Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210179
Y. Shibata, D. Nakamura, Noriki Uchida, Kazuo Takahata
Recently, risk management for the disasters such as earth quick, mountain explosion, seismic sea wave, in addition to ordinal disasters, such as typhoon, rain flooding and snow-slide has been seriously considered to keep the safety for the residents in many countries. More reliable and robust information systems than the conventional business or research oriented information networks must be constructed to normally and correctly perform their functions for residents even though serious disasters have happened. We propose a unified wide area disaster information network (WDN) using Internet based on the combination of both wired and wireless networks. The system requirements and their functions of WDN are precisely defined and the various types of information for residents are precisely defined. The prototype system of the disaster information system based on our suggested WDN was built to demonstrate and evaluate its functionality. Through the practical training in the local city for preparation of mountain explosion, we could confirm the usefulness of our suggested system.
{"title":"Residents oriented disaster information network","authors":"Y. Shibata, D. Nakamura, Noriki Uchida, Kazuo Takahata","doi":"10.1109/SAINTW.2003.1210179","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210179","url":null,"abstract":"Recently, risk management for the disasters such as earth quick, mountain explosion, seismic sea wave, in addition to ordinal disasters, such as typhoon, rain flooding and snow-slide has been seriously considered to keep the safety for the residents in many countries. More reliable and robust information systems than the conventional business or research oriented information networks must be constructed to normally and correctly perform their functions for residents even though serious disasters have happened. We propose a unified wide area disaster information network (WDN) using Internet based on the combination of both wired and wireless networks. The system requirements and their functions of WDN are precisely defined and the various types of information for residents are precisely defined. The prototype system of the disaster information system based on our suggested WDN was built to demonstrate and evaluate its functionality. Through the practical training in the local city for preparation of mountain explosion, we could confirm the usefulness of our suggested system.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132822219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210152
Toyokazu Akiyama, S. Shimojo, S. Nishio, Y. Kitatsuji, S. Peltier, T. Hutton, Fang-Pang Lin
Osaka University has an ultra-high voltage electron microscope (UHVEM) which can provide high quality specimen images for worldwide researchers. For usability improvements, we have worked on telecontrol of the UHVEM. We introduce a part of our activities on the telecontrol of the UHVEM. In order to remotely control the microscope, we must provide high quality dynamic images of the specimen with low latency to the remote site. We have used DVTS for image transfer. In iGrid2002, we transported DV streams over global IPv6 networks from the UHVEM in Osaka, Japan, to the National Center for Microscopy and Imaging Research in San Diego and iGrid2002 conference venue in Amsterdam, Holland. This experiment shows the availability of current IPv6 networks and the new possibility of future IPv6 networks. We also describe our current telecontrol system and future work.
{"title":"Telecontrol of ultra-high voltage electron microscope over global IPv6 network","authors":"Toyokazu Akiyama, S. Shimojo, S. Nishio, Y. Kitatsuji, S. Peltier, T. Hutton, Fang-Pang Lin","doi":"10.1109/SAINTW.2003.1210152","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210152","url":null,"abstract":"Osaka University has an ultra-high voltage electron microscope (UHVEM) which can provide high quality specimen images for worldwide researchers. For usability improvements, we have worked on telecontrol of the UHVEM. We introduce a part of our activities on the telecontrol of the UHVEM. In order to remotely control the microscope, we must provide high quality dynamic images of the specimen with low latency to the remote site. We have used DVTS for image transfer. In iGrid2002, we transported DV streams over global IPv6 networks from the UHVEM in Osaka, Japan, to the National Center for Microscopy and Imaging Research in San Diego and iGrid2002 conference venue in Amsterdam, Holland. This experiment shows the availability of current IPv6 networks and the new possibility of future IPv6 networks. We also describe our current telecontrol system and future work.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115550309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210135
A. Wombacher, Bendick Mahleko
Web service technologies promise to facilitate collaboration among business partners by helping potential business partners find one another and integrate their business processes to do business. Daunting challenges however exist before the full potential of Web services can be realized. Indexing mechanisms for complex workflows are needed for example to be able to efficiently search and match business partners on the basis of compatible workflows. Business collaborations invariably comprise multiple-parties, and the process of aggregating workflows belonging to different parties to establish a global agreement in an ad-hoc manner presents another challenge. We also need to consider the decision problem how to determine, during the setting-up of a global agreement, whether some services must be fulfilled by the same provider or not. We highlight these challenges and propose possible solutions.
