{"title":"Design and Implementation of Mobility Mechanisms for Mobile IPv6-Based Link Aggregation System","authors":"K. Ogi, Tomohiro Masuda, H. Mineno, S. Ishihara","doi":"10.1109/SAINTW.2005.52","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.52","url":null,"abstract":"This paper describes the implementation and evaluation of a link aggregation system with Mobile IPv6. The link aggregation system, SHAKE, is a system intended to the speed and reliability of wireless communication by using multiple Internet-linked mobile hosts simultaneously and dispersing the traffic between mobile hosts and a correspondent host. Because this architecture increases the number of mobile hosts concerned with the communication, the packet loss due to handover latency becomes large. We therefore developed a mechanism that decreases the packet loss by suspending the distribution of packets to mobile hosts while they are processing handover functions.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134370264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Proposal of Configuring IPv6 End-to-End Secure Channels for Closed Members","authors":"Y. Hei, K. Yamazaki","doi":"10.1109/SAINTW.2005.17","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.17","url":null,"abstract":"Establishing secure channels between a pair of hosts is an attractive way when they want to exchange important data directly. Especially in an IPv6 environment, end-to-end secure communication is required because IPv6 hosts can get global IP addresses easily. IPsec provides various security services for the traffic at the IP layer so it seems to be best suited for this purpose. However, IPsec is difficult to use because there are many parameters to set up for secure channels, and the configuration for IPsec is complicated. This paper proposes an automatic configuration method for setting up the end-to-end secure channels between hosts to use IPsec easily. We also describe the detail design of our proposed method.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131787177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Adaptive Metadata Generation for Image Retrieval","authors":"H. Sasaki, Y. Kiyoki","doi":"10.1109/SAINTW.2005.39","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.39","url":null,"abstract":"In this paper, we present an automatic adaptive metadata generation system using content analysis of sample images. First, our system screens out improper query images for metadata generation by using CBIR that computes structural similarity between sample images and query images. Second, the system generates metadata by selecting sample indexes attached to the sample images that are structurally similar to query images. Third, the system detects improper metadata and re-generates proper metadata by identifying wrongly selected metadata. Our system has improved metadata generation by 23.5% on recall ratio and 37% on fallout ratio rather than just using the results of content analysis.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Metadata Extraction Method for Taste-Impression with Sensor Technologies","authors":"Hanako Kariya, Y. Kiyoki","doi":"10.1109/SAINTW.2005.13","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.13","url":null,"abstract":"In this paper, we present a metadata extraction method for taste-impression with sensor technologies. Our metadata extraction method extracts taste-impression metadata automatically by using sensor outputs retrieved from the taste sensor, according to characteristic features of foods, such as a type, a nationality, and a theme (\"taste domain\"). By realizing taste-domain-dependent metadata extraction with sensor technologies, our method transforms sensor outputs into meaningful taste-impression metadata automatically and computes the correlation between the target foods (or drinks) and the query described in tasteimpression. Users can intuitively search various information resources regarding foods and drinks on the basis of abstract taste-impression preferences. We clarify the feasibility and effectiveness of our method by several experimental results.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121264686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Handoff Method Using Multiple Routes for Streaming","authors":"H. Fukuda, K. Yamaoka, Y. Sakai","doi":"10.1109/SAINTW.2005.84","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.84","url":null,"abstract":"The Mobile IP protocol lets mobile terminals migrate without changing their IP addresses but its handoff is known to have \"handoff latency\" and \"packet loss\" problems. This paper describes another problem, \"delay fluctuation\" for streaming communication, and shows how this problem can be solved by using multiple routes.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116910340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IPv6 Distributed Security: Problem Statement","authors":"A. Vives, J. Palet","doi":"10.1109/SAINTW.2005.72","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.72","url":null,"abstract":"The deployment of IPv6 enabled devices and networks brings some issues, which must be addressed by security administrators in order to guarantee at least the same level of security obtained nowadays with IPv4 and network-based security schemes, allowing at the same time all the IPv6 advantages and possibilities. The most important issues are the rediscovery of end-to-end communication, the availability of IPsec in all IPv6 stacks, the increase in the number and type of IP devices and also the increase in the number of nomadic devices. The security policies and architectures currently applied in Internet with IPv4, do not longer apply for end-to-end security models which IPv6 needs. We will outline the advantages and drawbacks of both security schemes: network-based and distributed and will try to identify IPv6 issues that justify the need of a distributed security model for IPv6.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ishibashi, Tsuyoshi Toyono, H. Matsuoka, Katsuyasu Toyama, Masahiro Ishino, C. Yoshimura, T. Ozaki, Y. Sakamoto, I. Mizukoshi
{"title":"Measurement of DNS Traffic Caused by DDoS Attacks","authors":"K. Ishibashi, Tsuyoshi Toyono, H. Matsuoka, Katsuyasu Toyama, Masahiro Ishino, C. Yoshimura, T. Ozaki, Y. Sakamoto, I. Mizukoshi","doi":"10.1109/SAINTW.2005.80","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.80","url":null,"abstract":"We report the measurement results of Domain Name System (DNS) traffic during the periods of DDoS attacks against a Web server. The attack was caused by virus infected machines. We monitored DNS query packets at DNS cache servers of an Japanese ISP, Open Computer Networks (OCN). We especially focused on those sent by the virus to find the IP address of the target web server. By analyzing the measurement results in detail, we found that the DNS configuration change of the authoritative DNS servers of the target site caused a significant increase in the number of queries.We also show how the DNS operators mitigated those queries by changing the configuration of DNS cache servers and authoritative servers.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning Logic Wrappers for Information Extraction from the Web","authors":"C. Bǎdicǎ, E. Popescu, A. Bădică","doi":"10.1109/SAINTW.2005.77","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.77","url":null,"abstract":"This paper discusses a methodology for applying general-purpose first-order inductive learning to extract information from Web documents structured as unranked ordered trees. The methodology is applied to information extraction from real-world HTML page sets that represent product information sheets, an important task in product data integration. The methodology addresses the problems of defining information extraction rules in the form of logic wrappers and mapping the task of learning these rules to general purpose first-order inductive learning.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129446595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuki Kaneko, K. Harumoto, S. Fukumura, S. Shimojo, S. Nishio
{"title":"A Location-Based Peer-to-Peer Network for Context-Aware Services in a Ubiquitous Environment","authors":"Yuki Kaneko, K. Harumoto, S. Fukumura, S. Shimojo, S. Nishio","doi":"10.1109/SAINTW.2005.11","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.11","url":null,"abstract":"With the popularization of today’s mobile devices, the environment that enables us to publish and utilize information independent of location and time has been actualized. In the future, various kinds of sensors such as GPS as well as network-enabled appliances will also be connected to the Internet. By utilizing various kinds of information acquired from these network terminals, advanced context-aware services will be produced. For realizing context-aware services, we focus on information management and retrieval using a Peer-to-Peer (P2P) network. In this paper, we propose a location-based P2P network named the LL-Net. By constructing a P2P overlay network based on locations of peers, the LL-Net achieves efficient propagation of location-dependent queries issued by context-aware services.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IPv6 Campus Transition Experiences","authors":"T. Chown","doi":"10.1109/SAINTW.2005.71","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.71","url":null,"abstract":"IPv6 is now a mature standard, with the core protocols defined by the Internet Engineering Task Force (IETF). Over the past two years a number of national research networks and academic network backbone providers have deployed IPv6 in production, using dual-stack networking. The challenge ahead now is to push IPv6 deployment into the universities and end sites in the academic networks. This paper presents an overview of the current state of IPv6 transition at one such site, the University of Southampton (UK), drawing on experience gained from participation on the 6NET and Euro6IX projects.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128578868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}