By Topic

Applications and the Internet, 2002. (SAINT 2002). Proceedings. 2002 Symposium on

Date 1-1 Feb. 2002

Filter Results

Displaying Results 1 - 25 of 46
  • Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002)

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The following topics were discussed: Agents on the Internet; collaboration technology; Internet based data engineering; Internet security; mobile computing; multimedia computing; operation technology and performance; parallel and distributed computing; services for information society and e-economy, and software engineering on the Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):281 - 282
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • DoCoMo's vision on mobile commerce

    Publication Year: 2002, Page(s):39 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    By the introduction of NIT DoCoMo's "i-mode", mobile Internet access infrastructure has been widely, spread in Japan, and also the increase of rich contents constructed the basis of mobile commerce. In the 3G environment, DoCoMo is planning to support the loading of various applications for the mobile phone by utilizing memory devices such as IC chips, thus enabling a mobile commerce service in bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technological and business challenges in pervasive computing

    Publication Year: 2002, Page(s):41 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Pervasive computing deals with environments where computing and communication capabilities are embedded in everyday objects and gracefully integrated with human users. At the front end of a pervasive environment, devices are installed to collect information from the physical world and react to actions from human users or other devices. Behind the front layer, information is continuously received, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XSLT stylesheet generation by example with WYSIWYG editing

    Publication Year: 2002, Page(s):150 - 159
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1078 KB) | HTML iconHTML

    XSLT plays an important role in data conversions between different XML representations. However, besides the transformations between XML data representations, conversion to an HTML document is one of the most practical tasks for XSLT, because it allows XML documents to be rendered in a human-readable form using Web browsers. We have developed XSLbyDemo, which is an XSLT stylesheet generation modul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • InfoLead - a new concept for cruising navigation technology

    Publication Year: 2002, Page(s):162 - 167
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB) | HTML iconHTML

    A new concept is described for navigating the World Wide Web effectively. Called InfoLead, it assists users in finding their way to target information by helping them to visualize a Web document space (WDS). Each document identified by the search engine as possibly having the target information is rendered into a bitmap image and placed in a WDS, which is three-dimensional. A document is positione... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectedness oriented communication: fostering a sense of connectedness to augment social relationships

    Publication Year: 2002, Page(s):186 - 193
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    This paper proposes a novel concept for network communication media, called "connectedness oriented communication". While traditional network communication technologies focus on how to precisely transmit the contents of messages, "connectedness oriented communication" is intended to support and augment social relationships among people by fostering a sense of connectedness among them. "connectedne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile commerce: vision and challenges (location and its management)

    Publication Year: 2002, Page(s):43 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Mobile computing is distributed computing that involves elements whose location changes in the course of computation. Elements may be software components such as mobile agents or moving objects-data or hardware such as palmtops and wireless phones, or users. This being a very broad definition, the common underlying issue is location and its management. The term mobile computing is very often used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and improvement of HITS algorithm for detecting Web communities

    Publication Year: 2002, Page(s):132 - 140
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1883 KB) | HTML iconHTML

    We discuss problems with the HITS (Hyperlink-Induced Topic Search) algorithm, which capitalizes on hyperlinks to extract topic-bound communities of Web pages. Despite its theoretically sound foundations, we observed that the HITS algorithm has failed in real applications. In order to understand this problem, we developed a visualization tool LinkViewer, which graphically presents the extraction pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaboration among agents in logical network of peer-to-peer services

    Publication Year: 2002, Page(s):6 - 7
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Mobile devices will have enough power to provide various kinds of services on themselves in the Internet. In these services, users buy and sell products by peer-to-peer contact on streets and shops. In order to realize the peer-to-peer services, we need a platform that satisfies the following requirements: describing a service independent of its location, and providing a service under dynamically ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous commerce - always on, always aware, always pro-active

    Publication Year: 2002, Page(s):37 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill defined. What will we do with these emerging capabilities? Stock quotes in 3-D on your heads-up display? Sports scores in stereo sound? We believe that the new kinds of services will result from three primary capabilities of ub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and evaluation of authorized access LAN sockets using PPPoE

    Publication Year: 2002, Page(s):20 - 23
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. We adopt PPPoE (Point-to-Point Protocol over Ethernet) for the user authentication, and integrate the IDENT mechanism on the PPPoE server for the user tracking. We conduct performance evaluation with respect to transfer rat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service emergence based on relationship among self-organizing entities

    Publication Year: 2002, Page(s):194 - 203
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    In this paper, we describe the Jack-in-the-Net (Ja-Net) architecture for adaptive services in a large scale, open network environment. Using biologically inspired concepts, Ja-Net achieves built-in capabilities to create/emerge services adaptively according to dynamically changing network conditions and user preferences. In Ja-Net, a service is implemented by a collection of autonomous system comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet mail transfer and check system based on intelligence mobile agents

