


default search action
FGCN 2007: Jeju-Island, Korea
- Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings. IEEE Computer Society 2007

Volume 1
Main Conference Papers
- Jianxi Yang, Yuan Wang, Liang Chu:

Designing Strategies on Frame Structure in the Rate Adaptive Communication. 3-7 - Lars Landmark, Knut Øvsthus, Øivind Kure:

Alternative Packet Forwarding for Otherwise Discarded Packets. 8-15 - Xiaolin Wang, Jianqin Zhou:

Generalized Partially Bent Functions. 16-21 - Yujun Chen, Yuebin Bai, Chao Li, Shujuan Liu, Depei Qian:

An Architecture of Policy-Based Application-aware Network QoS Management for Large-scale Heterogeneous Networks. 22-26 - Jianqin Zhou, Zhenfei Xie, Tomoaki Ohtsuki:

Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA. 27-31 - Jacek Pomykala, Tomasz Warchol:

Threshold Signatures in Dynamic Groups. 32-37 - Chaonan Peng, Hui Wang, Chuanzhen Li, Qin Zhang:

The Optimization of the H.264 Encoder Based On TI TMS320DM642. 38-42 - Wang Huijin, Lin Yongting:

Cone: A Topology-Aware Structured P2P System with Proximity Neighbor Selection. 43-49 - Xinyu Yang, Ting Ma:

A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6. 50-55 - K. A. Moustafa, Wael M. Badawy

:
(Color/Gray) Image in Color Cover Hiding Using Modification of Spatial Domain Hiding Method. 56-61 - Young-Soo Kim, Seok-Soo Kim:

Delay Model for Flooding of Service Prevention in E-Commerce System. 62-67 - Young-Soo Kim, Seok-Soo Kim:

Grant Model for Message Detour in Electronic Business System. 68-73 - Young-Soo Kim, Kab-Seung Kou, Gang-Soo Lee:

Intrusion Tolerance Model for Electronic Commerce System. 74-79 - Eun Sung Jeon, Yohan Kim, Dong Ku Kim:

Two New Types of Candidate Symbol Sorting Schemes for Complexity Reduction of a Sphere Decoder. 80-84 - Eun Sung Jeon, Janghoon Yang, Dong Ku Kim:

Complexity Limited Sphere Decoder and its SER Performance Analysis. 85-89 - Chia-Yu Yu, Chih-Heng Ke, Reuy-Shin Chen, Ce-Kuen Shieh, Bilal Munir, Naveen K. Chilamkurti:

MyEvalvid_RTP: A New Simulation Tool-set Toward More Realistic Simulation. 90-93 - Lei Guo

, Xingwei Wang, Cunqian Yu:
Survivable Routing with Risk-Level Disjoint in WDM Optical Networks. 94-99 - Miss Laiha Mat Kiah

, Keith M. Martin:
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. 100-107 - Toshihiro Suzuki, Ashiq Khan, Motonari Kobayashi, Wataru Takita:

Collaboration in Routing and Velocity Measurement Function for Mobile Ad hoc Networks. 108-113 - Xiaodong Liu, Quan Miao, Daxing Li:

A Biometric Identity Based Signature Scheme with Convenient Verification. 114-117 - Yaping Liu, Junfeng He, Zhenghu Gong:

BGP-ESOM: BGP Egress Selection Optimization Model Based on Traffic Demand. 118-123 - Kyungryong Seo, Soo-Young Lee:

Edge Detection Using Orientation-Independent Operators in Large-Scale Sensor Networks. 124-129 - Abir Baroudy, Salah-Eddine Elayoubi:

HSUPA/HSDPA Systems: Capacity and Dimensioning. 130-135 - Thomas Dreibholz

, Erwin P. Rathgeb:
An Evalulation of the Pool Maintenance Overhead in Reliable Server Pooling Systems. 136-143 - Guolin Sun, Bo Hu:

A Minimum Entropy Estimation Based Mobile Positioning Algorithm. 144-147 - Guolin Sun, Bo Hu:

Delay Analysis of IEEE 802.11 DCF with Back-off Suspension. 148-151 - Ramin Hekmat, Xueli An:

Effects of Neighbor Attachment Policies on Interference in Ad-hoc and Sensor Networks. 152-156 - Nanjun Li, Werner Zorn:

Suggested Improvements for Wireless TCP Endpoints. 157-161 - Mehdi Mekni, Ronald Beaubrun:

A Model-Driven Simulation for Performance Evaluation of 1xEV-DO. 162-166 - B. Sathish Babu, Pallapa Venkataram:

