Abstract is missing.
- Searching Structural Neighborhood of Malicious URLs to Improve BlacklistingMitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh. 1-10 [doi]
- High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based LabellingMoriteru Ishida, Hiroki Takakura, Yasuo Okabe. 11-19 [doi]
- Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate AuthoritySatoshi Ishibashi, Shuichi Miyazaki, Yasuo Okabe. 20-26 [doi]
- An XPath Query Aggregation Algorithm Using a Region EncodingYang Cao, Chung-Horng Lung, Shikharesh Majumdar. 27-36 [doi]
- Fluid-Based Analysis of TCP Flows in a Scale-Free NetworkYusuke Sakumoto, Hiroyuki Ohsaki, Makoto Imase. 37-43 [doi]
- Mutually Complementary Communication Protocol for Indoor Sensor/Actuator NetworksHisashi Sawada, Hiroshi Kuriyama, Yuki Nakano, Hiroshi Mineno, Tadanori Mizuno. 44-49 [doi]
- A Novel Approach for Selecting the Participants to Collect Data in Participatory SensingHong Nhat Pham, Back Sun Sim, Hee Yong Youn. 50-55 [doi]
- Evaluation of the Influence of Time Synchronisation on Classification Learning Based Movement Detection with AccelerometersBernd Niklas Klein, Sian Lun Lau, Klaus David. 56-64 [doi]
- A Topic-Based Visualization Tool for Distributed Publish/Subscribe MessagingKyriakos Karenos, Wim De Pauw, Hui Lei. 65-74 [doi]
- Reducing Speech Contention in Web ConferencesHidekazu Tamaki, Suguru Higashino, Minoru Kobayashi, Masayuki Ihara. 75-81 [doi]
- A Unified Method for Multiple Home Appliances Control through Static Finger GesturesLei Jing, Kaoru Yamagishi, Junbo Wang, Yinghui Zhou, Tongjun Huang, Zixue Cheng. 82-90 [doi]
- A Federated Approach to Crossblogging through ContractsFelipe M. Villoria, Oscar Díaz. 91-99 [doi]
- Social Engineering of Communities of Web ServicesZakaria Maamar, Hamdi Yahyaoui, Erbin Lim, Philippe Thiran. 100-109 [doi]
- A Proposal for Social Search System DesignToyokazu Akiyama, Yukiko Kawai, Yuya Matsui, Yoshinori Kubota, Takuya Osaki. 110-117 [doi]
- Data Clustering on a Network of Mobile SmartphonesAdam Ji Dou, Vana Kalogeraki, Dimitrios Gunopulos, Taneli Mielikäinen, Ville H. Tuulos, Sean Foley, Curtis Yu. 118-127 [doi]
- A Flooding Control Method with Ack-carry for Location-Based Information Dissemination in Mobile Ad Hoc NetworksToshimitsu Fujii, Mitsuru Kaji, Yuya Sasaki, Takahiro Hara, Shojiro Nishio. 128-135 [doi]
- An Effective Batching Scheme Combining Static Multicasting with Dynamic Multicasting for Mobile IPTVHan Ku Yoo, Kwang-Myung Kim, Hee Yong Youn. 136-144 [doi]
- ACES - Application Cloud for Embedded SystemsJian-Hong Liu, Jing Chen, Yi-Chuan Tai, Chen-Hao Shih. 145-151 [doi]
- The Design and Implementation of an On-demand DC Grid in HomeTomoki Shibata, Kazumi Sakai, Yasuo Okabe. 152-159 [doi]
- DaaS: DDoS Mitigation-as-a-ServiceSoon Hin Khor, Akihiro Nakao. 160-171 [doi]
- Evaluation of Time-Sensitive Information Multicasting Using Tree-Structured Overlay NetworkAtsushi Tagami, Makoto Takahara, Shigehiro Ano, Kenji Suzuki. 172-177 [doi]
- Pantau: A Monitoring System for KVM-Based Server Consolidation EnvironmentArnupharp Viratanapanu, Ahmad Kamil Abdul Hamid, Yoshihiro Kawahara, Tohru Asami. 178-183 [doi]
- Evaluating Asynchronous Sharing of Links and Annotation Sessions as Social Interactions on Internet VideosAlan Keller Gomes, Diogo de Carvalho Pedrosa, Maria da Graça Campos Pimentel. 184-189 [doi]
- Information Source-Based Classification of Automatic Phishing Website DetectorsHossain Shahriar, Mohammad Zulkernine. 190-195 [doi]
- A Situation-Based Exception Detection Mechanism for Safety in Pervasive SystemsEun-Sun Cho, Sumi Helal. 196-201 [doi]
- User Centric Privacy in Mobile Communication ScenariosKlaus Rechert, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara. 202-207 [doi]
- Design and Implementation of an AR-Assisted Tool for Basic Home Network ManagementAhmad Kamil Abdul Hamid, Wei Zhu, Yoshihiro Kawahara, Tohru Asami. 208-213 [doi]
- Effects of Length and Number of Paths on Simultaneous Multi-path CommunicationAkiji Tanaka. 214-217 [doi]
- A Framework for Context-Aware Applications for Smart SpacesNatalia Díaz Rodríguez. 218-221 [doi]
- Proposal of an Adaptive Firewall System in Collaboration with Extended DNSYong Jin, Nariyoshi Yamai. 222-225 [doi]
- Platform for Pushing the Device-Oriented Information into a CloudKenji Morita. 234-237 [doi]
- Simple Wi-Fi-Based Direction Estimation of Subjects Using Directional AntennaShota Ishikawa. 238-241 [doi]
- Reconfigurable TCP: An Architecture for Enhanced Communication Performance in Mobile Cloud ServicesNaoki Oguchi, Shunji Abe. 242-245 [doi]
- Toward Better Recommender System by Collaborative Computation with Privacy PreservedChia-Lung Hsieh. 246-249 [doi]
- An Open Platform toward Large-Scale Multilevel Modeling and Simulation of Physiological SystemsYoshiyuki Asai, Hideki Oka, Takeshi Abe, Masao Okita, Kenichi Hagihara, Taishin Nomura, Hiroaki Kitano. 250-255 [doi]
- Peta-Flow Computing: Vision and ChallengesHiroyuki Ohsaki, Kazunori Nozaki, Ken-ichi Baba, Eisaku Sakane, Naohisa Sakamoto, Koji Koyamada, Shinji Shimojo. 256-259 [doi]
- Performance Evaluation of Epidemic Broadcast with Directional Antennas in Vehicular Ad-Hoc NetworksShinpei Kuribayashi, Yusuke Sakumoto, Hiroyuki Ohsaki, Satoshi Hasegawa, Makoto Imase. 260-265 [doi]
- Modeling Bio-Molecular Machinery in the Complex Environment Inside the CellYuichi Togashi. 266 [doi]
- Estimating Traffic Anomalies for Throughput Prediction on Network VirtualizationChunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura. 267-273 [doi]
- Performance Comparison of Enhanced TCPs over High-Speed Internetworking Satellite (WINDS)Hiroshi Yamamoto, Genki Komada, Katsuichi Nakamura, Takashi Takahashi, Katsuyuki Yamazaki. 274-278 [doi]
- Programming Pervasive Spaces: Workshop on Semantic Interoperability in Smart SpacesSumi Helal. 279 [doi]
- Delay Performance in a Semantic Interoperability ArchitectureSachin Bhardwaj, Tanir Özçelebi, Richard Verhoeven, Johan Lukkien. 280-285 [doi]
- Developing Reusable Knowledge Processors for Smart EnvironmentsJarkko Kuusijärvi, Sakari Stenudd. 286-291 [doi]
- Feasibility Evaluation of M3 Smart Space Broker ImplementationsMatti Eteläperä, Jussi Kiljander, Kari Keinänen. 292-296 [doi]
- Security Solutions for Smart SpacesJani Suomalainen, Pasi Hyttinen. 297-302 [doi]
- Enabling End-Users to Configure Smart EnvironmentsJussi Kiljander, Janne Takalo-Mattila, Matti Eteläperä, Juha-Pekka Soininen, Kari Keinänen. 303-308 [doi]
- Case Study: Context-Aware Supervision of a Smart Maintenance ProcessSusanna Pantsar-Syväniemi, Eila Ovaska, Susanna Ferrari, Tullio Salmon Cinotti, Guido Zamagni, Luca Roffia, Sandra Mattarozzi, Valerio Nannini. 309-314 [doi]
- Quantifying Cost Structure of Campus PKIShigeaki Tanimoto, Masahiko Yokoi, Hiroyuki Sato, Atsushi Kanai. 315-320 [doi]
- Design and Implementation of Web Forward Proxy with Shibboleth AuthenticationTakaaki Komura, Hiroaki Sano, Noritoshi Demizu, Ken Makimura. 321-326 [doi]
- Federated Authentication in a Hierarchy of IdPs by Using ShibbolethHiroyuki Sato, Takeshi Nishimura. 327-332 [doi]
- Performance Analysis of Movement-Based Group Location Management for Mobile Stations Riding on Transportation Systems in Cellular SystemsYun Won Chung. 333-337 [doi]
- A Handover Control of Mobile Nodes with IP Mobility in Heterogeneous Wireless NetworksTakuya Horai, Yuki Iwata, Hayato Morihiro, Yasuhiro Ohishi, Kaori Maeda, Hiroyuki Inoue. 338-341 [doi]
- Optimization System of IP Address Using Terminal ID in EduroamYoshinori Miyamoto, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone. 342-346 [doi]
- Flexible Access Management System for Campus VLAN Based on OpenFlowYasuhiro Yamasaki, Yoshinori Miyamoto, Junichi Yamato, Hideaki Goto, Hideaki Sone. 347-351 [doi]
- New Era for Management to Deal with Scalability, Invisibility and Shared ResponsibilitySuguru Yamaguchi. 352 [doi]
- Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow StatisticsYukiko Sawaya, Ayumu Kubota, Yutaka Miyake. 353-359 [doi]
- A Study of Communication Route Selection Considering Route SecurityFumiharu Etoh, Yoshiaki Hori, Kouichi Sakurai. 360-365 [doi]
- Improving Performance of Anomaly-Based IDS by Combining Multiple ClassifiersKazuya Kishimoto, Hirofumi Yamaki, Hiroki Takakura. 366-371 [doi]
- Correlation Analysis between Spamming Botnets and Malware Infected HostsJungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao. 372-375 [doi]
- Breadcrumbs+: Some Extensions of Naive Breadcrumbs for In-network Guidance in Content Centric NetworksMasayuki Kakida, Yosuke Tanigawa, Hideki Tode. 376-381 [doi]
- SAPS: Semantic AtomPub-Based ServicesMarkus Lanthaler, Christian Gütl. 382-387 [doi]
- Efficient Information Source Monitoring Method Considering User Utility in Large-Scale NetworksShinji Sugawara, Kengo Honda, Yutaka Ishibashi. 388-393 [doi]
- S:::3:::: Smart Shadow System for Real World Service and Its Evaluation with UsersKenji Umakoshi, Takashi Kambayashi, Manabu Yoshida, Michiharu Takemoto, Masato Matsuo. 394-401 [doi]
- A Home Security Service Robot System Using the Network Service Platform and Its ImplementationSoichiro Ushio, Kazunori Okada, Yasuhiko Kido, Tomoki Kitahara, Hidenori Tsuji, Satoko Moriguchi, Masahiko Narita, Yuka Kato. 402-407 [doi]
- A Design and Evaluation of a Geolocation-Aware Reliable Multicast System on Wireless NetworksTohru Kondo, Toru Suzuki, Tsuyoshi Yoshigi, Hayato Morihiro, Kaori Maeda. 408-413 [doi]
- Design and Implementation of New uTupleSpace Enabling Storage and Retrieval of Large Amount of Schema-less Sensor DataTakayuki Nakamura, Keiichiro Kashiwagi, Yutaka Arakawa, Motonori Nakamura. 414-420 [doi]
- Acquisition and Visualization of Hosts Connected to the NetworkYasuhito Tsukahara, Takashi Tomine, Kazunori Sugiura. 421-426 [doi]
- A Broadcast Method Based on Estimation and Preservation of Stable Links in Delay Tolerant NetworksSawamura Yusuke, Yuuichi Teranishi, Kaname Harumoto, Susumu Takeuchi, Shojiro Nishio. 427-432 [doi]
- A Case Study of UTMesh: Design and Impact of Real World Experiments with Wi-Fi and Bluetooth DevicesHideya Ochiai, Kenji Matsuo, Satoshi Matsuura, Hiroshi Esaki. 433-438 [doi]
- DNS Resource Record Analysis of URLs in E-Mail Messages for Improving Spam FilteringShuji Suwa, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura. 439-444 [doi]
- An Identification Method of PCs behind NAT Router with Proxy Authentication on HTTP CommunicationYoshiki Ishikawa, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura. 445-450 [doi]
- Trust-Based VoIP Spam Detection Based on Call Duration and Human RelationshipsNoppawat Chaisamran, Takeshi Okuda, Gregory Blanc, Suguru Yamaguchi. 451-456 [doi]
- A Proposal of Framework for Information Visualization in Developing of Web ApplicationKanae Matsui, Masato Yamanouchi, Hideki Sunahara. 457-462 [doi]
