


default search action
SAINT 2011: Munich, Germany
- 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings. IEEE Computer Society 2011, ISBN 978-1-4577-0531-1

Security
- Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh:

Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. 1-10 - Moriteru Ishida, Hiroki Takakura, Yasuo Okabe:

High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling. 11-19 - Satoshi Ishibashi, Shuichi Miyazaki, Yasuo Okabe:

Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate Authority. 20-26
Networking
- Yang Cao, Chung-Horng Lung, Shikharesh Majumdar:

An XPath Query Aggregation Algorithm Using a Region Encoding. 27-36 - Yusuke Sakumoto, Hiroyuki Ohsaki, Makoto Imase:

Fluid-Based Analysis of TCP Flows in a Scale-Free Network. 37-43
Sensor Networks
- Hisashi Sawada, Hiroshi Kuriyama, Yuki Nakano, Hiroshi Mineno

, Tadanori Mizuno:
Mutually Complementary Communication Protocol for Indoor Sensor/Actuator Networks. 44-49 - Hong Nhat Pham, Back Sun Sim, Hee Yong Youn:

A Novel Approach for Selecting the Participants to Collect Data in Participatory Sensing. 50-55 - Bernd Niklas Klein, Sian Lun Lau

, Klaus David:
Evaluation of the Influence of Time Synchronisation on Classification Learning Based Movement Detection with Accelerometers. 56-64
Application
- Kyriakos Karenos, Wim De Pauw, Hui Lei:

A Topic-Based Visualization Tool for Distributed Publish/Subscribe Messaging. 65-74 - Hidekazu Tamaki, Suguru Higashino, Minoru Kobayashi, Masayuki Ihara:

Reducing Speech Contention in Web Conferences. 75-81 - Lei Jing, Kaoru Yamagishi, Junbo Wang

, Yinghui Zhou, Tongjun Huang, Zixue Cheng:
A Unified Method for Multiple Home Appliances Control through Static Finger Gestures. 82-90
Social Networks
- Felipe M. Villoria, Oscar Díaz

:
A Federated Approach to Crossblogging through Contracts. 91-99 - Zakaria Maamar

, Hamdi Yahyaoui
, Erbin Lim, Philippe Thiran:
Social Engineering of Communities of Web Services. 100-109 - Toyokazu Akiyama, Yukiko Kawai, Yuya Matsui, Yoshinori Kubota, Takuya Osaki:

A Proposal for Social Search System Design. 110-117
Mobile Networking
- Adam Ji Dou, Vana Kalogeraki

, Dimitrios Gunopulos
, Taneli Mielikäinen, Ville H. Tuulos, Sean Foley, Curtis Yu:
Data Clustering on a Network of Mobile Smartphones. 118-127 - Toshimitsu Fujii, Mitsuru Kaji, Yuya Sasaki, Takahiro Hara, Shojiro Nishio:

A Flooding Control Method with Ack-carry for Location-Based Information Dissemination in Mobile Ad Hoc Networks. 128-135 - Han Ku Yoo, Kwang Myung Kim, Hee Yong Youn:

An Effective Batching Scheme Combining Static Multicasting with Dynamic Multicasting for Mobile IPTV. 136-144
Cloud
- Jian-Hong Liu, Jing Chen, Yi-Chuan Tai, Chen-Hao Shih:

ACES - Application Cloud for Embedded Systems. 145-151 - Tomoki Shibata, Kazumi Sakai, Yasuo Okabe:

The Design and Implementation of an On-demand DC Grid in Home. 152-159 - Soon Hin Khor, Akihiro Nakao:

DaaS: DDoS Mitigation-as-a-Service. 160-171
Short Papers
- Atsushi Tagami, Makoto Takahara, Shigehiro Ano, Kenji Suzuki:

Evaluation of Time-Sensitive Information Multicasting Using Tree-Structured Overlay Network. 172-177 - Arnupharp Viratanapanu, Ahmad Kamil Abdul Hamid, Yoshihiro Kawahara

, Tohru Asami:
Pantau: A Monitoring System for KVM-Based Server Consolidation Environment. 178-183 - Alan Keller Gomes, Diogo de Carvalho Pedrosa, Maria da Graça Campos Pimentel:

Evaluating Asynchronous Sharing of Links and Annotation Sessions as Social Interactions on Internet Videos. 184-189 - Hossain Shahriar

, Mohammad Zulkernine:
Information Source-Based Classification of Automatic Phishing Website Detectors. 190-195 - Eun-Sun Cho

, Sumi Helal
:
A Situation-Based Exception Detection Mechanism for Safety in Pervasive Systems. 196-201 - Klaus Rechert, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara:

User Centric Privacy in Mobile Communication Scenarios. 202-207 - Ahmad Kamil Abdul Hamid, Wei Zhu, Yoshihiro Kawahara

, Tohru Asami:
Design and Implementation of an AR-Assisted Tool for Basic Home Network Management. 208-213
Joint COMPSAC/SAINT Doctoral Symposium - SAINT Topics Papers (Poster Presentation)
- Akiji Tanaka:

Effects of Length and Number of Paths on Simultaneous Multi-path Communication. 214-217 - Natalia Díaz Rodríguez

:
A Framework for Context-Aware Applications for Smart Spaces. 218-221 - Yong Jin, Nariyoshi Yamai

:
Proposal of an Adaptive Firewall System in Collaboration with Extended DNS. 222-225 - Naonori Kato Sokendai:

An Analysis on Premium Value of Moral Right of Author in Japanese Copyright Law: Based on Intellectual Property High Court Judge from 2005 to 2010. 226-229 - Caroline Möckel:

Usability and Security in EU E-Banking Systems - Towards an Integrated Evaluation Framework. 230-233 - Kenji Morita:

Platform for Pushing the Device-Oriented Information into a Cloud. 234-237 - Shota Ishikawa:

Simple Wi-Fi-Based Direction Estimation of Subjects Using Directional Antenna. 238-241 - Naoki Oguchi, Shunji Abe:

Reconfigurable TCP: An Architecture for Enhanced Communication Performance in Mobile Cloud Services. 242-245 - Chia-Lung Hsieh:

Toward Better Recommender System by Collaborative Computation with Privacy Preserved. 246-249
The Second Workshop on High Speed Network and Computing Environments (HSNCE 2011)
- Yoshiyuki Asai

, Hideki Oka, Takeshi Abe
, Masao Okita, Kenichi Hagihara, Taishin Nomura
, Hiroaki Kitano
:
An Open Platform toward Large-Scale Multilevel Modeling and Simulation of Physiological Systems. 250-255 - Hiroyuki Ohsaki, Kazunori Nozaki, Ken-ichi Baba, Eisaku Sakane, Naohisa Sakamoto, Koji Koyamada, Shinji Shimojo

:
Peta-Flow Computing: Vision and Challenges. 256-259 - Shinpei Kuribayashi, Yusuke Sakumoto, Hiroyuki Ohsaki, Satoshi Hasegawa, Makoto Imase:

Performance Evaluation of Epidemic Broadcast with Directional Antennas in Vehicular Ad-Hoc Networks. 260-265 - Yuichi Togashi

:
Modeling Bio-Molecular Machinery in the Complex Environment Inside the Cell. 266 - Chunghan Lee

, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Estimating Traffic Anomalies for Throughput Prediction on Network Virtualization. 267-273 - Hiroshi Yamamoto, Genki Komada, Katsuichi Nakamura, Takashi Takahashi, Katsuyuki Yamazaki:

Performance Comparison of Enhanced TCPs over High-Speed Internetworking Satellite (WINDS). 274-278
The Second International Workshop on "Semantic Interoperability for Smart Spaces" (SISS 2011)
Enabling Technologies for Smart Spaces
- Sumi Helal:

Programming Pervasive Spaces: Workshop on Semantic Interoperability in Smart Spaces. 279 - Sachin Bhardwaj

, Tanir Özçelebi, Richard Verhoeven, Johan Lukkien:
Delay Performance in a Semantic Interoperability Architecture. 280-285 - Jarkko Kuusijärvi

, Sakari Stenudd:
Developing Reusable Knowledge Processors for Smart Environments. 286-291
Smart Space Solutions & Applications
- Matti Eteläperä, Jussi Kiljander, Kari Keinänen:

Feasibility Evaluation of M3 Smart Space Broker Implementations. 292-296 - Jani Suomalainen

, Pasi Hyttinen:
Security Solutions for Smart Spaces. 297-302 - Jussi Kiljander, Janne Takalo-Mattila, Matti Eteläperä, Juha-Pekka Soininen, Kari Keinänen:

Enabling End-Users to Configure Smart Environments. 303-308 - Susanna Pantsar-Syväniemi, Eila Ovaska

, Susanna Ferrari, Tullio Salmon Cinotti
, Guido Zamagni, Luca Roffia
, Sandra Mattarozzi, Valerio Nannini:
Case Study: Context-Aware Supervision of a Smart Maintenance Process. 309-314
The Fifth Workshop on Middleware Architecture in the Internet (MidArch 2011)
- Shigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai:

Quantifying Cost Structure of Campus PKI. 315-320 - Takaaki Komura, Hiroaki Sano, Noritoshi Demizu, Ken Makimura:

Design and Implementation of Web Forward Proxy with Shibboleth Authentication. 321-326 - Hiroyuki Sato, Takeshi Nishimura:

Federated Authentication in a Hierarchy of IdPs by Using Shibboleth. 327-332 - Yun Won Chung:

Performance Analysis of Movement-Based Group Location Management for Mobile Stations Riding on Transportation Systems in Cellular Systems. 333-337 - Takuya Horai, Yuki Iwata, Hayato Morihiro, Yasuhiro Ohishi, Kaori Maeda, Hiroyuki Inoue:

A Handover Control of Mobile Nodes with IP Mobility in Heterogeneous Wireless Networks. 338-341 - Yoshinori Miyamoto, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone:

Optimization System of IP Address Using Terminal ID in Eduroam. 342-346 - Yasuhiro Yamasaki, Yoshinori Miyamoto, Junichi Yamato, Hideaki Goto, Hideaki Sone:

Flexible Access Management System for Campus VLAN Based on OpenFlow. 347-351
The Second Workshop on Network Technologies for Security, Administration and Protection (NETSAP 2011)
Keynote
- Suguru Yamaguchi:

New Era for Management to Deal with Scalability, Invisibility and Shared Responsibility. 352
Detection of Malicious Activities
- Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake:

Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. 353-359 - Fumiharu Etoh, Yoshiaki Hori, Kouichi Sakurai:

A Study of Communication Route Selection Considering Route Security. 360-365 - Kazuya Kishimoto, Hirofumi Yamaki, Hiroki Takakura:

Improving Performance of Anomaly-Based IDS by Combining Multiple Classifiers. 366-371 - Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao:

Correlation Analysis between Spamming Botnets and Malware Infected Hosts. 372-375
The First International Workshop on the Information-Centric Web (IC-Web 2011)
- Masayuki Kakida, Yosuke Tanigawa, Hideki Tode:

Breadcrumbs+: Some Extensions of Naive Breadcrumbs for In-network Guidance in Content Centric Networks. 376-381 - Markus Lanthaler, Christian Gütl

