


default search action
ISCC 2009: Sousse, Tunisia
- Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia. IEEE Computer Society 2009, ISBN 978-1-4244-4672-8
ISCC 2009
- Thomas A. Babbitt, Christopher Morrell, Boleslaw K. Szymanski
:
Self-Selecting Reliable Path Routing in diverse Wireless Sensor Network environments. 1-7 - Alexandros Karagiannis, Stafanos Kokkorikos, Philip Constantinou:
Energy consumption analysis and optimization techniques for Wireless Sensor Networks. 8-14 - Bashir Yahya, Jalel Ben-Othman:
An adaptive mobility aware and energy efficient MAC protocol for wireless sensor networks. 15-21 - Michele Albano
, Stefano Chessa
:
Distributed Erasure Coding in Data Centric Storage for wireless sensor networks. 22-27 - Maurizio Paone, Luca Paladina, Marco Scarpa, Antonio Puliafito:
A multi-sink swarm-based routing protocol for Wireless Sensor Networks. 28-33 - Xu Xu, Yu Hen Hu, Jingping Bi, Wei Liu:
Adaptive nodes scheduling approach for clustered sensor networks. 34-39 - Rami Ellouze, Abdelhak Mourad Guéroui, Mohamed Adel Alimi
:
Optimising handover for real-time flows in Mobile wimax network. 40-45 - Tarek Bchini, Nabil Tabbane, Emmanuel Chaput, Sami Tabbane, André-Luc Beylot:
Interaction & handover between IEEE 802.16e and DVB-S/RCS using MSCTP protocol. 46-53 - Tarek Bchini, Nabil Tabbane, Emmanuel Chaput, Sami Tabbane, André-Luc Beylot:
Hard handover vs soft handover in a city. 54-60 - Kuei-Ping Shih, Sheng-Shih Wang, Chan-Ying Lien:
A high spectral efficiency and load-aware metric for path selection in IEEE 802.16j multi-hop relay networks. 61-66 - Amir Djouama, Marwen Abdennebi, Lynda Mokdad, Samir Tohmé:
Lifetime aware admission control for infrastructure-less wireless networks. 67-72 - Antonio Corradi
, Fulvio Di Marco, Stefano Monti, Samuele Pasini:
Facing crosscutting concerns in a middleware for pervasive Service composition. 73-79 - Niklas Blum, Sebastian Lampe, Thomas Magedanz:
Design of a message interworking function for converged IP messaging in Next Generation Networks. 80-85 - Manos Spanoudakis, Stathes Hadjiefthymiades
:
Adaptive partial CDN replication. 86-91 - Jalel Ben-Othman, Lynda Mokdad, Mohamed Ould Cheikh, Mbaye Sene:
Performance analysis of composite web services using Stochastic Automata Networks over IP network. 92-97 - Nabila Bousbia
, Amar Balla
, Issam Rebaï:
Measuring the learners' learning style based on tracks analysis in web based learning. 98-103 - Willian dos Santos Lima, Renata Spolon Lobato, Aleardo Manacero
, Roberta Spolon Ulson:
Towards a Java bytecodes compiler for Nios II soft-core processor. 104-109 - Salma Ktari, Artur Hecker
, Houda Labiod:
Exploiting routing unfairness in DHT overlays. 110-115 - Giuseppe Anastasi, Marco Conti
, Ilaria Giannetti, Andrea Passarella
:
Design and evaluation of a BitTorrent proxy for energy saving. 116-121 - Vasco N. G. J. Soares
, Farid Farahmand
, Joel J. P. C. Rodrigues:
A layered architecture for Vehicular Delay-Tolerant Networks. 122-127 - Hosein Shafiei
, Zahra Aghazadeh, Ahmad Khonsari
, Mohamed Ould-Khaoua:
PeerStar: An attractive alternative to existing peer-to-peer topologies. 128-134 - Wei Liang, Rong Wu, Jingping Bi, Zhenyu Li:
PPStream characterization: Measurement of P2P live streaming during Olympics. 135-140 - Husnain Mansoor Ali, Anthony Busson, Véronique Vèque:
Network layer link management using signal strength for ad-hoc networks. 141-146 - Karima Maâlaoui, Leïla Azouz Saïdane:
Priority based intra piconet scheduling scheme for QoS guaranties in Bluetooth networks. 147-152 - Tae-Hoon Kim, David Tipper
, Prashant Krishnamurthy:
Connectivity and critical point behavior in mobile ad hoc and sensor networks. 153-158 - Murad Khalid, Ravi Sankar
, In-ho Ra:
Towards a Cross Layer Framework for ad hoc wireless networks. 159-164 - Ibrahim Al-Kassem, Sanaa Sharafeddine
, Zaher Dawy:
BlueHRT: Hybrid Ring Tree Scatternet Formation in Bluetooth Networks. 165-169 - Andrea Giordanna Oliveira do Nascimento, Edjair de Souza Mota, Saulo Queiroz
, Leandro Galvão, Edson Nascimento Silva Jr.:
Towards an efficient header compression scheme to improve VoIP over wireless mesh networks. 170-175 - Yan Li, Sanjay Ranka
, Sartaj Sahni:
In-advance path reservation for file transfers In e-Science applications. 176-181 - Sofia A. Paredes, Gregor von Bochmann, Trevor J. Hall:
Deploying agile photonic networks over reconfigurable optical networks. 182-187 - Hichem Mrabet, Iyad Dayoub
, Rabah Attia, Nizar Al-Holou, Charles Tatkeu:
Impact of chromatic and modal dispersion on frequency response of optical multimode fibers. 188-194 - Wael Hosny Fouad Aly, Mohamed Faten Zhani
, Halima Elbiaze:
Adaptive Offset for OBS networks using Feedback Control Techniques. 195-199 - Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga:
A public key algorithm for optical communication based on lattice cryptography. 200-205 - Gábor Enyedi, Gábor Rétvári, András Császár:
On Finding maximally redundant trees in strictly linear time. 206-211 - Faïza Najjar, Hassenet Slimani:
Compact N-tree: an indexing structure for distance range queries. 212-217 - Shibdas Bandyopadhyay, Sartaj Sahni:
Sorting on a Cell Broadband Engine SPU. 218-223 - Tania Mishra, Sartaj Sahni:
PETCAM-A power Efficient TCAM for forwarding tables. 224-229 - Elhillali Kerkouche, Allaoua Chaoui
, Khaled Khalfaoui
:
Transforming UML models to colored petri nets models using graph grammars. 230-236 - Sungsoo Kim, YongHwan Kim, Kwangseon Ahn:
An Enhanced Slotted Binary Tree Algorithm with Intelligent Separation in RFID systems. 237-242 - Ayman Radwan
, Hossam S. Hassanein:
Analyzing the application of inter-cell relay in CDMA cellular networks. 243-248 - Anas F. Alrawi, Bayan S. Sharif
, Charalampos Tsimenidis, Konstantinos Ntagkounakis:
Influence of code orthogonality on downlink throughput comparison between MC-CDMA and OFDMA in multi-cellular environments. 249-254 - Rizwan Khan, Sonia Aïssa, Charles L. Despins:
Seamless vertical handoff algorithm for heterogeneous wireless networks-an advanced filtering approach. 255-260 - Abdelhalim Najjar
, Noureddine Hamdi, Ammar Bouallegue:
Efficient frequency reuse scheme for multi-cell OFDMA systems. 261-265 - Elias Yaacoub
, Hussein Al-Asadi, Zaher Dawy:
Low complexity scheduling algorithms for the LTE uplink. 266-270 - Tong Shu, Min Liu, Zhongcheng Li:
A performance evaluation model for RSS-based vertical handoff algorithms. 271-276 - Mohammad Hammoudeh
, Robert M. Newman, Christopher Dennett, Sarah Mount:
Inductive as a support of deductive data visualisation in Wireless Sensor Networks. 277-280 - Francesco Palmieri
, Ugo Fiore
