Search Results - "2011 IEEE/IPSJ International Symposium on Applications and the Internet"

Refine Results
  1. 1

    Flexible Access Management System for Campus VLAN Based on OpenFlow by Yamasaki, Y., Miyamoto, Y., Yamato, J., Goto, H., Sone, H.

    “…Using a lot of VLANs on campus networks has become popular for deploying many logical networks over minimal fibers/cables. A campus-wide Wi-Fi system, for…”
    Get full text
    Conference Proceeding
  2. 2

    Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting by Akiyama, M., Yagi, T., Itoh, M.

    “…Filtering based on blacklists is a major countermeasure against malicious websites. However, blacklists must be updated because malicious URLs tend to be…”
    Get full text
    Conference Proceeding
  3. 3

    A Novel Approach for Selecting the Participants to Collect Data in Participatory Sensing by Hong Nhat Pham, Back Sun Sim, Hee Yong Youn

    “…This paper works on the participatory sensing in the area of sensor network. One of the most important challenges in participatory sensing is selecting the…”
    Get full text
    Conference Proceeding
  4. 4

    Programming Pervasive Spaces: Workshop on Semantic Interoperability in Smart Spaces by Helal, S.

    “…In principle, the entire world can exploit smart spaces to great societal benefits. In practice, however, there is as yet little fundamental basis or widely…”
    Get full text
    Conference Proceeding
  5. 5

    S^3: Smart Shadow System for Real World Service and Its Evaluation with Users by Umakoshi, Kenji, Kambayashi, Takashi, Yoshida, Manabu, Takemoto, Michiharu, Matsuo, Masato

    “…Many studies have been focusing on building smart environments, which provide useful real world services (RWSs). However, with RWSs, feature interactions…”
    Get full text
    Conference Proceeding
  6. 6

    Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships by Chaisamran, N., Okuda, T., Blanc, G., Yamaguchi, S.

    “…Spam over Internet Telephony (SPIT) will become a serious threat in the near future because of the growing number of Voice over IP (VoIP) users. Due to the…”
    Get full text
    Conference Proceeding
  7. 7

    DaaS: DDoS Mitigation-as-a-Service by Soon Hin Khor, Nakao, A.

    “…DaaS is a service that protects a server against all 3 types of Distributed Denial-of-Service (DDoS), arbitrary packet, legit user-mimicking and economic…”
    Get full text
    Conference Proceeding
  8. 8

    Data Clustering on a Network of Mobile Smartphones by Dou, A. J., Kalogeraki, V., Gunopulos, D., Mielikinen, T., Tuulos, V., Foley, S., Yu, C.

    “…We present Dowser, a system for data clustering in a network of mobile smart phones. Dowser comprises three components: (a) a distributed framework,…”
    Get full text
    Conference Proceeding
  9. 9

    A Situation-Based Exception Detection Mechanism for Safety in Pervasive Systems by Eun-Sun Cho, Helal, S.

    “…In pervasive systems, exceptions are likely occurrences, and not rare events as is usually the case in less dynamic and more predictable systems. The…”
    Get full text
    Conference Proceeding
  10. 10

    High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling by Ishida, M., Takakura, H., Okabe, Y.

    “…This research aims to construct a high-performance anomaly based intrusion detection system. Most of past studies of anomaly based IDS adopt k-means based…”
    Get full text
    Conference Proceeding
  11. 11

    EUCASS 2011 Message

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  12. 12

    [Joint COMPSAC/SAINT Panel] International Perspectives on Computed World: Software beyond the Digital Society

    “…Summary form only given, as follows. Creating the digital society and beyond needs all aspects of computing, software development, and software systems…”
    Get full text
    Conference Proceeding
  13. 13

    NETSAP 2011 Message

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  14. 14

    HEUNET 2011 Message

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  15. 15

    Message from the Doctoral Symposium Co-chairs

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  16. 16

    FIE 2011 Message

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  17. 17

    IC-Web 2011 Message

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  18. 18

    SISS 2011 Message

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  19. 19

    Joint COMPSAC/SAINT Keynotes

    “…Provides an abstract for each of the keynote presentations and may include a brief professional biography of each…”
    Get full text
    Conference Proceeding
  20. 20

    C3NET 2011 Message

    “…Presents the introductory welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding