Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002)

1-1 Feb. 2002

Filter Results

Displaying Results 1 - 25 of 46
  • Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002)

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The following topics were discussed: Agents on the Internet; collaboration technology; Internet based data engineering; Internet security; mobile computing; multimedia computing; operation technology and performance; parallel and distributed computing; services for information society and e-economy, and software engineering on the Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):281 - 282
    Request permission for commercial reuse | PDF file iconPDF (198 KB)
    Freely Available from IEEE
  • Implementation and evaluation of authorized access LAN sockets using PPPoE

    Publication Year: 2002, Page(s):20 - 23
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. We adopt PPPoE (Point-to-Point Protocol over Ethernet) for the user authentication, and integrate the IDENT mechanism on the PPPoE server for the user tracking. We conduct performance evaluation with respect to transfer rat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental hoarding and reintegration in mobile environments

    Publication Year: 2002, Page(s):8 - 11
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Disconnection is one of the popular techniques for operating in mobile environments and is here to stay, until long-range wireless connectivity becomes a reality. However, disconnection requires periodic hoarding and reintegration of data, which raises performance issues especially during weak connection. A common hoarding and reintegration mechanism involves complete transfer of contents. In orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A virtual overlay network for integrating home appliances

    Publication Year: 2002, Page(s):246 - 253
    Cited by:  Papers (28)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1529 KB) | HTML iconHTML

    Various home appliances and personal appliances are expected to be connected to the Internet in the near future. However, the conventional IP protocol is not expected to be sufficient for connecting these appliances without protocol translation. Since adding new functionalities to the IP protocol is too generic for most applications, we believe that future networks should be customized according t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast over satellite

    Publication Year: 2002, Page(s):16 - 19
    Cited by:  Papers (1)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Satellite links have wide area coverage and are used for international backbone links. The Asian Internet Interconnection Initiatives (AI3) Project is one of the most operational satellite based R & D networks in Southeast Asia. IP multicast is the important technology for the future Internet. Broadcast capability of the satellite link is suitable for the IP multicast application. U... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaboration among agents in logical network of peer-to-peer services

    Publication Year: 2002, Page(s):6 - 7
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Mobile devices will have enough power to provide various kinds of services on themselves in the Internet. In these services, users buy and sell products by peer-to-peer contact on streets and shops. In order to realize the peer-to-peer services, we need a platform that satisfies the following requirements: describing a service independent of its location, and providing a service under dynamically ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using plain base32 ASCII-compatible encoding in the local part of E-mail addresses

    Publication Year: 2002, Page(s):214 - 219
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    The structure of Internet mails (or called E-mail) is specified in RFC 2822, which specifies message bodies as flat ASCII text. An E-mail address is in the form of local-part@domain. Internet Engineering Task Force (IETF) has set up a working group on internationalized domain names (IDN). A variety of proposals have been proposed for the format of ASCII-compatible encoding (ACE), which utilizes ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new intrusion detection method based on process profiling

    Publication Year: 2002, Page(s):82 - 90
    Cited by:  Papers (18)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    There are two well-known models for intrusion detection-anomaly intrusion detection (AID) model and misuse intrusion detection (MID) model. The former analyzes user behavior and the statistics of a process in a normal situation, and checks whether the system is being used in a different manner. The latter maintains a database of known intrusion techniques and detects intrusion by comparing behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile commerce: vision and challenges (location and its management)

    Publication Year: 2002, Page(s):43 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Mobile computing is distributed computing that involves elements whose location changes in the course of computation. Elements may be software components such as mobile agents or moving objects-data or hardware such as palmtops and wireless phones, or users. This being a very broad definition, the common underlying issue is location and its management. The term mobile computing is very often used ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic configuration of agent migration protocols for the Internet

    Publication Year: 2002, Page(s):119 - 126
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    This paper presents a framework for building network protocols for migrating mobile agents over the Internet. The framework allows network protocols for agent migration to be naturally implemented within mobile agents and then dynamically deployed at network hosts by migrating the agents that perform the protocols. It is built on a hierarchical mobile agent system, called MobileSpaces, and several... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and evaluation of dynamic protocol selection architecture for reliable multicast

    Publication Year: 2002, Page(s):262 - 269
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    IP multicast is an effective technology for one-to-many and many-to-many communications. Multicast applications use UDP (User Datagram Protocol) as transport protocol and have responsibility for reliable communications. It is difficult to apply these implementations to other applications because implementations of multicast protocols have been pushed into application programs. We propose a reliabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A VoiceXML framework for reusable dialog components

