default search action
8. INC 2010: Heidelberg, Germany
- Udo Bleimann, Paul Dowland, Steven Furnell, Oliver Schneider:
Eighth International Network Conference (INC 2010), Heidelberg, Germany, July 6-8, 2010. Proceedings. University of Plymouth 2010, ISBN 978-1-84102-259-8
Network Architectures and Management
- Vic Grout, Nigel Houlden:
Some Notes and Results on Bandwidth-based Routing and Implicit Load Balancing. 19-30 - Chee Kheong Siew, Shuai Peng, Wuqiong Luo, Peng Tang, Yanting Mo:
Scalable Distributed-FDPS Algorithm for QoS Provisioning. 31-40 - Isara Anantavrasilp:
Intelligent IP Traffic / Flow Classification System. 41-50 - Mohamed Arabi, Bogdan V. Ghita, Xingang Wang:
Improving Fairness in Ad Hoc Networks Through Collision Rate Control. 51-59 - Frank Weber, Woldemar F. Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan V. Ghita:
A Bootstrap Mechanism for NGN QoS Profiling. 61-70 - Johannes Häussler, Anett Schülke, Marcus Q. Kuhnen, Jochen Bauknecht:
Possible Future Revenue Creation Through IMS Service Enablers. 71-74 - Thomas Eichelmann, Woldemar F. Fuhrmann, Ulrich Trick, Bogdan V. Ghita:
Enhanced Concept of the TeamCom SCE for Automated Generated Services Based on JSLEE. 75-84 - John N. Davies, Vic Grout, Rich Picking:
Improving the Performance of IP Filtering using a Hybrid Approach to ACLs. 85-95
Mobile and Wireless Networking
- Sandra Frei, Woldemar F. Fuhrmann, Andreas Rinkel, Bogdan V. Ghita:
Signalling Effort Evaluation of Mobility Protocols within Evolved Packet Core Network. 99-108 - Sascha Roth:
Enabling Push-based Mobile Web Services for Today's Cell Phone Provider Networks. 109-120 - Yue-Huei Huang, Yaw-Chung Chen:
A Cross-Layer Media-Independent Handover Mechanism in Heterogeneous WiMAX/WiFi Networks. 121-130
Security and Privacy
- Ashar Javed:
Fast Implementation of AES on Mobile Devices. 133-142 - Christophe Feltus:
Conceptual Trusted Incident Reaction Architecture. 143-152 - Oleksiy Mazhelis, Hannakaisa Isomäki:
Information Security Culture: A Survey. 153-157 - Carlos Javier Hernández-Castro, Jonathan D. Stainton-Ellis, Arturo Ribagorda, Julio César Hernández Castro:
Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal. 159-168 - Matti Mantere, Kaarina Karppinen, Mika Rautila:
The Effect of Pre-written Scripts on the Use of Simple Software Security Analysis Tools. 169-177 - Nils Gruschka, Luigi Lo Iacono:
Password Visualization beyond Password Masking. 179-188 - Ingo Ritter, Martin Kappes, Peter Wedde, Ruediger Gad, Andreas Renner:
Survey on Legal Data Protection Norms Relevant to Automated Network Infrastructure Analysis. 189-197 - Rafael Martínez-Peláez, Francisco Rico-Novella, Cristina Satizábal, Jacek Pomykala:
Strong Remote User Authentication Scheme using Smart Cards. 199-208 - Michael Atighetchi, Andrew Gronosky, Partha P. Pal, Joseph P. Loyall:
Usable Survivability. 209-212 - Christopher Bolan:
Using the Generation One EPC RFID LockID Command as a Method of Directed Attack. 213-221 - Christoph Kemetmüller, Mark M. Seeger, Harald Baier, Christoph Busch:
Manipulating Mobile Devices with a Private GSM Base Station - A Case Study. 223-234
Learning Technologies
- Subramaniam Chandran:
Application and Impacts of Mobile Learning: A Case Study in Technology for Sustainable Distance Learning. 237-240 - Francisco Javier del Álamo, Raquel Martínez, José Alberto Jaén:
Didactic Networks and Exemplification. 241-252 - Ivo Hristov:
An Architecture of eLearning Enterprise Authoring Studio . 253-262 - Ya-Chun Shih, Mau-Tsuen Yang:
Linking Web 2.0 and 3D Virtual Reality for Language Learning: Design and Implementation. 263-267 - Hanna V. Shauchenka, Udo Bleimann, Matthias Knoll, Nathan L. Clarke:
Service Quality Assessment in Distance Learning. 269-277 - Ingo Stengel, Oliver Schneider, Udo Bleimann:
Exploration of Learner Preferences and their Impact Within a Media Module . 279-288
Applications and Impacts
- Vilho Räisänen:
Semantic Integration in Telecommunications. 291-300 - Muhammad Shoaib Iqbal Ansari, Thomas Schumann:
Case Study on DiaHDL: A Web-based Electronic Design Automation Tool for Education Purpose. 301-305 - Ruslan Vladimirovich Sharapov, Ekaterina Viktorovna Sharapova:
One Way to Detecting of Link Spam . 307-314 - Tomasz Müldner, Christopher Fry, Jan Krzysztof Miziolek, Tyler Corbin:
Updates of Compressed Dynamic XML Documents. 315-324 - Normen Haas, Bernhard Humm, Ingo Stengel, Paul Walsh:
Commoditization as a Criterion for Semantic Service Provisioning. 325-334 - Benjamin Heckmann, Andrew D. Phippen:
Quantitative and Qualitative Description of the Consumer to Provider Relation in the Context of Utility Computing. 335-344 - Felix Rimbach, Udo Bleimann, Steven Furnell:
Psycho-Analytical Considerations in Internet Marketing - Focusing on Human Needs And Personal Trust. 345-354 - Karin Kronawitter, Christoph Wentzel, Maria Papadaki:
ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success. 355-359 - Roland Böving, Udo Bleimann, Christoph Wentzel, Paul Walsh:
High Level Semantic Networking - Using K-Infinity to Build a Multiontological Learning Enviroment. 361-370 - Ralf Friedrich, Udo Bleimann, Ingo Stengel, Paul Walsh:
Towards a New Role Model in Virtual Teams: the Effects of "Elective Leadership". 371-374
Software Development
- Marcus Zinn, Klaus Peter Fischer-Hellmann, Andrew D. Phippen, Alois Schütte:
Finding Reusable Units of Modelling - an Ontology Approach. 377-386 - Hüseyin Yüksel, Johannes Reichardt, Chris A. Johnson:
Towards a Complete and Minimal Basis for the Definition of Software Architecture Languages. 387-397 - Matthias Minich, Bettina Harriehausen-Mühlbauer, Christoph Wentzel:
An Organizational Approach for Industrialized Systems Integration. 399-407
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.