default search action
24th AINA 2010: Perth, Australia
- 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4018-4
Keynote Speeches
- Lyn Beazley:
The Crucial Role of Information Communication Technology in Western Australia. 1 - Michael L. Brodie:
Data Integration at Scale: From Relational Data Integration to Information Ecosystems. 2-3 - Bogdan M. Wilamowski:
Design of Network Based Software. 4-10 - Ian H. White, Michael J. Crisp, Richard V. Penty:
A Photonics Based Intelligent Airport Surveillance and Tracking System. 11-16 - A Min Tjoa:
Next Decade of Social, Economical and Ethical Challenges. 17-18 - Hai Zhuge:
Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical Society. 19-26 - Tharam S. Dillon, Chen Wu, Elizabeth Chang:
Cloud Computing: Issues and Challenges. 27-33 - Kwei-Jay Lin, Joe Zou, Yan Wang:
Accountability Computing for E-society. 34-41
Performance Modelling and Evaluation 1
- Rasha Osman, Irfan-Ullah Awan, Michael E. Woodward:
Performance Evaluation of Database Designs. 42-49 - Amina Al-Sawaai, Irfan-Ullah Awan, Rod J. Fretwell:
Performance of Weighted Fair Queuing System with Multi-class Jobs. 50-57 - Luciana Arantes, Maria Gradinariu Potop-Butucaru, Pierre Sens, Mathieu Valero:
Enhanced DR-Tree for Low Latency Filtering in Publish/Subscribe Systems. 58-65 - Lee Booi Lim, Lin Guan, Alan Grigg, Iain W. Phillips, Xingang Wang, Irfan-Ullah Awan:
RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival Proccess. 66-73
Performance Modelling and Evaluation 2
- Hanliu Chen, Oliver W. W. Yang, Yang Hong:
Performance Analysis of VCP Controller on DCCP Traffic. 74-81 - Pavan Roy Marupally, Vamsi Paruchuri:
Comparative Analysis and Evaluation of Botnet Command and Control Models. 82-89 - Glêdson Elias da Silveira, Mateus Novaes, Gustavo Cavalcanti, Daniel Porto:
Simulation-Based Performance Evaluation of the SNDP Protocol for Infrastructure WMNs. 90-97
Routing and Broadcast Mechanism
- Luobei Kuang, Ming Xu, Zhijun Wang:
An Adaptive Routing Protocol for Bus Networks. 98-104 - Arjan Durresi, Vamsi Paruchuri, Leonard Barolli:
Adaptive Clustering Protocol for Wireless Networks. 105-111 - Ting-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen:
PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network. 112-119 - Jaipal Singh:
Multicast QoS Routing Using Collaborative Path Exploration. 120-125
Distributed and Parallel Systems 1
- Rodrigue Chakode, Jean-François Méhaut, Francois Charlet:
High Performance Computing on Demand: Sharing and Mutualization of Clusters. 126-133 - Yuji Nakamura, Minoru Uehara:
An Implementation of NaryRAID. 134-141 - Tomoya Enokido, Kota Suzuki, Ailixier Aikebaier, Makoto Takizawa:
Algorithms for Reducing the Total Power Consumption in Data Communication-Based Applications. 142-149 - Mohammed Goryawala, Magno R. Guillen, Ruchir N. Bhatt, Anthony J. McGoron, Malek Adjouadi:
A Comparative Study on the Performance of the Parallel and Distributing Computing Operation in MatLab. 150-157
Distributed and Parallel Systems 2
- Chonglei Mei, Hai Jiang, Jeff Jenness:
Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data Assignments. 158-165 - Leonardo Mostarda, Srdjan Marinovic, Naranker Dulay:
Distributed Orchestration of Pervasive Services. 166-173 - Haibiao Chen, Beihong Jin, Fengliang Qi:
Integrating Load Balancing into Channelization Strategy in Publish/Subscribe. 174-181 - Feng Cheng, Thanh-Dien Tran, Sebastian Roschke, Christoph Meinel:
A Specialized Tool for Simulating Lock-Keeper Data Transfer. 182-189
Distributed and Parallel Systems 3
- Reza Holakouei, Adão Silva, Atílio Gameiro:
Transmit Power Allocation for Precoded Distributed MIMO OFDM Systems. 190-197 - Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern, Jianhua Yang:
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. 198-205 - François Bonnet, Michel Raynal:
Consensus in Anonymous Distributed Systems: Is There a Weakest Failure Detector?. 206-213 - Pedro T. Isaías, Cristiane Casaca, Sara Pífano:
Recommender Systems for Human Resources Task Assignment. 214-221
Service Oriented Architecture
- Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajkumar Buyya:
Minimizing Execution Costs when Using Globally Distributed Cloud Services. 222-229 - Lizhe Wang, Gregor von Laszewski, Marcel Kunze, Jie Tao:
Schedule Distributed Virtual Machines in a Service Oriented Environment. 230-236 - Youakim Badr, Guy Caplat:
Software-as-a-Service and Versionology: Towards Innovative Service Differentiation. 237-243 - Jian Yu, Quan Z. Sheng, Paolo Falcarin:
A Visual Semantic Service Browser Supporting User-Centric Service Composition. 244-251
Communication Technology and Protocols 1
- Walter Wong, Marcus Vinícius Lahr Giraldi, Maurício F. Magalhães, Fábio Luciano Verdi:
An Identifier-Based Architecture for Native Vertical Handover Support. 252-259 - Kazuya Odagiri, Shogo Shimizu, Rihito Yaegashi, Masaharu Takizawa, Naohiro Ishii:
DACS System's Implementation Method to Realize the Next Generation Policy-Based Network Management Scheme. 260-267 - Isamu Tsuneizumi, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
A Scalable Peer-to-Peer Group Communication Protocol. 268-275 - Martin Bateman, Saleem N. Bhatti:
TCP Testing: How Well Does ns2 Match Reality?. 276-284
Communication Technology and Protocols 2
- Jeongkeun Lee, Puneet Sharma, Jean Tourrilhes, Rick McGeer, Jack Brassil, Andy C. Bavier:
Network Integrated Transparent TCP Accelerator. 285-292 - Jueping Cai, Zheng Liu, Ming Du, Zan Li, Lei Yao:
Integrated Modeling, Generation and Optimization for Packet based NoC Topology. 293-298 - Khalid A. Darabkh, Backer N. Abu-Jaradeh:
Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. 299-303 - Ruen Chze Loh, Sieteng Soh, Mihai M. Lazarescu:
Maximizing Bandwidth Using Disjoint Paths. 304-311
Communication Technology and Protocols 3
- Thomas Dreibholz, Martin Becke, Jobin Pulinthanath, Erwin P. Rathgeb:
Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer. 312-319 - Changwoo Lee, Wonjun Lee:
Exploiting Spectrum Usage Patterns for Efficient Spectrum Management in Cognitive Radio Networks. 320-327 - Johannes Ulrich Herrmann:
Improving Reliability Calculation with Augmented Binary Decision Diagrams. 328-333 - Ye Huang, Amos Brocco, Nik Bessis, Pierre Kuonen, Béat Hirsbrunner:
Community-Aware Scheduling Protocol for Grids. 334-341
Autonomic and Advanced Network Systems 1
- Tarem Ahmed:
Flow Vector Prediction in Large IP Networks. 342-349 - Nidhal Kamel Taha El-Omari, Mohamad Hisham Alzaghal:
Utilizing WiMAX as a Public Safety Network in Jordan. 350-355 - Zheng Liu, Jueping Cai, Ming Du, Lei Yao, Zan Li:
Hybrid Communication Reconfigurable Network on Chip for MPSoC. 356-361 - Boyoung Rhee, Sunyoung Han:
An Overlay Multicast that Supports a Distinguished QoS Based on Service Levels and User Environments in the Next Generation Network. 362-368
Autonomic and Advanced Network Systems 2
- Satya Krishna Pindiproli, Kishore Kothapalli:
The Power of Orientation in Symmetry-Breaking. 369-376 - Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara:
A PCA Analysis of Daily Unwanted Traffic. 377-384 - Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su:
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS. 385-391 - Nashid Shahriar, Syed Ashker Ibne Mujib, Arup Raton Roy, Ashikur Rahman:
Iterative Route Discovery in AODV. 392-399
Internet Computing and Applications 1
- Suraj Pandey, Linlin Wu, Siddeswara Mayura Guru, Rajkumar Buyya:
A Particle Swarm Optimization-Based Heuristic for Scheduling Workflow Applications in Cloud Computing Environments. 400-407 - Patricia Takako Endo, Djamel Fawzi Hadj Sadok:
Whois Based Geolocation: A Strategy to Geolocate Internet Hosts. 408-413 - Krzysztof Sledziewski, Behzad Bordbar, Rachid Anane:
A DSL-Based Approach to Software Development and Deployment on Cloud. 414-421 - Mohammed Jubaer Arif, Shanika Karunasekera, Santosh Kulkarni, Ajith Gunatilaka, Branko Ristic:
Internet Host Geolocation Using Maximum Likelihood Estimation Technique. 422-429
Internet Computing and Applications 2
- Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigaki:
CAPTCHA Using Strangeness in Machine Translation. 430-437 - Masayuki Fukumitsu, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. 438-445 - Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Rajkumar Buyya:
CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications. 446-452 - Justus Bross, Matthias Quasthoff, Philipp Berger, Patrick Hennig, Christoph Meinel:
Mapping the Blogosphere with RSS-Feeds. 453-460
Ad Hoc and Sensor Networks 1
- Xue Xin, Xiaohui Li, Yongqiang Hei, Weiyi Yin, Guanghui Yu:
A Modified QRD-M Algorithm Based on Layer Branch Pruning for MIMO Systems. 461-464 - Fatos Xhafa, Christian Sánchez, Leonard Barolli:
Genetic Algorithms for Efficient Placement of Router Nodes in Wireless Mesh Networks. 465-472 - Ranjan Panda, Damith Chinthana Ranasinghe, Ajith Kumar Parlikad, Duncan C. McFarlane:
A Condition Monitoring Platform Using COTS Wireless Sensor Networks: Lessons and Experience. 473-480 - Kwan-Wu Chin, Sieteng Soh, Chen Meng:
A Novel Spatial TDMA Scheduler for Concurrent Transmit/Receive Wireless Mesh Networks. 481-488
Ad Hoc and Sensor Networks 2
- Keyvan Kashkouli Nejad, Xiaohong Jiang, Jianhua Ma:
Probabilistic Proactive Routing with Active Route Trace-Back for Highly Mobile Ad Hoc Networks. 489-494 - Makoto Ikeda, Masahiro Hiyama, Leonard Barolli, Fatos Xhafa, Arjan Durresi, Makoto Takizawa:
Mobility Effects of Wireless Multi-hop Networks in Indoor Scenarios. 495-502 - Yves Mahéo, Romeo Said:
Service Invocation over Content-Based Communication in Disconnected Mobile Ad Hoc Networks. 503-510 - Bezawada Bruhadeshwar, Kishore Kothapalli, Indira Radhika Pulla:
A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks. 511-518
Ad Hoc and Sensor Networks 3
- Nobutoshi Abe, Yusuke Arai, Michiko Nishiyama, Norihiko Shinomiya, Kazuhiro Watanabe, Yoshimi Teshigawara:
A Study on Sensor Multiplicity in Optical Fiber Sensor Networks. 519-525 - Subrata Saha, Syed Rafiul Hussain, Ashikur Rahman:
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks. 526-532 - Michael A. Osborne, Roman Garnett, Stephen J. Roberts:
Active Data Selection for Sensor Networks with Faults and Changepoints. 533-540 - Stepan Ivanov, Dmitri Botvich, Sasitharan Balasubramaniam:
Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks. 541-547 - Takahiro Hara, Sanjay Kumar Madria, Shojiro Nishio:
Investigating Impact of Quorum Construction on Data Processing in Mobile Ad Hoc Networks. 548-555
Privacy and Trust Management
- Tran Hong Ngoc, Isao Echizen, Komei Kamiyama, Hiroshi Yoshiura:
New Approach to Quantification of Privacy on Social Network Sites. 556-564 - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Trustworthiness among Peer Processes in Distributed Agreement Protocol. 565-572 - Minako Tada, Hiroaki Kikuchi, Sutheera Puntheeranurak:
Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items. 573-578 - Sazia Parvin, Song Han, Li Gao, Farookh Khadeer Hussain, Elizabeth Chang:
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks. 579-583
Mobile Networks and Applications 1
- Wei Liu, Zhoujun Li:
A Tree Graph Model Based on Mobile Environment. 584-591 - Ryozo Kiyohara, Satoshi Mii:
BPE Acceleration Technique for S/W Update for Mobile Phones. 592-599 - Houda Labiod, Nedal Ababneh, Miguel Garcia de la Fuente:
An Efficient Scalable Trajectory Based Forwarding Scheme for VANETs. 600-606 - Chung-Ming Huang, Chia-Ching Yang, Chun-Ming Hu:
An Efficient Telematics Service Discovery Scheme over the Centralized Vehicular Peer-to-Peer (C-VP2P) Telematics Service Platform. 607-613
Mobile Networks and Applications 2
- Chung-Ming Huang, Ming-Sian Lin, Wen-Yao Chang:
A Novel Cache Management Using Geographically Partial Matching for Location-Based Services. 614-619 - Waskitho Wibisono, Arkady B. Zaslavsky, Sea Ling:
CoMiHoC: A Middleware Framework for Context Management in MANET Environment. 620-627 - Hoon Choi, Sanghyun Son, Jamje Kim, Yunju Baek:
RF-Based Indoor Locating System for NLOS Environment. 628-633
Mobile Networks and Applications 3
- Anas Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Mahmoud, Elhadi M. Shakshuki, Hussein T. Mouftah:
AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. 634-640
Mobile Networks and Applications 4
- Mohamed Alnas, Irfan-Ullah Awan, D. R. W. Holton:
A Cross-Layer Decision for Mobile IP Handover. 641-646 - Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han:
A Novel Cross Layer Intrusion Detection System in MANET. 647-654 - Li Gao, Elizabeth Chang, Sazia Parvin, Song Han, Tharam S. Dillon:
A Secure Key Management Model for Wireless Mesh Networks. 655-660
Multimedia Systems and Applications
- Salvatore Vitabile, Alessandra De Paola, Filippo Sorbello:
Bright Pupil Detection in an Embedded, Real-Time Drowsiness Monitoring System. 661-668 - Byung-Seok Kang, Kwangcheol Shin, In-Young Ko, Pyoung-Yun Kim:
A Transport Protocol for Multimedia Transmission in Overlay Networks. 669-674 - Naixue Xiong, Shuixian Chen, Jing He, Yanxiang He, Athanasios V. Vasilakos, Jong Hyuk Park, Yan Yang:
A Survey on Multimedia Communicating Technology Based on Spatial Audio Coding. 675-681
Pervasive and Ubiquitous Computing
- Noha Ibrahim, Stéphane Frénot, Frédéric Le Mouël:
User-Excentric Service Composition in Pervasive Environments. 682-689 - José Bringel Filho, Alina Dia Miron, Ichiro Satoh, Jérôme Gensel, Hervé Martin:
Modeling and Measuring Quality of Context Information in Pervasive Environments. 690-697 - Julia Kantorovitch, Ilkka Niskanen:
Interactive Home Supervision Application. 698-704 - Muhammad Younas, Soraya Kouadri Mostéfaoui:
Context-Aware Mobile Services Transactions. 705-712 - Alvin C. Valera, Hwee Pink Tan, Xiaoping Ma:
Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study. 713-720
Security Intrusion Detection Systems 1
- Silvio Cesare, Yang Xiang:
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. 721-728 - Igor Nai Fovino, Andrea Carcano, Thibault De Lacheze Murel, Alberto Trombetta, Marcelo Masera:
Modbus/DNP3 State-Based Intrusion Detection System. 729-736 - Salman Niksefat, Masoud Sabaei:
Efficient Algorithms for Dynamic Detection and Resolution of IPSec/VPN Security Policy Conflicts. 737-744 - Xiujie Zhang, Mingxing He:
Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes. 745-752
Security Intrusion Detection Systems 2
- Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, Andrea J. Cullen, Pravin Mirchandani:
MARS: Multi-stage Attack Recognition System. 753-759 - Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin:
Against Spyware Using CAPTCHA in Graphical Password Scheme. 760-767 - Valdir Stumm Jr., Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau:
Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach. 768-774 - Jiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu:
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. 775-780
Security Intrusion Detection Systems 3
- Katerina Goseva-Popstojanova, Brandon Miller, Risto Pantev, Ana Dimitrijevikj:
Empirical Analysis of Attackers Activity on Multi-tier Web Systems. 781-788 - Farida Ridzuan, Vidyasagar M. Potdar, Alex Talevski, William F. Smyth:
Key Parameters in Identifying Cost of Spam 2.0. 789-796 - Pedram Hayati, Vidyasagar M. Potdar, Kevin Chai, Alex Talevski:
Web Spambot Detection Based on Web Navigation Behaviour. 797-803
Wireless Sensor Neworks 1
- Hyun Lee, Jae Sung Choi, Ramez Elmasri:
A Dynamic Normalized Weighting Based Context Reasoning in Home-Based Care. 804-811 - Julia Albath, Mayur Thakur, Sanjay Madria:
Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks. 812-819 - Tales Heimfarth, Edison Pignaton de Freitas, Carlos Eduardo Pereira, Armando Morado Ferreira, Flávio Rech Wagner, Tony Larsson:
Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-Oriented Middleware. 820-826 - Hamed Yousefi, Kambiz Mizanian, Amir-Hossein Jahangir:
Modeling and Evaluating the Reliability of Cluster-Based Wireless Sensor Networks. 827-834 - Atif Sharif, Vidyasagar M. Potdar, A. J. D. Rathnayaka:
Prioritizing Information for Achieving QoS Control in WSN. 835-842
Wireless Sensor Neworks 2
- Khaled Almiani, Anastasios Viglas, Lavy Libman:
Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks. 843-850 - Harald Weinschrott, Frank Dürr, Kurt Rothermel:
Symbolic Routing for Location-Based Services in Wireless Mesh Networks. 851-858 - Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo:
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. 859-865 - Seungmin Oh, Euisin Lee, Soochang Park, Juhyun Jung, Sang-Ha Kim:
Communication Scheme to Support Sink Mobility in Multi-hop Clustered Wireless Sensor Networks. 866-872
Wireless Sensor Neworks 3
- Kuei-Ping Shih, Chien-Min Chou, I-Hsin Liu, Chun-Chih Li:
On Barrier Coverage in Wireless Camera Sensor Networks. 873-879 - Thi Hong Hanh Le, Makoto Takizawa:
A Hybrid Technique for Efficient Medium Access Control in Wireless Sensor Networks. 880-887 - Weigao Xie, Mukul Goyal, Seyed Hossein Hosseini, Jerald Martocci, Yusuf Bashir, Emmanuel Baccelli, Arjan Durresi:
Routing Loops in DAG-Based Low Power and Lossy Networks. 888-895 - Shih-Chang Huang:
Energy-Aware, Self-Deploying Approaches for Wireless Sensor Networks. 896-901
Wireless Sensor Neworks 4
- Huasong Cao, Sergio González-Valenzuela, Victor C. M. Leung:
Employing IEEE 802.15.4 for Quality of Service Provisioning in Wireless Body Area Sensor Networks. 902-909 - Jeongcheol Lee, Euisin Lee, Soochang Park, Hosung Park, Sang-Ha Kim:
Sink-Initiated Geographic Multicasting Protocol in Wireless Sensor Networks. 910-916 - Wuyungerile Li, Masaki Bandai, Takashi Watanabe:
Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor Networks. 917-924 - Juhyun Jung, Soochang Park, Euisin Lee, Seungmin Oh, Sang-Ha Kim:
Real-Time Data Dissemination Based on Reactive and Restricted Zone Search in Sensor Networks. 925-932
Wireless Sensor Neworks 5
- Amulya Ratna Swain, R. C. Hansdah, Vinod Kumar Chouhan:
An Energy Aware Routing Protocol with Sleep Scheduling for Wireless Sensor Networks. 933-940 - Mohammad Reza Akhondi, Alex Talevski, Simon Carlsen, Stig Petersen:
Applications of Wireless Sensor Networks in the Oil, Gas and Resources Industries. 941-948 - Pedram Radmand, Alex Talevski, Stig Petersen, Simon Carlsen:
Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries. 949-957
Interaction in Web Services
- Zakaria Maamar, Leandro Krug Wives, Ghazi AlKhatib, Quan Z. Sheng, Antonio Rodrigo Delepiane de Vit, Djamal Benslimane:
From Communities of Web Services to Marts of Composite Web Services. 958-965 - Yassin Chabeb, Samir Tata, Alain Ozanne:
YASA-M: A Semantic Web Service Matchmaker. 966-973 - Mohamed Sellami, Walid Gaaloul, Samir Tata, Mohamed Jmaiel:
Using Recommendation to Limit Search Space in Web Services Discovery. 974-981 - Meisam Aboudi, Alex Talevski:
Environmental Sustainability and Improved Quality of Life Through Service Convergence Technologies. 982-987
Security Authentication and Access Control 1
- Gianmarco Baldini, Stefano Braghin, Igor Nai Fovino, Alberto Trombetta:
Adaptive and Distributed Access Control in Cognitive Radio Networks. 988-995 - Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan:
An Authentication Model for Wireless Network Services. 996-1003 - Masahiro Yoshida, Satoshi Ohzahata, Akihiro Nakao, Konosuke Kawashima:
Controlling File Distribution in the Share Network Through Content Poisoning. 1004-1011
Security Authentication and Access Control 2
- Robert Steele, Kyongho Min:
HealthPass: Fine-Grained Access Control to Portable Personal Health Records. 1012-1019 - Benjamin Bock, David Huemer, A Min Tjoa:
Towards More Trustable Log Files for Digital Forensics by Means of . 1020-1027 - Peter Frühwirt, Markus Huber, Martin Mulazzani, Edgar R. Weippl:
InnoDB Database Forensics. 1028-1036 - Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca:
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs. 1037-1046
Security Authentication and Access Control 3
- Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan:
Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance. 1047-1053 - Stefan Rass, Peter Schartner:
Non-interactive Information Reconciliation for Quantum Key Distribution. 1054-1060
WLAN, RFID, and OFDM Systems
- Quan Z. Sheng, Yanbo Wu, Damith Chinthana Ranasinghe:
Enabling Scalable RFID Traceability Networks. 1061-1068 - Alireza Attar, Haoming Li, Victor C. M. Leung:
Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber. 1069-1076 - Adam Flizikowski, Witold Holubowicz, Marcin Przybyszewski, Slawomir Grzegorzewski:
Admission Control and System Capacity Assessment of WiMAX with ACM and nb-LDPC Codes. 1077-1084
Security: Architecture and Protocols
- Refka Abdellaoui, Marc Pasquet:
Secure Communication for Internet Payment in Heterogeneous Networks. 1085-1092 - Walter Wong, Maurício F. Magalhães, Fábio Luciano Verdi:
IDSec: An Identification Layer Security Model. 1093-1100 - Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang:
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. 1101-1107 - Pedro Javier Fernández Ruiz, Cristian A. Nieto Guerra, Antonio Fernandez Gómez-Skarmeta:
Deployment of a Secure Wireless Infrastructure Oriented to Vehicular Networks. 1108-1114 - Yu Wang, Yang Xiang, Shun-Zheng Yu:
Automatic Application Signature Construction from Unknown Traffic. 1115-1120
Grid and P2P Computing
- Atsushi Tagami, Shigehiro Ano, Yoichi Tomiura:
Simulation Analysis of Moving Peer Influence on Location-Aware P2P Network. 1121-1127 - Xiang Fan, Yang Xiang:
Propagation Modeling of Peer-to-Peer Worms. 1128-1135 - Huey-Ing Liu, I-Feng Wu:
MeTree: A Contribution and Locality-Aware P2P Live Streaming Architecture. 1136-1143 - Yeim-Kuan Chang, Yung-Chieh Lin, Chen-Yu Lin:
Grid of Segment Trees for Packet Classification. 1144-1149
Database Processing and Data Mining
- Li Chen, J. Wenny Rahayu, David Taniar:
Towards Near Real-Time Data Warehousing. 1150-1157 - Ejaz Ahmed, Nik Bessis, Yong Yue, Muhammad Sarfraz:
Data Mapping, Matching and Loading Using Grid Services. 1158-1164 - Heverson Borba Ribeiro, Emmanuelle Anceaume:
Exploiting Rateless Coding in Structured Overlays to Achieve Data Persistence. 1165-1172 - Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu:
An Enhanced Global Index for Location-Based Mobile Broadcast Services. 1173-1180 - Andrew Clarke, Eric Pardede:
Outsourced XML Database: Query Assurance Optimization. 1181-1188
Intelligent Computing and Applications 1
- Wolfgang Boehmer:
Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions. 1189-1194 - Kristoffer Getchell, Iain Oliver, Alan Miller, Colin Allison:
Metaverses as a Platform for Game Based Learning. 1195-1202 - Nam Pham, Hao Yu, Bogdan M. Wilamowski:
Neural Network Trainer through Computer Networks. 1203-1209 - Nicholas J. Cotton, Bogdan M. Wilamowski:
Compensation of Sensors Nonlinearity with Neural Networks. 1210-1217
Intelligent Computing and Applications 2
- Guangquan Zhang, Tharam S. Dillon, Kai-Yuan Cai, Jun Ma, Jie Lu:
Delta-equalities of Complex Fuzzy Relations. 1218-1224 - Hiroaki Nishino, Kouta Murayama, Tsuneo Kagawa, Kouichi Utsumiya:
A Japanese Calligraphy Trainer Based on Skill Acquisition Through Haptization. 1225-1232 - Muhammad Awais Shibli, Imran Yousaf, Sead Muftic:
MagicNET: Security System for Protection of Mobile Agents. 1233-1240 - Fakhri Alam Khan, Yuzhang Han, Sabri Pllana, Peter Brezany:
An Ant-Colony-Optimization Based Approach for Determination of Parameter Significance of Scientific Workflows. 1241-1248
Semantics Collaborative Systems 1
- Behrang Zadjabbari, Pornpit Wongthongtham, Farookh Khadeer Hussain:
Knowledge Sharing Effectiveness Measurement. 1249-1254 - Li-Hua Li, Fu-Ming Lee, Yu-Chien Chou, Tsung-Jen Pu:
Using Ontology for Personalized Mobile Message Computation. 1255-1262 - Dongwook Shin, Taehwan Kim, Hana Jung, Joongmin Choi:
Automatic Method for Author Name Disambiguation Using Social Networks. 1263-1270 - Ashir Ahmed, Lutfe Kabir, Hiroto Yasuura:
An Information Platform for Low-Literate Villagers. 1271-1277
Semantics Collaborative Systems 2
- Xiulei Qin, Jun Wei, Wenbo Zhang, Hua Zhong, Tao Huang:
A Two-Phase Approach to Subscription Subsumption Checking for Content-Based Publish/Subscribe Systems. 1278-1285 - Lei Gao, Atakelty Hailu:
Integrating Recreational Fishing Behaviour within a Reef Ecosystem as a Platform for Evaluating Management Strategies. 1286-1291 - Ismael Bouassida Rodriguez, Jérôme Lacouture, Khalil Drira:
Semantic Driven Self-Adaptation of Communications Applied to ERCMS. 1292-1299 - Christian Bohn, Kjetil Nørvåg:
Extracting Named Entities and Synonyms from Wikipedia. 1300-1307
Semantics Collaborative Systems 3
- Steffen Kunz, Franziska Brecht, Benjamin Fabian, Markus Aleksy, Matthias Wauer:
Aletheia--Improving Industrial Service Lifecycle Management by Semantic Data Federations. 1308-1314 - Zhe Jing, Elizabeth Chang, Omar Khadeer Hussain, K. L. Chin:
Improving Graduate Employability by Using Social Networking Systems. 1315-1322 - Tomasz P. Bednarz, Con Caris, Jeremy P. Thompson, Chris Wesner, Mark T. Dunn:
Human-Computer Interaction Experiments. 1323-1327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.