{"title":"Deploying Reliable IPv6 Temporary Networks Thanks to NEMO Basic Support and Multiple Care-of Addresses Registration","authors":"R. Kuntz","doi":"10.1109/SAINT-W.2007.39","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.39","url":null,"abstract":"In this paper, we explain how an IPv6 temporary network can be easily deployed using NEMO basic support, while keeping usual network requirements such as load balancing and fault-tolerance using multiple care-of addresses registration, and easy administration with policy exchange mechanisms. We detail a scenario and its feasibility is endorsed by the results obtained in a real deployment","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124388447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Aware Query Refinement for Mobile Web Search","authors":"Shun Hattori, Taro Tezuka, Katsumi Tanaka","doi":"10.1109/SAINT-W.2007.35","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.35","url":null,"abstract":"Mobile Web search engines as well as fixed ones become much more important for our Web access in the near future. However, mobile computing environments have troublesome limitations, as compared with traditional desktop computing environments. In order to solve the so-called \"mismatched query problem\" due to more shortness and ambiguity of mobile users' original queries, this paper proposes a novel method for context-aware query refinement based on their current geographic location and real-world contexts which are inferred from the place-names representing the location and the Web as a knowledge database","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122431023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Friedrich, A. Al-Hezmi, S. Arbanowski, T. Magedanz
{"title":"Evolution of Next Generation Networks towards an Integrated Platform for IMS-Based IPTV Services","authors":"O. Friedrich, A. Al-Hezmi, S. Arbanowski, T. Magedanz","doi":"10.1109/SAINT-W.2007.46","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.46","url":null,"abstract":"Next generation networks offer dedicated subsystems for each task to be fulfilled within the overall architecture defined in TISPAN NGN Release 1. There exist different subsystems for PSTN/ISDN emulation, streaming services and the 3GPP driven IP multimedia subsystem (IMS) which has been adapted to the NGN architecture. In NGN Release 2.0 IPTV shall be integrated into that architecture to support extended streaming services for next generation television. Current developments within ETSI TISPAN show two different approaches when speaking of the integration of IPTV services into the NGN: one IMS-based solution that relies on IMS/SIP signaling for new services and a non-IMS black box approach as an independent NGN subsystem. Our research activities are focused on the IMS-based activities and aim on the development of a reference architecture and on the service definition towards the now starting ETSI TISPAN standardization activities. This work shall introduce our architecture approach and evaluation based on precedent scenario and requirement analysis","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131173388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Middleware Architecture in the Internet: Introduction","authors":"Keith D. Hazelton","doi":"10.1109/SAINT-W.2007.75","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.75","url":null,"abstract":"Middleware development has become an arena of increasing global collaboration for a number of reasons. This session of the SAINT 2007 conference covers recent results from some of these efforts. The introduction opens by defining a working perspective on middleware as understood by the investigators whose work is highlighted here","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123842260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of the Threshold of Second Carrier Sensing in RFID Deployment","authors":"K. S. Leong, M. L. Ng, P. Cole","doi":"10.1109/SAINT-W.2007.53","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.53","url":null,"abstract":"Reader collision is not only limited to the interference between interrogator signals from different RFID readers, but to maintain low RFID tag cost, an RFID tag cannot filter a valid interrogation signal in a channel from another valid interrogation signal in another channel. Second Carrier Sensing is then introduced to solve this problem. This paper investigates the threshold values of second carrier sensing based on some common antenna placement configurations. Computations of these threshold values were carried out for different tag read ranges and different environmental factors. These threshold values are important to have effective enforcement of second carrier sensing","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Ishibashi, Tatsuya Mori, R. Kawahara, Katsuyasu Toyama, S. Osawa, S. Asano
{"title":"2-D Bitmap for Summarizing Inter-Host Communication Patterns","authors":"K. Ishibashi, Tatsuya Mori, R. Kawahara, Katsuyasu Toyama, S. Osawa, S. Asano","doi":"10.1109/SAINT-W.2007.1","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.1","url":null,"abstract":"We propose a tool for summarizing communication patterns between multiple hosts from traffic data with a small memory space, using a 2-D bitmap. Here, we focus on the communication pattern between pairs of source-destination hosts; these represents spatial communication patterns. By analyzing communication patterns using a bitmap, we can identify a super spreader, which is a host that sends packets to many destinations, or analyze the relationship between two source hosts. For the latter purpose, we present an application of the bitmap to calculate the similarity of hosts based on their peer-hosts patterns","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mitsuaki Akiyama, Takanori Kawamoto, M. Shimamura, Teruaki Yokoyama, Y. Kadobayashi, S. Yamaguchi
