default search action
18th ICCCN 2009: San Francisco, California, USA
- Proceedings of the 18th International Conference on Computer Communications and Networks, IEEE ICCCN 2009, San Francisco, California, USA, August 3-6, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-4581-3
MQoS: Track on multimedia and QoS
- Gennaro Boggia, Pietro Camarda, Rossella Fortuna, Luigi Alfredo Grieco:
A Scheduling Strategy to Avoid Playout Interruptions in Video Streaming Systems. 1-6 - Camille Mazataud, Benny Bing:
A New Lossless FMO Removal Scheme for H.264 Videos. 1-6 - Tareq Hossain, Yi Cui, Yuan Xue:
On the Optimality of Layered Video Streaming Rate in a P2P Mesh Network. 1-6 - Myounghwan Lee, John A. Copeland:
An Adaptive End-to-End Delay Assurance Algorithm with DiffServ Architecture in IEEE 802.11e/IEEE 802.16 Hybrid Mesh/Relay Networks. 1-6
ISSA 1: Track on Internet services, systems and applications
- Scott Jordan:
Some Traffic Management Practices Are Unreasonable. 1-6 - Arijit Ghosh, Tony Givargis:
Source Routing Made Practical in Embedded Networks. 1-6 - Yan Li, Mohamed G. Gouda:
Balanced Peer Lists: Towards a Collusion-Resistant BGP. 1-6 - Hyunwoo Kang, Dongkyun Kim:
HVR: History-Based Vector Routing for Delay Tolerant Networks. 1-6
EWTP: Track on emerging wireless technologies and platforms
- Zainab R. Zaidi, Tien Y. Tan, Yunlei Cheng:
ETX Could Result in Lower Throughput. 1-6 - Harkirat Singh, Su Khiong Yong, Jisung Oh, Chiu Ngo:
Principles of IEEE 802.15.3c: Multi-Gigabit Millimeter-Wave Wireless PAN. 1-6 - Baber Aslam, Ping Wang, Cliff Changchun Zou:
Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals. 1-6 - Tuan Tran, Thinh P. Nguyen, Raviv Raich:
On Achievable Throughput Region of Prioritized Transmissions Via Network Coding. 1-6
ON 1: Track on optical networking
- Yang Wang, Xiaojun Cao:
A New Hierarchical Waveband Assignment Algorithm for Multi-Granular Optical Networks. 1-6 - Rong He, Kee Chaing Chua, Gurusamy Mohan:
Connectivity Aware Protected Working Lightpath Envelope. 1-6 - Keen-Mun Yong, Tee-Hiang Cheng, Gee-Swee Poo:
Dynamic Multicast Routing and Wavelength Assignment with Minimal Conversions in Delay-Constrained WDM Networks. 1-6 - Spiridon F. Beldianu, Roberto Rojas-Cessa, Eiji Oki, Sotirios G. Ziavras:
Re-Configurable Parallel Match Evaluators Applied to Scheduling Schemes for Input-Queued Packet Switches. 1-6
ISSA 2: Track on Internet services, systems and applications
- Jack Brassil, Rick McGeer, Puneet Sharma, Praveen Yalagandula, Brian L. Mark, S. Zhang, Stephen Schwab:
The Case for Service Overlays. 1-6 - Sireesha Muppala, Xiaobo Zhou:
CoSAC: Coordinated Session-Based Admission Control for Multi-Tier Internet Applications. 1-6 - Kai Wang, Chuang Lin:
Insight into the P2P-VoD System: Performance Modeling and Analysis. 1-6 - Ram Keralapura, Antonio Nucci, Chen-Nee Chuah:
Self-Learning Peer-to-Peer Traffic Classifier. 1-8
WCSP 1: Track on wireless communication and signal processing
- Jun-Bae Seo, Victor C. M. Leung:
Design and Analysis of Cross-Layer Contention Resolution Algorithms for Multi-Packet Reception Slotted ALOHA Systems. 1-6 - Hui Zhou, Pingyi Fan, Hong-Chuan Yang:
