Default Cover Image

2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet

July 16 2012 to July 20 2012

Izmir Turkey

ISBN: 978-1-4673-2001-6

Table of Contents

Papers
[Back cover]Freely available from IEEE.pp. C4
Papers
[Title page i]Freely available from IEEE.pp. i
Papers
[Title page iii]Freely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xii
Papers
Message from General ChairsFreely available from IEEE.pp. xiii
Papers
Message from Program ChairsFreely available from IEEE.pp. xiv
Papers
Message from Workshop Co-chairsFreely available from IEEE.pp. xv
Papers
Message from Doctoral Symposium Co-chairsFreely available from IEEE.pp. xvi
Papers
Organizing CommitteeFreely available from IEEE.pp. xvii-xviii
Papers
Program CommitteeFreely available from IEEE.pp. xix-xxii
Papers
ReviewersFreely available from IEEE.pp. xxiii-xxvi
Papers
Message from HSNCE 2012 Workshop OrganizersFreely available from IEEE.pp. xxvii
Papers
Message from WS-ITeS 2012 Workshop OrganizersFreely available from IEEE.pp. xxviii
Papers
Message from NETSAP 2012 Workshop OrganizersFreely available from IEEE.pp. xxix
Papers
Message from HEUNET 2012 Workshop OrganizersFreely available from IEEE.pp. xxx
Papers
Message from C3NET 2012 Workshop OrganizersFreely available from IEEE.pp. xxxi
Papers
Message from EUCASS 2012 Workshop OrganizersFreely available from IEEE.pp. xxxii
HEUNET 2012 Plenary SpeakersFull-text access may be available. Sign in or learn about subscription options.pp. xxxiii-xxxiii
Papers
Location l-Diversity against Multifarious Inference AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Proposal of Movie CAPTCHA Method Using Amodal CompletionFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
Papers
Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 19-28
Papers
Detecting Malicious Websites by Learning IP Address FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 29-39
Papers
Scalable and Performance-Efficient Client Honeypot on High Interaction SystemFull-text access may be available. Sign in or learn about subscription options.pp. 40-50
Papers
SSH Dictionary Attack Detection Based on Flow AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 51-59
Papers
A Design and Implementation of OpenFlow Controller Handling IP Multicast with Fast Tree SwitchingFull-text access may be available. Sign in or learn about subscription options.pp. 60-67
Papers
Inter-AS Locator Allocation of Hierarchical Automatic Number Allocation in a 10,000-AS NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 68-73
Papers
Simulator-Assisted Joint Service-Level-Agreement and Vertical-Handover Adaptation for Profit MaximizationFull-text access may be available. Sign in or learn about subscription options.pp. 74-82
Papers
Emotion Communication Model Based on Life-Log Comparison: Mutual Understanding through Comparable ExperiencesFull-text access may be available. Sign in or learn about subscription options.pp. 91-99
Papers
An Academic Community Cloud Architecture for Science ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 108-112
Papers
Jobcast - Parallel and Distributed Processing Framework: Data Processing on a Cloud Style KVS DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 123-128
DNS Traffic Analysis: Issues of IPv6 and CDNFull-text access may be available. Sign in or learn about subscription options.pp. 129-137
Papers
A GMPLS-based Power Resource Reservation System toward Energy-on-Demand  Home NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 138-147
Papers
Accelerating Flow-Level Network Simulation with Low-Pass Filtering of Fluid ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 148-154
Papers
i-Path: Improving Path Visibility for the Future InternetFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Papers
Markov Chain-Based Routing Algorithm in Delay-Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 161-165
Papers
PIPER: A Framework for Exploring the Privacy Implications of Pervasive Computing Applications in Their Physical EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
Papers
Extraction and Annotation of Personal Cliques from Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 172-177
Papers
Access Control Architecture Separating Privilege by a Thread on a Web ServerFull-text access may be available. Sign in or learn about subscription options.pp. 178-183
Papers
Performance Analysis of Fountain-Based Protocol in CSMA/CA Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 184-189
Papers
Elekspot: A Platform for Urban Place Recognition via CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 190-195
Papers
A Mobile Platform for Managing Mobile MapReduce Participatory Sensing DataFull-text access may be available. Sign in or learn about subscription options.pp. 196-201
Papers
A Study on Transport Framework for Transaction Communication with Network Aggressive SupportingFull-text access may be available. Sign in or learn about subscription options.pp. 202-205
Papers