{"title":"A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior","authors":"Mitsuaki Akiyama, Takanori Kawamoto, M. Shimamura, Teruaki Yokoyama, Y. Kadobayashi, S. Yamaguchi","doi":"10.1109/SAINT-W.2007.14","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.14","url":null,"abstract":"In this paper, we propose three metrics for detecting botnets through analyzing their behavior. Our social infrastructure (i.e., the Internet) is currently experiencing the danger of bots' malicious activities as the scale of botnets increases. Although it is imperative to detect botnet to help protect computers from attacks, effective metrics for botnet detection have not been adequately researched. In this work we measure enormous amounts of traffic passing through the Asian Internet Interconnection Initiatives (AIII) infrastructure. To validate the effectiveness of our proposed metrics, we analyze measured traffic in three experiments. The experimental results reveal that our metrics are applicable for detecting botnets, but further research is needed to refine their performance","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125251872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Minamikawa, Nobuhide Kotsuka, Masaru Honjo, D. Morikawa, S. Nishiyama, M. Ohashi
{"title":"RFID Supplement for Mobile-Based Life Log System","authors":"A. Minamikawa, Nobuhide Kotsuka, Masaru Honjo, D. Morikawa, S. Nishiyama, M. Ohashi","doi":"10.1109/SAINT-W.2007.93","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.93","url":null,"abstract":"In this paper, we present a novel life log system, Life Pod, which collects user's activities by a mobile phone in the real world, and displays them in a blog like style. Engaging sensors installed in mobile phone and information attached to objects, users can easily record their daily activity anytime, anywhere. Implementation of RFID system to Life Pod also improves capturing information of real space","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128076741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomoya Kawakami, Susumu Takeuchi, Y. Teranishi, K. Harumoto, S. Shimojo
{"title":"A P2P-Based Mechanism for Managing Location-Dependent Contents in Ubiquitous Environments","authors":"Tomoya Kawakami, Susumu Takeuchi, Y. Teranishi, K. Harumoto, S. Shimojo","doi":"10.1109/SAINT-W.2007.11","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.11","url":null,"abstract":"This paper presents a novel peer-to-peer (P2P) mechanism that can handle effective location-dependent content discovery to enable context-aware ubiquitous computing. Our mechanism is an extension of 'LL-Net', a P2P overlay network that handles peer discoveries according to the geographical location of the peer. To manage location-dependent content discoveries in the LL-Net, a index of location-dependent content is stored in the peer that is located nearest to the content. A query for location-dependent contents located in the certain area is forwarded to the peers that are inside the calculated area using LL-Net. After the indexes are obtained as the result of the query, location-dependent contents are retrieved according to the indexes. We have evaluated the effectiveness of the proposed mechanism by simulations and confirmed that our mechanism can handle queries with small number of messages. We also found that messages required to achieve 95% recall rate are almost half number of messages that are required to achieve 100% recall rate in our mechanism","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132819008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ninomiya, T. Kiura, Atsushi Yamakawa, T. Fukatsu, Kei Tanaka, Hong‐chang Meng, M. Hirafuji
{"title":"Seamless Integration of Sensor Network and Legacy Weather Databases by MetBroker","authors":"S. Ninomiya, T. Kiura, Atsushi Yamakawa, T. Fukatsu, Kei Tanaka, Hong‐chang Meng, M. Hirafuji","doi":"10.1109/SAINT-W.2007.95","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.95","url":null,"abstract":"Nowadays, we can use several meteorological databases through the Internet. They are, however, heterogeneous in access methods, data formats, available items etc., so that clients applications are generally tightly linked to particular databases. This causes inefficiency in developing client applications. To solve this issue, we developed a data broker named MetBroker that provides client applications consistent accesses to such heterogeneous databases, hiding the heterogeneity and virtually integrating distributed databases. The basic idea was to provide a remote wrapper application to each database that translates the heterogeneity to a standardized format. This paper describes the basic functions of MetBroker and seamless integration of legacy weather database with sensor network by MetBroker","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115125146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}