default search action
SAINT 2010: Seoul, Korea
- Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings. IEEE Computer Society 2010, ISBN 978-1-4244-7526-1
Applications
- Ami Kadowaki, Daisuke Noguchi, Sayumi Sugimoto, Yuichi Bannai, Ken-ichi Okada:
Development of a High-Performance Olfactory Display and Measurement of Olfactory Characteristics for Pulse Ejections. 1-6 - Ikki Fujiwara, Kento Aida, Isao Ono:
Applying Double-Sided Combinational Auctions to Resource Allocation in Cloud Computing. 7-14 - Ling Xu, Chainan Satayapiwat, Hiroyuki Takizawa, Hiroaki Kobayashi:
Resisting Sybil Attack By Social Network and Network Clustering. 15-21
Security
- Akihiro Shimoda, Tatsuya Mori, Shigeki Goto:
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. 22-30 - Michelle Ruse, Tanmoy Sarkar, Samik Basu:
Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs. 31-37 - Chris Strasburg, Sandeep Krishnan, Karin S. Dorman, Samik Basu, Johnny S. Wong:
Masquerade Detection in Network Environments. 38-44
Network Systems
- María Alpuente, Daniel Romero:
A Tool for Computing the Visual Similarity of Web Pages. 45-51 - Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. 52-58 - Shariful Hasan Shaikot, Min Sik Kim:
Lightweight Traffic-Aware Packet Classification for Continuous Operation. 59-67
Mobile and Wireless I
- Dong Zhou, Ajay Chander, Hiroshi Inamura:
Optimizing User Interaction for Web-Based Mobile Tasks. 68-76 - Jin Ho Kim, Rim Haw, Eung Jun Cho, Choong Seon Hong, Jongwon Choe:
Design and Implementation of NEMO Based ZigBee Mobile Router for Healthcare System. 77-83 - Choon-Oh Lee, Minkyu Lee, Dongsoo Han:
Energy-Efficient Location Logging for Mobile Device. 84-90
Mobile and Wireless II
- Sungwook Kim, Ji-Hwan Kim:
Dynamic Self-Reconfiguration Algorithms for Wireless Sensor Networks. 91-95 - Chao Chen, Yi Xu, Kun Li, Sumi Helal:
Reactive Programming Optimizations in Pervasive Computing. 96-104
Short Papers I
- Florian Skopik, Daniel Schall, Schahram Dustdar:
Supporting Network Formation through Mining under Privacy Constraints. 105-108 - Nobuo Funabiki, Toru Nakanishi, Noriki Amano, Hiroki Kawano, Yuuki Fukuyama, Megumi Isogai:
Software Architecture and Characteristic Functions in Learning Management System "NOBASU". 109-112 - Bernd Niklas Klein, Klaus David:
Basic Approach of Timing in Context Aware Architectures Verified by Concrete Advantages. 113-116 - Xiaoqing (Frank) Liu, Ravi Santosh Arvapally, Hojong Baik, Rubal Wanchoo:
Web-Based Intelligent Computational Argumentation Based Conflict Resolution in Air Traffic Management. 117-120
Short Papers II
- Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto:
A Cloud Trust Model in a Security Aware Cloud. 121-124 - Yoshitomo Murata, Ryusuke Egawa, Manabu Higashida, Hiroaki Kobayashi:
A History-Based Job Scheduling Mechanism for the Vector Computing Cloud. 125-128 - Takumi Seike, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura:
A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses. 129-132
Symposium Student Session I: Application
- Ryo Wakuta, Tomohiro Sonobe:
SPGF Search Places by Geographical Features all Around the World: Search and Verification System Utilizing Huge Amounts of Satellite Data. 133-136 - Kei Homma, Satoru Izumi, Yuki Abe, Kaoru Takahashi, Atsushi Togashi:
Using the Model Checker Spin for Web Application Design. 137-140
Symposium Student Session II: User Support
- Asad Masood Khattak, Zeeshan Pervez, Koo Kyo Ho, Sungyoung Lee, Young-Koo Lee:
Intelligent Manipulation of Human Activities Using Cloud Computing for u-Life Care. 141-144
Symposium Student Session III: Mobile & Wireless
- Feelhwan Park, Yoh Shiraishi, Osamu Takahashi:
A Study on Small Business Advertising Using E-mail Transmitting Screens on Mobile Phones. 145-148 - Md. Obaidur Rahman, Muhammad Mostafa Monowar, Choong Seon Hong, Young An Kim:
Reservation Based Reliability Control in Wireless Sensor Networks. 149-152 - Hidenobu Watanabe, Hajime Masaoka, Toshihiro Ohigashi, Tohru Kondo, Kouji Nishimura, Reiji Aibara:
Supporting USB Devices for the Global Migration. 153-156
Symposium Student Session IV: Security
- Hyeopgeon Lee, Kyounghwa Lee, Yongtae Shin:
An Enhanced Key Distribution Scheme for the Energy Consumption and the Security in the Wireless Sensor Networks. 157-160 - Yoshinori Osawa, Satoru Imamura, Atsushi Takeda, Gen Kitagata, Norio Shiratori, Kazuo Hashimoto:
A Proposal of Privacy Management Architecture. 161-164 - Mohamad Samir A. Eid, Hitoshi Aida:
Securely Hiding the Real Servers from DDoS Floods. 165-168
Symposium Student Session V: Social Network
- Kazufumi Yogo, Ryoichi Shinkuma, Tatsuro Takahashi, Taku Konishi, Satoko Itaya, Shinichi Doi, Keiji Yamada:
Differentiated Incentive Rewarding for Social Networking Services. 169-172 - Yoshinori Takata, Ryo Hashimoto, Ryoichi Shinkuma, Tatsuro Takahashi, Naoki Yoshinaga, Satoko Itaya, Shinichi Doi, Keiji Yamada:
Incentive Rewarding Method for Information Propagation in Social Networks. 173-176 - Sho Tsugawa, Kazuya Takahashi, Hiroyuki Ohsaki, Makoto Imase:
Robust Estimation of Message Importance Using Inferred Inter-recipient Trust for Supporting Email Triage. 177-180
Symposium Student Session VI: P2P
- Hiroaki Yamanaka, Toru Fujiwara, Shingo Okamura:
A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay. 181-184 - Akihiro Nakarai, Akira Sakatoku, Atsushi Takeda, Gen Kitagata, Debasish Chakraborty, Kazuo Hashimoto, Norio Shiratori:
An Overlay Authentication Network for Active Utilization of Private Information. 185-188
Management and Application of Ubiquitous Sensor Data (EUCASS 2010)
- Yuka Higashijima, Atsushi Yamamoto, Takayuki Nakamura, Motonori Nakamura, Masato Matsuo:
Missing Data Imputation Using Regression Tree Model for Sparse Data Collected via Wide Area Ubiquitous Network. 189-192 - Muhammad Shoaib Siddiqui, Choong Seon Hong:
Resource & Configuration Management for WSN in the Future Internet. 193-196 - Nobuhiko Matsuura, Hiroshi Mineno, Norihiro Ishikawa, Tadanori Mizuno:
Evaluation of B+Tree-Based Multi-dimensional Range Search Algorithm for P2P Networks. 197-200 - Kentaro Fujiwara, Kaname Harumoto, Yuuichi Teranishi, Toyokazu Akiyama, Susumu Takeuchi, Shojiro Nishio:
A Self-Localization Method Using Propagation of Existence Probability. 201-204
Ubiquitous Services and Platforms (EUCASS 2010)
- Tohru Kondo, Reiji Aibara, Kouichi Abe, Yuuiti Ishikuni, Hiroyuki Inoue, Kaori Maeda:
A Design and Development of a Multi-source Streaming Platform Based on a Building Block Architecture. 205-208 - Koji Sato, Shiro Sakata:
ManeuverXML: Distance-Measurement Based Operation Event Description Model and User Interaction Interpretation. 209-212 - Hiroshi Dempo, Makiko Yoshida:
CUBIQ: Cross UBIQuitous Platform Architecture. 213-216 - Michiharu Takemoto, Takashi Kambayashi, Takahiro Hata, Kentaro Uchiyama, Kenji Umakoshi:
Smart Shadow: Platform to Provide Real-World Services in Ubiquitous Environments and Its Applications. 217-220
Applications (C3NET 2010)
- Robert J. Fouser:
From CMS to SNS: Exploring the Use of Facebook in the Social Constructivist Paradigm. 221-224 - Kaori Maeda, Masahiro Nishi, Teruaki Yoshida, Kaoru Suzuki, Hiroyuki Inoue:
Digital Signage with Audience Detection Using TV Broadcasting Waves. 225-228 - Takashi Yamanoue:
A Draw Plug-In for a Wiki Software. 229-232
Architectures (C3NET 2010)
- Yoshihiro Ito:
Calculation of Necessary QoS for User Satisfaction with a QoS Mapping Matrix. 233-236 - Ryo Murakami, Nariyoshi Yamai, Kiyohiko Okayama:
A MAC-address Relaying NAT Router for PC Identification from Outside of a LAN. 237-240 - Satoshi Matsumoto, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano, Yusuke Shomura, Kenichi Yoshida:
A Method for Analyzing Network Traffic Using Cardinality Information in Firewall Logs. 241-244 - Sho Jitsuto, Yong Jin, Kiyohiko Okayama, Nariyoshi Yamai:
A Dynamic Routing Method for Inbound E-mail Delivery Considering Route and MTA Conditions on Multihomed Environment. 245-248 - Hajime Masaoka, Seigo Kishiba, Tohru Kondo, Kouji Nishimura, Reiji Aibara, Akio Seki:
Evaluation of P2P File Distribution Using IP Mobility. 249-252
Challenges on Preventing Malicious Activities (NETSAP 2010)
- Hyeongu Son, Youngseok Lee:
Detecting Anomaly Traffic using Flow Data in the real VoIP network. 253-256 - Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers. 257-260 - Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai:
A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks. 261-264 - Katsunari Yoshioka, Yoshihiko Hosobuchi, Tatsunori Orii, Tsutomu Matsumoto:
Vulnerability in Public Malware Sandbox Analysis Systems. 265-268
Theoretical Security Issues (NETSAP 2010)
- Don-Gu Yeo, Heung-Youl Youm:
An µTESLA Protocols with Multi-senders Based on a 2-Level XOR Chain with Data-Loss Tolerance. 269-272 - Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:
How to Locate a Target Binary Process and Its Derivatives in System Emulator. 273-276 - Yong-hee Jang, Yong-jin Kwon:
Efficient Scalar Multiplication Algorithms Secure against Power Analysis Attacks for Koblitz Curve Cryptosystems. 277-280
Single Sign-On & Federation (MidArch 2010)
- Kazutsuna Yamaji, Toshiyuki Kataoka, Motonori Nakamura, Tananun Orawiwattanakul, Noboru Sonehara:
Attribute Aggregating System for Shibboleth Based Access Management Federation. 281-284 - Hisashi Takahara, Motonori Nakamura:
Enhancement of SIP Signaling for Integrity Verification. 289-292
Network Middleware (MidArch 2010)
- Chikara Sasaki, Atsushi Tagami, Shigehiro Ano:
Implementation Approach for Network Coding using External Devices in IP Multicast. 293-296 - Ichiro Yamaguchi, Takaaki Suzuki, Hideaki Goto, Hideaki Sone:
Centralized Authentication System for Location Privacy Protection and Low Operational Cost of Large Scale WLAN Roaming. 297-299
Trust and ITeS (ITeS 2010)
- Shigeichiro Yamasaki:
A Dynamic Trust Estimation Method for 'Persona' from the Human Relationship of Social Web. 300-303 - Manish Pokharel, Seulki Lee, Jong Sou Park:
Disaster Recovery for System Architecture Using Cloud Computing. 304-307 - Takahisa Suzuki, Tetsuro Kobayashi:
Web-Based Experiment to Analyze Norms of Reputation Making: How to Evaluate Actions with a Opponent Having a Bad Reputation. 308-311
ITeS and Payment (ITeS 2010)
- Nagul Cooharojananone, Kamonwan Taohai, Suphakant Phimoltares:
A New Design of ATM Interface for Banking Services in Thailand. 312-315 - Hirotsugu Kinoshita, Kudo Mamoru, Tetsuya Morizumi, Kazuhiro Suzuki:
An Electronic Money System as Substitute for Banknotes. 316-319 - Takashi Okamoto:
The Study on Consumer Behavior of Online Shops. 320-323
ITeS and Infrastructure (ITeS 2010)
- Hidenobu Sai:
The Problems for Diffusion of Location Based Services in Rural Areas. 324-327 - Yunju Chen, Masashi Ueda, Yousin Park:
An Analysis of IPTV Competition Model. 328-331 - Yu-Hui Tao:
Transforming the Interactive Response System to a Cloud Voting Service. 332-334
Next Generation Networks (HSNCE 2010)
- KwangJong Cho, SeongHae Kim, HyeakRo Lee:
GLORIAD-KR and Its Advanced Applications. 335-338 - Yusuke Sakumoto, Hiroyuki Ohsaki, Makoto Imase:
On the Effectiveness of Thorup's Shortest Path Algorithm for Large-Scale Network Simulation. 339-342 - Takamichi Nishijima, Hiroyuki Ohsaki, Yoshihiro Nomoto, Makoto Imase:
Performance Evaluation of Block Device Layer with Automatic Parallelism Tuning Using Heterogeneous IP-SAN Protocols. 343-346
Applications for Next Generation Networks (HSNCE 2010)
- Paulo Gonçalves, Xavier Grandchamp, Xavier Pelorson, Bruno Raffin, Annemie Van Hirtum, Pascale Vicat-Blanc, Ken-ichi Baba, Julien Cisonni, Yasuo Ebara, Kazunori Nozaki, Hiroyuki Ohsaki, Shigeo Wada, Takuma Kawamura, Koji Koyamada, Eisaku Sakane, Naohisa Sakamoto, Shinji Shimojo:
Petaflow - A Project Towards Information and Communication Technologies in Society. 347-350 - Julien Cisonni, Shigeo Wada, Kazunori Nozaki, Annemie Van Hirtum:
Towards Sibilant [s] Physical Modeling: Numerical Study of the Influence of the Aperture of a Tooth-Shaped Constriction on the Flow-Induced Noise. 351-354 - Takashi Suda, Manabu Higashida, Ken-ichi Baba, Kazunori Nozaki:
The Complementary Registration Method for Vocal Tract of Sibilant /s/. 355-358
Intrusion Detection & Vulnerabilities (CSnP 2010)
- Jingyu Hua, Takashi Nishide, Kouichi Sakurai:
Model-Based Intrusion Detection by Abstract Interpretation. 359-362 - Nobutaka Kawaguchi, Kazuya Okouchi, Hirofumi Nakakoji, Tetsuro Kito, Tomonori Shigemoto, Masato Terada:
Enhancing Network Based Bot Detection with Contextual Information. 363-366 - Toshiki Harada, Akira Kanaoka, Eiji Okamoto, Masahiko Kato:
Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS. 367-370 - Fumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai:
Study of Log File Dispersion Management Method. 371-374
Emerging Security Issues & Panel on Smart Phone Security (CSnP 2010)
- Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai:
Behavior Control Based on Dynamic Code Translation. 375-378
Ubiquitous Healthcare Systems (CbuH 2010)
- Jae Hyoung Cho, Yoon-Hee Choi, Mi-Ja Kang, Hun-Sung Kim, Jeong-Ah Shin, Jin-Hee Lee, Kun-Ho Yoon:
Urgent Need of Ubiquitous Healthcare for Chronic Disease Management: Focused on Diabetes for the First Step. 379-382 - Jin Wang, Imanishimwe Jean de Dieu, Asturias De Leon Diego Jose, Sungyoung Lee, Young-Koo Lee:
Prolonging the Lifetime of Wireless Sensor Networks via Hotspot Analysis. 383-386 - Asad Masood Khattak, Zeeshan Pervez, A. M. Jehad Sarkar, Young-Koo Lee:
Service Level Semantic Interoperability. 387-390
Ubiquitous Healthcare Management (CbuH 2010)
- Il Kon Kim, Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee:
Chord Based Identity Management for e-Healthcare Cloud Applications. 391-394 - La The Vinh, Nguyen Duc Thang, Young-Koo Lee:
An Improved Maximum Relevance and Minimum Redundancy Feature Selection Algorithm Based on Normalized Mutual Information. 395-398
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.