19th International Conference onAdvanced Information Outworking and ftpptications
2005
Volume 2 (INA, USW, WAMIS, and IPv6 papers)
28-30 March 2005 • Taipei, Taiwan
Edited by
Timothy K. Shih, Tamkang University, Taiwan
Yoshitaka Shibata, Iwate Prefectural University, Japan
Sponsored by
IEEE Computer Society Technical Committee on Distributed Processing (TCDP)
Tamkang University, Taiwan
In cooperation with
Asian Office of Aerospace Research and Development (AOARD)
U.S. Army Asian Research Office
IEEE'
COMPUTERSOCIETY
•IEEELos Alamitos, California
Washington • Brussels • Tokyo
ZOOS
Contents — Volume 2Message from the INA Co-Chairs xviiiINA Organizing Committee xixINA Reviewers xxiiMessage from the USW Chairs xxivUSW Organizing Committee xxvWAMIS Preface xxviiWAMIS Organizing Committee
IPv6 PrefaceIPv6 Organizing Committee xxxi
The First International Workshop onInformation Networking and Applications (INA'05)
Technical Presentation 1
Session 101: Ad Hoc and Mobile Networks
Designing Secure Wireless Mobile Ad Hoc Networks 5V. Balakrishnan and V. Varadharajan
Effect of Mobility on the Critical Transmitting Range for Connectivity in WirelessAd Hoc Networks 9
G. Zhang, J. Li, Y. Chen, and J. Liu
Cost-Efficient QoS Routing Protocol for Mobile Ad Hoc Networks 13W. Zhang, J. Li, andX. Wang
Signal Strength-Based Routing Protocol for Mobile Ad Hoc Networks 17S.-Y. Wang, J.-Y. Liu, C.C. Huang, M.-Y. Kao, and Y.-H. Li
Synchronous and Multiplexed Time Slots and Radio Blocks Allocation forMobile Packet Data Networks 21
C.-N. Tsai, K.-W. Ke, and H.-T. Wu
CRMA: A Novel Multiple Access Protocol for Power Efficient Wireless LAN 25H. Hong, J.-D. Li, and M. Sheng
Session 102: Multicasting and Broadcasting
An Analysis of Relationship between Video Contents and Subjective Video Qualityfor Internet Broadcasting 31
Y. Kato, A. Honda, and K. Hakozaki
Fault Tolerant Routing and Broadcasting in de Bruijn Networks , 35N. Nguyen, N. Vo, and S. Lee
A Switched Ethernet Protocol for Hard Real-Time Embedded System Applications 41A. Yiming and T. Eisaka
The Advanced International Case Study Using High Speed Internet 45K. Nakagawa and K. Okamura
Session 103: Wireless Communication
Hybrid CIP/M&M for Micro-mobility Management under the Multilayer Wireless Network 51Y.-H. Wang, H.-M. Huang, andH.-Y. Li
An Algorithm of Dynamic Resource Reservation for Multimedia Wireless Communication 55Y.-H. Wang, K.-J. Tseng, and Y. Hsieh
IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives 60T.-J. Tsai and J.-W. Chen
MCDA: An Efficient Multi-channel MAC Protocol for 802.11 Wireless LAN withDirectional Antenna 64
C.-Y. Chang, H.-C. Sun, and C.-C. Hsieh
A New Wireless Networking System for Rescue Activities in Disasters -System Overview and Evaluation of Wireless Node 68
M. Kamegawa, M. Kawamoto, T. Shigeyasu, M. Urakami, and H. Matsuno
Session 104: Image Compression and Coding Methods
A Lossless Medical Image Compression Scheme Using Modified S-tree Structure 75C.-S. Chan and C.-C. Chang
Detecting and Restoring System of Tampered Image Based on Discrete WaveletTransformation and Block Truncation Coding 79
C.-L Wang, R.-H. Hwang, T.-S. Chen, and H.-Y. Lee
A DCT-Domain System for Hiding Fractal Compressed Images 83C.-C. Chang, C.-L Chiang, andJ.-Y. Hsiao
A Feature-Based Scalable Codec for Image Compression 87L-C. Kuo and S.-J. Wang
A New Look at Coding and Decoding Algorithm for SFC-OFDM System 91W. Fu and W. Kou
Low Complexity Multiple Description Coding Method for Wireless Video 95Y. Wang and C. Wu
Technical Presentation 2
