default search action
ISCC 2008: Marrakech, Morocco
- Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco. IEEE Computer Society 2008, ISBN 978-1-4244-2702-4
- Adel Said Elmaghraby:
Message from the general chair. - Saad Biaz, Abdelghani Bellaachia:
Message from the technical program chairs.
Keynotes
- Siamak Khorram:
The state-of-the-art in acquiring and processing satellite remotely sensed data worldwide. - Raouf Boutaba:
Distributed pattern matching: Concept and applications in internet-scale networks. - Mahmoud Daneshmand:
Ten years of experimentation in Information Mining & Software Research with applications in telecommunications industry. - Azzedine Boukerche:
The next generation wireless network challenges for an emergency preparedness and response class of applications: A necessary public safety and security. - Saad Biaz:
Success and failures of "de-randomized" congestion losses losses losses. - Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang:
2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systems.
Streaming over Wireless I
- Rouzbeh Razavi, Martin Fleury, Mohammed Ghanbari:
Block-based rateless coding for energy-efficient video streaming over bluetooth. 1-6 - Anastasios Politis, Isabella Kotini, Athanasios Manitsaris:
Streaming video timing analysis in wireless ad-hoc networks. 7-12 - Pietro Zanuttigh, Andrea Zanella, Guido M. Cortelazzo:
Analysis of compressed depth and image streaming on unreliable networks. 13-18
Streaming over Wireless II
- Kostas Pentikousis, Jarno Pinola, Esa Piri, Frerk Fitzek:
A measurement study of Speex VoIP and H.264/AVC video over IEEE 802.16d and IEEE 802.11g. 19-24 - Federico Maguolo, Mathieu Lacage, Thierry Turletti:
Efficient collision detection for auto rate fallback algorithm. 25-30 - Davide Brunelli, Loris Teodorani:
Improving audio streaming over multi-hop ZigBee networks. 31-36
Multimedia Applications over Wireless
- Giorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis:
Caller identity privacy in SIP heterogeneous realms: A practical solution. 37-43 - Chrysa Papagianni, Nikolaos D. Tselikas, Evangelos A. Kosmatos, Andreas E. Papadakis, Thierry Keutgen, Dimitra I. Kaklamani, Iakovos S. Venieris:
A complete content production and delivery system in a controlled multimedia network. 44-49 - Antonios G. Alexiou, Christos Bouras, Evangelos Rekkas:
Efficient delivery of MBMS multicast traffic over HSDPA. 50-55
Optical Networks
- Wael Hosny Fouad Aly, Mohamed Faten Zhani, Halima Elbiaze:
On controlling burst loss ratio inside an OBS network. 56-61 - Eun-Sung Jung, Yan Li, Sanjay Ranka, Sartaj Sahni:
Performance evaluation of routing and wavelength assignment algorithms for optical networks. 62-67 - Burak Kantarci, Hussein T. Mouftah, Sema F. Oktug:
Arranging shareability dynamically for the availability-constrained design of optical transport networks. 68-73 - Emad Mahmoud Alsukhni, Hussein T. Mouftah:
A novel distributed destination routing-based Availability-Aware provisioning framework for differentiated protection services in optical mesh networks. 74-79 - Youssef Said, Houria Rezig, Ammar Bouallegue:
On the application of long soas in linear operating and saturation regimes: Exploitation in high bit rate optical networks. 80-83 - Branka Lakic, Marek Hajduczenia, Henrique J. A. da Silva, Paulo P. Monteiro:
Using adapted visibility graphs for network planning. 84-90
Service Oriented Architecture
- Xiaodong Lu, Kinji Mori:
Autonomous preference-aware multi-service integration and allocation. 91-96 - Dietrich Van der Weken, Stein Desmet, Bjorn Muylaert, Steven Van Assche, Bruno Volckaert:
Automating media processes in a service oriented architecture. 97-102 - Pravin Pawar, Julien Subercaze, Pierre Maret, Bert-Jan van Beijnum, Dimitri Konstantas:
Towards business model and technical platform for the service oriented context-aware mobile virtual communities. 103-110 - Antonio Corradi, Enrico Lodolo, Stefano Monti, Samuele Pasini:
A user-centric composition model for the Internet of Services. 110-117 - Uthman Baroudi, B. Abu Qadous:
An efficient adaptive Cross-Layer interaction mechanism for TCP traffic over heterogeneous networks. 118-123 - Basel Alawieh, Yongning Zhang, Chadi Assi, Hussein T. Mouftah:
An efficient rate adaptation scheme for multihop wireless networks using Kalman Filter. 124-129 - Saad Biaz, Shaoen Wu:
Rate adaptation algorithms for IEEE 802.11 networks: A survey and comparison. 130-136 - Cire Sall, El houcine Chakir El Alaoui, Saïd Doubabi, Elmostafa Elwarraki:
A robust controller for the TCP congestion window. 137-142 - Kuei-Ping Shih, San-Yuan Wang, Chien-Min Chou, Li-Jie Cheng:
A dynamic rate adaptation with fragmentation MAC protocol against channel variation for wireless LANs. 143-148 - Niklas Kirschnick, Frank Steuer, Pablo Vidales, Sahin Albayrak:
Adaptive window size to reduce the influence of heterogeneous mobility on TCP performance. 149-156 - Shan Chen, Junhua Zhu, Brahim Bensaou, Farid Naït-Abdesselam:
F2-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networks. 157-162 - Shie-Yuan Wang, Hsi-Lu Chao, Kuang-Che Liu, Ting-Wei He, Chih-Che Lin, Chih-Liang Chou:
Evaluating and improving the TCP/UDP performances of IEEE 802.11(p)/1609 networks. 163-168
Data Mining I
- Safwat H. Hamad, Tahany A. Fergany, Reda A. Ammar, Amal A. Abd El-Raouf:
A Double K-Clustering Approach for restructuring Distributed Object-Oriented software. 169-174 - Hisham El-Shishiny, T. H. Soliman, M. El-Asmar:
Mining drug targets based on microarray experiments. 175-181 - Hisham El-Shishiny, S. Sobhy Deraz, Omar Bahy Badreddin:
Mining software aging: A neural network approach. 182-187 - Aouatif Amine, Sanaa Ghouzali, Mohammed Rziza, Driss Aboutajdine:
Investigation of feature dimension reduction based DCT/SVM for face recognition. 188-193
Cellular and Mobile Communications I
- Khaled A. Ali, Hossam S. Hassanein, Hussein T. Mouftah:
Power-Controlled Rate and Coverage Adaptation for WCDMA cellular networks. 194-200 - Polychronis Koutsakis:
Call admission control for H.264 traffic transmission over wireless cellular networks. 201-207 - Khalil Ibrahimi, Rachid El Azouzi, El-Houssine Bouyakhf:
Uplink call admission control in multi-services W-CDMA network. 208-213 - Polychronis Koutsakis:
Efficient traffic policing for videoconference traffic over wireless cellular networks. 214-221 - Woonsik Lee, Minh-Viet Nguyen, Hwang Soo Lee:
A resource allocation algorithm and system architecture to extend the cell coverage and alleviate the inter-cell interference. 222-227 - Toshihiko Komine, Satoshi Konishi, Hiroyuki Shinbo:
A study on optimal termination target of synchronous H-ARQ for the next generation cellular system. 228-233 - Jiao Zhang, Yujun Zhang, Ye Tian, Zhongcheng Li:
CPK-based fast authentication method in Mobile IPv6 networks. 234-239
Secured Networks I
- Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Muniz Bandeira Duarte, Guy Pujolle:
Analyzing a human-based trust model for mobile ad hoc networks. 240-245 - François Lesueur, Ludovic Mé, Valérie Viet Triem Tong:
A sybilproof distributed identity management for P2P networks. 246-253 - Vincent Toubiana, Houda Labiod, Laurent Reynaud, Yvon Gourhant:
An analysis of ASMA performances against packet dropping attacks in dense networks. 254-259 - Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani:
The impact of wireless LAN security on performance of different Windows operating systems. 260-264
Mesh Networks I
- Jad El-Najjar, Brigitte Jaumard, Chadi Assi:
Efficient routing in WiMax/802.16 based mesh networks with centralized scheduling. 265-271 - Sadeq Ali Makram, Mesut Günes:
Distributed channel assignment for multi-radio wireless mesh networks. 272-277 - João Paulo Barraca, Rui L. Aguiar:
Managing community aware Wireless Mesh Networks. 278-285 - Arlen Nascimento, Edjair de Souza Mota, Saulo Queiroz, Edson Nascimento Silva Jr.:
Header compression for VoIP over multi-hop wireless mesh networks. 286-291 - Rafael De T. Valle, Diego G. Passos, Célio Vinicius N. de Albuquerque, Débora C. Muchaluat-Saade:
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool. 292-297
Secured Systems
- Xinyan Zha, Sartaj Sahni:
Highly compressed Aho-Corasick automata for efficient intrusion detection. 298-303 - Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai:
Efficient disk encryption and verification through trusted nonce. 304-309 - Zonglin Li, Guangmin Hu, Dan Yang:
Global abnormal correlation analysis for DDoS attack detection. 310-315 - Vinodh Gopal, Satyajit Grover, Michael E. Kounavis:
Fast multiplication techniques for public key cryptography. 316-325 - Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani:
A phishing vulnerability analysis of web based systems. 326-331 - Yang Li, Binxing Fang, Li Guo, Zhihong Tian, Yongzheng Zhang, Zhi-Gang Wu:
UBSF: A novel online URL-Based Spam Filter. 332-339 - Yehia H. Khalil, Adel Said Elmaghraby, Anup Kumar:
Evaluation of resilience for Data Center systems. 340-345 - Adil Alaoui, Nishant Subbiah, Jeffery Collmann, Kevin Cleary, Seong Ki Mun, Johnathan Coleman:
Building a secure medical research organization. 346-355
Cellular and Mobile Communications II
- Christophoros Christophorou, Andreas Pitsillides:
A new approach for efficient MBMS service provision in UTRAN. 356-361 - Christophoros Christophorou, Andreas Pitsillides:
An enhanced approach for efficient MBMS handovers in 3G networks. 362-367 - Andreas Panayides, Christophoros Christophorou, Josephine Antoniou, Andreas Pitsillides, Vasos Vassiliou:
Power counting for optimized capacity in MBMS enabled UTRAN. 368-373 - Antonios G. Alexiou, Christos Bouras, Vasileios Kokkinos:
Power saving methods for MBMS transmissions in UTRAN. 374-379 - Qi Li, Mingwei Xu, Xinwen Zhang:
Access control in Group Communication Systems. 380-385
Secured Networks II
- A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono:
FlexBox: Sandboxing internet servers based on layer-7 contexts. 386-391 - Yan Shen, Jun Bi, Jianping Wu, Qiang Liu:
A two-level source address spoofing prevention based on automatic signature and verification mechanism. 392-397 - Yasser Yasami, Siavash Khorsandi, Saadat Pour Mozaffari, A. Jalalian:
An unsupervised network anomaly detection approach by k-Means clustering & ID3 algorithms. 398-403
Mesh Networks II
- Mohamed Abou El Saoud, Samy A. Mahmoud:
Optimal number and class selection of nodes in Wireless Mesh Networks. 404-410 - Zhiying Gao, Hassan Naser:
End-to-end shared restoration algorithms in multi-domain mesh networks. 411-416 - Ahmed Abd El Al, Tarek N. Saadawi:
High throughput path selection for multi-path video streaming in Ad-hoc networks. 417-422 - Valeria Loscrì:
A queue based dynamic approach for the Coordinated distributed scheduler of the IEEE 802.16. 423-428 - Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda:
A load-aware routing metric for wireless mesh networks. 429-435 - Kuei-Ping Shih, Hung-Chang Chen, Chun-Chih Li, Hsiang-I Chen:
CLE2aR2: A cross-layer energy-efficient and reliable routing protocol for wireless ad hoc networks. 436-441
Architecture
- Samah A. Senbel:
Pro-active task sharing in a self-organizing server cluster. 442-446 - Alejandra Rodríguez, Javier Fernández, Jesús Carretero:
Model for on-demand virtual computing architectures - OVCA. 447-454 - Azzedine Boukerche, YunFeng Gu:
Performance modeling of a grid-based Data Distribution Management protocol. 455-461 - Kiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xiao Qin, Yiming Yang:
Improving reliability and energy efficiency of disk systems via utilization control. 462-467 - Luiz Carlos Pinto, Rodrigo P. Mendonça, Mario A. R. Dantas:
Impact of interconnection networks and application granularity to compound cluster environments. 468-473 - Luiz Carlos Pinto, Luiz H. B. Tomazella, Mario A. R. Dantas:
Building efficient multi-core clusters for high performance computing. 474-479
Peer to Peer
- Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino:
P-CDN: Extending access control capabilities of P2P systems to provide CDN services. 480-486 - Raime Bustos, Alberto Aguilar, Kia Makki, Raimund K. Ege:
Multicast-P2P content distribution in large-scale enterprise networks. 487-494 - Michele Albano, Laura Ricci, Martina Baldanzi, Ranieri Baraglia:
VoRaQue: Range queries on Voronoi overlays. 495-500 - W. D. Yu, J. Patel, M. Chitralamuthu, S. S. Parakh:
An empirical approach to a system design methodology for mobile Peer-to-Peer computing. 501-506 - Marinho P. Barcellos, Rodrigo B. Mansilha, Francisco V. Brasileiro:
TorrentLab: investigating BitTorrent through simulation and live experiments. 507-512 - Ya Chu Yang, Chien-Ming Cheng, Pei Yun Lin, Shiao-Li Tsao:
A real-time road traffic information system based on a peer-to-peer approach. 513-518
Applications in Computers and Communications I
- Hazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath:
Formal automated transformation of SDL specifications to Lotos specifications. 519-524 - Chafia Bouanaka, Faiza Belala:
Tile logic as an architectural model for mobility. 525-530 - Hisham Al-Mubaid, Anurag Nagar:
Comparison of four similarity measures based on GO annotations for Gene Clustering. 531-536 - Suman Deb Roy, Sneha Aman Singh, Subhrabrata Choudhury, Narayan C. Debnath:
Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. 537-542 - Subhrabrata Choudhury, Kapil Paniker, Anamika Sinha, S. Mukhopadhyay, Narayan C. Debnath:
A proactive burst assembly algorithm for optical burst switched networks. 543-548
Wireless Network Models
- Merlinda Drini, Tarek N. Saadawi:
Modeling wireless channel for ad-hoc network routing protocol. 549-555 - Abdellatif Kobbane, Rachid El Azouzi, El-Houssine Bouyakhf:
A queuing analysis of packet dropping for real-time applications in wireless networks. 556-561 - Chong Jiang, Brian Smith, Babak Hassibi, Sriram Vishwanath:
Multicast in wireless erasure networks with feedback. 562-565 - Saulo Queiroz, Arlen Nascimento, Edjair de Souza Mota, Andrea Oliveira, Leandro Galvão, Edson Nascimento Silva Jr.:
Impact evaluation of radio propagation models on performance parameters of application layer in Wireless Mesh Backbone simulation. 566-571 - Yan He, Dmitri D. Perkins, Bin Huang:
S-Box: A scalability analysis framework for ad hoc routing protocols. 572-578
Data Mining II
- Fadoua Ataa-Allah, William I. Grosky, Driss Aboutajdine:
Document clustering based on diffusion maps and a comparison of the k-means performances in various spaces. 579-584 - Hong Shen, Xiao-Long Yan:
Probability Density Estimation over evolving data streams using Tilted Parzen Window. 585-589 - Hichem Frigui, Cheul Hwang:
Semi-supervised Clustering and Aggregation of Relational Data. 590-595
Mobility I
- Cesare Stefanelli, Mauro Tortonesi, Erika Benvegnu, Niranjan Suri:
Session mobility in the mockets communication middleware. 596-603 - Hanwen Zhang, Yujun Zhang, Chao Ma, Yi Sun, Zhongcheng Li:
Dynamic load balancing among multiple home agents for MIPv6. 604-609 - Hai Lin, Houda Labiod:
Release of unnecessary resource reservation in mobility cases. 610-615 - Omar M. Raoof, Hamed S. Al-Raweshidy:
Game theory and an interface selection mechanism for Multi-homed Mobile Nodes. 616-623 - Rodrigo Prado, Eduardo Zagari, Tomás Badan, Eleri Cardozo, Murício Magalhães, José Carrilho, Rossano P. Pinto, André Berenguel, Daniel Barboza, Daniel Moraes, Thienne Johnson, Lars Westberg:
A reference architecture for micro-mobility support in IP networks. 624-630 - Loreno Oliveira, Kyller Costa Gorgônio, Angelo Perkusich, Leandro Dias da Silva:
Pitfalls and tradeoffs on dealing with handoff management in bluetooth-based WPANs for real-time applications. 631-636
Applications in Computers and Communications II
- Anurag Nagar, Hisham Al-Mubaid:
Using path length measure for gene clustering based on similarity of annotation terms. 637-642 - Hazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath:
Towards sound development of PIXITP, conformance test suites, and conforming implementations for various Formal Description Techniques. 643-648 - Sultan Aljahdali, Ennumeri A. Zanaty:
Combining multiple segmentation methods for improving the segmentation accuracy. 649-653 - Narayan C. Debnath, Lorena Baigorria, Daniel Riesco, German Montejano:
Metrics applied to Aspect Oriented Design using UML profiles. 654-657 - Douglas Dyllon Jeronimo de Macedo, Hilton Ganzo William Perantunes, L. Maia, Eros Comunello, Aldo von Wangenheim, Mario A. R. Dantas:
An interoperability approach based on asynchronous replication among distributed internet databases. 658-663
Data Communications I
- Josep M. Selga, Agustín Zaballos, Jaume Abella, Guiomar Corral:
Model for polling in noisy multihop systems with application to PLC and AMR. 664-669 - Atman Jbari, Abdellah Adib, Driss Aboutajdine:
A new signal separation technique using double referenced system. 670-673 - Elmahdi Driouch, Wessam Ajib:
A graph theory based scheduling algorithm For MIMO-CDMA systems using zero forcing beamforming. 674-679 - S. M. Sameer, Ratnam V. Raja Kumar:
An efficient maximum likelihood carrier frequency offset estimation technique for OFDM systems. 680-684 - Li Zheng, Doan B. Hoang:
Performance analysis for resource coordination in a high-density wireless environment. 685-690 - Binbin Xu, Jianping An, Zhongxia Simon He:
MC-CDMA multiuser detection using a hybrid immune clonal selection algorithm with Hopfield Neural Network in fading channels. 691-694
Software & Applications