An Authentication Scheme for Personalized Mobile Multimedia Services: A Cognitive Agents Based Approach. 167-172 - Xing Zhou, Thomas Dreibholz

, Erwin P. Rathgeb:
Evaluation of a Simple Load Balancing Improvement for Reliable Server Pooling with Heterogeneous Server Pools. 173-180 - Xuan Bi, Minglu Li:

Design and Implementation of MPICH2 over Optical Fiber. 181-184 - Yan Zhang, Sheng Wang, Lemin Li:

B-Reno: A New TCP Implementation Designed for TCP over OBS Networks. 185-190 - Zhong Fan:

Bandwidth Allocation for MPEG-4 Traffic in IEEE 802.11e Wireless Networks Based on Traffic Prediction. 191-196 - Fei Yin, Guy Pujolle:

Uplink Throughput Optimization for Delay-Tolerant and Contention-Based Application in IEEE 802.16 Broadband Wireless Access Networks. 197-202 - Yu Zhang, Dan Feng, Wei Tong

, Jingning Liu:
Implementation of FC-1 and FC-2 Layer for Multi-Gigabit Fibre Channel Transport. 203-207 - Xue Wang, Sheng Wang, Daowei Bi, Liang Ding, Junjie Ma

:
Collaborative Peer-to-Peer Training and Target Classification in Wireless Sensor Networks. 208-213 - Youngjoon Cha, Seongjai Kim:

PDE-Based Interpolation Methods for Image Super Resolution. 214-219 - Xiaoguang Liu, Jun Lee, Gang Wang, Guangjun Xie, Jing Liu:

K-Divided Bloom Filter Algorithm and Its Analysis. 220-224 - Hongseok Choi, Seongjai Kim:

Novel Numerical Methods for Efficient and Reliable Segmentation. 225-230 - Dajin Wang:

A Power-Balancing Scheme for Clustered Wireless Sensor Networks. 231-236 - Chien-Ting Liu, Chia-Hui Wang

, Ray-I Chang:
A QoS Improvement for Voice over Mobile IPv4 (Mobile VoIPv4). 237-243 - Jiangwen Sun, Feng-ying Zhao, Chong-Jun Wang, Shifu Chen:

Identifying and Correcting Mislabeled Training Instances. 244-250 - Hamid Shahrokh, Kamal Mohamed-Pour:

A New Structure for Single User Detection in MC-CDMA Based on Maximum Likelihood Detection. 251-255 - Po-Jen Chuang, Shao-Hsuan Chang, Chih-Shin Lin:

A PKC-Based Node Revocation Scheme in Wireless Sensor Networks. 256-261 - Roger P. Karrer, Antonio Pescapè:

2nd Generation Wireless Mesh Networks: Technical, Economical and Social Challenges. 262-267 - Katsumi Onodera, Toshiaki Miyazaki:

An Autonomous Multicast-tree Creation Algorithm for Wireless Sensor Networks. 268-273 - Yanli Cai, Wei Lou, Minglu Li:

Cover Set Problem in Directional Sensor Networks. 274-278 - Chun-Li Lin, Ching-Po Hung:

Masquerade on One-Time Password Authentication Scheme. 279-283 - Li Ma, Shilong Ma, Yuefei Sui:

A Dynamic Description Logic Approach to Extended RBAC Model. 284-288 - Zeki Yetgin

, Gamze Seckin:
Progressive Download for 3G Wireless Multicasting. 289-295 - Chunyi Song, Shigeru Shimamoto:

A Proposal of an Efficient Timing Recovery Algorithm for 4-ary Elliptical Phase Shift Keying. 296-300 - Zhu Chen, Moon Ho Lee, Chang-Joo Kim:

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System. 301-306 - Sung-Ho Jang, In Kee Kim, Jong Sik Lee:

Node Availability-Based Congestion Control Model Using Fuzzy Logic for Computational Grid. 307-312 - Dong-You Choi, Jung Jin Park:

Characteristics of Rain Attenuation Parameter for Satellite Communications at 12.25GHz. 313-317 - Dong-You Choi, Jung Jin Park:

A Study on the Cell Sectorization Using the Wide-beam and Narrow-beam for CDMA Mobile Communication Systems. 318-322 - Kihong Kim, Yongick Chung, Cheolyong Park, Youngho Son, Janghong Yoon:

Speech Quality Enhancement Based on Sinusoidal Model Using Chebyshev Filter. 323-327 - Shiuh-Jeng Wang, Hung Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai

:
Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. 328-331 - Meriem Kassar, Brigitte Kervella, Guy Pujolle:

Architecture of an Intelligent Inter-system Handover Management Scheme. 332-337 - Yu-Zhi Huang, Wen-Jiunn Liu, Kai-Ten Feng

