Sciweavers

APNOMS
2006
Springer
14 years 12 days ago
A Zeroconf Approach to Secure and Easy-to-Use Remote Access to Networked Appliances
In this paper, we propose a new approach to secure and easy-to-use remote access to networked appliances (NAs). Based on the proposed approach, we develop a system in which servers...
Kiyohito Yoshihara, Toru Maruta, Hiroki Horiuchi
APNOMS
2006
Springer
14 years 12 days ago
Proposal of Operation Method for Application Servers on NGN Using Unified Management Environment
Abstract. The Next Generation Network (NGN) has a multilayer logical construction. Network carriers use various tools in complex procedures to operate application servers on the NG...
Atsushi Yoshida, Yu Miyoshi, Yoshihiro Otsuka
APNOMS
2006
Springer
14 years 12 days ago
Hybrid Inference Architecture and Model for Self-healing System
Distributed computing systems are continuously increasing in complexity and cost of managing, and system management tasks require significantly higher levels of autonomic managemen...
Giljong Yoo, Jeongmin Park, Eunseok Lee
APNOMS
2006
Springer
14 years 12 days ago
Performance Improvement Methods for NETCONF-Based Configuration Management
IETF's NETCONF WG has taken efforts in standardizing configuration management protocol, which allows high interoperability of configuration management. In addition to interope...
Sun-Mi Yoo, Hong-Taek Ju, James W. Hong
APNOMS
2006
Springer
14 years 12 days ago
IP Traceback Algorithm for DoS/DDoS Attack
Abstract. DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do n...
Hong-bin Yim, Jae-il Jung
APNOMS
2006
Springer
14 years 12 days ago
The Soft Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment
Abstract. In this paper, we present SBAC (Soft Bound Admission Control) algorithm considering critical bandwidth ratio to reduce handover blocking probability over WLAN and WAAN (W...
Ok Sik Yang, Jong Min Lee, Jun Kyun Choi, Seong Go...
APNOMS
2006
Springer
14 years 12 days ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang
APNOMS
2006
Springer
14 years 12 days ago
Autonomic Management of Scalable Load-Balancing for Ubiquitous Networks
In ubiquitous networks, a lot of sensors and RFID readers will be connected to the networks as well as PCs and mobile phones are connected, and huge numbers of transactions are exp...
Toshio Tonouchi, Yasuyuki Beppu
APNOMS
2006
Springer
14 years 12 days ago
Rate-Based and Gap-Based Available Bandwidth Estimation Techniques in Cross-Traffic Context
Recent years have seen an increasing interest in end-to-end available bandwidth estimation. A number of estimation techniques and tools have been developed during the last few year...
Wayman Tan, Marat Zhanikeev, Yoshiaki Tanaka
APNOMS
2006
Springer
14 years 12 days ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...