International Symposium on Applications and the Internet Workshops (SAINTW'06)最新文献

筛选
英文 中文
A translation method between 802.15.4 nodes and IPv6 nodes 一种802.15.4节点与IPv6节点之间的转换方法
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.3
S. Sakane, Y. Ishii, Katsuhiko Toba, K. Kamada, N. Okabe
{"title":"A translation method between 802.15.4 nodes and IPv6 nodes","authors":"S. Sakane, Y. Ishii, Katsuhiko Toba, K. Kamada, N. Okabe","doi":"10.1109/SAINT-W.2006.3","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.3","url":null,"abstract":"There are many kinds of control networks based on non-IP, such as BA (building automation), FA (factory automation) and PA (process automation). The IPv6 and wireless technologies are expected to improve those networks. The IEEE 802.15.4 is a candidate for wireless technology in control networks because of its feature, e.g. low power consumption and small implementation. Seamless communication between both technologies is important, though it is not easy for IEEE 802.15.4 packet to carry IPv6 packet due to its limited features. This paper shows a translation method between IPv6 nodes and IEEE 802.15.4 nodes","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Extendable product traceability system from small start 可扩展的产品追溯系统从小开始
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.18
S. Wakayama, Yusuke Doi, S. Ozaki, Atsushi Inoue
{"title":"Extendable product traceability system from small start","authors":"S. Wakayama, Yusuke Doi, S. Ozaki, Atsushi Inoue","doi":"10.1109/SAINT-W.2006.18","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.18","url":null,"abstract":"A cost-effective and easy way to introduce a product traceability system is to start from a small system and gradually extend it to large-scale systems. Traceability systems used in existing field tests are unsuitable for large-scale deployment because they use a single, centralized database. This paper describes a extendable traceability system proposed by Toshiba that employs distributed databases and ID-hash values. We have evaluated the proper operation of this system with a trial system and plan to analyze its qualitative behavior through large-scale experiments","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133306731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Context-aware, ontology-based recommendations 上下文感知的、基于本体的建议
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.13
C. Räck, S. Arbanowski, S. Steglich
{"title":"Context-aware, ontology-based recommendations","authors":"C. Räck, S. Arbanowski, S. Steglich","doi":"10.1109/SAINT-W.2006.13","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.13","url":null,"abstract":"In this paper we study the synergy between user behavior, context data, and semantic information in order to enable future services to adapt to different situations based on the recommendations of a service-independent recommender. Therefore, we propose a system that delivers context-aware recommendations, which are based on provided feedback, context data, and an ontology-based content categorization scheme. We provide a detailed overview of the specification, a short description of a possible service scenario and a discussion of the results","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Experimental study on UHF passive RFID readability degradation 超高频无源RFID读写性能下降的实验研究
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.17
J. Mitsugi, H. Hada
{"title":"Experimental study on UHF passive RFID readability degradation","authors":"J. Mitsugi, H. Hada","doi":"10.1109/SAINT-W.2006.17","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.17","url":null,"abstract":"Readability of passive RFID fundamentally depends on the tag empowering. The minimum required power, usually referred to as sensitivity, depends on the chip and antenna manufacturing. The sensitivity affects the readability but it is not the sole determinant of readability. The readability of RFID comprises a number of factors, particularly in the UHF band. This paper proposes a classification of tag readability degradation factors and measurement methods to quantify the factors. It is shown that tag performance change at the attachment may affect the readability. A tag probe, a power measurement antenna at the position of tag attachment, can monitor essential data to comprehend the situation and establish a countermeasure to improve the tag readability. The operating environment, involving reader antenna positions and standing waves result from the multipath fading, is another important factor for the readability. The characteristics of the environment could be also grasped by using the tag probe.","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122132769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Problems on IPv4-IPv6 network transition IPv4-IPv6网络转换问题
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.33
Ruri Hiromi, Hideaki Yoshifuji
{"title":"Problems on IPv4-IPv6 network transition","authors":"Ruri Hiromi, Hideaki Yoshifuji","doi":"10.1109/SAINT-W.2006.33","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.33","url":null,"abstract":"IPv6 (Internet protocol version 6) is now available in various OSs and applications. It is also deployed in major ISP backbone networks. Although most of all IPv6 features work as they were designed, we may have potential problems with them and they might exist in IPv4-IPv6 dual stack environment. On the other hand, we don't have much opportunity to exchange enough information about dual stack network operation. We build a special research group named \"IPv6-Fix\" in WIDE Project in Japan, to investigate the potential issues related to IPv6 deployment. We concern about the problems on IPv4-IPv6 dual stack environment from various perspectives, such as specification, implementation and network operation. From our survey and analysis, we found some problems to be fixed. In this paper, we show some error cases taken by harmful specification, poor implementations and wrong operation. For the healthy coexistence of IPv4-IPv6, we share and consider how we should design and operate dual stack network","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129755204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
An L3-driven fast handover mechanism in IPv6 mobility IPv6迁移中l3驱动的快速切换机制
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.6