:
A Heuristic Energy-Conserving Multicast Routing Protocol for Wireless Multihop Networks. 338-341 - Govardhanan Kousalya

, P. Narayanasamy, Jong Hyuk Park, Yoon Ho Kim, Heau-Jo Kang:
Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks. 342-349 - Tran Hoang Hai

, Eui-nam Huh:
Optimal Selection and Activation of Intrusion Detection Agents for Wireless Sensor Networks. 350-355 - Chao Li, Yuebin Bai, Yujun Chen, Shujuan Liu, Lei Gong, Depei Qian:

A QoS Oriented Network Service Architecture for Grid Applications. 356-361 - Nahar Sultana, Ki-Moon Choi, Eui-nam Huh:

Application Driven Cluster Based Group Key Management with Identifier in Mobile Wireless Sensor Network. 362-367 - Xuesong Cao, Zhaoping Wang, Ruimin Hu, Jun Chen:

Distributed Video Surveillance System Based on Overlay Network. 368-373 - Huai-Jen Liu, Chih-Hao Wang, Chih-Lin Tseng:

Transparent IP Mobility Management. 374-377 - Yunyi Zhang, Chongzheng Huang, Deyun Zhang:

A Novel Adaptive Load Shedding Scheme for Data Stream Processing. 378-384 - Wei-Di Hong, Tien-Hsu Lee, Pao-Chi Chang:

Real-Time Foreground Segmentation for the Moving Camera Based on H.264 Video Coding Information. 385-390 - Yutaka Sugawara, Mary Inaba, Kei Hiraki:

Flow Balancing Hardware for Parallel TCP Streams on Long Fat Pipe Network. 391-396 - Lu Yu:

First Passage Time Analysis in Event-Driven Wireless Sensor Networks. 397-401 - Zion Hwang, Yoonsik Uhm, Minsoo Lee, Yong Kim, Gwanyeon Kim, Sehyun Park:

A Context-Aware System Architecture for Dealing with the Emergency by the Community Service in Apartment. 402-407 - Beatrice Cynthia Dhinakaran, Cheol-Joo Chae, Jae-Kwang Lee:

An Empirical Study of Spam and Spam Vulnerable email Accounts. 408-413 - Fayçal Ykhlef, Mhania Guerti, Messaoud Bensebti:

Pitch Modification of Speech Signal Using Source Filter Model by Linear Prediction for Prosodic Transformations. 414-419 - Nguyen Thi Van Uyen, Tae-Choong Chung:

A New Framework for Distributed Boosting Algorithm. 420-423 - Abdelli Abdelkrim

, Nadjib Badache:
Efficient Bandwidth and Buffer Management for Multimedia Data Download. 424-429 - Huai-Rong Shao, Chiu Ngo, Harkirat Singh, Sandra Qin, Chang Yeul Kwon, Guoping Fan, Seong Soo Kim:

Adaptive Multi-beam Transmission of Uncompressed Video over 60GHz Wireless Systems. 430-435 - Jaemin Park

, Junchae Na, Minjeong Kim:
A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag. 436-441 - Jinkeun Hong, Kihong Kim:

The Genetic Algorithm for RNG in the Crypto Module of Ubiquitous Computing Environment. 442-446 - Yunpeng Zang, Erik Weiss, Lothar Stibor, Hui Chen, Xi Cheng:

Opportunistic Wireless Internet Access in Vehicular Environments Using Enhanced WAVE Devices. 447-452 - Xiangjiang Hu, Peidong Zhu, Zhenghu Gong:

Translator Trust for the Internet Inter-domain Routing. 453-458 - Chang Sun, Hongjun Wang, Hua Li, Tai-Hoon Kim:

Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264. 459-463 - Wei Yang, Liusheng Huang, Yifei Yao, Zhili Chen:

Quantum Oblivious Transfer Using Tripartite Entangled States. 464-468 - Jacques-H. Bellec, M. Tahar Kechadi

:
FECk: A New Efficient Clustering Algorithm for the Events Correlation Problem in Telecommunication Networks. 469-475 - Haixue Liu, Zhao Lv, Junzhong Gu:

Research on a Model of Context-driven Similarities Computation between Data Objects. 476-481 - Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim:

An Analysis of RFID Tag Authentication Protocols Using Secret Value. 482-487 - Dongseop Kwon, Wonik Choi, Sangjun Lee:

An Inverted Index-Based Buffered Search Algorithm for Mobile Navigation Services. 488-493 - Antti Konttila, Miia Määttälä, Esko Alasaarela:

Pulse Oximeter Signal Amplitudes in Different Body Parts for Wireless Solutions. 494-498 - Abouzar Ghavami, Farid Ashtiani:

A New Cross Layer Design of Adaptive Modulation and Coding in Finite Buffer Wireless Links. 499-504 - Hakyung Jung, Yongho Seok, Taekyoung Kwon, Yanghee Choi:

A Scalable Rate Adaptation Mechanism for IEEE 802.11e Wireless. 505-509 - Deqing Zou, Hai Jin, Xueguang Chen, Zongfen Han:

Grid Security Interoperation between CGSP and VEGA. 510-515 - Eun-Jun Yoon, Kee-Young Yoo:

Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. 516-521 - Natalia Vassileva, Francisco Barceló-Arroyo:

A Survey of Routing Protocols for Energy Constrained Ad Hoc Wireless Networks. 522-527 - Sireesha Velagapalli, Huirong Fu:

Beacon-less Location Detection in Wireless Sensor Networks for Non-flat Terrain. 528-534 - Jun Bi

, Ping Hu, Lizhong Xie:
Site Multihoming: Practices, Mechanisms and Perspective. 535-540 - Sazia Parvin

, Jong Sou Park:
An Efficient Music Retrieval Using Noise Cancellation. 541-546 - Jahangir Dadkhah Chimeh, Mohammad Hakkak, Seyed Ali Alavian:

Internet Traffic and Capacity Evaluation in UMTS Downlink. 547-552 - Gyu Myoung Lee, Jun Kyun Choi, Hyoung-Jun Kim:

Signaling Technogies to Support QoS in IPv6-Based NGN. 553-556 - Siwaruk Siwamogsatham:

Improving CSMA for WLANs via Piggybacking and Scheduled Backoff Mechanisms. 557-563 - Kisik Chang, Gibum Kim, Kwonyoup Kim, Woosuk Kim:

Initial Case Analysis Using Windows Registry in Computer Forensics. 564-569 - Nanqing Zhou, Hao Liu:

Nonlinear Channel Estimation Based on Multi-level PN Sequence in OFDM Systems. 570-574 - Chao-Tung Yang, Tsui-Ting Chen, Hao-Yu Tung:

A Dynamic Domain-Based Network Information Model for Computational Grids. 575-578 - Hak-Man Kim, Jong-Joo Lee, Dong-Joo Kang:

A Platform for Smart Substations. 579-582
Volume 2
International Symposium on Smart Home
- Hui Jin, Haiguang Chen:

Lightweight Session Key Management Scheme in Sensor Networks. 3-6 - Yun-kyung Lee, Deok-Gyu Lee, Jong Wook Han:

Home Device Authentication Method Based on PKI. 7-11 - Taketoshi Mori, Akinori Fujii, Masamichi Shimosaka, Hiroshi Noguchi, Tomomasa Sato:

Typical Behavior Patterns Extraction and Anomaly Detection Algorithm Based on Accumulated Home Sensor Data. 12-18 - Hiroshi Noguchi, Hiroyuki Kojo, Taketoshi Mori, Tomomasa Sato:

Search System for Behavior Time Segments from Accumulated Sensor Data in Room Environment. 19-24 - Taketoshi Mori, Chetaphan Siridanupath, Hiroshi Noguchi, Tomomasa Sato:

Active RFID-Based Object Management System in Sensor-Embedded Environment. 25-30 - Kai-Chun Huang, Yun-Sheng Yen, Han-Chieh Chao

:
Tree-Clustered Data Gathering Protocol (TCDGP) for Wireless Sensor Networks. 31-36 - Prachya Kamol, Stefanos Nikolaidis

, Ryuichi Ueda, Tamio Arai:
RFID Based Object Localization System Using Ceiling Cameras with Particle Filter. 37-42 - Bosheng Zhou, Alan Marshall, Wenzhe Zhou, Tsung-Han Lee:

Novel Wireless Mesh Networking Architectures for Future Smart Homes. 43-48 - Dong-oh Kang, Kyuchang Kang, Hyung Jik Lee, Eun Jung Ko, Jeun Woo Lee:

A Systematic Design Tool of Context Aware System for Ubiquitous Healthcare Service in a Smart Home. 49-54 - Jong-Hyouk Lee, Byung-Jin Han, Hyo-Keun Bang, Tai-Myoung Chung:

An Optimal Access Points Allocation Scheme Based on Genetic Algorithm. 55-59 - Miguel Valero, Iván Pau, Laura Vadillo, Ana Peñhalver, Esther Gago, Marisa Martin, Magdalena González, Eloy Portillo:

An Implementation Framework for Smart Home Telecare Services. 60-65 - Eun-Jun Yoon, Kee-Young Yoo:

Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. 66-70 - Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen:

Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. 71-75 - Junmo Yang, Bonam Kim, Ilsun You:

Link Quality-Based (LQ-CDS) Construction in Smart Home Wireless Mesh Networks. 76-80 - Kyudong Lee, Hyun Sang Cho, Kyoung Shin Park, Minsoo Hahn:

Ambient Lamp Display in the Active Home Ubiquitous Computing Environment for Relaxing and Mediation. 81-86 - Ki-sung Hong, Hyoung Joong Kim, Chulung Lee:

Automated Grocery Ordering Systems for Smart Home. 87-92 - Jung-Eun Lim, O-Hoon Choi, Hong-Seok Na, Doo-Kwon Baik:

Design of Intelligent Fitness Guide System in Context Aware Exercise Environment. 93-96
International Workshop on Forensics for Future Generation Communication Environments
- Seokhee Lee

, Antonio Savoldi, Sangjin Lee, Jongin Lim:
Windows Pagefile Collection and Analysis for a Live Forensics Context. 97-101 - Mitsuyuki Takatsuka, Masataka Tada, Ryôichi Sasaki:

Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing Evidence. 102-107 - Che-Jen Hsieh, Wei-Cheng Liu, Jung-Shian Li:

An Efficient Packet-level JPEG Forensic Data Collection. 108-113 - Sang Su Lee, Ku-Young Chang, Deokgyu Lee, Dowon Hong

:
A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme. 114-118 - Jin-Oh Jeon, Su-Bong Ryu, Tae-Min Chang, Ho-Yong Choi, Min-Sup Kang:

Digital Codec Design for RFID Tag Based on Cryptographic Authentication Protocol. 119-124 - Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang:

Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. 125-129 - Gu Taek Lee, Seokhee Lee

, Elena Tsomko, Sangjin Lee:
Discovering Methodology and Scenario to Detect Covert Database System. 130-135 - Frank Y. W. Law, Kam-Pui Chow, Michael Y. K. Kwan, Pierre K. Y. Lai:

Consistency Issue on Live Systems Forensics. 136-140 - Zoe Lin Jiang, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu, Pierre K. Y. Lai:

Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. 141-145 - Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee, Jongin Lim:

A Field Guide to Hidden Accounting Information Detection. 146-150 - Wen-Chung Kuo:

On ElGamal Signature Scheme. 151-153 - Yu-Li Lin, Tzong-Chen Wu, Chien-Lung Hsu, Yen-Chun Chou:

Standard Operating Procedure and Privilege Management in Taiwan Digital Forensics. 154-158
International Workshop on Future Broadband Wireless Access Systems, Communications, and Networks
- Masaaki Fujii:

Rate Control for Zero-Forcing Beamforming Multiuser MIMO Systems with QR-Decomposition MLD Receiver. 159-162 - Tao Luo, Yong Liang Guan

, Gang Wu
, Shaoqian Li, Choi Look Law:
A Performance Comparison of DS-CDMA and MC-CDMA with Per-User MMSE Frequency Domain Equalization. 163-167 - Shoufeng Deng, Jie Chen, Hao He, Wanbin Tang:

Collaborative Strategy for Route and Spectrum Selection in Cognitive Radio Networks. 168-172 - Yuan Tian, Xia Lei, Wanbin Tang, Shaoqian Li:

Effect of Adaptive Threshold on Time Synchronization Based on PN Sequences in OFDM System. 173-176 - Lei Zhang, Gang Wu

, Shaoqian Li:
BER Criterion for Transmit Beamforming in MISO-OFDM with Limited Feedback. 177-180 - Xiaoyin Fang, Gang Wu

, Haiyang Huang, Xia Lei, Shaoqian Li:
An Improved Approach of Reducing Feedback for Precoded MIMO-OFDM System. 181-185 - Chi Xu, Choi L. Law:

Experimental Evaluation of UWB Ranging Performance for Correlation and ED Receivers in Dense Multipath Environment. 186-192 - Xia Lei, Zheng Li, Youxi Tang, Shaoqian Li:

Analysis of the Performance of Iterative Estimation and Cancellation of Clipping Non-linear Distortion in OFDM. 193-197 - Li-ming Li, Li-dong Zhu, Shi-qi Wu:

Design on the Simulation Platform for Mobility Management in LEO Satellite Network Based on OPNET. 198-202 - Xuehua Li, Zhensong Li, Yiqing Cao, Dacheng Yang:

An Ordered HARQ Scheme for LDPC-Coded OFDM System. 203-206 - Jinfeng Du, Svante Signell:

Comparison of CP-OFDM and OFDM/OQAM in Doubly Dispersive Channels. 207-211 - Qi Wu, Haiyang Huang, Gang Wu

, Xia Lei, Shaoqian Li:
A Time Domain Tracking Method for Limited-Rate Feedback Precoding in MIMO Systems. 212-215 - Antoni Barba Marti, Juan Antonio Guerrero Ibáñez, Daniel Hernández García, Oriol Rocafort:

Evaluation of the Authentication Service on the Access Management for Heterogeneous Mobile Communication Networks. 216-219 - Ning He, Hong Wen, Shuya Yang, Liang Zhou:

An Adaptive Packet Repeat Proposal RB_IR_HARQ Scheme based on LDPC code. 220-223 - Defu Sun, Youxi Tang, Shihai Shao, Shaoqian Li:

Differential Space-Time Modulation for Modified V-BLAST System. 224-227 - Wei Sun, Xiang Chen, Zesong Fei, Jingming Kuang:

Link Adaptation of LDPC Codes Based on Exponential Effective-SNR Mapping Link Quality Model. 228-232 - Changsheng Wan, Aiqun Hu:

A Dynamic Network Access Identifier Used for Location Privacy. 233-236 - Tian Lan, Jianhao Hu, Xingzhong Xiong:

A Time Reversal Based Time Division Duplex IDMA Communication System. 237-240 - Shuya Yang, Hong Wen, Ning He, Liang Zhou:

The New Decoding Method of Rate Compatible LDPC Codes Based on the IR-HARQ Schemes. 241-243 - Jinliang Huang, Svante Signell:

The Spectral Efficiency of 2 × 2 Adaptive MIMO Systems in Spatially Correlated Rayleigh Fading Channel. 244-247 - Zhiping Shi, Liang Zhou:

A Combining Decoding Method of LDPC Codes for HARQ. 248-251 - Jisu Jiang, Choi L. Law, Chao Fang:

A Novel 3-5GHz Distributed Amplifier Structure Based Matched Filter for UWB Receiver. 252-257
International Workshop on Cooperative Wireless Communications and Networking
- Saman Atapattu, Nandana Rajatheva:

Performance Evaluation of Alamouti STC through Amplify-Forward Cooperative Relay Network over Nakagami-m Fading Channels. 258-263 - Xiaomao Mao, Peiliang Qiu:

Cognitive Relay. 264-269 - Takashi Ishikawa, Seishi Hanaoka, Mikio Kataoka, Masashi Yano, Shinji Nishimura:

Basic Simulation Result of Inter System Handover for Cognitive Radio. 270-273 - Hao Hu, Wenan Zhou, Junde Song:

A Dynamic Spectrum Sharing Scheme Based on SA-OFDM for Cognitive Radios. 274-278 - Zhang Chenghai, Hu Jianhao:

The Shifting Interleaver Design Based on PN Sequence for IDMA Systems. 279-284 - Jian Qiang, Zheng-Hu Gong, Chunmei Gui:

A MAC-Routing Integrated Protocol for Geographic Forwarding in Wireless Sensor Networks. 285-290 - Quan Yu, Jun Zheng, Tielian Fu, Kejun Wu, Baoxian Zhang:

Asynchronous Cooperative Transmission Using Distributed Unitary Space-Frequency Coded OFDM in Mobile Ad Hoc Networks. 291-296
International Workshop on Peer-to-Peer Computing for Information Search
- Jun Ye, Zhishu Li, Qing Li:

A Resource Search Model Based on Semantically Enabled P2P Grid. 297-302 - Changyou Zhang, Liu Renfen, Yuanda Cao, Zhitao Guan:

The Permission Delegation Mechanism for P2P Network. 303-308 - Lin Zhu, Shuigeng Zhou, Jihong Guan:

Efficient Skyline Retrieval on Peer-to-Peer Networks. 309-314 - Wei Gao, Chunhe Xia, Nan Li, Haiquan Wang:

Research on Simulation Framework of Structured P2P Network. 315-319 - Desheng Li, Haiyang Wang, Peiyao Nie:

Intelligent Process Platform. 320-325 - Judith Winter, Oswald Drobnik:

Peer-to-Peer Cooperation for Content-Oriented XML-Retrieval. 326-331 - Ming Xu, Jihong Guan:

Routing Based Load Balancing for Unstructured P2P Networks. 332-337 - Qinliang Jiang, Jihong Guan:

A Peer-to-Peer Based Text Sharing and Retrieval System. 338-343
International Workshop on Wireless Ad Hoc, Mesh and Sensor Networks
- Razia Haider, Muhammad Younas Javed, Naveed S. Khattak:

EAGR: Energy Aware Greedy Routing in Sensor Networks. 344-349 - Marcel C. Castro, Peter Dely, Jonas Karlsson, Andreas Kassler:

Capacity Increase for Voice over IP Traffic through Packet Aggregation in Wireless Multihop Mesh Networks. 350-355 - Liang Cheng, Anu G. Bourgeois, Xin Zhang:

A Performance Comparison Study of GTS Allocation Schemes in IEEE 802.15.4. 356-361 - Hesiri Weerasinghe, Huirong Fu:

Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. 362-367 - Huimin She, Zhonghai Lu, Axel Jantsch, Li-Rong Zheng, Dian Zhou:

Traffic Splitting with Network Calculus for Mesh Sensor Networks. 368-373 - Marco Leogrande, Claudio Pastrone

, Maurizio A. Spirito
, Riccardo Tomasi
:
A Framework for Flexible Packet Processing in Heterogeneous Sensor Networks. 374-379 - Yan Guo, Bei Hua, Lihua Yue:

Energy-Based Target Numeration in Wireless Sensor Networks. 380-385 - Huansheng Ning

, Na Ning, Shenfeng Qu, Yan Zhang, Huiping Yang:
Layered Structure and Management in Internet of Things. 386-389 - Xiaoli Wang, Daqing Gu, Tao Shu:

Adaptive Application-specific Cooperative Relay for Wireless Video Sensor Networks. 390-395 - Chung-wei Lee, Jonathan C. L. Liu, Kun Chen, Yu-Chee Tseng, Sheng-Po Kuo:

Supporting Multimedia Communication within an 802.11g Ad-hoc Network. 396-401 - Majid Alkaee Taleghan, Amirhosein Taherkordi, Mohsen Sharifi, Tai-Hoon Kim:

A Survey of System Software for Wireless Sensor Networks. 402-407 - Inès El Korbi, Leïla Azouz Saïdane:

Supporting Deadline Monotonic Policy over 802.11 MAC Layer Service Time Distribution. 408-413 - Chai-Keong Toh:

Future Application Scenarios for MANET-Based Intelligent Transportation Systems. 414-417
Information Assurance in Networks
- Slobodan Petrovic, Katrin Franke:

A New Two-Stage Search Procedure for Misuse Detection. 418-422 - Damien Sauveron, Pierre Dusart:

Which Trust Can Be Expected of the Common Criteria Certification at End-User Level? 423-428 - Jae-young Jo, Yoon-Ho Kim, Hee-jo Kang, Joo-shin Lee:

Chord-Based Musical Composition and Incorporating it into Auto-Accompaniment Instrument. 429-432 - Kyung-Yup Kim, John T. Lee, Dong-Kuk Yu, Young-Sik Park:

Parameter Estimation of Noisy Passive Telemetry Sensor System Using Unscented Kalman Filter. 433-438 - Dong-Hee Park, Yoonsik Kwak:

Design Multi-Band Microstrip Patch Antennas for Wireless Terminals. 439-441 - Young Jae Lee, Yong Jae Lee:

The Analysis of PPL Attention Effects in the Screen of Multimedia Contents. 442-447 - Sunheum Lee, KwanSun Choi, Dongsik Kim, Changwan Jeon, Young Doo Ahn:

A Novel Method for Performance Evaluation of Focused Ultrasonic Transducers. 448-452 - Kwang Moon Cho:

Management of Access Control for Content Packages by Using XML Subject-Based Encryption. 453-457 - In-Sik Choi, Ill-Keun Rhee, Young-Hoon Lee:

Signal Parameter Extraction via Component Cancellation Using Evolutionary Programming. 458-462 - Donghee Shim, Dongyoung Cho, Wankwon Lee, SeongHoon Lee:

Study on Channel Allocation Strategy Using Time Constraints in Cellular Networks. 463-467 - Dae-Sik Ko:

A Design of X-internet Development Framework Based on Server Service Application Programming Interface. 468-471 - Sang-Jo Youk, Seung-Sun Yoo, Yong-Tae Kim, Gil-Cheol Park:

Fault Detection System Using Directional Classified Rule-Based in AHU. 472-477 - Yoon-Cheol Hwang, Yoon-Su Jeong, Sang Ho Lee, Jeong-Young Song, Jin-Il Kim:

Advanced Efficiency and Stability Combined Weight Based Distributed Clustering Algorithm in MANET. 478-483 - YunHee Kang:

Extended Model Design for Quality Factor Based Web Service Management. 484-487 - Ze-Guang Jin, Heau-Jo Kang, Yoon Ho Kim:

Performance of Adaptive Array Antenna for Multicarrier CDMA System in Slow Nakagami-m Fading Channels. 488-491 - Sunyoung Baek, Jinyoung An, Sungsin Lee, Sangchoon Kim:

Error Performance Analysis of Multi-User Binary PAM TH UWB Systems with Multiple Receive Antennas. 492-495 - Seung Ho Ok, Byung In Moon:

A Digit Reversal Circuit for the Variable-Length Radix-4 FFT. 496-500 - Yu-Doo Kim, Il-Young Moon, Heau-Jo Kang:

Performance Analysis of TCP over Wireless Network Using Error Model. 501-504 - Byoung-Uk Park, Hack-Yoon Kim:

A New 3D Sound Reproduction Method Using an Auditory Filter. 505-509 - Jinho Ahn:

Efficient Failure Detection and Recovery Scheme for Hierarchical Distributed Monitoring. 510-515 - Jang-Hui Kim, Young-Do Lim, Dae-Seong Kang:

The Moving Picture Retrieval System Using Visual Descriptors and Cut Detection. 516-521 - Seok Il Song, Yoonsik Kwak:

U-Storage: A New On-line Storage System for Ubiquitous Environment. 522-526 - Jin-Il Kim, Jeong-Young Song, Yoon-Cheol Hwang:

Location-Based Routing Algorithm Using Clustering in the MANET. 527-531 - Dong-Joo Kang, Hak-Man Kim:

A Method for Determination of Key Distribution Period Using QoS Function. 532-535
Communication & Network Technology Management
- Jaemin Kwak, Kitaek Lim, Pusik Park, Daekyo Shin, Jongchan Choi:

Unequal Preamble Power Allocation Scheme for Frequency Offset Estimation in OFDM Based Packet Communication Systems. 536-539 - G. Varaprasad, R. S. D. Wahida Banu, Pallapa Venkataram:

New Algorithm for Effective Utilization of Bandwidth for Sensitive Applications. 540-542 - Sung-Min Jang, Yoo-Hun Won:

Web Anomaly Detection System for Mobile Web Client. 543-547 - Zonghua Liu, Guangqing Liu, Taemin Kim, Byungwook Lee, Myung-Mook Han:

Flexible License Management Mechanism for Group Distribution. 548-552 - Jinhyung Kim, Jun Hwang, Taemin Kim, Byungwook Lee:

Device Certification System and Method for User's Convenient Contents Use. 553-558 - JeongWook Kim, Hyug-Hyun Cho, Gil-Jong Mun, Jae-Hyun Seo, Bong-Nam Noh, Yongmin Kim:

Experiments and Countermeasures of Security Vulnerabilities on Next Generation Network. 559-564 - Woo Yeol Kim, Hyun Seung Son, Robert Young Chul Kim, Byung Kook Jeon:

User Behavior Analysis Framework (UBAF) : Mapping HCI with SE. 565-568 - Ahmad Ibrahim

, Ho-Jin Choi:
Role of Annotation in Electronic Process Guide (EPG). 569-572 - Enkhbold Nyamsuren

, Ho-Jin Choi:
Preventing Social Engineering in Ubiquitous Environment. 573-577 - Syed Ahsan Fahmi, Ahmad Ibrahim

, Ho-Jin Choi:
Enhancing Requirements Engineering Activities through the Use of Mobile Technology Devices and Tools. 578-581 - Joonhoon Park, Ryumduck Oh:

Implementation of Digital Stereo Amplifier for Mobile IT Devices Based on Wireless Communication System Using Bluetooth. 582-585 - Marwa Elbouz

, Ayman Alfalou, Habib Hamam:
Fast Transmission by Mobile Phone of Recognition Sign Language using a Segmented Multidecision Filter Adapted to the Parallel Virtual Machine (PVM). 586-589 - Ayman Alfalou, Alain Loussert

, Abdulsalam Alkholidi, Rami El Sawda:
System for Image Compression and Encryption by Spectrum Fusion in Order to Optimize Image Transmission. 590-593 - Rami El Sawda, Ayman Alfalou, Habib Hamam

:
RGB Colored Image Encryption Processes Using Several Colored Keys Images. 594-598 - Bonam Kim, Youngjoon Kim, InSung Lee, Ilsun You:

Design and Implementation of a Ubiquitous ECG Monitoring System Using SIP and the Zigbee Network. 599-604 - Sun-Yuan Hsieh, Che-Nan Kuo, Hui-Ling Huang:

Longest Fault-Free Paths in Hypercubes with both Faulty Nodes and Edges. 605-608 - Dong-Joo Kang, Hak-Man Kim:

A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network. 609-613

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














