Abstract is missing.
- Development of a High-Performance Olfactory Display and Measurement of Olfactory Characteristics for Pulse EjectionsAmi Kadowaki, Daisuke Noguchi, Sayumi Sugimoto, Yuichi Bannai, Ken-ichi Okada. 1-6 [doi]
- Applying Double-Sided Combinational Auctions to Resource Allocation in Cloud ComputingIkki Fujiwara, Kento Aida, Isao Ono. 7-14 [doi]
- Resisting Sybil Attack By Social Network and Network ClusteringLing Xu, Chainan Satayapiwat, Hiroyuki Takizawa, Hiroaki Kobayashi. 15-21 [doi]
- Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization TechnologiesAkihiro Shimoda, Tatsuya Mori, Shigeki Goto. 22-30 [doi]
- Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of ProgramsMichelle Ruse, Tanmoy Sarkar, Samik Basu. 31-37 [doi]
- Masquerade Detection in Network EnvironmentsChris Strasburg, Sandeep Krishnan, Karin S. Dorman, Samik Basu, Johnny S. Wong. 38-44 [doi]
- A Tool for Computing the Visual Similarity of Web PagesMaría Alpuente, Daniel Romero. 45-51 [doi]
- An Adaptive Route Selection Mechanism per Connection Based on Multipath DNS Round Trip Time on Multihomed NetworksYong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura. 52-58 [doi]
- Lightweight Traffic-Aware Packet Classification for Continuous OperationShariful Hasan Shaikot, Min Sik Kim. 59-67 [doi]
- Optimizing User Interaction for Web-Based Mobile TasksDong Zhou, Ajay Chander, Hiroshi Inamura. 68-76 [doi]
- Design and Implementation of NEMO Based ZigBee Mobile Router for Healthcare SystemJin-Ho Kim, Rim Haw, Eung Jun Cho, Choong Seon Hong, Jongwon Choe. 77-83 [doi]
- Energy-Efficient Location Logging for Mobile DeviceChoon-oh Lee, Minkyu Lee, Dongsoo Han. 84-90 [doi]
- Dynamic Self-Reconfiguration Algorithms for Wireless Sensor NetworksSungwook Kim, Ji-Hwan Kim. 91-95 [doi]
- Reactive Programming Optimizations in Pervasive ComputingChao Chen, Yi Xu, Kun Li, Sumi Helal. 96-104 [doi]
- Supporting Network Formation through Mining under Privacy ConstraintsFlorian Skopik, Daniel Schall, Schahram Dustdar. 105-108 [doi]
- Software Architecture and Characteristic Functions in Learning Management System NOBASU Nobuo Funabiki, Toru Nakanishi, Noriki Amano, Hiroki Kawano, Yuuki Fukuyama, Megumi Isogai. 109-112 [doi]
- Basic Approach of Timing in Context Aware Architectures Verified by Concrete AdvantagesBernd Niklas Klein, Klaus David. 113-116 [doi]
- Web-Based Intelligent Computational Argumentation Based Conflict Resolution in Air Traffic ManagementXiaoqing Liu, Ravi Santosh Arvapally, Hojong Baik, Rubal Wanchoo. 117-120 [doi]
- A Cloud Trust Model in a Security Aware CloudHiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto. 121-124 [doi]
- A History-Based Job Scheduling Mechanism for the Vector Computing CloudYoshitomo Murata, Ryusuke Egawa, Manabu Higashida, Hiroaki Kobayashi. 125-128 [doi]
- A Solution for Mail Forwarding Problem of SPF by Tracing Recipient AddressesTakumi Seike, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura. 129-132 [doi]
- SPGF Search Places by Geographical Features all Around the World: Search and Verification System Utilizing Huge Amounts of Satellite DataRyo Wakuta, Tomohiro Sonobe. 133-136 [doi]
- Using the Model Checker Spin for Web Application DesignKei Homma, Satoru Izumi, Yuki Abe, Kaoru Takahashi, Atsushi Togashi. 137-140 [doi]
