default search action
19th AINA 2005: Fukuoka, Japan
- 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan. IEEE Computer Society 2005, ISBN 0-7695-2249-1
Volume 1
Multimedia Communication and Synchronization
- Emmanuel Bouix, Marc Dalmau, Philippe Roose, Franck Luthon:
Multimedia Oriented Component Model. 3-8 - Yasutaka Nishimura, Tomoya Enokido, Makoto Takizawa:
Design of a Hierarchical Group to Realize a Scalable Group. 9-14 - Yun-Sheng Yen, Weimin Chen, Jia-Cheng Zhuang, Han-Chieh Chao:
A Novel Sliding Weighted Fair Queueing Scheme for Multimedia Transmission. 15-20 - Hsu-Chen Cheng, Frank Yeong-Sung Lin:
Maximum-Revenue Multicast Routing and Partial Admission Control for Multirate Multimedia Distribution. 21-26 - Satoshi Itaya, Tomoya Enokido, Makoto Takizawa:
A High-Performance Multimedia Streaming Model on Multi-Source Streaming Approach in Peer-to-Peer Networks. 27-32
Multi-Agent Systems
- S. Misbah Deen:
A Multi-Agent Framework for a P2P Data Sharing Facility. 35-40 - Bo Liu, Junzhou Luo, Wei Li:
Multi-Agent Based Network Management Task Decomposition and Scheduling. 41-46 - Jun Sawamoto, Hidekazu Tsuji, Dilmurat Tilwaldi, Hisao Koizumi:
A Proposal of Multi-Agent System Development Framework for Cooperative Problem Solving and Its Experimental Evaluation. 47-52 - Guangzhu Chen, Zhishu Li, Daohua Yuan, Nimazhashi:
A Model of Multi-Agent System Based on Immune Evolution. 53-58 - Emad Farazmand, Afsaneh Shokoufi, Caro Lucas, Farzad Habibipour:
Using a Learning Mechanism in Matchmaking Process of Agents' Negotiation in Multi-Agent Systems. 59-64
Ad Hoc Network I
- Zhenjie Huang, Dan Chen, Yumin Wang:
Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. 67-71 - Chyi-Ren Dow, Pei-Jung Lin, Sheng-Chang Chen, Jyh-Horng Lin, Shiow-Fen Hwang:
A Study of Recent Research Trends and Experimental Guidelines in Mobile Ad Hoc Networks. 72-77 - Masashi Saito, Jun Tsukamoto, Takaaki Umedu, Teruo Higashino:
Evaluation of Inter-Vehicle Ad Hoc Communication Protocol. 78-83 - Fumiaki Sato, Tadanori Mizuno:
A Route Reconstruction Method Based on Support Group Concept for Mobile Ad Hoc Networks. 84-89 - Bing-Hong Liu, Ming-Jer Tsai, Wei-Chei Ko:
Dynamical Construction of a Core-Based Group-Shared Multicast Tree in Mobile Ad Hoc Networks. 90-95
Real-Time Systems and Tracking
- Goichi Itabashi, Kaoru Takahashi, Yasushi Kato, Takuo Sugamma, Norio Shiratori:
Incremental Design of a State Machine Specification for Mobile and Real-Time Systems . 99-104 - Chun-Chao Yeh:
On the Power-Aware Resource Allocation for Linear-Pipelined Real-Time Tasks. 105-110 - Hui-Huang Hsu, Timothy K. Shih, Chia-Tong Tang, Yi-Chun Liao:
Real-Time Multiple Tracking Using a Combined Technique. 111-116 - D. Frank Hsu, Damian M. Lyons:
A Dynamic Pruning and Feature Selection Strategy for Real-Time Tracking. 117-124 - Simon Sheu, Chang-Yeng Cheng, Alan Chang:
Fast Pattern Detection in Stream Data. 125-130
Semantic Based Information Retrieval
- Qing Li, Jun Yang, Yueting Zhuang:
Multi-Modal Information Retrieval with a Semantic View Mechanism. 133-138 - Mikio Amano, Daisuke Hironaka, Seio Oda, Genci Capi, Masao Yokota:
Linguistic Interpretation of Human Motion Based on Mental Image Directed Semantic Theory. 139-144 - Seksun Suwanmanee, Djamal Benslimane, Philippe Thiran:
OWL-Based Approach for Semantic Interoperability. 145-150 - Anthony Y. Chang:
An Intelligent Semantic Model for the Design of Consistent Online SMIL Presentations. 151-156 - Jason C. Hung, Ching-Sheng Wang, Che-Yu Yang, Mao-Shuen Chiu, George Yee:
Applying Word Sense Disambiguation to Question Answering System for e-Learning. 157-162
Peer-to-Peer and Real-Time Communications
- Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa, K. H. (Kane) Kim:
Charge-Based Flooding Algorithm for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks. 165-170 - Nobuhiro Nakamura, Souichirou Takahama, Leonard Barolli, Jianhua Ma, Kaoru Sugita:
A Multiplatform P2P System: Its Implementation and Applications. 171-176 - Wei Ren, Hai Jin:
Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design . 177-182 - Takahide Gouda, Leonard Barolli, Kaoru Sugita, Akio Koyama, Arjan Durresi, Giuseppe De Marco:
Application of Policing Mechanisms for Broadband Networks: Issues and Difficulties. 183-188 - Marco Comuzzi, Chiara Francalanci, Paolo Giacomazzi:
Trade-Off Based Negotiation of Traffic Conditioning and Service Level Agreements in DiffServ Networks. 189-194
e-Learning and SCORM
- Yoshihito Takahashi, Tomomi Abiko, Eriko Negishi, Goichi Itabashi, Yasushi Kato, Kaoru Takahashi, Norio Shiratori:
An Ontology-Based e-Learning System for Network Security. 197-202 - Hsiau Wen Lin, Wen-Chih Chang, George Yee, Timothy K. Shih, Chun-Chia Wang, Hsuan-Che Yang:
Applying Petri Nets to Model SCORM Learning Sequence Specification in Collaborative Learning. 203-208 - Jun-Ming Su, Shian-Shyong Tseng, Jui-Feng Weng, Kuan-Ting Chen, Yi-Lin Liu, Yi-Ta Tsai:
An Object Based Authoring Tool for Creating SCORM Compliant Course. 209-214 - Mike Hogeboom, Fuhua Oscar Lin, Larbi Esmahi, Chunsheng Yang:
Constructing Knowledge Bases for e-Learning Using Protege 2000 and Web Services. 215-220 - Sheng-Tun Li, Chu-Hung Lin:
On the Distributed Management of SCORM-Compliant Course Contents. 221-226
Collaborative Environment and Virtual Space
- Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:
Virtual Traditional Japanese Crafting System Using JGNII in Collaborative Work Environment. 229-234 - Kaoru Sugita, Tomoyuki Ishida, Akihiro Miyakawa, Leonard Barolli, Yoshitaka Shibata:
Experimental Result of Feature Extraction Method for Digital Traditional Japanese Crafting System. 235-240 - Toshitada Ishii, Yoshitaka Shibata:
An Interactive Virtual Space Presentation System Considering Users Background. 241-246 - Masaki Ito, Jin Nakazawa, Hideyuki Tokuda:
mPATH: An Interactive Visualization Framework for Behavior History. 247-252 - Naoki Nakashima, Koji Okamura, Joon-Soo Hahm, Young-Woo Kim, Hiroshi Mizushima, Haruyuki Tatsumi, Byung-In Moon, Ho-Seong Han, Yong-Jin Park, Jae-Hwa Lee, Sung-Kwan Youm, Chul-Hee Kang, Shuji Shimizu:
Telemedicine with Digital Video Transport System in Asia-Pacific Area. 253-257
Multicast Protocols and Admission Controls
- Kun Zhang, Heng Wang, Feng-Yu Liu:
An Efficient Algorithm Based on Simulated Annealing for Multicast Routing with Delay and Delay Variation Constraints. 261-266 - Hui Tian, Hong Shen:
Hamming Distance and Hop Count Based Classification for Multicast Network Topology Inference. 267-272 - Bo Rong, Maria Bennani, Michel Kadoch, Ahmed K. Elhakeem:
Bandwidth Fragmentation Avoided QoS Multicast Routing by Employing Admission Control. 273-278 - Wen-Tsuen Chen, Ho-Ling Hsu, Jeng-Long Chiang:
Logical Key Tree Based Secure Multicast Protocol with Copyright Protection. 279-284
Grid Computing
- Dang Minh Quan, Odej Kao:
On Architecture for SLA-Aware Workflows in Grid Environments. 287-292 - Mingkui Yang, Hongbing Liang, Bin Xu:
S-WFMS: A Service-Based Workflow Management System in Grid Environment. 293-297 - Chao-Tung Yang, Yi-Chun Hsiung, Heng-Chuan Kan:
Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications. 298-303 - Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Po-Chi Shih:
Integrating Grid with Intrusion Detection. 304-309 - Stephen Childs, Brian A. Coghlan, David O'Callaghan, Geoff Quigley, John Walsh:
A Single-Computer Grid Gateway Using Virtual Machines. 310-315
Sensor Network
- Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, Chun-Yu Lin:
A Probabilistic Signal-Strength-Based Evaluation Methodology for Sensor Network Deployment. 319-324 - Chih-Wei Shiou, Frank Yeong-Sung Lin, Hsu-Chen Cheng, Yean-Fu Wen:
Optimal Energy-Efficient Routing for Wireless Sensor Networks. 325-330 - Lok Hang Lee, Man Hon Wong:
Aggregate Sum Retrieval in Sensor Network by Distributed Prefix Sum Data Cube. 331-336 - Ren C. Luo, Ogst Chen, Liang Chao Tu:
Nodes Localization through Data Fusion in Sensor Network. 337-342 - Arjan Durresi, Vamsi Paruchuri:
Geometric Broadcast Protocol for Sensor and Actor Networks. 343-348
Agent and Distributed Systems I
- Ying-Hong Wang, Huan-Chao Keh, Tsang-Ching Hu, Cheng-Horng Liao:
A Hierarchical Dynamic Monitoring Mechanism for Mobile Agent Location. 351-356 - Min Yang, Shao-yin Huang, Zhi Wang, Zunping Cheng, Dilin Mao, Chuanshan Gao:
PICC: A Secure Mobile Agent Framework Based on Garbled Circuit. 357-362 - Gen Kitagata, Yu Matsushima, Daisuke Hasegawa, Tetsuo Kinoshita, Norio Shiratori:
An Agent-Based Middleware for Communication Service on Ad Hoc Network. 363-367 - Youhei Tanaka, Tomoya Enokido, Makoto Takizawa:
Design and Implementation of Transactional Agents for Manipulating Distributed Objects. 368-373 - George Yee, Larry Korba:
An Agent Architecture for e-Services Privacy Policy Compliance. 374-379
Security and Authentication Protocols
- Heping Hu, Hanbing Yao:
A Scheme for Authentication and Authorization in a Grid Application. 383-387 - Tianjie Cao, Dongdai Lin, Rui Xue:
An Efficient ID-Based Deniable Authentication Protocol from Pairings. 388-391 - Chung-Ming Huang, Jian-Wei Li:
Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. 392-397 - Fangguo Zhang, Yi Mu, Willy Susilo:
Reducing Security Overhead for Mobile Networks. 398-403
Ad Hoc Network II
- Yi-Chung Chen, Jang-Ping Sheu:
Interest-Based Lookup Protocols for Mobile Ad Hoc Networks. 407-413 - Wen-Lin Yang:
Constructing Energy-Efficient Multicast Trees with Delay Constraints in Ad Hoc Networks. 414-419 - Kuei-Ping Shih, Chih-Yung Chang, Chien-Min Chou, Szu-Min Chen:
A Power Saving MAC Protocol by Increasing Spatial Reuse for IEEE 802.11 Ad Hoc WLANs. 420-425 - Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Constantinou:
A Biologically Inspired QoS Routing Algorithm for Mobile Ad Hoc Networks. 426-431 - Wei-Yeh Chen, Jean-Lien C. Wu:
Performance Analysis of Radio Resource Allocation for Multimedia Traffic in Cellular Networks. 432-437
Routing Algorithms
- Chung-Min Chen, Yibei Ling, Marcus Pang, Wai Chen, Shengwei Cai, Yoshihisa Suwa, Onur Altintas:
Scalable Request Routing with Next-Neighbor Load Sharing in Multi-Server Environments. 441-446 - Harri Paloheimo, Antti Ylä-Jääski:
Interoperability of MANET and 4G RAN Routing in Terms of Energy Conservation. 447-452 - Ashraf Uddin Ahmed, Senro Saito, Zixue Cheng:
Zone-Based Routing Algorithm for Congestion Control over the Internet. 453-458 - Sing-Ling Lee, Jung-Chun Liu, YuChing Chen:
An Ear-Decomposition Based Approach for Survivable Routing in WDM Networks. 459-464 - Yan Shi, Zengji Liu, Zhiliang Qiu, Min Sheng:
Load Balance Based Network Bandwidth Allocation for Delay Sensitive Services. 465-470
Admission Control
- Leonard Barolli, Mimoza Durresi, Kaoru Sugita, Arjan Durresi, Akio Koyama:
A CAC Scheme for Multimedia Applications Based on Fuzzy Logic. 473-478 - Deyun Gao, Jianfei Cai, Liren Zhang:
Physical Rate Based Admission Control for HCCA in IEEE 802.11e WLANs. 479-483 - Changhua Zhu, Changxing Pei, Jiandong Li, Weidong Kou:
QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLAN. 484-487 - Song Xiao, Chengke Wu, Jechang Jeong:
Robust Video Communication Based on Source Modeling and Network Congestion Control. 488-491
Web-Based Systems
- Mario A. Bochicchio, Nicola Fiore:
Supporting the Conceptual Modeling of Web Applications: The MODE Project. 495-500 - Guillermo de Jesús Hoyos-Rivera, Roberta Lima-Gomes, Jean-Pierre Courtiat:
CoLab: A Flexible Collaborative Web Browsing Tool. 501-506 - Wai Yip Lum, Francis Chi-Moon Lau:
User-Centric Adaptation of Structured Web Documents for Small Devices. 507-512 - Wassam Zahreddine, Qusay H. Mahmoud:
A Framework for Automatic and Dynamic Composition of Personalized Web Services. 513-518 - Yeim-Kuan Chang, Ming-Hong Hong, Yi-Wei Ting:
Web-Based Energy-Efficient Cache Invalidation in Wireless Mobile Environment. 519-524
Mobile Systems and Applications
- Katsuhiko Sato, Michiaki Katsumoto, Tetsuya Miki:
Fragmented Patching: New VOD Technique That Supports Client Mobility. 527-532 - Shu-Ming Tseng, Teng-Chuan Lin, Kuan-Fu Huang:
A Low-Complexity Iterative Detector for COFDM in Mobile Channels. 533-537 - Agustinus Borgy Waluyo, Gabriel Goh, David Taniar, Bala Srinivasan:
On Building a Data Broadcasting System for Mobile Databases. 538-543 - Takaaki Umedu, Shigeharu Urata, Akio Nakata, Teruo Higashino:
Automatic Decomposition of Java Program for Implementation on Mobile Terminals. 544-549
Cellular Network and CDMA
- Ben-Jye Chang:
MDP-Based Fast Handoff with Reducing Waste Rate Method for Management Radio Resource in 3GPP Cellular Networks. 553-558 - Junyang Zhou, Kenneth Man-Kin Chu, Joseph Kee-Yin Ng:
Providing Location Services within a Radio Cellular Network Using Ellipse Propagation Model. 559-564 - Shu-Ming Tseng, Hung-Chieh Yu, Chi-Lung Chang, Yuan-Ching Tseng, Kuen-Cherng Lin:
EM Vector Channel Estimation and V-BLAST/PIC Detection for Multiuser Long-Code MIMO CDMA in Multipath Rayleigh Fading Channels. 565-569 - Jen-Shun Yang, Chien-Chao Tseng, Ray-Guang Cheng:
A Signal-to-Interference Ratio Based Downlink Scheduling Scheme for WCDMA Mobile Communication System. 570-575 - Po-Jen Chuang, Shien-Da Chang:
Performance Analysis on Location Tracking in PCS Networks. 576-582
Encryption and Privacy
- Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen:
An Efficient Decryption Method for RSA Cryptosystem. 585-590 - Tianjie Cao, Dongdai Lin, Rui Xue:
ID-Based Ring Authenticated Encryption. 591-596 - Sheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin:
Key Agreement Protocol Based on Weil Pairing. 597-602 - Willy Susilo, Fangguo Zhang, Yi Mu:
Privacy-Enhanced Internet Storage. 603-608 - Zhenjie Huang, Zhixiong Chen, Yumin Wang:
Convertible Undeniable Partially Blind Signatures. 609-614
Search Engine and Information Retrieval
- Simon Sheu, Alan Chang, Webber Huang:
Fast Similarity Search in String Databases. 617-622 - Hao-ming Wang, Boqin Feng:
Research of the Chinese Meta-search Engine Model Based on Intelligent Agent. 623-628 - Bo Yang, Ali R. Hurson:
Ad Hoc Image Retrieval Using Hierarchical Semantic-Based Index. 629-634 - Nobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai:
The Evaluations of FTF-IDF Scoring for Fresh Information Retrieval. 635-640 - Nen-Fu Huang, Rong-Tai Liu, Chih-Hao Chen, Ying-Tsuen Chen, Li-Wen Huang:
A Fast URL Lookup Engine for Content-Aware Multi-Gigabit Switches. 641-646
Distributed Systems
- Shin-Jia Hwang, Kuang-Hsi Chen:
A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection. 649-654 - János Tapolcai, Pin-Han Ho, Xiaohong Jiang, Susumu Horiguchi:
Shared Protection Based on Matrix Decomposition in Tropical Semi-Rings. 655-660 - Satoshi Fujita, Shigeaki Tagashira, Chen Qiao, Masaya Mito:
Distributed Branch-and-Bound Scheme for Solving the Winner Determination Problem in Combinatorial Auctions. 661-666 - Jingde Cheng:
Connecting Components with Soft System Buses: A New Methodology for Design, Development, and Maintenance of Reconfigurable, Ubiquitous, and Persistent Reactive Systems. 667-672
Agent and Distributed Systems II
- Yu Jiao, Ali R. Hurson:
Adaptive Power Management for Mobile Agent-Based Information Retrieval. 675-680 - Prasanna Lokuge, Damminda Alahakoon:
Reinforcement Learning in Neuro BDI Agents for Achieving Agent's Intentions in Vessel Berthing Applications. 681-686 - Sameera Abar, Hideaki Hatori, Toru Abe, Tetsuo Kinoshita:
Agent-Based Knowledge Acquisition in Network Management Domain. 687-692 - Ssu-Hsuan Lu, Chun-Chieh Yang, Hsiao-Hsi Wang, Kuan-Ching Li:
On Design of Agent Home Scheme for Prefetching Strategy in DSM Systems. 693-698 - Jun'ichi Yura, Jin Nakazawa, Hideyuki Tokuda:
Galaxy DS: Directory Service for Service Composition Based on Smart Space Structure. 699-704
Security, Cryptographic, and Watermarking
- Yuichi Nakamura, Hiroaki Kikuchi:
Efficient Key Management Based on the Subset Difference Method for Secure Group Communication. 707-712 - Fan Hong, Liang Hong, Cai Fu:
Secure OLSR. 713-718 - Jiali Cao, Zheng-an Yao:
An Improved RSA-Based Access Control Scheme for Hierarchical Groups. 719-723 - Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang:
An AES S-Box to Increase Complexity and Cryptographic Analysis. 724-728 - Ying-Lan Chang, Koun-Tem Sun, Yueh-Hong Chen:
ART2-Based Genetic Watermarking. 729-734
Caching Algorithms and Scheduling
- Rachid El Abdouni Khayari, Michael Best, Axel Lehmann:
Impact of Document Types on the Performance of Caching Algorithms in WWW Proxies: A Trace Driven Simulation Study. 737-742 - Hai Jin, Chao Xie, Kaiqin Fan, Rong Hu, Yunfa Li:
Single Stream Image and Stream Network Prefetch in Streaming Media Proxy Caching. 743-748 - Iftekhar Ahmad, Joarder Kamruzzaman, Srinivas Aswathanarayaniah:
An Improved Preemption Policy for Higher User Satisfaction. 749-754 - Tomoya Enokido, Makoto Takizawa:
Concurrency Control Using Role Ordering (RO) Scheduler. 755-760 - Li-Hsing Yen, Chi-Hung Liao:
Round-Robin with FCFS Preemption: A Simple MAC Scheduling Scheme for Bluetooth Piconet. 761-766
Wireless Networks
- Jing Liu, Jiandong Li, Lei Zhou, Guanghui Zhang:
An Enhanced User-Dependent Perfect-Scheduling Multiple Access Protocol for Wireless Packet Network. 769-774 - Hong Zhu, Chengke Wu, Yangli Wang, Yong Fang:
Fast Mode Decision for H.264/AVC Based on Macroblock Correlation. 775-780 - Shuenn Gi Lee:
Performance of Concatenated FEC under Fading Channel in Wireless-MAN OFDM System. 781-785 - Chen-Shie Ho, Sy-Yen Kuo, Shih-Yi Yuan:
Group Partition and Restoration Strategies for Survivable WDM Networks. 786-791 - Nen-Fu Huang, Kwei-Bor Chen, Whai-En Chen:
Fast and Scalable Multi-TCAM Classification Engine for Wide Policy Table Lookup. 792-797
Traffic Analysis and Protocols
- Kultida Rojviboonchai, Toru Osuga, Hitoshi Aida:
R-M/TCP: Protocol for Reliable Multi-Path Transport over the Internet. 801-806 - Rung-Shiang Cheng, Hui-Tang Lin, Wen-Shyang Hwang, Ce-Kuen Shieh:
Improving the Ramping up Behavior of TCP Slow Start. 807-812 - Yung-Chung Wang:
Conditional Drop Probability of RED Mechanism with UDP and TCP Traffic. 813-820 - Ling Chen:
Effects of Network Characteristics on Task Performance in a Desktop CVE System. 821-826 - Bo Rong, Jacques Lebeau, Maria Bennani, Michel Kadoch, Ahmed K. Elhakeem:
Traffic Aggregation Based SIP over MPLS Network Architecture. 827-832
Parallel Systems
- Junichi Funasaka:
An Analysis on Adaptive Parallel Downloading Method. 835-840 - S. M. Rezazad, Hamid Sarbazi-Azad:
A Constraint-Based Performance Comparison of Hypercube and Star Multicomputers with Failures. 841-846 - Tzong-Jye Liu, Chia-Lin Lee:
2-State Alternator for Uniform Rings with Arbitrary Size. 847-852 - Yosuke Sugiyama, Tomoya Enokido, Makoto Takizawa:
Lattice-Based Precedence of Moderate Lock Modes on Objects. 853-858 - Liang Cai, Xiaohu Yang, Chun Chen:
Design and Implementation of a Server-Aided PKI Service (SaPKI. 859-864
e-Commerce and e-Entertainment on Grid Computing
- Chia-Hung Chien, Paul Hsueh-Min Chang, Von-Wun Soo:
Market-Oriented Multiple Resource Scheduling in Grid Computing Environments. 867-872 - Graham Morgan, Kier Storey:
Scalable Collision Detection for Massively Multiplayer Online Games. 873-878 - Muhammad Younas, Kuo-Ming Chao, Rachid Anane, Song Y. Yan, Philip J. Lovett, Anthony N. Godwin:
Grid Services Mediation. 879-884 - Rosa Gil, Jaime Delgado, Zièd Choukair:
Characterizing Ad Hoc B2B Applications Using Ontologies and Complex Systems. 885-892 - Zièd Choukair:
Correctness Proof Obligation for CoCTelS Telecom Services Composition Model. 893-900
Information Networks and Applications I
- Yoshizo Ishihara, Runhe Huang, Kwang Mong Sim:
Learning Opponent's Eagerness with Bayesian Updating Rule in a Market-Driven Negotiation Model. 903-908 - Pi-Chung Wang, Chun-Liang Lee, Yuan-Rung Yang, Hung-Yi Chang:
CAM-Based Huffman Decoding Made Power Efficient. 909-914 - Katsuhiro Takata, Yusuke Shina, Jianhua Ma, Bernady O. Apduhan:
Designing a Space-Oriented System for Ubiquitous Outdoor Kid's Safety Care. 915-920 - Rami Yared, Xavier Défago, Takuya Katayama:
Fault-Tolerant Group Membership Protocols Using Physical Robot Messengers. 921-926 - Shuxin Yin, Indrakshi Ray:
Relational Database Operations Modeling with UML. 927-932
Information Networks and Applications II
- Teng Ma, Junzhou Luo:
A Prediction-Based and Cost-Based Replica Replacement Algorithm Research and Simulation. 935-940 - Jinhua Sun, Jiandong Li, Lijun Jin:
A RS-SISO Algorithm for Serially Concatenated Continuous Phase Modulation. 941-946 - Chin-Chen Chang, Wei-Liang Tai, Min-Hui Lin:
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. 947-952 - Ratsameetip Wita, Yunyong Teng-Amnuay:
Vulnerability Profile for Linux. 953-958
Information Networks and Applications III
- Michel Raynal, Matthieu Roy, Ciprian Tutu:
A Simple Protocol Offering Both Atomic Consistent Read Operations and Sequentially Consistent Read Operations. 961-966 - Woei-Kae Chen, Tung-Hung Tsai, Hung-Hsing Chao:
Integration of Specification-Based and CR-Based Approaches for GUI Testing. 967-972 - Xiangguo Cheng, Jingmei Liu, Xinmei Wang:
An Identity-Based Signature and Its Threshold Version. 973-977 - Xinxin Fan, Yumin Wang:
Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. 978-983
Information Networks and Applications IV
- Bo Xu, Dongyi Jiang, Jun Li:
HSM: A Fast Packet Classification Algorithm. 987-992 - Tzu-Chi Huang, Ce-Kuen Shieh, Yu-Ben Miao:
Java Application's Packet Eavesdropper for Content Delivery Network. 993-998 - Nobuo Funabiki, Megumi Isogai, Toru Nakanishi, Teruo Higashino:
Optical-Drop Wavelength Assignment Problem for Wavelength Reuse in WDM Ring Metropolitan Area Networks. 999-1004 - Jianhua Yang, Shou-Hsuan Stephen Huang:
Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. 1005-1010 - Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:
Global Indexing Scheme for Location-Dependent Queries in Multi Channels Mobile Broadcast Environment. 1011-1016
Volume 2
Ad Hoc and Mobile Networks
- Venkatesan Balakrishnan, Vijay Varadharajan:
Designing Secure Wireless Mobile Ad Hoc Networks. 5-8 - Guanghui Zhang, Jiandong Li, Yanhui Chen, Jing Liu:
Effect of Mobility on the Critical Transmitting Range for Connectivity in Wireless Ad Hoc Networks. 9-12 - Wenzhu Zhang, Jiandong Li, Xuan Wang:
Cost-Efficient QoS Routing Protocol for Mobile Ad Hoc Networks. 13-16 - San-Yuan Wang, Jia-Yu Liu, Chun-Chien Huang, Mao-Yuan Kao, Yi-Ho Li:
Signal Strength-Based Routing Protocol for Mobile Ad Hoc Networks. 17-20 - Chen-Nien Tsai, Kai-Wei Ke, Ho-Ting Wu:
Synchronous and Multiplexed Time Slots and Radio Blocks Allocation for Mobile Packet Data Networks. 21-24 - He Hong, Jiandong Li, Min Sheng:
CRMA: A Novel Multiple Access Protocol for Power Efficient Wireless LAN. 25-28
Multicasting and Broadcasting
- Yuka Kato, Atsushi Honda, Katsuya Hakozaki:
An Analysis of Relationship between Video Contents and Subjective Video Quality for Internet Broadcasting. 31-34 - Ngoc Chi Nguyen, Vo Dinh Minh Nhat, Sungyoung Lee:
Fault Tolerant Routing and Broadcasting in de Bruijn Networks. 35-40 - Alimujiang Yiming, Toshio Eisaka:
A Switched Ethernet Protocol for Hard Real-Time Embedded System Applications. 41-44 - Kazuhisa Nakagawa, Koji Okamura:
The Advanced International Case Study Using High Speed Internet. 45-48
Wireless Communication
- Ying-Hong Wang, Hui-Min Huang, Huang-Yi Li:
Hybrid CIP/M&M for Micro-Mobility Management under the Multilayer Wireless Network. 51-54 - Ying-Hong Wang, Kuo-Jan Tseng, Yi Hsieh:
An Algorithm of Dynamic Resource Reservation for Multimedia Wireless Communication. 55-59 - Tzu-Jane Tsai, Ju-Wei Chen:
IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives. 60-63 - Chih-Yung Chang, Hao-Chun Sun, Chen-Chi Hsieh:
MCDA: An Efficient Multi-Channel MAC Protocol for 802.11 Wireless LAN with Directional Antenna. 64-67 - Makoto Kamegawa, Mai Kawamoto, Tetsuya Shigeyasu, Misako Urakami, Hiroshi Matsuno:
A New Wireless Networking System for Rescue Activities in Disasters -- System Overview and Evaluation of Wireless Node. 68-71
Image Compression and Coding Methods
- Chi-Shiang Chan, Chin-Chen Chang:
A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. 75-78 - Ching-Lin Wang, Ren-Hung Hwang, Tung-Shou Chen, Hsiu-Yueh Lee:
Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation Coding. 79-82 - Chin-Chen Chang, Chi-Lung Chiang, Ju Yuan Hsiao:
A DCT-Domain System for Hiding Fractal Compressed Images. 83-86 - Lun-Chia Kuo, Sheng-Jyh Wang:
A Feature-Based Scalable Codec for Image Compression. 87-90 - Weihong Fu, Weidong Kou:
A New Look at Coding and Decoding Algorithm for SFC-OFDM System. 91-94 - Yangli Wang, Chengke Wu:
Low Complexity Multiple Description Coding Method for Wireless Video. 95-98
Collaborative and Web-Based Learning
- Nicoletta Sala:
Cooperative Learning and Web Applications: A Case Study. 101-104 - Ying-Hong Wang, Wen-Nan Wang, Yi-Hsiang Yen:
An Intelligent Semantic Agent for e-Learning Message Communication. 105-108 - Dmitry A. Vazhenin, Alexander Vazhenin, Ying-Hong Wang:
WEB-Based Environment for Programming and Distance Learning. 109-112 - Koji Hashimoto, Yoshitaka Shibata:
An Adaptive Communication System for User's Resource Environment. 113-116 - Hiroyasu Mitsui:
A Web-Based Remote Experiment System with Individualized Assessment of Learners. 117-120
Security and Authentication
- Chu-Hsing Lin, Wei Lee:
Efficient Secret Sharing with Access Structures in a Hierarchy. 123-126 - Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen:
Dynamic Key Generations for Secret Sharing in Access Structures. 127-130 - Chang Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman:
Estimations on the Security Aspect of Brand's Electronic Cash Scheme. 131-134 - Chu-Hsing Lin, Hsiu-Hsia Lin:
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. 135-138 - Yeu-Pong Lai, Chin-Chen Chang:
A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. 139-144 - Sandrine Duflos, Valérie Gay, Brigitte Kervella, Eric Horlait:
Integration of Security Parameters in the Service Level Specification to Improve QoS Management of Secure Distributed Multimedia Services. 145-148
Network Security
- Chih-Chung Lu, Shau-Yin Tseng, Szu-Kai Huang:
A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe Error and M Safe Error Attacks. 151-154 - Dong Seong Kim, Ha-Nam Nguyen, Jong Sou Park:
Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. 155-158 - Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin:
Apply Data Mining to Defense-in-Depth Network Security System. 159-162 - Yi-Hsing Chang, J. Wey Chen:
Designing an Enhanced PC Cluster System for Scalable Network Services. 163-166 - Yih-Fuh Wang, Chien-Hsun Chen:
Improved Genetic Algorithm to Solve Preplanned Backup Path on WDM Networks. 167-174
Mobile Agent and Ontology
- Chen-Han Lin, Jen-Shun Yang, Ko-Ching Wu:
Mobile Intelligent Agent Technologies to Support VoIP Seamless Mobility. 177-180 - Yusuke Mizuno, Shohei Kato, Atsuko Mutoh, Hidenori Itoh:
A Behavioral Model Based on Meme and Qualia for Multi-Agent Social Behavior. 181-184 - Mosaab Daoud, Qusay H. Mahmoud:
Reliability Estimation of Mobile Agent Systems Using the Monte Carlo Approach. 185-188 - Wassam Zahreddine, Qusay H. Mahmoud:
An Agent-Based Approach to Composite Mobile Web Services. 189-192 - Andrew Flahive, J. Wenny Rahayu, David Taniar, Bernady O. Apduhan:
A Distributed Ontology Framework in the Semantic Grid Environment. 193-196
Parallel Programming and Architecture
- Chia-Chu Chiang:
Heterogeneous Distributed Parallel Programming for Coordination in Software Development. 199-202 - Hsin-Chuan Chen, Jen-Shiun Chiang:
Low-Power Way-Predicting Cache Using Valid-Bit Pre-Decision for Parallel Architectures. 203-206 - Chao-Tung Yang, Kuan-Wei Cheng, Kuan-Ching Li:
An Enhanced Parallel Loop Self-Scheduling Scheme for Cluster Environments. 207-210 - Kuan-Ching Li, Hsun-Chang Chang, Chao-Tung Yang, Liria Matsumoto Sato, Chung-Yuan Yang, Yin-Yi Wu, Mao-Yueh Pel, Hsiang-Kai Liao, Min-Chieh Hsieh, Chia-Wen Tsai:
On Construction of a Visualization Toolkit for MPI Parallel Programs in Cluster Environments. 211-214 - Kuan-Ching Li, Hsun-Chang Chang, Chao-Tung Yang, Li-Jen Chang, Hsiang-Yao Cheng, Liang-Teh Lee:
Implementation of Visuel MPI Parallel Program Performance Analysis Tool for Cluster Environments. 215-218 - Armando De Giusti, Marcelo R. Naiouf, Franco Chichizola, Laura C. De Giusti:
Dynamic Load Balance in Parallel Merge Sorting over Homogeneous Clusters. 219-222
Multimedia Transmission and Coding
- Yi-jung Lo, Zsehong Tsai:
A Call Admission Control Algorithm for Long-Lived and Short-Lived Streaming Media. 225-228 - K. Kalapriya, S. K. Nandy:
Throughput Driven, Highly Available Streaming Stored Playback Video Service over a Peer-to-Peer Network. 229-234 - Fang-Chu Chen, Te-Ming Chiu:
Scalefactor Based Bit Shift FGS Audio Coding. 235-238 - Yu-Cheng Fan, Hen-Wai Tsao:
A Dual Pyramid Watermarking for JPEG-2000. 239-242
Authentication Scheme
- Hung-Yu Chien, Che-Hao Chen:
A Remote Authentication Scheme Preserving User Anonymity. 245-248 - Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang:
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. 249-252 - Nobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Hiroshi Shigeno, Ken-ichi Okada:
An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication. 253-256 - Chin-Chen Chang, Jui-Yi Kuo:
An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. 257-260 - Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen:
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. 261-264 - Lanjun Dang, Weidong Kou, Yuxia Xiao:
An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. 265-268
Web-Based Systems
- Jin-Tan David Yang, Wu Lin Lee, Chun-Yen Tsai:
A Web-Based Bookmark Tool with Ontological Approach for Knowledge Sharing of Special Interest Groups. 271-276 - Chun-Te Wu, Hsing Mei:
Location-Based-Service Roaming Based on Web Services. 277-280 - Luis Guillermo Cárdenas, José A. Gil, Josep Domenech, Julio Sahuquillo, Ana Pont:
Performance Comparison of a Web Cache Simulation Framework. 281-284 - Junji Nakazato, Kenji Fujimoto, Hiroaki Kikuchi:
Privacy Preserving Web-Based Questionnaire. 285-288 - Jeanne Chen, Tung-Shou Chen, Tzu-Hsin Tsai, Hui-Fang Tsai, Mingli Hsieh, Shih-Shan Tang:
Using the ACM Technique to Refine Protein Spots in 2DGE Images. 289-292
Peer-to-Peer and Communication Networks
- Kasame Tritrakan, Veera Muangsin:
Using Peer-to-Peer Communication to Improve the Performance of Distributed Computing on the Internet. 295-298 - Tien-Chin Wang, Tsung-Han Chang, Tsung Hung Chen, Peter Wang:
Apply Incremental Classification for a P2P MOD System. 299-302 - Pedro Furtado:
Support for Efficiently Processing Complex Queries over a P2P Substrate. 303-306 - Yusong Lin, Binqiang Wang, Zongmin Wang:
MixCast: A New Group Communication Model in Large-Scale Network. 307-310 - Toshihiko Yamakami:
An Interoperability Design Model: Lessons Learned in Computer Communication Standardization. 311-314 - Yu-Ju Lin, Haniph A. Latchman, Jonathan C. L. Liu, Richard E. Newman:
Periodic Contention-Free Multiple Access for Power Line Communication Networks. 315-318
Performance Analysis and Optimization
- Hsun-Chang Chang, Kuan-Ching Li, Yaw-Ling Lin, Chao-Tung Yang, Hsiao-Hsi Wang, Liang-Teh Lee:
Performance Issues of Grid Computing Based on Different Architecture Cluster Computing Platforms. 321-324 - Rohan Samarasinghe, Yoshihiro Yasutake, Takaichi Yoshida:
Optimizing the Access Performance and Data Freshness of Distributed Cache Objects Considering User Access Pattern. 325-328 - Haijie Huang, Jianfei Cai:
Improving TCP Performance during Soft Vertical Handoff. 329-332 - Chao-Tung Yang, Po-Chi Shih, Kuan-Ching Li:
A High-Performance Computational Resource Broker for Grid Computing Environments. 333-336 - Chin-Fu Ku, Sao-Jie Chen, Jan-Ming Ho, Ray-I Chang:
Improving End-to-End Performance by Active Queue Management. 337-340 - Ren C. Luo, Liang Chao Tu, Ogst Chen:
An Efficient Dynamic Power Management Policy on Sensor Network. 341-344
Bandwidth Allocation and Physical Layer
- Chin-Chi Wu, Hsien-Ming Wu, Chia-Lung Liu, Woei Lin:
A DDRR-Based Scheduler to Achieve Proportional Delay Differentiation in Terabit Network. 347-350 - Yuzhao Li, Changxing Pei, Changhua Zhu, Jiandong Li:
An Algorithm for Discovering Physical Topology in Single Subnet IP Networks. 351-354 - Chia-Lung Liu, Woei Lin, Chin-Chi Wu:
Evaluation and Analysis of the Sliding-Window Parallel Packet Switch. 355-358 - Ding-Jyh Tsaur, Xian-Yang Lu, Chin-Chi Wu, Woei Lin:
3D-VOQ Switch Design and Evaluation. 359-362 - Chorng-Horng Yang, Jian-Wei Ruan:
On-Demand Routing for Bluetooth Scatternets Subject to Device Mobility. 363-366 - Jyh-Biau Chang, Tyng-Yeu Liang, Ce-Kuen Shieh:
Progressive Multilayer Reconfiguration for Software DSM Systems in Non-Dedicated Clusters. 367-370
Virtual World Communication and Video Object Detection
- Lain-Chyr Hwang, San-Yuan Wang, Steen J. Hsu, Yong-Hua Huang:
A New Scheduling Algorithm: Jumping Virtual Clock. 373-376 - Jui-Fa Chen, Wei-Chuan Lin, Hua-Sheng Bai, Shih-Yao Dai:
A Message Interchange Protocol Based on Routing Information Protocol in a Virtual World. 377-384 - Lawrence Y. Deng, Nick C. Tang, Dong-Liang Lee, Chin Thin Wang, Ming Chih Lu:
Vision Based Adaptive Traffic Signal Control System Development. 385-388 - Ching-Tang Hsieh, Yu-Shan Juan, Kuo-Ming Hung:
Multiple License Plate Detection for Complex Background. 389-392
Cryptographic and Security
- AbdelNasir Alshamsi, Takamichi Saito:
A Technical Comparison of IPSec and SSL. 395-398 - Chu-Hsing Lin, Wei Lee, Yi-Kang Ho:
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions. 399-402 - Ping Li, Yaping Lin:
A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms. 403-406 - Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata:
Development of Security Scanner with High Portability and Usability. 407-410 - Fan Hong, Xian Zhu, Shaobin Wang:
Delegation Depth Control in Trust-Management System. 411-414
Grid and Distributed Computing
- Sachio Mizuta, Runhe Huang:
Automation of Grid Service Code Generation with AndroMDA for GT3. 417-420 - Chao-Tung Yang, Shu-Tzu Tsai, Kuan-Ching Li:
Decision Tree Construction for Data Mining on Grid Computing Environments. 421-424 - Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida:
Theoretical Consideration of Adaptive Fault Tolerance Architecture for Open Distributed Object-Oriented Computing. 425-428 - Tomasz Müldner, Zhonghai Luo, Elhadi M. Shakshuki:
Distribution of Data and Remote Invocation of Programs. 429-432 - Pierre-Emmanuel Gros, Joan Hérisson, Nicolas Férey, Rachid Gherbi:
Combining Applications and Databases Integration Approaches in a Common Distributed Genomic Platform. 433-438 - Yih-Jiun Lee, Peter Henderson:
A Practical Modelling Notation for Secure Distributed Computation. 439-442
Information Networking and Applications I
- Pei-Yih Ting:
A Temporal Order Resolution Algorithm in the Multi-server Time Stamp Service Framework. 445-448 - Li-Chun Wang, Ching-Hao Lee:
A TCP-Physical Cross-Layer Congestion Control Mechanism for the Multirate WCDMA System Using Explicit Rate Change Notification. 449-452 - Rainfield Y. Yen, Hong-Yu Liu:
Symbol Error Probability for Rectangular M-QAM OFDM Transmission over Rayleigh Fading Channels. 453-456 - Savio S. H. Tse, Francis Chi-Moon Lau:
An Approximation Solution for the 2-Median Problem on Two-Dimensional Meshes. 457-460 - Mohsen Jahanshahi, K. Mostafavi, M. S. Kordafshari, Majid Gholipour, Abolfazl Toroghi Haghighat:
Two New Approaches for Orphan Detection. 461-464
Information Networking and Applications II
- Yi He, Yuhui Qiu, Guangyuan Liu, Kaiyou Lei:
A Parallel Tabu Search Approach Based on Genetic Crossover Operation. 467-470 - Fernando Tinetti, Walter J. Aróztegui, Antonio Quijano:
Sparse Equation Systems in Heterogeneous Clusters of Computers. 471-474 - Pi-Chung Wang, Yuan-Rung Yang, Chun-Liang Lee, Hung-Yi Chang:
A Memory-Efficient Huffman Decoding Algorithm. 475-479 - Ren-Der Lin, Wen-Shyen Chen:
Fast Calculation Algorithm of the Undetected Errors Probability of CRC Codes. 480-483 - Yueping Jin, Zhaohui Wu, ShuiGuang Deng, Zhen Yu:
Service-Oriented Workflow Model. 484-488
Information Networking and Applications III
- Toshihiro Shikama, Tadanori Mizuno:
Resequencing Schemes for Selective-Repeat ARQ and Their Performance. 491-494 - Chun-yan Gu, Hong-feng Yi, Kechu Yi, Li-jun Jin:
A Method of Inverse Filter Design Based on Cepstrum Measure. 495-498 - Hui-Feng Huang, Chin-Chen Chang:
A New Design for Efficient t-out-n Oblivious Transfer Scheme. 499-502 - Chien-Min Wang, Hsi-Min Chen, Gen-Cher Lee, Shun-Te Wang, Shyh-Fong Hong:
A Tree-Structured Persistence Server for Data Management of Collaborative Applications. 503-506 - Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi:
Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. 507-510 - Jin-Hau Kuo, Jen-Bin Kuo, Hsuan-Wei Chen, Ja-Ling Wu:
A Hierarchical and Multi-Model Based Algorithm for Lead Detection and News Program Narrative Parsing. 511-514
Smart Molecular Networks and Ubiquitous Media
- Shie-Ming Peng:
Molecular Metal Wires and Molecular Switches. 519 - Jhing-Fa Wang:
Advanced Ubiquitous Media for Creative Cyberspace. 520
Smart Object and Information Processing
- Naoki Shimizu, Riko Yagiu, Masashi Saito:
A Study of Information Services Based on Personal Belongings. 523-528 - Wai-Kwong Wing, Francis Chi-Moon Lau, Cho-Li Wang:
Smart Retrieval and Sharing of Information Resources Based on Contexts of User-Information Relationships. 529-534 - Chiung-Hon Leon Lee, Alan Liu:
Modeling the Query Intention with Goals. 535-540 - Minaz J. Parmar, Marios C. Angelides:
Human Readable Genetic Rules for Scene Boundary Detection. 541-546 - Qiangfu Zhao:
Design Smart NNTrees Based on the R4-Rule. 547-551 - Wei Chen, Zhaohui Wu, Xiang Wang:
Minimizing Memory Utilization of Task Sets in SmartOSEK. 552-558
Smart Environment and System
- Wei-Khing For, Xiaoming Bao, Woon-Seng Gan, See-Kiong Ng:
Reconfigurable Context-Sensitive Bio-Bridge Middleware for Smart Bio-Laboratories. 561-566 - Zixue Cheng, Shengguo Sun, Mizuo Kansen, Tongjun Huang, Aiguo He:
A Personalized Ubiquitous Education Support Environment by Comparing Learning Instructional Requirement with Learner's Behavior. 567-573 - Jianhua Ma, Bernady O. Apduhan, Laurence Tianruo Yang:
Smart Hyperspaces and Project Ubikids. 574-579 - HungPin Chao:
The Non-Specific Intelligent Guided-View System Based on RFID Technology. 580-585 - Aiguo He, Zixue Cheng, Tongjun Huang, Yue Zhao:
Pseudo-Surface Based Network Camera Smart Control. 586-590 - Dan Feng, Lingfang Zeng, Fang Wang, Lingjun Qin, Qun Liu:
Adaptive Policy Trigger Mechanism for OBSS. 591-595
Smart Networking and Protocol
- Mimoza Durresi, Arjan Durresi, Leonard Barolli:
Sensor Inter-Vehicle Communication for Safer Highways. 599-604 - Teruaki Yokoyama, Katsuyoshi Iida, Suguru Yamaguchi:
An Architecture of Network Imprinting for Personal but Wide Area Applications. 605-609 - Stephen Herborn, Roksana Boreli, Aruna Seneviratne:
Identity Location Decoupling in Pervasive Computing Networks. 610-615 - Mamatha Nanjundaiah, Vipin Chaudhary:
Improvement to the Anticollision Protocol Specification for 900MHz Class 0 Radio Frequency Identification Tag. 616-620 - Junichiro Saito, Kouichi Sakurai:
Grouping Proof for RFID Tags. 621-624 - Satoshi Kawanami, Takeshi Nishimura, Tomoya Enokido, Makoto Takizawa:
A Scalable Group Communication Protocol with Global Clock. 625-630
Smart Service Sociality and Privacy
- George Yee:
Using Privacy Policies to Protect Privacy in UBICOMP. 633-638 - Guozhen Zhang, Qun Jin, Man Lin:
A Framework of Social Interaction Support for Ubiquitous Learning. 639-643 - Yingpeng Sang, Hong Shen:
A Scheme for Testing Privacy State in Pervasive Sensor Networks. 644-648 - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. 649-654 - Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai:
Trends and Issues for Security of Home-Network Based on Power Line Communication. 655-660 - Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang:
Personal Firewall for Pocket PC 2003: Design & Implementation. 661-666
Web and Mobile Information Systems I
- Yih-Ling Hedley, Muhammad Younas, Anne E. James:
The Categorisation of Hidden Web Databases through Concept Specificity and Coverage. 671-376 - Irfan-Ullah Awan, Yue Li, Demetres D. Kouvatsos:
Performance Analysis Mobility Management in Heterogeneous Wireless Networks. 677-682 - Shuchih Ernest Chang:
The Design of a Secure and Pervasive Multimodal Web System. 683-688 - Aláa Qasim Al-Namiy, Faris S. Majeed:
Improving Query Answering in Peer-to-Peer Data Searching. 689-694 - Eric Pardede, J. Wenny Rahayu, David Taniar:
Preserving Composition in XML Object Relational Storage. 695-700 - Ing-Xiang Chen, Chun-Lin Fan, Pang-Hsiang Lo, Li-Chia Kuo, Cheng-Zen Yang:
ISWIVE: An Integrated Semantic Web Interactive Visualization Environment. 701-706
Web and Mobile Information Systems II
- Shih-Chun Chou, Wen-Tai Hsieh, Fabien L. Gandon, Norman M. Sadeh:
Semantic Web Technologies for Context-Aware Museum Tour Guide Applications. 709-714 - Kuo-Ming Chao, Muhammad Younas, Chi-Chun Lo, Tao-Hsin Tan:
Fuzzy Matchmaking for Web Services. 721-726 - Hui-Na Chua, Simon D. Scott, Y. W. Choi, Peter Blanchfield:
Web-Page Adaptation Framework for PC & Mobile Device Collaboration. 727-732 - S. M. F. D. Syed Mustapha:
Extracting Social Knowledge in the Intelligent Conversational Channel for Agent Communication. 733-738 - Elhadi M. Shakshuki, Saad Abu-Draz:
Agent-Mediated e-Commerce System. 739-744
Web and Mobile Information Systems III
- Ziming Zhuang:
iHITS: Extending HITS for Personal Interests Profiling. 747-751 - Nor Adnan Yahaya, Goh Poh Gin, Wai-Choon Chan:
Developing Innovative Web Information Systems through the Use of Web Data Extraction Technology. 752-757 - Toshihiko Yamakami:
A 2-Dimensional Evolution Model of Value-Added Mobile Internet Services. 758-761 - Vincent Shin-Mu Tseng, Kawuu Weicheng Lin:
Mining Sequential Mobile Access Patterns Efficiently in Mobile Web Systems. 762-767 - Elhadi M. Shakshuki, Ivan Tomek, Omkarnath Prabhu:
Agent Frameworks in FCVW. 768-773 - Behzad Bordbar, Rachid Anane:
An Architecture for Automated QoS Resolution in Wireless Systems. 774-779
IPv6 Technology and Deployment I
- Gabriel López Millán, Félix J. García Clemente, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks. 785-789 - Yen-Wen Chen, Ji-Min Shih:
Binding Updates for Mobile Networks by Using Multicast Mechanism in IPv6 Environment. 790-795 - Mingshou Liu, Cheng-Hsien Hsu, Shi-Hong Kuo, Hsang-Chi Tsai:
An IPv6 Enabled Packet Engine Design for Home/SOHO Routers. 796-800 - Guillaume Chelius, Eric Fleury, Laurent Toutain:
No Administration Protocol (NAP) for IPv6 Router Auto-Configuration. 801-806 - Chiung-Ying Wang, Cheng-Ying Li, Ren-Hung Hwang, Yuh-Shyan Chen:
Global Connectivity for Mobile IPv6-Based Ad Hoc Networks. 807-812 - Shiang-Ming Huang, Quincy Wu, Yi-Bing Lin:
Tunneling IPv6 through NAT with Teredo Mechanism. 813-818 - Whai-En Chen, Chia-Yung Su, Jui-Hung Weng:
Development of IPv6-IPv4 Translation Mechanisms for SIP-Based VoIP Applications. 819-823
IPv6 Technology and Deployment II
- Jenq-Muh Hsu, Chian-Fei Hsu, Chung-Ming Huang:
Design of an IPv6 SOHO Router Based on Embedded Linux System. 827-832 - Satoshi Doi, Shingo Ata, Hiroshi Kitamura, Masayuki Murata:
Design, Implementation and Evaluation of Routing Protocols for IPv6 Anycast Communicatio. 833-838 - Satoshi Matsunaga, Shingo Ata, Hiroshi Kitamura, Masayuki Murata:
Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SM. 839-844 - Shu-Fen Tseng, Hsi-Chieh Lee, Te-Ching Kung, Shou-Lien Chou, Jing-Yi Chen:
The Development of Global IPv6 Products: An Exploration. 845-850 - Rafael Marín López, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios. 851-855 - Eduardo Jacob, Juan José Unzilla, Maria Victoria Higuero, Purificación Sáiz, Marina Aguado, Christian Pinedo:
A Dual (IP4/IPv6) "Durable Storage" Commercial Service. 856-861
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.