International Symposium on Applications and the Internet Workshops (SAINTW'06)

23-27 Jan. 2006

Filter Results

Displaying Results 1 - 25 of 43
  • Proceedings. International Symposium on Applications and the Internet Workshops

    Publication Year: 2006, Page(s): c1
    Cited by:  Patents (1)
    Request permission for reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • International Symposium on Applications and the Internet Workshops - Title Page

    Publication Year: 2006, Page(s):i - iii
    Request permission for reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • International Symposium on Applications and the Internet Workshops - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • International Symposium on Applications and the Internet Workshops - Table of contents

    Publication Year: 2006, Page(s):v - viii
    Request permission for reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Welcome from the Workshop Co-Chairs

    Publication Year: 2006, Page(s): ix
    Request permission for reuse | PDF file iconPDF (40 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop Message

    Publication Year: 2006, Page(s): x
    Request permission for reuse | PDF file iconPDF (30 KB) | HTML iconHTML
    Freely Available from IEEE
  • IPv6 R&D activities in WIDE Project

    Publication Year: 2006, Page(s):4 pp. - 5
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    The WIDE project, www.wide.ad.jp, is a research consortium among industry and academia. WIDE project consists of more than four hundred active researchers from more than hundred private companies and from more than forty universities. The WIDE project operates the nationwide R&D testbed, which is connected with many other R&D testbeds, and the NSPIXPs, that are the largest IXes in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An operational demonstration of a mobile network with a fairly large number of nodes

    Publication Year: 2006, Page(s):4 pp. - 9
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    The network mobility technology in the Internet area has been discussed for a long time and the specification has been finally published as RFC3963 from IETF. We had created an actual mobile network which contains a few hundreds of nodes to prove the technology works in a real environment. We confirmed that the technology works well basically however, we faced a long service disruption while movin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An L3-driven fast handover mechanism in IPv6 mobility

    Publication Year: 2006, Page(s):4 pp. - 13
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    Several fast handover mechanisms have been proposed to achieve seamless mobility in IPv6. These proposals assume that the network layer of a mobile node can use the link layer information. However, none of them defines how to abstract and utilize the link layer information. This paper defines the abstractions of the link layer information to achieve fast handover in IPv6. This paper also proposes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mill: an information management and retrieval method considering geographical location on ubiquitous environment

    Publication Year: 2006, Page(s):4 pp. - 17
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    To leverage location-related information is useful to get an in-depth perspective on environmental circumstances, traffic situations and/or other problems. To handle the large number of information and queries communication devices issue, some scalable mechanism must be required. In this paper, we propose a peer-to-peer network system called "Mill" which can efficiently handle information related ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JGN 11 (Japan Gigabit Network 11)

    Publication Year: 2006, Page(s):18 - 21
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2916 KB) | HTML iconHTML

    This paper presents a overview of JGN2, Japan Gigabit Network 2, which has been established on the end of March 2004. JGN2 was built as a successor of JGN1, which has been established by Telecommunication Advancement Organization (TAO) in 1999. First, JGN2 network structure is explained. JGN2 provides gigabit level layer one, two, three functionalities to the research communities. Layer one provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compressed high definition television (HDTV) over IPv6

    Publication Year: 2006, Page(s):4 pp. - 25
    Cited by:  Papers (1)  |  Patents (11)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    In this paper, we introduce the compressed HDTV over IPv6 system, applications, and its experiment in IPv6 network between Korea and China. We developed the compressed HDTV over IPv6 system which requires 20-25Mbps with MPEG2. The system use 720/30p or 1080i HDTV format and support IPv4/IPv6 and unicast/multicast. The compressed HDTV system provides high quality audio and video with relatively sma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application gateway to deploy high-quality video communications in various network environments

    Publication Year: 2006, Page(s):4 pp. - 29
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (713 KB) | HTML iconHTML

    Video communication is being popular by spreading broadband networks. Realization of this kind of communications is important to deploy IPv6. However, many almost of commercial video conference systems do not work in IPv6 networks. We developed an application gateway called as "PTGATE" to extend available scenes of video conferences. PTGATE has three functions: IPv4 over IPv6 tunneling to use vide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An implementation and evaluation of IPv6 end-to-end secure communication system for closed members

    Publication Year: 2006, Page(s):4 pp. - 33
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    Establishing secure channels between a pair of hosts is an attractive way when the direct exchange of important data is required. IPsec provides various security services for traffic at the IP layer so we can use it to establish secure channels between a pair of hosts. However, IPsec is difficult to use because there are many parameters to set up for secure channels, and the configuration is compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A translation method between 802.15.4 nodes and IPv6 nodes

