Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2008
Issue and solution on coverage and performance for wireless sensor networks
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 131–137https://doi.org/10.1145/1503370.1503401To reduce energy consumption and extend lifetime is concernful in wireless sensor networks (WSNs). Besides, WSNs need to maintain coverage quality to capture the timely changed targets. A broad strategy is to select some sensors as working nodes to ...
- research-articleNovember 2008
Route optimization in nested mobile networks using binding update for top-level MR
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 123–130https://doi.org/10.1145/1503370.1503400Network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended of Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing the mobility of an entire network, it provides for ...
- research-articleNovember 2008
SCTPfx: a fast failover mechanism based on cross-layer architecture in SCTP multihoming
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 113–122https://doi.org/10.1145/1503370.1503399This paper proposes SCTPfx, a fast failover mechanism in SCTP multihoming. For data communication, SCTP uses a single path among multiple available paths in an association. This path is called the primary path. If the primary path fails, failover ...
- research-articleNovember 2008
Opportunistic DTN routing with window-aware adaptive replication
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 103–112https://doi.org/10.1145/1503370.1503397This paper presents ORWAR, a resource-efficient protocol for opportunistic routing in delay-tolerant networks. Our approach exploits the context of mobile nodes (speed, direction of movement and radio range) to estimate the size of a contact window. ...
- research-articleNovember 2008
Mobility entropy and message routing in community-structured delay tolerant networks
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 93–102https://doi.org/10.1145/1503370.1503396Many message routing schemes have been proposed in the context of delay tolerant networks (DTN) and intermittently connected mobile networks (ICMN). Those routing schemes are tested on specific environments that involve particular mobility complexity ...
- research-articleNovember 2008
An energy-efficient data dissemination method in a cluster-based sensor network
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 85–92https://doi.org/10.1145/1503370.1503394One of the most important considerations in designing sensor nodes in a wireless sensor network is to extend the network lifetime by minimizing the energy consumption with limited resources. The most challenging aspects of the studies conducted on this ...
- research-articleNovember 2008
Bittorrent peer identification based on behaviors of a choke algorithm
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 65–74https://doi.org/10.1145/1503370.1503392Bittorrent is currently one of the most popular peer-to-peer (P2P) file sharing protocols. However, it incurs such excessive amount of traffic that it may adversely affect users of legacy internet applications. To limit this adverse impact, an efficient ...
- research-articleNovember 2008
Beyond device mobility
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 63–64https://doi.org/10.1145/1503370.1503390Users, application services, single files and files collections, computers, detachable memory, distributed network storage -- this is far from being the comprehensive list of thinkable today networked objects. More importantly, all of these objects can ...
- research-articleNovember 2008
Network calculus: what it can do for you and where it needs your help
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 57–58https://doi.org/10.1145/1503370.1503387In this talk, the theory of network calculus is discussed from the point of view: (1) how powerful it is in applications as well as (2) what fundamental challenges it still faces before it can be considered a similarly mature theory as the well-known ...
- research-articleNovember 2008
A novel infrastructure WLAN locating method based on neural network
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 47–55https://doi.org/10.1145/1503370.1503385Comparing to the client based locating, infrastructure based methods do not require install special software or hardware at client side. So it not only fits for real deployment, but also supports some specific requirement (ex target tracking). Former ...
- research-articleNovember 2008
A greedy location management scheme using predictive dynamic reservation into dynamic set method
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 41–45https://doi.org/10.1145/1503370.1503384Integration of WLAN hotspots into next generation cellular networks requires considerations on location management, resource allocation, handoff algorithms and their sensitivity to mobility related features such as velocity of the mobile and the handoff ...
- research-articleNovember 2008
DUMBO II: a V-2-I emergency network
- Kanchana Kanchanasut,
- Thirapon Wongsaardsakul,
- Manutsiri Chansutthirangkool,
- Anis Laouiti,
- Hajime Tazaki,
- Khandakar Rashedul Arefin
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 37–38https://doi.org/10.1145/1503370.1503380Project DUMBO (Digital Ubiquitous Mobile Broadband OLSR) deploys Mobile Ad Hoc Network (MANET) for post- disaster situations where fixed network infrastructure is unavailable; an emergency network has to be put in place urgently. DUMBO allows streaming ...
- research-articleNovember 2008
Educational environment on StarBED: case study of SOI Asia 2008 Spring Global E-Workshop
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 27–36https://doi.org/10.1145/1503370.1503378Hands-on experiences are indispensable to train IT operators. However, it is often difficult to conduct hands-on practices in many locations due to lack of resources such as PCs and network equipments. The cost of gathering lecturers and participants at ...
- research-articleNovember 2008
An image processing approach to traffic anomaly detection
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 17–26https://doi.org/10.1145/1503370.1503377This paper discusses the possibility of applying an image-processing technique to detecting anomalies in Internet traffic, which is different from traditional techniques of detecting anomalies. We first demonstrate that anomalous packet behavior in ...
- research-articleNovember 2008
On inferring regional AS topologies
AINTEC '08: Proceedings of the 4th Asian Conference on Internet EngineeringPages 9–16https://doi.org/10.1145/1503370.1503376Analysis of AS-level topologies is an effective way to understand the Internet structure and its development. An AS topology represents logical connection relationships of networks, and thus, is independent of geographic locations of connections. ...