


default search action
IPCCC 2008: Austin, TX, USA
- Ty Znati, Youtao Zhang:

2008 IEEE International Performance, Computing and Communications Conference, IPCCC 2008, Austin, TX, USA, December 7-9, 2008. IEEE Computer Society 2008, ISBN 978-1-4244-3368-1
Wireless Sensor Networks I
- Guilin Li, Jianzhong Li, Yingshu Li

:
TIME: Time-based Index Management for Event Query Processing in Wireless Sensor Networks. 1-8 - Kijeung Choi, Thomas G. Robertazzi:

Divisible Load Scheduling inWireless Sensor Networks with Information Utility. 9-17 - Di Wu

, Lichun Bao, Min Du, Renfa Li:
Design and Evaluation of Localization Protocols and Algorithms in Wireless Sensor Networks Using UWB. 18-25
Storage
- Cong Liu, Xiao Qin

, S. Kulkarni, Chengjun Wang, Shuang Li, Adam Manzanares, Sanjeev Baskiyar:
Distributed Energy-Efficient Scheduling for Data-Intensive Applications with Deadline Constraints on Data Grids. 26-33 - Ahmed Amer, Jehan-François Pâris

, Darrell D. E. Long, Thomas J. E. Schwarz:
Progressive Parity-Based Hardening of Data Stores. 34-42 - Shenggang Wan, Qiang Cao, Xubin He, Changsheng Xie, Chentao Wu:

An Adaptive Cache Management Using Dual LRU Stacks to Improve Buffer Cache Performance. 43-50
System Security
- Yubin Li, Zesheng Chen, Chao Chen:

Understanding Divide-Conquer-Scanning Worms. 51-58 - Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh:

Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets. 59-68 - Visham Ramsurrun, K. M. Sunjiv Soyjaudah:

A Highly Available Transparent Linux Cluster Security Model. 69-76
Wireless Sensor Networks II
- Torsha Banerjee, Dharma P. Agrawal:

Increasing Lifetime of Wireless Sensor Networks Using Controllable Mobile Cluster Heads. 77-84 - Rabindranath Ghosh, Koushik Sinha

, Debasish Datta, Bhabani P. Sinha:
TSS: An Energy Efficient Communication Scheme for Low Power Wireless Networks. 85-92 - Song Han, Zifei Zhong, Hongxing Li, Guihai Chen

, Edward Chan, Aloysius K. Mok:
Coding-Aware Multi-path Routing in Multi-Hop Wireless Networks. 93-100
Internet Computing
- Miguel Jimeno

, Ken Christensen, Bruce Nordman:
A Network Connection Proxy to Enable Hosts to Sleep and Save Energy. 101-110 - Kuai Xu

, Feng Wang
:
Cooperative Monitoring for Internet Data Centers. 111-118 - Paulo R. Farah, Cristina D. Murta:

A Transient Overload Generator forWeb Servers. 119-126
Application Layer and Network Management I
- Abhishek Jaiantilal, Yifei Jiang, Shivakant Mishra:

An Evaluation of Java RMI/JavaSpaces and Ruby DRb/Rinda. 127-134 - Fábio N. Souza, Roberto D. Arteiro, Nelson S. Rosa

, Paulo Romero Martins Maciel:
Performance Models for the Instance Pooling Mechanism of the JBoss Application Server. 135-143 - Xiaowen Chu

, Kaiyong Zhao, Mea Wang:
Massively Parallel Network Coding on GPUs. 144-151
Wireless Ad Hoc / Mesh Networks I
- Weihuang Fu, Yun Wang, Dharma P. Agrawal:

Delay and Capacity Optimization in Multi-radio Multi-channel Wireless Mesh Networks. 152-159 - Lichun Bao:

Location Authentication Methods for Wireless Network Access Control. 160-167 - Muhannad Quwaider, Jayanthi Rao, Subir Biswas:

Neighborhood Route Diffusion for Packet Salvaging in Networks with High Mobility. 168-175
Effective and SECURE Routing
- Kyung Min Su, Ki Hwan Yum:

Simple and Effective Adaptive Routing Algorithms in Multi-Layer Wormhole Networks. 176-184 - Weirong Jiang

