Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002)

28 Jan.-1 Feb. 2002

Filter Results

Displaying Results 1 - 25 of 46
  • Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002)

    Publication Year: 2002
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The following topics were discussed: Agents on the Internet; collaboration technology; Internet based data engineering; Internet security; mobile computing; multimedia computing; operation technology and performance; parallel and distributed computing; services for information society and e-economy, and software engineering on the Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet mail transfer and check system based on intelligence mobile agents

    Publication Year: 2002, Page(s):2 - 3
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today's Internet world, but there are many dark clouds at the edge of the sunny sky. The two most well known threats are the "mail SPAM" and the "mail flooding attack". Mobile agents (MAs) are software agents that can transport themselves from a client computer to various servers for remote execution. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in mobile agent systems

    Publication Year: 2002, Page(s):4 - 5
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    There are four possible security attacks: Attacks from host to host, from agents to hosts, from agents to agents and finally from hosts to agents. Our main concern is attacks from a malicious host on an agent. These attacks can take many forms including rerouting, spying out code, spying out data, spying out control flow, manipulation of code, manipulation of data, manipulation of control flow, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaboration among agents in logical network of peer-to-peer services

    Publication Year: 2002, Page(s):6 - 7
    Cited by:  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Mobile devices will have enough power to provide various kinds of services on themselves in the Internet. In these services, users buy and sell products by peer-to-peer contact on streets and shops. In order to realize the peer-to-peer services, we need a platform that satisfies the following requirements: describing a service independent of its location, and providing a service under dynamically ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental hoarding and reintegration in mobile environments

    Publication Year: 2002, Page(s):8 - 11
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Disconnection is one of the popular techniques for operating in mobile environments and is here to stay, until long-range wireless connectivity becomes a reality. However, disconnection requires periodic hoarding and reintegration of data, which raises performance issues especially during weak connection. A common hoarding and reintegration mechanism involves complete transfer of contents. In orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A "single authoring" programming model: the interaction logic

    Publication Year: 2002, Page(s):12 - 13
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    For the mobile Internet, new content and applications are developed with the intent of delivering it through many different channels with different characteristics. Therefore, such content and applications must be adapted and optimized to each channel. Also, since new devices and content emerge continuously, this adaptation must be made to work for new devices not originally envisioned. In additio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of a kernel monitoring system for network servers

    Publication Year: 2002, Page(s):14 - 15
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    From the standpoint of server operation, performance measurement of the server is important. One of the major parts of the measurement is kernel monitoring, and most server administrators have been legacy tools that can influence server performance by the load itself. We describe the design and implementation of a new kernel monitoring system that does not influence server performance by dividing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast over satellite

    Publication Year: 2002, Page(s):16 - 19
    Cited by:  Papers (2)  |  Patents (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Satellite links have wide area coverage and are used for international backbone links. The Asian Internet Interconnection Initiatives (AI/sup 3/) Project is one of the most operational satellite based R & D networks in Southeast Asia. IP multicast is the important technology for the future Internet. Broadcast capability of the satellite link is suitable for the IP multicast application. Uni Di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and evaluation of authorized access LAN sockets using PPPoE

    Publication Year: 2002, Page(s):20 - 23
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. We adopt PPPoE (Point-to-Point Protocol over Ethernet) for the user authentication, and integrate the IDENT mechanism on the PPPoE server for the user tracking. We conduct performance evaluation with respect to transfer rat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge sharing system using XML Linking Language and peer-to-peer technology

    Publication Year: 2002, Page(s):26 - 27
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    A knowledge sharing system that enables users to share background information about electronic content has been developed to enhance intellectual creative work and knowledge management. We call the background information "context"; it is composed of links among various contents. We try to handle the context as knowledge that is extracted from users' activities such as referring to, creating, and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A VoiceXML framework for reusable dialog components

    Publication Year: 2002, Page(s):28 - 30
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    VoiceXML or Voice extensible Markup Language, is a special markup language designed to facilitate the creation of speech application, especially interactive voice response (IVR) application. The VoiceXML Forum has submitted VoiceXML 1.0 to the W3C Voice Browser activity. As part of its activities, the W3C Voice Browser working group has identified reusable dialog components as an item worth studyi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposed net-space service using "InfoLead" cruising navigation technology

    Publication Year: 2002, Page(s):31 - 32
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    InfoLead cruising navigation technology allows large quantities of Web page information on the WWW to be viewed simultaneously in 3D space from a viewpoint that can be freely manipulated. We propose an implementation of a new net-space service that provides users with a visual representation of a conceptual information space ("net-space") constructed from large quantities of Web page information a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental results of pattern-based automatic program generator

