default search action
23rd AINA 2009: Bradford, United Kingdom
- Irfan Awan, Muhammad Younas, Takahiro Hara, Arjan Durresi:
The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3638-5
Keynote Speeches
- Erol Gelenbe:
Improving QoS through Network Real-Time Measurement and Self-Adaption. 1 - Alessandro Campi, Georg Gottlob, Ben Hoye:
Wormholes of Communication: Interfacing Virtual Worlds and the Real World. 2-9 - Elisa Bertino, Michael S. Kirkpatrick:
Location-Aware Authentication and Access Control. 10-15
Performance Modelling and Evaluation 1
- Matthew Faulkner, Andrew Brampton, Stephen Pink:
Evaluating the Performance of Network Protocol Processing on Multi-core Systems. 16-23 - Xuan Wang, Katerina Goseva-Popstojanova:
Modeling Web Request and Session Level Arrivals. 24-32 - Simon D. Hammond, J. A. Smith, Gihan R. Mudalige, Stephen A. Jarvis:
Predictive Simulation of HPC Applications. 33-40 - Vashti Galpin:
Modelling Network Performance with a Spatial Stochastic Process Algebra. 41-49
Routing and Broadcast Mechanisms
- Ling-Jyh Chen, Che-Liang Chiou, Yi-Chao Chen:
An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks. 50-57 - Sasitharan Balasubramaniam, Dmitri Botvich, Julien Mineraud, William Donnelly:
Parameterised Gradient Based Routing (PGBR) for Future Internet. 58-65 - Nak Beom Sung, Kyung Tae Kim, Sun Sik Park, Hee Yong Youn:
A New Counting Scheme for Multicast Broadcast Service with WiBro. 66-73 - Mukul Goyal, Mohd Soperi, Seyed Hossein Hosseini, Kishor S. Trivedi, Aman Shaikh, G. Choudhury:
Analyzing the Hold Time Schemes to Limit the Routing Table Calculations in OSPF Protocol. 74-81
Distributed and Parallel Systems
- Jian (Denny) Lin, Albert M. K. Cheng, Rashmi Kumar:
Real-Time Task Assignment in Heterogeneous Distributed Systems with Rechargeable Batteries. 82-89 - Shin Tezuka, Hiroko Tomori, Ryuya Uda, Ken-ichi Okada:
Distributed Secure Virtual File System Using Hysteresis Signatures. 90-97 - Mahmoud Moadeli, Partha P. Maji, Wim Vanderbauwhede:
Quarc: A High-Efficiency Network on-Chip Architecture. 98-105 - Jason B. Ernst, Mieso K. Denko:
Fair Scheduling with Multiple Gateways in Wireless Mesh Networks. 106-112
Service Oriented Architecture
- Florian Daniel, Fabio Casati, Vincenzo D'Andrea, Emmanuel Mulo, Uwe Zdun, Schahram Dustdar, Steve Strauch, David Schumm, Frank Leymann, Samir Sebahi, Fabien De Marchi, Mohand-Said Hacid:
Business Compliance Governance in Service-Oriented Architectures. 113-120 - Tim Dörnemann, Markus Mathes, Roland Schwarzkopf, Ernst Juhnke, Bernd Freisleben:
DAVO: A Domain-Adaptable, Visual BPEL4WS Orchestrator. 121-128 - Michael Koch, Markus Hillenbrand, Paul Müller:
A Generic Database Web Service for the Venice Service Grid. 129-136 - Uwe Kylau, Ivonne Thomas, Michael Menzel, Christoph Meinel:
Trust Requirements in Identity Federation Topologies. 137-145
Agents and Trust Management
- Babak Khosravifar, Jamal Bentahar, Maziar Gomrokchi, Philippe Thiran:
Combined On-line and Off-line Trust Mechanism for Agent Computing. 146-153 - Varsha Sainani, Mei-Ling Shyu:
A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection Systems. 154-161 - Farah Layouni, Yann Pollet:
An Ontology-Based Architecture for Federated Identity Management. 162-166 - Arjan Durresi, Mimoza Durresi, Vamsi Paruchuri, Leonard Barolli:
Trust Management in Emergency Networks. 167-174
Video Communication Technology
- Yoong Choon Chang, Sze Wei Lee, Ryoichi Komiya:
An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video Transmission. 175-181 - Jiao Feng, Xuefen Chi, Peng Li, Yining Wang, Lin Guan:
Adaptive FEC Algorithm Based on Prediction of Video Quality and Bandwidth Utilization Ratio. 182-188 - Dario Gallucci, Attilio Fiandrotti, Enrico Masala, Juan Carlos De Martin:
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks. 189-196 - Ahmed B. Abdurrhman, Michael E. Woodward:
Heterogeneous Error Protection of H.264/AVC Video Using Hierarchical 16-QAM. 197-200
Communication Technology and Protocols 1
- Wei Lin, Baoming Bai, Ying Li, Xiao Ma:
Design of q-ary Irregular Repeat-Accumulate Codes. 201-206 - Yuan-Hua Liu, Xinmei Wang, Jian-Hua Ma:
Design of Quasi-Cyclic LDPC Codes Based on Euclidean Geometries. 207-211 - Yongqiang Hei, Xiaohui Li, Kechu Yi, Wentao Li:
Multi-user MIMO Broadcast System Grouping Strategy Based on Particle Swarm Optimization. 212-216 - Rafe Khalaf Alasem, M. Alamgir Hossain, Irfan Awan, Hussein Mansour:
ANFIS Based AQM Controller for Congestion Control. 217-224
Autonomic and Advanced Network Systems
- Anders Nickelsen, Jesper Grønbæk, Thibault Renier, Hans-Peter Schwefel:
Probabilistic Network Fault-Diagnosis Using Cross-Layer Observations. 225-232 - Daniel C. Uchôa, Samuel Kopp, Hélcio M. Pimentel, Reinaldo Matushima, Regina Melo Silveira:
An Overlay Application-Layer Multicast Infrastructure. 233-240 - Satoshi Ohzahata, Konosuke Kawashima:
A Measurement Study on Peer Behaviors for a Pure P2P Network. 241-248 - Katsuyoshi Matsumoto, Minoru Uehara:
N-nary RAID: 3-resilient RAID Based on an N-nary Number. 249-255
Internet Computing and Applications
- Xing Zhou, Thomas Dreibholz, Fu Fa, Wencai Du, Erwin P. Rathgeb:
Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling Systems. 256-262 - Yeim-Kuan Chang, Yen-Cheng Liu, Fang-Chen Kuo:
A Pipelined IP Forwarding Engine with Fast Update. 263-269 - Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong, Ping Yang, Nazreen Beevi:
DINCast: Optimizing Application-Level Shared-Tree Multicast. 270-277 - Yeim-Kuan Chang, Yung-Chieh Lin:
A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-Tree. 278-284
Ad Hoc and Sensor Networks
- Ibrahim Amadou, Pascale Minet:
Optimized Broadcast in a Geographical Area of Wireless Ad Hoc and Sensor Networks. 285-292 - Lyes Dekar, Hamamache Kheddouci:
A Resource Discovery Scheme for Large Scale Ad Hoc Networks Using a Hypercube-Based Backbone. 293-300 - Wei Feng, Hamada Alshaer, Jaafar M. H. Elmirghani:
Energy Efficiency: Optimal Transmission Range with Topology Management in Rectangular Ad-hoc Wireless Networks. 301-306 - Leonard Barolli, Makoto Ikeda, Giuseppe De Marco, Arjan Durresi, Fatos Xhafa:
Performance Analysis of OLSR and BATMAN Protocols Considering Link Quality Parameter. 307-314
Performance Modelling and Evaluation 2
- Mahmoud Moadeli, Wim Vanderbauwhede:
A Communication Model of Broadcast in Wormhole-Routed Networks on-Chip. 315-322 - Ritesh K. Taank, Xiaohong Peng:
An Experimental Evaluation of Sender-Side TCP Enhancements for Wired-to-Wireless Paths: A Real-World Home WLAN Case Study. 323-330 - Jie Wang, Lin Guan, Xin Gang Wang, Alan Grigg, Irfan Awan, Iain W. Phillips, Xuefen Chi:
QoS Enhancements and Performance Analysis for Delay Sensitive Applications. 331-338 - Cherif Ghazel, Leïla Azouz Saïdane:
An Efficient Admission Control Methodology for Satisfying QoS Requirements in NGN Networks. 339-346
Privacy and Trust Management
- Jaideep Vaidya:
A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming. 347-354 - Laurent Gomez, Annett Laube, Alessandro Sorniotti:
Trustworthiness Assessment of Wireless Sensor Data for Business Applications. 355-362 - Hisham Dahshan, James Irvine:
Key Management in Web of Trust for Mobile Ad Hoc Networks. 363-370 - Roberto G. Cascella:
Enabling Fast Bootstrap of Reputation in P2P Mobile Networks. 371-378
Quality of Service in Web Services
- Vuong Xuan Tran, Hidekazu Tsuji:
A Survey and Analysis on Semantics in QoS for Web Services. 379-385 - Yizhu Tong, Hao Wang, Taoying Liu:
Exploiting Request Characteristics to Improve Performance of Web Services Based Business Applications. 386-393 - George Anadiotis, Spyros Kotoulas, Holger Lausen, Ronny Siebes:
Massively Scalable Web Service Discovery. 394-402 - Zakaria Maamar, Samir Tata, Djamel Belaïd, Khouloud Boukadi:
Towards an Approach to Defining Capacity-Driven Web Service. 403-410
Workflows and Reliability in Grid Computing
- Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su:
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA. 411-418 - Henrik Thostrup Jensen, Josva Kleist:
A Highly Available Grid Metadata Catalog. 419-426 - Feilong Tang, Minyi Guo, Minglu Li, Li Li:
Transaction Management for Reliable Grid Applications. 427-434 - Suraj Pandey, William Voorsluys, Mustafizur Rahman, Rajkumar Buyya, James E. Dobson, Kenneth Chiu:
Brain Image Registration Analysis Workflow for fMRI Studies on Global Grids. 435-442
Mobile Networks and Applications
- Atsushi Noda, Teruaki Kitasuka, Shigeaki Tagashira, Tsuneo Nakanishi, Akira Fukuda:
Name Resolution Middleware Using Relative Positional Relationship to Support Wireless Visible Area Communication. 443-450 - Mun J. Lok, Bilal R. Qazi, Jaafar M. H. Elmirghani:
Data Dissemination with Drop Boxes. 451-455 - Joon-Suk Kang, Motoyuki Ohmori, Koji Okamura:
A Proposal to Enhance and Control Continuous Communications in Proxy Mobile IPv6. 456-462 - Okan Yilmaz, Ing-Ray Chen:
Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless Networks. 463-470
Multimedia Systems and Applications
- Adel Almohammad, Gheorghita Ghinea, Robert M. Hierons:
JPEG Steganography: A Performance Evaluation of Quantization Tables. 471-478 - Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa:
Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia Objects. 479-486 - Marcos A. Simplício Jr., Vlad Coroama, Yeda Regina Venturini, Tereza Cristina M. B. Carvalho, Mats Näslund, Makan Pourzandi:
PHD. 487-494 - Hirokazu Miyata, Ryuya Uda, Ken-ichi Okada:
The Efficiency Method of Sanitizable Signature Scheme for SMF. 495-502
Pervasive and Ubiquitous Computing
- Amel Bouzeghoub, Kien Ngoc Do, Leandro Krug Wives:
Situation-Aware Adaptive Recommendation to Assist Mobile Users in a Campus Environment. 503-509 - Elhadi M. Shakshuki, Tarek R. Sheltami, Nan Kang, Xinyu Xing:
Tracking Anonymous Sinks in Wireless Sensor Networks. 510-516 - Hyun Lee, Jae Sung Choi, Ramez Elmasri:
Sensor Data Fusion Using DSm Theory for Activity Recognition under Uncertainty in Home-Based Care. 517-524 - Maria-Teresa Segarra, Françoise André:
A Distributed Dynamic Adaptation Model for Component-Based Applications. 525-529
Security 1: Intrusion Detection Systems
- Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann:
Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks. 530-538 - Safaa Zaman, Fakhri Karray:
Fuzzy ESVDF Approach for Intrusion Detection Systems. 539-545 - Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long Ni, Shou-Hsuan Stephen Huang:
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. 546-551 - Han-Ching Wu, Shou-Hsuan Stephen Huang:
Masquerade Detection Using Command Prediction and Association Rules Mining. 552-559
Wireless Sensor Networks 1
- Yasuhiro Nose, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
Route Construction Based on Measured Characteristics of Radio Propagation in Wireless Sensor Networks. 560-567 - Mohammad Baharloo, Reza Hajisheykhi, Mohammad Arjomand, Amir-Hossein Jahangir:
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol. 568-571 - Soochang Park, Euisin Lee, Fucai Yu, Min-Sook Jin, Sang-Ha Kim:
Information Communication Mechanism for Loosely Coupled Mobile User Groups in Wireless Sensor Fields. 572-579 - Elhadi M. Shakshuki, Haroon Malik, Tarek R. Sheltami:
Lessons Learned: Simulation Vs WSN Deployment. 580-587
Security 2: New Languages and Systems
- Nikolaos Chatzis, Nevil Brownlee:
Similarity Search over DNS Query Streams for Email Worm Detection. 588-595 - Mohamed Hamdi, Nejla Essaddi, Noureddine Boudriga:
ReAlSec: A Relational Language for Advanced Security Engineering. 596-601 - Yosuke Sato, Koji Hashimoto, Yoshitaka Shibata:
A New Video Surveillance Video Tracking System Based on Omni-directional and Network Controlled Cameras. 602-607 - Yuna Kim, Jong Kim, Junghei You, Heejae Park:
Exclusion of Forged Files from Multi-source Downloadable P2P Systems. 608-615
Scheduling and Routing Schemes
- Ying-Hong Wang, Kuo-Feng Huang, Cheng-Yi Le:
Packet Scheduling Algorithm with QoS Provision in HSDPA. 616-623 - Ki-seok Lee, Cheeha Kim:
A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc Networks. 624-631 - Markus Aleksy, Thomas Butter:
Privacy-Aware Routing Approach for Mobile Applications. 632-637 - Dechun Sun, Kechu Yi, Xiaohui Li:
A New Space Time Cooperative Diversity Scheme Based on Simple Feedback. 638-643
Interaction in Web Services
- Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Khouloud Boukadi, Xitong Li:
On the Synchronization of Web Services Interactions. 644-651 - Yehia Taher, Ali Aït-Bachir, Marie-Christine Fauvet, Djamal Benslimane:
Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of Adapters. 652-659 - Juan Li:
Building Distributed Index for Semantic Web Data. 660-667
Security 3: Authentication and Access Control
- Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:
Advantages of User Authentication Using Unclear Images. 668-674 - Joseph Chee Ming Teo, Lek Heng Ngoh, Huaqun Guo:
An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks. 675-682 - Prashant Pillai, Yim-Fun Hu:
IGMPx: Port Based Service Access Control for IP Multicast. 683-690 - Eduardo Horowitz, Luís C. Lamb:
A Hierarchical Model for Firewall Policy Extraction. 691-698
WLAN, RFID and OFDM Systems
- Yonghwan Kim, Sungsoo Kim, Seongjoon Lee, Kwangseon Ahn:
Improved 4-ary Query Tree Algorithm for Anti-Collision in RFID System. 699-704 - Xia Wang, Shihua Zhu:
Mitigation of Intercarrier Interference Based on General Precoder Design in OFDM Systems. 705-710 - Suhaimi Bin Abd Latif, Mohammed A. Rashid, Fakhrul Alam:
An Analytical Model for MAC Protocol Configuration in WLAN. 711-718
Networks: Scalibility, Survivability, and Recovery
- Isaac Woungang, Guangyan Ma, Mieso K. Denko, Alireza Sadeghian, Sudip Misra, Alexander Ferworn:
Survivability in Existing ATM-Based Mesh Networks. 719-724 - Saleem N. Bhatti, Martin Bateman:
Effects of On-path Buffering on TCP Fairness. 725-732 - Marta Beltrán, Antonio Guzmán, Fernando Sevillano:
Scalability Analysis to Optimize a Network on Chip. 733-740 - Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan, Maytham Safar, Marina L. Gavrilova:
Network Voronoi Diagram Based Range Search. 741-748
Wireless Sensor Networks 2
- Nobutoshi Abe, Norihiko Shinomiya, Yoshimi Teshigawara:
Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic Sensors. 749-757 - Hosung Park, Taehee Kim, Jeongcheol Lee, Min-Sook Jin, Sang-Ha Kim:
Sink Location Service via Inner Rectangular in Wireless Sensor Networks. 758-762 - Nok Hang Mak, Winston Khoon Guan Seah:
How Long is the Lifetime of a Wireless Sensor Network?. 763-770 - Pedro N. E. S. Barbosa, Neil M. White, Nick R. Harris:
Medium Access Control in Large Scale Clusters for Wireless Sensor Networks. 771-777
Web Technology and Applications
- Hon Wai Lam, Chen Wu:
Finding Influential eBay Buyers for Viral Marketing. 778-785 - D. R. W. Holton, Irfan-Ullah Awan, Muhammad Younas:
Priority Scheduling of Requests to Web Portals. 786-791 - Rei Endo, Kenji Takagi, Hiroshi Shigeno:
