Abstract is missing.
- TCP Throughput Estimation by Lightweight Variable Packet Size Probing in CDMA2000 1x EV-DO NetworkTakayuki Goto, Atsushi Tagami, Teruyuki Hasegawa, Shigehiro Ano. 1-8 [doi]
- Cross-Layer Based Anomaly Detection in Wireless Mesh NetworksXia Wang, Johnny S. Wong, Fred Stanley, Samik Basu. 9-15 [doi]
- Operation Prediction for Context-Aware User Interfaces of Mobile PhonesDaisuke Kamisaka, Shigeki Muramatsu, Hiroyuki Yokoyama, Takeshi Iwamoto. 16-22 [doi]
- An Enhanced Location Privacy Framework with Mobility Using Host Identity ProtocolKeiji Maekawa, Yasuo Okabe. 23-29 [doi]
- Evaluation of Online Resources in Assisting Phishing DetectionKaigui Bian, Jung Min Park, Michael S. Hsiao, France Belanger, Janine Hiller. 30-36 [doi]
- Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret ExchangeKeita Shimizu, Shuichi Miyazaki, Yasuo Okabe. 37-42 [doi]
- An Instruction Method for Displaying Trajectory of an Object in Remote Collaborative MR on the Basis of Changes in Relative CoordinatesYuta Okajima, Shun Yamamoto, Yuichi Bannai, Ken-ichi Okada. 43-49 [doi]
- Aggregate Skyline: Analysis for Online UsersShyam Antony, Ping Wu, Divyakant Agrawal, Amr El Abbadi. 50-56 [doi]
- Dynamic Load Balancing for Cluster-Based Publish/Subscribe SystemHojjat Jafarpour, Sharad Mehrotra, Nalini Venkatasubramanian. 57-63 [doi]
- Using Call Patterns to Detect Unwanted Communication CallersTetsuya Kusumoto, Eric Y. Chen, Mitsutaka Itoh. 64-70 [doi]
- Selling Practices in Online Fixed-Price MarketplacesAdriano M. Pereira, Diego Duarte, Wagner Meira Jr., Paulo Góes. 71-77 [doi]
- Design and Implementation of Flow-Level Simulator for a Network with Heterogeneous FlowsTakeaki Nishioka, Yusuke Sakumoto, Hiroyuki Ohsaki, Makoto Imase. 78-84 [doi]
- On Enhancing Event-to-Sink Data Delivery Throughput in Sensor NetworksMd. Abdur Razzaque, Choong Seon Hong, Jin-Woong Cho, Jang-Yeon Lee. 85-91 [doi]
- Compressing Packets Adaptively Inside NetworksMasayoshi Shimamura, Takeshi Ikenaga, Masato Tsuru. 92-99 [doi]
- Device Integration in SODA Using the Device Description LanguageChao Chen, Abdelsalam Helal. 100-106 [doi]
- A Traffic Monitoring Method for High Speed NetworksYusuke Shomura, Yoshinori Watanabe, Naoya Ikeda. 107-113 [doi]
- Path Selection Metrics for Performance-Improved Onion RoutingAndriy Panchenko, Johannes Renner. 114-120 [doi]
- A Table-Driven Programming Paradigm for Context-Aware Application DevelopmentZhang Junbin, Qi Yong, Hou Di, Li Ming. 121-124 [doi]
- Scent Presentation Technique of Pulse Ejection Synchronized with BreathingKaori Ohtsu, Junta Sato, Yuichi Bannai, Ken-ichi Okada. 125-128 [doi]
- Domain Ontology Learning from WebsitesYu Zhao, JianQiang Li. 129-132 [doi]
- Verification of Accuracy Improvement for CoMPACT Monitor Due to Suboptimal Inter-probe TimeKohei Watabe, Yudai Honma, Masaki Aida. 133-136 [doi]
- A Subscription Coverage Technique for XML Message DisseminationYang Cao, Chung-Horng Lung, Shikharesh Majumdar. 137-140 [doi]