    Publication Year: 2002, Page(s):28 - 30
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    VoiceXML or Voice extensible Markup Language, is a special markup language designed to facilitate the creation of speech application, especially interactive voice response (IVR) application. The VoiceXML Forum has submitted VoiceXML 1.0 to the W3C Voice Browser activity. As part of its activities, the W3C Voice Browser working group has identified reusable dialog components as an item worth studyi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of a kernel monitoring system for network servers

    Publication Year: 2002, Page(s):14 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    From the standpoint of server operation, performance measurement of the server is important. One of the major parts of the measurement is kernel monitoring, and most server administrators have been legacy tools that can influence server performance by the load itself. We describe the design and implementation of a new kernel monitoring system that does not influence server performance by dividing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in mobile agent systems

    Publication Year: 2002, Page(s):4 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    There are four possible security attacks: Attacks from host to host, from agents to hosts, from agents to agents and finally from hosts to agents. Our main concern is attacks from a malicious host on an agent. These attacks can take many forms including rerouting, spying out code, spying out data, spying out control flow, manipulation of code, manipulation of data, manipulation of control flow, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive behaviors of intelligent agents based on neural semantic knowledge

    Publication Year: 2002, Page(s):92 - 99
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    This paper presents a new approach that combines the neural network technology with the semantic network-based knowledge representation in realizing the intelligent, emotional, adaptive and believable behaviors of consulting personal agents. This knowledge representation framework is deployed in the CyMON agent platform to develop intelligent assistant, consultant and marketing agents for a variet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contents-independent EPSS for the Web site

    Publication Year: 2002, Page(s):141 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    EPSS is an Electronic Performance Support System that provides its users with on-demand access to information for the purpose of job performance improvement. We propose a framework for development of a "content-independent EPSS" on the Web, called WebAttendant. This EPSS service is built independent of Web content, in contrast to "built-in EPSS" built as part of the Web content. WebAttendant track... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design of a next generation IX using MPLS technology

    Publication Year: 2002, Page(s):238 - 245
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    An IX (Internet Exchange) is a mechanism to interconnect many networks to each other. Currently, an ISP (Internet service provider) establishes numerous interconnections to other ISP. Although 'private peering' is one way for an ISP to interconnect to other ISP with individual links, connecting to an IX is a more efficient way to establish and maintain a large number of peerings (or 'public peerin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous commerce - always on, always aware, always pro-active

    Publication Year: 2002, Page(s):37 - 38
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill defined. What will we do with these emerging capabilities? Stock quotes in 3-D on your heads-up display? Sports scores in stereo sound? We believe that the new kinds of services will result from three primary capabilities of ub... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectedness oriented communication: fostering a sense of connectedness to augment social relationships

    Publication Year: 2002, Page(s):186 - 193
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    This paper proposes a novel concept for network communication media, called "connectedness oriented communication". While traditional network communication technologies focus on how to precisely transmit the contents of messages, "connectedness oriented communication" is intended to support and augment social relationships among people by fostering a sense of connectedness among them. "connectedne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inferring traffic flow characteristics from aggregated-flow measurement

    Publication Year: 2002, Page(s):256 - 261
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    In the Internet, a statistical perspective of global traffic flows has been considered as an important key to network management. Nonetheless, it is expensive or sometime difficult to measure statistics of each flow separately. Therefore, it is of practical importance to infer unobservable statistical characteristics of individual flows from characteristics of the aggregated-flows that are easily ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge sharing system using XML Linking Language and peer-to-peer technology

    Publication Year: 2002, Page(s):26 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    A knowledge sharing system that enables users to share background information about electronic content has been developed to enhance intellectual creative work and knowledge management. We call the background information "context"; it is composed of links among various contents. We try to handle the context as knowledge that is extracted from users' activities such as referring to, creating, and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A "single authoring" programming model: the interaction logic

    Publication Year: 2002, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    For the mobile Internet, new content and applications are developed with the intent of delivering it through many different channels with different characteristics. Therefore, such content and applications must be adapted and optimized to each channel. Also, since new devices and content emerge continuously, this adaptation must be made to work for new devices not originally envisioned. In additio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet mail transfer and check system based on intelligence mobile agents

    Publication Year: 2002, Page(s):2 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today's Internet world, but there are many dark clouds at the edge of the sunny sky. The two most well known threats are the "mail SPAM" and the "mail flooding attack". Mobile agents (MAs) are software agents that can transport themselves from a client computer to various servers for remote execution. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient construction of variable-stride multibit tries for IP lookup

    Publication Year: 2002, Page(s):220 - 227
    Cited by:  Papers (26)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    Srinivasan and Varghese (1999) have proposed the use of multibit tries to represent routing tables used for Internet (IP) address lookups. They propose an O(n *W2* k) dynamic programming algorithm to determine the strides for an optimal variable-stride trie that has at most k levels. Here, n is the number of prefixes in the routing table and W is the length of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.