- Intelligent Manipulation of Human Activities Using Cloud Computing for u-Life CareAsad Masood Khattak, Zeeshan Pervez, Koo Kyo Ho, Sungyoung Lee, Young-Koo Lee. 141-144 [doi]
- A Study on Small Business Advertising Using E-mail Transmitting Screens on Mobile PhonesFeelhwan Park, Yoh Shiraishi, Osamu Takahashi. 145-148 [doi]
- Reservation Based Reliability Control in Wireless Sensor NetworksMd. Obaidur Rahman, Muhammad Mostafa Monowar, Choong Seon Hong, Young An Kim. 149-152 [doi]
- Supporting USB Devices for the Global MigrationHidenobu Watanabe, Hajime Masaoka, Toshihiro Ohigashi, Tohru Kondo, Kouji Nishimura, Reiji Aibara. 153-156 [doi]
- An Enhanced Key Distribution Scheme for the Energy Consumption and the Security in the Wireless Sensor NetworksHyeopgeon Lee, Kyounghwa Lee, Yongtae Shin. 157-160 [doi]
- A Proposal of Privacy Management ArchitectureYoshinori Osawa, Satoru Imamura, Atsushi Takeda, Gen Kitagata, Norio Shiratori, Kazuo Hashimoto. 161-164 [doi]
- Securely Hiding the Real Servers from DDoS FloodsMohamad Samir A. Eid, Hitoshi Aida. 165-168 [doi]
- Differentiated Incentive Rewarding for Social Networking ServicesKazufumi Yogo, Ryoichi Shinkuma, Tatsuro Takahashi, Taku Konishi, Satoko Itaya, Shinichi Doi, Keiji Yamada. 169-172 [doi]
- Incentive Rewarding Method for Information Propagation in Social NetworksYoshinori Takata, Ryo Hashimoto, Ryoichi Shinkuma, Tatsuro Takahashi, Naoki Yoshinaga, Satoko Itaya, Shinichi Doi, Keiji Yamada. 173-176 [doi]
- Robust Estimation of Message Importance Using Inferred Inter-recipient Trust for Supporting Email TriageSho Tsugawa, Kazuya Takahashi, Hiroyuki Ohsaki, Makoto Imase. 177-180 [doi]
- A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured OverlayHiroaki Yamanaka, Toru Fujiwara, Shingo Okamura. 181-184 [doi]
- An Overlay Authentication Network for Active Utilization of Private InformationAkihiro Nakarai, Akira Sakatoku, Atsushi Takeda, Gen Kitagata, Debasish Chakraborty, Kazuo Hashimoto, Norio Shiratori. 185-188 [doi]
- Missing Data Imputation Using Regression Tree Model for Sparse Data Collected via Wide Area Ubiquitous NetworkYuka Higashijima, Atsushi Yamamoto, Takayuki Nakamura, Motonori Nakamura, Masato Matsuo. 189-192 [doi]
- Resource & Configuration Management for WSN in the Future InternetMuhammad Shoaib Siddiqui, Choong Seon Hong. 193-196 [doi]
- Evaluation of B+Tree-Based Multi-dimensional Range Search Algorithm for P2P NetworksNobuhiko Matsuura, Hiroshi Mineno, Norihiro Ishikawa, Tadanori Mizuno. 197-200 [doi]
- A Self-Localization Method Using Propagation of Existence ProbabilityKentaro Fujiwara, Kaname Harumoto, Yuuichi Teranishi, Toyokazu Akiyama, Susumu Takeuchi, Shojiro Nishio. 201-204 [doi]
- A Design and Development of a Multi-source Streaming Platform Based on a Building Block ArchitectureTohru Kondo, Reiji Aibara, Kouichi Abe, Yuuiti Ishikuni, Hiroyuki Inoue, Kaori Maeda. 205-208 [doi]
- ManeuverXML: Distance-Measurement Based Operation Event Description Model and User Interaction InterpretationKoji Sato, Shiro Sakata. 209-212 [doi]
- CUBIQ: Cross UBIQuitous Platform ArchitectureHiroshi Dempo, Makiko Yoshida. 213-216 [doi]
