2007 International Symposium on Applications and the Internet Workshops最新文献

筛选
英文 中文
A Crop Field Remote Monitoring System Based on Web-Server-Embedded Technology and CDMA Service 基于web服务器嵌入式技术和CDMA服务的农田远程监控系统
2007 International Symposium on Applications and the Internet Workshops Pub Date : 2007-01-15 DOI: 10.1109/SAINT-W.2007.6
D. He, Youlu Bai, Yingzhe Wang, Hua Wu
{"title":"A Crop Field Remote Monitoring System Based on Web-Server-Embedded Technology and CDMA Service","authors":"D. He, Youlu Bai, Yingzhe Wang, Hua Wu","doi":"10.1109/SAINT-W.2007.6","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.6","url":null,"abstract":"Remote monitoring systems based on Web-server-embedded technology and mobile telecommunication will become a core node technology in sensing network construction because of a great deal of mobile users and spreads of digital services in next generation telecommunication in the world. Soil, environmental, and crop information monitoring are important in production management and decision-making in precision agriculture. Therefore, reliability, security and inexpensive characteristics required are essential in the crop field information monitoring. Three improved field monitoring servers (FMS) using code division multiple access (CDMA) services combined with IPsec-based virtual private network (VPN) function have installed to two rice practical fields in Shanghai and one maize experimental field in Beijing for constructing a remote wireless sensing network. This crop field remote monitoring system as a ubiquitous node infrastructure in wireless sensing networks is useful and powerful to collect soil, environment, and crop information in remote for precision agriculture via two-years testing","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Asia-Wide Realtime Distributed Hands-On Workshop 亚洲范围内的实时分布式实践研讨会
2007 International Symposium on Applications and the Internet Workshops Pub Date : 2007-01-15 DOI: 10.1109/SAINT-W.2007.22
Shoko Mikawa, Patcharee Basu, K. Okawa, J. Murai
{"title":"An Asia-Wide Realtime Distributed Hands-On Workshop","authors":"Shoko Mikawa, Patcharee Basu, K. Okawa, J. Murai","doi":"10.1109/SAINT-W.2007.22","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.22","url":null,"abstract":"E-learning has made possible to conduct trainings online. However, region-wide trainings that require hands-on practice still need lecturers and participants at the same location. This requires huge resources on travel budget, time, equipments and staff. This paper proposes a region-wide distributed model of realtime hands-on workshop using distance learning and remote virtualization environment. The proposed model was implemented for SOI Asia operator training during 22-26 August 2006 inviting 42 participants from 19 institutions in 10 Asian countries. The workshop proved to have significant reduces in travel budget, lab preparation time and equipments compared to ordinary workshop model held in the previous year. Feedbacks show 95% of the participants evaluated this workshop is effective for their future operations. Accordingly, this workshop model is practical and resource-optimized model for region-wide human resource development. This paper can be a useful information source for future development and improvement of region-wide remote workshops","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122678979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Generic API for Retrieving Human-Oriented Information from Social Network Services 用于从社交网络服务中检索面向人的信息的通用API
2007 International Symposium on Applications and the Internet Workshops Pub Date : 2007-01-15 DOI: 10.1109/SAINT-W.2007.7
Teruaki Yokoyama, S. Kashihara, T. Okuda, Y. Kadobayashi, S. Yamaguchi
{"title":"A Generic API for Retrieving Human-Oriented Information from Social Network Services","authors":"Teruaki Yokoyama, S. Kashihara, T. Okuda, Y. Kadobayashi, S. Yamaguchi","doi":"10.1109/SAINT-W.2007.7","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.7","url":null,"abstract":"A unique type of Web service, called a social network service (SNS), first appeared in 2003. Some researches suggested a method to extract meaningful information from SNSs. Such meaningful information helps computers to understand human interests, concerns, and perceptions. We consider that socially aware computing has the potential to lead a new type of metric such human oriented information to access control, searches, and suggestions for contents. Accordingly, in this paper we propose the access application programmable interface (API) to find human-oriented information from outside a given SNS. We use the result of experiments on the API to demonstrate a network comprising relationships among communities. The results reveal that our proposed method can support developers in creating socially aware applications with SNSs","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Remote Hands-on Exercise Environment for an Asia-Wide Real-Time Workshop 亚洲实时研讨会的远程动手练习环境
