Default Cover Image

The 2005 Symposium on Applications and the Internet

Feb. 4 2005 to Feb. 4 2005

Trento, Italy

Table of Contents

Message from the Program ChairsFreely available from IEEE.pp. xi
Papers
Organizing Committee membersFreely available from IEEE.pp. xii-xii
General Chairs' messageFreely available from IEEE.pp. x
ReviewersFreely available from IEEE.pp. xiv-xiv
Panel on Future of Internet ApplicationsFreely available from IEEE.pp. xvii-xvii
Protocol Issues
A Timer-based Protocol for Connected Dominating Set Construction in IEEE 802.11 Multihop Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 2-8
Protocol Issues
DNS Meets DHT: Treating Massive ID Resolution Using DNS Over DHTFull-text access may be available. Sign in or learn about subscription options.pp. 9-15
Protocol Issues
A DNS-Based Host Portability Solution With Localized Location UpdatingFull-text access may be available. Sign in or learn about subscription options.pp. 16-22
Web Systems
Turning Web Applications into Portlets: Raising the IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 31-37
Web Systems
Semantic Web Link Analysis to Discover Social Relationships in Academic CommunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 38-45
Middleware Architecture
SOFAnet: Middleware for Software Distribution over InternetFull-text access may be available. Sign in or learn about subscription options.pp. 48-53
Middleware Architecture
The Fluid Computing Middleware: Bringing Application Fluidity to the Mobile InternetFull-text access may be available. Sign in or learn about subscription options.pp. 54-63
Middleware Architecture
Edge Server Software Architecture For Sensor ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 64-71
System Issues
FACE: A Firewall Analysis and Configuration EngineFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
System Issues
Adaptive Access Policy for the Linux KernelFull-text access may be available. Sign in or learn about subscription options.pp. 82-88
System Issues
ELA: A Fully Distributed VPN System over Peer-to-Peer NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 89-92
Collaborative Systems
Infrastructures for Collaborative Networks - An Application in Elderly CareFull-text access may be available. Sign in or learn about subscription options.pp. 94-101
Collaborative Systems
Scalable Overlay Network Deployment for Dynamic Collaborative GroupsFull-text access may be available. Sign in or learn about subscription options.pp. 102-109
Collaborative Systems
On Architecting Business Performance Management Grid for Adaptive EnterprisesFull-text access may be available. Sign in or learn about subscription options.pp. 110-116
Distributed Systems
A Multicast Routing Algorithm for Overlay Network Built on Leased LinesFull-text access may be available. Sign in or learn about subscription options.pp. 118-124
Distributed Systems
Design and Analysis of an e-Transaction Protocol Tailored for OCCFull-text access may be available. Sign in or learn about subscription options.pp. 125-131
Distributed Systems
A Two-Level Distributed Architecture for Efficient Web Content Adaptation and DeliveryFull-text access may be available. Sign in or learn about subscription options.pp. 132-139
Performance Improvement
Performance Evaluations of DCCP for Bursty Traffic in Real-Time ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 142-149
Performance Improvement
Dual Metrics Fair Queueing: Improving Fairness and File Transfer TimeFull-text access may be available. Sign in or learn about subscription options.pp. 150-156
Performance Improvement
A Lightweight Approach to Authenticated Web CachingFull-text access may be available. Sign in or learn about subscription options.pp. 157-163
Performance Improvement
A Case Study in Running a Parallel Branch and Bound Application on the GridFull-text access may be available. Sign in or learn about subscription options.pp. 164-173
Web Services
On Coordinating Personalized Web Services Using CooPSFull-text access may be available. Sign in or learn about subscription options.pp. 176-182
Web Services
A Graph-Based Approach to Web Services CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 183-189
Web Services
Goal Description Language for Semantic Web Service Automatic CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 190-196
Wireless Networks
Metrics for Detection of QoS Degradation over Wireless LANFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
Wireless Networks
HAR: Hierarchy-Based Anycast Routing Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 204-212
Wireless Networks
Channel-Based Connectivity Management Middleware for Seamless Integration of Heterogeneous Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 213-219
Virtual Systems
Design and Evaluation of a Location-Based Virtual City System for Mobile PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 222-228
Virtual Systems
General Virtual Hosting via Lightweight User-Level VirtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 229-236
Virtual Systems
Roles of an Intelligent Tutor Agent in a Virtual SocietyFull-text access may be available. Sign in or learn about subscription options.pp. 237-244
Peer-to-Peer Networks
A Self-Organizing Overlay Network to Exploit the Locality of Interests for Effective Resource Discovery in P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 246-255
Peer-to-Peer Networks
Fault-Tolerant Routing for P2P Systems with Unstructured TopologyFull-text access may be available. Sign in or learn about subscription options.pp. 256-263
Peer-to-Peer Networks
Replication Methods for Load Balancing on Distributed Storages in P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 264-271
Software Agents
Mobile Agent Communication Using SIPFull-text access may be available. Sign in or learn about subscription options.pp. 274-279
Software Agents
An Efficient Agent Control Method for Time Constraint ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 280-286
Software Agents
Fault-Management for Multi-Agent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 287-293
Network Architecture
SOBA Framework: An Application Framework for Broadband Network EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 296-303
Network Architecture
Enhanced Flooding Control Methods based on Biotic GrowthFull-text access may be available. Sign in or learn about subscription options.pp. 304-310
Network Architecture
Multi-Rate Control Method Using Layered ContentFull-text access may be available. Sign in or learn about subscription options.pp. 311-317
Content Delivery Management
Distributed Resource Discovery in Large Scale Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 320-326
Content Delivery Management
Using Documents Assessments to Build Communities of InterestsFull-text access may be available. Sign in or learn about subscription options.pp. 327-333
Content Delivery Management
Annotating TV Drama based on Viewer Dialogue - Analysis of Viewers' Attention Generated on an Internet Bulletin Board -Full-text access may be available. Sign in or learn about subscription options.pp. 334-340
Congestion Control
Empirical Study on Locating Congested Segments over the Internet Based on Multiple End-to-End Path MeasurementsFull-text access may be available. Sign in or learn about subscription options.pp. 342-351
Congestion Control
Implementation and Evaluation of On-demand Address Allocation for Event-Driven Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 352-360
Congestion Control
On Scalable Modeling of TCP Congestion Control Mechanism for Large-Scale IP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 361-368
Fighting with Spam
Memory Management of Density-Based Spam DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 370-376
Fighting with Spam
Spam Filtering using Spam Mail CommunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 377-383
Fighting with Spam
A Protection Method Against Massive Error Mails Caused by Sender Spoofed Spam MailsFull-text access may be available. Sign in or learn about subscription options.pp. 384-390
Storage Management
Trace System of iSCSI Storage AccessFull-text access may be available. Sign in or learn about subscription options.pp. 392-398
Storage Management
Latency-Driven Replica PlacementFull-text access may be available. Sign in or learn about subscription options.pp. 399-405
Storage Management
On Derived Data Services in CyberspaceFull-text access may be available. Sign in or learn about subscription options.pp. 406-412
Security Architecture
Security Architecture for Control Networks using IPsec and KINKFull-text access may be available. Sign in or learn about subscription options.pp. 414-420
Security Architecture
A Context-centric Security Middleware for Service Provisioning in Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 421-429
Security Architecture
D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 430-436
Showing 62 out of 62