default search action
ICON 2011: Singapore
- Bharadwaj Veeravalli, Ian T. Foster:
Proceedings of the 17th IEEE International Conference on Networks, ICON 2011, Singapore, December 14-16, 2011. IEEE 2011, ISBN 978-1-4577-1824-3
Mobile, ad-hoc, mesh and sensor networks (1/3)
- Sanat Sarangi, Subrat Kar:
Genetic algorithm based mobility aware clustering for energy efficient routing in wireless sensor networks. 1-6 - Linchao Zhang, Erwing Ricardo Sanchez, Maurizio Rebaudengo:
Performance evaluation of reliable and unreliable opportunistic flooding in wireless sensor network. 7-12 - K. R. Shobha, Karthik Shetty, K. Rajanikanth:
Efficient flooding using prefetching in on-demand routing protocols for mobile ad-hoc networks. 13-18 - Muhammad Usman, Anders Vastberg, Tomas Edler:
Energy efficient high capacity HETNET by offloading high QoS users through femto. 19-24
Robust and Scalable Multimedia Networking
- Ming Yang, Jianfei Cai, Yonggang Wen, Chuan Heng Foh:
Complexity-rate-distortion evaluation of video encoding for cloud media computing. 25-29 - Bin Zhang, Mathias Wien:
Towards robust video streaming for unicast and multicast: Modeling and implementation. 30-35 - Sajid Nazir, Vladimir Stankovic, Dejan Vukobratovic:
Scalable broadcasting of sliced H.264/AVC over DVB-H network. 36-40 - Yu Wang, Xuan Jing, Jo Yew Tham, Kwong Huang Goh, Wei Siong Lee:
Error-resilient slice interleaving for robust video transmission over bursty loss channels. 41-46
Mobile, ad-hoc, mesh and sensor networks (2/3)
- Emir Husni:
Delay Tolerant Network based internet services for remote areas using train systems. 47-52 - Jau-Wu Huang, Chia-Mao Hung, Kai-Chao Yang, Jia-Shung Wang:
Energy-efficient probabilistic target coverage in wireless sensor networks. 53-58 - Chen Wang, Zhiyun Lin, Gangfeng Yan:
Multiple moving targets tracking from sensor scheduling perspective. 59-64 - Aaqib Patel, S. N. Merchant, Uday B. Desai:
Post sensing optimal channel selection in cognitive radio networks. 65-70 - Mohammed Meftah Alrayes, Neeraj Tyagi, Rajeev Tripathi, A. K. Misra:
Exploiting neighboring relationship for enhancement of AODV in hybrid wireless mesh network. 71-76 - Sook-Chin Yip, Su-Wei Tan, Teong-Chee Chuah:
Capacity Based Data Rate-Aware Channel Assigment in multi-rate wireless mesh networks. 77-82
Multimedia networking, streaming and QoS
- Kashif Mahmood, Mikko Vehkaperä, Yuming Jiang:
Delay constrained throughput analysis of CDMA using stochastic network calculus. 83-88 - Víctor López, Jose Luis Anamuro, Victor Moreno, Jorge E. López de Vergara, Javier Aracil, C. Garcia, Juan P. Fernández Palacios, Mikel Izal:
Implementation of multi-layer techniques using FEDERICA, PASITO and OneLab network infrastructures. 89-94 - Zhiqiang Shi, Dan Ionescu, Dongli Zhang:
Smoothing the XCP sender. 95-99 - Imad Al Ajarmeh, James Yu, Mohamed Amezziane:
Modeling call arrivals on VoIP networks as linear Gaussian Process under heavy traffic condition. 100-105
Mobile, ad-hoc, mesh and sensor networks (3/3)
- Sijian Zhang, Zhiyun Lin, Gangfeng Yan:
An autonomous maintenance algorithm for sensor networks subject to practical communication constraints. 106-111 - Karel Heurtefeux, Florence Maraninchi, Fabrice Valois:
AreaCast: A cross-layer approach for a communication by area in Wireless Sensor Networks. 112-117 - Raida Al Alawi:
RSSI based location estimation in wireless sensors networks. 118-122 - Govind P. Gupta, Manoj Misra, Kumkum Garg:
Performance evaluation of agent and non-agent based data dissemination protocols for wireless sensor networks. 123-128
Cloud, grid and large-scale networking
- Menglan Hu, Bharadwaj Veeravalli:
Scheduling hybrid divisible and indivisible loads on clusters. 141-146 - Ganesh Neelakanta Iyer, Bharadwaj Veeravalli:
