


default search action
FGCN 2008: Hainan Island, China
- The Second International Conference on Future Generation Communication and Networking, FGCN 2008, Volume 1, Main Conference, Hainan Island, China, December 13-15, 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3431-2

- Xianghui Cao

, Jiming Chen, Yang Xiao
, Youxian Sun:
Distributed Collaborative Control Using Wireless Sensor and Actuator Networks. 3-6 - Kun Ding, Xiaoyi Zhang, Bo Deng:

C-NMSP: A High Performance Network Management Service Platform for Complex Event Processing. 7-10 - Roger P. Karrer, Ulrich Kuehn, Thomas Huehn

:
Joint Application and Network Defense against DDoS Flooding Attacks in the Future Internet. 11-16 - Lei Shu

, Chun Wu, Yan Zhang, Jiming Chen, Lei Wang, Manfred Hauswirth:
NetTopo: Beyond Simulator and Visualizer for Wireless Sensor Networks. 17-20 - Chenn-Jung Huang

, You-Jia Chen, I-Fan Chen, Kai-Wen Hu, Jia-Jian Liao, Dian-Xiu Yang:
A Clustering Head Selection Algorithm for Underwater Sensor Networks. 21-24 - Sobhan Masoudi, Amir Masoud Rahmani

, Arash Nasiri Eghbali, Ahmad Khademzadeh:
GMPR: A Greedy Multi-path Routing Algorithm for Wireless Sensor Networks. 25-30 - Hao Wu, Jiming Chen, Chengqun Wang, Youxian Sun:

A Kernel-Based Localization Approach in Wireless Sensor Networks. 31-34 - Lei Chen, Bao-Hua Zhao:

An Interference Free Data Aggregation Protocol for Clustered Wireless Sensor Networks. 35-39 - Lei Ren, Liang He, Junzhong Gu, Weiwei Xia, Faqing Wu:

A Hybrid Recommender Approach Based on Widrow-Hoff Learning. 40-45 - Svetlana Kim, Yongik Yoon:

Universal Video Adaptation Model for Contents Delivery Using Focus-of-Choice Model. 46-49 - Bo Deng, Hui Zhang, Kun Deng, Guoquan Jiang:

Adaptive Top-k Query Processing in Intermittently Connected Networks. 50-53 - Yury Audzevich, Yoram Ofek:

Assessment and Open-Issues of the Load-Balanced Switching Architecture. 54-61 - Ruiyun Yu, Xingwei Wang, Sajal K. Das

:
A Voronoi Diagram Approach for Mobile Element Scheduling in Sparse Sensor Networks. 62-67 - Lei Shu

, Yan Zhang, Laurence Tianruo Yang, Yu Wang, Manfred Hauswirth:
Geographic Routing in Wireless Multimedia Sensor Networks. 68-73 - Yongming Jin, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen:

An Improved Scheme for Delegation Based on Usage Control. 74-78 - Ji Jun, Xiao Hong, Meng Xiang Ping, Xu Jan Ren, Zhao Jie Hong:

Simulation Results on Hierarchical Cell Structures. 79-82 - Guanfei Guo, Yaoxue Zhang, Yuezhi Zhou, Laurence Tianruo Yang, Li Wei, Pengwei Tian:

Performance Modeling and Analysis of the Booting Process in a Transparent Computing Environment. 83-88 - Kun-Ming Yu, Chang-Wu Yu

, Zheng-Yi Lin:
A Density-Based Algorithm for Redundant Reader Elimination in a RFID Network. 89-92 - Nan Li, Chunhe Xia, Jianzhong Qi, Haiquan Wang:

A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception. 93-97 - Jian Wan, Wanyong Chen, Xianghua Xu, Miaoqi Fang:

An Efficient Self-Healing Scheme for Wireless Sensor Networks. 98-101 - Guang Cheng, Jian Gong:

A Detecting Superpoint Algorithm on Multiple Sampling Technology. 102-105 - Mankun Xu, Tianyun Li, Xijian Ping:

Steganalysis of LSB Matching Based on Wavelet Denoising Estimation in Grayscale Image. 106-109 - Sung-Won Kim, Chang-Wu Lee, Won-Hee Han, Sung-Jin Baek, Eun-Ha Song, Young-Sik Jeong:

Real-Time Monitoring of Multi Mobile Objects with USN and GML. 110-115 - Naixue Xiong, Hongyan Li, Tai-Hoon Kim, Laurence Tianruo Yang:

An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control Systems. 116-121 - Hongyun Yang, Xuhui Chen, Ruiming Hu:

An End-to-End Content-Aware Congestion Control Approach for MPEG Video Transmission. 122-125 - Jahangir Dadkhah Chimeh, Mohammad Hakkak, Paeiz Azmi, Hamidreza Bakhshi:

On the Delay Evaluation of a Maximum Bandwidth Usage IP Based Mobile System. 126-129 - Lei Guo

, Xingwei Wang, Dong Wang, Cunqian Yu, Weigang Hou, Ying Li, Chongshan Wang:
Protection Routing Algorithm Based on Survivable Integrated Auxiliary Graph in Waveband Switching Optical Networks. 130-133 - Zhenshan Yu, Liusheng Huang, Zhili Chen, Lingjun Li, Xinxin Zhao, Youwen Zhu:

Detection of Synonym-Substitution Modified Articles Using Context Information. 134-139 - Jian Feng:

A Novel Caching Mechanism for P2P Video-on-Demand Systems. 140-143 - Pero Latkoski

, Borislav Popovski:
Analysis and Optimization of Network Entry Delay in WiMax Networks. 144-147 - Gang Xie, Wuyi Yue, Shouyang Wang

:
Dynamic Management on Quality of Service in Mobile Communication Networks Based on VPRS Model. 148-151 - Guang Cheng, Wei Zhao, Jian Gong:

XOR Hashing Algorithms to Measured Flows at the High-Speed Link. 152-155 - SungSuk Kim, Sun Ok Yang:

Multi-attribute Query Processing with Partial Information in Sensor Networks. 156-159 - Zhen-Ai Jin, Zi-Qiang Cheng, Kee-Young Yoo:

Spacing Based Authentication Protocol for Low-Cost RFID. 160-163 - Kwang-il Hwang:

Dynamic Multi-channel MAC Protocol for LR-WPAN Based on Interference Learning. 164-167 - Jahangir Dadkhah Chimeh, Mohammad Hakkak, Hamidreza Bakhshi, Paeiz Azmi:

Throughput Evaluation in UMTS. 168-171 - Wei Lin, Liu Xiang, Derek Chi-Wai Pao

, Bin Liu:
Collaborative Distributed Intrusion Detection System. 172-177 - Fahim Kawsar, Tatsuo Nakajima, Jong Hyuk Park, Young-Sik Jeong:

A Document Based Framework for Smart Object Systems. 178-183 - Shangda Yang, Weiming Wang, Bin Zhuge:

Performance Analysis and Optimization of TML in ForCES Router. 184-187 - Hai Jiang, Jun Li, Zhongcheng Li, Xiang-yu Bai:

Performance Evaluation of Content Distribution in Hybrid CDN-P2P Network. 188-193 - Lu Ye:

A Novel General RFID Framework Based on Middleware and Data Cleaning. 194-197 - Xinqing Yan, Zhouping Yin, Youlun Xiong:

A Query Tree Dynamic Frame Slot ALOHA Collision Resolution Protocol for RFID Tags. 198-201 - Fei Song, Baohua Zhao:

Trust-Based LEACH Protocol for Wireless Sensor Networks. 202-207 - Ziping Hu, Pramode K. Verma, James J. Sluss Jr.

:
Routing in Degree-Constrained FSO Mesh Networks. 208-215 - Abdelli Abdelkrim

:
Extending the Verification of Multimedia Presentation Consistency to Resource Requirements.. 216-219 - GuoDong Kang, Tanguy Pérennou, Michel Diaz:

Barycentric Location Estimation for Indoors Localization in Opportunistic Wireless Networks. 220-225 - Peng Zhang, Furong Wang, Lai Tu, Sacko Diouba:

Performance Analysis and Diversity-Multiplexing Tradeoff in Virtual Antenna Array. 226-229 - Yuntao Zhao, Yongxin Feng, Liu Fang:

An Improved Resistant to Destruction Routing Algorithm Based on LEO Satellite Network. 230-233 - Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-Hoon Kim:

A Novel Approach for Infrastructure Deployment for VANET. 234-238 - You-Shin Park, Ki-Hyun Kang, Yong-In Yun, Jong-Soo Choi, Ho-Keun Song, Jong-Ho Choi:

A New Descriptor of Slices Histogram from 3D Shape Models. 239-242 - Lianfen Huang, Mingyong Lu, Jianan Lin, Xueyuan Jiang:

A New Collaborative Multipath Transmission Scheme for Mobile Ad Hoc Networks. 243-247 - Zhichao Mi, Jianjiang Zhou:

A Routing Algorithm for Energy-Balanced under Reliability Constraint in Wireless Sensor Networks. 248-251 - Yuhua Liu, Longquan Zhu, Jingju Gao, Yuling Li:

A Segment Strategy Based on Flooding Search in Unstructured P2P Network. 252-255 - Yanan Chang, Debao Xiao, Hui Xu, Limiao Chen:

Design and Implementation of NETCONF-Based Network Management System. 256-259 - Xuan Zhang, Chongrong Li, Xing Li, CongXiao Bao:

Multicast Congestion Control on Many-to-Many Videoconferencing. 260-263 - Jaemin Park

, Kyoungtae Kim, Minjeong Kim:
The Aegis: UICC-Based Security Framework. 264-269 - Jian Wan, Jianrong Wu, Xianghua Xu:

A Novel Fault Detection and Recovery Mechanism for Zigbee Sensor Networks. 270-274 - Cherif Ghazel

, Leïla Azouz Saïdane:
Dimensioning of Next Generation Networks Signaling Gateway for Improving a Quality of Service Target. - Maryam Najimi, Yousef Darmani

, Mohammad Sayad Haghighi
, Kamal Mohamedpour:
An Adaptive Network Allocation Vector for IEEE 802.11-based Multi-hop Networks. 279-282 - Gang Zhang, Shujie Li, Dongxu Zhang:

Chaos Synchronization Based on Phase-Locked Loops. 283-287 - Hao-Min Lin, Whai-En Chen, Han-Chieh Chao

:
A Dynamic Minislot Allocation Scheme Based on IEEE 802.16 Mesh Mode. 288-293 - Xianghua Xu, Daomin Yuan, Jian Wan:

An Enhanced Routing Protocol for ZigBee/IEEE 802.15.4 Wireless Networks. 294-298 - Mei Hong, Hui Guo, Bin Luo

:
Security Design for Multi-service Smart Card Systems. 299-304 - Chen Shu, Wu Guo Qing, Xiao Jing:

A Process Algebra Approach for the Compatibility Analysis of Web Services. 305-308 - Xi Luo, Yi-Ying Zhang, WenCheng Yang, Myong-Soon Park:

Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks. 309-312 - Mansoureh Ghiasabadi

, Mohsen Sharifi
, Nafiseh Osati, Sareh Beheshti, Mona Sharifnejad:
An Enhanced Routing Protocol for Wireless Sensor Networks. 313-316 - Yong Qin, Yunfu Jia, Ben-Lai Liang, Han Huang, Huonin Liang, Zhao-Quan Cai:

QoSR Algorithm of Q-ACO Based on Convergence Grads Expectation. 317-320 - Kui Xu, Fan Zhang, Chunming Rong

, Bin Dai, Benxiong Huang:
Block Size Estimation for Time-Sensitive Applications under Wireless Network Coding. 321-324 - Zhengxin Lu, Yi Wang, Laurence Tianruo Yang, Lan Li, Furong Wang:

A Reliable Routing for Industrial Wireless Sensor Networks. 325-328 - Bo Qian, Li Yang, Yongxin Feng, Chengsheng Pan:

An Algorithm for Acquiring PRN Code in DSSS System Based on Sub-sampling. 329-332 - Fang Liu, Bo Qian, Yongxin Feng, Chengsheng Pan:

The High Efficiency Method of Tracking Base on Navigation Signal. 333-336 - Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-Hoon Kim:

A Prioritized Service Protocol for Vehicular Communication. 337-342 - Wenyu Zhu, Thomas Dreibholz

, Erwin P. Rathgeb, Xing Zhou:
A Scalable QoS Device for Broadband Access to Multimedia Services. 343-348 - Feng He, Furong Wang, Duan Hu:

Distance and Velocity Assisted Handoff Decision Algorithm in Heterogeneous Networks. 349-353 - Xin Yu, Chunming Rong

, Benxiong Huang:
A Flexible Garbage Collect Algorithm for Flash Storage Management. 354-357 - Ye Xu, Zhuo Wang

:
A Spectral Density Approach in Research of Internet Topology Properties. 358-361 - Shijun Zhang, Xin Yu, Shao-hua Yu, Benxiong Huang:

A DMR Fair Algorithm for Realtime Scheduler. 362-366 - Junjie Lee, Hayoung Oh, Chong-kwon Kim:

A Robust Optical Light-Path Establishment Scheme for Core Network Architecture of Future Internet. 367-372 - Yuhua Liu, Jingju Gao, Longquan Zhu, Xiaoxu Li:

Distributed Routing for Wireless Sensor Networks Based on Cluster Maintenance. 373-376 - Marek R. Ogiela, Urszula Ogiela:

Linguistic Approach to Cryptographic Data Sharing. 377-380 - B. K. Sujatha

, P. S. Satyanarayana, K. N. Haribhat:
Digital Coding of Speech Waveforms Using the Proposed ADM. 381-386 - Zhenghe Song, Bo Zhao, Zhongxiang Zhu, Meng Wang, Enrong Mao:

Research on Recognition Methods for Traffic Signs. 387-390 - Seoung-Hyeon Lee, Cheol-Joo Chae, Deok-Gyu Lee, Jong Wook Han, Jae-Kwang Lee:

The Traceback Method about DoS Attack in Open Grid Computing Environment. 391-394 - Xia Deng, Zhiping Huang, Shaojing Su, Chunwu Liu, Guilin Tang, Yimeng Zhang:

Research of Information Processing on SDH Backbone Networks. 395-398 - Ze-Guang Jin, Heau-Jo Kang:

Performance of the FS MC-CDMA System with CCI Canceller Technique in Nakagami-m Fading. 399-402 - Hui Xu, Debao Xiao, Yanan Chang, Xi Peng:

On Network Management Solutions and the Potential of P2P Technologies. 403-406 - Bo Zhang

, Qiuliang Xu:
Identity-Based Broadcast Group-Oriented Encryption from Pairings. 407-410 - Youling Zhou, Yi Wang, Jianhua Ma, Junpin Jia, Furong Wang:

A Low-Latency GTS Strategy in IEEE802.15.4 for Industrial Applications. 411-414 - Hui-Ling Lin, Ching-Shun Hsieh, Shao-Shin Hung, Derchian Tsaih:

An Efficient Framework for Distributed Enterprise Portal for Maintaining Global Patch Consistency. 415-418 - Xiaodong Liu, Yuegong Zhang:

Performance Improvement of SOK Key Distribution Scheme. 419-422 - Yunting Lu, Zhenjun Li, Min Li:

An Algorithm to Find the Constrained Steiner Tree in Halin Networks. 423-426 - Ching-Hsien Hsu, Chia-Hao Yu, Yi-Pin Huang, Kyung-Jae Ha:

An Enhanced Query Tree (EQT) Protocol for Memoryless Tag Anti-collision in RFID Systems. 427-432 - Azadeh Forghani, Amir Masoud Rahmani

:
Multi-state Fault Tolerant Topology Control Algorithm for Wireless Sensor Networks. 433-436 - Hongxia Wang, Zijing Zhang:

The Research of Restraining Clipping Noise Algorithm Based on PTS. 437-440 - Xin Yu, Shao-hua Yu, Yan Liu, Jianhua Ma:

Streaming Media Intrusion Detection through Interacting Protocol State Machines. 441-444 - Jae-du Yu, Kyung-sig Ban, Choo-yeon Shin, Young-wan Kim:

Various Six-Port Correlators Using Coupler and Power Divider. 445-448 - Guang Hu, Yan Liu, Xin Yu:

Research and Implementation of NAT Traversal for SIP in Softswitch. 449-453 - Chowdhury Sayeed Hyder, Anindya Iqbal, Une Thoing Rosi, Tai-Hoon Kim:

Towards Automated Traffic System Using Vehicular Network with Directional Antenna. 454-458 - Tsutomu Tsuboi

, Jun Yamada, Naoki Yamauchi, Masato Hayashi:
Dual Receiver Communication System for DSRC. 459-464 - Ye Xu, Zhuo Wang

:
A Scale-Free Routing Algorithm in Wireless Sensor Networks. 465-468 - Xinqing Yan, Zhouping Yin, Youlun Xiong:

A Comparative Study on the Performance of the RFID Tag Collision Resolution Protocols. 469-472 - Se-Kab Oh, Heau-Jo Kang:

Performance Analysis of OFDM-Based WAVE System Using Coefficient Tracking Synchronization Algorithm. 473-478 - Xiaopeng Fan, Jiannong Cao

, Weigang Wu, Hui Cheng:
Modeling Hierarchical Gossiping in Reliable Multicast Protocols. 479-484 - Sang-Wook Choi, Cheol-Joo Chae, Jae-Kwang Lee:

A Study on the Efficient Mutual Authentication Mechanism Using the Agent Server. 485-488 - Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, Tsung-Che Yang:

Safeguard Intranet Using Embedded and Distributed Firewall System. 489-492 - Chen-Hsiang Yu, Don-Lin Yang

, An-Chi Liu:
A Study of WiMAX Implementation at University Campuses. 493-496 - Jiming Chen, Jianhui Zhang, WeiQiang Xu, Lei Shu

, Youxian Sun:
The Development of a Realistic Simulation Framework with OMNeT++. 497-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














