By Topic

Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on

Date 27-31 Jan. 2003

Filter Results

Displaying Results 1 - 25 of 81
  • Proceedings 2003 Symposium on Applications and the Internet Workshops (SAINT 2003 Workshps)

    Publication Year: 2003
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    The following topics are dealt with: satellite Internet technologies; service oriented architectures, frameworks and models; service interaction and collaboration; e-business; IPv6; authentication; wireless security; intrusion protection; and metadata. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2003, Page(s):407 - 409
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • An approach to Web Service compatibility in cooperative processes

    Publication Year: 2003, Page(s):95 - 100
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    This paper proposes a model for compatibility analysis to support Web Services substitution within cooperative processes. In order to properly take into account both the syntactic and the semantic issues, this model is based on the use of service descriptors and on a software tool environment to perform the semantic analysis of descriptors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When and where is a service? Investigating temporal and locative service properties

    Publication Year: 2003, Page(s):90 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    An understanding of the temporal and locative constraints surrounding a service are important for interacting with it. These constraints apply to both the service requestor and the service provider. We discuss service interactions including the less common ones of cancellation, suspension and resumption. We then discuss various kinds of temporal windows and argue for certain locative constraints. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UDDIe: an extended registry for Web services

    Publication Year: 2003, Page(s):85 - 89
    Cited by:  Papers (53)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    The Universal Description, Discovery and Integration (UDDI) is a specification for distributed Web-based information registries for Web Services. UDDI allows HTTP-enabled business services to be published, and subsequently searched, based on their interface. UDDI consists of three components: "white pages" to hold basic contact information and identifiers for a company, "yellow pages" to enable co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing governance in virtual districts

    Publication Year: 2003, Page(s):78 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    This paper presents a model that helps to specify patterns of control and coordination among different actors within a cooperative workflow. The paper explains how the model can be applied according to a methodological approach structured in three steps from requirements analysis to detailed design. A set of patterns is provided at each step to support specification activities. Patterns are design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Planning for web services the hard way

    Publication Year: 2003, Page(s):73 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    We outline a framework for performing automated discovery, composition and execution of Web services based solely on the information available in interface descriptions and service directories. In our framework we do not rely on the existence of semantic mark-up in service descriptions, thus making our approach "hard". (From a planning perspective, we tackle the problem of planning in a semantical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data storage requirements for the service oriented computing

    Publication Year: 2003, Page(s):67 - 72
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Service oriented computing and peer-to-peer (P2P) computing are emerging technologies which provide, from the architectural point of view, scalability and flexibility. From their properties both architectures are quite similar e.g. in both architectures no-one has a complete system overview and no central administration exists. Besides other challenges, this leads to the question of how data can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Establishment of a lecture environment using Internet technology via satellite communication in Asian countries

    Publication Year: 2003, Page(s):60 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    This paper proposes a higher education distance learning system using video, audio, and character-based communications via the Internet, to sites where for various reasons, sufficient network infrastructure using cables and fibers cannot be installed. The aim of this research is to create a way of delivering a lecture to those for whom it would otherwise be inaccessible. We succeeded in building a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Satellite bandwidth requirements for an MCS based multimedia conference

    Publication Year: 2003, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Videoconferencing has always been associated with deterministic networks or circuit switched networks (physical or virtual). In the past, it was almost unthinkable to send voice and video over an undeterministic network like Ethernet. However, recent trends in the field of multimedia communications (audio, video and documents) have indicated that it is not only possible but also practical to carry... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of data dissemination application using multicast over a satellite network

    Publication Year: 2003, Page(s):50 - 55
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    This paper describes the design and implementation of a data dissemination application for the satellite Internet using uni-directional links. The satellite network is suitable for multicasting, and uni-directional link routing (UDLR) technology allows ease of construction. However the conventional data sharing method is uncongenial to a UDLR network because this network has many receivers on a fl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multicast push caching system over a UDLR satellite link

    Publication Year: 2003, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    We propose an extension of the AI3 CacheBone to include a unidirectional satellite network that deploys multicast push technology of cache objects on the satellite link. The scheme aims to provide effective use of unidirectional links in order to distribute cache contents from the hub station to a large number of rim caches at the receiving ends of the satellite communication. Added to the AB Cach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization, analysis, and visualization of traffic in the Asian Internet Interconnection Initiatives (AI3) satellite-based research network test bed

    Publication Year: 2003, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    Since it started in 1995, the Asian Internet Interconnection Initiatives (AI3) project has grown into a large satellite-based research network in the Asia Pacific. All partner institutions are connected via the C-band or Ku-band channel of the JCSAT satellite. This paper evaluates the performance of the AI3 testbed in terms of bandwidth consumption, traffic flows, and measurement with the introduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metadata and new challenges

