We propose a reliabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge sharing system using XML Linking Language and peer-to-peer technology

    Publication Year: 2002, Page(s):26 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    A knowledge sharing system that enables users to share background information about electronic content has been developed to enhance intellectual creative work and knowledge management. We call the background information "context"; it is composed of links among various contents. We try to handle the context as knowledge that is extracted from users' activities such as referring to, creating, and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis

    Publication Year: 2002, Page(s):64 - 73
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    In order to detect intrusions, IDA (Intrusion Detection Agent system) initially monitors system logs in order to discover an MLSI-which is an certain event which in many cases occurs during an intrusion. If an MLSI is found, then IDA judges whether the MLSI is accompanied by an intrusion. We adopt discriminant analysis to analyze information after IDA detects an MLSI in a remote attack. Discrimina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental results of pattern-based automatic program generator

    Publication Year: 2002, Page(s):33 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    We describe the pattern-based automatic program generator. This approach that mitigates restrictions between the general package approach and the application-oriented approach in software development is described. It provides efficient solutions for developing application-oriented systems. Experimental results show that our approach results in significant improvement compared to traditional softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • InfoLead - a new concept for cruising navigation technology

    Publication Year: 2002, Page(s):162 - 167
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    A new concept is described for navigating the World Wide Web effectively. Called InfoLead, it assists users in finding their way to target information by helping them to visualize a Web document space (WDS). Each document identified by the search engine as possibly having the target information is rendered into a bitmap image and placed in a WDS, which is three-dimensional. A document is positione... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using plain base32 ASCII-compatible encoding in the local part of E-mail addresses

    Publication Year: 2002, Page(s):214 - 219
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    The structure of Internet mails (or called E-mail) is specified in RFC 2822, which specifies message bodies as flat ASCII text. An E-mail address is in the form of local-part@domain. Internet Engineering Task Force (IETF) has set up a working group on internationalized domain names (IDN). A variety of proposals have been proposed for the format of ASCII-compatible encoding (ACE), which utilizes ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contents-independent EPSS for the Web site

    Publication Year: 2002, Page(s):141 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    EPSS is an Electronic Performance Support System that provides its users with on-demand access to information for the purpose of job performance improvement. We propose a framework for development of a "content-independent EPSS" on the Web, called WebAttendant. This EPSS service is built independent of Web content, in contrast to "built-in EPSS" built as part of the Web content. WebAttendant track... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.