default search action
6. ICN 2007: Sainte-Luce, Martinique, France
- Sixth International Conference on Networking (ICN 2007), 22-28 April 2007, Sainte-Luce, Martinique, France. IEEE Computer Society 2007, ISBN 978-0-7695-2805-2
Wireless I
- Bartosz Wietrzyk, Milena Radenkovic:
Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals. 1 - Reza Shokri, Maysam Yabandeh, Nasser Yazdani:
Anonymous Routing in MANET Using Random Identifiers. 2 - Tibor Gyires:
Traffic Engineering in Fourth Generation Wireless Networks. 3 - Md. Junayed Islam, Muhidul Islam, Nazrul Islam:
A-sLEACH: An Advanced Solar Aware Leach Protocol for Energy Efficient Routing in Wireless Sensor Networks. 4 - Zhiwei Zhao, Xinming Zhang, Peng Sun, Pengxi Liu:
A Transmission Power Control MAC Protocol for Wireless Sensor Networks. 5 - Wei Yang, Yang Wei:
On the Performance of V-BLAST Detectors in MIMO MT-CDMA Uplink over Multipath Fading Channel. 6
Wireless II
- Weiwei Fang, Yi Liu, Depei Qian:
EDDS: An Efficient Data Delivery Scheme for Address-Free Wireless Sensor Networks. 7 - Dong Shi, Xinming Zhang, Xuemei Gao, Wenbo Zhu, Fengfu Zou:
A Link Reliability-Aware Route Maintenance Mechanism for Mobile Ad Hoc Networks. 8 - Pengxi Liu, Xinming Zhang, Shuang Tian, Zhiwei Zhao, Peng Sun:
A Novel Virtual Anchor Node-Based Localization Algorithm for Wireless Sensor Networks. 9 - Paul Barom Jeon, George Kesidis:
GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks. 10 - Norbert Jordan, Alexander Poropatich, Peter Reichl:
Simulative Considerations for Future 4G Hierarchical Mobility Management in All-IP Networks. 11 - Bing Liu, Lin Zhang, Huimin Zhang:
An Adaptive Schedule Medium Access Control for Wireless Sensor Networks. 12
Wireless III
- Wei Yang, Ying Huang:
Wireless Sensor Network Based Coal Mine Wireless and Integrated Security Monitoring Information System. 13 - Robert Bestak:
Influence of Release Timer on MAC-hs Performance. 14 - Gugulothu Narsimha, A. Venugopal Reddy, S. S. V. N. Sarma:
The Effective Multicasting Routing Protocol in Wireless Mobile Adhoc Network. 15 - Sandhya Khurana, Neelima Gupta, Nagender Aneja:
Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET). 16 - Pavel Mach, Robert Bestak:
WiMAX Performance Evaluation. 17 - Ahmed M. Mahdy, Jitender S. Deogun, Jun Wang:
A Dynamic Approach for the Selection of Super Peers in Ad Hoc Networks. 18
Wireless IV
- Matthias R. Brust, Steffen Rothkugel:
Localized Support for Injection Point Election in Hybrid Networks. 19 - Leila Boukhalfa, Pascale Minet, Serge Midonnet:
QoS Support in a MANET Based on OLSR and CBQ. 20 - Dewan Tanvir Ahmed, Shervin Shirmohammadi:
Architectural Analysis of Multicast Routing Protocols for Wireless Ad Hoc Networks. 21 - Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadaris:
Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access Networks. 22 - Xiang Yu, Xinming Zhang, Can Que, Qiong Liu:
A Practical Low Interference Topology Control for Mobile Ad Hoc Networks. 23
Wireless V
- Trishla Sutaria, Imad Mahgoub, Ali Humos, Ahmed Badi:
Implementation of an Energy Model for JiST/SWANS Wireless Network Simulator. 24 - Matthias R. Brust, Steffen Rothkugel:
A Taxonomic Approach to Topology Control in Ad Hoc and Wireless Networks. 25 - Dewan Tanvir Ahmed, Shervin Shirmohammadi:
Design Issues of Peer-to-Peer Systems for Wireless Ad Hoc Networks. 26 - Hung-Cuong Le, Hervé Guyennet, Noureddine Zerhouni:
A New Contention Access Method for Collision Avoidance in Wireless Sensor Networks. 27 - Zhiming Zhang, Weirong Jiang, Yibo Xue:
A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks. 28
P2P
- Seung Chul Han, Ye Xia:
Optimal Leader Election Scheme for Peer-to-Peer Applications. 29 - Huanan Zhang, Jinfeng Hu, Chunhui Hong, Dongsheng Wang:
Tourist: Self-Adaptive Structured Overlay. 30 - Xuelian Lin, Jinpeng Huai, Xudong Liu, Jun Han:
Active Peer to Peer. 31 - Om Vikas, Nitin J. Chiluka, Purushottam K. Ray, Girraj Meena, Akhil K. Meshram, Amit Gupta, Abhishek Sisodia:
WebMiner--Anatomy of Super Peer Based Incremental Topic-Specific Web Crawler. 32 - Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhiro Matsuda:
Ring-Based Virtual Private Network Supporting a Large Number of VPNs. 33