Cross-Layer Scheduling for Multiuser Downlink Transmissions with Opportunistic Relaying. 1-6 - Narayanan Krishnan, Balasubramaniam Natarajan:
Energy Efficiency of Cooperative SIMO Schemes -Amplify Forward and Decode Forward. 1-5
PCGN: Track on pervasive computing and grid networking
- Mais Nijim, Adam Manzanares, Xiaojun Ruan, Xiao Qin:
HYBUD: An Energy-Efficient Architecture for Hybrid Parallel Disk Systems. 1-6 - Andrei Agapi, Sebastien Soudan, Marcelo Pasin, Pascale Vicat-Blanc Primet, Thilo Kielmann:
Optimizing Deadline-Driven Bulk Data Transfers in Overlay Networks. 1-8 - Karthik Kumar, Yamini Nimmagadda, Yung-Hsiang Lu:
Establishing Trust for Computation Offloading. 1-6
ON 2: Track on optical networking
- Nattapong Kitsuwan, Eiji Oki, Naoto Kishi, Tetsuya Miki:
Real-Time Data Allocation Scheme Based on Dynamic Replacement in Burst Photonic Networks. 1-6 - Felix Espina, Mikel Izal, Daniel Morató, Eduardo Magaña:
Performance Analysis of OBS Edge Nodes for Video Streaming. 1-6 - Ankitkumar N. Patel, Yi Zhu, Qingya She, Jason P. Jue:
Routing and Scheduling for Time-Shift Advance Reservation. 1-6 - Fen Zhou, Miklós Molnár, Bernard Cousin:
Is Light-Tree Structure Optimal for Multicast Routing in Sparse Light Splitting WDM Networks? 1-7
ISSA 3: Track on Internet services, systems and applications
- Alan Ritacco, Craig E. Wills, Mark Claypool:
How's My Network? A Java Approach to Home Network Measurement. 1-7 - Moo-Yeol Lee, Hyun-Wook Jin, Ikhwan Kim, Taehyoun Kim:
Improving TCP Goodput over Wireless Networks Using Kernel-Level Data Compression. 1-6 - Maxim Martynov:
Challenges for High-Speed Protocol-Independent Redundancy Eliminating Systems. 1-6 - Yiping Chen, Jimmy Leblet, Gwendal Simon:
On Reducing the Inter-AS Traffic of Box-Powered CDN. 1-6
WCSP 2: Track on wireless communication and signal processing
- Hyeonmok Ko, Ki-seok Lee, Seoungyoul Oh, Cheeha Kim:
Fast Optimal Discrete Bit-Loading Algorithms for OFDM-Based Systems. 1-6 - Dalin Zhu, Balasubramaniam Natarajan, Justin S. Dyer:
Peak-to-Average Power Ratio Reduction in MIMO-OFDM with Trellis Exploration Algorithm. 1-6 - Hai Hung Hoang, Bing W. Kwan:
Estimation of MIMO Channel Using Suboptimal Particle Filtering. 1-5
NAP 1: Track on network architecture and protocols
- Alan Kennedy, Zhen Liu, Xiaojun Wang, Bin Liu:
Multi-Engine Packet Classification Hardware Accelerator. 1-6 - Weirong Jiang, Viktor K. Prasanna:
Scalable Packet Classification: Cutting or Merging? 1-6 - Eiji Oki, Nattapong Kitsuwan, Roberto Rojas-Cessa:
Analysis of Space-Space-Space Clos-Network Packet Switch. 1-6 - Youngmann Kim, Taehoon Kim, E. K. Park, Sungwoo Tak:
A Novel Hardware-Software Codesign of Network Protocol Stacks on a SoC Platform. 1-6
WASN 1: Track on wireless ad-hoc and sensor networks
- Fabrice Theoleyre, Benoît Darties, Andrzej Duda:
Assignment of Roles and Channels for a Multichannel MAC in Wireless Mesh Networks. 1-6 - Jamie Macbeth, Majid Sarrafzadeh:
Link Scheduling for Scalable Data Aggregation. 1-6 - Gang Zhou, Lei Lu, Sudha Krishnamurthy, Matthew Keally, Zhen Ren:
SAS: Self-Adaptive Spectrum Management for Wireless Sensor Networks. 1-6 - Lei Pan, Hongyi Wu:
PTS: A Probability-Based Tag Selection Algorithm for RFID Systems with Recurring Readings. 1-6
WCSP 3: Track on wireless communication and signal processing
- Hai Zhan, Jean-Yves Le Boudec, Jaouhar Ayadi, John R. Farserotu:
A Novel Bayesian Impulse Radio Ultra-WideBand Ranging Algorithm Based on Importance Sampling. 1-5 - Nuno Souto, Rui Dinis, João Carlos Silva:
Performance Bound for Generalized M-QAM Constellations in Time-Discrete Multipath Rayleigh Fading Channels with Channel Estimation Errors. 1-6 - Rui Dinis, Paulo Silva:
Iterative Detection of Multicode DS-CDMA Signals with Strongly Nonlinear Transmitters. 1-6 - Rui Dinis, Paulo Montezuma, Tiago Marques:
SC-FDE with OQPSK-Type Schemes: An Efficient Transmission Technique for Broadband Wireless Systems. 1-6
NAP 2: Track on network architecture and protocols
- Kaigui Bian, Jung-Min Park:
A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANs. 1-6 - Lucian Suciu, Mounir Benzaid, Servane Bonjour, Pierrick Louin:
Assessing the Handover Approaches for Heterogeneous Wireless Networks. 1-6 - Ruzana Davoyan, Jörn Altmann, Wolfgang Effelsberg:
Intercarrier Compensation in Unilateral and Bilateral Arrangements. 1-6 - Jagruti Sahoo, Eric Hsiao-Kuang Wu, Pratap Kumar Sahu, Mario Gerla:
BPAB: Binary Partition Assisted Emergency Broadcast Protocol For Vehicular Ad Hoc Networks. 1-6
WASN 2: Track on wireless ad-hoc and sensor networks
- Duc A. Tran, Thinh P. Nguyen:
Hop-Count Based Techniques for Passive Target Localization in Sensor Networks. 1-8 - Bin Tang, Xianjin Zhu, Anand Prabhu Subramanian, Jie Gao:
DAL: A Distributed Localization in Sensor Networks Using Local Angle Measurement. 1-6 - Ramakant S. Komali, Allen B. MacKenzie, Petri Mähönen:
On Selfishness, Local Information, and Network Optimality: A Topology Control Example. 1-7 - Shanshan Jiang, Yuan Xue:
Optimal Wireless Network Restoration under Jamming Attack. 1-6
P2PN 1: Track on peer-to-peer networking
- Rafit Izhak-Ratzin, Nikitas Liogkas, Rupak Majumdar:
Team Incentives in BitTorrent Systems. 1-8 - Anwar Al Hamra, Nikitas Liogkas, Arnaud Legout, Chadi Barakat:
Swarming Overlay Construction Strategies. 1-6 - Brian Sanderson, Daniel Zappala:
Reducing Source Load in BitTorrent. 1-6 - Yacine Boufkhad, Fabien Mathieu, Fabien de Montgolfier, Diego Perino, Laurent Viennot:
Fine Tuning of a Distributed VoD System. 1-7
NAPE 1: Track on network algorithms and performance evaluation
- Mario Cola, Giorgio De Lucia, Daria Mazza, Maurizio Patrignani, Massimo Rimondini:
Covert Channel for One-Way Delay Measurements. 1-6 - Andreas Grau, Klaus Herrmann, Kurt Rothermel:
Efficient and Scalable Network Emulation Using Adaptive Virtual Time. 1-6 - Ravish Khosla, Sonia Fahmy, Y. Charlie Hu:
On the Impact of Filters on Analyzing Prefix Reachability in the Internet. 1-8
WASN 3: Track on wireless ad-hoc and sensor networks
- Andong Zhan, Guihai Chen, Wei Wang:
Utilizing Automatic Underwater Vehicles to Prolong the Lifetime of Underwater Sensor Networks. 1-6 - Stanley J. Barr, Benyuan Liu, Jie Wang:
Underwater Sensor Barriers with Auction Algorithms. 1-6 - Ahmad Ababnah, Balasubramaniam Natarajan:
Sensor Deployment as an Optimal Control Problem. 1-5
NSP 1: Track on network security and privacy
- Yun Li, Jian Ren:
Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks. 1-6 - Andriy Panchenko, Benedikt Westermann, Lexi Pimenidis, Christer Andersson:
SHALON: Lightweight Anonymization Based on Open Standards. 1-7 - Emiliano De Cristofaro, Xuhua Ding, Gene Tsudik:
Privacy-Preserving Querying in Sensor Networks. 1-6 - Dingbang Xu, Yu Wang, Xinghua Shi:
Enhanced Feature Selection and Generation for 802.11 User Identification. 1-6
P2PN 2: Track on peer-to-peer networking
- Richard Süselbeck, Gregor Schiele, Sebastian Seitz, Christian Becker:
Adaptive Update Propagation for Low-Latency Massively Multi-User Virtual Environments. 1-6 - Roberto Roverso, Sameh El-Ansary, Seif Haridi:
NATCracker: NAT Combinations Matter. 1-7 - Mohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous:
Certified Internet Coordinates. 1-8 - Amitava Biswas, Suneil Mohan, Rabi N. Mahapatra:
Search Co-Ordination by Semantic Routed Network. 1-7
NAPE 2: Track on network algorithms and performance evaluation
- Jia Zhou, Fengyuan Ren, Chuang Lin:
Modeling the Effects of Variable Bandwidth on TCP Throughput. 1-7 - Junpei Oshio, Shingo Ata, Ikuo Oka:
Identification of Different TCP Versions Based on Cluster Analysis. 1-6 - Yixin Wu, Suman Kumar, Seung-Jong Park:
On Transport Protocol Performance Measurement over 10Gbps High Speed Optical Networks. 1-6
WASN 4: Track on wireless ad-hoc and sensor networks
- Ataul Bari, Ritu Chaturvedi, Arunita Jaekel, Subir Bandyopadhyay:
Energy Aware Distributed Clustering in Two-Tiered Sensor Networks. 1-8 - Sampath Priyankara, Kazuhiko Kinoshita, Hideki Tode, Koso Murakami:
A Clustering Method for Wireless Sensor Networks with Heterogeneous Node Types. 1-6 - Hyun Jung Choe, Preetam Ghosh, Kalyan Basu, Sajal K. Das:
Class-Based Data Reporting Scheme in Heterogeneous Wireless Sensor Networks. 1-6 - J. J. Garcia-Luna-Aceves, Dhananjay Sampath:
Efficient Multicast Routing in MANETs Using Prefix Labels. 1-8
NSP 2: Track on network security and privacy
- Xiaodong Lin, Rongxing Lu, Xuemin Shen:
Location-Release Signature for Vehicular Communications. 1-7 - Mooi Choo Chuah, Peng Yang:
Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme. 1-6 - Jie Tian, Guiling Wang, Tan Yan, Wensheng Zhang:
A Power-Efficient Scheme for Securing Multicast in Hierarchical Sensor Networks. 1-6 - Rakesh Saini, Bo Zhu, Amin Hammad:
Data Protection on RFID-Based Distributed Storage. 1-6
NAPE 3: Track on network algorithms and performance evaluation
- Eiji Oki, Ayako Iwaki:
Fine Two-Phase Routing with Traffic Matrix. 1-5 - Inja Youn, Brian L. Mark, Dana Richards:
Statistical Geolocation of Internet Hosts. 1-6 - Girish B. C., Ramaswamy Govindarajan:
Reducing Buffer Requirements in Core Routers Using Dynamic Buffering. 1-6 - Mohammadreza Rahimi, Nima Sarshar:
On Maximizing IP Multicast Throughput in Multi-Source Applications. 1-8
WASN 5: Track on wireless ad-hoc and sensor networks
- Saehoon Kang, Chansu Yu, Chita R. Das, Guohong Cao:
Path-Centric On-Demand Rate Adaptation for Mobile Ad Hoc Networks. 1-6 - Yiwei Wu, Yingshu Li:
Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks. 1-6 - Sunho Lim, Chansu Yu, Chita R. Das:
Cooperative Cache Invalidation Strategies for Internet-Based Vehicular Ad Hoc Networks. 1-6 - Haiying Shen, Ting Li, Lianyu Zhao, Ze Li:
SDS: Distributed Spatial-Temporal Similarity Data Storage in Wireless Sensor Networks. 1-6
NSP 3: Track on network security and privacy
- Wei Yan, Nirwan Ansari:
Why Anti-Virus Products Slow Down Your Machine? 1-6 - Prasanth Kalakota, Chin-Tser Huang:
On the Benefits of Early Filtering of Botnet Unwanted Traffic. 1-6 - Ping Wang, Lei Wu, Baber Aslam, Cliff Changchun Zou:
A Systematic Study on Peer-to-Peer Botnets. 1-8 - Changhua Sun, Chengchen Hu, Yi Tang, Bin Liu:
More Accurate and Fast SYN Flood Detection. 1-6
NAPE 4: Track on network algorithms and performance evaluation
- Yilin Song, Min Liu, Zhongcheng Li, Qi Li:
Handover Latency of Predictive FMIPv6 in IEEE 802.11 WLANs: A Cross Layer Perspective. 1-6 - Xiao Chen, Jian Shen, Taylor L. Groves, Jie Wu:
Probability Delegation Forwarding in Delay Tolerant Networks. 1-6
WASN 6: Track on wireless ad-hoc and sensor networks
- Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu:
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks. 1-6 - Fernando J. Cintron, Kanthakumar Pongaliur, Matt W. Mutka, Li Xiao:
Energy Balancing Hopping Sensor Network Model to Maximize Coverage. 1-6 - Abhishek Sharma, Kevin Yoon, David Vanhorn, Matheiu Dube, Volus McKenna, Michael S. Bauer:
ScoutNode: A Multimodal Sensor Node for Wide Area Sensor Networks. 1-6 - Mustafa Hammad, Jonathan Cook:
Lightweight Deployable Software Monitoring for Sensor Networks. 1-6
NSP 4: Track on network security and privacy
- Ze Li, Haiying Shen:
Analysis of a Hybrid Reputation Management System for Mobile Ad hoc Networks. 1-6 - Huanyu Zhao, Xiaolin Li:
VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks. 1-6 - Geethapriya Thamilarasu, Ramalingam Sridhar:
Game Theoretic Modeling of Jamming Attacks in Ad hoc Networks. 1-6 - Ashish Tapdiya, Errin W. Fulp:
Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs. 1-6
International Workshop on Performance Modeling and Evaluation in Computer and Telecommunication Networks (PMECT)
Session I: Large-scale Networks
- Sureshkumar V. Subramanian, Rudra Dutta:
Measurements and Analysis of M/M/1 and M/M/c Queuing Models of the SIP Proxy Server. 1-7 - Lee Booi Lim, Lin Guan, Alan Grigg, Iain W. Phillips, Xin Gang Wang, Irfan-Ullah Awan:
Bounding Queuing Delay in a Router Based on Superposition of N MMBP Arrival Process. 1-6 - Ivan Gudymenko, Waltenegus Dargie, Alexander Schill:
Evaluation of the Performance of Spontaneously Deployed, Independent Networks. 1-6 - Natalia Vassileva, Francisco Barceló-Arroyo:
Validation of a Traffic-Based CAC Method under General Channel Holding Time. 1-7 - Chongyang Xie, Nasir Ghani:
Admission Control in Networks with Prioritized Advance Reservation. 1-6
Session II: Signaling and storage
- Richard G. Clegg, Raul Landa, Miguel Rio:
Criticisms of Modelling Packet Traffic Using Long-Range Dependence. 1-5 - Glenford E. Mapp, Dhawal N. Thakker, Orhan Gemikonakli:
Exploring Gate-Limited Analytical Models for High Performance Network Storage Servers. 1-5 - Kyungtae Kang, Dong Kun Noh:
