By Topic

Applications and the Internet, 2003. Proceedings. 2003 Symposium on

Date 27-31 Jan. 2003

Filter Results

Displaying Results 1 - 25 of 63
  • Proceedings 2003 Symposium on Applications and the Internet

    Publication Year: 2003
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB)

    The following topics are dealt with: mobile Internet; collaboration technology; Internet computing models; Internet operation and performance; Internet applications; Web caching; Internet security; peer-to-peer models; network measurements; network and protocol architecture; performance evaluation; information retrieval and fusion; e-services; and Internet agents. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadband content distribution service and technologies (panel introduction)

    Publication Year: 2003, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • Web applications and web services:supporting technologies (panel introduction)

    Publication Year: 2003, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2003, Page(s):429 - 430
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Experimenting with a flexible awareness management abstraction for virtual collaboration spaces

    Publication Year: 2003, Page(s):56 - 64
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    The awareness management problem is still very far from solved. It is difficult to create an abstraction that's flexible enough to be used in the wide range of applications that deal with Awareness management problems. This paper describes a generic object-oriented abstraction for the problem of awareness management in Collaborative Virtual Environments (CVEs). The described abstraction allows us ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic warnings and feature interaction in Call Processing Language on Internet telephony

    Publication Year: 2003, Page(s):283 - 290
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    The Call Processing Language (CPL, RFC2824) is an XML-based language, which provides a flexible means of creating end-user services in Internet telephony (VoIP). However, the service description by non-experts does not always guarantee reliable services and, thus, could be a cause of system faults. This paper first proposes six classes of semantic warnings within CPL scripts. For a given CPL scrip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay and jitter minimization in active diffusion computing

    Publication Year: 2003, Page(s):292 - 300
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (823 KB) | HTML iconHTML

    In the active computation paradigm the problem of delay and jitter control takes a complex form from its classical counterpart. Stream processing time also becomes a new factor and the concept of path bandwidth degenerates as data volume can change while in transit. The paper presents a dynamic feedback based algorithm for this problem. We have recently implemented a concept transport system, wher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bilateral e-services negotiation under uncertainty

    Publication Year: 2003, Page(s):352 - 355
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    This paper presents an approach for bilateral negotiation between an e-service provider and an e-service consumer in the presence of uncertainty. The approach can be applied to any type of negotiation, including buyer/seller negotiation. The type of uncertainty discussed is uncertainty of what offers and counteroffers to make, at a particular point in the negotiation. The approach makes use of rep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mockup-driven fast-prototyping methodology for Web applications

    Publication Year: 2003, Page(s):410 - 413
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Web application analysis and development can be highly complicated without an appropriate implementation model. This paper presents a mockup-driven fast-prototyping methodology (MODF-M) to elicit system requirements and expedite development of Web applications. Seamlessly incorporated with Web technologies such as J2EE, XML and EJB, MODFM provides a walk-through process to synergistically integrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On control parameters tuning for active queue management mechanisms using multivariate analysis

    Publication Year: 2003, Page(s):120 - 127
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2168 KB) | HTML iconHTML

    In recent years, AQM (Active Queue Management) mechanisms, which support the end-to-end congestion control mechanism of TCP by performing congestion control at a router have been actively studied by many researchers. AQM mechanisms usually have several control parameters, and their effectiveness depend on a setting of those control parameters. Therefore, issues on parameter tuning of several AQM m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Out-of-sequence packet arrivals due to layer 2 ARQ and its impact on TCP performance in W-CDMA networks

    Publication Year: 2003, Page(s):398 - 401
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Data transmission over wireless networks has attracted more attention with the growth of the Internet and wireless networks. However, TCP is tuned to perform well in wired networks where the error rates are very low and packet losses occur mostly because of congestion. Therefore, the performance of TCP can be severely affected by high bit error rate characterizing wireless links. We clarify the pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable protocol for deadlock and livelock free co-allocation of resources in Internet computing

    Publication Year: 2003, Page(s):66 - 73
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    Computing over the Internet is becoming increasingly popular. With the emerging infrastructures such as computational grids, it is possible to develop applications that support various Internet-wide collaborations through seamlessly harnessing appropriate Internet resources. Yet, as Internet computing is becoming pervasive, it also presents a number of new challenges in designing efficient resourc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NTM-Agent: text mining agent for net auction

    Publication Year: 2003, Page(s):356 - 359
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Net auctions have been widely utilized with the recent development of the Internet. However, there are too many items for bidders to select the most suitable. We aim at supporting bidders on net auctions by automatically generating a table containing features of items for comparison. We constructed a system called NTM-Agent (Net Auction Text Mining Agent). The system collects information of items,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design considerations for hierarchical Web proxy server using iSCSI