- Dynamic Topology Reconfiguration Method for Service Overlay Networks Using Users Community InformationTomoyasu Ogasa, Yousuke Takahashi, Hiroyuki Ohsaki, Takeshi Yagi, Junichi Murayama, Makoto Imase. 141-144 [doi]
- Understanding the Challenges in Securing Internet RoutingRicardo V. Oliveira, Mohit Lad, Lixia Zhang. 145-148 [doi]
- A Novel SeND Based Source Address Validation Mechanism (SAVM-SeND)Pingping Lin, Jun Bi. 149-152 [doi]
- Managing Trusted Keys in Internet-Scale SystemsEric Osterweil, Daniel Massey, Lixia Zhang. 153-156 [doi]
- Analyzing the Aftermath of the McColo ShutdownSteve DiBenedetto, Daniel Massey, Christos Papadopoulos, Patrick J. Walsh. 157-160 [doi]
- Anshin as Emotional Trust: A Comparison Study between U.S. and Japanese Non-computer-science StudentsYuko Murayama, Yasuhiro Fujihara, Dai Nishioka, Carl H. Hauser, Atushi Inoue. 161-164 [doi]
- Davis Social Links: Leveraging Social Networks for Future Internet CommunicationLerone Banks, Prantik Bhattacharyya, Matthew Spear, Shyhtsun Felix Wu. 165-168 [doi]
- Owner-Centric Networking (OCN): Toward a Data Pollution-Free InternetClaude Castelluccia, Mohamed Ali Kâafar. 169-172 [doi]
- Proposal of an Initial Route Establishment Method in Wireless Mesh NetworksKazunori Ueda, Ken-ichi Baba. 173-176 [doi]
- A Bloom Filter-Based User Search Method Based on Movement Records for P2P NetworkToru Shiraki, Yuuichi Teranishi, Susumu Takeuchi, Kaname Harumoto, Shojiro Nishio. 177-180 [doi]
- CCDM: Central Controller-Based Device Management Architecture and Method to Split Management ScriptsAkihiro Sugiyama, Hideya Ochiai, Hiroshi Esaki. 185-188 [doi]
- A Network Architecture to Easily Control DevicesTakahiro Hata, Michiharu Takemoto, Takashi Kambayashi, Kentaro Uchiyama, Mitsuo Teramoto. 189-192 [doi]
- Support System for Developing Web Service Composition Scenarios without Need for Web Application SkillsYasutoshi Miyagi, Yoji Yamato, Yusuke Nakano, Miki Hirano. 193-196 [doi]
- Financial Securitization with Digital Rights Management SystemHirotsugu Kinoshita, Tetsuya Morizumi, Kazuhiro Suzuki. 197-200 [doi]
- A System for Search, Access Restriction, and Agents in the CloudsTetsuya Morizumi, Kazuhiro Suzuki, Hirotsugu Kinoshita. 201-204 [doi]
- Enterprise Architecture Create Business ValueTakaaki Kamogawa, Hitoshi Okada. 205-208 [doi]
- IT-Enabled Survey and Its Problems: Analyses of an Australian Internet PollMemiko Ootsuki, Tetsuro Kobayashi, Noboru Sonehara. 209-211 [doi]
- Information Sharing System for Maintenance of Sewage FacilitiesTakashi Okamoto. 212-215 [doi]
- Business Models for IPTV Service; Integrated or Platform?Yousin Park, Yunju Chen, Masashi Ueda. 216-219 [doi]
- Evaluation of the Competition Policy to Encourage MVNO System in JapanYuki Shoji. 220-222 [doi]
- Towards a Global AAA Framework for InternetSebastien Decugis. 227-230 [doi]
- An Infocard-Based Proposal for Unified Single Sign onEnrique de la Hoz, Antonio Garcia, Ivan Marsá-Maestre, Miguel A. López-Carmona, Bernardo Alarcos. 231-234 [doi]
