2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.最新文献

筛选
英文 中文
Challenges in intrusion detection for wireless ad-hoc networks 无线自组织网络入侵检测的挑战
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210188
P. Brutch, C. Ko
{"title":"Challenges in intrusion detection for wireless ad-hoc networks","authors":"P. Brutch, C. Ko","doi":"10.1109/SAINTW.2003.1210188","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210188","url":null,"abstract":"This paper presents a brief survey of current research in intrusion detection for wireless ad-hoc networks. In addition to examining the challenges of providing intrusion detection in this environment, this paper reviews current efforts to detect attacks against the ad-hoc routing infrastructure, as well as detecting attacks directed against the mobile nodes. This paper also examines the intrusion detection architectures that may be deployed for different wireless ad-hoc network infrastructures, as well as proposed methods of intrusion response.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 250
KUPF: 2-phase selection model of classification records KUPF:分类记录的两阶段选择模型
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210169
Masatoshi Kakiuchi, N. Morishima, Yutaka Nakamura, K. Fujikawa, H. Sunahara
{"title":"KUPF: 2-phase selection model of classification records","authors":"Masatoshi Kakiuchi, N. Morishima, Yutaka Nakamura, K. Fujikawa, H. Sunahara","doi":"10.1109/SAINTW.2003.1210169","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210169","url":null,"abstract":"With the advance of computing and internetworking technologies, various services, which need classification of data, are provided. Firewall and QoS control are typical services which classify the data flow. These services are based on two or more rules, and select a rule to classify the data. However, some of their rules may conflict with one another and it is necessary to resolve conflicts in these classification mechanisms. We discuss the classification of data with generalization of the parameter filter. Then we arrange the parameter filter and propose a 2-phase selection model of classification records. In this model, we consider the procedure of the parameter filter as the phase depending only on the schema of the filter rule and the phase depending on the service. We also implement the KUPF framework based on this model and a sample service which provides QoS control over a IPv4/IPv6 network. With this sample implementation, we validate the availability and evaluate the performance of KUPF.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123898223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information extraction from HTML pages and its integration 从HTML页面中提取信息及其集成
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210172
K. Itai, A. Takasu, J. Adachi
{"title":"Information extraction from HTML pages and its integration","authors":"K. Itai, A. Takasu, J. Adachi","doi":"10.1109/SAINTW.2003.1210172","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210172","url":null,"abstract":"We propose a method for transforming HTML tables that have different structures into a common XML list structure and integrating them. This integration enables us to browse and compare all information in separate HTML pages uniformly. This paper focuses on the tasks of information extraction from tables and its data categorization. For this purpose, we compare three algorithms: (I) data classification using a support vector machine, (II) table structure estimation and data categorization using a hidden Markov model, and (III) data classification by the combination of a support vector machine and hidden Markov model. Finally, we report the experimental results.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A comparative study of Personal Data Protection Bill in Japan with UK Data Protection Act 1998 日本《个人资料保护法》与英国《1998年资料保护法》之比较研究
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210142
I. Takahashi
{"title":"A comparative study of Personal Data Protection Bill in Japan with UK Data Protection Act 1998","authors":"I. Takahashi","doi":"10.1109/SAINTW.2003.1210142","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210142","url":null,"abstract":"In Japan, \"Personal Data Protection Bill\" and \"Law concerning Protection of Personal Data possessed by Administrative Organizations\" were discussed in the Diets in 2002. Both bills failed to pass in the Diet. They will be discussed in the Diets in 2003 again. I can point out some problems involved in bills such as \"data possessed in public organizations\" International Aspects\" \"Enforcement\" \"Ambiguous status of rights of the data subjects\" in comparing both bills with UK Data Protection Act 1998.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"24 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation and operation of a satellite-based broadcast IP network 基于卫星的广播IP网络的实现和运行
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210122
Hidetaka Izumiyama, H. Kusumoto
{"title":"Implementation and operation of a satellite-based broadcast IP network","authors":"Hidetaka Izumiyama, H. Kusumoto","doi":"10.1109/SAINTW.2003.1210122","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210122","url":null,"abstract":"This paper summarizes the advantage of satellite communication in order to build a wide-coverage broadcast IP network in conjunction with the Internet. Taking various technical factors into consideration, the broadcast IP network has been designed and built in the Asia Pacific region by using an existing satellite. Details such as those regarding broadcast capable datalink technology, Earth station composition, satellite link budget (calculation of carrier-noise ratio margin), and IP and TCP performance are illustrated. This paper also discusses operational experiments conducted on the network exemplified by a vehicle for providing new distance education, and demonstrates the feasibility of practical use of the broadcast IP network using a unidirectional satellite link.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128042333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vulnerability assessment in wireless networks 无线网络脆弱性评估
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210186
R. Henning
