Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
APSITT
APSITT 2005
Generate Citations
6th Asia-Pacific Symposium on Information and Telecommunication Technologies
Nov. 9 2005 to Nov. 10 2005
Yangon
Table of Contents
Practical TCP session take-over method for high-availability network service
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
T. Ikebe
,
Y. Kawarasaki
,
J. Yamanaka
,
Hiroshi Yao
Performance Improvement of TCP using Performance Enhancing Proxies - Effect of Premature ACK Transmission Timing on Throughput -
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
S. Osada
,
T. Yokohira
,
Wang Hui
,
K. Okayama
,
N. Yamai
Prioritized ACK transfer mechanisms for PLC media control access
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-16
by
T. Morishita
,
H. Inai
Implementation Experiments of the TCP Proxy Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-22
by
K. Yamanegi
,
T. Hama
,
Go Hasegawa
,
M. Murata
,
H. Shimonishi
,
T. Murase
Statistical Evaluation of TCP Packet Loss Rate Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-28
by
Y. Yamasaki
,
H. Shimonishi
,
T. Murase
Adaptive Control Method for Massive and Intensive Traffic in Communication-Broadcasting Integrated Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
H. Koto
,
H. Furuya
,
H. Nakamura
Network Resource Management with Distributed Database Systems for Scalable Admission Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-40
by
T. Sato
,
A. Masuda
,
H. Kasahara
Method of improving bandwidth and connectivity with multiple links in nomadic network environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-46
by
T. Moriya
,
H. Ohnishi
,
T. Ogawa
,
T. Ito
Experimental Evaluations of Gentle HighSpeed TCP for Long-Fat Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Zongsheng Zhang
,
Go Hasegawa
,
M. Murata
A Quality Evaluation of High-Speed Video Streaming on Congested IP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-58
by
M. Yabe
,
S. Yokota
,
T. Nakajima
A Collaborative Mobile Agent-based Workflow System
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-65
by
T. Aye
,
Khin Mar Lar Tun
A Framework of Using Mobile Agent to Achieve Efficient Load Balancing in Cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-70
by
Cho Cho Myint
,
Khin Mar Lar Tun
MOBILE AGENT COOPERATION METHODS IN HYBRID QUERY OPTIMIZATION
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-76
by
T. Win
,
Khin Mar Lar Tun
Mobile Agents Based Load Balancing Method for Parallel Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
H.A. Thant
,
Khaing Moe San
,
Khin Mar Lar Tun
,
T.T. Naing
,
N. Thein
Mobile Agent Based Collaborative Learning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-88
by
Khaing Moe San
,
H.A. Thant
,
S.S. Aung
,
Khin Mar Lar Tun
,
T.T. Naing
,
Ni Lar Thein
A Framework for Mobile Agent Systems with the Capability of Preceding and Following Users
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-94
by
T. Yokohira
,
K. Okayama
,
T. Murakami
,
K. Takarako
Myanmar Character Identification of Handwriting Between Exhibit and Specimen
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-98
by
Soe Hae Mar
,
Ni Lar Thein
Recognition and Translation of the Myanmar Printed Text Based on Hopfield Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Thynzar Swe
,
Pike Tin
A Comparison of Recognition for Off-line Myanmar Handwriting and Printed Characters
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-110
by
K. Sandar
To Visualize the Coupling among Modules
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-116
by
H.M. Kaung
,
Nan Si Kham
,
Ni Lar Thein
Examination of Image Retrieval System Using Subjective Image Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-121
by
M. Ito
,
M. Koike
,
K. Ikeda
,
S. Hidaka
,
T. Aoki
PARIS: A Personal Archiving and Retrieving Image System
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-125
by
Pei-Jeng Kuo
,
T. Aoki
,
H. Yasuda
A Study on Real-time Virtual Clothing system based on Two-Dimensional Plane Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-130
by
A. Taguchi
,
T. Aoki
,
H. Yasuda
A proposal of the new content distribution model -Content distributed with Ads-
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-135
by
D. Inada
,
A. Taguchi
,
T. Aoki
,
H. Yasuda
Detection of direction that a waving action indicates toward a dialog system
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-141
by
Y. Tatsuya
,
N. Abe
,
K. Tanaka
,
H. Taki
,
T. Yagi
,
Shoujie He