    Publication Year: 2002, Page(s):2 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today's Internet world, but there are many dark clouds at the edge of the sunny sky. The two most well known threats are the "mail SPAM" and the "mail flooding attack". Mobile agents (MAs) are software agents that can transport themselves from a client computer to various servers for remote execution. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis

    Publication Year: 2002, Page(s):64 - 73
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    In order to detect intrusions, IDA (Intrusion Detection Agent system) initially monitors system logs in order to discover an MLSI-which is an certain event which in many cases occurs during an intrusion. If an MLSI is found, then IDA judges whether the MLSI is accompanied by an intrusion. We adopt discriminant analysis to analyze information after IDA detects an MLSI in a remote attack. Discrimina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • X-VRML-XML based modeling of virtual reality

    Publication Year: 2002, Page(s):204 - 211
    Cited by:  Papers (4)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    A new method of dynamic generation of virtual scenes for use in Internet virtual reality applications is presented. The virtual scenes are dynamically generated from virtual scene models coded in a high-level XML-based language called X-VRML. The language consists of a set of XML tags introducing new elements to programming of virtual reality. These new elements include object-orientation, access ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contents-independent EPSS for the Web site

    Publication Year: 2002, Page(s):141 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    EPSS is an Electronic Performance Support System that provides its users with on-demand access to information for the purpose of job performance improvement. We propose a framework for development of a "content-independent EPSS" on the Web, called WebAttendant. This EPSS service is built independent of Web content, in contrast to "built-in EPSS" built as part of the Web content. WebAttendant track... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposed net-space service using "InfoLead" cruising navigation technology

    Publication Year: 2002, Page(s):31 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    InfoLead cruising navigation technology allows large quantities of Web page information on the WWW to be viewed simultaneously in 3D space from a viewpoint that can be freely manipulated. We propose an implementation of a new net-space service that provides users with a visual representation of a conceptual information space ("net-space") constructed from large quantities of Web page information a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental hoarding and reintegration in mobile environments

    Publication Year: 2002, Page(s):8 - 11
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Disconnection is one of the popular techniques for operating in mobile environments and is here to stay, until long-range wireless connectivity becomes a reality. However, disconnection requires periodic hoarding and reintegration of data, which raises performance issues especially during weak connection. A common hoarding and reintegration mechanism involves complete transfer of contents. In orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Internet search applications based on VLSI associative processors

    Publication Year: 2002, Page(s):230 - 237
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (939 KB) | HTML iconHTML

    A general-purpose intelligent search agent on the Internet has been developed using VLSI associative processor (AP) chips as the hardware accelerator. The agent performs similarity-based search in a large volume of database. Although the similarity-based search processing is computationally very expensive, latency-free search has become possible due to the highly parallel maximum-likelihood search... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On updating in very short time by distributed search engines

    Publication Year: 2002, Page(s):176 - 183
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Conventional search engines employ a centralized architecture. However, such engines are not suitable for fresh information retrieval because they take a long time to collect Web pages using a Web robot (or crawler). There are also distributed search engines such as Harvest etc., but they cannot update in a very short time, e.g. a few minutes. In this paper, we propose a distributed information re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile commerce: vision and challenges

    Publication Year: 2002, Page(s): 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge sharing system using XML Linking Language and peer-to-peer technology

    Publication Year: 2002, Page(s):26 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    A knowledge sharing system that enables users to share background information about electronic content has been developed to enhance intellectual creative work and knowledge management. We call the background information "context"; it is composed of links among various contents. We try to handle the context as knowledge that is extracted from users' activities such as referring to, creating, and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in mobile agent systems

    Publication Year: 2002, Page(s):4 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    There are four possible security attacks: Attacks from host to host, from agents to hosts, from agents to agents and finally from hosts to agents. Our main concern is attacks from a malicious host on an agent. These attacks can take many forms including rerouting, spying out code, spying out data, spying out control flow, manipulation of code, manipulation of data, manipulation of control flow, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using plain base32 ASCII-compatible encoding in the local part of E-mail addresses

    Publication Year: 2002, Page(s):214 - 219
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    The structure of Internet mails (or called E-mail) is specified in RFC 2822, which specifies message bodies as flat ASCII text. An E-mail address is in the form of local-part@domain. Internet Engineering Task Force (IETF) has set up a working group on internationalized domain names (IDN). A variety of proposals have been proposed for the format of ASCII-compatible encoding (ACE), which utilizes ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.