![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
ICSNC 2006: Papeete, Tahiti, French Polynesia
- Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia. IEEE Computer Society 2006, ISBN 0-7695-2699-3
Introduction
- Preface.
- ICSNS Committees.
ICSNC 1: Mobility and Ad Hoc
- T. Shivaprakash, G. S. Badrinath, K. R. Venugopal, Lalit M. Patnaik:
Energy Aware Topology Management in Ad Hoc Wireless Networks. 1 - T. Srinivasan, V. Mahadevan, A. Meyyappan, A. Manikandan, M. Nivedita, N. Pavithra:
Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc Networks. 2 - Hyun-Duk Choi, Ho-Hyun Park, Miae Woo:
An Enhanced Gnutella for Ad-Hoc Networks. 3 - Chenchen Zhao, Zhen Yang:
A New EAAODV Routing Protocol based on Mobile Agent. 4 - Panayotis Antoniadis, Costas Courcoubetis:
The Case of Multi-hop Peer-to-Peer Implementation of Mobile Social Applications. 5 - Mâamoun Bernich, Fabrice Mourlin:
Mobile agent communication scheme. 6
ICSNC 2: High Speed
- Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang
, Chin-Laung Lei:
Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. 7 - Scott Fowler
, Sherali Zeadally:
Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks. 8 - Homayoun Yousefi'zadeh:
A Neuro-ForecastWater-Filling Scheme of Server Scheduling. 9 - N. Sreenath, Balaji Palanisamy:
A Two - Phase Distributed Reconfiguration Algorithm for Node Failures in IP-Over-WDM Networks. 10 - N. Sreenath, Balaji Palanisamy, S. R. Nadarajan:
Grooming of Multicast Sessions in Sparse Splitting WDM Mesh Networks using Virtual Source Based Trees. 11 - André Soares
, José Maranhão Neto, William Giozza
, Paulo R. F. Cunha
:
Cost Benefit Study of Sparse-Partial Wavelength Conversion Architectures. 12
ICSNC 3: Multimedia
- Deng Lixin:
A new approach of data hiding within speech based on Hash and Hilbert Transform. 13 - Markus Sihvonen, Mikko Nieminen, Johannes Oikarinen, Tomi Räty:
Active Service Quality Management in ASEMA system. 14 - Yong Li, Fang Su, Yinglei Fan, Huimin Xu:
End-to-End Differentiation of Congestion and Wireless Losses using a Fuzzy Arithmetic based on Relative Entropy. 15 - Peter Quax, Bjorn Geuns, Tom Jehaes, Wim Lamotte, Gert Vansichem:
On the Applicability of Remote Rendering of Networked Virtual Environments on Mobile Devices. 16 - Moon Ho Lee, Xiao-Dong Zhang:
Fast Block Center Weighted Hadamard Transform. 17
ICSNS 4: Security I
- Gerald Kunzmann, Andreas Binzenhöfer:
Autonomically Improving the Security and Robustness of Structured P2P Overlays. 18 - Mehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala
:
ASASI: An Environment for Addressing Software Application Security Issues. 19 - Reijo Savola:
Towards Requirement and Modeling Driven Security Evaluation. 20 - Martin Boldt
, Bengt Carlsson:
Privacy-Invasive Software and Preventive Mechanisms. 21 - Zongyuan Deng, Zhen Yang, Lixin Deng:
A Real-time Secure Voice Communication System Based on Speech Recognition. 22
ICSNC 5: Security II
- Zhao-Li Zhang, Fan Hong, Hai-Jun Xiao:
Verification of Strict Integrity Policy via Petri Nets. 23 - Mucahit Mutlugun, Ibrahim Sogukpinar
:
Security Architecture for Web-based Health Insurance Systems. 24 - Yu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang
:
Confessible Threshold Ring Signatures. 25 - Piotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak
, Miroslaw Kutylowski, Filip Zagórski
:
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol. 26 - Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter:
Usage Control Requirements in Mobile and Ubiquitous Computing Applications. 27
ICSNC 6: Sensors I
- Frank Oldewurtel, Petri Mähönen:
Neural Wireless Sensor Networks. 28 - Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen:
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. 29 - Stephan Hengstler, Hamid K. Aghajan:
Application Development in Vision-Enabled Wireless Sensor Networks. 30 - Kun Bi, Kun Tu, Naijie Gu, Wan Lin Dong, Xiaohu Liu:
Topological Hole Detection in Sensor Networks with Cooperative Neighbors. 31 - Na Wang, Chorng Hwa Chang:
Probabilistic-Based Energy Aware Routing for Network Lifetime and Source Level Fairness in Wireless Sensor Networks. 32
ICSNC 7: Education + Policies
- Freimut Bodendorf:
E-Services for an Electronic Education Market. 33 - Jan Moons, Carlos De Backer, Herwig Mannaert:
Components for a pervasive information dissemination architecture. 34 - Shann-Chiuen Wu, Shih-Jen Chu, Tzao-Lin Lee:
Remote Screen Recording and Playback. 35 - Dimitrios Tzimeas, Eleni E. Mangina
:
