The 2005 Symposium on Applications and the Internet最新文献

筛选
英文 中文
An automatic Web wrapper for extracting information from Web sources, using clustering techniques 使用集群技术从Web源提取信息的自动Web包装器
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.12
N. Papadakis, Dimitrios Skoutas, Konstantinos A. Raftopoulos, T. Varvarigou
{"title":"An automatic Web wrapper for extracting information from Web sources, using clustering techniques","authors":"N. Papadakis, Dimitrios Skoutas, Konstantinos A. Raftopoulos, T. Varvarigou","doi":"10.1109/SAINT.2005.12","DOIUrl":"https://doi.org/10.1109/SAINT.2005.12","url":null,"abstract":"We present a fully automated system (wrapper) for extracting information from semistructured Web pages. The emerging need for such systems occurs due to the need for going beyond the concept of \"human browsing\" by automating the process of information retrieval enabling further utilization by targeted applications. The key idea in our novel system is to exploit the format of the information contained in the Web pages discovering the underlying structure and finally maps it to semantic relationships. In doing this we identify one section of the Web page as the one containing the useful information and we proceed in extracting semantic tokens contained in this section by using clustering techniques and other tools of statistical origin. Our innovation consists in building a system that can operate without human intervention or training and yet achieving excellent extraction precision and recall.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"247 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132738591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
D-SAT: detecting SYN flooding attack by two-stage statistical approach D-SAT:采用两阶段统计方法检测SYN泛洪攻击
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.18
Seungwon Shin, Ki-young Kim, Jongsoo Jang
{"title":"D-SAT: detecting SYN flooding attack by two-stage statistical approach","authors":"Seungwon Shin, Ki-young Kim, Jongsoo Jang","doi":"10.1109/SAINT.2005.18","DOIUrl":"https://doi.org/10.1109/SAINT.2005.18","url":null,"abstract":"We propose D-SAT (detecting SYN flooding attack by two-stage statistical approach) system that is simple and robust approach to detect SYN flooding attacks by observing network traffic. Instead of managing all ongoing traffic on the network, D-SAT only monitors SYN count and ratio between SYN and other TCP packets at first time. And it detects SYN flooding and finds victims more accurately in its second stage. To make the detection mechanism robustly and easily, D-SAT uses CUSUM (cumulative sum) approach in SPC (statistical process control) (H. Wang et al., 2002) (D.C. Montgomery, 2001) (D.M. Hawkins et al., 1998). It makes the detection mechanism much more generally applicable and easier to implement. D-SAT also employed AFM (aggregation flow management) for finding victims quickly and accurately. The trace-driven simulation results demonstrate that D-SAT system is efficient and simple to implement and prove that it detects SYN flooding accurately and finds attack in a very short detection time.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133859697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A DNS-based host portability solution with localized location updating 具有本地化位置更新的基于dns的主机可移植性解决方案
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.3
Wang-Cho Cheng, C. Ang, K. Wong
{"title":"A DNS-based host portability solution with localized location updating","authors":"Wang-Cho Cheng, C. Ang, K. Wong","doi":"10.1109/SAINT.2005.3","DOIUrl":"https://doi.org/10.1109/SAINT.2005.3","url":null,"abstract":"This paper describes the design and performance study of our DNS-based portability solution. We present a design that extends the functionality of the basic DNS that enables the DNS to track the locations of its hosts. Unlike other solutions that simply update the hosts' latest IP addresses into their home domain zone files, our solution allows the locally assigned IP address to be updated into the local domain's DNS. This has the advantage of relieving the home DNS server from updating signaling load incurred when the mobile host changes its point of attachment between foreign domains. Our updating protocol overhead per message was also shown to be smaller in size than that of DNS dynamic update. Our scheme also exhibits smaller update delays.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133062878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-rate control method using layered content 采用分层内容的多速率控制方法
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.42
H. Oouchi, Ken Takahashi, H. Nagata, Kouichi Kamasawa