2007 International Symposium on Applications and the Internet Workshops Pub Date : 2007-01-15 DOI: 10.1109/SAINT-W.2007.15
Achmad Basuki, A. Thamrin, K. Okawa, J. Murai
{"title":"A Remote Hands-on Exercise Environment for an Asia-Wide Real-Time Workshop","authors":"Achmad Basuki, A. Thamrin, K. Okawa, J. Murai","doi":"10.1109/SAINT-W.2007.15","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.15","url":null,"abstract":"This paper discusses the problems of conducting a real-time workshop, where the instructors and the participants are located in different places, and the participants should perform hands-on lab exercises using computers that are located in another place. To address this problem, we implemented a remote hands-on exercise environment using virtual machines and a low-bandwidth remote console access. In this environment, the instructors can monitor each participant's exercise progress thus they can give specific feedbacks to the participants. We evaluated this environment using a real-time online workshop. We found that it was easy to setup, and participants had a good user-experience using this environment","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Invited Talk: Sketch Based Anomaly Detection, Identification and Performance Evaluation 特邀演讲:基于草图的异常检测、识别和性能评估
2007 International Symposium on Applications and the Internet Workshops Pub Date : 2007-01-15 DOI: 10.1109/SAINT-W.2007.55
P. Abry, P. Borgnat, G. Dewaele
{"title":"Invited Talk: Sketch Based Anomaly Detection, Identification and Performance Evaluation","authors":"P. Abry, P. Borgnat, G. Dewaele","doi":"10.1109/SAINT-W.2007.55","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.55","url":null,"abstract":"An anomaly detection procedure is defined and its statistical performance are carefully quantified. It is based on a non Gaussian modeling of the marginal distributions of random projections (sketches) of traffic aggregated jointly at different levels (multiresolution). To evaluate false negative vs. false positive in a controlled, reproducible and documented framework, we apply the detection procedure to traffic time-series from our self-made anomaly database. It is obtained by performing DDoS-type attacks, using real-world attack tools, over a real operational network. Also, we illustrate that combining sketches enables us to identify the target IP destination address and faulty packets hence opening the track to attack mitigation","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123399037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Diagnostic Method of Quality Degradation Segment from Sampled Packets 采样包质量退化段的诊断方法
2007 International Symposium on Applications and the Internet Workshops Pub Date : 2007-01-15 DOI: 10.1109/SAINT-W.2007.42
Y. Yamasaki, H. Shimonishi, T. Murase
{"title":"Diagnostic Method of Quality Degradation Segment from Sampled Packets","authors":"Y. Yamasaki, H. Shimonishi, T. Murase","doi":"10.1109/SAINT-W.2007.42","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.42","url":null,"abstract":"Recent diversification in applications has increased the number of services that are sensitive to network quality. For such services, degradation of network quality such as packet loss or delay is directly linked to the quality perceived by users. It is therefore important for network administrators to know these quality indicators for each session. However, the measurement of quality per session has become difficult due to the rapid increase of line speeds. Packet sampling techniques have been receiving much attention as a way to solve this problem, but there has been only a little discussion of packet loss in that research though it is very important. In order to determine whether quality degradations occur at particular sessions, we have proposed methods for estimating the end-to-end packet loss per session by packet sampling. In this paper, we then propose a method to determine whether the quality degradation occurs between the sending terminal and the measurement point (send segment) or between the measurement point and the receiving terminal (receive segment). The proposed method will estimate packet loss of receive segment to observe duplicate ACKs and the DATA packet with corresponding sequence number to ACK number of duplicate ACKs. Then, the packet loss of send segment can be estimated by subtraction packet loss of receive segment from end-to-end packet loss. This allows quality degradation segment to be estimated from only a 10% sample of the packet flow","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123738051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Flow Monitoring Tool Using Network Processor 使用网络处理器的分布式流量监控工具