GBLT: Load Distribution Method for High Density by User Behavior in MMO Virtual Environment. 792-799 - Keita Matsuo, Leonard Barolli, Fatos Xhafa, Vladi Kolici, Akio Koyama, Arjan Durresi, Rozeta Miho:
Implementation of an E-learning System Using P2P, Web and Sensor Technologies. 800-807
Recovery and Fault Tolerance
- Ailixier Aikebaier, Valbona Barolli, Tomoya Enokido, Makoto Takizawa:
Recoverable Cuts to Make Agreement among Peers. 808-815 - Yoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba, Kazuo Takahata:
A New Ballooned Wireless Mesh Network System for Disaster Use. 816-821 - Omar Khadeer Hussain, Tharam S. Dillon, Elizabeth Chang, Farookh Khadeer Hussain:
Determining the Net Financial Risk for Decision Making in Business Interactions. 822-829 - Yan Yang, Samia Souissi, Xavier Défago, Makoto Takizawa:
Fault-Tolerant Flocking of Mobile Robots with Whole Formation Rotation. 830-837
Security 4: Architectures and Protocols
- Thomas Badura, Michael Becher:
Testing the Symbian OS Platform Security Architecture. 838-844 - Tomoya Enokido, S. Misbah Deen, Makoto Takizawa:
A Protocol for Releasing Purpose Marks to Prevent Illegal Information Flow. 845-852 - Akira Yamada, Yutaka Miyake, Masahiro Terabe, Kazuo Hashimoto, Nei Kato:
Anomaly Detection for DNS Servers Using Frequent Host Selection. 853-860 - Rongfei Zeng, Chuang Lin, Hongkun Yang, Yuanzhuo Wang, Yang Wang, Peter D. Ungsunan:
A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis. 861-867
Grid and P2P Computing
- Akihiro Iwamaru, Tsuyoshi Itokawa, Teruaki Kitasuka, Masayoshi Aritsugi:
Introducing Group Participation Support into P2P Web Caching Systems. 868-875 - David Antos, Ludek Matyska, Petr Holub, Jirí Sitera:
VirtCloud: Virtualising Network for Grid Environments. 876-883 - Po-Cheng Chen, Jyh-Biau Chang, Jia-Hao Yang, Yi-Chang Zhuang, Ce-Kuen Shieh:
Spigot: Fragment-Level File Sharing and Consistency on Grids. 884-891 - Huey-Ing Liu, Bing-Rong Tang:
DACA: Dynamic Anti-Cheating Architecture for MMOGs. 892-897
Wireless Sensor Networks 3
- Quan Le Trung, Amirhosein Taherkordi, Frank Eliassen, Hai Ngoc Pham, Tor Skeie, Paal E. Engelstad:
DCM-Arch: An Architecture for Data, Control, and Management in Wireless Sensor Networks. 898-905 - Ryouhei Kawano, Toshiaki Miyazaki:
Effective Sensing Function Allocation Using a Distributed Graph Coloring and a Slot Allocation Algorithm in Wireless Sensor Networks. 906-913 - William A. Lintz, John C. McEachen, Murali Tummala:
A Method for Determining Weight Reset Timing in a Wirelessly Networked Array with Independently Mobile Elements. 914-920 - Dawn Rohm, Mukul Goyal, Seyed Hossein Hosseini, August Divjak, Yusuf Bashir:
Configuring Beaconless IEEE 802.15.4 Networks Under Different Traffic Loads. 921-928
Distributed Databases and Data Mining
- Shigeaki Sakurai, Hideki Tsutsui, Ryohei Orihara:
Classification of Bloggers Using Social Annotations. 929-936 - Helen X. Xiang:
Supporting Complex Scientific Database Schemas in a Grid Middleware. 937-944 - Marwan Alseid, Dimitrios Rigas:
Utilising Multimodal Interaction Metaphors in E-learning Applications: An Experimental Study. 945-950 - Takuro Horie, Go Hasegawa, Satoshi Kamei, Masayuki Murata:
A New Method of Proactive Recovery Mechanism for Large-Scale Network Failures. 951-958
Communication Technology and Protocols 2
- Ruen Chze Loh, Sieteng Soh, Mihai M. Lazarescu:
An Approach to Find Maximal Disjoint Paths with Reliability and Delay Constraints. 959-964 - In-Su Yoon, Sang-Hwa Chung, Jeong-Soo Kim:
Implementation of Lightweight TCP/IP for Small, Wireless Embedded Systems. 965-970 - Melissa Tjiong, Johan Lukkien:
On the False-Positive and False-Negative Behavior of a Soft-State Signaling Protocol. 971-979
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.