default search action
ICON 2008: New Delhi, India
- Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India. IEEE 2008
Wireless Sensor Networks - I
- Goutam Chatterjee, Ajay Somkuwar:
Design analysis of wireless sensors in BAN for stress monitoring of fighter pilots. 1-6 - Nidhi Bansal, Teek Parval Sharma, Manoj Misra, Ramesh Chandra Joshi:
FTEP: A fault tolerant election protocol for multi-level clustering in homogeneous wireless sensor networks. 1-6 - Chen Yuan, Anjali Agarwal:
Ants-in-Mesh routing protocol for Wireless Mesh Network. 1-6 - Teek Parval Sharma, Ramesh Chandra Joshi, Manoj Misra:
Dual radio based cooperative caching for wireless sensor networks. 1-7 - Manish Kumar, Shekhar Verma, Pankaj Pratap Singh:
Clustering approach to data aggregation in wireless sensor networks. 1-6 - A. S. Poornima, B. B. Amberker:
Tree-based key management scheme for heterogeneous sensor networks. 1-6 - Sounak Paul, Sukumar Nandi, Indrajeet Singh:
A dynamic balanced-energy sleep scheduling scheme in heterogeneous wireless sensor network. 1-6
Communication - I
- Ian D. Chakeres, Guntur Ravindra:
Calculating a next-hop metric in multiradio networks. 1-5 - Hermann Schloss, Jean Botev, Alexander Höhfeld, Ingo Scholtes, Rainer Oechsle, Markus Esch:
HiOPS overlay - efficient provision of multicast in peer-to-peer systems. 1-6 - Shahana Thottathikkulam Kassim, Babita R. Jose, Rekha K. James, K. Poulose Jacob, Sreela Sasi:
RRNS-Convolutional encoded concatenated code for OFDM based wireless communication. 1-6 - Tanmay De, Puneet Jain, Ajit Pal, Indranil Sengupta:
A genetic algorithm based approach for traffic grooming, routing and wavelength assignment in optical WDM mesh networks. 1-6 - Lin Cong, Guohan Lu, Yang Chen, Beixing Deng, Xing Li:
pathWave: Combined estimation of network link capacity and available bandwidth using statistical signal processing. 1-6 - Ravi Sindal, Sanjiv Tokekar:
Modeling and analysis of voice/data call admission control scheme in CDMA cellular network for variation in soft handoff threshold parameters. 1-6
Ad Hoc Networks - I
- Khushboo Agarwal, Lalit Kumar Awasthi:
Enhanced AODV routing protocol for Ad hoc networks. 1-5 - P. Eshwar Rohit, Shashikala Tapaswi, Ramesh Chandra Joshi:
Probability based routing for Ad Hoc networks in a building. 1-6 - Ash Mohammad Abbas:
Analysis of a hybrid protocol for identification of a maximal set of node-disjoint paths in mobile Ad hoc networks. 1-7 - M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy:
On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. 1-6 - Sarbani Roy, Dhrubajyoti Chatterjee, Nandini Mukherjee:
Capability aware routing algorithm for Mobile Ad-Hoc Network in workplace. 1-6 - B. R. Sujatha, V. P. Harigovindan, M. N. Agnisarman Namboodiri, M. V. Sathyanarayana:
Performance analysis of PBANT (PBANT: Position based ANT Colony Routing algorithm for MANETs). 1-6 - Heman Pathak, Kumkum Garg, Nipur:
CPN model for a Hierarchical Fault Tolerance Protocol for Mobile Agent systems. 1-6
Wireless Sensor Networks -II
- Neeraj Kumar Nehra, R. B. Patel:
MASLKE: Mobile Agent Based Secure Location aware Key Establishment in sensor networks. 1-6 - Bhaskar P. Deosarkar, Narendra Singh Yadav, Rajendra Prasad Yadav:
Chain based Conical Clustering (CCC) framework for data gathering in WSNs. 1-6 - Sujan Kundu, Sudip Roy, Ajit Pal:
A power-aware wireless sensor network based bridge monitoring system. 1-7 - Neetesh Purohit, Pritish Kumar Vardawaj, Sanjiv Tokekar:
Reliability analysis of Wireless Sensor Network. 1-6 - K. Vimala Devi, K. M. Mehata:
A priority based resource allocation with max-min fairness in active sensor networks. 1-7
Communication - II
- Jiun-Shiou Deng, Ming-Feng Lu, Yang-Tung Huang:
High performance rearrangeable nonblocking networks with polarization selective elements. 1-5 - Sunanda Manke, Kavita Khare, S. D. Sapre:
100Mbps Ethernet data transmission over SDH networks using Cross Virtual Concatenation. 1-6 - Mohammad Iqbal Bin Shahid, Joarder Kamruzzaman:
Weighted soft decision for cooperative sensing in cognitive radio networks. 1-6 - Mrinal Nandi, Ashok K. Turuk, Bibhudatta Sahoo, Dillip Kumar Puthal, S. Dutta:
A new contention avoidance scheme in optical burst switch network. 1-5 - Alireza Sadighian, Rasool Jalili:
FLMAP: A fast lightweight mutual authentication protocol for RFID systems. 1-6 - Manoj Shukla, Vinay Kumar Srivastava, Sudarshan Tiwari:
Analysis and design of Tree Based Interleaver for multiuser receivers in IDMA scheme. 1-4
Ad Hoc Networks - II
- Ashutosh Bhatia, Praveen Kaushik:
A cluster based minimum battery cost AODV routing using multipath route for zigbee. 1-7 - Narges Aghakazem Jourabbaf, Ali Movaghar:
ID-NAC: Identity-based network access control for MANETs. 1-6 - S. M. Dilip Kumar, B. P. Vijay Kumar:
Energy-aware multicast routing in MANETs based on genetic algorithms. 1-5 - Amita Rani, Mayank Dave:
Weighted load balanced routing protocol for MANET. 1-6 - P. Sateesh Kumar, Ramachandram Sirandas:
The performance evaluation of cached Genetic Zone Routing Protocol for MANETs. 1-5 - Xiang-yu Bai, Xin-min Ye, Hai Jiang, Jun Li:
A novel traffic information system for VANET based on location service. 1-6 - Vineet Toubiana, Houda Labiod:
A cross layer attack against MANET cooperation enforcement tools. 1-5
Security - I
- Parul Agarwal, Brijesh Singh Yadav, Joydeep Chandra:
Statistical analysis based efficient decentralized intrusion detection scheme for mobile ad hoc networks. 1-6 - Rakesh Nayak, C. V. Sastry, Jayaram Pradhan:
A matrix formulation for NTRU cryptosystem. 1-5 - Manik Lal Das:
Efficient user authentication and secure data transmission in wireless sensor networks. 1-6 - N. R. Sunitha, B. B. Amberker:
A new method of verifying digital signatures in e-cheque processing. 1-5 - Abraham Jibi, K. S. Ramanatha:
Estimation of communication overhead during Pair-wise key establishment in wireless sensor networks. 1-6 - Shivneet Singh:
EtherSec: An Enterprise Ether-network security model. 1-5
TCP/IP
- Aneel Rahim, Muhammad Sher, Adeel Javed, Imran Ahmad, Rehman Hameed:
Performance analysis of TCP in VANETs by using 802.11e. 1-3 - Partha Bhattacharjee, Goutam Sanyal:
New admission control algorithm based on effective bandwidth for a multi-class network. 1-6 - N. J. Kothari, J. J. Patel, K. D. Patel, Kankar S. Dasgupta:
Performance evaluation of TCP-AFC in an emulated real network. 1-6 - Chinmay P. Soman, Anant Mahajan:
A framework for transparent relocation in distributed filesystem using R-TCP. 1-6 - Hiroshi Fujinoki:
Multi-path BGP (MBGP): A solution for improving network bandwidth utilization and defense against link failures in inter-domain routing. 1-6 - Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar:
Towards a realistic context dissemination protocol using pure multi-level overlay networks. 1-7
Wireless Networks
- A. Samydurai, Saswati Mukherjee:
Fully distributed active software objects replication in OO-Middleware. 1-6 - Rohit A. Talwalkar, Mohammad Ilyas:
Analysis of Quality of Service (QoS) in WiMAX networks. 1-8 - Iftekhar Ahmad, Daryoush Habibi:
A novel mobile WiMAX solution for higher throughput. 1-5 - G. Indumathi, K. Murugesan:
Distributed fair scheduling with distributed coordination function in WLAN. 1-6 - E. Prince Edward, V. Sumathy:
Enhanced SIP based method for vertical handoff between WiFi and WiMax networks. 1-5 - David Villa, Felix Jesús Villanueva, Francisco Moya, Gabriel Urzaiz, Fernando Rincón, Juan Carlos López:
Object oriented multi-layer router with application on wireless sensor-actuator networks. 1-7
Security - II
- Irfan A. Siddavatam, Jayant Gadge:
Comprehensive test mechanism to detect attack on Web Services. 1-6 - Richa Bansal, Siddharth Tiwari, Divya Bansal:
Non-cryptographic methods of MAC spoof detection in wireless LAN. 1-6 - Jayant Gadge, Anish Anand Patil:
Port scan detection. 1-6 - Anjali Sardana, Ramesh Chandra Joshi:
Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. 1-7 - Jaydip Sen, Arijit Ukil, Debasish Bera, Arpan Pal:
A distributed intrusion detection system for wireless ad hoc networks. 1-6
P2P
- Maroun Chamoun, Rima Kilany, Ahmed Serhrouchni:
A Service Oriented P2P architecture with semantic support. 1-6 - S. Kalantary, Ali Movaghar, A. A. Ghafarizade:
A study on routing method in P2P networks. 1-6 - Lluis Pamies-Juarez, Pedro García López, Marc Sánchez Artigas:
Rewarding stability in peer-to-peer backup systems. 1-6 - Hai Jiang, Jun Li, Zhongcheng Li, Jing Liu:
Efficient hierarchical content distribution using P2P technology. 1-6 - Nicolas Bonnel, Gildas Ménier, Pierre-François Marteau:
Search in P2P triangular mesh by space filling trees. 1-6 - Anurag Mehrotra:
Peer-to-Peer internet TV. 1-5 - Ajit D. Dhiwal, Sudip Gautam, Akshay K. Singh, Vijay Kumar Chaurasiya:
MailZoro - email based P2P file sharing. 1-5
Performance
- Mukaddim Pathan, Rajkumar Buyya:
Performance models for peering Content Delivery Networks. 1-7 - Narander Kumar, Ravendra Singh:
Performance of QoS-based coordination framework for wireless aware multimedia applications. 1-6 - Veena Tyagi, Chanchal Gupta:
Optimizing iSCSI storage network: A direct data transfer scheme using connection migration. 1-6 - Balakrishnan Kaarthick, N. Nagarajan, S. Rajeev, R. Joanna Angeline:
Improving QoS of audio and video packets in MPLS using network processors. 1-5 - Seema Ladhe, Satish Devane, Madhumita Chatterjee:
Improved agent based explicit path computation algorithm for MPLS-TE. 1-5 - Xiaoyu Zhang, Fan Wang:
On scheduling concurrent multicast sessions over resource reserved network. 1-6
Poster Session
- Rashmi Verma, Shilpa Mahajan, Vishal Rohila:
Classification of MIMO channel models. 1-4 - Suresh S. Balpande, Sudhir B. Lande, Sourabh Rungta:
Behavioral modeling, simulation and synthesis of an output queuing Batcher-Banyan ATM switch with internal speedup network. 1-4 - B. Nanancharaiah, Gnanou Florence Sudha, M. B. R. Murthy:
A scheme for efficient topology management of wireless ad hoc networks using the MARI algorithm. 1-4 - Ashish Dhane, Sanjeev Kumar Sharma:
Modeling and analysis of Sequence Number Attack and its detection in AODV. 1-6 - Rathanakar Acharya, K. Asha:
Data integrity and intrusion detection in Wireless Sensor Networks. 1-5 - Servesh Singh, M. M. Gore:
Cluster management in the known area of deployment for wireless sensor network. 1-4 - Ankur Gupta, Deepti Malhotra, Lalit Kumar Awasthi:
NeighborTrust: A trust-based scheme for countering Distributed Denial-of-Service attacks in P2P networks. 1-6 - N. Muraleedharan:
Analysis of TCP flow data for traffic anomaly and scan detection. 1-4 - Khaleel Ur Rahman Khan, Rafi U. Zaman, A. Venugopal Reddy, Kashifa Hafeez, Tabassum Sultana:
A hierarchical approach of integrating Mobile ad hoc Network and the internet. 1-4 - Siddharth Tiwari, Richa Bansal, Divya Bansal:
Optimized client side solution for cross site scripting. 1-4 - Jyoti Singh, Renuka Agrawal:
Energy efficient processing of location based query in Wireless Sensor Networks. 1-4 - Demian Antony D'Mello, V. S. Ananthanarayana, Raghavendra Achar:
Business offer driven dynamic Web service selection. 1-5 - G. Thavasi Raja, Omkar Reddy:
ICA based multiuser detection of DS-CDMA using differential entropy estimation in Rayleigh fading channel. 1-4 - Mohammad Robatmili, Mehdi Mohammadi, Ali Movaghar, Mehdi Dehghan:
Finding the sensors location and the number of sensors in sensor networks with a genetic algorithm. 1-3 - Pravesh Gaonjur, N. Z. Tarapore, S. G. Pukale, M. L. Dhore:
Using Neuro-Fuzzy Techniques to reduce false alerts in IDS. 1-6 - Annapurna Agrawal, K. R. Prasanna Kumar, G. Athithan:
SIP/RTP session analysis and tracking for VoIP logging. 1-5 - Brij B. Gupta, Manoj Misra, Ramesh Chandra Joshi:
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. 1-4 - Ramakrishna Garudadri, Krishna Kant:
A Hybrid Resource Information Dissemination Protocol for dynamic Grids. 1-4 - Chinmay R. Totekar, M. Vani, Sharath R. Palavalli:
Search improvement in unstructured P2P network considering type of content. 1-4 - Sushma Jain, Jaydev Sharma:
Delay bound multicast routing algorithm using evolutionary programming. 1-4 - Rama Sushil, Kumkum Garg, Rama Bhargava:
Comparison of location management techniques for mobile agents. 1-5 - Saptarshi Debroy, Sabyasachi De, Pradip K. Das:
GRASP: Geographic Rendezvous Application. 1-4 - Neetesh Purohit, Sanjiv Tokekar:
Survivability index for a GPRS network. 1-4 - Amar Kumar Mohapatra, Nupur Prakash, Sonali Aggarwal:
Secured biometric template. 1-4 - Malla Reddy Perati, L. P. Raj Kumar, Kumar K. Sampath, Shou-Kuo Shao:
Analytical model for the switch handling self-similar traffic with variable packet length. 1-5 - Mohammad Reza Sheikhattar, Hassan Yeganeh, Mansour Mirzabaghi, Maryam Bahmani:
Improvement of VoIP QoS parameters in comparison to IPTV requirements in Next Generation Broadband Ethernet network. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.