Session 105: Collaborative and Web-Based Learning
Cooperative Learning and Web Applications: A Case Study 101N. Sala
An Intelligent Semantic Agent for e-Learning Message Communication 105Y.-H. Wang, W.-N. Wang, and Y.-H. Yen
WEB-Based Environment for Programming and Distance Learning 109D. Vazhenin, A. Vazhenin, and Y.-H. Wang
An Adaptive Communication System for User's Resource Environment 113K. Hashimoto and Y. Shibata
A Web-Based Remote Experiment System with Individualized Assessment of Learners 117H. Mitsui
Session 106: Security and Authentication
Efficient Secret Sharing with Access Structures in a Hierarchy 123C.-H. Lin and W. Lee
Dynamic Key Generations for Secret Sharing in Access Structures 127C.-H. Lin, W. Lee, andC.-S. Chen
Estimations on the Security Aspect of Brand's Electronic Cash Scheme 131C. Cheng, J. Yunus, and K. Seman
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing 135C.-H. Lin andH.-H. Lin
A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures 139Y.-P. Lai and C.-C. Chang
Integration of Security Parameters in the Service Level Specification to ImproveQoS Management of Secure Distributed Multimedia Services 145
5. Duflos, V. Gay, B. Kervella, and E. Horlait
Technical Presentation 3
Session 107: Network Security
A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe ErrorandM Safe Error Attacks 151
C.-C. Lu, S.-Y. Tseng, and S.-K. Huang
Genetic Algorithm to Improve SVM Based Network Intrusion Detection System 155D. Kim, H.-N. Nguyen, andJ. Park
Apply Data Mining to Defense-in-Depth Network Security System 159N.-F. Huang, C.-N. Kao, H.-W. Hun, G.-Y. Jai, and C.-L. Lin
Designing an Enhanced PC Cluster System for Scalable Network Services 163Y.-H. Chang and J. Chen
Improved Genetic Algorithm to Solve Preplanned Backup Path on WDM Networks 167Y.-F. Wang and C.-H. Chen
Session 108: Mobile Agent and Ontology
Mobile Intelligent Agent Technologies to Support VoIP Seamless Mobility 177C.-H. Lin, J.-S. Yang, and K.-C. Wu
A Behavioral Model Based on Meme and Qualia for Multi-agent Social Behavior 181Y. Mizuno, S. Kato, A. Mutoh, and H. Itoh
Reliability Estimation of Mobile Agent Systems Using the Monte Carlo Approach 185M. Daoud and Q. Mahmoud
An Agent-Based Approach to Composite Mobile Web Services 189W. Zahreddine and Q. Mahmoud
A Distributed Ontology Framework in the Semantic Grid Environment 193A. Flahive, W. Rahayu, D. Taniar, and B. Apduhan
Technical Presentation 4
Session 109: Parallel Programming and Architecture
Heterogeneous Distributed Parallel Programming for Coordination in Software Development 199C.-C. Chiang
Low-Power Way-Predicting Cache Using Valid-bit Pre-decision for Parallel Architectures 203H.-C. Chen and J.-S. Chiang
An Enhanced Parallel Loop Self-Scheduling Scheme for Cluster Environments 207C.-T. Yang, K.-W. Cheng, and K.-C. Li
On Construction of a Visualization Toolkit for MPI Parallel Programs in Cluster Environments 211K.-C. Li, H.-C. Chang, C.-T. Yang, L Sato, C.-Y. Yang, Y.-Y. Wu, M.-Y. Pel,H.-K. Liao, M.-C. Hsieh, andC.-W. Tsai
Implementation of Visuel MPI Parallel Program Performance Analysis Tool forCluster Environments 215
K.-C. Li, H.-C. Chang, C.-T. Yang, L-J. Chang, H.-Y. Cheng, andL-T. Lee
Dynamic Load Balance in Parallel Merge Sorting over Homogeneous Clusters 219A. De Giusti, M. Naiouf, F. Chichizola, and L. De Giusti
Technical Presentation 5
Session 110: Multimedia Transmission and Coding
A Call Admission Control Algorithm for Long-Lived and Short-Lived Streaming Media 225Y. -J. Lo and Z Tsai
Throughput Driven, Highly Available Streaming Stored Playback Video Service overa Peer-to-Peer Network 229