On the resource allocation and pricing strategies in Compute Clouds using bargaining approaches. 147-152 - Anne-Cécile Orgerie, Laurent Lefèvre:
Energy-efficient overlay for data transfers in private networks. 153-158
Distributed P2P and overlay networks
- Christian Hübsch, Oliver P. Waldhorst:
Flexible tree-based Application-Layer Multicast. 159-164 - Hassan Zeineddine, Wael Bazzi:
Rationing data updates with consistency considerations in distributed systems. 165-170 - Zubair A. Baig, Suli C. Adeniye:
A trust-based mechanism for protecting IPv6 networks against stateless address auto-configuration attacks. 171-176 - Xinbo Jiang, Farzad Safaei:
Churn performance study of structured peer-to-peer overlay in supporting massively multiplayer online role playing games (MMORPGs). 183-188
Optical networks
- T. Venkatesh, K. Phani Prakash:
A deadline-aware rate-adaptive packet pacing algorithm for small buffer networks. 189-194 - Ajmal Muhammad, Robert Forchheimer:
Reducing blocking probability in dynamic WDM networks by rerouting and set-up delay tolerance. 195-200 - Partha Goswami, Soumya K. Ghosh, Debasish Datta:
Dimesioning and resource provisioning for IP/MPLS-over-WDM network. 201-206 - E. S. Shivaleela, Shrikant S. Tangade:
Comparison of performance of OCDMA networks with correlation and chiplevel receivers. 207-212 - Ajmal Muhammad, Robert Forchheimer, Lena Wosinska:
Impairment-aware dynamic provisioning in WDM networks with set-up delay tolerance and holding-time awareness. 213-218
Networked systems, applications and services (1/2)
- Ronit Nossenson, Ayal Lior, Kobi Brener:
Application classification in cellular backhaul networks. 219-224 - Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao:
Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis. 231-235 - Yifei Dong, Salil S. Kanhere, Chun Tung Chou, Ren Ping Liu:
Automatic image capturing and processing for PetrolWatch. 236-240 - Rohollah Karimi, Mohammad Kalantari:
Enhancing security and confidentiality on mobile devices by location-based data encryption. 241-245
Network architecture, protocols and routing (1/2)
- M. S. Najeem, C. Siva Ram Murthy:
On enhancing the random linear network coding. 246-251 - Gang Wang, Wei Ding, Shi Dong:
Classification of UDP traffic from P2P applications. 252-257 - Yi Wu, Ge Nong:
A scalable routing architecture for prefix tries. 264-269 - Hui Tian, Yingpeng Sang, Hong Shen:
New methods for network traffic matrix estimation based on a probability model. 270-274
Networked systems, applications and services (2/2)
- Ruediger Gad, Martin Kappes, Robin Mueller-Bady, Ingo Ritter:
Network performance in virtualized environments. 275-280 - Ray Hunt, Jill Slay:
A new approach to developing attack taxonomies for network security - including case studies. 281-286 - Surakarn Duangphasuk, Supakorn Kungpisdan, Sumeena Hankla:
Design and implementation of improved security protocols for DHCP using digital certificates. 287-292
Network architecture, protocols and routing (2/2)
- David Fatseas, Ron Addie:
Layered design of mobile backhaul networks. 293-298 - Ahmad AlSa'deh, Feng Cheng, Christoph Meinel:
CS-CGA: Compact and more Secure CGA. 299-304 - Christoph Werle, Sebastian Mies, Martina Zitterbart:
On benchmarking routing protocols. 305-310 - Mohd Zahid M. Soperi, Mohamad Haider, Kamalrulnizam Abu Bakar:
Scheduling of OSPF routing table calculation using Generalized Regression Neural Network. 311-315 - Hiroki Date, Takashi Kurimoto, Akira Misawa:
An offload method for traffic distribution based on service identification. 316-321 - Marius Iulian Corici, Jens Fiedler, Dragos Vingarzan, Thomas Magedanz:
Optimized low mobility support in massive mobile broadband Evolved Packet Core architecture. 322-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.