{"title":"Ad-hoc business processes in Web services","authors":"A. Wombacher, Bendick Mahleko","doi":"10.1109/SAINTW.2003.1210135","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210135","url":null,"abstract":"Web service technologies promise to facilitate collaboration among business partners by helping potential business partners find one another and integrate their business processes to do business. Daunting challenges however exist before the full potential of Web services can be realized. Indexing mechanisms for complex workflows are needed for example to be able to efficiently search and match business partners on the basis of compatible workflows. Business collaborations invariably comprise multiple-parties, and the process of aggregating workflows belonging to different parties to establish a global agreement in an ad-hoc manner presents another challenge. We also need to consider the decision problem how to determine, during the setting-up of a global agreement, whether some services must be fulfilled by the same provider or not. We highlight these challenges and propose possible solutions.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124150315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210165
H. Asaeda, Shinsuke Suzuki
With the advance of multicast technologies, source-specific multicast (SSM) has been introduced as a feasible communication model. In the IPv6 environment, since many kinds of equipment can be connected to the Internet as regular end-nodes and assume multicast communication in general, considering the scalability proposed by SSM is very valuable. Regarding an SSM communication over IPv6, an implementation of Multicast Listener Discovery version 2 (MLDv2) on every end-node is indispensable as well as on every router. One of the most concerning points of MLDv2 is its complexity, therefore it may delay the SSM deployment due to its implementation cost. In view of this fact, having an effective and accurate MLDv2 reference implementation is urged and desired for multicast deployment. In this document, we illustrate MLDv2 host-side implementation, mainly the most complex Multicast Source Filtering (MSF) procedure, applied to 4.4BSD kernel. While presenting the implementation concept, design, and logic, we evaluate the behaviors of our implementation. In addition, a performance investigation is also mentioned.
{"title":"MLDv2 protocol design, implementation and evaluation for source-specific multicast over IPv6","authors":"H. Asaeda, Shinsuke Suzuki","doi":"10.1109/SAINTW.2003.1210165","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210165","url":null,"abstract":"With the advance of multicast technologies, source-specific multicast (SSM) has been introduced as a feasible communication model. In the IPv6 environment, since many kinds of equipment can be connected to the Internet as regular end-nodes and assume multicast communication in general, considering the scalability proposed by SSM is very valuable. Regarding an SSM communication over IPv6, an implementation of Multicast Listener Discovery version 2 (MLDv2) on every end-node is indispensable as well as on every router. One of the most concerning points of MLDv2 is its complexity, therefore it may delay the SSM deployment due to its implementation cost. In view of this fact, having an effective and accurate MLDv2 reference implementation is urged and desired for multicast deployment. In this document, we illustrate MLDv2 host-side implementation, mainly the most complex Multicast Source Filtering (MSF) procedure, applied to 4.4BSD kernel. While presenting the implementation concept, design, and logic, we evaluate the behaviors of our implementation. In addition, a performance investigation is also mentioned.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"61 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122373762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210171
K. Yoshida, Kazuo Hashimoto
The wide spread of the Internet and its evolution as a new social infrastructure increase the importance of applications which best use its potential. The intelligent functions which can be realized with computer technology are indispensable to best benefit from the Internet. We overview the current situation together with issues which we have to solve to realize the new infrastructure of networked society.
