
ISCC 2008: Marrakech, Morocco
- Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco. IEEE Computer Society 2008, ISBN 978-1-4244-2702-4
- Adel Said Elmaghraby
:
Message from the general chair. - Saad Biaz, Abdelghani Bellaachia:
Message from the technical program chairs.
Keynotes
- Siamak Khorram:
The state-of-the-art in acquiring and processing satellite remotely sensed data worldwide. - Raouf Boutaba:
Distributed pattern matching: Concept and applications in internet-scale networks. - Mahmoud Daneshmand:
Ten years of experimentation in Information Mining & Software Research with applications in telecommunications industry. - Azzedine Boukerche:
The next generation wireless network challenges for an emergency preparedness and response class of applications: A necessary public safety and security. - Saad Biaz:
Success and failures of "de-randomized" congestion losses losses losses. - Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang:
2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systems.
Streaming over Wireless I
- Rouzbeh Razavi, Martin Fleury, Mohammed Ghanbari
:
Block-based rateless coding for energy-efficient video streaming over bluetooth. 1-6 - Anastasios Politis, Isabella Kotini, Athanasios Manitsaris:
Streaming video timing analysis in wireless ad-hoc networks. 7-12 - Pietro Zanuttigh, Andrea Zanella
, Guido M. Cortelazzo:
Analysis of compressed depth and image streaming on unreliable networks. 13-18
Streaming over Wireless II
- Kostas Pentikousis, Jarno Pinola, Esa Piri, Frerk Fitzek:
A measurement study of Speex VoIP and H.264/AVC video over IEEE 802.16d and IEEE 802.11g. 19-24 - Federico Maguolo, Mathieu Lacage, Thierry Turletti:
Efficient collision detection for auto rate fallback algorithm. 25-30 - Davide Brunelli
, Loris Teodorani:
Improving audio streaming over multi-hop ZigBee networks. 31-36
Multimedia Applications over Wireless
- Giorgos Karopoulos, Georgios Kambourakis
, Stefanos Gritzalis
:
Caller identity privacy in SIP heterogeneous realms: A practical solution. 37-43 - Chrissa Papagianni, Nikolaos D. Tselikas
, Evangelos A. Kosmatos, Andreas E. Papadakis, Thierry Keutgen, Dimitra I. Kaklamani, Iakovos S. Venieris:
A complete content production and delivery system in a controlled multimedia network. 44-49 - Antonios G. Alexiou, Christos Bouras, Evangelos Rekkas:
Efficient delivery of MBMS multicast traffic over HSDPA. 50-55
Optical Networks
- Wael Hosny Fouad Aly, Mohamed Faten Zhani, Halima Elbiaze:
On controlling burst loss ratio inside an OBS network. 56-61 - Eun-Sung Jung
, Yan Li, Sanjay Ranka, Sartaj Sahni:
Performance evaluation of routing and wavelength assignment algorithms for optical networks. 62-67 - Burak Kantarci, Hussein T. Mouftah, Sema F. Oktug:
Arranging shareability dynamically for the availability-constrained design of optical transport networks. 68-73 - Emad M. Al Sukhni, Hussein T. Mouftah:
A novel distributed destination routing-based Availability-Aware provisioning framework for differentiated protection services in optical mesh networks. 74-79 - Youssef Said
, Houria Rezig, Ammar Bouallegue:
On the application of long soas in linear operating and saturation regimes: Exploitation in high bit rate optical networks. 80-83 - Branka Lakic, Marek Hajduczenia, Henrique J. A. da Silva, Paulo P. Monteiro
:
Using adapted visibility graphs for network planning. 84-90
Service Oriented Architecture
- Xiaodong Lu, Kinji Mori:
Autonomous preference-aware multi-service integration and allocation. 91-96 - Dietrich Van der Weken, Stein Desmet, Bjorn Muylaert, Steven Van Assche, Bruno Volckaert
:
Automating media processes in a service oriented architecture. 97-102 - Pravin Pawar, Julien Subercaze, Pierre Maret, Bert-Jan van Beijnum, Dimitri Konstantas:
Towards business model and technical platform for the service oriented context-aware mobile virtual communities. 103-110 - Antonio Corradi
, Enrico Lodolo
, Stefano Monti, Samuele Pasini:
A user-centric composition model for the Internet of Services. 110-117 - Uthman Baroudi
, B. Abu Qadous:
An efficient adaptive Cross-Layer interaction mechanism for TCP traffic over heterogeneous networks. 118-123 - Basel Alawieh, Yongning Zhang, Chadi Assi, Hussein T. Mouftah:
An efficient rate adaptation scheme for multihop wireless networks using Kalman Filter. 124-129 - Saad Biaz, Shaoen Wu:
Rate adaptation algorithms for IEEE 802.11 networks: A survey and comparison. 130-136 - Cire Sall, El houcine Chakir El Alaoui, Saïd Doubabi, El Mostafa El Warraki
:
A robust controller for the TCP congestion window. 137-142 - Kuei-Ping Shih, San-Yuan Wang, Chien-Min Chou, Li-Jie Cheng:
A dynamic rate adaptation with fragmentation MAC protocol against channel variation for wireless LANs. 143-148 - Niklas Kirschnick, Frank Steuer, Pablo Vidales, Sahin Albayrak:
Adaptive window size to reduce the influence of heterogeneous mobility on TCP performance. 149-156 - Shan Chen, Junhua Zhu, Brahim Bensaou, Farid Naït-Abdesselam:
F2-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networks. 157-162 - Shie-Yuan Wang, Hsi-Lu Chao, Kuang-Che Liu, Ting-Wei He, Chih-Che Lin, Chih-Liang Chou:
Evaluating and improving the TCP/UDP performances of IEEE 802.11(p)/1609 networks. 163-168
Data Mining I
- Safwat H. Hamad
, Tahany A. Fergany, Reda A. Ammar, Amal A. Abd El-Raouf:
A Double K-Clustering Approach for restructuring Distributed Object-Oriented software. 169-174 - Hisham El-Shishiny, T. H. Soliman, M. El-Asmar:
Mining drug targets based on microarray experiments. 175-181 - Hisham El-Shishiny, S. Sobhy Deraz, Omar Bahy Badreddin:
Mining software aging: A neural network approach. 182-187 - Aouatif Amine, Sanaa Ghouzali
, Mohammed Rziza
, Driss Aboutajdine:
Investigation of feature dimension reduction based DCT/SVM for face recognition. 188-193
Cellular and Mobile Communications I
- Khaled A. Ali, Hossam S. Hassanein, Hussein T. Mouftah:
Power-Controlled Rate and Coverage Adaptation for WCDMA cellular networks. 194-200 - Polychronis Koutsakis
:
Call admission control for H.264 traffic transmission over wireless cellular networks. 201-207 - Khalil Ibrahimi
, Rachid El Azouzi, El-Houssine Bouyakhf:
Uplink call admission control in multi-services W-CDMA network. 208-213 - Polychronis Koutsakis
:
Efficient traffic policing for videoconference traffic over wireless cellular networks. 214-221 - Woonsik Lee, Minh-Viet Nguyen, Hwang Soo Lee:
A resource allocation algorithm and system architecture to extend the cell coverage and alleviate the inter-cell interference. 222-227 - Toshihiko Komine, Satoshi Konishi, Hiroyuki Shinbo:
A study on optimal termination target of synchronous H-ARQ for the next generation cellular system. 228-233 - Jiao Zhang, Yujun Zhang, Ye Tian, Zhongcheng Li:
CPK-based fast authentication method in Mobile IPv6 networks. 234-239
Secured Networks I
- Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Muniz Bandeira Duarte, Guy Pujolle:
Analyzing a human-based trust model for mobile ad hoc networks. 240-245 - François Lesueur, Ludovic Mé, Valérie Viet Triem Tong:
A sybilproof distributed identity management for P2P networks. 246-253 - Vincent Toubiana, Houda Labiod, Laurent Reynaud, Yvon Gourhant:
An analysis of ASMA performances against packet dropping attacks in dense networks. 254-259 - Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani:
The impact of wireless LAN security on performance of different Windows operating systems. 260-264
Mesh Networks I
- Jad El-Najjar, Brigitte Jaumard, Chadi Assi:
Efficient routing in WiMax/802.16 based mesh networks with centralized scheduling. 265-271 - Sadeq Ali Makram, Mesut Günes
:
Distributed channel assignment for multi-radio wireless mesh networks. 272-277 - João Paulo Barraca
, Rui L. Aguiar
:
Managing community aware Wireless Mesh Networks. 278-285 - Arlen Nascimento, Edjair de Souza Mota, Saulo Queiroz
, Edson Nascimento Silva Jr.:
Header compression for VoIP over multi-hop wireless mesh networks. 286-291 - Rafael De T. Valle, Diego G. Passos
, Célio Vinicius N. de Albuquerque
, Débora C. Muchaluat-Saade:
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool. 292-297
Secured Systems
- Xinyan Zha, Sartaj Sahni:
Highly compressed Aho-Corasick automata for efficient intrusion detection. 298-303 - Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai:
Efficient disk encryption and verification through trusted nonce. 304-309 - Zonglin Li, Guangmin Hu, Dan Yang:
Global abnormal correlation analysis for DDoS attack detection. 310-315 - Vinodh Gopal, Satyajit Grover, Michael E. Kounavis:
Fast multiplication techniques for public key cryptography. 316-325 - Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani:
A phishing vulnerability analysis of web based systems. 326-331 - Yang Li, Binxing Fang, Li Guo, Zhihong Tian, Yongzheng Zhang, Zhi-Gang Wu:
UBSF: A novel online URL-Based Spam Filter. 332-339 - Yehia H. Khalil, Adel Said Elmaghraby
, Anup Kumar:
Evaluation of resilience for Data Center systems. 340-345 - Adil Alaoui, Nishant Subbiah, Jeffery Collmann, Kevin Cleary, Seong Ki Mun, J. Coleman:
Building a secure medical research organization. 346-355
Cellular and Mobile Communications II
- Christophoros Christophorou, Andreas Pitsillides:
A new approach for efficient MBMS service provision in UTRAN. 356-361 - Christophoros Christophorou, Andreas Pitsillides:
An enhanced approach for efficient MBMS handovers in 3G networks. 362-367 - Andreas Panayides
, Christophoros Christophorou, Josephine Antoniou, Andreas Pitsillides, Vasos Vassiliou
:
Power counting for optimized capacity in MBMS enabled UTRAN. 368-373 - Antonios G. Alexiou, Christos Bouras, Vasileios Kokkinos:
Power saving methods for MBMS transmissions in UTRAN. 374-379 - Qi Li, Mingwei Xu, Xinwen Zhang:
Access control in Group Communication Systems. 380-385
Secured Networks II
- A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono:
FlexBox: Sandboxing internet servers based on layer-7 contexts. 386-391 - Yan Shen, Jun Bi, Jianping Wu, Qiang Liu:
A two-level source address spoofing prevention based on automatic signature and verification mechanism. 392-397 - Yasser Yasami, Siavash Khorsandi, Saadat Pour Mozaffari, A. Jalalian:
An unsupervised network anomaly detection approach by k-Means clustering & ID3 algorithms. 398-403
Mesh Networks II
- Mohamed Abou El Saoud, Samy A. Mahmoud:
Optimal number and class selection of nodes in Wireless Mesh Networks. 404-410 - Zhiying Gao, Hassan Naser:
End-to-end shared restoration algorithms in multi-domain mesh networks. 411-416 - Ahmed Abd El Al, Tarek N. Saadawi:
High throughput path selection for multi-path video streaming in Ad-hoc networks. 417-422 - Valeria Loscrì:
A queue based dynamic approach for the Coordinated distributed scheduler of the IEEE 802.16. 423-428 - Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda:
A load-aware routing metric for wireless mesh networks. 429-435 - Kuei-Ping Shih, Hung-Chang Chen, Chun-Chih Li, Hsiang-I Chen:
CLE2aR2: A cross-layer energy-efficient and reliable routing protocol for wireless ad hoc networks. 436-441
Architecture
- Samah A. Senbel:
Pro-active task sharing in a self-organizing server cluster. 442-446 - Alejandra Rodríguez, Javier Fernández
, Jesús Carretero
:
Model for on-demand virtual computing architectures - OVCA. 447-454 - Azzedine Boukerche, YunFeng Gu:
Performance modeling of a grid-based Data Distribution Management protocol. 455-461 - Kiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xiao Qin, Yiming Yang:
Improving reliability and energy efficiency of disk systems via utilization control. 462-467 - Luiz Carlos Pinto, Rodrigo P. Mendonça, Mario A. R. Dantas
:
Impact of interconnection networks and application granularity to compound cluster environments. 468-473 - Luiz Carlos Pinto, Luiz H. B. Tomazella, Mario A. R. Dantas
:
Building efficient multi-core clusters for high performance computing. 474-479
Peer to Peer
- Fatih Turkmen
, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino:
P-CDN: Extending access control capabilities of P2P systems to provide CDN services. 480-486 - Raime Bustos, Alberto Aguilar, Kia Makki, Raimund K. Ege:
Multicast-P2P content distribution in large-scale enterprise networks. 487-494 - Michele Albano
, Laura Ricci
, Martina Baldanzi, Ranieri Baraglia:
VoRaQue: Range queries on Voronoi overlays. 495-500 - W. D. Yu, J. Patel, M. Chitralamuthu, S. S. Parakh:
An empirical approach to a system design methodology for mobile Peer-to-Peer computing. 501-506 - Marinho P. Barcellos, Rodrigo B. Mansilha, Francisco V. Brasileiro:
TorrentLab: investigating BitTorrent through simulation and live experiments. 507-512 - Ya Chu Yang, Chien-Ming Cheng, Pei Yun Lin, Shiao-Li Tsao:
A real-time road traffic information system based on a peer-to-peer approach. 513-518
Applications in Computers and Communications I
- Hazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath:
Formal automated transformation of SDL specifications to Lotos specifications. 519-524 - Chafia Bouanaka
, Faiza Belala:
Tile logic as an architectural model for mobility. 525-530 - Hisham Al-Mubaid
, Anurag Nagar:
Comparison of four similarity measures based on GO annotations for Gene Clustering. 531-536 - S. D. Roy, S. A. Singh, Subhrabrata Choudhury, Narayan C. Debnath:
Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. 537-542 - Subhrabrata Choudhury, Kapil Paniker, Anamika Sinha, S. Mukhopadhyay, Narayan C. Debnath:
A proactive burst assembly algorithm for optical burst switched networks. 543-548
Wireless Network Models
- Merlinda Drini, Tarek N. Saadawi:
Modeling wireless channel for ad-hoc network routing protocol. 549-555 - Abdellatif Kobbane, Rachid El Azouzi, El-Houssine Bouyakhf:
A queuing analysis of packet dropping for real-time applications in wireless networks. 556-561 - Chong Jiang, Brian Smith, Babak Hassibi, Sriram Vishwanath:
Multicast in wireless erasure networks with feedback. 562-565 - Saulo Queiroz
, Arlen Nascimento, Edjair de Souza Mota, Andrea Oliveira, Leandro Galvao, Edson Nascimento Silva Jr.:
Impact evaluation of radio propagation models on performance parameters of application layer in Wireless Mesh Backbone simulation. 566-571 - Yan He, Dmitri Perkins, Bin Huang:
S-Box: A scalability analysis framework for ad hoc routing protocols. 572-578
Data Mining II
- Fadoua Ataa-Allah
, William I. Grosky, Driss Aboutajdine:
Document clustering based on diffusion maps and a comparison of the k-means performances in various spaces. 579-584 - Hong Shen, Xiao-Long Yan:
Probability Density Estimation over evolving data streams using Tilted Parzen Window. 585-589 - Hichem Frigui, Cheul Hwang:
Semi-supervised Clustering and Aggregation of Relational Data. 590-595
Mobility I
- Cesare Stefanelli, Mauro Tortonesi
, Erika Benvegnu, Niranjan Suri:
Session mobility in the mockets communication middleware. 596-603 - Hanwen Zhang, Yujun Zhang, Chao Ma, Yi Sun, Zhongcheng Li:
Dynamic load balancing among multiple home agents for MIPv6. 604-609 - Hai Lin, Houda Labiod:
Release of unnecessary resource reservation in mobility cases. 610-615 - Omar M. Raoof, Hamed S. Al-Raweshidy:
Game theory and an interface selection mechanism for Multi-homed Mobile Nodes. 616-623 - Rodrigo Prado, Eduardo Zagari, Tomás Badan, Eleri Cardozo, Murício Magalhães, José Carrilho, Rossano P. Pinto, André Berenguel, Daniel Barboza, Daniel Moraes, Thienne Johnson, Lars Westberg:
A reference architecture for micro-mobility support in IP networks. 624-630 - Loreno Oliveira, Kyller Costa Gorgônio, Angelo Perkusich
, Leandro Dias da Silva:
Pitfalls and tradeoffs on dealing with handoff management in bluetooth-based WPANs for real-time applications. 631-636
Applications in Computers and Communications II
- Anurag Nagar, Hisham Al-Mubaid
:
Using path length measure for gene clustering based on similarity of annotation terms. 637-642 - Hazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath:
Towards sound development of PIXITP, conformance test suites, and conforming implementations for various Formal Description Techniques. 643-648 - Sultan Aljahdali, Ennumeri A. Zanaty:
Combining multiple segmentation methods for improving the segmentation accuracy. 649-653 - Narayan C. Debnath, Lorena Baigorria, Daniel Riesco, German Montejano:
Metrics applied to Aspect Oriented Design using UML profiles. 654-657 - Douglas Dyllon Jeronimo de Macedo
, Hilton Ganzo William Perantunes, L. Maia, Eros Comunello
, Aldo von Wangenheim
, Mario A. R. Dantas
:
An interoperability approach based on asynchronous replication among distributed internet databases. 658-663
Data Communications I
- Josep M. Selga, Agustín Zaballos
, Jaume Abella, Guiomar Corral:
Model for polling in noisy multihop systems with application to PLC and AMR. 664-669 - Atman Jbari
, Abdellah Adib, Driss Aboutajdine:
A new signal separation technique using double referenced system. 670-673 - Elmahdi Driouch, Wessam Ajib:
A graph theory based scheduling algorithm For MIMO-CDMA systems using zero forcing beamforming. 674-679 - S. M. Sameer, Ratnam V. Raja Kumar:
An efficient maximum likelihood carrier frequency offset estimation technique for OFDM systems. 680-684 - Li Zheng, Doan B. Hoang:
Performance analysis for resource coordination in a high-density wireless environment. 685-690 - Binbin Xu, Jianping An, Zhongxia Simon He
:
MC-CDMA multiuser detection using a hybrid immune clonal selection algorithm with Hopfield Neural Network in fading channels. 691-694
Software & Applications
- Mohammad Reza Nami
, Abbas Malekpour:
Formal specification of a particular banking domain with RAISE specification language. 695-699 - Mohsen Toorani
, Ali Asghar Beheshti Shirazi:
SSMS - A secure SMS messaging protocol for the m-payment systems. 700-705 - Rui Qiao, Yuan Wang, Xinyan Gao, Jinzhao Wu:
Operational semantics of probabilistic Kleene algebra with tests. 706-713 - Xinyan Gao, Jinzhao Wu, Rui Qiao, Jianfeng Chen:
Theory framework for event structure slicing. 714-721 - Mohamed El Ghami
, Ivan Ivanov, Hans Melissen, Cornelis Roos, Trond Steihaug
:
Primal-dual algorithm for linear optimization problems based on a new class of kernel functions. 722-729 - Rajaa Saidi
, Mounia Fredj, Salma Mouline
, Agnès Front, Dominique Rieu:
Variability modeling for Business Component customization. 730-735