{"title":"Extraction of Urban Morphological Properties from Airborne LIDAR Dataset and their Implications","authors":"H. Yoshida, M. Omae","doi":"10.1109/SAINTW.2005.64","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.64","url":null,"abstract":"Emergence of new sensing technologies gives rise to new types of information. Light Detection And Ranging (LIDAR) is one of such Technologies. It enables measurements of altitudes of sampled points on ground objects as well as on the ground, and consequently, generation of surface models. Extraction of morphological properties from such a model is possible, and combinations of such parameters lead to implications. By applying this to an urban area, a surface model only representing morphology of buildings could become a matrix to derive socio-economic implications. In this context, a set of experiments were conducted by using a part of central Tokyo as a study site.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132744375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Processing Heterogeneous Context Information","authors":"H. V. Kranenburg, H. Eertink","doi":"10.1109/SAINTW.2005.100","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.100","url":null,"abstract":"We describe a set of support functions that enable next generation mobile services and applications to react on changes in the end-user’s context, such as available resources, user preferences, user environment and situation. This paper focuses on the (design of) components that enable the processing and exchange of relevant contextual information across and between domains.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133254461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An On-Demand Passenger Transportation Architecture Based on a Mediated Contract-Net","authors":"C. Cubillos, C. Demartini","doi":"10.1109/SAINTW.2005.32","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.32","url":null,"abstract":"In this work we present an architecture for the on-demand planning of passenger transportation requests. The planning system is modeled as a multi-agent environment where client and vehicle agents negotiate using a Mediated Contract-Net (MCN). The negotiation consents to involve clients in the final solution, avoiding to incur in estimations of their utility functions (as in centralized systems). On the other hand, the Mediator role in the MCN allows a more global view, improving the solutions of a pure market-based system.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130003591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tsuyoshi Abe, Jun Miyake, M. Kawashima, Katsumi Takahashi
{"title":"Spam Filtering with Cryptographic Ad-hoc E-mail Addresses","authors":"Tsuyoshi Abe, Jun Miyake, M. Kawashima, Katsumi Takahashi","doi":"10.1109/SAINTW.2005.109","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.109","url":null,"abstract":"This paper presents an ad-hoc e-mail address service system which employs a cryptographic algorithm for the generation of ad-hoc addresses. The addresses are associated with mail filter rules and subscribers' original address undisclosed to public. The presented algorithm enables mail transfer agents to filter incoming mails by extracting filter rules from ad-hoc addresses, and thus requires no database to store filter rules for the addresses. The practical usability of the presented system has been tested to major Internet services which requires e-mail addresses.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114266219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Assuring Video-Based Monitoring System Considering Browsing Purposes","authors":"T. Sekiguchi, H. Kato","doi":"10.1109/SAINTW.2005.99","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.99","url":null,"abstract":"We are trying to resolve privacy issues of monitoring cameras through the \"Yaoyorozu Project,\" which is a research project based on a \"transdisciplinary science and technology\" approach. In this paper we describe technical issues that must be addressed to assure both privacy and monitoring availability. We describe the design and development of a system implementing a method that filters sensitive information in videos on the basis of data identifying the observers, camera locations, and the people observed by the cameras.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Classification and Re-Classification of Product Data in e-Business","authors":"S. Abels, A. Hahn","doi":"10.1109/SAINTW.2005.40","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.40","url":null,"abstract":"This paper gives an introduction into the field of automating product classification and re-classification processes. It therefore starts with an introduction of electronic product catalogs used in e-Business domains and classification systems embedded in those catalogs. Afterwards this paper takes a closer look to the potential of an automated classification of product data and it discusses the importance of reusing existing information when re-classifying catalog data. Moreover, this paper introduces possible technologies and approaches that could be adapted to this e-Business domain to perform an automation and to improve existing software solutions.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Exploratory Study of the Non-Participation to the Surveys in Online Access Panels: What are the Profiles of Non-Guarantors?","authors":"P. Jourdan, J. Arlotto","doi":"10.1109/SAINTW.2005.30","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.30","url":null,"abstract":"By definition, an access panel is a permanent sample of individuals recruited on the initiative of a market research firm and who volunteer to take part in ad hoc surveys, generally conducted by telephone, in face-to-face or online, etc. A fraction of the total panel can be easily sampled and questioned on a specific issue: thus resorting to an access panel makes it possible to have a pre-qualified and a pre-recruited population, easy to mobilize in a short time; moreover, the voluntary nature of the registration in addition to the incentive associated with the participation in the surveys ensure a higher rate of complete questionnaires than the one usually obtained in samples recruited for ad hoc purposes. The objective of the research is to explore the variables that are correlated with the total non-response and to measure the effectiveness of the methods used to increase the response rate in the case of an online B to C access panel. First of all we will present the determining factors and the consequences of the non-response in surveys by questionnaire. We will then specify the methodology of the research and present the exploratory results obtained.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116467970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kazuhiro Kitagawa, N. Saito, N. Shimizu, Fumihiro Kato
{"title":"A Framework for Descriptions and Reasoning for Adaptive Composite Service Structure and Behavior","authors":"Kazuhiro Kitagawa, N. Saito, N. Shimizu, Fumihiro Kato","doi":"10.1109/SAINTW.2005.8","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.8","url":null,"abstract":"In this paper, we present a framework developed for characterizing the whole spectrum of synthesized complex service by interacting with devices in peer-to-peer networking environments. Recently, a number of techniques have been proposed to support complex adaptive and dynamic service composition in p2p. However, these techniques have captured only a subset of service composition over p2p networks and represented some points within the spectrum of complex service, such as service discovery and service descriptions. We have explored a new model to determine how to manage complex services in terms of notions of comprehensive services, adaptive service commitment, modification and recovery, service atomicity and service descriptions in competitive and cooperative ad-hoc p2p networking environment.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122848853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Internet Security and Privacy Models Enabled by IPv6","authors":"M. Ford","doi":"10.1109/SAINTW.2005.85","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.85","url":null,"abstract":"This paper identifies some of the features of IPv6 technology that provide security and privacy benefits to Internet users and commercial network operators. It is clearly shown that deployment of IPv6 technology is a critical step on the path towards a more secure and trustworthy networking infrastructure for the future.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122851065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Patterns for Context-Aware Adaptation","authors":"G. Rossi, S. Gordillo, F. Lyardet","doi":"10.1109/SAINTW.2005.1620004","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.1620004","url":null,"abstract":"In this paper we show how the judicious use of design patterns can improve the design of context-awareness in software systems. We first review well-known problems in the development of context-aware applications. Next, we present our view on the design process of context-aware software; we introduce design patterns and explain why they can be useful to improve the quality of this kind of applications. We finally present some design patterns we mined by researching on successful context-aware approaches. Some concluding remarks are finally presented together with further work we are pursuing.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122245813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}