- Mohammad Reza Nami, Abbas Malekpour:
Formal specification of a particular banking domain with RAISE specification language. 695-699 - Mohsen Toorani, Ali Asghar Beheshti Shirazi:
SSMS - A secure SMS messaging protocol for the m-payment systems. 700-705 - Rui Qiao, Yuan Wang, Xinyan Gao, Jinzhao Wu:
Operational semantics of probabilistic Kleene algebra with tests. 706-713 - Xinyan Gao, Jinzhao Wu, Rui Qiao, Jianfeng Chen:
Theory framework for event structure slicing. 714-721 - Mohamed El Ghami, Ivan Ivanov, Hans Melissen, Cornelis Roos, Trond Steihaug:
Primal-dual algorithm for linear optimization problems based on a new class of kernel functions. 722-729 - Rajaa Saidi, Mounia Fredj, Salma Mouline, Agnès Front, Dominique Rieu:
Variability modeling for Business Component customization. 730-735 - Dolly Sharma, Vishal Thapar, Reda A. Ammar, Sanguthevar Rajasekaran, Mohamed Ahmed:
Efficient sorting algorithms for the cell broadband engine. 736-741 - Bin Liu, Philippe Martins, Philippe Bertin:
The operation mode selection in FMIPv6. 742-749
Mobility II
- Paolo Bellavista, Eugenio Magistretti:
How node mobility affects k-hop cluster quality in Mobile Ad Hoc NETworks: A quantitative evaluation. 750-756 - N. G. Ferreira, Susana Sargento, Rui L. Aguiar:
Implementation and experimental evaluation of a fast local mobility protocol. 757-763 - Paolo Bellavista, Antonio Corradi, Luca Foschini:
An IMS vertical handoff solution to dynamically adapt mobile multimedia services. 764-771 - Huiming Wang, Xingang Shi, Zhiliang Wang, Xia Yin, Jianping Wu:
Performance testing of Mobile IPv6 protocol. 772-779
Network Management
- Luca Cittadini, Tiziana Refice, Alessio Campisano, Giuseppe Di Battista, Claudio Sasso:
Measuring and visualizing interdomain routing dynamics with BGPATH. 780-787 - Mazen G. Khair, Jun Zheng, Hussein T. Mouftah:
Distributed fault localization for multi-domain all-optical networks with partial power monitoring. 788-793 - Kenji Kumaki, Ikuo Nakagawa, Kenichi Nagami, Tomohiko Ogishi, Shigehiro Ano:
Design and evaluation of a P2MP MPLS-based hierarchical service management system. 794-799 - Natascha Petry Ligocki, Carmem S. Hara, Christiano Lyra:
A flexible network monitoring tool based on a data stream management system. 800-805 - Ewerton Monteiro Salvador, Lisandro Zambenedetti Granville:
Using visualization techniques for SNMP traffic analyses. 806-811 - Abderrahmane Ben Abdellahi Ben Doua, Seyeong Choi, Mohamed-Slim Alouini, Khalid A. Qaraqe:
Adaptive RAKE combining schemes in the soft handover region. 812-817
Data Communications II
- Manal Taoufiki, Abdellah Adib, Driss Aboutajdine, Saad Biaz:
Blind MIMO deconvolution of any source distributions via high-order spectra. 818-823 - Adnane Latif, Rachid Hilal, Abdellah Ait Ouahman:
Investigation on folded patch antenna for cellular applications. 824-830 - A. A. Al-Kheir, Khalid A. Qaraqe, Mohamed-Slim Alouini:
On the space-time correlation of MIMO fading channels in 3D scattering models. 831-837 - Timo Nihtilä:
Capacity improvement by employing femto cells in a macro cell HSDPA network. 838-843 - Samad S. Kolahi:
Comparison of CDMA tele-traffic models. 844-848
Document Retrieval
- Abdelghani Bellaachia, Ghita Amor-Tijani:
Proper nouns in English-Arabic Cross Language Information Retrieval. 849-857 - Yin-Fu Huang, Shing-Hang Wang:
An Efficient XML query processing based on combining T-Bitmap and index techniques. 858-863 - Mohammad Shirali-Shahreza:
Pseudo-space Persian/Arabic text steganography. 864-868 - Siham Boulaknadel, Béatrice Daille, Driss Aboutajdine:
Multi-word term indexing for Arabic document retrieval. 869-873 - Abdelghani Bellaachia, Ghita Amor-Tijani:
OOV words in an English-Arabic CLIR system. 874-882
Quality of Service I
- Vitor Jesus, Rui L. Aguiar, Peter Steenkiste:
A stateless architectural approach to inter-domain QoS. 883-890 - José R. Gallardo, Sarai C. Cruz, Dimitrios Makrakis, Abdallah Shami:
Analysis of the EDCA access mechanism for an IEEE 802.11e-compatible wireless LAN. 891-898 - Pedro Neves, Tuomas Nissilä, Telmo Pereira, Ilkka Harjula, João L. Monteiro, Kostas Pentikousis, Susana Sargento, Francisco Fontes:
A vendor-independent resource control framework for WiMAX. 899-906 - Mohamad Chaitou, Jean-Louis Le Roux:
Fast-reroute procedures for multi-point to multi-point MPLS tunnels. 907-914 - Abdelhamid Mellouk, Said Hoceini, Farid Baguenine, Mustapha Cheurfa:
Distributed Quality-of-Service routing of best constrained shortest paths. 915-919
Routing I
- Christine Maindorfer, Bettina Bär, Thomas Ottmann:
Relaxed min-augmented range trees for the representation of dynamic IP router tables. 920-927 - Tan Chen, Xin Xiong:
Searching nearest neighbor in overlay network. 928-933 - Marc Sánchez Artigas, Pedro García López, Antonio Fernandez Gómez-Skarmeta:
Bypass: Providing secure DHT routing through bypassing malicious peers. 934-941 - Lotfi Mhamdi:
A Partially Buffered Crossbar packet switching architecture and its scheduling. 942-948 - Thu-Huong Truong, Mario Baldi, Yoram Ofek:
Scheduling high-rate sessions in Fractional Lambda Switching networks: Algorithm and analysis. 949-956 - Ali Abbasi, Ahmad Khonsari, N. Farri:
MOTE: Efficient monitoring of top-k set in sensor networks. 957-962
Sensor Networks I
- Aristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, Grammati E. Pantziou:
Exploiting the cloning capability of Mobile Agents for cost-effective data fusion in wireless sensor networks. 963-968 - Nicola Altan, Erwin P. Rathgeb:
On the self-healing properties of an extremely low power indoor metering network. 969-974 - Azeddine Bilami, Djallel Eddine Boubiche:
A hybrid energy aware routing algorithm for wireless sensor networks. 975-980 - Wei Huangfu, Yan Liu, Bin Duan, Limin Sun, Jian Ma, Canfeng Chen:
EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor Networks. 981-987 - Hongli Xu, Liusheng Huang, Wang Liu, Ben Xu, Mingjun Xiao:
Topology control for minimal path interference in wireless sensor networks. 988-993
Image Processing
- Saoussen Ben Jabra, Ezzeddine Zagrouba:
A new approach of 3D watermarking based on image segmentation. 994-999 - Samira Mabtoul, El Hassane Ibn Elhaj, Driss Aboutajdine:
A robust digital image watermarking method using Dual Tree Complex Wavelet Transform. 1000-1004 - Mounir Ait Kerroum, Ahmed Hammouch, Driss Aboutajdine, Abdelghani Bellaachia:
Using the maximum Mutual Information criterion to textural Feature Selection for satellite image classification. 1005-1009 - Leila Essannouni, El Hassane Ibn Elhaj, Driss Aboutajdine:
Automatic color face tracking using gray information. 1010-1014
Quality of Service II
- Mario Baldi, Marco Papa Manzillo:
Deterministic service on IEEE 802.11-like networks. 1015-1022 - Sahar Ghazal, Yassine Hadjadj Aoul, Jalel Ben-Othman, Farid Naït-Abdesselam:
Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networks. 1023-1028 - Bin Rong, Ibrahim Khalil, Zahir Tari:
QoS-aware Application Layer Multicast. 1029-1033 - S. T. EL-Leithy, Walaa M. Sheta:
Wavelet-based geometry coding for 3D mesh using space frequency quantization. 1034-1039 - Anne Nevin, Yuming Jiang, Peder J. Emstad:
Robustness study of MBAC algorithms. 1040-1046 - Mohamad Chaitou, Jean-Louis Le Roux:
Multi-point to multi-point traffic engineering. 1047-1055
Routing II
- Tarik Elamsy, Randa El-Marakby:
Flooding Zone Initialization Protocol (FZIP): Enabling efficient multimedia diffusion for multi-hop wireless networks. 1056-1061 - Ahmed S. Nagy, Amr A. El-Kadi, Mikhail N. Mikhail:
Measuring network performance of swarm power aware routing protocol for MANETs. 1062-1069 - Youndo Lee, Yoonbo Shim, Yanghee Choi, Taekyoung Kwon:
A Reliability Aware Flooding Algorithm (RAFA) in wireless multi-hop networks. 1070-1075
Sensor Networks II
- Paolino Di Felice, Massimo Ianni, Luigi Pomante:
A spatial extension of TinyDB for wireless sensor networks. 1076-1082 - Azzedine Boukerche, Yan Du, Jing Feng, Richard Werner Nelem Pazzi:
A reliable synchronous transport protocol for wireless image sensor networks. 1083-1089 - Paulo Sérgio Sausen, Marco Aurélio Spohn, Angelo Perkusich:
Broadcast routing in Wireless Sensor Networks with Dynamic Power Management. 1090-1095 - Giuseppe Anastasi, Marco Conti, Mario Di Francesco:
Data collection in sensor networks with data mules: An integrated simulation analysis. 1096-1102
Systems
- Mehdi Chehel Amirani, Mohsen Toorani, Ali Asghar Beheshti Shirazi:
A new approach to content-based file type detection. 1103-1108 - Laura Ricci, Luca Genovali:
JaDE: A JXTA support for distributed virtual environments. 1109-1114 - Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
Reducing null message traffic in large parallel and distributed systems. 1115-1121 - Machigar Ongtang, Ali R. Hurson, Yu Jiao:
Transactional Agents for Pervasive Computing. 1122-1127 - Wafa Kammoun, Habib Youssef:
Improving the performance of End-to-End single rate Multicast Congestion Control. 1128-1132
VoIP, Multicast, and Load Balancing
- Eduard Garcia Villegas, Rafael Vidal, Josep Paradells Aspas:
Cooperative load balancing in IEEE 802.11 networks with cell breathing. 1133-1140 - Esa Piri, Jarno Pinola, Frerk Fitzek, Kostas Pentikousis:
ROHC and aggregated VoIP over fixed WiMAX: An empirical evaluation. 1141-1146 - Weizhan Zhang, Qinghua Zheng, Yang Li, Yi Che:
LDCOM: a Layered degree-constrained overlay multicast for interactive media. 1147-1152 - Yun-Jung Cheng, Kuochen Wang, Rong-Hong Jan, Chien Chen, Chia-Yuan Huang:
Efficient failover and Load Balancing for dependable SIP proxy servers. 1153-1158 - Hung-Yun Hsieh, Hsiao-Pu Lin, You-En Lin:
Enhancing campus VoIP service for ubiquitous communication on dual-mode mobile handsets. 1159-1165
Sensor Networks III
- Kashif Ali, Hossam S. Hassanein:
Underwater Wireless Hybrid Sensor Networks. 1166-1171 - Hu Junping, Jin Yuhui, Dou Liang:
A Time-based Cluster-Head Selection Algorithm for LEACH. 1172-1176 - Saleh Ibrahim, Jun-Hong Cui, Reda A. Ammar:
Efficient surface gateway deployment for underwater sensor networks. 1177-1182 - Azzedine Boukerche, Horacio A. B. F. de Oliveira, Eduardo Freire Nakamura, Antonio Alfredo Ferreira Loureiro:
Enlightness: An enhanced and lightweight algorithm for time-space localization in Wireless Sensor Networks. 1183-1189 - Clément Saad, Abderrahim Benslimane, Jean-Claude König:
AT-Angle: A distributed method for localization using angles in sensor networks. 1190-1195
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.