Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 4, Issue 6 - Dec 2003
Volume 4, Issue 5 - Oct 2003
Volume 4, Issue 4 - Aug 2003
Volume 4, Issue 3 - Jun 2003
Volume 4, Issue 2 - Apr 2003
Volume 4, Issue 1 - Feb 2003
Selecting the target year
A Study on System for Reusing of Wireless Internet Contents
Kim Jeong-Hoon ;
Journal of Internet Computing and Services, volume 4, issue 1, 2003, Pages 1~8
Nowadays, various wireless internet contents are serviced in a cellular phone. However, because of the memory limit of the cellular phone, you should delete the wireless internet contents periodically. Also it has been quite inconvenient to move the existing data to a new cellular phone. In this paper I proposed MobileFolder to reuse wireless internet contents and provided a simple client application in a VM environment.
Mobile Advertisement Server System For Efficient Contents Generating
Kim Jeong-Hoon ;
Journal of Internet Computing and Services, volume 4, issue 1, 2003, Pages 9~17
Since cellular phone has come into wide use, the mobile advertisement has been considered as a new type of advertisement. In this paper, I proposed the system to make Images in various format so that users can make advertisement contents more easily. Also 1 proposed the advertisement on the VM application which can be connected to the sewer via wireless network.
A Study on the Localized Key Management Using AAA in Mobile IPv6
Kim Mi-Young ; Mun Young-Song ;
Journal of Internet Computing and Services, volume 4, issue 1, 2003, Pages 19~25
Mobile IPv6 services exposes its vulnerability when a mobile node is roaming across the subnets which belongs to the different domains. The AAA Infrastructure Is strongly recommended when the ISPs need to authenticate the mobile user come from the different domains. In addition to the basic requirements for AAA service, the authentication latency and AAA message overhead should be minimized for contiguity of the service. This paper considers the roaming service with AAA infra structure in Mobile IPv6 and proposes the key distribution method to authenticate the mobile node with secure manner by reducing and optimizing the exchanged messages for AAA entities.
Development of a Web Service Generation System Using Virtual Environments
Park Chang-Keun ; Lee Myeong Won ;
Journal of Internet Computing and Services, volume 4, issue 1, 2003, Pages 27~37
This paper presents the Web service generation system using virtual environments and databases. Main features include that the environments and databases are generated and maintained correspondingly. It means that the virtual environments are changed automatically if the databases are updated, and also that the databases are maintained accordingly as the information about the environments are modified at the scene End users can modify the property of the virtual environments in the scene directly using the VRML edit interface, which visualizes the structures of virtual environments. Each object can be accessed through the VRML editor, its property be modified directly, and the information is updated in the database automatically. Web service pages are maintained accordingly. In addition, we define a texture mapping method based on weighted view interpolation using 2 photo images for a scene. A texture mapping interface Is also provided for end users to generate realistic images themselves.
Design of Quality Evaluation Criteria for Component Software
Yoo Ji-Hyun ; Lee Byongl-Gul ;
Journal of Internet Computing and Services, volume 4, issue 1, 2003, Pages 39~52
As software is developed for many applications and software defects have caused serious problem sin those applications, the concern of software quality evaluation increases rapidly. Although there has been many efforts for establishing standards for software evaluation, such as ISO/IEC 9126, they provide only a framework for defining quality characteristics and evaluation process. They, however, do not provide practical guidances for deriving resonable weight value criteria for software evaluation. This paper presents a method to draw quantitative weight values from evaluator's subjective data in the process of software evaluation as observing the ISO/IEC 9126 standard. To eliminate the evaluators' subjectiveness and the uncertainty of weight value during evaluation, the Dempster-Shafer (D-S) theory is adopted and utilized. In this paper, the D-S theory is supplemented with an improved merge rule to reduce the bias of weight value when they are merged with other evaluator's weight value. The proposed merge rule has been tested and proved with actual evaluation data.
Design and Implementation of a Performance Monitoring and Configuration Management Tool for SANtopia
Rim Kee-Wook ; Na Yong-Hi ; Min Byoung-Joon ; Seo Dea-Wha ; Shin Bum-Joo ;
Journal of Internet Computing and Services, volume 4, issue 1, 2003, Pages 53~65
I/O processing speed of relatively sluggish storage devices incurs overall performance degradation in computer systems. As a solution to improve the situation, SAN(Storage Area Network) has been proposed. In order to utilize a SAN system more effectively, where storage devices are directly connected with a high speed network such as Fibre Channel, a proper management tool is needed. In this paper, we present a design and implementation of a performance monitoring and configuration management tool for the SANtopia system which supports global file sharing in the SAN environment The developed tool is to monitor the performance of the Linux hosts composing the SANtopia system and to manage the configuration of the hosts and storage devices. It also supports GUI(Graphic User Interface) environment using the JAVA programming language.
An Approach to Composite Techniques and Application of EJB Component using Adapter Pattern
Jeong Hwa-Young ;
Journal of Internet Computing and Services, volume 4, issue 1, 2003, Pages 67~74
According to change of software development technique as design pattern, component based development etc.., web server development part is applied activity to fit in various user requirement. Especially, EJB as sewer side component model much researches and introduce by easy and various development support. Also, component composing techniques is receiving many interests by easy and efficient application way that architecture based C2 style architecture with message handling. But, in case of EJB component that can not cail thread, C2 framework modification is unavoidable for component composition by C2 style architeccture. For this, we propose techniques to use Adapter pattern to be one of structure pattern among pattern. That is, did so that component composition by C2 style architecture may can consist changing to be able to call thread function in EJB by Adapter pattern.
A Role-Based Access Control Model of Managed Objects in Distributed System Environments
Choi Eun-Bok ;
Journal of Internet Computing and Services, volume 4, issue 1, 2003, Pages 75~86
In this paper, we extended hierarchial structure of managed object class to support Role-Based Access Control, and described constraint conditions that have support dynamic temporal function as well as statical temporal function established by management process. And we defined about violation notifications should report to manager when rules violate constraint conditions. Also we presented system architecture that support RBAC with MIB(Management Information Base) of ITU-T recommendation. By access control enforcement and decision function, constraint conditions and activated translation procedure of each roles are described, our system presents dynamic temporal property systematically.