{"title":"Multi-rate control method using layered content","authors":"H. Oouchi, Ken Takahashi, H. Nagata, Kouichi Kamasawa","doi":"10.1109/SAINT.2005.42","DOIUrl":"https://doi.org/10.1109/SAINT.2005.42","url":null,"abstract":"Layered multicasting based on layer-coded content has been proposed to deliver streaming video contents at multiple rates to users on access lines with various bandwidths, such as ADSL, FTTH, and wireless LAN. We propose an IP multicasting rate control system using layered content, called multirate filtering (MRF), to optimize the streaming rate by controlling the number of content layers for each VLAN when a shared line of an edge node is congested. MRF can allocate the bandwidth of the shared line to VLANs according to their utilizations and then transmit a multicast content to clients with different stream rates reflecting the users' intentions. We demonstrate experimentally that the quality of video transmitted by applying MRF in a real network is superior to that transmitted by the conventional priority queuing control scheme under congestion. We also show that MRF can control the content rate according to a user's receiving priority when viewing two or more contents. Our results further demonstrate that MRF can coexist with another application by sharing bandwidth.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125826962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A context-centric security middleware for service provisioning in pervasive computing 一个以上下文为中心的安全中间件,用于普适计算中的服务供应
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.2
Antonio Corradi, R. Montanari, Daniela Tibaldi, A. Toninelli
{"title":"A context-centric security middleware for service provisioning in pervasive computing","authors":"Antonio Corradi, R. Montanari, Daniela Tibaldi, A. Toninelli","doi":"10.1109/SAINT.2005.2","DOIUrl":"https://doi.org/10.1109/SAINT.2005.2","url":null,"abstract":"Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture solution in the wireless Internet is based on mobile proxies (implemented as mobile agent-based middleware components) over the fixed network that follow the movements and act on behalf of the limited wireless clients. It is crucial that mobile proxies have full visibility of their context, i.e., the set of available and relevant resources, depending on access control rules, client location, user preferences, privacy requirements, terminal characteristics, and current state of hosting environments. The paper presents the design and implementation of a context-centric security middleware, called UbiCOSM, for MA-based service provisioning in pervasive computing. UbiCOSM dynamically determines the contexts of mobile proxies, and effectively rules the access to them, by taking into account different types of metadata (user profiles and authorization policies), expressed at a high level of abstraction and cleanly separated from the service logic. The paper also shows the functioning of UbiCOSM in the design and the development of a mobile context-centric airport business assistant.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129108665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Design and analysis of an e-transaction protocol tailored for OCC 为OCC定制的电子交易协议的设计与分析
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.19
P. Romano, F. Quaglia, B. Ciciani
{"title":"Design and analysis of an e-transaction protocol tailored for OCC","authors":"P. Romano, F. Quaglia, B. Ciciani","doi":"10.1109/SAINT.2005.19","DOIUrl":"https://doi.org/10.1109/SAINT.2005.19","url":null,"abstract":"In this work we present a protocol ensuring the e-transaction guarantee (i.e. a recently proposed end-to-end reliability guarantee) in a Web based, three-tier transactional system. The protocol does not need any coordination among the replicas of the application server, thus exhibiting negligible overhead in normal behavior. Additionally, it achieves highly efficient fail-over especially for the case of back-end database employing optimistic concurrency control (OCC), namely a type of concurrency control well suited for data access performed via Web. We also present a comparative discussion with existing solutions and a quantitative analysis of the proposed protocol, which clearly quantifies its benefits, in terms of reduced user perceived latency, especially when employed in combination with OCC.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Turning Web applications into portlets: raising the issues 将Web应用程序转换为portlet:提出问题
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.66
O. Díaz, Iñaki Paz
{"title":"Turning Web applications into portlets: raising the issues","authors":"O. Díaz, Iñaki Paz","doi":"10.1109/SAINT.2005.66","DOIUrl":"https://doi.org/10.1109/SAINT.2005.66","url":null,"abstract":"A portal is a key component of an enterprise integration strategy. It provides integration at the user interface level, whereas other integration technologies support business process, functional or data integration. To this end, portlet syndication is the next wave following the successful use of content syndication in current portals. A portlet is a full-fledge application, which is rendered within the portal framework. Over the last few years, organisations have invested in Web - enabling some of their existing systems, and they can be interested in capitalising on these Web applications by wrapping them as portlets so that they can be plugged into third-party portals. Differences between Web applications and portlets basically stem from the distinct running settings and the targeted end-users of each type of software. This paper explores the repercussion of these differences and raises the issues when \"portlet-ising\" an existing Web application by using wrapping technologies.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129579829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Goal description language for semantic Web service automatic composition 用于语义Web服务自动组合的目标描述语言