K. Kalapriya and S. Nandy
Scalefactor Based Bit Shift FGS Audio Coding : 235F.-C. Chen and T.-M. Chiu
A Dual Pyramid Watermarking for JPEG-2000 239Y.-C. Fan and H.-W. Tsao
Session 111: Authentication Scheme
A Remote Authentication Scheme Preserving User Anonymity 245H.-Y. Chien and C.-H. Chen
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication 249C.-Y. Lee, C.-H. Lin, and C.-C. Chang
An Image Authentication Scheme Considering Privacy - A First Step towardsSurveillance Camera Authentication 253
N. Kawaguchi, S. Veda, N. Obata, H. Shigeno, and K.-l. Okada
An Efficient Multi-server Password Authenticated Key Agreement Scheme UsingSmart Cards with Access Control 257
C.-C. Chang andJ.-Y. Kuo
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures 261C.-H. Huang, C.-Y. Lee, C.-H. Lin, C.-C. Chang, and K.-L. Chen
An Improved Scheme for Unilateral Asymmetric Smart Card Authentication 265L Dang, W. Kou, and Y. Xiao
Technical Presentation 6
Session 112: Web-Based Systems
A Web-Based Bookmark Tool with Ontological Approach for Knowledge Sharingof Special Interest Groups 271
D. Yang, W. Lee, and C.-Y. Tsai
Location-Based-Service Roaming Based on Web Services 277C.-T. WuandH.Mei
Performance Comparison of a Web Cache Simulation Framework 281L Cardenas, J. Gil, J. Domenech, J. Sahuquillo, and A. Pont
Privacy Preserving Web-Based Questionnaire 285J. Nakazato, K. Fujimoto, and H. Kikuchi
Using the ACM Technique to Refine Protein Spots in 2DGE Images 289J. Chen, T.-S. Chen, T.-H. Tsai, H.-F. Tsai, M. Hsieh, and S.-S. Tang
Session 113: Peer-to-Peer and Communication Networks
Using Peer-to-Peer Communication to Improve the Performance of DistributedComputing on the Internet 295
K. Tritrakan and V. Muangsin
Apply Incremental Classification for a P2P MOD System 299T.-C. Wang, T.-H. Chang, T.-H. Chen, and P. Wang
Support for Efficiently Processing Complex Queries over a P2P Substrate 303P. Furtado
MixCast: A New Group Communication Model in Large-Scale Network 307Y. Lin, B. Wang, and Z. Wang
An Interoperability Design Model: Lessons Learned in Computer Communication Standardization 311T. Yamakami
Periodic Contention-Free Multiple Access for Power Line Communication Networks 315Y.-J. Lin, H. Latchman, J. Liu, and R. Newman
Session 114: Performance Analysis and Optimization
Performance Issues of Grid Computing Based on Different Architecture ClusterComputing Platforms 321
H.-C. Chang, K.-C. Li, Y.-L Lin, C.-T. Yang, H.-H. Wang, and L-T. Lee
Optimizing the Access Performance and Data Freshness of Distributed CacheObjects Considering User Access Pattern 325
R. Samarasinghe, Y. Yasutake, and T. Yoshida
Improving TCP Performance during Soft Vertical Handoff 329H. Huang and J. Cai
A High-Performance Computational Resource Broker for Grid Computing Environments 333C.-T. Yang, P.-C. Shih, and K.-C. Li
Improving End-to-End Performance by Active Queue Management 337C.-F. Ku, S.-J. Chen, J.-M. Ho, andR.-I. Chang
An Efficient Dynamic Power Management Policy on Sensor Network 341R. Luo, L Tu, and O. Chen
Session 115: Bandwidth Allocation and Physical Layer
A DDRR-Based Scheduler to Achieve Proportional Delay Differentiation in Terabit Network 347C.-C. Wu, H.-M. Wu, C.-L. Liu, and W. Lin
An Algorithm for Discovering Physical Topology in Single Subnet IP Networks 351Y. Li, C. Pei, C. Zhu, andJ. Li
Evaluation and Analysis of the Sliding-Window Parallel Packet Switch 355C.-L Liu, W. Lin, and C.-C. Wu
3D-V0Q Switch Design and Evaluation 359D.-J. Tsaur, X.-Y. Lu, C.-C. Wu, and W. Lin