Stochastic Timing Analysis of the AES Cipher Algorithm over a Correlated Fading Channel. 1-6
Session III: Wireless sensor networks
- Waltenegus Dargie:
Analysis of Time and Frequency Domain Features of Accelerometer Measurements. 1-6 - Noriaki Kitakoga, Tomoaki Ohtsuki:
A Localization Algorithm for Nonuniform Propagation Environments in Sensor Networks. 1-5 - Xin Guan, Lin Guan, Xin Gang Wang, Tomoaki Ohtsuki:
A Novel Routing Algorithm Based on Ant Colony System for Wireless Sensor Networks. 1-5 - Dong Kun Noh, Kyungtae Kang:
A Practical Flow Control Scheme Considering Optimal Energy Allocation in Solar-Powered WSNs. 1-6 - Jinpyo Hong, Hwangnam Kim:
Refining Elusive User Registration Patterns for Empirical Mobility Models. 1-6
International Workshop on Sensor Networks (SN'2009)
Session-I: Security and Applications
- Piotr Szczechowiak, Martin Collier:
Practical Identity-Based Key Agreement For Secure Communication in Sensor Networks. 1-6 - Brian Quanz, Hongliang Fei, Jun Huan, Joseph B. Evans, Victor Frost, Gary J. Minden, Daniel D. Deavours, Leon S. Searl, Daniel DePardo, Martin Kuehnhausen, Daniel Fokum, Matt Zeets, Angela Oguna:
Anomaly Detection with Sensor Data for Distributed Security. 1-6 - H. T. Kung, Dario Vlah:
A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks. 1-7 - Yang Xiao, Yanping Zhang:
Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags. 1-6 - Pedro Melo, Luís D. Pedrosa, Rui Manuel Rocha:
Interconnecting WSNs with Fast Moving Nodes: Experiments in Real-World Scenarios. 1-6 - Wang-Cheol Song, Sung-Su Kim, Seung-Joon Seok, Deokjai Choi:
Pastry Based Sensor Data Sharing. 1-6
Session-II: Topology, Routing, and Energy Efficiency
- Ataul Bari, Da Teng, Arunita Jaekel:
Optimal Relay Node Placement in Hierarchical Sensor Networks with Mobile Data Collector. 1-6 - Manki Min, Austin F. O'Brien, Sung Y. Shin:
Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks. 1-6 - Andrew Alunyu Egwar, Idris A. Rai:
Power Aware Differentiated Routing (PADR) in Wireless Sensor Networks. 1-6 - Mohammad Al-Otaibi, Hamdy S. Soliman:
Efficient Controlled Routeless Routing Protocol With Fixed Channel's Width for Mobile Ad Hoc Sensor Networks. 1-7 - Geng Yang, Jin-Song Xu, Shengshou Chen, Yingzhou Zhang:
GICR: Global Information Based Clustering Routing Mechanism for Wireless Sensor Network. 1-6 - Jorge M. Soares, Bruno J. Gonçalves, Rui Manuel Rocha:
Power Management Extensions for Tagus-SensorNet. 1-6
Session-III: Architecture, Simulations, Testbed, and Various Good Things
- Yanping Zhang, Yang Xiao:
Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID Tags. 1-5 - Marco Zennaro, Antoine B. Bagula:
Design of a Flexible and Reliable Gateway to Collect Sensor Data in Intermittent Power Environments. 1-6 - George F. Zaki, Hany M. Elsayed, Hassanein H. Amer, Magdy S. El-Soudani:
Energy Balanced Model for Data Gathering in Wireless Sensor Networks with Fixed and Mobile Sinks. 1-6 - Adrian F. Kacso, Roland Wismüller:
A Simulation Framework for Energy-Aware Wireless Sensor Network Protocols. 1-7
International Workshop on Cognitive Networks and Communications (CogCom)