- Smart Shadow: Platform to Provide Real-World Services in Ubiquitous Environments and Its ApplicationsMichiharu Takemoto, Takashi Kambayashi, Takahiro Hata, Kentaro Uchiyama, Kenji Umakoshi. 217-220 [doi]
- From CMS to SNS: Exploring the Use of Facebook in the Social Constructivist ParadigmRobert J. Fouser. 221-224 [doi]
- Digital Signage with Audience Detection Using TV Broadcasting WavesKaori Maeda, Masahiro Nishi, Teruaki Yoshida, Kaoru Suzuki, Hiroyuki Inoue. 225-228 [doi]
- A Draw Plug-In for a Wiki SoftwareTakashi Yamanoue. 229-232 [doi]
- Calculation of Necessary QoS for User Satisfaction with a QoS Mapping MatrixYoshihiro Ito. 233-236 [doi]
- A MAC-address Relaying NAT Router for PC Identification from Outside of a LANRyo Murakami, Nariyoshi Yamai, Kiyohiko Okayama. 237-240 [doi]
- A Method for Analyzing Network Traffic Using Cardinality Information in Firewall LogsSatoshi Matsumoto, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano, Yusuke Shomura, Kenichi Yoshida. 241-244 [doi]
- A Dynamic Routing Method for Inbound E-mail Delivery Considering Route and MTA Conditions on Multihomed EnvironmentSho Jitsuto, Yong Jin, Kiyohiko Okayama, Nariyoshi Yamai. 245-248 [doi]
- Evaluation of P2P File Distribution Using IP MobilityHajime Masaoka, Seigo Kishiba, Tohru Kondo, Kouji Nishimura, Reiji Aibara, Akio Seki. 249-252 [doi]
- Detecting Anomaly Traffic using Flow Data in the real VoIP networkHyeongu Son, Youngseok Lee. 253-256 [doi]
- An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web ServersJungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao. 257-260 [doi]
- A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS AttacksTadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai. 261-264 [doi]
- Vulnerability in Public Malware Sandbox Analysis SystemsKatsunari Yoshioka, Yoshihiko Hosobuchi, Tatsunori Orii, Tsutomu Matsumoto. 265-268 [doi]
- An µTESLA Protocols with Multi-senders Based on a 2-Level XOR Chain with Data-Loss ToleranceDon-Gu Yeo, Heung-Youl Youm. 269-272 [doi]
- How to Locate a Target Binary Process and Its Derivatives in System EmulatorHyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao. 273-276 [doi]
- Attribute Aggregating System for Shibboleth Based Access Management FederationKazutsuna Yamaji, Toshiyuki Kataoka, Motonori Nakamura, Tananun Orawiwattanakul, Noboru Sonehara. 281-284 [doi]
- Enhancement of SIP Signaling for Integrity VerificationHisashi Takahara, Motonori Nakamura. 289-292 [doi]
- Implementation Approach for Network Coding using External Devices in IP MulticastChikara Sasaki, Atsushi Tagami, Shigehiro Ano. 293-296 [doi]
- Centralized Authentication System for Location Privacy Protection and Low Operational Cost of Large Scale WLAN RoamingIchiro Yamaguchi, Takaaki Suzuki, Hideaki Goto, Hideaki Sone. 297-299 [doi]
- A Dynamic Trust Estimation Method for Persona from the Human Relationship of Social WebShigeichiro Yamasaki. 300-303 [doi]
- Disaster Recovery for System Architecture Using Cloud ComputingManish Pokharel, Seulki Lee, Jong Sou Park. 304-307 [doi]
- Web-Based Experiment to Analyze Norms of Reputation Making: How to Evaluate Actions with a Opponent Having a Bad ReputationTakahisa Suzuki, Tetsuro Kobayashi. 308-311 [doi]