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.33
Manshan Lin, He-qing Guo, Jianfei Yin
{"title":"Goal description language for semantic Web service automatic composition","authors":"Manshan Lin, He-qing Guo, Jianfei Yin","doi":"10.1109/SAINT.2005.33","DOIUrl":"https://doi.org/10.1109/SAINT.2005.33","url":null,"abstract":"Current Web service composition requires manual process modeling, which is hard to adapt to users' various requirements and becomes more and more difficult with the explosion of Web service resources. It proposes goal-driven Web service automatic composition protocol stack to achieve automatic process modeling. Based on ontology description language OWL (Web ontology language), it comes up with a goal description language, which lies on the top of stack and tries to catch users' requirements or preferences on requesting services. It describes the goals needed to be achieved, relationships within goals and constrains when achieving the goals. Finally, it also provides a way to detect the inconsistency in goal description. It takes an important step towards goal-driven Web service automatic composition. The work in this paper aims at building a bridge between users' requirement and the implementation.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127729125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A two-level distributed architecture for efficient Web content adaptation and delivery 用于高效Web内容适配和交付的两级分布式体系结构
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.10
C. Canali, V. Cardellini, M. Colajanni, R. Lancellotti, Philip S. Yu
{"title":"A two-level distributed architecture for efficient Web content adaptation and delivery","authors":"C. Canali, V. Cardellini, M. Colajanni, R. Lancellotti, Philip S. Yu","doi":"10.1109/SAINT.2005.10","DOIUrl":"https://doi.org/10.1109/SAINT.2005.10","url":null,"abstract":"The complexity of services provided through the Web is continuously increasing as well as the variety of new devices that are gaining access to the Internet. Tailoring Web and multimedia resources to meet the user and client requirements opens two main novel issues in the research area of content delivery. The working set tends to increase substantially because multiple versions may be generated from the same original resource. Moreover, the content adaptation operations may be computationally expensive. In this paper, we consider third-party infrastructures composed by a geographically distributed system of intermediary and cooperative nodes that provide fast content adaptation and delivery of Web resources. We propose a novel distributed architecture of intermediary nodes which are organized in two levels. The front-end nodes in the first tier are thin edge servers that locate the resources and forward the client requests to the nodes in the second tier. These interior nodes are fat servers that run the most expensive functions such as content adaptation, resource caching and fetching. Through real prototypes we compare the performance of the proposed two-level architecture to that of alternative one-level infrastructures where all nodes are fat peers providing the entire set of functions.","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128331549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Latency-driven replica placement 延迟驱动的副本放置
The 2005 Symposium on Applications and the Internet Pub Date : 2005-01-31 DOI: 10.1109/SAINT.2005.37
Michal Szymaniak, G. Pierre, M. Steen
{"title":"Latency-driven replica placement","authors":"Michal Szymaniak, G. Pierre, M. Steen","doi":"10.1109/SAINT.2005.37","DOIUrl":"https://doi.org/10.1109/SAINT.2005.37","url":null,"abstract":"This paper presents HotZone, an algorithm to place replicas in a wide-area network such that the client-to-replica latency is minimized. Similar to the previously proposed HotSpot algorithm, HotZone places replicas on nodes that along with their neighboring nodes generate the highest load. In contrast to HotSpot, however, HotZone provides nearly-optimal results by considering overlapping neighborhoods. HotZone relies on a geometric model of Internet latencies, which effectively reduces the cost of placing K replicas among N potential replica locations from O(N/sup 2/) to O(N /spl middot/ max(logN, K)).","PeriodicalId":169669,"journal":{"name":"The 2005 Symposium on Applications and the Internet","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信