Modeling I/O Interference in Data Intensive Map-Reduce ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
Papers
Can SDN Help HPC?Full-text access may be available. Sign in or learn about subscription options.pp. 210
Survey of Network Metrology PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Papers
Dynamic Communication Protocol for Quick Response in Interactive CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 226-231
Papers
New Horizon of IT-enabled ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 232
Papers
A Resilient Service for Survivor Identification in Large-Scale DisastersFull-text access may be available. Sign in or learn about subscription options.pp. 239-244
Papers
A Malware Classification Method Based on Similarity of Function StructureFull-text access may be available. Sign in or learn about subscription options.pp. 256-261
Papers
Malware Detection Method by Catching Their Random Behavior in Multiple ExecutionsFull-text access may be available. Sign in or learn about subscription options.pp. 262-266
Papers
A Behavior-Based Detection Method for Outbreaks of Low-Rate AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 267-272
Papers
Unknown Attacks Detection Using Feature Extraction from Anomaly-Based IDS AlertsFull-text access may be available. Sign in or learn about subscription options.pp. 273-277
Papers
An Efficient Dynamic Detection Method for Various x86 ShellcodesFull-text access may be available. Sign in or learn about subscription options.pp. 284-289
Papers
A DHT-based HTTP Access Control System with Access Ticket Issuing MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
Papers
Evaluating the Performance of Locator/ID Separation Based on LISP Map Cache EmulationFull-text access may be available. Sign in or learn about subscription options.pp. 296-301
Papers
Comparative Study on Meta-heuristics for Achieving Parabolic Fairness in Wireless Channel AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 302-307
Papers
Two-Level Heuristic Algorithm for Utility-Based Data Placement and Rate Allocation in Content-Aware NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
Papers
Distributing Link Stress for Internet TV SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
Papers
Detecting Critical Links for Keeping Shortest Distance from Clients to Servers during FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Papers
Real-Time Disaster Evacuation Guidance Using Opportunistic CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 326-331
Papers
Vertical Handover Control Considering End-to-End Communication Quality in IP MobilityFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
Papers
Design and Evaluation of Global Live Migration with Mobility Support for IP MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 338-344
Papers
An Adaptive Approach for Network Traffic Load Balancing by Using One-Way DelayFull-text access may be available. Sign in or learn about subscription options.pp. 345-350
Papers
Multihoming Method Using Routing Header in IPv6 EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Papers
An Account Provision and Management Architecture for Messaging Services in EmergencyFull-text access may be available. Sign in or learn about subscription options.pp. 369-374
Papers
An Execution Control System for Application Software Reducing Administrative Burden of Educational PCsFull-text access may be available. Sign in or learn about subscription options.pp. 375-380
Papers
Spam Mail Discrimination System Based on Behavior of DNS Servers Associated with URLsFull-text access may be available. Sign in or learn about subscription options.pp. 381-386
Papers
A Casual Network Security Using a Portable Sensor Device and Wiki SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 387-392
Papers
Workshop Keynote: Ubiquitous Service Platform and Field Trial in CUBIQ ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 393
Papers
A Proposal of the System for Automatic Sharing Information of Movements in Growing VegetablesFull-text access may be available. Sign in or learn about subscription options.pp. 394-398
Papers
Development of Arkas Sensor Platform and Application for Heavy Snowfall ObservationFull-text access may be available. Sign in or learn about subscription options.pp. 399-404
Papers
On Socio-technical Enablers for Ubiquitous Computing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 405-408
Papers
Distortions in QoE Measurements of Ubiquitous Mobile Video Services Caused by the Preconceptions of Test SubjectsFull-text access may be available. Sign in or learn about subscription options.pp. 409-413
Papers
Personalized Clothing-Recommendation System Based on a Modified Bayesian NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 414-417
Papers
An Adaptive Vertical Handover in Service Specific Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 418-423
Papers
Author indexFreely available from IEEE.pp. 430-432
Papers
[Publisher's information]Freely available from IEEE.pp. 434
Showing 90 out of 90