    Publication Year: 2003, Page(s):414 - 417
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks. Additionally, due to emerging network technologies, cooperative Web caching among proxies shows great potential for becoming an effective approach for reducing Web document access latencies. Nevertheless, it is not widely deployed due to the overhead of existing protocols such... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of the person-centered approach for personal task management

    Publication Year: 2003, Page(s):234 - 240
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (442 KB) | HTML iconHTML

    This paper proposes a human-centered approach for personal task management in which people can decide management of their tasks according to their environments, including their subjective and multivalent judgement and human relationships. In our approach task management is modeled as a decision-making process on their own resources. The human decision-making process consists of three types of acti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling compatibility between TCP Reno and TCP Vegas

    Publication Year: 2003, Page(s):301 - 308
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Despite research showing the superiority of TCP Vegas over TCP Reno, Reno is still the most widely deployed variant of TCP This predicament is due primarily to the alleged incompatibility of Vegas with Reno. While Vegas in isolation performs better with respect to overall network utilization, stability, fairness, throughput and packet loss, and burstiness; its performance is generally mediocre in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of a minimal-state processing search algorithm for link scheduling problems in packet radio networks

    Publication Year: 2003, Page(s):128 - 135
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    In a large scale communication network, packets are transmitted from source nodes to destinations by going through several nodes on routes connecting them, because each node usually does not have a direct link to every node in the network. To maximize the usability in the network, the problems of selecting a transmission route for each connection request and of scheduling the link activations such... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying junk electronic mail in Microsoft outlook with a support vector machine

    Publication Year: 2003, Page(s):166 - 169
    Cited by:  Papers (2)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    In this paper, we utilize a simple support vector machine to identify commercial electronic mail. The use of a personalized dictionary for model training provided a classification accuracy of 96.69%, while a much larger system dictionary achieved 95.26%. The classification system was subsequently implemented as an add-in for Microsoft Outlook XP, providing sorting and grouping capabilities using O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting spatial knowledge from the web

    Publication Year: 2003, Page(s):326 - 333
    Cited by:  Papers (2)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (422 KB) | HTML iconHTML

    The content of the World-Wide Web is pervaded by information of a geographical or spatial nature, particularly location information such as addresses, postal codes, and telephone numbers. We present a system for extracting spatial knowledge from collections of Web pages gathered by Web-crawling programs. For each page determined to contain location information, we apply geocoding techniques to com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Demonstrating the ABELS system using real-world scenarios

    Publication Year: 2003, Page(s):74 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    The explosive growth of the Internet has led to new opportunities for developing and integrating large, data-driven applications such as simulations. The Agent-Based Environment for Linking Simulations (ABELS) framework allows the formation of a dynamic "data and simulation cloud" of independent networked resources. Specifically, ABELS provides run-time matching of data producers and consumers and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A policy-based mobile agent infrastructure

    Publication Year: 2003, Page(s):370 - 379
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    The mobile agent paradigm seems to provide promising solutions for developing applications in the Internet environment. However, the adoption of mobile agents introduces specific problems related to the specification and control of agent migration strategies. The paper advocates a policy-based solution to support the flexible management and dynamic configurability of agent mobility behaviour. Our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Filtering contents by efficient evaluation of XPath expressions

    Publication Year: 2003, Page(s):148 - 155
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    The need for selection of Contents based on personal data is increasing. Filtering systems using XML documents as users' profiles and XPath as contents' conditions are developed. They need efficient algorithms for evaluating a large number of XPath. However existing algorithms have limitations in that (1) they cannot handle the full XPath language because their execution models are event-based, (2... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BPMM: a grid-based architectural framework for business process meta management

    Publication Year: 2003, Page(s):84 - 91
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Business process management (BPM) tools and techniques are used in a large number of commercial institutions for automating flows of products and services within corporate and without. It is not uncommon that business processes are involved with versatile collaboration, complicated computation and geographical distribution of data. Hence, it is necessary to combine different technologies to implem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agent based realization of a distance evaluation system

    Publication Year: 2003, Page(s):362 - 369
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    The growth of the Internet has led to new avenues for distance education. A crucial factor for the success of distance education is effective mechanisms for distance evaluation. Existing computer based evaluation mechanisms, such as Web based testing, rely principally on the client-server model. Such mechanisms usually do not scale well and do not fully support features like evaluation of subjecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reliable multicast protocol for unidirectional satellite link

    Publication Year: 2003, Page(s):390 - 393
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    IP multicast over a unidirectional satellite network provides a low cost solution that provides effective one-to-many communication with a wide area of coverage. However, IP multicast does not provide reliable data transfer which makes it unsuitable for distributing software or a large amount of textual information over the network. We propose a reliable multicast protocol which is designed specif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.