Default Cover Image

18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.

March 29 2004 to March 31 2004

Fukuoka, Japan

Volume:

Table of Contents

Table of contents - Volume 2 - AINA 2004Freely available from IEEE.pp. v,vi,vii,viii,ix,x,xi,xii,xiii,xiv
Greetings from the General Co-ChairFreely available from IEEE.pp. xv
list-reviewerFreely available from IEEE.pp. xxii-xxii
Greetings from the General Co-ChairsFreely available from IEEE.pp. xv
Welcome from the Program Committee ChairFreely available from IEEE.pp. xvi
Message from the Steering Committee ChairFreely available from IEEE.pp. xvii
Organizing CommitteeFreely available from IEEE.pp. xviii
ReviewersFreely available from IEEE.pp. xxii
Session A1R: Multimedia Applications
Development of a Test Pattern for Measurement of Color Visual MTF PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 2
Session A1R: Multimedia Applications
Extended Virtual Traditional Japanese Crafting System on CAVEFull-text access may be available. Sign in or learn about subscription options.pp. 6
Session A1R: Multimedia Applications
Kansei Retrieval Method using VPIC of Traditional Japanese Crafting ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 10
Session A1R: Multimedia Applications
Utilizing the Mixer Method for Content ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 14
Session A1R: Multimedia Applications
A Personal Tourism Navigation System to Support Traveling Multiple Destinations with Time RestrictionsFull-text access may be available. Sign in or learn about subscription options.pp. 18
Session B1R: Secure Mechanisms and Protocols
An Improved Nominative Proxy Signature Scheme for Mobile CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 23
Session B1R: Secure Mechanisms and Protocols
Secure Instant Messaging Protocol Preserving Confidentiality against AdministratorFull-text access may be available. Sign in or learn about subscription options.pp. 27
Session B1R: Secure Mechanisms and Protocols
Secret Sharing with Access Structures in a HierarchyFull-text access may be available. Sign in or learn about subscription options.pp. 31
Session B1R: Secure Mechanisms and Protocols
Secure Signals Transmission Based on Quaternion Encryption SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 35
Session B1R: Secure Mechanisms and Protocols
High-Speed Stream CipherFull-text access may be available. Sign in or learn about subscription options.pp. 39
Session B1R: Secure Mechanisms and Protocols
A Proposal and its Evaluations of a Re-keying Method for Dynamic Secure Group CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 43
Session C1R: QoS
On the Performance of Heuristic H MCOP for Multi-Constrained Optimal-Path QoS RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 50
Session C1R: QoS
A Proposal of a Streaming Video System in Best-Effort Networks Using Adaptive QoS Control RulesFull-text access may be available. Sign in or learn about subscription options.pp. 54
Session C1R: QoS
Packet Loss Rate Control for Continuous Media over Heterogeneous NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 58
Session C1R: QoS
A Markov Model for Quality of Service of Failure Detectors in the Pressure of Loss BurstsFull-text access may be available. Sign in or learn about subscription options.pp. 62
Session C1R: QoS
Design and Implementation of Multi-User 3D-Virtual Space with QoS Awareness Based on Multi-Agent FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 68
Session C1R: QoS
QoS Control Function based on User's Information on the 3D Virtual Shared SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 74
Session D1R: Mobile Networks Protocols and Applications
Guard Channel Sharing Strategies in Integrated Voice/Data Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 79
Session D1R: Mobile Networks Protocols and Applications
Concurrency Control in Mobile Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 83
Session D1R: Mobile Networks Protocols and Applications
Recovery Protocol for Dynamic Network Reconstruction on Disaster Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 87
Session D1R: Mobile Networks Protocols and Applications
Wireless Sporadic Communication Protocol for Supporting Cluster-to-Base Station CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 91
Session D1R: Mobile Networks Protocols and Applications
Distance Based Location Management in Cellular PCS Network -a Critical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 95
Session D1R: Mobile Networks Protocols and Applications
Towards a Model for Personalized Communication ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 99
Session E1R: Distance Learning and Education Systems
Applying XML and XSLT Techniques to a Personalized Distance Learning System for Business Mathematical EducationFull-text access may be available. Sign in or learn about subscription options.pp. 104
Session E1R: Distance Learning and Education Systems
Course On-demand Modular Tool for Designing Distance Learning CoursesFull-text access may be available. Sign in or learn about subscription options.pp. 108
Session E1R: Distance Learning and Education Systems
A Content-Based Image Retrieval System for Outdoor Ecology Learning: A Firefly Watching SystemFull-text access may be available. Sign in or learn about subscription options.pp. 112
Session E1R: Distance Learning and Education Systems
Multistory Annotation System: a Novel Application of Distance LearningFull-text access may be available. Sign in or learn about subscription options.pp. 116
Session E1R: Distance Learning and Education Systems