2007 International Symposium on Applications and the Internet Workshops Pub Date : 2007-01-15 DOI: 10.1109/SAINT-W.2007.43
Y. Kitatsuji, S. Katsuno, K. Yamazaki, M. Tsuru, Y. Oie
{"title":"Distributed Flow Monitoring Tool Using Network Processor","authors":"Y. Kitatsuji, S. Katsuno, K. Yamazaki, M. Tsuru, Y. Oie","doi":"10.1109/SAINT-W.2007.43","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.43","url":null,"abstract":"There is an emerging requirement for real-time flow-based traffic monitoring, which is vital for quality of service (QoS) monitoring, anomaly monitoring, and traffic engineering in Internet service provider networks. In this report, we discuss a distributed architecture for real-time and scalable flow monitoring tools and implement a prototype tool using network processor (NP). The contributions of the present paper are two-folds. First, we clarify the elemental functions that are required and commonly used by passive flow monitoring tools, and refine a distribution-processing architecture for combining these functions based on our previous work in order to cope with heavy-load input traffic. Second, we implement the packet distribution component, which plays a core role and might be bottleneck in the proposed architecture, by using pipeline-mode NP hardware, and experimentally prove its applicability to 10 Gbit/s-class input traffic","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124711569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Extending a Secure Autonomous Bootstrap Mechanism to Multicast Security 将安全自治引导机制扩展到组播安全
2007 International Symposium on Applications and the Internet Workshops Pub Date : 2007-01-15 DOI: 10.1109/SAINT-W.2007.47
N. Okabe, S. Sakane, K. Miyazawa, K. Kamada
{"title":"Extending a Secure Autonomous Bootstrap Mechanism to Multicast Security","authors":"N. Okabe, S. Sakane, K. Miyazawa, K. Kamada","doi":"10.1109/SAINT-W.2007.47","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.47","url":null,"abstract":"There are many kinds of control systems, which have been used in industry area, such as process automation (PA) and factory automation (FA). They have numerous sensors and actuators called field devices in their networks, and are introducing Internet protocol (IP) as network technology. Network security is necessary to make the most of IP's capability. The authors have previously studied a security mechanism which can satisfy the restrictions required by control systems and a secure autonomous bootstrap mechanism which is based on the security mechanism. This paper shows an extension of the bootstrap mechanism to support multicast security. The discussion in this paper excludes security of multicast routing protocols and admission control protocols, e.g. IGMP and MLD, because the subject of this paper and those protocols are orthogonal","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121606124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Privacy Oriented Extension of Attribute Exchange in Shibboleth Shibboleth中面向隐私的属性交换扩展
2007 International Symposium on Applications and the Internet Workshops Pub Date : 2006-10-23 DOI: 10.1109/SAINT-W.2007.13
Shoichirou Fujiwara, Takaaki Komura, Y. Okabe
{"title":"A Privacy Oriented Extension of Attribute Exchange in Shibboleth","authors":"Shoichirou Fujiwara, Takaaki Komura, Y. Okabe","doi":"10.1109/SAINT-W.2007.13","DOIUrl":"https://doi.org/10.1109/SAINT-W.2007.13","url":null,"abstract":"In frameworks for Web services like SAML, liberty or Shibboleth, a user can get authentication by asking one's IdP (identity provider) to issue a security assertion by which one can get access to services at an SP (service provider). If the SP additionally requests some attributes of one's, the user is forced to reveal the immediate values of them. There are cases where users must present detailed privacy information which SPs don't actually require to authorize them. We focus on Shibboleth and propose an extension of the attribute exchange protocol between an IdP and an SP in Shibboleth. While in the conventional framework of Shibboleth attributes are exchanged in immediate value, in our extension an SP requests an IdP to test whether user's attributes are satisfied some conditions, then the IdP returns either \"true\", \"false\" or \"unanswerable\" to the SP. We specify a language to describe the conditions as a query at the SP. We also extend an attribute authority at the IdP to evaluate the conditions presented from the SP","PeriodicalId":254195,"journal":{"name":"2007 International Symposium on Applications and the Internet Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128081706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信