


default search action
ICOIN 2016: Kota Kinabalu, Malaysia
- 2016 International Conference on Information Networking, ICOIN 2016, Kota Kinabalu, Malaysia, January 13-15, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-1724-9

- Emil Larsson, Johan Sigholm:

Papering over the cracks: The effects of introducing best practices on the web security ecosystem. 1-6 - Roan Simoes da Silva, Sérgio Donizetti Zorzo:

On the use of proxy re-encryption to control access to sensitive data on information centric networking. 7-12 - Long Nguyen-Vu

, Jungsoo Park, Ngoc-Tu Chau
, Souhwan Jung:
Signing key leak detection in Google Play Store. 13-16 - Bharat Buddhdev, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi

:
Android component vulnerabities: Proof of concepts and mitigation. 17-22 - Shinichi Mori, Akira Sato, Kenichi Yoshida:

Enhancing performance of cardinality analysis by packet filtering. 23-28 - Tatsuya Morita, Takahiro Matsuda, Tetsuya Takine:

Spatially dependent loss tomography for multihop wireless networks. 29-34 - Hiroaki Minami, Yumi Takaki, Chikara Ohta, Hisashi Tamaki:

A study on penetration strategy of on-board unit taking account of the type of vehicles in V2V communications. 35-39 - Daniyal Munir

, Syed Tariq Shah
, Won-Jin Lee, Min Young Chung, Syed Faraz Hasan
:
Selection of relay UE with energy harvesting capabilities in public safety environment. 40-44 - Hyo Hyun Choi, Areeya Rubenecia, Paul Vincent Contreras, Myungwhan Choi:

Collision avoidance scheme for micro UAVs delivering information. 45-50 - Irda Roslan, Takahiro Kawasaki, Toshiki Nishiue, Yumi Takaki, Chikara Ohta, Hisashi Tamaki:

Control of transmission power and carrier sense threshold to enhance throughput and fairness for dense WLANs. 51-56 - Junpei Kawamoto:

An implementation of privacy preserving stream integration system. 57-62 - Hyun Min Song

, Ha Rang Kim, Huy Kang Kim
:
Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. 63-68 - Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:

An incident response support system based on seriousness of infection. 69-74 - Shi Li, Inshil Doh, Kijoon Chae:

An anonymous IP-based privacy protection routing mechanism for CDNi. 75-80 - Ahmed Khalid

, Hyeongtae Ahn, Cheeha Kim:
Reliable and Efficient Multi-rate Aware Reactive (REMAR) routing for IEEE 802.11 based MANET. 81-85 - Min Wei, Shuaidong Zhang, Keecheon Kim:

A security testing platform for Wireless Sensor Networks. 86-91 - Yang Song, Enqing Dong, Wei Liu, Xue Peng:

An iterative method of processing node flip ambiguity in wireless sensor networks node localization. 92-97 - Duc-Tai Le

, Thang Le Duc
, Taeho Kong, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:
Exploring energy-latency trade-off for broadcast in duty-cycled Wireless Sensor Networks. 98-101 - Kazuhiro Yamaguchi, Takaharu Nagahashi, Takuya Akiyama, Takahiro Yamaguchi, Hideaki Matsue:

A routing based on OLSR with traffic load balancing and QoS for Wi-Fi mesh network. 102-107 - Wei Liu, Enqing Dong, Yang Song:

A robust node localization method to address flip ambiguity in wireless networks. 108-113 - Kazuhiro Yamaguchi, Kazunari Mukaiyama, Takuya Akiyama, Tomohiro Kobayashi, Hideaki Matsue:

Performance analysis of routing methods based on OLSR and AODV with traffic load balancing and QoS for Wi-Fi mesh network. 114-119 - Juan Xu, Enqing Dong, Dejing Zhang, Wei Liu, Weichong Zhong:

Performance analysis of two high rate routing protocols for wireless sensor networks based on the Linux platform. 120-123 - Seonhyeok Kim, Jae Hyeok Son, Ashis Talukder, Choong Seon Hong

:
Congestion prevention mechanism based on Q-leaning for efficient routing in SDN. 124-128 - Igor Carvalho, Airton Ishimori, Antônio Abelém:

A MultiCriteria Caching Decision for information centric networks. 129-134 - Sungyeon Kim, Jang-Won Lee

:
Content allocation in information-centric networks. 135-140 - Kyi Thar, Saeed Ullah

, Doo Ho Lee, Choong Seon Hong
:
On adaptive pre-fetching and caching the contents in content centric networking. 141-146 - Dinh-Mao Bui, Thien Huynh-The

, Sungyoung Lee, Yongik Yoon, Sungik Jun:
Energy savings in processor based on prediction technique. 147-150 - Anuradha Nanayakkara, Subramaniam Thayaparan:

Optimization of receiver FIFO for IEEE 802.3ba 40GBASE PCS Sub layer. 151-154 - Pengcheng Du, Jessie Hui Wang, Jiahai Yang, Jianfeng Wang, Youjian Zhao:

Analyzing intercontinental circuitousness to improve the interconnection and routing for ISPs. 155-160 - Yasser Mawad, Stefan Fischer:

Infrastructure-based delay tolerant network communication. 161-165 - Bo Hu, Lin Xing, Zeng Wang, Na Liu:

MLCS: A multi-level correlation scheduling algorithm for multipath transport. 166-171 - Nusrat Sharmin, HyungJune Lee

:
Deadline-aware packet routing based on optimal charging schedule in electric vehicular networks. 172-177 - Kazuaki Ova, Toshinori Watanabe, Hisashi Koga:

Parametric spanning tree generation method for network topology design. 178-183 - Axel Hunger, Pascal A. Klein:

Equalizing latency peaks using a redundant multipath-TCP scheme. 184-189 - Jiwoo Park, Kwangsue Chung:

Client-side rate adaptation scheme for HTTP adaptive streaming based on playout buffer model. 190-194 - Masafumi Katoh, Izuru Sato, Naotoshi Watanabe:

Traffic engineering for IoT. 195-200 - Sangwook Kim, Dooyeol Yun, Kwangsue Chung:

Video quality adaptation scheme for improving QoE in HTTP adaptive streaming. 201-205 - Dooyeol Yun, Kwangsue Chung:

Dynamic segment duration control for live streaming over HTTP. 206-210 - Mi Young Jo, Keecheon Kim:

A research on the regional routing scheme based mobile agent for SDN. 211-213 - Cheng Suo, I-Chen Tsai, Charles H.-P. Wen

:
ERIC: Economical & reconfigurable hybrid-band control for software-defined datacenter network. 214-219 - Jae Hyeok Son, DoHyeon Kim, Hyo Sung Kang, Choong Seon Hong

:
Forwarding strategy on SDN-based content centric network for efficient content delivery. 220-225 - Hui-Tang Lin, Chia-Lin Lai, Yu-Ying Kao, Tzy Shiah Wang:

ONU-based Decentralized Dynamic Bandwidth Allocation (OD-DBA) scheme over WDM long-reach EPONs. 226-231 - Hui-Tang Lin, Chia-Lin Lai, Wen-Yi Chen, Tzy Shiah Wang:

TRINPON: A novel network architecture for supporting private networking capability over LR EPONs. 232-237 - Heihachiro Yamaguchi, Masayuki Ida:

SaaS virtualization method and its application. 238-243 - Sunwook Kim, JiHyeok Choi, Seongwoon Kim, HagYoung Kim:

Cloud-based virtual desktop service using lightweight network display protocol. 244-248 - Hassan Mahmood Khan

, Gaik-Yee Chan, Fang-Fang Chua
:
An adaptive monitoring framework for ensuring accountability and quality of services in cloud computing. 249-253 - P. Kiran, M. G. Jibukumar, C. V. Premkumar:

Resource allocation optimization in LTE-A/5G networks using big data analytics. 254-259 - Jun Suk Kim, Won-Jin Lee, Min Young Chung:

A multiple beam management scheme on 5G mobile communication systems for supporting high mobility. 260-264 - Jawaad Ullah Khan, Ho-Shin Cho:

A multihop data-gathering scheme using multiple AUVs in hierarchical underwater sensor networks. 265-267 - Liming Wang, Gang Lu:

The dynamic sub-topology load balancing algorithm for data center networks. 268-273 - Yeongjin Kim, Joohyun Lee

