2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)最新文献

筛选
英文 中文
Design and Implementation of Mobility Mechanisms for Mobile IPv6-Based Link Aggregation System 基于移动ipv6链路聚合系统移动机制的设计与实现
K. Ogi, Tomohiro Masuda, H. Mineno, S. Ishihara
{"title":"Design and Implementation of Mobility Mechanisms for Mobile IPv6-Based Link Aggregation System","authors":"K. Ogi, Tomohiro Masuda, H. Mineno, S. Ishihara","doi":"10.1109/SAINTW.2005.52","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.52","url":null,"abstract":"This paper describes the implementation and evaluation of a link aggregation system with Mobile IPv6. The link aggregation system, SHAKE, is a system intended to the speed and reliability of wireless communication by using multiple Internet-linked mobile hosts simultaneously and dispersing the traffic between mobile hosts and a correspondent host. Because this architecture increases the number of mobile hosts concerned with the communication, the packet loss due to handover latency becomes large. We therefore developed a mechanism that decreases the packet loss by suspending the distribution of packets to mobile hosts while they are processing handover functions.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Proposal of Configuring IPv6 End-to-End Secure Channels for Closed Members 为封闭成员配置IPv6端到端安全通道的建议
Y. Hei, K. Yamazaki
{"title":"A Proposal of Configuring IPv6 End-to-End Secure Channels for Closed Members","authors":"Y. Hei, K. Yamazaki","doi":"10.1109/SAINTW.2005.17","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.17","url":null,"abstract":"Establishing secure channels between a pair of hosts is an attractive way when they want to exchange important data directly. Especially in an IPv6 environment, end-to-end secure communication is required because IPv6 hosts can get global IP addresses easily. IPsec provides various security services for the traffic at the IP layer so it seems to be best suited for this purpose. However, IPsec is difficult to use because there are many parameters to set up for secure channels, and the configuration for IPsec is complicated. This paper proposes an automatic configuration method for setting up the end-to-end secure channels between hosts to use IPsec easily. We also describe the detail design of our proposed method.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131787177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Adaptive Metadata Generation for Image Retrieval 自动自适应元数据生成图像检索
H. Sasaki, Y. Kiyoki
{"title":"Automatic Adaptive Metadata Generation for Image Retrieval","authors":"H. Sasaki, Y. Kiyoki","doi":"10.1109/SAINTW.2005.39","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.39","url":null,"abstract":"In this paper, we present an automatic adaptive metadata generation system using content analysis of sample images. First, our system screens out improper query images for metadata generation by using CBIR that computes structural similarity between sample images and query images. Second, the system generates metadata by selecting sample indexes attached to the sample images that are structurally similar to query images. Third, the system detects improper metadata and re-generates proper metadata by identifying wrongly selected metadata. Our system has improved metadata generation by 23.5% on recall ratio and 37% on fallout ratio rather than just using the results of content analysis.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Metadata Extraction Method for Taste-Impression with Sensor Technologies 基于传感器技术的味觉印象元数据提取方法
Hanako Kariya, Y. Kiyoki
{"title":"A Metadata Extraction Method for Taste-Impression with Sensor Technologies","authors":"Hanako Kariya, Y. Kiyoki","doi":"10.1109/SAINTW.2005.13","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.13","url":null,"abstract":"In this paper, we present a metadata extraction method for taste-impression with sensor technologies. Our metadata extraction method extracts taste-impression metadata automatically by using sensor outputs retrieved from the taste sensor, according to characteristic features of foods, such as a type, a nationality, and a theme (\"taste domain\"). By realizing taste-domain-dependent metadata extraction with sensor technologies, our method transforms sensor outputs into meaningful taste-impression metadata automatically and computes the correlation between the target foods (or drinks) and the query described in tasteimpression. Users can intuitively search various information resources regarding foods and drinks on the basis of abstract taste-impression preferences. We clarify the feasibility and effectiveness of our method by several experimental results.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121264686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Handoff Method Using Multiple Routes for Streaming 使用多条路由进行流传输的多切换方法
H. Fukuda, K. Yamaoka, Y. Sakai
{"title":"Multi-Handoff Method Using Multiple Routes for Streaming","authors":"H. Fukuda, K. Yamaoka, Y. Sakai","doi":"10.1109/SAINTW.2005.84","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.84","url":null,"abstract":"The Mobile IP protocol lets mobile terminals migrate without changing their IP addresses but its handoff is known to have \"handoff latency\" and \"packet loss\" problems. This paper describes another problem, \"delay fluctuation\" for streaming communication, and shows how this problem can be solved by using multiple routes.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116910340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPv6 Distributed Security: Problem Statement IPv6分布式安全:问题陈述
A. Vives, J. Palet
