Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleMarch 2004
Using XML and related standards to support Location Based Services
- Anastasios Ioannidis,
- Manos Spanoudakis,
- Panos Sianas,
- Ioannis Priggouris,
- Stathes Hadjiefthymiades,
- Lazaros Merakos
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 1629–1633https://doi.org/10.1145/967900.968226Location Based Services can be considered as the most rapidly expanding field of the mobile communications sector. The proliferation of the mobile/wireless Internet, the constantly increasing use of handheld, mobile devices and positioning technologies ...
- ArticleMarch 2004
A network independent broker for obtaining the position of nomadic users
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 1206–1207https://doi.org/10.1145/967900.968144Positioning is an essential component for the deployment of the evolving context-aware concepts. Information Society Technologies (IST) project PoLoS investigates existing schemes for Location-Based Services, Geographical Information Systems, ...
- ArticleMarch 2004
Delivering Attribute Certificates over GPRS
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 1166–1170https://doi.org/10.1145/967900.968137Attribute Certificates (ACs) have been developed and standardized by the ANSI X9 committee as an alternative and better approach, to X.509 public key certificates, for carrying authorization information. Attribute Authorities (AA) bind the ...
- ArticleMarch 2004
A call admission control scheme using genetic algorithms
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 1151–1158https://doi.org/10.1145/967900.968135Next Generation Wireless Systems (NGWS) will provide a variety of services to mobile users including high speed data, real-time applications and real-time multimedia support with a certain quality of service (QoS) level. An efficient handoff management ...
-
- ArticleMarch 2004
Efficient management of XML contents over wireless environment by Xstream
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 1122–1127https://doi.org/10.1145/967900.968128In this paper we investigated the issues pertaining to streaming generalized XML documents over the wireless environment. We highlight the disadvantages of employing existing approach to fragment and manage the transfer of XML contents across a wireless ...
- ArticleMarch 2004
Caching in Web memory hierarchies
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 1109–1113https://doi.org/10.1145/967900.968126Web cache replacement algorithms have received a lot of attention during the past years. Though none of the proposed algorithms deals efficiently with all the particularities of the Web environment, namely, relatively weak temporal locality (due to ...
- ArticleMarch 2004
Web Services for E-commerce: guaranteeing security access and quality of service
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 800–806https://doi.org/10.1145/967900.968065Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality of service. In this paper we present a solution to this problem based on ...
- ArticleMarch 2004
Automatic verification of the TLS handshake protocol
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 789–794https://doi.org/10.1145/967900.968063E-commerce is based on transactions between client and server agents. These transactions require a protocol that provides privacy and reliability between these two agents. A widely used protocol on e-commerce is Transport Layer Security (TLS). In this ...
- ArticleMarch 2004
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 766–773https://doi.org/10.1145/967900.968059Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of new mobile commerce applications. In this paper we present a mobile commerce ...
- ArticleMarch 2004
WSSecSpaces: a secure data-driven coordination service for Web Services applications
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 487–491https://doi.org/10.1145/967900.968001Web Services standards and protocols (WSDL, UDDI, SOAP, etc.) are the basis of a novel technology supporting Web based applications. Web Services are components offering ports at which service invocations can be sent using XML-based protocols. The tools ...
- ArticleMarch 2004
An agent design method promoting separation between computation and coordination
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 456–461https://doi.org/10.1145/967900.967996The development of (internet) agents is often a tedious and error-prone task resulting in poorly reusable designs, since both the internal computation of the agent as well as the coordination support are developed in an ad hoc fashion. To improve the ...
- ArticleMarch 2004
Towards multisensor data fusion for DoS detection
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 439–446https://doi.org/10.1145/967900.967992In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present Dempster-Shafer's Theory of Evidence (D-S) as the mathematical foundation for the development of a novel DoS detection engine. Based on a data ...
- ArticleMarch 2004
Unsupervised learning techniques for an intrusion detection system
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 412–419https://doi.org/10.1145/967900.967988With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are increasingly limited by their need of an up-to-date and comprehensive ...
- ArticleMarch 2004
Efficient comparison of enterprise privacy policies
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 375–382https://doi.org/10.1145/967900.967983Enterprise privacy policies often reflect different legal regulations, promises made to customers, as well as more restrictive enterprise-internal practices. The notion of policy refinement is fundamental for privacy policies, as it allows one to check ...
- ArticleMarch 2004
RED with Dynamic Thresholds for improved fairness
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 371–372https://doi.org/10.1145/967900.967980We investigate the fair bandwidth sharing among responsive and unresponsive traffic flows. When these flows compete for the same output link in a router, unresponsive flows tend to occupy more than their fair share of the link capacity. We propose a new ...
- ArticleMarch 2004
A discrete event based simulation environment for enhanced UMTS 3rd generation networks
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 369–370https://doi.org/10.1145/967900.967979This paper presents a new system level simulator that has been developed to evaluate E-UMTS (Enhanced Universal Mobile Telecommunication Systems) 3G Networks. The article describes how the simulator supports different mobility, propagation, and traffic ...
- ArticleMarch 2004
A framework for implicit and explicit service activation based on Service Level Specification
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 363–368https://doi.org/10.1145/967900.967978Internet Protocol-based applications are the prevailing trend of the telecommunications market, but the path towards the "IP over everything" target is not unhampered. The main shortcoming of the IP protocol is its incapability of providing guaranteed ...
- ArticleMarch 2004
EmuNET: a real-time network emulator
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 357–362https://doi.org/10.1145/967900.967977New protocols and network applications must be extensively tested before deployment on the Internet. In this paper, we describe the design and implementation of EmuNET, a lightweight, portable, configurable, and extendable network emulator, which can be ...
- ArticleMarch 2004
A functional architecture for self-aware routers
SAC '04: Proceedings of the 2004 ACM symposium on Applied computingPages 352–356https://doi.org/10.1145/967900.967976In this paper, we first present the concept of self-configuration and self-provisioning applied into the scope of the IP routers. A global view of the concepts which are addressed in this document is given, considering the automation level of the ...