default search action
7. INC 2008: Plymouth, UK
- Paul Dowland, Steven Furnell:
Seventh International Network Conference (INC 2008), Plymouth, UK, July 8-10, 2008. Proceedings. University of Plymouth 2008, ISBN 978-1-84102-188-1
Network Technologies
- Christos Bouras, Apostolos Gkamas, Kostas Stamos:
Monitoring End to End Bandwidth on Demand Circuits over Ethernet Infrastructure. 3-13 - Dan Komosny, Kathiravelu Ganeshan, Mojmir Jelinek, Radim Burget:
Scalability Issues with the Hierarchical Feedback Aggregation for Large-Scale IPTV Systems. 15-26 - Frank Weber, Woldemar F. Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan V. Ghita:
A Framework for Improved QoS Evaluation and Control in SIP-Based NGN. 27-37 - Mahmoud M. Elmesalawy, Gamal Abd-Elfadeel, Ibrahim I. Ibrahim:
Genetic-Based Subcarrier and Bit Allocation Algorithm for Multiuser OFDM System. 39-52 - Mike Morgan, Vic Grout:
Finding Optimal Solutions to Backbone Minimisation Problems using Mixed Integer Programming. 53-63 - Georgios Exarchakos, Nick Antonopoulos, Kan Zhang:
Firewalks: Discovery Mechanism for Non-Replicable Reusable Resources. 65-76 - Armando Roy Delgado, Alexia Robinet, Vic Grout, Rich Picking, John McGinn:
A Survey of Applying Ad Hoc Wireless Sensor Actuator Networks to Enhance Context-Awareness in Environmental Management Systems. 77-90 - Vic Grout, Stuart Cunningham, Rich Hebblewhite:
An Illustrative Discussion of Different Perspectives in Network Engineering. 91-104 - Vic Grout, John N. Davies, John McGinn:
Traffic Modelling and Simulation Techniques for Evaluating ACL Implementation. 105-123 - Nick Antonopoulos, Georgios Exarchakos, Kan Zhang:
Sharing Supply-Demand Trends for Efficient Resource Discovery in GRID Environments. 125-137
Security and Privacy
- Emran Mohd Tamil, Mohd Yamani Idna Bin Idris, Chiew Ming Thong, Madihah Mohd Saudi, Mohd Zalisham Jali:
Needleman Wunsch Implementation for SPAM/UCE Inline Filter. 141-147 - Oleksiy Mazhelis, Hannakaisa Isomäki:
Security Assessment and Planning in Small Organizations. 149-159 - James S. Briggs, Vasilios Katos, Azzri Bhaludin:
On the Security Controls of Portable Computing Devices in Healthcare Environments. 161-170 - Christopher Bolan:
A Review of the Electronic Product Code Standards for RFID Technology. 171-178
Mobile and Wireless Networking
- Ying Dong, Victor O. K. Li, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Strongly Anonymous Communications in Mobile Ad Hoc Networks. 181-191 - John N. Davies, Vic Grout, Rich Picking:
Prediction of Wireless Network Signal Strength Within a Building. 193-207
Applications and Impacts
- Bartlomiej Polakowski, Krzysztof Amborski:
Ontologies for eLearning. 211-221 - Oliver Schneider, Udo Bleimann, Andrew D. Phippen, Bettina Harriehausen-Mühlbauer:
Inside Coherence: Concept for a Non-Linear eLearning Solution. 223-233 - Michael P. Evans, Shirley Williams, Patrick Parslow, Robert P. Ashton, Karsten Øster Lundqvist, Edwin Porter-Daniels:
The MeAggregator: Personal Aggregation and the Life-Long Tail of the Web. 235-244 - Holger D. Hofmann, Martin Hans Knahl:
The Web 2.0 Demystified – Six Theses on a Misinterpreted Concept. 245-259 - Martin Swientek, Udo Bleimann, Paul Dowland:
Service-Oriented Architecture: Performance Issues and Approaches. 261-269 - Ingo Stengel, Udo Bleimann, Jeanne Stynes:
Optimisation in Multi-Agent Systems. 271-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.