Informative Query Answering by using RDQL for E-Commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-147
by
Myat Thuzar Tun
,
Ni Lar Thein
Network Communication Strategies for Cooperative Physical Agents
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-153
by
Y. Matsuyama
,
T. Shiga
,
T. Chikagawa
,
N. Takahashi
,
Y. Ueda
Efficiently Creating Dynamic Web Content: A Fragment Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-159
by
A.A. Khaing
,
Ni Lar Thein
Model-based Testing Considering Cost, Reliability and Software Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-164
by
C.Y. Htoon
,
Ni Lar Thein
Linear Programming Approach to Diet Problem for Black Tiger Shrimp in Shrimp Aquaculture
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
M.S. Htun
,
Tin Tin Thein
,
Pyke Tin
A study of full-motion video delivery system following user's movement by utilizing user-context
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-176
by
T. Yamaguchi
,
H. Shiba
,
K. Shimamura
Content Clustering Based on Users'subjective Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-182
by
Y. Suda
,
K. Yamori
,
Y. Tanaka
IP Multicast Content Delivery System for Large-Scale Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-186
by
N.N. Khaing
,
T. Phyu
,
T.T. Naing
Reliable Multicast Communication System over IPv4/IPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-191
by
S.S. Khaing
,
M.P. Oo
,
T.T. Naing
On the Location of Routers with Network Support in Content Distribution Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-197
by
H. Miura
,
M. Yamamoto
Organizing Web Documents Resulting from an Information Retrieval System Using Formal Concept Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-203
by
N.N. Myat
,
Khin Haymar Saw Hla
Desktop search system based on the Action-Oriented algorism
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-207
by
T. Morita
,
T. Hidaka
,
T. Kura
,
K. Ooura
,
Y. Kato
Mining frequent patterns from XML data
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-212
by
C.N. Win
,
Khin Haymar Saw Hla
A Migration Framework for Ubiquitous Computing Applied in Mobile Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-218
by
K.P. Thant
,
T.T. Naing
A Method for Generating Context-Aware Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-223
by
J. Maeda
,
M. Takase
,
M. Kakemizu
Service Creation Method based on Parlay for Ubiquitous Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-229
by
Moo Wan Kim
Traffic Features Fit for P2P Discrimination
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-235
by
T. Matsuda
,
F. Nakamura
,
Y. Wakahara
,
Y. Tanaka
Future Service Platform and Home Gateway
Full-text access may be available. Sign in or learn about subscription options.
pp. 236-241
by
M. Takizawa
,
T. Minato
,
T. Furukawa
,
K. Seki
,
H. Shimada
A Proposal to Implement Mobile Wireless IP Telephony to the Mekong River Region
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-247
by
Y. Hatakeyama
,
K. Takeshita
,
H. Ichikawa
,
Y. Yokoi
,
H. Otani
,
A. Goto
,
T. Yooyativong
,
M. Matsumoto
High-speed Processing and High Reliability in a Wired-and-Wireless Integrated Autonomous Decentralized IC Card Ticket System
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-253
by
A. Shiibashi
A Study on e-Government Policy in Mongolia
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-259
by
Sc.B. Sukhbaatar
,
U. Odgerel
Notice of Violation of IEEE Publication Principles: An MDA based Approach for Facilitating Representation of Semantic Web Service Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-265
by
T. Win
,
Hninn Mar Aung
,
Ni Lar Thein
Software Agent Oriented Information Integration System in Semantic Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-271
by
P.P. Nyunt
,
Ni Lar Thein
Geospatial Semantic Query by Integrating Geospatial Reasoning on the Geospatial Semantic Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-275
by
K.K. Win
,
Khin Haymar Saw Hla
Efficient Scheduling of Resources for Parallel Query Processing on Grid-based Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-281
by
Khin Mar Soe
,
A.A. Nwe
,
T.N. Aung
,
T.T. Naing
,
Ni Lar Thein
LIN6 Extensions for Simultaneous Utilization of Multiple Wireless Base Stations
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-287
by
Kenji Fujikawa
,
Hiroki Nakano
,
Mitsunobu Kunishi
,
Takaaki Komura
A Study of the Three-Valued CSK Spread ALOHA System
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-292
by
Y. Ogose
,
T. Arai
,
H. Inai
,
H. Habuchi
