By Topic

The 2005 Symposium on Applications and the Internet

Date 4-4 Feb. 2005

Filter Results

Displaying Results 1 - 25 of 67
  • [Cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • General Chairs' message

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (28 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee members

    Publication Year: 2005, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2005, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2005, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Panel on Service Platform and Network Infrastructure for Ubiquitous Services

    Publication Year: 2005, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel on Service Oriented Applications: Realities, Potentials and Barriers

    Publication Year: 2005, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel on Future of Internet Applications

    Publication Year: 2005, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A timer-based protocol for connected dominating set construction in IEEE 802.11 multihop mobile ad hoc networks

    Publication Year: 2005, Page(s):2 - 8
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Connected dominating set has been used widely in multihop ad hoc networks (MANET) by numerous routing, broadcast and collision avoidance protocols. Although computing minimum connected dominating set is known to be NP-hard, many protocols have been proposed to construct a suboptimal dominating set. However, these protocols are either too complicated, needing nonlocal information, or not adaptive t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DNS meets DHT: treating massive ID resolution using DNS over DHT

    Publication Year: 2005, Page(s):9 - 15
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    Object identifiers such as electronic product codes are likely to have static parts with few layers and a serial number layer. The structure does not match well-known name systems such as DNS (domain name system) and DHT (distributed hash table). To utilize object identifiers in applications such as product traceability systems, a name system to support the structure is required. The author propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A DNS-based host portability solution with localized location updating

    Publication Year: 2005, Page(s):16 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    This paper describes the design and performance study of our DNS-based portability solution. We present a design that extends the functionality of the basic DNS that enables the DNS to track the locations of its hosts. Unlike other solutions that simply update the hosts' latest IP addresses into their home domain zone files, our solution allows the locally assigned IP address to be updated into th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automatic Web wrapper for extracting information from Web sources, using clustering techniques

    Publication Year: 2005, Page(s):24 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    We present a fully automated system (wrapper) for extracting information from semistructured Web pages. The emerging need for such systems occurs due to the need for going beyond the concept of "human browsing" by automating the process of information retrieval enabling further utilization by targeted applications. The key idea in our novel system is to exploit the format of the information contai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Turning Web applications into portlets: raising the issues

    Publication Year: 2005, Page(s):31 - 37
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    A portal is a key component of an enterprise integration strategy. It provides integration at the user interface level, whereas other integration technologies support business process, functional or data integration. To this end, portlet syndication is the next wave following the successful use of content syndication in current portals. A portlet is a full-fledge application, which is rendered wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Web link analysis to discover social relationships in academic communities

    Publication Year: 2005, Page(s):38 - 45
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    To discover how precisely links among researchers' Web sites capture the ties of academic communities, this study conducts Web citation analysis. 3,878 Web sites of computer scientists and their 8,811 articles are assessed. 200 most frequently cited researchers from them are subjected to Web author cocitation analysis and compared to bibliographical data. As a result, a cluster of researchers on t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOFAnet: middleware for software distribution over Internet

    Publication Year: 2005, Page(s):48 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    The paper focuses on software distribution over the Internet, points to weaknesses of the current practice and argues for removing the weaknesses by introducing a ubiquitous distribution framework at the middleware level. The paper describes our design and implementation of such a framework, capable of supporting complex distribution and licensing models. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The fluid computing middleware: bringing application fluidity to the mobile Internet

    Publication Year: 2005, Page(s):54 - 63
    Cited by:  Papers (2)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    The fluid computing middleware allows application data to flow, as a liquid, between devices. The middleware, based on the model-view-controller design pattern, transforms a collection of devices into a cooperative platform and provides application programmers with appropriate abstractions to use generic data management services, such as data replication and synchronization of arbitrary data struc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Edge server software architecture for sensor applications

    Publication Year: 2005, Page(s):64 - 71
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Edge servers perform computation on data in addition to that performed by the application server. Typically edge servers are deployed just in front of the application server and perform simple generic functions such as load balancing. With the increasing integration of network connected sensors into Internet based applications we foresee the need for the deployment of edge servers at the other end... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FACE: a firewall analysis and configuration engine

    Publication Year: 2005, Page(s):74 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Firewalls play a critical role in protecting networks and enforcing security policies. Traditionally, firewalls have been deployed at an organization's periphery to protect it from Internet traffic. Today, however, this model no longer holds true as organizations try to safeguard themselves against other types of threats. This has led to the advent of the distributed firewall where potentially eve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive access policy for the Linux kernel

    Publication Year: 2005, Page(s):82 - 88
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB) | HTML iconHTML

    SELinux, that has stricter access control mechanisms than traditional UNIX/Linux, is thought to be an effective solution for server-side fortification. Some of SELinux's behavior toward actual incidents shows its potential as an intrusion detection system (IDS), but, still, it is nothing more than a logging facility. Further improvements are needed for SELinux, not only to detect incidents but als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ELA: a fully distributed VPN system over peer-to-peer network

    Publication Year: 2005, Page(s):89 - 92
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    In this paper, we propose a fully distributed VPN system over peer-to-peer(P2P) network called Everywhere Local Area network (ELA). ELA enables to establish private overlay network for VPN among nodes of a group without any servers. As opposed to the existing VPN systems, nodes of a group can build VPN without setting up a VPN server, and there is no problem of a single-source bottleneck and a sin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructures for collaborative networks - an application in elderly care

    Publication Year: 2005, Page(s):94 - 101
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1120 KB) | HTML iconHTML

    Applications of collaborative networks are increasingly emerging in diverse domains such as, for instance, elderly care. The growth in the elderly population imposes an urgent need to develop new approaches to care provision. Integration of a number of technologies such as multiagent systems, federated information management, safe communications, hypermedia interfaces, rich sensorial environments,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable overlay network deployment for dynamic collaborative groups

    Publication Year: 2005, Page(s):102 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Scalable deployment and management of overlay networks for collaborative groups with dynamic membership are discussed. In deploying overlay networks for such dynamic groups, unlike in pre-defined static VPN deployment, a mechanism to keep security policies in member nodes updated for membership changes and a mechanism to adaptively reconfigure a topology must be supported. However, previous approa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.