


default search action
ICOIN 2009: Chiang Mai, Thailand
- Yong-Jin Park, Yanghee Choi:

2009 International Conference on Information Networking, ICOIN 2009, Chiang Mai, Thailand, January 21-24, 2009. IEEE 2009, ISBN 978-89-960761-3-1 - Jae-Wook Nah, Seung-Man Chun, Song Wang, Jong-Tae Park:

Adaptive handover method with application-awareness for multimedia streaming service in wireless LAN. 1-7 - Yeon-sup Lim, Jaehyuk Choi, Chong-kwon Kim:

Practical application of physical energy detection to recognize starvation in 802.11 wireless networks. 1-5 - Wangjong Lee, Seung Hyong Rhee, Youjin Kim, Hyungsoo Lee:

An efficient multi-channel management protocol for Wireless Body Area Networks. 1-5 - Jong-In Lee, Sangheon Pack, Kyung-Hoe Kim, Chul-Hee Kang:

Channel adaptive ACK mechanism in IEEE 802.15.3 wireless personal area networks. 1-5 - Cho Il Kwon, Koji Okamura:

A centralized resource and admission control scheme for NGN core networks. 1-5 - Tseng-Chang Yen, Felix Hsu, Shang-Juh Kao:

XLCMS - a scalable and distributive linux virtual cluster management system. 1-5 - Suman Pandey, Mi-Jung Choi, Sung-Joo Lee, James W. Hong:

IP network topology discovery using SNMP. 1-5 - Hiroomi Isozaki, Shingo Ata, Ikuo Oka:

Estimating flow distribution by using difference information of multiple packet samplings. 1-5 - Sangsoon Lim, Jiwoong Jeong, Jongkeun Na, Chong-kwon Kim:

Performance enhancement of low power listening MAC for duty cycled wireless sensor networks. 1-5 - Min Han Shon, Chunum Kong, Hyunseung Choo:

Hexagonal path data dissemination for energy efficiency in wireless sensor networks. 1-5 - Sang-ik Cha, Jae Hoon Ko, Soonmok Kwon, Cheeha Kim:

3-Hop-ahead path reservation scheme for expedite traffic in wireless sensor networks. 1-5 - Junseok Kim, Younggoo Kwon:

Interference-aware geographical routing for sensor-nets in indoor environments. 1-5 - Hamed Yousefi, Ali Dabirmoghaddam, Kambiz Mizanian, Amir-Hossein Jahangir:

Score based reliable routing in wireless sensor networks. 1-5 - Olivier Morandi, Giorgio Moscardi, Fulvio Risso:

An intrusion detection sensor for the NetVM virtual processor. 1-5 - HyunYong Lee, JongWon Kim:

The enhanced Lamport signature for secure service overlay networks. 1-5 - Jehyun Lee, Heejo Lee, Hoh Peter In:

Scalable attack graph for risk assessment. 1-5 - Byung Goo Choi, Eung Jun Cho, Jin Ho Kim, Choong Seon Hong, Jin Hyoung Kim:

A sinkhole attack detection mechanism for LQI based mesh routing in WSN. 1-5 - Tadahiro Wada, Tetsuya Wakiyama, Takayuki Hashimoto, Koji Ishibashi:

A throughput performance analysis of hybrid ARQ scheme for wireless multihop networks using LDPC codes. 1-5 - Raungrong Suleesathira, Jansilp Aksiripipatkul:

Wireless MAC design with selective decoding schemes. 1-5 - A.-Young Kang, Sohee Lee, Sungrae Cho, Wan Choi, HyuckJae Lee:

An opportunistic relay selection algorithm for hybrid-ARQ in wireless networks. 1-4 - Soohong Park, Pyung Soo Kim:

A new vertical handover mechanism for convergence of wired and wireless access networks. 1-6 - Cao Trong Hieu, Dae Sun Kim, Choong Seon Hong, Young-Cheol Bang:

On-demand Multi-Path Balancing in Wireless Mesh Networks. 1-4 - Xiaofei Wang, Wei Cai, Ye Yan, Taekyoung Kwon, Yanghee Choi, Wenhua Zeng:

A framework of distributed dynamic multi-radio multi-channel multi-path routing protocol in Wireless Mesh Networks. 1-5 - Mustafizur Rahman, Dae Sun Kim, Choong Seon Hong, Sunyoung Han, Jinpyo Hong:

A routing protocol for multi-rate wireless ad-hoc networks: Cross layer approach. 1-5 - Jaehwoon Lee, Sanghyun Ahn, Hyun Yu, Yu-Seon Kim, Jong-Sam Jin:

Address autoconfiguration and route determination mechanisms for the MANET architecture overcoming the multi-link subnet model. 1-5 - Jussi Kangasharju:

Freeriding not (always) considered harmful. 1-5 - Koteswara Rao Vemu, Donny T. Daniel, Yogesh Nagappa:

Optimal multiclass internet pricing with game theoretical approach. 1-5 - Jae-Bong Yoo, Ho-Min Jeong, BumJung Yoo, SangYoon Kim, Chan-Young Park:

IMAGES: Intelligent multi-agent system for freeway traffic flow simulation. 1-5 - Kenichi Hatakeyama, Yasunori Osana, Shin-ichi Kuribayashi:

Flexible joint resource reallocation method in all-IP networks. 1-5 - Hsien-Wei Yang, I-En Liao, Chaur-Chin Chen:

Reversible data hiding based on grayscale value histogram with optimal multiple pairs of crests and troughs. 1-5 - Doohee Jung, DaeHyun Lee, Hyunwoo Cho:

Implementation of realistic game controllers using three axis accelerometer and wireless communication modules. 1-4 - Khong Neng Choong, Mazlan Abbas, Osman Mohd Said, Cheng Suan Lee, Rajina Raj Mohamed:

The setup of national IP Multimedia Subsystem (IMS) testbed - approach and challenges. 1-5 - TaiJin Lee, JongIl Jeong, HyungJong Kim, HyunChul Jeong, YooJae Won:

User reputation based VoIP spam defense architecture. 1-6 - Sara Pizzi, Antonella Molinaro, Antonio Iera:

Channel-aware class-based scheduling for QoS support in IEEE 802.16/WiMAX networks. 1-5 - Chia-Chuan Chuang, Shang-Juh Kao:

Performance analysis for unsolicited grant service in 802.16 networks using a discrete-time model. 1-5 - Noureddine Lasfar, Jeonghoon Mo, Byongkwon Moon:

TCP-ACK triggered bandwidth request scheme in IEEE 802.16e systems. 1-5 - Byungjoo Lee, Hyukjoon Lee, Yong-Hoon Choi, Young-uk Chung, Young-Il Kim:

A joint bandwidth allocation and routing scheme for the IEEE 802.16j multi-hop relay networks. 1-5 - Jimyung Kang, Eunho Yang, Youngjin Park, Soonwoo Lee, Yonghwa Kim, Kwanho Kim:

Selfish retransmission protocol in an IR-UWB system. 1-5 - Jihyun Lee, Kyungshik Lim, Hyun-Kook Kahng, Jun-Hee Park, Kwangil Lee:

A hybrid transmission scheme for multiple IPTV streams in UWB bridged networks. 1-4 - Xingjun Zhang, Xiaohong Peng:

An unequal packet loss protection scheme for H.264/AVC video transmission. 1-5 - Euijin Choo, Heejo Lee, Wan Yeon Lee:

Dynamic multimedia scheduling against Motion based DoS attacks. 1-5 - Suphakit Awiphan, Su Zhou, Jiro Katto:

Mesh-based data delivery over multiple tree-shaped routes in P2P overlay network. 1-5 - Masahiro Yoshida, Satoshi Ohzahata, Akihiro Nakao, Konosuke Kawashima:

Controlling file distribution in Winny network through index poisoning. 1-5 - Koji Tajima, Kimihiko Ando, Kohta Ohshima, Matsuaki Terada:

A high speed geocoding method for location-based service with coloring map images. 1-5 - Hiroshi Nakashima, Satoshi Ohzahata, Konosuke Kawashima:

A traffic control method with channel occupancy information from MAC layer in IEEE 802.11. 1-5 - Zhenhua Liu, Xiaoping Zhang, Youjian Zhao, Ruisheng Wang:

A performance analysis framework for routing lookup in scalable routers. 1-5 - Frank Bohdanowicz, Harald Dickel, Christoph Steigner:

Detection of routing loops. 1-5 - Choongho Lee, Dukhyun Chang, Yoonbo Shim, Nakjung Choi, Taekyoung Kwon, Yanghee Choi:

Regional token based routing for DTNs. 1-5 - Md. AquilMirza, Rama Murthy Garimella:

PASCAL: Power aware sectoring based clustering algorithm for Wireless Sensor Networks. 1-6 - Peter S. Lau:

A target-delay-driven packet scheduling scheme for real-time interactive applications. 1-5 - Bruno Miguel Marcos Guedes, Ricardo J. F. Lopes Pereira, António Varela, Teresa Maria Vazão:

Simple media-aware packet discard algorithms. 1-5 - Tananun Orawiwattanakul, Yusheng Ji:

Analysis of probabilistic preemption-based mechanism for QoS provision in OBS networks. 1-4 - Yongcai Tao, Hai Jin, Song Wu, Xuanhua Shi:

Adaptive multi-round scheduling strategy for divisible workloads in grid environments. 1-5 - Romaric Guillier, Pascale Vicat-Blanc Primet:

A user-oriented test suite for transport protocols comparison in datagrid context. 1-5 - Fu-Min Chang, I-Ping Hsieh, Shang-Juh Kao:

Adopting SCTP and MPLS-TE mechanism in VoIP architecture for fault recovery and resource allocation. 1-5 - Ruisheng Wang, Youjian Zhao, Ting Zhou:

Achieving 100% throughput in a Two-Stage Multicast Switch. 1-5 - YoungHwan Kwon, Bok Rae Jung, Elaine Wong, Jun Kyun Choi:

Multicast scheduling mechanism to support less loss ratio for frequently used multicast service in multicast switch. 1-5 - Syed Obaid Amin, Yoon jig Young, Muhammad Shoaib Siddiqui, Choong Seon Hong:

A novel Intrusion Detection Framework for IP-based sensor networks. 1-3 - Sungwook Kim:

Online energy efficient routing approach for QoS-sensitive wireless sensor networks. 1-3 - Yuya Yamada, Hitomi Tamura, Masato Uchida, Masato Tsuru, Yuji Oie:

Overlay routing with Acceptable Waiting Time for unstably fluctuated network environments. 1-3 - Kideok Cho, Munyoung Lee, Dong-il Ko, Taekyoung Kwon, Yanghee Choi:

An efficient multicast routing in IEEE 802.15.5 networks. 1-3 - Ning Zhao, Anton Vinokurov, Lorne Mason:

Traffic modeling for Agile All-Photonic Network dimensioning. 1-3 - Dongho Lee, Sunhun Lee, Kwangsue Chung, Byunghun Song, Sang Hong Lee:

A new time-based fairness cheme to resolve the performance anomaly in WLANs. 1-3 - Young-Tae Han, Weiqiang Sun, Hong-Shik Park:

Service differentiation based on packet size and flow length in best-effort networks. 1-3 - Gopinath Rao Sinniah, Imran Khan, Zeldy Suryady:

Optimized web service architecture for 6LoWPAN. 1-3 - Sun Park:

Automatic personalized text summarization agent using generic relevance weight based on NMF. 1-3 - Teerapat Sanguankotchakorn, Phung Van Loung:

Quality of service (QoS) provisioning in core-based tree multicast. 1-3 - Wally Chen, Ing-Yi Chen, Sy-Yen Kuo:

Service unaware handover using API hooking in all-IP networks. 1-3 - Sathaporn Promwong:

Optimum template receiver of ultra wideband transmission network for short-range wireless communication systems. 1-5 - Nararat Ruangchaijatupon, Yusheng Ji:

Resource allocation for Adjustable QoS in OFDMA wireless networks. 1-3 - Katsumi Sakakibara, Jumpei Taketsugu, Jiro Yamakita:

On the uniqueness of Nash equilibrium in ALOHA games with group of selfish users. 1-3 - Khac Tiep Mai, Dongkun Shin, Hyunseung Choo:

Toward stable clustering in mobile ad hoc networks. 1-3 - Jooyoung Kim, Hyunje Woo, Hyun Lee, Meejeong Lee:

Dynamic adjustment of optimistic parameter of ROHC for performance improvement. 1-3 - Young-Shin Kim, Ga-Won Lee, Kyu-Jin Kim, Eui-nam Huh:

The energy efficient mechanism of a location estimation sensor for silver-care. 1-3 - Sungwook Kim:

Cooperative game theoretic routing algorithm based on Shapley-value approach. 1-3 - Wibhada Naruephiphat, Chalermpol Charnsripinyo:

Reliable and energy-efficient routing in mobile ad hoc networks. 1-3 - Ting Zhou, Youjian Zhao, Zhenhua Liu, Xiaoping Zhang:

Locality-preserving randomized multicast routing on k-ary n-cube. 1-3 - Mohammad Khalily Dermany, M. Hossein Ghadiry:

Reconfigurable architecture for Ethernet and HomePNA MAC. 1-3 - Shimin Sun, Jonghyun Kim, Yunho Jung, Keecheon Kim:

Zone-based Greedy Perimeter Stateless Routing for VANET. 1-3 - Jieun Cho, Jongwon Choe, Kwanho Song, Yongtae Shin:

A routing protocol using relative landmark based on virtual grid in wireless sensor network. 1-3 - Ping Yi, Hongkai Xing, Yue Wu, Linchun Li:

Alert correlation by a retrospective method. 1-3 - Shafqat Ur Rehman, GeeWan Heo, Wang-Cheol Song:

Associativity-based dynamic source routing in MANETs. 1-3 - Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori, Katsuichi Nakamura, Hiroshi Ishinishi, Syuuji Kaizaki:

Access point evaluation using packet transfer ratio in multihop wireless networks. 1-3 - Jung-Shian Li, Jau-Jan Tzeng, Chia-Ming Kuo:

Building Security Gateway. 1-3 - Sunglim Lee, Koji Okamura, Eunho Yang:

Tele-conference using advanced tool on future IP. 1-3 - Hwan Hwang, Xia Yin, Zhiliang Wang, Huiming Wang:

The internet measurement of VoIP on different transport layer rotocols. 1-3 - Junwook Kwak, Sechul Shin, Soohyun Kwon, Hochang Chae, Jeonghun Cho, Yunheung Paek, Yenjo Han, Heeseok Kim, Jin Seok:

Management environment of mass Windows Servers for server-based computing. 1-3 - Salman Yussof, Ong Hang See:

Link utilization of GA-based QoS routing algorithm. 1-3 - Haesu Hwang, In Hur, Hyunseung Choo:

GOAFR plus-ABC: Geographic routing based on Adaptive Boundary Circle in MANETs. 1-3 - Yuji Inoue:

"SHARE" rather than "Win-Win" - competition to collaboration -. 1-14 - Sung Won Sohn:

Future trends of IT convergence. 1-29 - Byung K. Choi:

Epidemic protocols: Algorithms and applications. 1-63 - Yung Yi:

MAC scheduling with performance guarantee: From max-weight to random access. 1-53 - Poompat Saengudomlert:

Optical switching in WDM networks: Architectures and algorithms. 1-47

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