- Development of a Digital Signage System for Automatic Collection and Distribution of Its Content from the Existing Digital Contents and Its Field TrialsHiroyuki Inoue, Kaoru Suzuki, Koji Sakata, Kaori Maeda. 463-468 [doi]
- Evaluation of User-Satisfaction in Online Shopping Web Services with TCP VariablesYoshihiro Ito, Toru Tahara. 469-473 [doi]
- A Behavioral Study of TCP Linux Variants over Satellite NetworksDavide Adami, Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. 474-479 [doi]
- The Simulation Evaluation for an Adaptive Network Routing by Using Latency InformationHiroki Kashiwazaki, Yoshiaki Takai. 480-485 [doi]
- Design and Implementation of Inter-ISP Virtual Backbone Infrastructure to Meet Various QoS RequirementsTakuya Omizo, Kenji Masui, Katsuyoshi Iida. 486-491 [doi]
- Extension Management of a Knowledge Base Migration Process to IPv6Krzysztof Nowicki, Mariusz Stankiewicz, Aniela Mrugalska, Józef Wozniak, Tomasz Mrugalski. 497-501 [doi]
- Modelling TCP Connection in WiMAX Network Using Fluid Flow ApproximationKrzysztof Grochla, Tadeusz Czachórski, Jerzy Klamka. 502-507 [doi]
- A Method for Real-Time Identification of Malformed BGP MessagesMasafumi Watari, Peng Jiang, Atsuo Tachibana, Shigehiro Ano. 508-512 [doi]
- Method of Locating Mirror Servers to Alleviate Load on Servers and LinksRyota Nakamura, Hiroyoshi Miwa. 513-518 [doi]
- Routing Metric Based on Node Degree for Load-Balancing in Large-Scale NetworksHitomi Tamura, Masato Uchida, Masato Tsuru, Jun ichi Shimada, Takeshi Ikenaga, Yuji Oie. 519-523 [doi]
- Autonomous Decentralized Mechanism of Structure Formation Adapting to Network ConditionsChisa Takano, Masaki Aida, Masayuki Murata, Makoto Imase. 524-531 [doi]
- Parallel Evolutionary P2P Networking for Realizing Adaptive Large-Scale NetworksKei Ohnishi, Yuji Oie. 532-537 [doi]
- Annealing Heuristic for Fair Wireless Channel Allocation by Exponential Ordered-Ordered Weighted Averaging Operator MaximizationMario Köppen, Kaori Yoshida, Masato Tsuru, Yuji Oie. 538-543 [doi]
- Past, Present and the Future of IT-Enabled ServicesShiro Uesugi. 544 [doi]
- A Comparative Study on the Diffusion of Smartphones in Korea and JapanYousin Park, Masashi Ueda. 545-549 [doi]
- Mathematical Analysis and Simulation of Information Diffusion on NetworksYuya Dan. 550-555 [doi]
- A Study on Intention to Use Factor in the Internet Banking Websites in ThailandNagul Cooharojananone, Sedtanun Chofa, Suphakant Phimoltares. 556-561 [doi]
- A Local Currency System Reflecting Variety of ValuesHirotsugu Kinoshita, Yoshiaki Tajima, Naoya Kubo, Tetsuya Morizumi, Kazuhiro Suzuki. 562-567 [doi]
- Using Choice Experiments to Value an Electronic CommerceNobuyuki Soga, Takashi Okamoto. 568-573 [doi]
- Trust on E-Commerce Website in Thailand: A Case of Online Hotel ReservationKanokwan Atchariyachanvanich, Hitoshi Okada. 574-577 [doi]
- A Trust Rating Method for Information Providers over the Social Web Service: A Pragmatic Protocol for Trust among Information Explorers and Information ProvidersShigeichiro Yamasaki. 578-582 [doi]
- Open Issues toward Successful Deployment of Electronic Health Information Exchange in Japan - Analysis of Regional Health Information Network in Kagawa PrefectureDaisuke Yamakata, Hiroki Nogawa. 583-586 [doi]
- A Framework for an Authorization System with Spatial Reasoning Capacity to Improve Risk Management and Information Security in HealthcareEizen Kimura, Shinji Kobayashi, Takeki Yoshikawa, Ken Ishihara. 587-591 [doi]
- Information Offering by Anonymous in Japanese Human Flesh Search: Analysis of Motivation in Social Media PlatformHidenobu Sai, Yohko Orito. 592-595 [doi]