, Jaeseong Jeong
, Song Chong:
Multi-flow rate control in delayed Wi-Fi offloading systems. 274-279 - Jani Väre, Kari Virtanen, Kimmo Ylander:

Wireless offline offload. 280-284 - Md. Golam Rabiul Alam

, Yan Kyaw Tun
, Choong Seon Hong
:
Multi-agent and reinforcement learning based code offloading in mobile fog. 285-290 - Hailong Lin, Lei Chen:

An optimized fingerprint positioning algorithm for underground garage environment. 291-296 - Kyu-Man Lee, Jaesung Lim, Sunju Choi:

A feasibility study of ARPS in UAT for positioning. 297-302 - Zhaoyu Zhang, Xin Di, Jun Tian, Pei Chen:

A WLAN planning method for indoor positioning system. 303-307 - Green Kim, Keecheon Kim:

A study on the adaptation of the firefly algorithm for the synchronization between multiple controllers in SDN environment. 308-311 - Soonhwa Sung, Cheong Youn

, Eunbae Kong, Jaecheol Ryou
:
A distributed mobile cloud computing model for secure big data. 312-316 - Tai-Yeon Ku, Hee-Sun Won, Hoon Choi

:
Service recommendation system for big data analysis. 317-320 - Jung-Su Han, JongWon Kim:

Analytics-leveraged box visibility for resource-aware orchestration of SmartX multi-site cloud. 321-323 - Anupam Kumar Bairagi, Md. Golam Rabiul Alam

, Ashis Talukder, Nguyen Hoang Tran, Daeun Lee, Choong Seon Hong
:
An overlapping coalition formation approach to maximize payoffs in cloud computing environment. 324-329 - Chang-Kyu Lee, Wook Hyun, Shin-Gak Kang, Juyoung Park:

P2P network organization method for low signaling overhead and delay. 330-333 - Eunhye Ko, Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim

:
SIP amplification attack analysis and detection in VoLTE service network. 334-336 - Hyunsik Yang, Younghan Kim:

SDN-based distributed mobility management. 337-342 - Shin-Young Ahn, Gyu-Il Cha, Young-Ho Kim, Eun-Ji Lim, Seung-Jo Bae, Won-Young Kim:

Design of distributed memory integration framework(DMIf). 343-347 - Jeongju Bae, JongWon Kim:

An experimental continuous delivery framework for SmartX-mini IoT-cloud playground. 348-350 - Sang-Il Kim, Hwa-Sung Kim:

Ontology-based open API composition method for automatic mash-up service generation. 351-356 - Taeyoung Kim, Hyeonwoo Kim, Dongwoo Kwon, Kisu Ok, Isaac Im, Eunggi Lee, Huigwang Je, Nematullo Rakhmatov, Donghyeok An, Hongtaek Ju:

Design of an effective framework for mash-up service development. 357-359 - Eungha Kim, ChangSup Keum:

A study on movable thing edge service platform. 360-362 - Jun-Hwan Huh, Dong-Hyun Kim, Jong-Deok Kim:

oneM2M: Extension of protocol binding: Reuse of binding protocol's legacy services. 363-365 - Minhae Kwon

, Hyunggon Park:
The cluster formation strategies for approximate decoding in IoT networks. 366-368 - Muhammad Golam Kibria

, Hwa-Suk Kim, Ilyoung Chong:
IoT learning model based on virtual object cognition. 369-371 - Sheik Mohammad Mostakim Fattah

, Hwa-Suk Kim, Ilyoung Chong:
Design of composite virtual objects for service entity creation in WoO based IoT environment. 372-374 - Xin Di, Jun Tian, Jie Wu, Zhou Zhu:

Programmable multi-hop wireless networks towards IoT: Architecture and key techniques. 375-377 - Gunjae Yoon, Jungwoo Choi, Huihwan Park, Hoon Choi

:
Topic naming service for DDS. 378-381 - Minho Jeong, Sang Hyun Ahn, Hayoung Oh:

A network coding aware routing with considering traffic load balancing for the multi-hop wireless networks. 382-384 - Chang Hyun Hong, Trang Nguyen, Se Bong Jang, Seong-Ho Jeong, Seung Hyong Rhee, Yeong Min Jang:

Channel modeling and system analysis for seaside image sensor communications. 385-389 - Doo Ho Lee, Kyi Thar, DoHyeon Kim, Choong Seon Hong

:
Efficient parallel multi-path interest forwarding for mobile user in CCN. 390-394 - Taewon Song

, Tae-Yoon Kim, Wonjung Kim, Sangheon Pack
:
Channel bonding algorithm for densely deployed wireless LAN. 395-397 - Dong-Hyun Kim, Sheng Hao Sun, Jong-Deok Kim:

Design and implementation of access point for the Wi-Fi broadcasting system. 398-401 - Hyungkeun Lee, Hyukjoon Lee:

Modeling and anaysis of an energy-efficient MAC protocol for wireless sensor networks. 402-405 - Van Dung Nguyen

, Oanh Tran Thi Kim, Nguyen Dang Tri
, Choong Seon Hong
:
Improving time slot acquisition through RSU's coordination for TDMA-based MAC protocol in VANETs. 406-411 - Sangjin Jeong, Yong-Woon Kim:

An energy efficiency evaluation scheme for manufacturing facility. 412-415 - Nguyen Trong Thuong, Hoac Thieu Phong, Dinh-Thuan Do

, Phan Van Hieu, Dao Tang Loc:
Android application for WiFi based indoor position: System design and performance analysis. 416-419 - Seungbeom Song, Jaiyong Lee, Kyuho Son, Hangyong Jung, Jihoon Lee:

A congestion avoidance algorithm in SDN environment. 420-423 - Eun-Do Kim, Seungik Lee, Yunchul Choi, Myung-Ki Shin, Hyoung-Jun Kim:

Evaluations of a multiple flow tables construction scheme for service function chaining. 424-426 - Muhammad Usman

, Aris Cahyadi Risdianto
, JongWon Kim:
Resource monitoring and visualization for OF@TEIN SDN-enabled multi-site cloud. 427-429 - Kyusik Kim, Taeseok Kim:

A frame buffer caching for fast launch of browsers. 430-432 - Chang-Hun Kim, Sang-Min Jung, Sun-Young Jung, Soo-Min Kang, Sang-Kook Han:

Multi-band OFDMA based passive optical network with windowing technique for asynchronous multiple access. 433-435 - Young Jun Yoon, Jae Hwa Seo, Ra Hee Kwon, Young In Jang, In Man Kang:

InGaAs-based junctionless transistor with dual-spacer dielectric for low power loss and high frequency mobile network system. 436-438 - Hyukyeon Lee, Hyunsub Kim, Minjoon Kim, Jaeseok Kim:

A fast convergence LLL algorithm with fixed-complexity for SIC-based MIMO detection. 439-441 - Jae Hwa Seo, Young Jun Yoon, Ra Hee Kwon, Young In Jang, In Man Kang:

Design optimization of Si/Ge-based heterojunction arch-shaped gate-all-around (GAA) tunneling field-effect transistor (TFET) which applicable for future mobile communication systems. 442-444 - Jinsook Bong, Yuhwa Suh, Yongtae Shin:

Fast user authentication method considering mobility in multi clouds. 445-448 - Saad Alsunbul, Phu Dung Le, Jefferson Tan, Bala Srinivasan:

A network defense system for detecting and preventing potential hacking attempts. 449-454 - Mijoo Kim, Tae-Jin Lee, Youngsang Shin, Heung Youl Youm:

A study on behavior-based mobile malware analysis system against evasion techniques. 455-457 - Sung Soo Kim, Daeun Lee, Choong Seon Hong

:
Vulnerability detection mechanism based on open API for multi-user's convenience. 458-462 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:

Securing information flow in content delivery networks with visual and quantum cryptography. 463-468 - Ji-Yong Kim, Ok-Gee Min:

Collaborative local triangles counting in a graph stream by using node resources. 469-471 - Svetlana Kim

, Yong-Ik Yoon:
Semantic relationship of contents using tensor factorization for self-growth social broadcasting. 472-475 - Gyuhong Choi, Do-hyung Kim

, Ikjun Yeom:
Efficient streaming over CoAP. 476-478 - Nam Tuan Le

, Thithanhnhan Le, Yeong Min Jang:
Optical camera communications based invisible watermarking technique. 479-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