{"title":"AI application of the Internet - backgrounds and issues","authors":"K. Yoshida, Kazuo Hashimoto","doi":"10.1109/SAINTW.2003.1210171","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210171","url":null,"abstract":"The wide spread of the Internet and its evolution as a new social infrastructure increase the importance of applications which best use its potential. The intelligent functions which can be realized with computer technology are indispensable to best benefit from the Internet. We overview the current situation together with issues which we have to solve to realize the new infrastructure of networked society.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210150
H. Esaki, A. Kato, J. Murai
The WIDE project, www.wide.ad.jp, is a research consortium among industry and academia. The WIDE project consists of more than four hundred active researchers from more than a hundred private companies and more than forty universities. The WIDE project operates the nation-wide R&D testbed, which is connected with many other R&D testbeds, and the NSPIXPs, that are the largest IXes in Japan. The main focus of the WIDE project has been IPv6 technology and has established an IPv6 testbed since 1998. Basically, all of the R&D activities in the WIDE project are based on the IPv6. This paper describes the overview of the WIDE project R&D testbed and the R&D activities, such as KAME/USAGI/TAHI projects.
{"title":"R&D activities and testbed operation in WIDE project","authors":"H. Esaki, A. Kato, J. Murai","doi":"10.1109/SAINTW.2003.1210150","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210150","url":null,"abstract":"The WIDE project, www.wide.ad.jp, is a research consortium among industry and academia. The WIDE project consists of more than four hundred active researchers from more than a hundred private companies and more than forty universities. The WIDE project operates the nation-wide R&D testbed, which is connected with many other R&D testbeds, and the NSPIXPs, that are the largest IXes in Japan. The main focus of the WIDE project has been IPv6 technology and has established an IPv6 testbed since 1998. Basically, all of the R&D activities in the WIDE project are based on the IPv6. This paper describes the overview of the WIDE project R&D testbed and the R&D activities, such as KAME/USAGI/TAHI projects.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127545215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210129
T. Risse, P. Knezevic
Service oriented computing and peer-to-peer (P2P) computing are emerging technologies which provide, from the architectural point of view, scalability and flexibility. From their properties both architectures are quite similar e.g. in both architectures no-one has a complete system overview and no central administration exists. Besides other challenges, this leads to the question of how data can be stored reliably in P2P and service oriented environments. In this paper we analyze and discuss the requirements as well as the challenges and give an outlook on our research activities which address the identified problems.
{"title":"Data storage requirements for the service oriented computing","authors":"T. Risse, P. Knezevic","doi":"10.1109/SAINTW.2003.1210129","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210129","url":null,"abstract":"Service oriented computing and peer-to-peer (P2P) computing are emerging technologies which provide, from the architectural point of view, scalability and flexibility. From their properties both architectures are quite similar e.g. in both architectures no-one has a complete system overview and no central administration exists. Besides other challenges, this leads to the question of how data can be stored reliably in P2P and service oriented environments. In this paper we analyze and discuss the requirements as well as the challenges and give an outlook on our research activities which address the identified problems.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210141
M. Galuszewska, Jean-Michel Sahut
The transformations of the business environment have led to the emergence of new business reality. Business processes are dynamic as never before. Solely participants able to take snap decisions have a chance to survive and, what is more important, generate some benefits. Moreover, the pressure to apply IT solutions forces companies to permanent search for the state-of-the-art technologies. It becomes, thus, necessary to support business processes with a tool that is able to inform, co-operate, act fast as well as replace a human in many business situations. Artificial intelligence (AI) based systems constitute the solution fulfilling such requirements. Quite recently AI started playing significant role in e-commerce world. Its new form is not the monolithic system of the past, but distributed artificial intelligence, known as intelligent agent technology. This technology is the next step in dealing with some shortcomings in e-commerce. However, successful computer systems underlying e-commerce require judgement and the knowledge of experts such as buyers, contract negotiators as well as marketing specialists.
