


default search action
SAINT 2010: Seoul, Korea
- Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings. IEEE Computer Society 2010, ISBN 978-1-4244-7526-1

Applications
- Ami Kadowaki, Daisuke Noguchi, Sayumi Sugimoto, Yuichi Bannai, Ken-ichi Okada:

Development of a High-Performance Olfactory Display and Measurement of Olfactory Characteristics for Pulse Ejections. 1-6 - Ikki Fujiwara

, Kento Aida, Isao Ono:
Applying Double-Sided Combinational Auctions to Resource Allocation in Cloud Computing. 7-14 - Ling Xu, Chainan Satayapiwat, Hiroyuki Takizawa

, Hiroaki Kobayashi:
Resisting Sybil Attack By Social Network and Network Clustering. 15-21
Security
- Akihiro Shimoda, Tatsuya Mori

, Shigeki Goto:
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. 22-30 - Michelle Ruse, Tanmoy Sarkar, Samik Basu:

Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs. 31-37 - Chris Strasburg, Sandeep Krishnan, Karin S. Dorman

, Samik Basu, Johnny S. Wong:
Masquerade Detection in Network Environments. 38-44
Network Systems
- María Alpuente

, Daniel Romero:
A Tool for Computing the Visual Similarity of Web Pages. 45-51 - Yong Jin, Nariyoshi Yamai

, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. 52-58 - Shariful Hasan Shaikot, Min Sik Kim:

Lightweight Traffic-Aware Packet Classification for Continuous Operation. 59-67
Mobile and Wireless I
- Dong Zhou, Ajay Chander, Hiroshi Inamura

:
Optimizing User Interaction for Web-Based Mobile Tasks. 68-76 - Jin Ho Kim, Rim Haw, Eung Jun Cho, Choong Seon Hong

, Jongwon Choe:
Design and Implementation of NEMO Based ZigBee Mobile Router for Healthcare System. 77-83 - Choon-Oh Lee, Minkyu Lee, Dongsoo Han

:
Energy-Efficient Location Logging for Mobile Device. 84-90
Mobile and Wireless II
- Sungwook Kim, Ji-Hwan Kim:

Dynamic Self-Reconfiguration Algorithms for Wireless Sensor Networks. 91-95 - Chao Chen, Yi Xu, Kun Li, Sumi Helal

:
Reactive Programming Optimizations in Pervasive Computing. 96-104
Short Papers I
- Florian Skopik

, Daniel Schall, Schahram Dustdar
:
Supporting Network Formation through Mining under Privacy Constraints. 105-108 - Nobuo Funabiki, Toru Nakanishi, Noriki Amano

, Hiroki Kawano, Yuuki Fukuyama, Megumi Isogai:
Software Architecture and Characteristic Functions in Learning Management System "NOBASU". 109-112 - Bernd Niklas Klein, Klaus David:

Basic Approach of Timing in Context Aware Architectures Verified by Concrete Advantages. 113-116 - Xiaoqing (Frank) Liu, Ravi Santosh Arvapally, Hojong Baik, Rubal Wanchoo:

Web-Based Intelligent Computational Argumentation Based Conflict Resolution in Air Traffic Management. 117-120
Short Papers II
- Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto:

A Cloud Trust Model in a Security Aware Cloud. 121-124 - Yoshitomo Murata, Ryusuke Egawa, Manabu Higashida, Hiroaki Kobayashi:

A History-Based Job Scheduling Mechanism for the Vector Computing Cloud. 125-128 - Takumi Seike, Yong Jin, Nariyoshi Yamai

, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura:
A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses. 129-132
Symposium Student Session I: Application
- Ryo Wakuta, Tomohiro Sonobe:

SPGF Search Places by Geographical Features all Around the World: Search and Verification System Utilizing Huge Amounts of Satellite Data. 133-136 - Kei Homma, Satoru Izumi, Yuki Abe, Kaoru Takahashi, Atsushi Togashi:

Using the Model Checker Spin for Web Application Design. 137-140
Symposium Student Session II: User Support
- Asad Masood Khattak, Zeeshan Pervez

, Koo Kyo Ho, Sungyoung Lee, Young-Koo Lee:
Intelligent Manipulation of Human Activities Using Cloud Computing for u-Life Care. 141-144
Symposium Student Session III: Mobile & Wireless
- Feelhwan Park, Yoh Shiraishi, Osamu Takahashi:

A Study on Small Business Advertising Using E-mail Transmitting Screens on Mobile Phones. 145-148 - Md. Obaidur Rahman, Muhammad Mostafa Monowar, Choong Seon Hong

, Young An Kim:
Reservation Based Reliability Control in Wireless Sensor Networks. 149-152 - Hidenobu Watanabe, Hajime Masaoka, Toshihiro Ohigashi

, Tohru Kondo, Kouji Nishimura
, Reiji Aibara:
Supporting USB Devices for the Global Migration. 153-156
Symposium Student Session IV: Security
- Hyeopgeon Lee, Kyounghwa Lee, Yongtae Shin:

An Enhanced Key Distribution Scheme for the Energy Consumption and the Security in the Wireless Sensor Networks. 157-160 - Yoshinori Osawa, Satoru Imamura, Atsushi Takeda, Gen Kitagata, Norio Shiratori, Kazuo Hashimoto:

A Proposal of Privacy Management Architecture. 161-164 - Mohamad Samir A. Eid, Hitoshi Aida:

Securely Hiding the Real Servers from DDoS Floods. 165-168
Symposium Student Session V: Social Network
- Kazufumi Yogo, Ryoichi Shinkuma

, Tatsuro Takahashi, Taku Konishi, Satoko Itaya, Shinichi Doi, Keiji Yamada:
Differentiated Incentive Rewarding for Social Networking Services. 169-172 - Yoshinori Takata, Ryo Hashimoto, Ryoichi Shinkuma

, Tatsuro Takahashi, Naoki Yoshinaga, Satoko Itaya, Shinichi Doi, Keiji Yamada:
Incentive Rewarding Method for Information Propagation in Social Networks. 173-176 - Sho Tsugawa, Kazuya Takahashi, Hiroyuki Ohsaki, Makoto Imase:

Robust Estimation of Message Importance Using Inferred Inter-recipient Trust for Supporting Email Triage. 177-180
Symposium Student Session VI: P2P
- Hiroaki Yamanaka, Toru Fujiwara, Shingo Okamura:

A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay. 181-184 - Akihiro Nakarai, Akira Sakatoku, Atsushi Takeda, Gen Kitagata, Debasish Chakraborty, Kazuo Hashimoto, Norio Shiratori:

An Overlay Authentication Network for Active Utilization of Private Information. 185-188
Management and Application of Ubiquitous Sensor Data (EUCASS 2010)
- Yuka Higashijima, Atsushi Yamamoto, Takayuki Nakamura, Motonori Nakamura, Masato Matsuo:

Missing Data Imputation Using Regression Tree Model for Sparse Data Collected via Wide Area Ubiquitous Network. 189-192 - Muhammad Shoaib Siddiqui, Choong Seon Hong

:
Resource & Configuration Management for WSN in the Future Internet. 193-196 - Nobuhiko Matsuura, Hiroshi Mineno

, Norihiro Ishikawa
, Tadanori Mizuno:
Evaluation of B+Tree-Based Multi-dimensional Range Search Algorithm for P2P Networks. 197-200 - Kentaro Fujiwara, Kaname Harumoto, Yuuichi Teranishi, Toyokazu Akiyama, Susumu Takeuchi, Shojiro Nishio:

A Self-Localization Method Using Propagation of Existence Probability. 201-204
Ubiquitous Services and Platforms (EUCASS 2010)
- Tohru Kondo, Reiji Aibara, Kouichi Abe, Yuuiti Ishikuni, Hiroyuki Inoue, Kaori Maeda:

A Design and Development of a Multi-source Streaming Platform Based on a Building Block Architecture. 205-208 - Koji Sato, Shiro Sakata:

ManeuverXML: Distance-Measurement Based Operation Event Description Model and User Interaction Interpretation. 209-212 - Hiroshi Dempo, Makiko Yoshida:

CUBIQ: Cross UBIQuitous Platform Architecture. 213-216 - Michiharu Takemoto, Takashi Kambayashi, Takahiro Hata, Kentaro Uchiyama, Kenji Umakoshi:

Smart Shadow: Platform to Provide Real-World Services in Ubiquitous Environments and Its Applications. 217-220
Applications (C3NET 2010)
- Robert J. Fouser:

From CMS to SNS: Exploring the Use of Facebook in the Social Constructivist Paradigm. 221-224 - Kaori Maeda, Masahiro Nishi, Teruaki Yoshida, Kaoru Suzuki, Hiroyuki Inoue:

Digital Signage with Audience Detection Using TV Broadcasting Waves. 225-228 - Takashi Yamanoue:

A Draw Plug-In for a Wiki Software. 229-232
Architectures (C3NET 2010)
- Yoshihiro Ito:

Calculation of Necessary QoS for User Satisfaction with a QoS Mapping Matrix. 233-236 - Ryo Murakami, Nariyoshi Yamai

, Kiyohiko Okayama:
A MAC-address Relaying NAT Router for PC Identification from Outside of a LAN. 237-240 - Satoshi Matsumoto, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano, Yusuke Shomura, Kenichi Yoshida:

A Method for Analyzing Network Traffic Using Cardinality Information in Firewall Logs. 241-244 - Sho Jitsuto, Yong Jin, Kiyohiko Okayama, Nariyoshi Yamai

:
A Dynamic Routing Method for Inbound E-mail Delivery Considering Route and MTA Conditions on Multihomed Environment. 245-248 - Hajime Masaoka, Seigo Kishiba, Tohru Kondo, Kouji Nishimura

, Reiji Aibara, Akio Seki:
Evaluation of P2P File Distribution Using IP Mobility. 249-252
Challenges on Preventing Malicious Activities (NETSAP 2010)
- Hyeongu Son, Youngseok Lee

:
Detecting Anomaly Traffic using Flow Data in the real VoIP network. 253-256 - Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao:

An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers. 257-260 - Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai:

A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks. 261-264 - Katsunari Yoshioka

, Yoshihiko Hosobuchi, Tatsunori Orii, Tsutomu Matsumoto:
Vulnerability in Public Malware Sandbox Analysis Systems. 265-268
Theoretical Security Issues (NETSAP 2010)
- Don-Gu Yeo, Heung-Youl Youm:

An µTESLA Protocols with Multi-senders Based on a 2-Level XOR Chain with Data-Loss Tolerance. 269-272 - Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao:

How to Locate a Target Binary Process and Its Derivatives in System Emulator. 273-276 - Yong-hee Jang, Yong-jin Kwon:

Efficient Scalar Multiplication Algorithms Secure against Power Analysis Attacks for Koblitz Curve Cryptosystems. 277-280
Single Sign-On & Federation (MidArch 2010)
- Kazutsuna Yamaji, Toshiyuki Kataoka, Motonori Nakamura, Tananun Orawiwattanakul, Noboru Sonehara:

Attribute Aggregating System for Shibboleth Based Access Management Federation. 281-284 - Hisashi Takahara, Motonori Nakamura:

Enhancement of SIP Signaling for Integrity Verification. 289-292
Network Middleware (MidArch 2010)
- Chikara Sasaki, Atsushi Tagami, Shigehiro Ano:

Implementation Approach for Network Coding using External Devices in IP Multicast. 293-296 - Ichiro Yamaguchi, Takaaki Suzuki, Hideaki Goto, Hideaki Sone:

Centralized Authentication System for Location Privacy Protection and Low Operational Cost of Large Scale WLAN Roaming. 297-299
Trust and ITeS (ITeS 2010)
- Shigeichiro Yamasaki:

A Dynamic Trust Estimation Method for 'Persona' from the Human Relationship of Social Web. 300-303 - Manish Pokharel, Seulki Lee, Jong Sou Park:

Disaster Recovery for System Architecture Using Cloud Computing. 304-307 - Takahisa Suzuki, Tetsuro Kobayashi

:
Web-Based Experiment to Analyze Norms of Reputation Making: How to Evaluate Actions with a Opponent Having a Bad Reputation. 308-311
ITeS and Payment (ITeS 2010)
- Nagul Cooharojananone, Kamonwan Taohai, Suphakant Phimoltares:

A New Design of ATM Interface for Banking Services in Thailand. 312-315 - Hirotsugu Kinoshita, Kudo Mamoru, Tetsuya Morizumi, Kazuhiro Suzuki:

An Electronic Money System as Substitute for Banknotes. 316-319 - Takashi Okamoto:

The Study on Consumer Behavior of Online Shops. 320-323
ITeS and Infrastructure (ITeS 2010)
- Hidenobu Sai

:
The Problems for Diffusion of Location Based Services in Rural Areas. 324-327 - Yunju Chen, Masashi Ueda, Yousin Park:

An Analysis of IPTV Competition Model. 328-331 - Yu-Hui Tao:

Transforming the Interactive Response System to a Cloud Voting Service. 332-334
Next Generation Networks (HSNCE 2010)
- KwangJong Cho, SeongHae Kim, HyeakRo Lee:

GLORIAD-KR and Its Advanced Applications. 335-338 - Yusuke Sakumoto, Hiroyuki Ohsaki, Makoto Imase:

On the Effectiveness of Thorup's Shortest Path Algorithm for Large-Scale Network Simulation. 339-342 - Takamichi Nishijima, Hiroyuki Ohsaki, Yoshihiro Nomoto, Makoto Imase:

Performance Evaluation of Block Device Layer with Automatic Parallelism Tuning Using Heterogeneous IP-SAN Protocols. 343-346
Applications for Next Generation Networks (HSNCE 2010)
- Paulo Gonçalves, Xavier Grandchamp, Xavier Pelorson, Bruno Raffin, Annemie Van Hirtum, Pascale Vicat-Blanc, Ken-ichi Baba, Julien Cisonni

, Yasuo Ebara, Kazunori Nozaki, Hiroyuki Ohsaki, Shigeo Wada, Takuma Kawamura, Koji Koyamada, Eisaku Sakane, Naohisa Sakamoto, Shinji Shimojo
:
Petaflow - A Project Towards Information and Communication Technologies in Society. 347-350 - Julien Cisonni

, Shigeo Wada, Kazunori Nozaki, Annemie Van Hirtum:
Towards Sibilant [s] Physical Modeling: Numerical Study of the Influence of the Aperture of a Tooth-Shaped Constriction on the Flow-Induced Noise. 351-354 - Takashi Suda, Manabu Higashida, Ken-ichi Baba, Kazunori Nozaki:

The Complementary Registration Method for Vocal Tract of Sibilant /s/. 355-358
Intrusion Detection & Vulnerabilities (CSnP 2010)
- Jingyu Hua, Takashi Nishide, Kouichi Sakurai:

Model-Based Intrusion Detection by Abstract Interpretation. 359-362 - Nobutaka Kawaguchi, Kazuya Okouchi, Hirofumi Nakakoji, Tetsuro Kito, Tomonori Shigemoto, Masato Terada:

Enhancing Network Based Bot Detection with Contextual Information. 363-366 - Toshiki Harada, Akira Kanaoka, Eiji Okamoto, Masahiko Kato:

Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSS. 367-370 - Fumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai:

Study of Log File Dispersion Management Method. 371-374
Emerging Security Issues & Panel on Smart Phone Security (CSnP 2010)
- Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai:

Behavior Control Based on Dynamic Code Translation. 375-378
Ubiquitous Healthcare Systems (CbuH 2010)
- Jae Hyoung Cho, Yoon-Hee Choi, Mi-Ja Kang, Hun-Sung Kim, Jeong-Ah Shin, Jin-Hee Lee, Kun-Ho Yoon:

Urgent Need of Ubiquitous Healthcare for Chronic Disease Management: Focused on Diabetes for the First Step. 379-382 - Jin Wang, Imanishimwe Jean de Dieu, Asturias De Leon Diego Jose, Sungyoung Lee, Young-Koo Lee:

Prolonging the Lifetime of Wireless Sensor Networks via Hotspot Analysis. 383-386 - Asad Masood Khattak, Zeeshan Pervez

, A. M. Jehad Sarkar, Young-Koo Lee:
Service Level Semantic Interoperability. 387-390
Ubiquitous Healthcare Management (CbuH 2010)
- Il Kon Kim, Zeeshan Pervez

, Asad Masood Khattak, Sungyoung Lee:
Chord Based Identity Management for e-Healthcare Cloud Applications. 391-394 - La The Vinh, Nguyen Duc Thang, Young-Koo Lee:

An Improved Maximum Relevance and Minimum Redundancy Feature Selection Algorithm Based on Normalized Mutual Information. 395-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