An Applicative Distance Education Payment ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 120
Session E1R: Distance Learning and Education Systems
Using RDF/RDFS to support Visualized Online Authoring Tool for TeachersFull-text access may be available. Sign in or learn about subscription options.pp. 124
Session F1R: Multi-agent Systems
Evaluation of Multi-Agent Model for Community Formation in Network SocietyFull-text access may be available. Sign in or learn about subscription options.pp. 131
Session F1R: Multi-agent Systems
Distributed Logic Programming using Mobile AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 137
Session F1R: Multi-agent Systems
An Agent-Based Consumer Recommendation MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 143
Session F1R: Multi-agent Systems
On Agents' Cooperative Behavior Based on Potential FieldFull-text access may be available. Sign in or learn about subscription options.pp. 149
Session F1R: Multi-agent Systems
Collaborative Neuro-BDI Agents in Container TerminalsFull-text access may be available. Sign in or learn about subscription options.pp. 155
Session A2R: Authentication and Certification
On the Security of an Enhanced Authentication Key Exchange ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 160
Session A2R: Authentication and Certification
Stream Authentication Scheme for the use over the IP TelephonyFull-text access may be available. Sign in or learn about subscription options.pp. 164
Session A2R: Authentication and Certification
Yet Another Attack on a QR-based Password Authentication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 170
Session A2R: Authentication and Certification
A Merging Method of Certification Authorities Without Using Cross-CertificationsFull-text access may be available. Sign in or learn about subscription options.pp. 174
Session A2R: Authentication and Certification
A Performance Study of Over-Issuing Delta-CRLs with Distribution PointsFull-text access may be available. Sign in or learn about subscription options.pp. 178
Session A2R: Authentication and Certification
An Identity-based Ring Signature Scheme from Bilinear PairingsFull-text access may be available. Sign in or learn about subscription options.pp. 182
Session B2R: Network Architectures
Design and Implementation of a SIP-based VoIP ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 187
Session B2R: Network Architectures
A Next Generation Knowledge Management System ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 191
Session B2R: Network Architectures
Architecture for a Peer-to-peer Network with IP MulticastingFull-text access may be available. Sign in or learn about subscription options.pp. 196
Session B2R: Network Architectures
Can Streaming Of Stored Playback Video Be Supported On Peer to Peer Infrastructure?Full-text access may be available. Sign in or learn about subscription options.pp. 200
Session B2R: Network Architectures
A Ubiquitous 1-to-k Media Streaming Architecture Using the IPv4/IPv6 Multicast Transition Gateway ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 204
Session B2R: Network Architectures
A Proposal of DNS-Based Adaptive Load Balancing Method for Mirror Server Systems and Its ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 208
Session C2R: Laser Application, Multiplexing and Graph
Observation and Application of Laser Induced Shock WaveFull-text access may be available. Sign in or learn about subscription options.pp. 215
Session C2R: Laser Application, Multiplexing and Graph
A Scheme of M-ary Multi-Carrier Spread Spectrum Based on Wavelet PacketFull-text access may be available. Sign in or learn about subscription options.pp. 219
Session C2R: Laser Application, Multiplexing and Graph
Maximum Likelihood Estimation of Integer Frequency Offset for OFDMFull-text access may be available. Sign in or learn about subscription options.pp. 223
Session C2R: Laser Application, Multiplexing and Graph
A Graph-based Methodology for Analyzing IP Spoofing AttackFull-text access may be available. Sign in or learn about subscription options.pp. 227
Session D2R: Cluster and Parallel Processing
Improving Web Server Performance by a Clustering-Based Dynamic Load Balancing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 232
Session D2R: Cluster and Parallel Processing
An Effective Bus-Band Arbiter for Processors CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 236
Session D2R: Cluster and Parallel Processing
Design of A Novel Real-Shared Memory Module for High Performance Parallel Processor System with Shared MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 241
Session D2R: Cluster and Parallel Processing
Architectural Design of a DSP Scripting Language for Mobile Multimedia TerminalsFull-text access may be available. Sign in or learn about subscription options.pp. 245
Session E2R: Mobile Network Algorithms and Applications
One-Way Differential Delay Used for Path Selection on Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 250
Session E2R: Mobile Network Algorithms and Applications
AgentUDM: A Mobile Agent Based Support Infrastructure for Ubiquitous Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 256
Session E2R: Mobile Network Algorithms and Applications
An Efficient Cache Invalidation Strategy in Mobile EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 260
Session E2R: Mobile Network Algorithms and Applications
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 264
Session E2R: Mobile Network Algorithms and Applications