    Publication Year: 2003, Page(s):395 - 398
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    Metadata technologies and its standardizations have been developed in many fields such as library science, broadcasting, etc., and they are already in practical use. Content having metadata is easier to manage and discover resources than non-metadata contents. With the growth of the Internet, metadata has become a more important function in the efficient delivery of content to develop interoperabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lifeline support of the Internet

    Publication Year: 2003, Page(s):323 - 327
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Internet use has expanded in both social and corporate activity and is becoming indispensable to people's lives as it gains in importance and popularity. Consequently, the demand for using the Internet as a communication lifeline is increasing. In lifeline support, emergency and/or important communication is the top priority. By transferring completely emergency and important communication from ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ATM network test bench over a C-band satellite system

    Publication Year: 2003, Page(s):22 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    Asynchronous transfer mode (ATM) is widely used by many organizations to connect to a wide area network (WAN). ATM supports data, video, and voice simultaneously while providing reasonable quality of service (QoS) as well as flexible management of data traffic. This paper describes "ATM Via Satellite", a SingAREN funded project under the Singapore Broadband 21 Scheme. It was an attempt to implemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data link monitoring on the satellite based network in the Internet

    Publication Year: 2003, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    Satellite links are very sensitive to their environments, and often become unstable. Operators have to monitor satellite links continuously in order to effectively determine their status. However, monitoring satellite links over a widely spread network demands great expenditures of time, finance, and human resources. The difference in skill levels among operators is also problematic. This paper de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure aggregation for wireless networks

    Publication Year: 2003, Page(s):384 - 391
    Cited by:  Papers (22)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    An emerging class of important applications uses ad hoc wireless networks of low-power sensor devices to monitor and send information about a possibly hostile environment to a powerful base station connected to a wired network. To conserve power, intermediate network nodes should aggregate results from individual sensors. However, this opens the risk that a single compromised sensor device can ren... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Residents oriented disaster information network

    Publication Year: 2003, Page(s):317 - 322
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (731 KB) | HTML iconHTML

    Recently, risk management for the disasters such as earth quick, mountain explosion, seismic sea wave, in addition to ordinal disasters, such as typhoon, rain flooding and snow-slide has been seriously considered to keep the safety for the residents in many countries. More reliable and robust information systems than the conventional business or research oriented information networks must be const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed authentication for peer-to-peer networks

    Publication Year: 2003, Page(s):347 - 353
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in networks. Ad-hoc networks are formed in a haphazard manner. Security services for ad-hoc networks cannot assume the existence of a particular infrastructure. Peer-to-peer technology is promising in addressing security issues in ad-hoc networks. We provide a novel; cryptographically secure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic bandwidth configuration system for satellite Internet

    Publication Year: 2003, Page(s):18 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    In this paper we design and implement a dynamic bandwidth assignment and an Earth station control system for Internet-like satellite-based communication, which may require different link speeds at different times. Satellite links have limited bandwidth, and for satellite communications to work we have to assign a certain bandwidth to each Earth station. Currently, satellite links have fixed bandwi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and operation of a satellite-based broadcast IP network

    Publication Year: 2003, Page(s):31 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    This paper summarizes the advantage of satellite communication in order to build a wide-coverage broadcast IP network in conjunction with the Internet. Taking various technical factors into consideration, the broadcast IP network has been designed and built in the Asia Pacific region by using an existing satellite. Details such as those regarding broadcast capable datalink technology, Earth statio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Kerberos to the communication environment for information appliances

    Publication Year: 2003, Page(s):214 - 217
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    When IPv6 deploys, each information appliance shall have a global IP address and communicate directly with each other. Some devices may have much lower processing performance than PCs have due to various limitations (e.g. cost, physical size, power consumption). Such devices must have a security function, that is confidentiality, integrity and access control, for provision of privacy even with a h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multihoming support based on mobile node protocol LIN6

    Publication Year: 2003, Page(s):204 - 207
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    We extend the mobile network architecture protocol "LIN6", to support multihoming, and design a new application program interface (API) that enables an application to support multihoming. The LIN6's addressing architecture makes it possible to support what we call end-to-end multihoming without any inconsistency. In end-to-end multihoming, a fault-tolerant connection can be achieved relying not on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From IPv4 to IPv6: the case of OpenH323 library

    Publication Year: 2003, Page(s):196 - 199
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    We discuss our experience form porting the OpenH323 platform to IPv6. We briefly discuss the structure of the platform, and we present the various problems we faced and choices we made, regarding the easiest approach to the porting procedure, the compatibility with earlier, IPv4-only versions of the platform, the existence of tools that could aid us with the porting task and the verification of re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.