{"title":"An Active Viewing System to Utilize Streaming Video for Education","authors":"Masahiro Yachi, J. Murai","doi":"10.1109/SAINT-W.2007.21","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.21","url":null,"abstract":"This paper proposes an alternative model to access streaming video contents available on the Internet. Currently many streaming videos are delivered in one way, in spite of the bi-directional network connection. To have more interactivity in use of them, we have implemented a system for viewers to control the original unedited video sources with active viewing interfaces. The system allows video source owners to share video sources without editing, and viewers to reorganize them while receiving from the streaming server. With the implemented system, viewers can utilize the video sources in more effective way for educational purposes","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Kawahara, Tatsuya Mori, N. Kamiyama, Shigeaki Harada, S. Asano
{"title":"A Study on Detecting Network Anomalies Using Sampled Flow Statistics","authors":"R. Kawahara, Tatsuya Mori, N. Kamiyama, Shigeaki Harada, S. Asano","doi":"10.1109/SAINT-W.2007.17","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.17","url":null,"abstract":"We investigate how to detect network anomalies using flow statistics obtained through packet sampling. First, we show that network anomalies generating a huge number of small flows, such as network scans or SYN flooding, become difficult to detect when we execute packet sampling. This is because such flows are more unlikely to be sampled than normal flows. As a solution to this problem, we then show that spatially partitioning the monitored traffic into groups and analyzing the traffic of individual groups can increase the detectability of such anomalies. We also show the effectiveness of the partitioning method using network measurement data","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115527327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Instant Learning Sound Sensor for Ubiquitous Computing","authors":"Y. Negishi, Nobuo Kawaguchi","doi":"10.1109/SAINT-W.2007.52","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.52","url":null,"abstract":"We propose a smart sound sensor for ubiquitous computing that can learn and detect events from various sensor information with a time series signal. Using the smart sensor, a developer of a context-aware system and ubiquitous service can easily utilize a real world sound as a context information without a signal processing programming. The signal processing method can be extended for the other sensors such as accelerometer and directional sensor, pressure sensor, etc. By the experiment, we evaluate the feasibility of the instant learning sound sensor","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of Measuring VoIP Traffic Fluctuation with Selective sFlow","authors":"A. Kobayashi, Katsuyasu Toyama","doi":"10.1109/SAINT-W.2007.74","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.74","url":null,"abstract":"We present a method of measuring VoIP traffic fluctuation by using netflow or sFlow. As the traffic of critical applications such as VoIP has increased in backbone networks, network operators need to measure the QoS performance of traffic in real networks more easily and passively. We have studied the delay and fluctuation of VoIP traffic in a real network and focused on traffic fluctuation that can be measured at one observation point. We evaluated the effectiveness of this method using selective sFlow, which has been implemented in a commercial router","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126285135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service","authors":"H. Naito, S. Kajita, Y. Hirano, K. Mase","doi":"10.1109/SAINT-W.2007.80","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.80","url":null,"abstract":"The central authentication service (CAS) is a middleware for constructing a single sign on infrastructure for Web applications and has been developed by JA-SIG. In this paper, we investigate a multiple-tiered security hierarchy infrastructure for Web applications, by extending CAS to the central authentication and authorization service (CAS2). Since the new version of CAS (CAS3) supports the X.509 client certificate authentication, we use it as leverage to realize our multiple-tiered security hierarchy mechanism. As a result, CAS2 uses X.509 client certification for not only authentication, but also authorization","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123569432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconfigurable Systems with a User-Centric Focus","authors":"G. Bartolomeo, S. Salsano, N. Blefari-Melazzi","doi":"10.1109/SAINT-W.2007.90","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.90","url":null,"abstract":"Today's reconfigurable radio systems have several interesting functionalities ranging from traditional reconfigurable systems operating at the physical layer only to fully fledged reconfigurability. Along this path we envisage a shift of perspective