


default search action
23rd AINA 2009: Bradford, United Kingdom
- Irfan Awan, Muhammad Younas, Takahiro Hara, Arjan Durresi:

The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3638-5
Keynote Speeches
- Erol Gelenbe:

Improving QoS through Network Real-Time Measurement and Self-Adaption. 1 - Alessandro Campi

, Georg Gottlob
, Ben Hoye:
Wormholes of Communication: Interfacing Virtual Worlds and the Real World. 2-9 - Elisa Bertino, Michael S. Kirkpatrick:

Location-Aware Authentication and Access Control. 10-15
Performance Modelling and Evaluation 1
- Matthew Faulkner, Andrew Brampton, Stephen Pink:

Evaluating the Performance of Network Protocol Processing on Multi-core Systems. 16-23 - Xuan Wang, Katerina Goseva-Popstojanova

:
Modeling Web Request and Session Level Arrivals. 24-32 - Simon D. Hammond, J. A. Smith, Gihan R. Mudalige

, Stephen A. Jarvis
:
Predictive Simulation of HPC Applications. 33-40 - Vashti Galpin

:
Modelling Network Performance with a Spatial Stochastic Process Algebra. 41-49
Routing and Broadcast Mechanisms
- Ling-Jyh Chen

, Che-Liang Chiou, Yi-Chao Chen:
An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks. 50-57 - Sasitharan Balasubramaniam

, Dmitri Botvich, Julien Mineraud, William Donnelly:
Parameterised Gradient Based Routing (PGBR) for Future Internet. 58-65 - Nak Beom Sung, Kyung Tae Kim, Sun Sik Park, Hee Yong Youn:

A New Counting Scheme for Multicast Broadcast Service with WiBro. 66-73 - Mukul Goyal, Mohd Soperi, Seyed Hossein Hosseini, Kishor S. Trivedi, Aman Shaikh, G. Choudhury:

Analyzing the Hold Time Schemes to Limit the Routing Table Calculations in OSPF Protocol. 74-81
Distributed and Parallel Systems
- Jian (Denny) Lin, Albert M. K. Cheng

, Rashmi Kumar:
Real-Time Task Assignment in Heterogeneous Distributed Systems with Rechargeable Batteries. 82-89 - Shin Tezuka, Hiroko Tomori, Ryuya Uda, Ken-ichi Okada:

Distributed Secure Virtual File System Using Hysteresis Signatures. 90-97 - Mahmoud Moadeli, Partha P. Maji, Wim Vanderbauwhede:

Quarc: A High-Efficiency Network on-Chip Architecture. 98-105 - Jason B. Ernst, Mieso K. Denko:

Fair Scheduling with Multiple Gateways in Wireless Mesh Networks. 106-112
Service Oriented Architecture
- Florian Daniel

, Fabio Casati
, Vincenzo D'Andrea
, Emmanuel Mulo, Uwe Zdun, Schahram Dustdar
, Steve Strauch, David Schumm, Frank Leymann
, Samir Sebahi, Fabien De Marchi, Mohand-Said Hacid:
Business Compliance Governance in Service-Oriented Architectures. 113-120 - Tim Dörnemann, Markus Mathes, Roland Schwarzkopf, Ernst Juhnke, Bernd Freisleben

:
DAVO: A Domain-Adaptable, Visual BPEL4WS Orchestrator. 121-128 - Michael Koch, Markus Hillenbrand, Paul Müller:

A Generic Database Web Service for the Venice Service Grid. 129-136 - Uwe Kylau, Ivonne Thomas, Michael Menzel, Christoph Meinel:

Trust Requirements in Identity Federation Topologies. 137-145
Agents and Trust Management
- Babak Khosravifar, Jamal Bentahar

, Maziar Gomrokchi, Philippe Thiran:
Combined On-line and Off-line Trust Mechanism for Agent Computing. 146-153 - Varsha Sainani, Mei-Ling Shyu:

A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection Systems. 154-161 - Farah Layouni, Yann Pollet:

An Ontology-Based Architecture for Federated Identity Management. 162-166 - Arjan Durresi, Mimoza Durresi, Vamsi Paruchuri

, Leonard Barolli:
Trust Management in Emergency Networks. 167-174
Video Communication Technology
- Yoong Choon Chang

, Sze Wei Lee
, Ryoichi Komiya:
An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video Transmission. 175-181 - Jiao Feng, Xuefen Chi, Peng Li, Yining Wang, Lin Guan

:
Adaptive FEC Algorithm Based on Prediction of Video Quality and Bandwidth Utilization Ratio. 182-188 - Dario Gallucci, Attilio Fiandrotti

, Enrico Masala, Juan Carlos De Martin:
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks. 189-196 - Ahmed B. Abdurrhman, Michael E. Woodward:

Heterogeneous Error Protection of H.264/AVC Video Using Hierarchical 16-QAM. 197-200
Communication Technology and Protocols 1
- Wei Lin, Baoming Bai, Ying Li, Xiao Ma:

Design of q-ary Irregular Repeat-Accumulate Codes. 201-206 - Yuan-Hua Liu, Xinmei Wang, Jian-Hua Ma:

Design of Quasi-Cyclic LDPC Codes Based on Euclidean Geometries. 207-211 - Yongqiang Hei, Xiaohui Li, Kechu Yi, Wentao Li:

Multi-user MIMO Broadcast System Grouping Strategy Based on Particle Swarm Optimization. 212-216 - Rafe Khalaf Alasem, M. Alamgir Hossain, Irfan Awan, Hussein Mansour:

ANFIS Based AQM Controller for Congestion Control. 217-224
Autonomic and Advanced Network Systems
- Anders Nickelsen, Jesper Grønbæk, Thibault Renier, Hans-Peter Schwefel:

Probabilistic Network Fault-Diagnosis Using Cross-Layer Observations. 225-232 - Daniel C. Uchôa, Samuel Kopp, Hélcio M. Pimentel, Reinaldo Matushima, Regina Melo Silveira

:
An Overlay Application-Layer Multicast Infrastructure. 233-240 - Satoshi Ohzahata, Konosuke Kawashima:

A Measurement Study on Peer Behaviors for a Pure P2P Network. 241-248 - Katsuyoshi Matsumoto, Minoru Uehara:

N-nary RAID: 3-resilient RAID Based on an N-nary Number. 249-255
Internet Computing and Applications
- Xing Zhou, Thomas Dreibholz

, Fu Fa, Wencai Du, Erwin P. Rathgeb:
Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling Systems. 256-262 - Yeim-Kuan Chang, Yen-Cheng Liu, Fang-Chen Kuo:

A Pipelined IP Forwarding Engine with Fast Update. 263-269 - Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong

, Ping Yang, Nazreen Beevi:
DINCast: Optimizing Application-Level Shared-Tree Multicast. 270-277 - Yeim-Kuan Chang, Yung-Chieh Lin:

A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-Tree. 278-284
Ad Hoc and Sensor Networks
- Ibrahim Amadou, Pascale Minet:

Optimized Broadcast in a Geographical Area of Wireless Ad Hoc and Sensor Networks. 285-292 - Lyes Dekar, Hamamache Kheddouci:

A Resource Discovery Scheme for Large Scale Ad Hoc Networks Using a Hypercube-Based Backbone. 293-300 - Wei Feng, Hamada Alshaer

, Jaafar M. H. Elmirghani
:
Energy Efficiency: Optimal Transmission Range with Topology Management in Rectangular Ad-hoc Wireless Networks. 301-306 - Leonard Barolli, Makoto Ikeda, Giuseppe De Marco, Arjan Durresi, Fatos Xhafa

:
Performance Analysis of OLSR and BATMAN Protocols Considering Link Quality Parameter. 307-314
Performance Modelling and Evaluation 2
- Mahmoud Moadeli, Wim Vanderbauwhede:

A Communication Model of Broadcast in Wormhole-Routed Networks on-Chip. 315-322 - Ritesh K. Taank, Xiaohong Peng:

An Experimental Evaluation of Sender-Side TCP Enhancements for Wired-to-Wireless Paths: A Real-World Home WLAN Case Study. 323-330 - Jie Wang

, Lin Guan
, Xin Gang Wang
, Alan Grigg, Irfan Awan, Iain W. Phillips
, Xuefen Chi:
QoS Enhancements and Performance Analysis for Delay Sensitive Applications. 331-338 - Cherif Ghazel

, Leïla Azouz Saïdane:
An Efficient Admission Control Methodology for Satisfying QoS Requirements in NGN Networks. 339-346
Privacy and Trust Management
- Jaideep Vaidya:

A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming. 347-354 - Laurent Gomez, Annett Laube, Alessandro Sorniotti:

Trustworthiness Assessment of Wireless Sensor Data for Business Applications. 355-362 - Hisham Dahshan, James Irvine

:
Key Management in Web of Trust for Mobile Ad Hoc Networks. 363-370 - Roberto G. Cascella:

Enabling Fast Bootstrap of Reputation in P2P Mobile Networks. 371-378
Quality of Service in Web Services
- Vuong Xuan Tran, Hidekazu Tsuji:

A Survey and Analysis on Semantics in QoS for Web Services. 379-385 - Yizhu Tong, Hao Wang, Taoying Liu:

Exploiting Request Characteristics to Improve Performance of Web Services Based Business Applications. 386-393 - George Anadiotis, Spyros Kotoulas

, Holger Lausen, Ronny Siebes
:
Massively Scalable Web Service Discovery. 394-402 - Zakaria Maamar, Samir Tata, Djamel Belaïd, Khouloud Boukadi

:
Towards an Approach to Defining Capacity-Driven Web Service. 403-410
Workflows and Reliability in Grid Computing
- Xiaofeng Wang, Chee Shin Yeo

, Rajkumar Buyya, Jinshu Su
:
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA. 411-418 - Henrik Thostrup Jensen, Josva Kleist:

A Highly Available Grid Metadata Catalog. 419-426 - Feilong Tang, Minyi Guo, Minglu Li, Li Li:

Transaction Management for Reliable Grid Applications. 427-434 - Suraj Pandey, William Voorsluys, Mustafizur Rahman, Rajkumar Buyya, James E. Dobson

, Kenneth Chiu:
Brain Image Registration Analysis Workflow for fMRI Studies on Global Grids. 435-442
Mobile Networks and Applications
- Atsushi Noda, Teruaki Kitasuka, Shigeaki Tagashira, Tsuneo Nakanishi, Akira Fukuda:

Name Resolution Middleware Using Relative Positional Relationship to Support Wireless Visible Area Communication. 443-450 - Mun J. Lok, Bilal R. Qazi, Jaafar M. H. Elmirghani

:
Data Dissemination with Drop Boxes. 451-455 - Joon-Suk Kang, Motoyuki Ohmori

, Koji Okamura:
A Proposal to Enhance and Control Continuous Communications in Proxy Mobile IPv6. 456-462 - Okan Yilmaz, Ing-Ray Chen:

Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless Networks. 463-470
Multimedia Systems and Applications
- Adel Almohammad, Gheorghita Ghinea

, Robert M. Hierons
:
JPEG Steganography: A Performance Evaluation of Quantization Tables. 471-478 - Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa

:
Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia Objects. 479-486 - Marcos A. Simplício Jr.

, Vlad Coroama
, Yeda Regina Venturini, Tereza Cristina M. B. Carvalho
, Mats Näslund, Makan Pourzandi:
PHD. 487-494 - Hirokazu Miyata, Ryuya Uda, Kenichi Okada:

The Efficiency Method of Sanitizable Signature Scheme for SMF. 495-502
Pervasive and Ubiquitous Computing
- Amel Bouzeghoub, Kien Ngoc Do, Leandro Krug Wives

:
Situation-Aware Adaptive Recommendation to Assist Mobile Users in a Campus Environment. 503-509 - Elhadi M. Shakshuki

, Tarek R. Sheltami
, Nan Kang, Xinyu Xing:
Tracking Anonymous Sinks in Wireless Sensor Networks. 510-516 - Hyun Lee, Jae Sung Choi, Ramez Elmasri:

Sensor Data Fusion Using DSm Theory for Activity Recognition under Uncertainty in Home-Based Care. 517-524 - Maria-Teresa Segarra, Françoise André:

A Distributed Dynamic Adaptation Model for Component-Based Applications. 525-529
Security 1: Intrusion Detection Systems
- Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann

:
Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks. 530-538 - Safaa Zaman, Fakhri Karray:

Fuzzy ESVDF Approach for Intrusion Detection Systems. 539-545 - Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long Ni, Shou-Hsuan Stephen Huang:

Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. 546-551 - Han-Ching Wu, Shou-Hsuan Stephen Huang:

Masquerade Detection Using Command Prediction and Association Rules Mining. 552-559
Wireless Sensor Networks 1
- Yasuhiro Nose, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

Route Construction Based on Measured Characteristics of Radio Propagation in Wireless Sensor Networks. 560-567 - Mohammad Baharloo, Reza Hajisheykhi, Mohammad Arjomand, Amir-Hossein Jahangir

:
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol. 568-571 - Soochang Park, Euisin Lee, Fucai Yu, Min-Sook Jin, Sang-Ha Kim

:
Information Communication Mechanism for Loosely Coupled Mobile User Groups in Wireless Sensor Fields. 572-579 - Elhadi M. Shakshuki

, Haroon Malik, Tarek R. Sheltami
:
Lessons Learned: Simulation Vs WSN Deployment. 580-587
Security 2: New Languages and Systems
- Nikolaos Chatzis, Nevil Brownlee

