The 2005 Symposium on Applications and the Internet最新文献

筛选
英文 中文
Infrastructures for collaborative networks - an application in elderly care 协作网络的基础设施——在老年护理中的应用
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.36
L. Camarinha-Matos, H. Afsarmanesh
{"title":"Infrastructures for collaborative networks - an application in elderly care","authors":"L. Camarinha-Matos, H. Afsarmanesh","doi":"10.1109/SAINT.2005.36","DOIUrl":"https://doi.org/10.1109/SAINT.2005.36","url":null,"abstract":"Applications of collaborative networks are increasingly emerging in diverse domains such as, for instance, elderly care. The growth in the elderly population imposes an urgent need to develop new approaches to care provision. Integration of a number of technologies such as multiagent systems, federated information management, safe communications, hypermedia interfaces, rich sensorial environments, and increased intelligence in home appliances represents an important enabling factor for the design and development of virtual elderly support community environments. In this paper, the experience in developing an infrastructure based on mobile agents combined with federated information management mechanisms is described, as well as its initial evaluation as a basis to support the development of vertical valued-added services.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129859586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptive access policy for the Linux kernel Linux内核的自适应访问策略
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.11
Takashi Horie, T. Harada, Kazuo Tanaka
{"title":"Adaptive access policy for the Linux kernel","authors":"Takashi Horie, T. Harada, Kazuo Tanaka","doi":"10.1109/SAINT.2005.11","DOIUrl":"https://doi.org/10.1109/SAINT.2005.11","url":null,"abstract":"SELinux, that has stricter access control mechanisms than traditional UNIX/Linux, is thought to be an effective solution for server-side fortification. Some of SELinux's behavior toward actual incidents shows its potential as an intrusion detection system (IDS), but, still, it is nothing more than a logging facility. Further improvements are needed for SELinux, not only to detect incidents but also to deal with them. This paper describes the autonomous defense functionality called \"Linux Kernel based IDS\" as well as its implementation.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122755187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluations of DCCP for bursty traffic in real-time applications 实时应用中突发流量的DCCP性能评价
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.51
Shigeki Takeuchi, H. Koga, K. Iida, Y. Kadobayashi, S. Yamaguchi
{"title":"Performance evaluations of DCCP for bursty traffic in real-time applications","authors":"Shigeki Takeuchi, H. Koga, K. Iida, Y. Kadobayashi, S. Yamaguchi","doi":"10.1109/SAINT.2005.51","DOIUrl":"https://doi.org/10.1109/SAINT.2005.51","url":null,"abstract":"The Datagram Congestion Control Protocol (DCCP) has been proposed as a transport protocol which supports real-time traffic using window-based flow control. We investigate the DCCP performance for various traffic flows, focusing on how DCCP flows affect TCP flows and vice versa. Through those simulations, we examine an unfair bandwidth distribution problem caused by the incompatibility of DCCP with the fast recovery algorithm of TCP.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115840251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Trace system of iSCSI storage access iSCSI存储访问跟踪系统
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.65
Saneyasu Yamaguchi, M. Oguchi, M. Kitsuregawa
{"title":"Trace system of iSCSI storage access","authors":"Saneyasu Yamaguchi, M. Oguchi, M. Kitsuregawa","doi":"10.1109/SAINT.2005.65","DOIUrl":"https://doi.org/10.1109/SAINT.2005.65","url":null,"abstract":"In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of fibre channel (FC)-based SAN. Because servers and storage cooperatively work with communications through TCP/IP layer in IP-SAN system, an integrated analysis of both sides is considered to be significant for achieving better performance. Our proposed system can precisely point out the cause of performance degradation when IP-SAN is used for a remote storage access. In the experiment of parallel iSCSI access in a long-delayed network, the total performance is limited by a parameter in an implementation of the SCSI layer in the iSCSI protocol stack. Based on the result obtained with our IP-SAN access trace system, the parameter in the layer is modified. As a result, four times performance improvement is achieved compared with the default value case. Thus it is effective to monitor all the layers in the iSCSI protocol stack and execute an integrated analysis, using our system.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131237014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Mobile agent communication using SIP 移动代理通信使用SIP
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.41
Hsiao-Hong Tsai, Fang-Yie Leu, Wen-Kui Chang
{"title":"Mobile agent communication using SIP","authors":"Hsiao-Hong Tsai, Fang-Yie Leu, Wen-Kui Chang","doi":"10.1109/SAINT.2005.41","DOIUrl":"https://doi.org/10.1109/SAINT.2005.41","url":null,"abstract":"Communication protocol is an important mechanism in mobile agent systems since agents need to communicate each other to clinch and achieve their joint goal In this research, we investigate communication issues between mobile agents, and propose a reliable communication protocol which integrates Session Initiation Protocol (SIP) as signaling protocol. With SIP, we present synchronous Invite model and asynchronous Subscribe&Notify model to establish a framework for interagent communication. The two models can solve communication failure and message chasing problems. We further analyze their communication costs and utilization rates.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124607488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SOBA framework: an application framework for broadband network environment SOBA框架:宽带网络环境下的应用框架
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.59
Nobuaki Yoshida, Yoshio Hayashi, Yutaka Tamagaki, Shoji Urashita, Makoto Kakuta, Masahiro Watanabe, Jacques Garrigue, R. Nakajima