    Publication Year: 2006, Page(s):4 pp. - 37
    Cited by:  Papers (5)  |  Patents (13)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    There are many kinds of control networks based on non-IP, such as BA (building automation), FA (factory automation) and PA (process automation). The IPv6 and wireless technologies are expected to improve those networks. The IEEE 802.15.4 is a candidate for wireless technology in control networks because of its feature, e.g. low power consumption and small implementation. Seamless communication bet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Problems on IPv4-IPv6 network transition

    Publication Year: 2006, Page(s):5 pp. - 42
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    IPv6 (Internet protocol version 6) is now available in various OSs and applications. It is also deployed in major ISP backbone networks. Although most of all IPv6 features work as they were designed, we may have potential problems with them and they might exist in IPv4-IPv6 dual stack environment. On the other hand, we don't have much opportunity to exchange enough information about dual stack net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fixing DNS misbehavior hindering IPv6 deployment

    Publication Year: 2006, Page(s):4 pp. - 47
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    During the course to deploy IPv6, we found several critical implementation and operational issues which distract user and possibly prevent wider deployment of IPv6. Among the problems we noticed, domain name system (DNS) related issues are significant. Some of the problems cause longer delay during the process to make a connection to a given node. In worst case, the delay is 60 seconds or more. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronization of RFID readers for dense RFID reader environments

    Publication Year: 2006, Page(s):4 pp. - 51
    Cited by:  Papers (23)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    For a dense RFID reader deployment, such as in warehouse RFID deployment, where hundreds of antennas are positioned in a building, the interference between all these readers must be studied carefully to avoid severe reader collisions. Strict RFID regulations and standards have been imposed, trying to address the problem of reader collision and also the problem of RFID devices interfering with othe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental study on UHF passive RFID readability degradation

    Publication Year: 2006, Page(s):4 pp. - 55
    Cited by:  Papers (13)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (842 KB) | HTML iconHTML

    Readability of passive RFID fundamentally depends on the tag empowering. The minimum required power, usually referred to as sensitivity, depends on the chip and antenna manufacturing. The sensitivity affects the readability but it is not the sole determinant of readability. The readability of RFID comprises a number of factors, particularly in the UHF band. This paper proposes a classification of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Positioning analysis of multiple antennas in a dense RFID reader environment

    Publication Year: 2006, Page(s):4 pp. - 59
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    The study and analysis of RFID antenna positioning is important for supply chain large-scale deployment. In a dense reader environment, there are multiples of RFID readers and readers interference reduces the reliability and efficiency of the RFID system. In the worst case, the interference would paralyse an entire RFID system. This paper explores antenna positioning in an RFID deployment zone and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of low-power baseband-processor for RFID tag

    Publication Year: 2006, Page(s):4 pp. - 63
    Cited by:  Papers (12)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    This paper analyzes the power consumption of an RFID tag and presents a new architecture of a low-power baseband-processor for this special passive tag. The tag consists of a power reception system, an emitter/receiver analog module, an EEPROM and a low-power baseband-processor, compatible with the newest EPCtrade C1G2 UHF RFID protocol. Meanwhile some novel and advanced low-power technologies are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low cost object identification in RFID via dynamic Markov chain & two time scale SPSA

    Publication Year: 2006, Page(s):4 pp. - 67
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    The focus of this paper is to reduce the cost of RFID systems when the full blown model of RFID is not cost effective. The question of low cost approach comes into picture when we are more concerned with using this technique as a simple identity information collector, and embedding it into the existing IT system with minimum disruption. Our proposed scheme is an enhanced anti-collision scheme whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anti-collision performance of Gen2 air protocol in random error communication link

    Publication Year: 2006, Page(s):4 pp. - 71
    Cited by:  Papers (20)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    When a multitude of RFID tags are in the interrogating field, an anti-collision technology must be used. In literatures, the reading performance was mainly investigated on the error-free communication links between reader and tags. In the practical situations, particularly where a number of readers and other wireless devices share the same frequency band, the performance on the erroneous links wou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product specific security features based on RFID technology

    Publication Year: 2006, Page(s):4 pp. - 75
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    In today's business, there is a growing problem of product counterfeiting and piracy. Criminals have considerable expertise and resources that enable them to produce and sell counterfeits of products. The proposed solution aims at providing unique and secure authentication mechanisms of a given item, in order to distinguish between genuine products and counterfeits. As underlying technology, the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extendable product traceability system from small start

    Publication Year: 2006, Page(s):4 pp. - 79
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    A cost-effective and easy way to introduce a product traceability system is to start from a small system and gradually extend it to large-scale systems. Traceability systems used in existing field tests are unsuitable for large-scale deployment because they use a single, centralized database. This paper describes a extendable traceability system proposed by Toshiba that employs distributed databas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.