Session-I: Spectrum management
- Ayoub Alsarhan, Anjali Agarwal:
Cluster-Based Spectrum Management Using Cognitive Radios in Wireless Mesh Network. 1-6 - Mengfei Yang, David Grace:
Cognitive Radio with Reinforcement Learning Applied to Multicast Downlink Transmission and Distributed Occupancy Detection. 1-6 - Bo Han, David Grace:
Using Cognitive Interference Routing to Avoid Congested Areas in Wireless Ad Hoc Networks. 1-6 - Stephen J. Shellhammer:
A Comparison of Geo-Location and Spectrum Sensing in Cognitive Radio. 1-6
Session-II: Cognitive networking and cognition techniques
- S. Amaar Ahmad, Juan D. Deaton, Umesh Shukla, Ryan E. Irwin, Luiz A. DaSilva, Allen B. MacKenzie:
A Comparison of Channel Assignment Techniques with Power Control in Ad Hoc Networks. 1-6 - Kareem E. Baddour, Oktay Ureten, Tricia J. Willink:
Efficient Clustering of Cognitive Radio Networks Using Affinity Propagation. 1-6 - Yohannes D. Alemseged, Ha Nguyen Tran, Chen Sun, Hiroshi Harada:
Dual-Purpose Spectrum Sensor Using IEEE802.15.4a UWB PHY and Energy Detection. 1-5 - Ashwini Kumar, Kang G. Shin, Jianfeng Wang, Kiran S. Challapali:
A Case Study of QoS Provisioning in TV-Band Cognitive Radio Networks. 1-6 - Richard O. Afolabi, Kiseon Kim, Aftab Ahmad:
On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature. 1-5
Session-III: Industry Topics and Applications
- Kuo-Chun Huang, Xiangpeng Jing, Dipankar Raychaudhuri:
MAC Protocol Adaptation in Cognitive Radio Networks: An Experimental Study. 1-6 - Selçuk Tascioglu, Oktay Ureten:
Bayesian Wideband Spectrum Segmentation for Cognitive Radios. 1-6 - Sunmin Lim, Hoiyoon Jung, Myung Sun Song:
Cooperative Spectrum Sensing for IEEE 802.22 WRAN System. 1-5 - Michael A. Forman, Derek Young:
A Generalized Scheme for the Creation of Shared Secret Keys through Uncorrelated Reciprocal Channels in Multiple Domains. 1-8 - Birsen Sirkeci-Mergen, Vishal Sawant, Robert Morelos-Zaragoza:
A Trade-Off Analysis of Energy Detectors and Partitioned Search for Primary Detection. 1-4
International Workshop on Multimedia Computing and Communications (MCC)
- Yih Han Tan, Wei Siong Lee, Jo Yew Tham, Susanto Rahardja:
Complexity-Rate-Distortion Optimization for Real-Time H.264/AVC Encoding. 1-6 - Saeed Nari, Hamid R. Rabiee, Ali Abedi, Mohammed Ghanbari:
An Efficient Algorithm for Overlay Multicast Routing in Videoconferencing Applications. 1-6 - Ramdas Satyan, Sunday Nyamweno, Fabrice Labeau:
Error Resilience Using Leaky Source Channel Prediction Scheme. 1-5 - Masahiko Kitamura, Takahiro Murooka, Mitsuhiro Teshima, Hisaya Hadama, Atsushi Takahara, Tetsuro Fujii:
A Study on the Correlation between QoE of 4K Super High Definition Video Streamings and QoS of Network. 1-6 - Mohsen Akbari, Fabrice Labeau:
Adaptive Downsampling in Oversampled Filter Banks in the Presence of Quantization Noise. 1-6 - Susan Elias, Lisa Mathew, K. S. Easwarakumar, Richard Chbeir:
Automatic Temporal Formatting of Multimedia Presentations Using Dynamic Petri Nets. 1-6 - Andrew Blaich, Aaron Striegel:
Is High Definition a natural DRM? 1-4
International Workshop on Privacy and Trust of Computer and Cyber-Physical Networks (SecureCPN)