A Proposal of Forwarding Method for Urgent Messages on an Ubiquitous Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-298
by
K. Ishibashi
,
M. Yano
A Distributed and Self-organizing Data Gathering Scheme in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-304
by
Y. Taniguchi
,
N. Wakamiya
,
M. Murata
Interactive Video Transmission over Wireless Ad Hoc Networks using Multiple Sources and Multiple Description Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-309
by
CheeOnn Chow
,
H. Ishii
Routing Algorithm in Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-315
by
D. Kasamatsu
,
N. Shinomiya
,
T. Ohta
Programmable Ad hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-321
by
D. Okada
,
K. Sodeyama
,
T. Ohta
A Key Distribution Scheme for Secure Multicast Over IPv6 Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-327
by
W. Aye
,
M.U. Siddiqi
Load Balancing by Scoring for Hierarchical Mobile IPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-333
by
K. Ito
,
A. Atsumi
,
Y. Tanaka
Consistency Control Systems for Remote Object Replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-339
by
Sint Sint Aung
,
ThinThin Naing
,
Khaing Moe San
,
Thinn Thu Naing
,
Ni Lar Thein
Efficient Distributed System for Object Invocation on Cluster Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-344
by
Thin Thin Naing
,
Renu Renu
,
Sint Sint Aung
,
Thinn Thu Naing
,
Ni Lar Thein
Utilizing Multiple Networks for Interprocess Communication in Cluster Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-349
by
T.N. Aung
,
A.A. Nwe
,
Khin Mar Soe
,
T.T. Naing
,
Ni Lar Thein
SKI: Security Key Infrastructure for a Server Audit Certification
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-355
by
T. Isohara
,
Y. Arakawa
,
I. Sasase
,
K. Takemori
An Optimized Intrusion Detection System Using PCA and BNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-359
by
Dong Seong Kim
,
Ha-Nam Nguyen
,
T. Thein
,
Jong Sou Park
Security on Software Life Cycle using Intrusion Detection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-363
by
Myat Myat Min
,
Khin Haymar Saw Hla
A secure and easy remote access technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-368
by
N. Enomoto
,
H. Yoshimi
,
Chinryu Sai
,
Y. Hidaka
,
K. Takagi
,
A. Iwata
On Dynamic Control Parameter Configuration Mechanism for Inter-and Intra-VPN Fairness Control Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-374
by
O. Honda
,
H. Ohsaki
,
M. Imase
,
J. Murayama
,
K. Matsuda
On Demand Distributed Public Key Management without Considering Routing Tables for Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-380
by
Y. Kitada
,
K. Takemori
,
A. Watanabe
,
I. Sasase
Performance Improvement on Probabilistic Packet Marking by using History Caching
Full-text access may be available. Sign in or learn about subscription options.
pp. 381-386
by
H. Isozaki
,
S. Ata
,
I. Oka
,
C. Fujiwara
Application of Network Analysis Techniques for Japanese Corporate Transaction Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 387-392
by
K. Sugiyama
,
O. Honda
,
H. Ohsaki
,
M. Imase
Autonomous Information Service Architecture for High Response in Distributed Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-398
by
Xiaodong Lu
,
Yanqing Jiang
,
M. Kanda
,
K. Mori
A Network Value Model and its Application to Technology Evaluation for the On-line Community
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-404
by
N. Yoshikai
RSVP Based Critical Services Path Recovery in MPLS Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-408
by
C. Siriakkarap
,
P. Setthawong
,
S. Tanterdtid
P2P and P2MP TE-LSPs packing algorithms for MPLS networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-414
by
M. Takagi
,
K. Mochizuki
,
K. Takahashi
,
M. Shimizu
,
S. Yasukawa
Shared segment recovery mechanism in optical networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-420
by
S. Kano
,
K. Miyazaki
,
A. Nagata
,
A. Chugo
Implementation and Evaluation of MPI Library with Globus Toolkit for Establishing λ Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-426
by
Mai Imoto
,
E. Taniguchi
,
K. Baba
,
M. Murata
A Method of Dynamic Interconnection of VLANs for Large Scale VLAN Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 427-432
by
K. Okayama
,
N. Yamai
,
T. Miyashita
,
K. Kawano
,
T. Okamoto
Inter-Ring Traffic Engineering for Bridged IEEE 802.17 Resilient Packet Rings
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-438
by
P. Setthawong
,
C. Siriakkarap
,
S. Tanterdtid
Showing 78 out of 78