{"title":"Vulnerability assessment in wireless networks","authors":"R. Henning","doi":"10.1109/SAINTW.2003.1210186","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210186","url":null,"abstract":"Wireless access points bring great convenience to the enterprise network, and also bring a large collection of vulnerabilities into the enterprise environment. Wireless users pose new difficulties in authentication and confidentiality that can intentionally or inadvertently pose a threat to their wired colleagues. A comprehensive network vulnerability analysis must address wireless environment threats and vulnerabilities, including identification of unauthorized Wireless Access Points and incorrectly configured clients. This paper discusses the issues associated with vulnerability assessment in a wireless network and a recommended approach to integrating wireless devices into vulnerability scanning methodologies.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Satellite bandwidth requirements for an MCS based multimedia conference 基于MCS的多媒体会议的卫星带宽需求
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210127
S. Ramadass, R. Budiarto, V. Siva
{"title":"Satellite bandwidth requirements for an MCS based multimedia conference","authors":"S. Ramadass, R. Budiarto, V. Siva","doi":"10.1109/SAINTW.2003.1210127","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210127","url":null,"abstract":"Videoconferencing has always been associated with deterministic networks or circuit switched networks (physical or virtual). In the past, it was almost unthinkable to send voice and video over an undeterministic network like Ethernet. However, recent trends in the field of multimedia communications (audio, video and documents) have indicated that it is not only possible but also practical to carry such communications over Ethernet. The MCS (Multimedia Conferencing System) which was recently developed and implemented by the Network Research Group, School of Computer Sciences, USM is a full blown audio, video and document conferencing system that works on classical Ethernet as well as satellite networks using the RSW Control Criteria. This paper discusses the bandwidth requirements of using the MCS system on satellite-based networks.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123761058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Current status of IAA (I Am Alive) system and IAA alliance IAA (I Am Alive)系统和IAA联盟的现状
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210178
M. Nakayama, Hiroyuki Ohno
{"title":"Current status of IAA (I Am Alive) system and IAA alliance","authors":"M. Nakayama, Hiroyuki Ohno","doi":"10.1109/SAINTW.2003.1210178","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210178","url":null,"abstract":"This paper describes an overview of the IAA (I Am Alive) system, which was originally developed in the WIDE project from 1995, and its current status. The IAA system is a distributed database system which contains victims' safety information. When a disaster occurs, victims can register their safety status information to the database and anyone who knows the victim's name can check his/her situation at any time. The IAA system has many user interfaces to accept any kind of user requests, e.g. Web client interface, windows client interface, fax interface using OCR/OMR, phone interface using DTMF tone and i-mode mobile phone interface. The IAA system also consists of many database nodes called \"IAA clusters\" to avoid paralysis of the system and network from a huge number of simultaneous requests. IAA clusters are located at deferent places and users' requests are distributed among them. All IAA clusters are loosely coupled by the IAA transport mechanism and synchronize victim information among them. In 1998, a prototype implementation was developed, so victim data format and request/response format between the client program and IAA cluster was established. Many organizations started to develop other implementations of the IAA system such as the CRL-IAA system, Monster-IAA system and NetStar-IAA system. The IAA Alliance was organized in 2002 to examine interoperability of these implementations and exchange information between developers. This organization also introduces the IAA system to many organizations including local government and gathers feedback from them to developers. We also introduce activity of this organization briefly.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When and where is a service? Investigating temporal and locative service properties 何时何地提供服务?调查时间和位置服务属性
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210133
Justin O'Sullivan, D. Edmond
{"title":"When and where is a service? Investigating temporal and locative service properties","authors":"Justin O'Sullivan, D. Edmond","doi":"10.1109/SAINTW.2003.1210133","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210133","url":null,"abstract":"An understanding of the temporal and locative constraints surrounding a service are important for interacting with it. These constraints apply to both the service requestor and the service provider. We discuss service interactions including the less common ones of cancellation, suspension and resumption. We then discuss various kinds of temporal windows and argue for certain locative constraints.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123826052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Planning for web services the hard way 艰难地规划web服务
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210130
Mark James Carman, L. Serafini
{"title":"Planning for web services the hard way","authors":"Mark James Carman, L. Serafini","doi":"10.1109/SAINTW.2003.1210130","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210130","url":null,"abstract":"We outline a framework for performing automated discovery, composition and execution of Web services based solely on the information available in interface descriptions and service directories. In our framework we do not rely on the existence of semantic mark-up in service descriptions, thus making our approach \"hard\". (From a planning perspective, we tackle the problem of planning in a semantically heterogeneous domain.) The framework consists of a domain model, a planning and execution algorithm, and learning procedures. Preliminary work on implementing a service matching system is also discussed.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"58-60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123126584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信