On-Demand Routing for Bluetooth Scatternets Subject to Device Mobility 363C.-H. Yang and J.-W. Ruan
Progressive Multilayer Reconfiguration for Software DSM Systems inNon-dedicated Clusters 367
J.-B. Chang, T.-Y. Liang, andC.-K. Shieh
Technical Presentation 7
Session 116: Virtual World Communication and Video Object Detection
A New Scheduling Algorithm: Jumping Virtual Clock 373L-C. Hwang, S.-Y. Wang, S. Hsu, and Y.-H. Huang
A Message Interchange Protocol Based on Routing Information Protocol in aVirtual World 377
J.-F. Chen, W.-C. Lin, H.-S. Bai, and S.-Y. Dai
Vision Based Adaptive Traffic Signal Control System Development 385L. Deng, N. Tang, D.-L Lee, C. Wang, andM. Lu
Multiple License Plate Detection for Complex Background 389C.-T. Hsieh, Y.-S. Juan, and K.-M. Hung
Session 117: Cryptographic and Security
A Technical Comparison of IPSec and SSL 395A. Alshamsi and T. Saito
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions 399C.-H. Lin, W. Lee, and Y.-K. Ho
A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms 403L Ping and L. Yaping
Development of Security Scanner with High Portability and Usability 407M. Yoshimoto, B. Bista, and T. Takata
Delegation Depth Control in Trust-Management System 411F. Hong, X. Zhu, andS. Wang
Session 118: Grid and Distributed Computing
Automation of Grid Service Code Generation with AndroMDA for GT3 417S. Mizuta and R. Huang
Decision Tree Construction for Data Mining on Grid Computing Environments 421C.-T. Yang, S.-T. Tsai, and K.-C. Li
Theoretical Consideration of Adaptive Fault Tolerance Architecture for OpenDistributed Object-Oriented Computing 425
R. Lanka, K. Oda, and T. Yoshida
Distribution of Data and Remote Invocation of Programs 429T. Muldner, Z. Luo, and E. Shakshuki
Combining Applications and Databases Integration Approaches in a CommonDistributed Genomic Platform 433
P.-E. Gros, J. Herisson, N. Ferey, and R. Gherbi
A Practical Modelling Notation for Secure Distributed Computation 439Y.-J. Lee and P. Henderson
Session 119: Information Networking and Applications I
A Temporal Order Resolution Algorithm in the Multi-server Time Stamp Service Framework 445P.-Y. Ting
A TCP-Physical Cross-Layer Congestion Control Mechanism for the MultirateWCDMA System Using Explicit Rate Change Notification 449
L-C. Wang and C.-H. Lee
Symbol Error Probability for Rectangular M-QAM OFDM Transmission overRayleigh Fading Channels 453
R. Yen and H.-Y. Liu
An Approximation Solution for the 2-Median Problem on Two-Dimensional Meshes 457S. Tse and F. Lau
Two New Approaches for Orphan Detection 461M. Jahanshahi, K. Mostafavi, M. Kordafshari, M. Gholipour, and A. Haghighat
Session 120: Information Networking and Applications II
A Parallel Tabu Search Approach Based on Genetic Crossover Operation 467Y. He, Y. Qiu, G. Liu, and K. Lei
Sparse Equation Systems in Heterogeneous Clusters of Computers 471F. Tinetti, W. Aroztegui, and A. Quijano
A Memory-Efficient Huffman Decoding Algorithm 475P.-C. Wang, Y.-R. Yang, C.-L Lee, and H.-Y. Chang
Fast Calculation Algorithm of the Undetected Errors Probability of CRC Codes 480R.-D. Lin and W.-S. Chen
Service-Oriented Workflow Model 484Y. Jin, Z. Wu, S. Deng, and Z. Yu
Session 121: Information Networking and Applications III
Resequencing Schemes for Selective-Repeat ARQ and Their Performance 491T. Shikama and T. Mizuno
A Method of Inverse Filter Design Based on Cepstrum Measure 495C.-Y. Gu, H.-F. Yi, K.-C. Yi, andL.-J. Jin
A New Design for Efficient t-out-n Oblivious Transfer Scheme 499H.-F. Huang and C.-C. Chang