Kazutaka Gogo, R. Shibui, F. Teraoka
{"title":"An L3-driven fast handover mechanism in IPv6 mobility","authors":"Kazutaka Gogo, R. Shibui, F. Teraoka","doi":"10.1109/SAINT-W.2006.6","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.6","url":null,"abstract":"Several fast handover mechanisms have been proposed to achieve seamless mobility in IPv6. These proposals assume that the network layer of a mobile node can use the link layer information. However, none of them defines how to abstract and utilize the link layer information. This paper defines the abstractions of the link layer information to achieve fast handover in IPv6. This paper also proposes a network layer (L3) driven fast handover mechanism by using the abstract link layer information. The L3-driven fast handover mechanism was implemented on FreeBSD. The measurement results show that the gap time of an L3 handover is only 3-4 msec in our outdoor test network consisting of eight IEEE 802.11a subnets","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124573307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Low cost object identification in RFID via dynamic Markov chain & two time scale SPSA 基于动态马尔可夫链和双时间尺度SPSA的RFID低成本目标识别
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.28
Shweta Singh
{"title":"Low cost object identification in RFID via dynamic Markov chain & two time scale SPSA","authors":"Shweta Singh","doi":"10.1109/SAINT-W.2006.28","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.28","url":null,"abstract":"The focus of this paper is to reduce the cost of RFID systems when the full blown model of RFID is not cost effective. The question of low cost approach comes into picture when we are more concerned with using this technique as a simple identity information collector, and embedding it into the existing IT system with minimum disruption. Our proposed scheme is an enhanced anti-collision scheme which not only claims but also proves that cost involved in RFID tag collision can be reduced and also the throughput can be increased by adopting the so designed model of communication. The model is basically the combination of slotted aloha and two time scale SPSA. Finally the mathematical results have been obtained by pro grammatically simulating the above designed model","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129069753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proposal of a method for protecting private information in user context 提出一种在用户环境中保护私人信息的方法
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.35
Yuichi Nakatani, Tetsuro Tokunaga, H. Yamaguchi, T. Itoh
{"title":"Proposal of a method for protecting private information in user context","authors":"Yuichi Nakatani, Tetsuro Tokunaga, H. Yamaguchi, T. Itoh","doi":"10.1109/SAINT-W.2006.35","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.35","url":null,"abstract":"In a ubiquitous computing environment, people can obtain and transmit information anytime, anywhere. In this situation, a user's context plays a key role. Unfortunately, the ubiquitous environment introduces some problems. The first is ease of access to what users truly want. The second important problem is handling private information. In utilizing a ubiquitous environment, all of a user's context is held online, and applications may share them to propose advanced services. Therefore, a user's context is automatically transmitted or attached as metadata. The context, however, includes the user's private information. Therefore, we need a system that separates information into private and public elements and treats them differently. In view of this, we consider how to attach metadata and how to extract and protect transmitted private information, in the specific case of blog entries. We propose a method of protecting private information that expands the existing item definition format in the CaTaC platform. This method will support the establishment of new communication methods using blogs in the near future","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product specific security features based on RFID technology 产品特定的安全功能基于RFID技术
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.34
Zoltán Nochta, T. Staake, E. Fleisch
{"title":"Product specific security features based on RFID technology","authors":"Zoltán Nochta, T. Staake, E. Fleisch","doi":"10.1109/SAINT-W.2006.34","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.34","url":null,"abstract":"In today's business, there is a growing problem of product counterfeiting and piracy. Criminals have considerable expertise and resources that enable them to produce and sell counterfeits of products. The proposed solution aims at providing unique and secure authentication mechanisms of a given item, in order to distinguish between genuine products and counterfeits. As underlying technology, the approach utilizes RFID technology: transponders hold unique and cryptographically secured data that uniquely binds a given product to a given tag, and thus makes duplication or re-application of tags difficult","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
IPv6 R&D activities in WIDE Project 广域项目的IPv6研发活动
International Symposium on Applications and the Internet Workshops (SAINTW'06) Pub Date : 2006-01-23 DOI: 10.1109/SAINT-W.2006.26
H. Esaki, A. Kato, J. Murai
{"title":"IPv6 R&D activities in WIDE Project","authors":"H. Esaki, A. Kato, J. Murai","doi":"10.1109/SAINT-W.2006.26","DOIUrl":"https://doi.org/10.1109/SAINT-W.2006.26","url":null,"abstract":"The WIDE project, www.wide.ad.jp, is a research consortium among industry and academia. WIDE project consists of more than four hundred active researchers from more than hundred private companies and from more than forty universities. The WIDE project operates the nationwide R&D testbed, which is connected with many other R&D testbeds, and the NSPIXPs, that are the largest IXes in Japan. The main focus of WIDE project has been IPv6 technology and has established IPv6 testbed since 1998. Basically, all of R&D activities in WIDE project are based on the IPv6. This paper describes the overview of WIDE project's IPv6 R&D activities, such as KAME/USAGI/TAHI/Nautikus6 projects","PeriodicalId":297153,"journal":{"name":"International Symposium on Applications and the Internet Workshops (SAINTW'06)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信