:
SAPS: Semantic AtomPub-Based Services. 382-387 - Shinji Sugawara

, Kengo Honda, Yutaka Ishibashi:
Efficient Information Source Monitoring Method Considering User Utility in Large-Scale Networks. 388-393
The Second International Workshop on Enablers for Ubiquitous and Context-Aware Services on Sensor Networks (EUCASS 2011)
Service Platform Using Ubiquitous Sensors and Devices
- Kenji Umakoshi, Takashi Kambayashi, Manabu Yoshida, Michiharu Takemoto, Masato Matsuo:

S3: Smart Shadow System for Real World Service and Its Evaluation with Users. 394-401 - Soichiro Ushio, Kazunori Okada, Yasuhiko Kido, Tomoki Kitahara, Hidenori Tsuji, Satoko Moriguchi, Masahiko Narita, Yuka Kato

:
A Home Security Service Robot System Using the Network Service Platform and Its Implementation. 402-407 - Tohru Kondo, Toru Suzuki, Tsuyoshi Yoshigi, Hayato Morihiro, Kaori Maeda:

A Design and Evaluation of a Geolocation-Aware Reliable Multicast System on Wireless Networks. 408-413 - Takayuki Nakamura, Keiichiro Kashiwagi

, Yutaka Arakawa, Motonori Nakamura:
Design and Implementation of New uTupleSpace Enabling Storage and Retrieval of Large Amount of Schema-less Sensor Data. 414-420
Management Technology for Ubiquitous Computing and Networking
- Yasuhito Tsukahara, Takashi Tomine, Kazunori Sugiura:

Acquisition and Visualization of Hosts Connected to the Network. 421-426 - Sawamura Yusuke, Yuuichi Teranishi, Kaname Harumoto, Susumu Takeuchi

, Shojiro Nishio:
A Broadcast Method Based on Estimation and Preservation of Stable Links in Delay Tolerant Networks. 427-432 - Hideya Ochiai, Kenji Matsuo, Satoshi Matsuura, Hiroshi Esaki:

A Case Study of UTMesh: Design and Impact of Real World Experiments with Wi-Fi and Bluetooth Devices. 433-438
The Second Workshop on Company, Campus and Community Networking - Technology, Management and Ethics - (C3NET 2011)
Access Management
- Shuji Suwa, Nariyoshi Yamai

, Kiyohiko Okayama, Motonori Nakamura:
DNS Resource Record Analysis of URLs in E-Mail Messages for Improving Spam Filtering. 439-444 - Yoshiki Ishikawa, Nariyoshi Yamai

, Kiyohiko Okayama, Motonori Nakamura:
An Identification Method of PCs behind NAT Router with Proxy Authentication on HTTP Communication. 445-450 - Noppawat Chaisamran, Takeshi Okuda, Gregory Blanc

, Suguru Yamaguchi:
Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships. 451-456
Web Services
- Kanae Matsui, Masato Yamanouchi, Hideki Sunahara:

A Proposal of Framework for Information Visualization in Developing of Web Application. 457-462 - Hiroyuki Inoue, Kaoru Suzuki, Koji Sakata, Kaori Maeda:

Development of a Digital Signage System for Automatic Collection and Distribution of Its Content from the Existing Digital Contents and Its Field Trials. 463-468 - Yoshihiro Ito, Toru Tahara:

Evaluation of User-Satisfaction in Online Shopping Web Services with TCP Variables. 469-473
Future Internet Engineering (FIE 2011)
- Davide Adami

, Christian Callegari
, Stefano Giordano
, Michele Pagano
, Teresa Pepe:
A Behavioral Study of TCP Linux Variants over Satellite Networks. 474-479 - Hiroki Kashiwazaki, Yoshiaki Takai:

The Simulation Evaluation for an Adaptive Network Routing by Using Latency Information. 480-485 - Takuya Omizo, Kenji Masui, Katsuyoshi Iida

:
Design and Implementation of Inter-ISP Virtual Backbone Infrastructure to Meet Various QoS Requirements. 486-491 - Jumma S. Alanazi, Demetres D. Kouvatsos:

A Unified ME Algorithm for Arbitrary Open QNMs with Mixed Blocking Mechanisms. 492-496 - Krzysztof Nowicki, Mariusz Stankiewicz, Aniela Mrugalska, Józef Wozniak, Tomasz Mrugalski:

Extension Management of a Knowledge Base Migration Process to IPv6. 497-501 - Krzysztof Grochla

, Tadeusz Czachórski
, Jerzy Klamka:
Modelling TCP Connection in WiMAX Network Using Fluid Flow Approximation. 502-507
The Second Workshop on Heuristic Methods for the Design, Deployment, and Reliability of Networks and Network Applications (HEUNET 2011)
Application-Centric Approaches
- Masafumi Watari, Peng Jiang, Atsuo Tachibana, Shigehiro Ano:

A Method for Real-Time Identification of Malformed BGP Messages. 508-512 - Ryota Nakamura, Hiroyoshi Miwa:

Method of Locating Mirror Servers to Alleviate Load on Servers and Links. 513-518 - Hitomi Tamura

, Masato Uchida
, Masato Tsuru, Jun'ichi Shimada, Takeshi Ikenaga
, Yuji Oie:
Routing Metric Based on Node Degree for Load-Balancing in Large-Scale Networks. 519-523 - Chisa Takano, Masaki Aida, Masayuki Murata

, Makoto Imase:
Autonomous Decentralized Mechanism of Structure Formation Adapting to Network Conditions. 524-531
Meta-Heuristic Approaches
- Kei Ohnishi, Yuji Oie:

Parallel Evolutionary P2P Networking for Realizing Adaptive Large-Scale Networks. 532-537 - Mario Köppen, Kaori Yoshida, Masato Tsuru, Yuji Oie:

Annealing Heuristic for Fair Wireless Channel Allocation by Exponential Ordered-Ordered Weighted Averaging Operator Maximization. 538-543
The Fourth Workshop on IT-enalbed Services (ITeS 2011)
- Shiro Uesugi

:
Past, Present and the Future of IT-Enabled Services. 544
Information Diffusion
- Yousin Park, Masashi Ueda:

A Comparative Study on the Diffusion of Smartphones in Korea and Japan. 545-549 - Yuya Dan:

Mathematical Analysis and Simulation of Information Diffusion on Networks. 550-555
ITeS in Financial Services
- Nagul Cooharojananone, Sedtanun Chofa, Suphakant Phimoltares:

A Study on Intention to Use Factor in the Internet Banking Websites in Thailand. 556-561 - Hirotsugu Kinoshita, Yoshiaki Tajima, Naoya Kubo, Tetsuya Morizumi, Kazuhiro Suzuki:

A Local Currency System Reflecting Variety of Values. 562-567
ITeS in Commerce
- Nobuyuki Soga, Takashi Okamoto:

Using Choice Experiments to Value an Electronic Commerce. 568-573 - Kanokwan Atchariyachanvanich

, Hitoshi Okada
:
Trust on E-Commerce Website in Thailand: A Case of Online Hotel Reservation. 574-577 - Shigeichiro Yamasaki:

A Trust Rating Method for Information Providers over the Social Web Service: A Pragmatic Protocol for Trust among Information Explorers and Information Providers. 578-582
ITeS in Healthcare and Privacy Protection
- Daisuke Yamakata, Hiroki Nogawa:

Open Issues toward Successful Deployment of Electronic Health Information Exchange in Japan - Analysis of Regional Health Information Network in Kagawa Prefecture. 583-586 - Eizen Kimura

, Shinji Kobayashi
, Takeki Yoshikawa, Ken Ishihara:
A Framework for an Authorization System with Spatial Reasoning Capacity to Improve Risk Management and Information Security in Healthcare. 587-591 - Hidenobu Sai

, Yohko Orito:
Information Offering by Anonymous in Japanese Human Flesh Search: Analysis of Motivation in Social Media Platform. 592-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