{"title":"SOBA framework: an application framework for broadband network environment","authors":"Nobuaki Yoshida, Yoshio Hayashi, Yutaka Tamagaki, Shoji Urashita, Makoto Kakuta, Masahiro Watanabe, Jacques Garrigue, R. Nakajima","doi":"10.1109/SAINT.2005.59","DOIUrl":"https://doi.org/10.1109/SAINT.2005.59","url":null,"abstract":"While broadband, always-on Internet connectivity is expanding its reach to ordinary households, application environment infrastructures to allow effective use of this environment are still in their developmental stages. We are designing and implementing the \"SOBA framework\", which is an application framework that effectively uses this environment, especially for communication. The SOBA framework provides the high-level structure to allow communication over the Internet using peer-to-peer technology. The core concept of our framework is dynamically configurable shared space. In a shared space, participants can communicate by sharing both streaming media distribution and application behavior. These shared spaces can be dynamically split and merged depending on users' needs as in real-world. Our framework is a base of various advanced applications for real-time communications on the Internet. We explain the design philosophy, structure, and implementation of the \"SOBA framework\".","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HAR: hierarchy-based anycast routing protocol for wireless sensor networks 基于层次的无线传感器网络任播路由协议
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.34
N. Thepvilojanapong, Y. Tobe, K. Sezaki
{"title":"HAR: hierarchy-based anycast routing protocol for wireless sensor networks","authors":"N. Thepvilojanapong, Y. Tobe, K. Sezaki","doi":"10.1109/SAINT.2005.34","DOIUrl":"https://doi.org/10.1109/SAINT.2005.34","url":null,"abstract":"In this paper, we present hierarchy-based any-cast routing (HAR), a routing protocol for collecting data over multihop, wireless sensor networks. The design of the protocol aims to satisfy the requirements of sensor networks that every sensor transmits sensed data to the base station periodically or spontaneously. The base station constructs hierarchical tree by finding its child nodes which in turn discover their own child nodes and so on. HAR avoids both flooding and periodic updating of routing information but the tree will be reconstructed upon node failures or adding of new nodes. By knowing only its own parent and grandparent, each sensor can make forwarding decisions regardless of the knowledge on other neighboring nodes or geographical information. We evaluate the performance of HAR by using the ns-2 simulator and comparing with those of both DSR and AODV. The simulation results demonstrate that HAR achieves much higher delivery ratio and lower latency on various scenarios.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114441214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
On derived data services in cyberspace 网络空间衍生数据服务
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.45
Shi-Cho Cha, Yuh-Jzer Joung
{"title":"On derived data services in cyberspace","authors":"Shi-Cho Cha, Yuh-Jzer Joung","doi":"10.1109/SAINT.2005.45","DOIUrl":"https://doi.org/10.1109/SAINT.2005.45","url":null,"abstract":"We propose a framework, called derived data services (DDS), to ease the tension between (a) the need to mine individual's Web usage logs across multiple sites for aiding in personalization, and (b) the inherent privacy risks in it. In DDS, a standardized, hierarchical, format can be developed, whereby some higher level abstractions from a usage log can be captured, and potentially used across multiple applications. The hierarchical data structure also allows derived data to be processed incrementally based on the level of information needed, and on the level of privacy an individual wishes to have. The derived data summarizes an individual's profile in cyberspace, and should be the legal property of the individual so that access to the profile must be legally authorized by the person.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128345610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FACE: a firewall analysis and configuration engine FACE:防火墙分析和配置引擎
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.28
Pavan Verma, A. Prakash
{"title":"FACE: a firewall analysis and configuration engine","authors":"Pavan Verma, A. Prakash","doi":"10.1109/SAINT.2005.28","DOIUrl":"https://doi.org/10.1109/SAINT.2005.28","url":null,"abstract":"Firewalls play a critical role in protecting networks and enforcing security policies. Traditionally, firewalls have been deployed at an organization's periphery to protect it from Internet traffic. Today, however, this model no longer holds true as organizations try to safeguard themselves against other types of threats. This has led to the advent of the distributed firewall where potentially every router or end-host can run a firewall. As it is, firewalls are extremely hard to analyze and configure correctly due to complexities of network topology, routing, and administrative issues. Distributed firewalls make the situation even worse since there are multiple firewalls. This paper describes FACE - a tool that helps in analysis and configuration of distributed firewalls. Using FACE, administrators can automatically generate and analyze configurations for all firewalls in the network by specifying the filtering policy and a threat model in which a distributed firewall must provide defense against spoofed traffic from specified nodes in a network.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A multicast routing algorithm for overlay network built on leased lines 租用线路覆盖网络的组播路由算法
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.6
Xiaoyu Zhang, Guangzhao Zhang
{"title":"A multicast routing algorithm for overlay network built on leased lines","authors":"Xiaoyu Zhang, Guangzhao Zhang","doi":"10.1109/SAINT.2005.6","DOIUrl":"https://doi.org/10.1109/SAINT.2005.6","url":null,"abstract":"Overlay networks have been recently developed to support multicast framework. Specially, overlay architectures based on proxies and leased lines can provide applications with optimal performance in terms of bandwidth, reliability, delay guarantee, etc. In this paper, we propose a balanced multicast routing algorithm for these proxy-based overlay architectures to utilize the network resources efficiently while keeping the delay guarantee for each multicast session. We first model the routing problem as a diameter-constraint Steiner tree problem. Then, a balanced solution which takes both the cost and diameter into account is proposed. Extensive simulations show that our multicast routing algorithm provides superior performance with respect to other heuristics.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131471969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信