QoS/Reliability I
- Tomoyoshi Fukuta, Hiroshi Masuyama, Toshihiko Sasama:
Hierarchical System-Level Diagnosis Based on a Voting Scheme for Identical-Unit-Interconnection Systems. 34 - Andrew P. Snow, Gary R. Weckman:
What Are the Chances an Availability SLA will be Violated? 35 - Linhua Zhong, Jin Xu, Xianlei Wang:
VWQGRR: A Novel Packet Scheduler. 36 - Alex Vallejo, Agustín Zaballos, Jaume Abella, Josep M. Selga, Carles Duz:
Performance of a Policy-Based Management System in IPv6 Networks Using COPS-PR. 37 - Anna Shklyaeva, David Kubánek, Vit Novotny:
Analysis of IEEE 802.11e for Delay Sensitive Traffic in Wireless LANs. 38
QoS/Reliability II
- Sandrine Duflos, Brigitte Kervella, Valérie Gay:
Considering Security and Quality of Service in SLS to Improve Policy-Based Management of Multimedia Services. 39 - Mostafa Shaad Zolpirani, Mohammad-Mahdi Bidmeshki, Seyed Ghassem Miremadi:
Improving Network's Performability Using Parallel Processing. 40 - Yoshinori Kitatsuji, Satoshi Katsuno, Masato Tsuru, Tetsuya Takine, Yuji Oie:
Traffic Characteristics-Based Flow Assignment Method for Reducing Queuing Delay. 41 - M. Shamim Hossain, Abdulmotaleb El-Saddik:
Proxy-Based Visual Content Repurposing Using Selection Algorithm. 42
Management I
- Marc Cheboldaeff:
Interactions between a Mobile Virtual Network Operator and External Networks with Regard to Service Triggering. 43 - Birger Tödtmann, Erwin P. Rathgeb:
Integrated Management of Distributed Packet Filter Configurations in Carrier-Grade IP Networks. 44 - José Soler, Michael Gandy:
Personalized Home-Networks. 45 - Gaogang Xie, Jianhua Yang, Valérie Issarny, Alberto Conte:
An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link. 46 - Sartaj Sahni, Nageswara S. V. Rao, Sanjay Ranka, Yan Li, Eun-Sung Jung, Nara Kamath:
Bandwidth Scheduling and Path Computation Algorithms for Connection-Oriented Networks. 47
Management II
- Alexandre Mateus, Pedro Ferreira:
Inefficiency from Provisioning the Internet Selfishly. 48 - Sven Ubik, Demetres Antoniades, Arne Øslebø:
ABW - Short-Timescale Passive Bandwidth Monitoring. 49 - Edmund Smith, Paul Anderson:
Toward Broad-Spectrum Autonomic Management. 50 - Sebastien Linck, Eugen Dedu, François Spies:
Distance-Dependent RED Policy (DDRED). 51 - Jun Lv, Xing Li, Tong Li:
The New Detection Algorithms for Network Traffic Anomalies. 52
Management III
- Hylke W. van Dijk, Hans Scholten, Alvaro Tobalina, Victor Garcia Munoz, Stephane Milanini, Antonio Kung:
Open Home Networks: The TEAHA Approach. 53 - Anahita Gouya, Noël Crespi:
Service Broker for Managing Feature Interactions in IP Multimedia Subsystem. 54 - Vladimir S. Zaborovsky, Andrey Rudskoy, Alex Sigalov:
Network Traffic Invariant Characteristics: Metering Aspects. 55
Management IV
- Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. 56 - Karim Mohammed Rezaul, Vic Grout:
CoLoRaDe: A Novel Algorithm for Controlling Long-Range Dependent Network Traffic. 57 - Leszek Koszalka:
The Choice of Mesh Structure in Computer Networks. 58 - Miroslav Svéda, Radimir Vrba:
Dependability-Driven Embedded Systems Networking. 59
Communication Theory I
- Hakima Mellah, Salima Hassas, I. Halilali, Z. Mesneb, Habiba Drias:
Towards a Self Organizing Protocol for a Multi Agents System (MASSOP). 60 - Vaclav Dvorak, Jirí Jaros, Milos Ohlídal:
Optimum Topology-Aware Scheduling of Many-to-Many Collective Communications. 61 - Bingfeng Zhang, Weihong Zhu, Zhenming Gao:
System Capacity of Filtered Multitone Modulation. 62 - Xuelan Zou, Guangzeng Feng:
Performance Comparison of Iterative Decoding Algorithm Using the Extrinsic Information Transfer Chart. 63
Communication Theory II
- Li Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li:
Empirical Study on the Evolution of PlanetLab. 64 - Hanxun Zhou, Yingyou Wen, Hong Zhao:
Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms. 65 - Ahmed M. Mahdy, Jitender S. Deogun:
Optimizing Free Space Optics for City-Wide Wireless Networks. 66 - Dariusz Koscielnik:
The Structure of a Control Network Integrated with the S-bus of an ISDN Network. 67
Signal Processing I
- Pavel Zahradnik, Miroslav Vlcek, Boris Simák:
DC-Notch FIR Filters for Zero-IF Receivers. 68 - Pavel Silhavy:
Time Domain Equalization in Modern Communication Systems Based on Discrete Multitone Modulation. 69 - Michal Kohoutek, Kamil Vrba:
Image Processing Method Based on Subpixel Analysis for Accurate Measurement of Dimensions. 70
Signal Processing II
- Eva Gescheidtova, Radek Kubasek, Karel Bartusek, Zdenek Smékal:
Shortening the Switching Times of Gradients for MR Tomography and Spectroscopy. 71 - Ivo Lattenberg, Kamil Vrba:
Low Input-Impedance Current-Mirror for High-Speed Data Communication. 72 - Martin Minarcik, Kamil Vrba:
Continuous-Time Multifunctional Filters with Wide Bandwidth Using Universal Voltage Conveyors. 73
Standards/Applications I
- Silke Holtmanns, Son Phan-Anh:
Access Authentication to IMS Systems in Next Generation Networks. 74 - I-Shyan Hwang, Zen-Der Shyu, Liang-Yu Ke, Chun-Che Chang:
A Novel Early DBA Mechanism with Prediction-Based Fair Excessive Bandwidth Reallocation Scheme in EPON. 75 - Tatiana Kovacikova, Pavel Segec:
NGN Standards Activities in ETSI. 76 - Petr Krupa, Michal Javorník, Otto Dostál:
Opportunities of Today's ICT Technologies for Support of Education and Training in Radiology. 77
Optical/Switching I
- Wencheng Lu, Sartaj Sahni:
Succinct Representation of Static Packet Forwarding Tables. 78 - Sartaj Sahni, Haibin Lu:
Dynamic Tree Bitmap for IP Lookup and Update. 79 - I-Shyan Hwang, Ren-Yuan Cheng, Zen-Der Shyu:
A Novel Dynamic Multiple Rings-Based Local Restoration for One-to-Multipoint Multicast Traffic in WDM Mesh Networks. 80 - I-Shyan Hwang, San-Nan Lee, Kuo-Chang Chien:
A High Performance Multicast Scheme Based on Virtual 2D Torus Topology. 81 - Weiming Wang, Ligang Dong, Bin Zhuge, Ming Gao, Fenggen Jia, Rong Jin, Jin Yu, Xiaochun Wu:
Design and Implementation of an Open Programmable Router Compliant to IETF ForCES Specifications. 82 - Yan Pan, Lacra Pavel:
Iterative Algorithms for Nash Equilibrium of an Extended OSNR Game. 83
Multimedia/Multicast I
- Xiaogang Yang, Lei Lei:
End-to-End Congestion Control for H.264/SVC. 84 - Dan Komosny, Vit Novotny:
Tree Structure for Specific-Source Multicast with Feedback Aggregation. 85 - Kari Aho, Tapani Ristaniemi, Janne Kurjenniemi, Ville Haikola:
Performance Enhancement of Multimedia Broadcast Multicast Service (MBMS) with Receive Diversity. 86 - Raimund Schatz, Norbert Jordan, Siegfried Wagner:
Beyond Broadcast--A Hybrid Testbed for Mobile TV 2.0 Services. 87
Performance I
- Dang Nguyen, Pascale Minet:
Scalability of the OLSR Protocol with the Fish Eye Extension. 88 - Konstantin Shemyak, Kai Vehmanen:
Scalability of TCP Servers, Handling Persistent Connections. 89 - Guoqing Li, Jing Zhu:
Performance Analysis on Utilizing Directional Antenna in High-Density WLAN. 90 - Guangwen Li, Guangzeng Feng:
Weighted IS Method of Estimating FER of LDPC Codes in High SNR Region. 91
Performance II
- Thi-Thanh-Mai Hoang:
Planning of IP Networks with Quality of Service Guarantee. 92 - Marina Petrova, Lili Wu, Petri Mähönen, Janne Riihijärvi:
Interference Measurements on Performance Degradation between Colocated IEEE 802.11g/n and IEEE 802.15.4 Networks. 93 - Thomas C. Schmidt, Matthias Wählisch, Ying Zhang:
On the Correlation of Geographic and Network Proximity at Internet Edges and Its Implications for Mobile Unicast and Multicast Routing. 94 - Iwona Pozniak-Koszalka, Dawid Zydek:
Algorithms of Unicast, Multicast and Broadcast Transmission for Optical Switches. 95
Security I
- Birger Tödtmann, Stephan Riebach, Erwin P. Rathgeb:
The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion Response. 96 - Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira:
Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown Events. 97 - M. Shirantha de Silva, David J. Parish, Peter Sandford, Jonathan M. Sandford:
Automated Detection of Emerging Network Security Threats. 98
Security II
- Jens Rüdinger, Adolf Finger:
Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack. 99 - Peter Sandford, David J. Parish, Jonathan M. Sandford:
Traffic Summary Analysis for Network Abuse Detection in High Date-Rate ISP Networks. 100 - Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt:
A Robust Single Sign-On Model Based on Multi-Agent System and PKI. 101
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.