from a terminal-centric approach to a user-centric one. The main characteristics of this evolution are the provisioning of an unique user identity to be used over different RATs, and the increasing importance of profile information, needed to configure, customize and personalize terminal capabilities and. In this paper we i) examine a possible choice for a unique user identifier ii) propose a user profile and design a distributed approach to manage user profile information iii) introduce the \"Dataweb\" paradigm under standardization in the Oasis consortium and iv) show how it may be used to link all the expressed concepts","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131525682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Hirafuji, S. Ninomiya, T. Kiura, T. Fukatsu, Haoming Hu, H. Yoichi, Kei Tanaka, K. Sugahara, Tomonari Watanabe, T. Kameoka, A. Hashimoto, Ryoei Ito, R. Ehsani, H. Shimamura
{"title":"Field Server Projects","authors":"M. Hirafuji, S. Ninomiya, T. Kiura, T. Fukatsu, Haoming Hu, H. Yoichi, Kei Tanaka, K. Sugahara, Tomonari Watanabe, T. Kameoka, A. Hashimoto, Ryoei Ito, R. Ehsani, H. Shimamura","doi":"10.1109/SAINT-W.2007.48","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.48","url":null,"abstract":"A field server is a sensor node which can create a wireless sensor network and simultaneously serve as Wi-Fi hotspots in open fields. Since 2001, we have been working on several Research and Development projects to develop field server technology and its applications. So far, three generations of field servers have been developed and are in use in more than a dozen countries for collaborative research and educational applications such as a global sensor network for Earth observation, food safety/IT-agriculture, advanced sensor technology in fields and image monitoring for urban areas. The field servers have proved to be quite robust for field applications. More work is in progress to develop applications for the field server and resolve issues with power consumption and increasing the communication range for certain applications","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128745047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atsushi Honzawa, Yuichi Kobayashi, S. Fukushima, T. Yamazoe
{"title":"The Achievement of Hibiki Project--For the Spread Use of RFID--","authors":"Atsushi Honzawa, Yuichi Kobayashi, S. Fukushima, T. Yamazoe","doi":"10.1109/SAINT-W.2007.100","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.100","url":null,"abstract":"Hitachi, Ltd. completed Hibiki project, which had been conducted by the Ministry of Economy, Trade and Industry of Japan (METI) for 2 years from August 2004, to realize 5-yen RFID inlay. This paper describes the achievement of Hibiki project; the descriptions of Hibiki RFID specifications, the evaluation results of reading and writing distance and multiple tags reading results","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130699731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Classrooms Bring Top-Quality Education around the Globe","authors":"D. Pishva","doi":"10.1109/SAINT-W.2007.97","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.97","url":null,"abstract":"This paper describes a successful example that brings the much-needed information security education to Japan and effectively implements it in Hyogo Prefecture, which has been playing a leading role in providing measures for safety and security of Japanese society since the Great Hanshin Awaji Earthquake. The paper provides an overview of the technology used to link the university campuses in Japan and the US, and examines the methodologies used to make distance learning an exciting experience and as effective as the traditional classroom type education. It also discusses some of the challenges which were experienced during the process","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Aware Context Discovery for Next Generation Mobile Services","authors":"Cristian Hesselman, H. Eertink, M. Wibbels","doi":"10.1109/SAINT-W.2007.87","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.87","url":null,"abstract":"We present a system that enables applications to discover and obtain information that describes the context of a particular entity (e.g., a user or a device). Our system revolves around the notion of a context agent, which is a service that represents an entity and provides access to context information about that entity. Context agents facilitate the enforcement of an entity's policies regarding the release of context information (e.g., to applications or visiting users), even while these entities roam across different administrative domains. Context agents form an overlay on top of traditional local area service discovery infrastructures (e.g., based on SLP or WS-discovery) and are enablers for more intelligent pervasive computing environments. In this extended abstract, we outline the architecture of our system based on a simple scenario","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117114389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}