    Publication Year: 2002, Page(s):33 - 34
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    We describe the pattern-based automatic program generator. This approach that mitigates restrictions between the general package approach and the application-oriented approach in software development is described. It provides efficient solutions for developing application-oriented systems. Experimental results show that our approach results in significant improvement compared to traditional softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile commerce: vision and challenges

    Publication Year: 2002, Page(s): 36
    Request permission for reuse | PDF file iconPDF (180 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous commerce - always on, always aware, always pro-active

    Publication Year: 2002, Page(s):37 - 38
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill defined. What will we do with these emerging capabilities? Stock quotes in 3-D on your heads-up display? Sports scores in stereo sound? We believe that the new kinds of services will result from three primary capabilities of ub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DoCoMo's vision on mobile commerce

    Publication Year: 2002, Page(s):39 - 40
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    By the introduction of NIT DoCoMo's "i-mode", mobile Internet access infrastructure has been widely, spread in Japan, and also the increase of rich contents constructed the basis of mobile commerce. In the 3G environment, DoCoMo is planning to support the loading of various applications for the mobile phone by utilizing memory devices such as IC chips, thus enabling a mobile commerce service in bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technological and business challenges in pervasive computing

    Publication Year: 2002, Page(s):41 - 42
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Pervasive computing deals with environments where computing and communication capabilities are embedded in everyday objects and gracefully integrated with human users. At the front end of a pervasive environment, devices are installed to collect information from the physical world and react to actions from human users or other devices. Behind the front layer, information is continuously received, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile commerce: vision and challenges (location and its management)

    Publication Year: 2002, Page(s):43 - 44
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Mobile computing is distributed computing that involves elements whose location changes in the course of computation. Elements may be software components such as mobile agents or moving objects-data or hardware such as palmtops and wireless phones, or users. This being a very broad definition, the common underlying issue is location and its management. The term mobile computing is very often used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge creation through task model and information organizing method using image/drawing expression

    Publication Year: 2002, Page(s):46 - 53
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    The rapid growth of information network technology that led to globalization and leaner organization has made knowledge an important asset. For a business organization to remain on competition, there is a need to acquire knowledge according to the context of their business. This is particularly true in the product design field because designers frequently use images and drawings containing semanti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Internet enterprise

    Publication Year: 2002, Page(s):54 - 62
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    In this paper we present our vision of the Internet enterprise: a highly interoperable, virtual enterprise infrastructure for individuals, small businesses, and large corporations. In the Internet enterprise (IE), any service provider can enable its business to be programmatically accessible on the Internet (becomes an e-service). Enabled by a scalable brokering service and an inter-organizational... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote attack detection method in IDA: MLSI-based intrusion detection using discriminant analysis

    Publication Year: 2002, Page(s):64 - 73
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    In order to detect intrusions, IDA (Intrusion Detection Agent system) initially monitors system logs in order to discover an MLSI-which is an certain event which in many cases occurs during an intrusion. If an MLSI is found, then IDA judges whether the MLSI is accompanied by an intrusion. We adopt discriminant analysis to analyze information after IDA detects an MLSI in a remote attack. Discrimina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of unauthorized access tracing system

    Publication Year: 2002, Page(s):74 - 81
    Cited by:  Papers (6)  |  Patents (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    We propose a hop-by-hop IP traceback method that can reliably trace the source of an attack. In this paper, we describe the development and the evaluation of our prototype system. The main features of our proposed method are the packet feature, which is composed of specific packet information contained in a packet for identification of an unauthorized packet, and an algorithm using the datalink id... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new intrusion detection method based on process profiling

    Publication Year: 2002, Page(s):82 - 90
    Cited by:  Papers (18)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    There are two well-known models for intrusion detection-anomaly intrusion detection (AID) model and misuse intrusion detection (MID) model. The former analyzes user behavior and the statistics of a process in a normal situation, and checks whether the system is being used in a different manner. The latter maintains a database of known intrusion techniques and detects intrusion by comparing behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive behaviors of intelligent agents based on neural semantic knowledge

    Publication Year: 2002, Page(s):92 - 99
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    This paper presents a new approach that combines the neural network technology with the semantic network-based knowledge representation in realizing the intelligent, emotional, adaptive and believable behaviors of consulting personal agents. This knowledge representation framework is deployed in the CyMON agent platform to develop intelligent assistant, consultant and marketing agents for a variet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A component-based approach for integrating mobile agents into the existing web infrastructure

    Publication Year: 2002, Page(s):100 - 108
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    Mobile agents provide a new abstraction for deploying functionality over the existing internet infrastructure. During the last two years, we have been working on a project that tries to overcome some of the limitations found in terms of programmability and usability of the mobile agent paradigm in real applications. In the M&M framework there are no agent platforms. Instead applications become... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.