- Proposal of Delegation Using Electronic Certificates on Single Sign-On System with SAML-ProtocolTakaaki Komura, Yasuhiro Nagai, Shoichi Hashimoto, Makiko Aoyagi, Kenji Takahashi. 235-238 [doi]
- Leveraging PKI in SAML 2.0 Federation for Enhanced Discovery ServiceToshiyuki Kataoka, Takeshi Nishimura, Masaki Shimaoka, Kazutsuna Yamaji, Motonori Nakamura, Noboru Sonehara, Yasuo Okabe. 239-242 [doi]
- Security Analysis on Privacy-Secure Image Trading Framework Using Blind WatermarkingMitsuo Okada, Yasuo Okabe, Tetsutaro Uehara. 243-246 [doi]
- Analysis of a Security Incident of Open Source Middleware Takeshi Nishimura, Hiroyuki Sato. 247-250 [doi]
- On Maximizing IP-SAN Throughput over TCP Connections with Automatic Parallelism Tuning for Long-Fat NetworksTakamichi Nishijima, Fumito Inoue, Hiroyuki Ohsaki, Yoshihiro Nomoto, Makoto Imase. 251-254 [doi]
- A Fault Detection System for Large Scale Sensor Networks Considering Reliability of Sensor DataMasato Yamanouchi, Satoshi Matsuura, Hideki Sunahara. 255-258 [doi]
- RainWatch Project: Location-Awared Realtime Detection and Notification of Rain on Internet-Based Sensor NetworkKaveevivitchai Sathita, Hideya Ochiai, Hiroshi Esaki. 259-262 [doi]
- Measurement Analysis of the Live E! Sensor Network: Spatial-Temporal Correlations and Data AggregationElyes Ben Hamida, Hideya Ochiai, Hiroshi Esaki, Pierre Borgnat, Patrice Abry, Eric Fleury. 263-266 [doi]
- DCN@MPLS: A Network Architectural Model for Dynamic Circuit Networking at Multiple Protocol Label SwitchingJaved I. Khan, Omar Y. Tahboub. 267-270 [doi]
- Study on Multi-path Transmission Model Based on P2P Overlay Networks for Streaming DataGuochao Jing, Takeshi Tsuchiya, Hiroaki Sawano, Takeshi Kugimoto, Katsuhiro Sebayashi, Osamu Akashi, Mitsuru Maruyama, Kei ichi Koyanagi. 271-274 [doi]
- PCSP: A Probable Concurrent Secure and Portable Peer-to-Peer ProtocolGraciela Perera, Robert Gilliland. 275-277 [doi]
- Reliable Streaming Transmission Using PR-SCTPTomotaka Maeda, Masahiro Kozuka, Yasuo Okabe. 278-279 [doi]
- Analysis of UDP Traffic Usage on Internet Backbone LinksMin Zhang, Maurizio Dusi, Wolfgang John, Changjia Chen. 280-281 [doi]
- Streaming Media Caching on Advanced Relay NodesYusuke Sugio, Hiroyuki Koga, Masayoshi Shimamura, Takeshi Ikenaga. 282-283 [doi]
- Multi-base Station Placement for Reprogramming Wireless Sensor NetworksAoi Hashizume, Hiroshi Mineno, Tadanori Mizuno. 284-285 [doi]
- Congestion Propagation in Multihop Wireless NetworksYoichi Yamasaki, Hiroyuki Koga, Yutaka Fukuda, Masayoshi Shimamura, Yuji Oie. 286-287 [doi]
- A Proposal of P2P-Based Resource Discovery Mechanism for the GridKei Kokubo, Kohei Ichikawa, Yoshimasa Ishi, Susumu Date. 288-289 [doi]
- E-mail-based Information Utilization SystemShinya Kambori, Hitoshi Aida. 290-291 [doi]
- Simulating Information Transmission Mechanisms on a Network through Particle Swarm OptimizationToru Takahashi, Takashi Yamada, Takao Terano. 292-293 [doi]
- Privacy Disclosure: Personal Information and Images on Social Networking Sites in TaiwanChia-Lung Hsieh. 294-295 [doi]