By Topic

2009 Ninth Annual International Symposium on Applications and the Internet

20-24 July 2009

Filter Results

Displaying Results 1 - 25 of 86
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (308 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Workshop Co-chairs

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chair of Student Session

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (78 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Program Committee and Reviewers

    Publication Year: 2009, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • 2009 IEEE/IPSJ COMPSAC/SAINT Joint Concluding Plenary Panel

    Publication Year: 2009, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Joint Panel Description Emerging Pervasive Systems - Research Challenges and Proposed Solutions

    Publication Year: 2009, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Message from the Organizers of FIST 2009

    Publication Year: 2009, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of UNECAS 2009

    Publication Year: 2009, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of ITeS 2009

    Publication Year: 2009, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (56 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of MidArc 2009

    Publication Year: 2009, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of PASN 2009

    Publication Year: 2009, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (57 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of ConCom 2009

    Publication Year: 2009, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (81 KB) | HTML iconHTML
    Freely Available from IEEE
  • TCP Throughput Estimation by Lightweight Variable Packet Size Probing in CDMA2000 1x EV-DO Network

    Publication Year: 2009, Page(s):1 - 8
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    TCP throughput is one of the major communication quality metrics. In order to grasp this metric by active measurement while imposing a lower load, various estimation techniques have been proposed. These techniques are categorized as either equation-based or history-based; here we focus on the latter. Conventional history-based estimation techniques target a wired environment and estimate temporall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Layer Based Anomaly Detection in Wireless Mesh Networks

    Publication Year: 2009, Page(s):9 - 15
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    Wireless mesh networking has been a cost-effective technology that provides wide-coverage broadband wireless network services. However, security and privacy in this proliferated network environment have not been widely studied. In this work, we propose a cross-layer based anomaly intrusion detection system (IDS) to accommodate the integrated property of routing protocols with link information in w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operation Prediction for Context-Aware User Interfaces of Mobile Phones

    Publication Year: 2009, Page(s):16 - 22
    Cited by:  Papers (6)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1150 KB) | HTML iconHTML

    Nowadays mobile phones are multifunctional devices that provide us with various useful applications and services anytime and anywhere. However, people are sometimes unable to access an appropriate application due to the complexity and depth of the menu structure. This paper focuses on a feasibility study of operation prediction using observable attributes to realize self-optimization functionality... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Enhanced Location Privacy Framework with Mobility Using Host Identity Protocol

    Publication Year: 2009, Page(s):23 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Location privacy is one of the problems involved in IP mobility. There are two proposed frameworks for this problem based on Host Identity Protocol (HIP); HIP Location Privacy Framework provides partial location privacy with mobility, while BLIND provides complete location privacy without mobility. In this paper, we integrate their strong points, i.e. complete location privacy with mobility. Our f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Online Resources in Assisting Phishing Detection

    Publication Year: 2009, Page(s):30 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Phishing is an attempt to fraudulently acquire userspsila sensitive information, such as passwords or financial information, by masquerading as a trustworthy entity in online transactions. Recently, a number of researchers have proposed using external online resources like the Google Page Rank system to assist phishing detection. The advantage of such an approach is that the detection capability w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange

    Publication Year: 2009, Page(s):37 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (993 KB) | HTML iconHTML

    In this paper we design a certified e-mail exchange system based on a simultaneous secret exchange protocol. Among others, we use the protocol proposed by Okamoto and Ohta since the number of rounds it requires is relatively small compared to other similar protocols. We first modify the method of Okamoto and Ohta to further reduce the number of rounds without breaking the fairness condition too mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Instruction Method for Displaying Trajectory of an Object in Remote Collaborative MR on the Basis of Changes in Relative Coordinates

    Publication Year: 2009, Page(s):43 - 49
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    We aim at developing a remote collaborative Mixed Reality (MR) system targeting the interaction between instructors and workers. In this system, both instructors and workers have their own real objects, and the instructor shows the worker how to operate the object by moving his own real object. Since the movement of the instructor's object is displayed as a CG image of the trajectory overlapping t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.