Jazz Sebastian Bach: A GA System for Music Style Modification. 36 - Javier Baliosian, Ann Devitt
:
Forecasting Unstable Policy Enforcement. 37 - Ritu Chadha:
Beyond the Hype: Policies for Military Network Operations. 38 - Jihen Malek, Mona Laroussi, Alain Derycke:
A Multi-Layer Ubiquitous Middleware for Bijective Adaptation between Context and Activity in a Mobile and Collaborative learning. 39
ICSNC 8: Sensors II
- Tanveer A. Zia
, Albert Y. Zomaya
:
Security Issues in Wireless Sensor Networks. 40 - Kun Tu, Kun Bi, Naijie Gu, Wan Li Dong, Xiaohu Liu:
Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game Approach. 41 - Pang-Chieh Wang, Ting-Wei Hou, Ruei-Hong Yan:
Maintaining Coverage by Progressive Crystal-Lattice Permutation in Mobile Wireless Sensor Networks. 42 - Fernando Martincic, Loren Schwiebert
:
Distributed Event Detection in Sensor Networks. 43 - Ronny Fehling:
Tracing and Managing hazardous material in Sensor Networks. 44
ICSNC 9: Wireless I
- Dan Sui
, Lindong Ge:
A Novel Blind SNR Estimator Based on the Modified PASTd Algorithm for IF Signals. 45 - Zimu Li, Jianping Wu, ShaoHua Qin:
Accelerating VOD Streaming with Adaptive Proxy- Assisted Scheduling, Caching and Patching. 46 - Wen-Hwa Liao, Yu-Chee Lee:
Localization with Power Control in Wireless Sensor Networks. 47 - Yoon Ju Lee, Sung Cheol Chang, Young Il Kim, Song In Choi, Jee Hwan Ahn:
Wireless Broadband Internet Access in Korea. 48 - Karol Molnar, Martin Kyselak:
Application Programming Interface offering classification services to end-user applications. 49
ICSNC 10: Wireless II
- Zouhair El-Bazzal, Michel Kadoch
, Basile L. Agba, François Gagnon
, Maria Bennani:
A Flexible Weight Based Clustering Algorithm in Mobile Ad hoc Networks. 50 - Haibin Liu:
A New Communication Architecture Based on the Spatial Information Field Model. 51 - Sathiamoorthy Manoharan
:
XHTML encoding and compression. 52 - Majid Farahmand, Arash Azarfar, A. Jafari, Vahid Zargari:
A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area Networks. 53 - Miao Pan, Shuo Liang, Haozhi Xiong, Jie Chen, Guangyi Li:
A Novel Bargaining Based Dynamic Spectrum Management Scheme in Reconfigurable Systems. 54
ICSNC 11: Wireless III
- Idil Candan, Muhammed Salamah:
Performance Analysis of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in Cellular Networks. 55 - Katsuhiro Naito, Kazuo Mori, Hideo Kobayashi:
TCP Based Resource Allocation Method for Base Station Diversity System. 56 - Jong-Hyouk Lee, Tai-Myoung Chung:
Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN. 57 - Jong-Hyouk Lee, Tai-Myoung Chung:
Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks. 58 - Su Fang, Fan Yinglei, Li Yong, Xu Huimin:
A ROD based Fuzzy packet loss differentiating algorithm for TCP in the hybrid wired/wireless network. 59
ICSNC 12: Wireless IV
- Changhoi Koo, Yong Woo Chung:
Dynamic Cell Coverage Control for Power Saving in IEEE802.16 Mobile MultihopRelay Systems. 60 - Jae Sung Roh:
Performance Analysis and Evaluation of Bluetooth Networks in Wireless Channel Environment. 61 - Neeraj Gupta, Vishal Srivastav, Mahinder Pal Singh Bhatia
:
Middleware - An Effort towards Making Mobile Applications Platform Independent. 62 - Zhen-Jiang Zhang, Yun Liu:
An Energy-Efficient Redundant Nodes Tree Mechanism for Wireless Sensor Networks. 63
ICNSC 13: Wireless V
- Ashkan Bayati, Pedram Ghodsnia, Maseud Rahgozar
, Reza Basseda:
A Novel Way of Determining the Optimal Location of a Fragment in a DDBS: BGBR. 64 - Moon Ho Lee, Xueqin Jiang, Gi Yeon Hwang, Subash Shree Pokhrel:
Error Correcting Codes from Modified Butson-Hadamard Matrices. 65 - Xueqin Jiang, Moon Ho Lee, Sergey A. Stepanov, KwangJe Lee, KimSung Hun:
Ternary Codes From Modified Hadamard Matrices. 66 - Xueqin Jiang, Moon Ho Lee, Ram Prasad Paudel, TaeChol Shin:
Codes From Generalized Hadamard Matrices. 67
ICSNC 14: Wireless VI
- Ali Sarrafi, Mohammad Hamed Firooz, Hassan Barjini:
A Cluster Based Topology Control Algorithm for Wireless Ad-Hoc Networks. 68 - Victor A. Clincy, Ajay Sitaram, David Odaibo, Garima Sogarwal:
A Real-Time Study of 802.11b and 802.11g. 69 - Chadi Tarhini, Tijani Chahed:
System capacity in OFDMA-based WiMAX. 70 - Yin-Jun Chen, Ching-Chung Chen, Shou-Nian Wang, Han-En Lin, Roy Chaoming Hsu:
GPSenseCar - A Collision Avoidance Support System Using Real-Time GPS Data in a Mobile Vehicular Network. 71 - Abderrezak Rachedi
, Abderrahim Benslimane
:
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks. 72
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.