{"title":"Intelligent agent stakes for e-commerce","authors":"M. Galuszewska, Jean-Michel Sahut","doi":"10.1109/SAINTW.2003.1210141","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210141","url":null,"abstract":"The transformations of the business environment have led to the emergence of new business reality. Business processes are dynamic as never before. Solely participants able to take snap decisions have a chance to survive and, what is more important, generate some benefits. Moreover, the pressure to apply IT solutions forces companies to permanent search for the state-of-the-art technologies. It becomes, thus, necessary to support business processes with a tool that is able to inform, co-operate, act fast as well as replace a human in many business situations. Artificial intelligence (AI) based systems constitute the solution fulfilling such requirements. Quite recently AI started playing significant role in e-commerce world. Its new form is not the monolithic system of the past, but distributed artificial intelligence, known as intelligent agent technology. This technology is the next step in dealing with some shortcomings in e-commerce. However, successful computer systems underlying e-commerce require judgement and the knowledge of experts such as buyers, contract negotiators as well as marketing specialists.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129706800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210153
T. Hisamatsu, A. Ogawa, Osamu Nakamura, J. Murai, Kazunori Sugiura
We created a high quality video transportation system for broadband networks, using DV (digital video) format. Our implementation was named DVTS (Digital Video Transport System). DVTS supports FreeBSD, NetBSD, Linux, MacOSX, and Windows operating systems. Each operating system has a different interface to interact with an application. For example, MacOS uses a GUI (graphical user interface) to allow end users to run applications with simple mouse and keyboard operation. We have ported DVTS to the MacOSX platform. MacOSX Aqua is an abstraction of a human interface based on a GUI. However, since the MacOSX implementation for the former DVTS is implemented using a CUI (character user interface), it does not assimilate with the MacOSX Aqua abstraction. Additionally, the video playback window for the DVTS receiver is designed with the QuickTime framework in our new system. Abstraction and implementation of DVTS for the Aqua interface is proposed. Due to this research, the usability of DVTS is enhanced.
{"title":"Software compatibility and human interface for DV over IP","authors":"T. Hisamatsu, A. Ogawa, Osamu Nakamura, J. Murai, Kazunori Sugiura","doi":"10.1109/SAINTW.2003.1210153","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210153","url":null,"abstract":"We created a high quality video transportation system for broadband networks, using DV (digital video) format. Our implementation was named DVTS (Digital Video Transport System). DVTS supports FreeBSD, NetBSD, Linux, MacOSX, and Windows operating systems. Each operating system has a different interface to interact with an application. For example, MacOS uses a GUI (graphical user interface) to allow end users to run applications with simple mouse and keyboard operation. We have ported DVTS to the MacOSX platform. MacOSX Aqua is an abstraction of a human interface based on a GUI. However, since the MacOSX implementation for the former DVTS is implemented using a CUI (character user interface), it does not assimilate with the MacOSX Aqua abstraction. Additionally, the video playback window for the DVTS receiver is designed with the QuickTime framework in our new system. Abstraction and implementation of DVTS for the Aqua interface is proposed. Due to this research, the usability of DVTS is enhanced.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124679917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-01-27DOI: 10.1109/SAINTW.2003.1210185
Sankar Kaliaperumal
Security is a major concern in the design of modern communication systems. It is particularly challenging with wireless networks such as ad hoc networks. Ad hoc Networks are dynamically reconfigured. For this reason they are vulnerable to several major security threats. This paper focuses on authentication and privacy in partitioned ad hoc networks. We consider the problem of managing revocation lists and discuss privacy issues.
{"title":"Securing authentication and privacy in ad hoc partitioned networks","authors":"Sankar Kaliaperumal","doi":"10.1109/SAINTW.2003.1210185","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210185","url":null,"abstract":"Security is a major concern in the design of modern communication systems. It is particularly challenging with wireless networks such as ad hoc networks. Ad hoc Networks are dynamically reconfigured. For this reason they are vulnerable to several major security threats. This paper focuses on authentication and privacy in partitioned ad hoc networks. We consider the problem of managing revocation lists and discuss privacy issues.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}