- A New Design of ATM Interface for Banking Services in ThailandNagul Cooharojananone, Kamonwan Taohai, Suphakant Phimoltares. 312-315 [doi]
- An Electronic Money System as Substitute for BanknotesHirotsugu Kinoshita, Kudo Mamoru, Tetsuya Morizumi, Kazuhiro Suzuki. 316-319 [doi]
- The Study on Consumer Behavior of Online ShopsTakashi Okamoto. 320-323 [doi]
- The Problems for Diffusion of Location Based Services in Rural AreasHidenobu Sai. 324-327 [doi]
- An Analysis of IPTV Competition ModelYunju Chen, Masashi Ueda, Yousin Park. 328-331 [doi]
- Transforming the Interactive Response System to a Cloud Voting ServiceYu-Hui Tao. 332-334 [doi]
- On the Effectiveness of Thorup s Shortest Path Algorithm for Large-Scale Network SimulationYusuke Sakumoto, Hiroyuki Ohsaki, Makoto Imase. 339-342 [doi]
- Performance Evaluation of Block Device Layer with Automatic Parallelism Tuning Using Heterogeneous IP-SAN ProtocolsTakamichi Nishijima, Hiroyuki Ohsaki, Yoshihiro Nomoto, Makoto Imase. 343-346 [doi]
- Petaflow - A Project Towards Information and Communication Technologies in SocietyPaulo Gonçalves, Xavier Grandchamp, Xavier Pelorson, Bruno Raffin, Annemie Van Hirtum, Pascale Vicat-Blanc, Ken-ichi Baba, Julien Cisonni, Yasuo Ebara, Kazunori Nozaki, Hiroyuki Ohsaki, Shigeo Wada, Takuma Kawamura, Koji Koyamada, Eisaku Sakane, Naohisa Sakamoto, Shinji Shimojo. 347-350 [doi]
- Towards Sibilant [s] Physical Modeling: Numerical Study of the Influence of the Aperture of a Tooth-Shaped Constriction on the Flow-Induced NoiseJulien Cisonni, Shigeo Wada, Kazunori Nozaki, Annemie Van Hirtum. 351-354 [doi]
- The Complementary Registration Method for Vocal Tract of Sibilant /s/Takashi Suda, Manabu Higashida, Ken-ichi Baba, Kazunori Nozaki. 355-358 [doi]
- Model-Based Intrusion Detection by Abstract InterpretationJingyu Hua, Takashi Nishide, Kouichi Sakurai. 359-362 [doi]
- Enhancing Network Based Bot Detection with Contextual InformationNobutaka Kawagcuhi, Kazuya Okouchi, Hirofumi Nakakoji, Tetsuro Kito, Tomonori Shigemoto, Masato Terada. 363-366 [doi]
- Identifying Potentially-Impacted Area by Vulnerabilities in Networked Systems Using CVSSToshiki Harada, Akira Kanaoka, Eiji Okamoto, Masahiko Kato. 367-370 [doi]
- Study of Log File Dispersion Management MethodFumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai. 371-374 [doi]
- Behavior Control Based on Dynamic Code TranslationAkihiro Sakai, Yoshiaki Hori, Kouichi Sakurai. 375-378 [doi]
- Urgent Need of Ubiquitous Healthcare for Chronic Disease Management: Focused on Diabetes for the First StepJae Hyoung Cho, Yoon-Hee Choi, Mi-Ja Kang, Hun-Sung Kim, Jeong-Ah Shin, Jin-Hee Lee, Kun-Ho Yoon. 379-382 [doi]
- Prolonging the Lifetime of Wireless Sensor Networks via Hotspot AnalysisJin Wang, Imanishimwe Jean de Dieu, Asturias De Leon Diego Jose, Sungyoung Lee, Young-Koo Lee. 383-386 [doi]
- Service Level Semantic InteroperabilityAsad Masood Khattak, Zeeshan Pervez, A. M. Jehad Sarkar, Young-Koo Lee. 387-390 [doi]
- Chord Based Identity Management for e-Healthcare Cloud ApplicationsIl Kon Kim, Zeeshan Pervez, Asad Masood Khattak, Sungyoung Lee. 391-394 [doi]
- An Improved Maximum Relevance and Minimum Redundancy Feature Selection Algorithm Based on Normalized Mutual InformationLa The Vinh, Nguyen Duc Thang, Young-Koo Lee. 395-398 [doi]