Mobile Agents as Smart Virtual CounterpartsFull-text access may be available. Sign in or learn about subscription options.pp. 270
Session E2R: Mobile Network Algorithms and Applications
A Location-aware Layer 7 Proxy Handoff Mechanism over the Mobile Network EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 274
Session F2R: Web-Based Systems
Web Browsing Activity Visualization System for Administrator Assistance Using Users' Web Browsing BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 279
Session F2R: Web-Based Systems
Tele-Lab IT Security: A Means to Build Security Laboratories on the WebFull-text access may be available. Sign in or learn about subscription options.pp. 285
Session F2R: Web-Based Systems
Distributed Replication and Caching: A Mechanism for Architecting Responsive Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 289
Session F2R: Web-Based Systems
Development and Evaluation of a Minutes System Focusing on Importance in a MeetingFull-text access may be available. Sign in or learn about subscription options.pp. 293
Session F2R: Web-Based Systems
Topic-Centric Algorithm: A Novel Approach to Web Link AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 299
Session F2R: Web-Based Systems
WebTop XML Editor supporting Operations on Views generated by User-Defined StylesFull-text access may be available. Sign in or learn about subscription options.pp. 302
Session A3R: Resource Allocation and Traffic Management
A Balanced Multicast Overlay Protocol - AppcastFull-text access may be available. Sign in or learn about subscription options.pp. 307
Session A3R: Resource Allocation and Traffic Management
A Design and Evaluation of Ethernet Links Bundling SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 313
Session A3R: Resource Allocation and Traffic Management
Combining Markovian Chains and Real Time Agreement Protocols to Allocate Resources in Wireless SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 317
Session A3R: Resource Allocation and Traffic Management
Balancing Workload based on Content Types for Scalable Web Server ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 321
Session A3R: Resource Allocation and Traffic Management
Chain-packet SwitchingFull-text access may be available. Sign in or learn about subscription options.pp. 326
Session A3R: Resource Allocation and Traffic Management
Multi-Path Transmission based on Overlay NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 330
Session B3R: Wireless Network Performance
IEEE 802.11 Distributed Coordination Function: Performance Analysis and Protocol EnhancementFull-text access may be available. Sign in or learn about subscription options.pp. 335
Session B3R: Wireless Network Performance
Comparison of Power Saving Schemes for Sink Nodes in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 339
Session B3R: Wireless Network Performance
Performance Analysis of IEEE 802.11 WLAN to Support Voice ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 343
Session B3R: Wireless Network Performance
A New Efficient MAKEP for Wireless CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 347
Session B3R: Wireless Network Performance
On the Traffic Disruption Time and Packet Lost Rate during the Handover Mechanisms in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 351
Session B3R: Wireless Network Performance
A Packet Scheduling Scheme for Broadband Wireless Networks with Heterogeneous ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 355
Session C3R: Security and Signature
A Mobile Agent Security ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 360
Session C3R: Security and Signature
The Key-bits in Turbo Codes and Their ProtectionsFull-text access may be available. Sign in or learn about subscription options.pp. 366
Session C3R: Security and Signature
A Secure Wireless LAN System Retaining PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 370
Session C3R: Security and Signature
A Key Assignment Scheme for Controlling Access in Partially Ordered User HierarchiesFull-text access may be available. Sign in or learn about subscription options.pp. 376
Session C3R: Security and Signature
ID-Based Proxy Blind SignatureFull-text access may be available. Sign in or learn about subscription options.pp. 380
Session C3R: Security and Signature
Provably Secure and ID-Based Group Signature SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 384
Session D3R: Access Control Methods and Protocols
A User Adaptive Scheduling Multiple Access ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 389
Session D3R: Access Control Methods and Protocols
A Class-based Allocation Mechanism for Delay Sensitive Traffic in WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 393
Session D3R: Access Control Methods and Protocols
Access Control by using Object Properties and Categorized MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 397
Session D3R: Access Control Methods and Protocols
An Access Control Model Based on Distributed Knowledge ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 403
Session D3R: Access Control Methods and Protocols
Advanced Semisoft Handoff Method of Cellular IP Access NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 407
Session D3R: Access Control Methods and Protocols
Adaptable Access Strategies Provide a High Usefulness of the Objects in an Open Distributed EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 413
Session E3R: Ad Hoc Networks
Multicast Routing Representation in Ad Hoc Networks Using Fuzzy Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 420
Showing 100 out of 132