Session-I: Network Security Protocols
- Stephen Dabideen, Bradley R. Smith, J. J. Garcia-Luna-Aceves:
The Case for End-to-End Solutions to Secure Routing in MANETs. 1-6 - Athichart Tangpong, George Kesidis, Hung-Yuan Hsu, Ali R. Hurson:
Robust Sybil Detection for MANETs. 1-6 - Lianyu Zhao, Haiying Shen:
A Low-Cost Anonymous Routing Protocol in MANETs. 1-6 - Gunwoo Nam, Pushkar Patankar, George Kesidis, Chita R. Das, Cetin Seren:
Mass Purging of Stale TCP Flows in Per-Flow Monitoring Systems. 1-6 - Zesheng Chen, Chao Chen, Qian Wang:
Delay-Tolerant Botnets. 1-6
Session-II: System and Theoretical Aspects of Network Security
- Antonio Izquierdo, Nada Golmie, Richard Rouil:
Optimizing Authentication in Media Independent Handovers Using IEEE 802.21. 1-6 - Thomas E. Carroll, Daniel Grosu:
A Game Theoretic Investigation of Deception in Network Security. 1-6 - Turgay Korkmaz:
Analyzing Response Time of Batch Signing. 1-6 - Shi-hai Huang, Chuang Lin, An'an Luo, Zhen Chen, Xin Jiang, Kai Wang, Hui Zhang, Xuehai Peng:
Proxy-Based Security Audit System for Remote Desktop Access. 1-5 - Tingting Mao, John R. Williams, Abel Sanchez:
An Interoperable Internet Scale Solution for RFID Network Security. 1-6
International Workshop on Grid and P2P Systems and Applications (GridPeer)
Session-I: Streaming, Search, and Sharing
- Sachin Agarwal:
Smart Peer-to-Peer Video Streaming: Comparing Adaptation Under Heterogeneous Conditions. 1-6 - Kien Nguyen, Thinh P. Nguyen, Yevgeniy Kovchegov:
A P2P Video Delivery Network (P2P-VDN). 1-7 - Haibo Zhang, Haiying Shen:
A Social Network Based File Sharing System in Mobile Peer-to-Peer Networks. 1-6 - Cuihua Zuo, Ruixuan Li, Haiying Shen, Zhengding Lu:
High Coverage Search in Multi-Tree Based P2P Overlay Network. 1-6
Session-II: Modeling, Measurement, QoS and Security
- Shilpa Ghadge, Timothy Killingback, Bala Sundaram, Duc A. Tran:
A Parsimonious Statistical Protocol for Generating Power-Law Networks. 1-6 - Yehia El-khatib, Christopher Edwards, Michael Mackay, Gareth Tyson:
Providing Grid Schedulers with Passive Network Measurements. 1-6 - Jinu Kurian, Ajay Kulkarni, Hai Trong Vu, Kamil Saraç:
ODON: An On-Demand Security Overlay for Mission-Critical Applications. 1-6 - Patrick McClory, Ezra Kissel, D. Martin Swany, Michela Taufer:
MNEMONIC: A Network Environment for Automatic Optimization and Tuning of Data Movement over Advanced Networks. 1-7 - Amos Brocco, Béat Hirsbrunner:
Service Provisioning Framework for a Self-Organized Grid. 1-6 - Jihoon Kim, Younghan Kim:
A Design of Generalized Peer-to-Peer Based IPTV System Using Multiple Chain Architecture. 1-5
International Workshop on Nano, Molecular, and Quantum Communications (NanoCom)
- Bao Liu:
Defect Mapping and Adaptive Configuration of Nanoelectronic Circuits Based on a CNT Crossbar Nano-Architecture. 1-6 - Tien-Sheng Lin, I-Ming Tsai, Sy-Yen Kuo:
Quantum Transmission Integrity Mechanism for Indirect Communication. 1-6 - Sachin Kadloor, Raviraj Adve:
A Framework to Study the Molecular Communication System. 1-6 - Yang Liu, Alvin R. Lebeck:
Nano-Scale On-Chip Irregular Network Analysis. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.