A Tree-Structured Persistence Server for Data Management of Collaborative Applications 503C.-M. Wang, H.-M. Chen, G.-C. Lee, 5.-7". Wang, andS.-F. Hong
Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR 507C.-W. Jeon, l.-G. Kim, and J.-Y. Choi
A Hierarchical and Multi-model Based Algorithm for Lead Detection and NewsProgram Narrative Parsing 511
J.-H. Kuo, J.-B. Kuo, H.-W. Chen, and J.-L Wu
The First International Workshop onUbiquitous Smart Worlds (USW'05)
Technical Presentation 1
Session U01: Smart Molecular Networks and Ubiquitous Media
Molecular Metal Wires and Molecular Switches 519S.-M. Peng
Advanced Ubiquitous Media for Creative Cyberspace 520J.-F. Wang
Technical Presentation 2
Session U02: Smart Object and Information Processing
A Study of Information Services Based on Personal Belongings 523N. Shimizu, R. Yagiu, and M. Saito
Smart Retrieval and Sharing of Information Resources Based on Contexts ofUser-Information Relationships 529
W.-K. Wing, F. Lau, and C.-L Wang
Modeling the Query Intention with Goals 535C.-H. Lee and A. Liu
Human Readable Genetic Rules for Scene Boundary Detection 541M. Parmar and M. Angelides
Design Smart NNTrees Based on the /?4-Rule 547Q. Zhao
Minimizing Memory Utilization of Task Sets in SmartOSEK 552W. Chen, Z. Wu, andX. Wang
Session U03: Smart Environment and System
Reconfigurable Context-Sensitive Bio-Bridge Middleware for Smart Bio-laboratories 561W.-K. For, X. Bao, W.-S. Gan, and S.-K. Ng
A Personalized Ubiquitous Education Support Environment by Comparing LearningInstructional Requirement with Learner's Behavior 567
Z. Cheng, S. Sun, M. Kansen, T. Huang, and A. He
Smart Hyperspaces and Project Ubikids 574J. Ma, B. Apduhan, and L. Yang
The Non-specific Intelligent Guided-View System Based on RFID Technology 580H.-P. Chao
Pseudo-surface Based Network Camera Smart Control 586A. He, Z. Cheng, T. Huang, and Y. Zhao
Adaptive Policy Trigger Mechanism for OBSS 591D. Feng, L. Zeng, F. Wang, L Qin, and Q. Liu
Technical Presentation 3
Session U04: Smart Networking and Protocol
Sensor Inter-vehicle Communication for Safer Highways 599M. Durresi, A. Durresi, and L. Barolli
An Architecture of Network Imprinting for Personal but Wide Area Applications 605T. Yokoyama, K. lida, and S. Yamaguchi
Identity Location Decoupling in Pervasive Computing Networks 6105. Herborn, R. Boreli, and A. Seneviratne
Improvement to the Anticollision Protocol Specification for 900MHz Class 0Radio Frequency Identification Tag 616
M. Nanjundaiah and V. Chaudhary
Grouping Proof for RFID Tags 621J. Saito and K. Sakurai
A Scalable Group Communication Protocol with Global Clock 625S. Kawanami, T. Nishimura, T. Enokido, and M. Takizawa
Session U05: Smart Service Sociality and Privacy
Using Privacy Policies to Protect Privacy in UBICOMP 633G. Yee
A Framework of Social Interaction Support for Ubiquitous Learning 639G. Zhang, Q. Jin, and M. Lin
A Scheme for Testing Privacy State in Pervasive Sensor Networks 644Y. Sang and H. Shen
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for PreservingPrivacy and Authenticity in the Ubiquitous World 649
X. Huang, W. Susilo, Y. Mu, and F. Zhang
Trends and Issues for Security of Home-Network Based on Power Line Communication 655R. Nishi, H. Morioka, and K. Sakurai
Personal Firewall for Pocket PC 2003: Design & Implementation 661W. Susilo, R. Ang, C. McDonald, and J. Huang
The 2005 International Workshop onWeb and Mobile Information Systems (WAMIS'05)
Technical Presentation 4
Session W01: Web and Mobile Information Systems I
The Categorisation of Hidden Web Databases through Concept Specificity and Coverage 671Y.-L Hedley, M. Younas, and A. James
Performance Analysis Mobility Management in Heterogeneous Wireless Networks 677/. Awan, Y. Li, and D. Kouvatsos
The Design of a Secure and Pervasive Multimodal Web System 683S. Chang
Improving Query Answering in Peer-to-Peer Data Searching 689A. Al-Namiy and F. Majeed
Preserving Composition in XML Object Relational Storage 695E. Pardede, J. Rahayu, and D. Taniar
ISWIVE: An Integrated Semantic Web Interactive Visualization Environment 701l.-X. Chen, C.-L Fan, PH. Lo, L.-C. Kuo, and C.-Z. Yang
Session W02: Web and Mobile Information Systems II
Semantic Web Technologies for Context-Aware Museum Tour Guide Applications 709S.-C. Chou, W.-T. Hsieh, F. Gandon, and N. Sadeh
Extending UDDI with Recommendations: An Association Analysis Approach 715A. Powles and S. Krishnaswamy
Fuzzy Matchmaking for Web Services 721K.-M. Chao, M. Younas, C.-C. Lo, and T.-H. Tan
Web-Page Adaptation Framework for PC & Mobile Device Collaboration 727H. Chua, S. Scott, Y. Choi, and P. Blanchfield
Extracting Social Knowledge in the Intelligent Conversational Channel for Agent Communication 733S. Mustapha
Agent-Mediated e-Commerce System 739E. Shakshuki and S. Abu-Draz
Session W03: Web and Mobile Information Systems III
iHITS: Extending HITS for Personal Interests Profiling 747Z Zhuang
Developing Innovative Web Information Systems through the Use of Web DataExtraction Technology 752
Y. NorAdnan, P. Goh, and W. Chan
A 2-Dimensional Evolution Model of Value-Added Mobile Internet Services 758T. Yamakami
Mining Sequential Mobile Access Patterns Efficiently in Mobile Web Systems 762V. Tseng and K. Lin
Agent Frameworks inFCVW 768E. Shakshuki, I. Tomek, and O. Prabhu
An Architecture for Automated QoS Resolution in Wireless Systems 774B. Bordbar and R. Anane
The 2005 International Workshop onIPv6 Technology and Deployment (IPv6'05)
Technical Presentation 4
Session P01: IPv6 Technology and Deployment I
Deploying Secure Cryptographic Services in Multi-domain IPv6 Networks 785G. Lopez-Milldn, F. Garcia Clemente, M. Gil Perez, G. Martinez Perez,and A. Gomez Skarmeta
Binding Updates for Mobile Networks by Using Multicast Mechanism in IPv6 Environment 790Y.-W. Chen and J.-M. Shih
An IPv6 Enabled Packet Engine Design for Home/SOHO Routers 796M. Liu, C.-H. Hsu, S.-H. Kuo, and H.-C. Tsai
No Administration Protocol (NAP) for IPv6 Router Auto-Configuration 801G. Chelius, E. Fleury, and L Toutain
Global Connectivity for Mobile IPv6-Based Ad Hoc Networks 807C.-Y. Wang, C.-Y. Li, R.-H. Hwang, and Y.-S. Chen
Tunneling IPv6 through NAT with Teredo Mechanism 813S.-M. Huang, Q. Wu, and Y.-B. Lin
Development of IPv6-IPv4 Translation Mechanisms for SIP-Based VoIP Applications 819W.-E. Chen, C.-Y. Su, and J.-H. Weng
Session P02: IPv6 Technology and Deployment II
Design of an IPv6 SOHO Router Based on Embedded Linux System 827J.-M. Hsu, C.-F. Hsu, and C.-M. Huang
Design, Implementation and Evaluation of Routing Protocols for IPv6 Anycast Communication 833S. Doi, S. Ata, H. Kitamura, and M. Murata
Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SM 8395. Matsunaga, S. Ata, H. Kitamura, and M. Murata
The Development of Global IPv6 Products: An Exploration 845S.-F. Tseng, H.-C. Lee, T.-C. Kung, S.-L Chou, andJ.-Y. Chen
Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios 851R. Marin Lopez, G. Martinez Perez, and A. Gomez Skarmeta
A Dual (IP4/IPv6) "Durable Storage" Commercial Service 856E. Jacob, J. Jose Unzilla, V. Higuero, P. Saiz, M. Aguado, and C. Pinedo
Author Index 863