{"title":"IPv6 Distributed Security: Problem Statement","authors":"A. Vives, J. Palet","doi":"10.1109/SAINTW.2005.72","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.72","url":null,"abstract":"The deployment of IPv6 enabled devices and networks brings some issues, which must be addressed by security administrators in order to guarantee at least the same level of security obtained nowadays with IPv4 and network-based security schemes, allowing at the same time all the IPv6 advantages and possibilities. The most important issues are the rediscovery of end-to-end communication, the availability of IPsec in all IPv6 stacks, the increase in the number and type of IP devices and also the increase in the number of nomadic devices. The security policies and architectures currently applied in Internet with IPv4, do not longer apply for end-to-end security models which IPv6 needs. We will outline the advantages and drawbacks of both security schemes: network-based and distributed and will try to identify IPv6 issues that justify the need of a distributed security model for IPv6.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Measurement of DNS Traffic Caused by DDoS Attacks DDoS攻击导致的DNS流量统计
K. Ishibashi, Tsuyoshi Toyono, H. Matsuoka, Katsuyasu Toyama, Masahiro Ishino, C. Yoshimura, T. Ozaki, Y. Sakamoto, I. Mizukoshi
{"title":"Measurement of DNS Traffic Caused by DDoS Attacks","authors":"K. Ishibashi, Tsuyoshi Toyono, H. Matsuoka, Katsuyasu Toyama, Masahiro Ishino, C. Yoshimura, T. Ozaki, Y. Sakamoto, I. Mizukoshi","doi":"10.1109/SAINTW.2005.80","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.80","url":null,"abstract":"We report the measurement results of Domain Name System (DNS) traffic during the periods of DDoS attacks against a Web server. The attack was caused by virus infected machines. We monitored DNS query packets at DNS cache servers of an Japanese ISP, Open Computer Networks (OCN). We especially focused on those sent by the virus to find the IP address of the target web server. By analyzing the measurement results in detail, we found that the DNS configuration change of the authoritative DNS servers of the target site caused a significant increase in the number of queries.We also show how the DNS operators mitigated those queries by changing the configuration of DNS cache servers and authoritative servers.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Learning Logic Wrappers for Information Extraction from the Web 学习从网络中提取信息的逻辑包装器
C. Bǎdicǎ, E. Popescu, A. Bădică
{"title":"Learning Logic Wrappers for Information Extraction from the Web","authors":"C. Bǎdicǎ, E. Popescu, A. Bădică","doi":"10.1109/SAINTW.2005.77","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.77","url":null,"abstract":"This paper discusses a methodology for applying general-purpose first-order inductive learning to extract information from Web documents structured as unranked ordered trees. The methodology is applied to information extraction from real-world HTML page sets that represent product information sheets, an important task in product data integration. The methodology addresses the problems of defining information extraction rules in the form of logic wrappers and mapping the task of learning these rules to general purpose first-order inductive learning.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129446595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Location-Based Peer-to-Peer Network for Context-Aware Services in a Ubiquitous Environment 泛在环境中基于位置的上下文感知服务点对点网络
Yuki Kaneko, K. Harumoto, S. Fukumura, S. Shimojo, S. Nishio
{"title":"A Location-Based Peer-to-Peer Network for Context-Aware Services in a Ubiquitous Environment","authors":"Yuki Kaneko, K. Harumoto, S. Fukumura, S. Shimojo, S. Nishio","doi":"10.1109/SAINTW.2005.11","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.11","url":null,"abstract":"With the popularization of today’s mobile devices, the environment that enables us to publish and utilize information independent of location and time has been actualized. In the future, various kinds of sensors such as GPS as well as network-enabled appliances will also be connected to the Internet. By utilizing various kinds of information acquired from these network terminals, advanced context-aware services will be produced. For realizing context-aware services, we focus on information management and retrieval using a Peer-to-Peer (P2P) network. In this paper, we propose a location-based P2P network named the LL-Net. By constructing a P2P overlay network based on locations of peers, the LL-Net achieves efficient propagation of location-dependent queries issued by context-aware services.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
IPv6 Campus Transition Experiences IPv6校园转型经验
T. Chown
{"title":"IPv6 Campus Transition Experiences","authors":"T. Chown","doi":"10.1109/SAINTW.2005.71","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.71","url":null,"abstract":"IPv6 is now a mature standard, with the core protocols defined by the Internet Engineering Task Force (IETF). Over the past two years a number of national research networks and academic network backbone providers have deployed IPv6 in production, using dual-stack networking. The challenge ahead now is to push IPv6 deployment into the universities and end sites in the academic networks. This paper presents an overview of the current state of IPv6 transition at one such site, the University of Southampton (UK), drawing on experience gained from participation on the 6NET and Euro6IX projects.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128578868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信