:
Similarity Search over DNS Query Streams for Email Worm Detection. 588-595 - Mohamed Hamdi, Nejla Essaddi

, Noureddine Boudriga:
ReAlSec: A Relational Language for Advanced Security Engineering. 596-601 - Yosuke Sato, Koji Hashimoto, Yoshitaka Shibata:

A New Video Surveillance Video Tracking System Based on Omni-directional and Network Controlled Cameras. 602-607 - Yuna Kim, Jong Kim, Junghei You, Heejae Park:

Exclusion of Forged Files from Multi-source Downloadable P2P Systems. 608-615
Scheduling and Routing Schemes
- Ying-Hong Wang, Kuo-Feng Huang, Chengyi Le

:
Packet Scheduling Algorithm with QoS Provision in HSDPA. 616-623 - Ki-seok Lee, Cheeha Kim:

A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc Networks. 624-631 - Markus Aleksy

, Thomas Butter:
Privacy-Aware Routing Approach for Mobile Applications. 632-637 - Dechun Sun, Kechu Yi, Xiaohui Li:

A New Space Time Cooperative Diversity Scheme Based on Simple Feedback. 638-643
Interaction in Web Services
- Zakaria Maamar, Quan Z. Sheng

, Hamdi Yahyaoui
, Khouloud Boukadi
, Xitong Li:
On the Synchronization of Web Services Interactions. 644-651 - Yehia Taher, Ali Aït-Bachir, Marie-Christine Fauvet, Djamal Benslimane:

Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of Adapters. 652-659 - Juan Li:

Building Distributed Index for Semantic Web Data. 660-667
Security 3: Authentication and Access Control
- Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki

:
Advantages of User Authentication Using Unclear Images. 668-674 - Joseph Chee Ming Teo, Lek Heng Ngoh, Huaqun Guo:

An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks. 675-682 - Prashant Pillai

, Yim-Fun Hu
:
IGMPx: Port Based Service Access Control for IP Multicast. 683-690 - Eduardo Horowitz, Luís C. Lamb

:
A Hierarchical Model for Firewall Policy Extraction. 691-698
WLAN, RFID and OFDM Systems
- Yonghwan Kim, Sungsoo Kim, Seongjoon Lee, Kwangseon Ahn:

Improved 4-ary Query Tree Algorithm for Anti-Collision in RFID System. 699-704 - Xia Wang, Shihua Zhu:

Mitigation of Intercarrier Interference Based on General Precoder Design in OFDM Systems. 705-710 - Suhaimi Bin Abd Latif, Mohammed A. Rashid

, Fakhrul Alam
:
An Analytical Model for MAC Protocol Configuration in WLAN. 711-718
Networks: Scalibility, Survivability, and Recovery
- Isaac Woungang, Guangyan Ma, Mieso K. Denko, Alireza Sadeghian, Sudip Misra, Alexander Ferworn

:
Survivability in Existing ATM-Based Mesh Networks. 719-724 - Saleem N. Bhatti

, Martin Bateman:
Effects of On-path Buffering on TCP Fairness. 725-732 - Marta Beltrán

, Antonio Guzmán, Fernando Sevillano:
Scalability Analysis to Optimize a Network on Chip. 733-740 - Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan, Maytham Safar, Marina L. Gavrilova

:
Network Voronoi Diagram Based Range Search. 741-748
Wireless Sensor Networks 2
- Nobutoshi Abe, Norihiko Shinomiya, Yoshimi Teshigawara:

Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic Sensors. 749-757 - Hosung Park, Taehee Kim, Jeongcheol Lee, Min-Sook Jin, Sang-Ha Kim

:
Sink Location Service via Inner Rectangular in Wireless Sensor Networks. 758-762 - Nok Hang Mak, Winston Khoon Guan Seah

:
How Long is the Lifetime of a Wireless Sensor Network?. 763-770 - Pedro N. E. S. Barbosa, Neil M. White, Nick R. Harris:

Medium Access Control in Large Scale Clusters for Wireless Sensor Networks. 771-777
Web Technology and Applications
- Hon Wai Lam, Chen Wu:

Finding Influential eBay Buyers for Viral Marketing. 778-785 - D. R. W. Holton, Irfan-Ullah Awan, Muhammad Younas:

Priority Scheduling of Requests to Web Portals. 786-791 - Rei Endo, Kenji Takagi, Hiroshi Shigeno:

GBLT: Load Distribution Method for High Density by User Behavior in MMO Virtual Environment. 792-799 - Keita Matsuo, Leonard Barolli, Fatos Xhafa