, Viktor K. Prasanna:
Towards Green Routers: Depth-Bounded Multi-Pipeline Architecture for Power-Efficient IP Lookup. 185-192 - Ting Yuan, Shiyong Zhang, YiPing Zhong, Jianqing Ma:

KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks. 193-200
P2P and Distributed Networks
- João V. P. Gomes, Pedro R. M. Inácio

, Mário M. Freire
, Manuela Pereira
, Paulo P. Monteiro
:
Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy. 201-208 - Chunqi Tian, Shihong Zou, LingWei Chu, Shiduan Cheng:

A New Trust Framework Based on Reputation for Unstructured P2P Networks. 209-216 - Yi Luo, D. Manivannan

:
Theoretical and Experimental Evaluation of Communication-Induced Checkpointing Protocols in FE Family. 217-224
Application Layer and Network Management II
- Jani Väre, Jyrki Alamaunu, Harri Pekkonen:

Laboratory Measurements and Verification of PSI/SI Transmission in DVB-H Systems. 225-232 - Hankyul You, Dohyun Kim, XuanTung Hoang, Younghee Lee:

A Group-aware Service Discovery Scheme in Ubiquitous Environment using Service Assignment. 233-238 - Fei Li:

Fairness Analysis in Competitive FIFO Buffer Management. 239-246
Wireless Sensor Networks III
- Tiansi Hu, Yunsi Fei

:
QELAR: A Q-learning-based Energy-Efficient and Lifetime-Aware Routing Protocol for Underwater Sensor Networks. 247-255 - Yuxing Huang, Qiang Ye

, Yanxia Jia:
UD-GEM: A Multi-Path Routing Algorithm for Wireless Sensor Networks. 256-263 - Amar A. Rasheed, Rabi N. Mahapatra:

An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks. 264-270
Application Layer and Network Management III
- Fulu Li, Ramesh Raskar, Andrew Lippman:

Analysis on Probabilistic View Coverage for Image Sensing - A Geometric Approach. 271-280 - Amirali Sharifi, Eyad H. Abed:

Stability Analysis for Communication of Voice and Data Terminals with Packet Reservation Multiple Access Protocol. 281-288 - Muhammad Ikram

, Aminul Haque Chowdhury, Hassen Redwan, Jong-bin Koh, Ki-Hyung Kim, Dong-Kyoo Kim:
A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems. 289-296
Potpourri
- DaPeng Wang, Shoubao Yang, Yun Hu, Peng Zhang:

Directional Double Metric Routing in Wireless Mesh Network. 297-302 - Hao Wen, Chuang Lin, Fengyuan Ren, Hongkun Yang, Tao He, Eryk Dutkiewicz

:
Joint Adaptive Redundancy and Partial Retransmission for Reliable Transmission in Wireless Sensor Networks. 303-310 - Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang:

A High Scalability P2P Simulation Framework with Measured Realistic Network Layer Support. 311-318
Transport Layer and Optical Burst Switches
- Ritesh Kumar, Jasleen Kaur:

Towards a Queue Sensitilve Transport Protocol. 319-326 - Xingbo Gao, Mostafa A. Bassiouni:

Modeling and Performance Evaluation of Optical Burst Switched Ring Networks with Efficient Adaptive Routing. 327-334 - Aresh Dadlani

, Ahmad Khonsari
, Mohammad R. Aghajani, Ali Rajabi:
QoS Behavior of Optical Burst Switching under Multimedia Traffic: an Analytical Approach. 335-342
Workshop: The 1st Workshop on Dynamic Spectrum Access and Cognitive Radio Networks
- Li-Chun Wang

, Chung-Wei Wang:
Spectrum Handoff for Cognitive Radio Networks: Reactive-Sensing or Proactive-Sensins? 343-348 - Yu-Sheng Wang, Chun-Ting Chou:

Asynchronous Detection and Avoidance (DAA) Protocol for Interference Mitigation in Dynamic Spectrum Access. 349-353 - Sameer Swami, Chittabrata Ghosh, Rucha P. Dhekne, Dharma P. Agrawal, Ken A. Berman:

Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks. 354-359 - Kapil Jaiswal:

Spectral Sensing of Adaptive Frequency Hopping signal for Cognitive Radio. 360-365 - Qinqin Chen, Ying Wang, Charles W. Bostian:

Universal Classifier Synchronizer Demodulator. 366-371 - An He, Srikathyayani Srikanteswara, Jeffrey H. Reed, Xuetao Chen, William H. Tranter, Kyung Kyoon Bae, Masoud Sajadieh:

Minimizing Energy Consumption Using Cognitive Radio. 372-377
Workshop: The 1st IEEE International Workshop on Generation C Wireless Networks
- Allaa R. Hilal, Amal El-Nahas, Ahmed R. Bashandy, Samir I. Shaheen

:
Traffic Differentiating Queue For Enhancing AODV Performance in Real-Time Interactive applications. 378-383 - Saman Kolahdooz, Shahpour Rahmani, Mohsen Sharifi

:
Discovering Resources in Tuple-Based Pervasive Systems using Resource-Aware Routing. 384-389 - Tae-Hwan Kim, Tae-Jin Lee:

Throughput Enhancement of Macro and Femto Networks By Frequency Reuse and Pilot Sensing. 390-394 - Jun-Bong Eom, Tae-Jin Lee:

RFID Reader Anti-collision Algorithm Using a Server and Mobile Readers Based on Conflict-Free Multiple Access. 395-399 - Fayçal M'hamed Bouyakoub

, Abdelkader Belkhir
:
Automatic Generation of User's Profiles for Location-Based Adaptation of Multimedia Documents. 400-405 - Lun Zhang, Yan Lu, Lan Chen:

Fuzzy Evaluation for Wireless Sensor Networks Based on Rough Set Theory. 406-411 - Teek Parval Sharma

, Ramesh C. Joshi, Manoj Misra:
Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks. 412-417 - Lun Zhang, Dongxiu Ou:

Assessment Strategy with Markov Chain Utilized in Wireless Sensor Networks. 418-421 - Yazan M. Allawi

, Mingon Kim, Minho Kang:
Enhanced Scanning Scheme for Delay-Constrained Fast Handoff in IEEE 802.11 WLANs. 422-426 - Kuheli Louha, Jung Hyun Jun, Dharma P. Agrawal:

Exploring Load Balancing in Heterogeneous Networks by Rate Distribution. 427-432
Workshop: The 1st IEEE International Workshop on Network Security and Privacy
- Richard E. Newman, Ira S. Moskowitz:

Practical Covert Channel Implementation through a Timed Mix-Firewall. 433-438 - Mina Guirguis, Jason Valdez:

Masquerading a Wired Covert Channel into a Wireless-like Channel. 439-444 - Hong Qian, Karen Lu, Asad M. Ali:

A Proxy Agent for Small Network-Enabled Devices. 445-449 - Piyi Yang, Zhenfu Cao, Xiaolei Dong:

Threshold Proxy Re-Signature. 450-455 - Jyh-How Huang, John Black, Shivakant Mishra:

Support for Security and Privacy in SenSearch. 456-461 - Mahalingam Ramkumar:

Proxy Aided Key Pre-distribution Schemes for Sensor Networks. 462-468 - Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel:

Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks. 469-474 - Le Xuan Hung, Hassan Jameel, Riaz Ahmed Shaikh, Syed Muhammad Khaliq-ur-Rahman Raazi

, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung:
Activity-based Security Scheme for Ubiquitous Environments. 475-481
Workshop: The 1st IEEE International Workshop on Information and Data Assurance
- Jun-Won Ho:

Distributed Detection of Replica Cluster Attacks in Sensor Networks Using Sequential Analysis. 482-485 - Chet Langin, Hongbo Zhou, Shahram Rahimi:

A Model to Use Denied Internet Traffic to Indirectly Discover Internal Network Security Problems. 486-490 - Junghwan Choi, Donghyun Kang

, Hyun-Su Jang, Young Ik Eom:
Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments. 491-498 - Reiner Dojen, Fan Zhang, Tom Coffey:

On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks. 499-506 - Cory J. Antosh, Barry E. Mullins:

The Scalability of Secure Lock. 507-512 - Kevin S. Bauer, Harold Gonzales, Damon McCoy:

Mitigating Evil Twin Attacks in 802.11. 513-516 - Sun-il Kim, Nnamdi Nwanze:

Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems. 517-523 - Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:

Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary. 524-531

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