, Vladi Kolici
, Akio Koyama, Arjan Durresi, Rozeta Miho:
Implementation of an E-learning System Using P2P, Web and Sensor Technologies. 800-807
Recovery and Fault Tolerance
- Ailixier Aikebaier, Valbona Barolli, Tomoya Enokido, Makoto Takizawa:

Recoverable Cuts to Make Agreement among Peers. 808-815 - Yoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba, Kazuo Takahata:

A New Ballooned Wireless Mesh Network System for Disaster Use. 816-821 - Omar Khadeer Hussain

, Tharam S. Dillon, Elizabeth Chang
, Farookh Khadeer Hussain:
Determining the Net Financial Risk for Decision Making in Business Interactions. 822-829 - Yan Yang, Samia Souissi

, Xavier Défago
, Makoto Takizawa
:
Fault-Tolerant Flocking of Mobile Robots with Whole Formation Rotation. 830-837
Security 4: Architectures and Protocols
- Thomas Badura, Michael Becher:

Testing the Symbian OS Platform Security Architecture. 838-844 - Tomoya Enokido, S. Misbah Deen, Makoto Takizawa

:
A Protocol for Releasing Purpose Marks to Prevent Illegal Information Flow. 845-852 - Akira Yamada

, Yutaka Miyake, Masahiro Terabe, Kazuo Hashimoto, Nei Kato:
Anomaly Detection for DNS Servers Using Frequent Host Selection. 853-860 - Rongfei Zeng, Chuang Lin, Hongkun Yang, Yuanzhuo Wang, Yang Wang, Peter D. Ungsunan:

A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis. 861-867
Grid and P2P Computing
- Akihiro Iwamaru, Tsuyoshi Itokawa, Teruaki Kitasuka, Masayoshi Aritsugi

:
Introducing Group Participation Support into P2P Web Caching Systems. 868-875 - David Antos, Ludek Matyska

, Petr Holub
, Jirí Sitera
:
VirtCloud: Virtualising Network for Grid Environments. 876-883 - Po-Cheng Chen, Jyh-Biau Chang, Jia-Hao Yang, Yi-Chang Zhuang, Ce-Kuen Shieh:

Spigot: Fragment-Level File Sharing and Consistency on Grids. 884-891 - Huey-Ing Liu, Bing-Rong Tang:

DACA: Dynamic Anti-Cheating Architecture for MMOGs. 892-897
Wireless Sensor Networks 3
- Quan Le Trung, Amirhosein Taherkordi, Frank Eliassen, Hai Ngoc Pham, Tor Skeie, Paal E. Engelstad:

DCM-Arch: An Architecture for Data, Control, and Management in Wireless Sensor Networks. 898-905 - Ryouhei Kawano, Toshiaki Miyazaki:

Effective Sensing Function Allocation Using a Distributed Graph Coloring and a Slot Allocation Algorithm in Wireless Sensor Networks. 906-913 - William A. Lintz, John C. McEachen, Murali Tummala:

A Method for Determining Weight Reset Timing in a Wirelessly Networked Array with Independently Mobile Elements. 914-920 - Dawn Rohm, Mukul Goyal, Seyed Hossein Hosseini, August Divjak, Yusuf Bashir:

Configuring Beaconless IEEE 802.15.4 Networks Under Different Traffic Loads. 921-928
Distributed Databases and Data Mining
- Shigeaki Sakurai, Hideki Tsutsui, Ryohei Orihara:

Classification of Bloggers Using Social Annotations. 929-936 - Helen X. Xiang:

Supporting Complex Scientific Database Schemas in a Grid Middleware. 937-944 - Marwan Alseid, Dimitrios Rigas:

Utilising Multimodal Interaction Metaphors in E-learning Applications: An Experimental Study. 945-950 - Takuro Horie, Go Hasegawa

, Satoshi Kamei, Masayuki Murata
:
A New Method of Proactive Recovery Mechanism for Large-Scale Network Failures. 951-958
Communication Technology and Protocols 2
- Ruen Chze Loh, Sieteng Soh

, Mihai M. Lazarescu
:
An Approach to Find Maximal Disjoint Paths with Reliability and Delay Constraints. 959-964 - In-Su Yoon, Sang-Hwa Chung, Jeong-Soo Kim:

Implementation of Lightweight TCP/IP for Small, Wireless Embedded Systems. 965-970 - Melissa Tjiong, Johan Lukkien:

On the False-Positive and False-Negative Behavior of a Soft-State Signaling Protocol. 971-979

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