, Sergio Ricciardi:
SimulNet: a wavelength-routed optical network simulation framework. 281-286 - Rangyu Deng, Weixia Xu, Qiang Dou, Hongwei Zhou, Zefu Dai, Haiyan Chen:
An efficient stream memory architecture for heterogeneous multicore processor. 287-290 - Fadila Aoussat, Mohamed Ahmed-Nacer:
Reusing heterogeneous software process models. 291-294 - César S. Aguiar, Daniel I. Cruz, Marcos Antonio Cavenaghi, Roberta Spolon Ulson, Renata Spolon Lobato:
A tool to simplify the management of homogeneous and heterogeneous grids. 295-298 - Merouane Bouzid, Mehdi Ould Hocine:
Quantization software: application of trellis coded scalar/vector quantization. 299-302 - Diogo R. Viegas, Mário Antônio Ribeiro Dantas
, Michael A. Bauer:
A case study of a multi-cluster utilizing enhanced transport protocols. 303-306 - Luigi Liquori
, Cédric Tedeschi, Francesco Bongiovanni:
Babelchord: a social tower of DHT-based overlay networks. 307-312 - Mohsen Toorani
, Abolfazl Falahati
:
A secure variant of the Hill Cipher. 313-316 - Mourad Moussa Jlassi, Ali Douik
, Hassani Messaoud:
Objects detection by expectation-maximisation algorithm application to football images. 317-320 - Sandra P. Tinta, Alexander E. Mohr, Jennifer L. Wong
:
Characterizing end-to-end packet reordering with UDP traffic. 321-324 - Gianluca Dini
, Isidoro S. La Porta:
Bloumail: an interactive tool for blocking spam at the originator. 325-328 - Leonardo Lemes Fagundes, Luciano Paschoal Gaspary:
Breaking the barriers between security mechanisms through the composition of Web Services: Towards a solution for the detection of multistage distributed attacks. 329-332 - Zonglin Li, Guangmin Hu, Xingmiao Yao:
Multi-dimensional traffic anomaly detection based on ICA. 333-336 - Ola Amayri, Nizar Bouguila:
Online spam filtering using support vector machines. 337-340 - Boutheina A. Fessi, Salah Benabdallah
, Mohamed Hamdi, Noureddine Boudriga:
A new genetic algorithm approach for intrusion response system in computer networks. 342-347 - Wael Adi, Noureddine Ouertani, Abdulrahman Hanoun, Bassel Soudan
:
Deploying FPGA self-configurable cell structure for micro crypto-functions. 348-354 - Khaled Hamouid, Kamel Adi:
Robust Key Management scheme for certification in mobile ad-hoc networks. 355-360 - Razvi Doomun, Thaier Hayajneh
, Prashant Krishnamurthy, David Tipper
:
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks. 361-367 - Issa Khalil
, Mohammad Hayajneh
, Mamoun A. Awad
:
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks. 368-373 - Filipe N. Ribeiro, Sérgio Donizetti Zorzo:
LPBS - Location Privacy Based System. 374-379 - Nicola Bicocchi
, Marco Mamei
, Franco Zambonelli
:
Handling dynamics in gossip-based aggregation schemes. 380-385 - Claudio Casetti, Carla-Fabiana Chiasserini
, Marco Fiore
, Chi-Anh La, Pietro Michiardi:
P2P cache-and-forward mechanisms for mobile ad hoc networks. 386-392 - Petros Nicopolitidis, Georgios I. Papadimitriou, Andreas S. Pomportsis:
On the performance of adaptive Wireless Push Systems in high bit rate environments. 393-398 - Tobias Renk, Friedrich K. Jondral:
Location-dependent performance of cooperative networks with power allocation. 399-403 - Marcos F. Caetano
, Jacir Luiz Bordim, Mário Antônio Ribeiro Dantas
:
A collaborative cache approach for mobile ad hoc networks. 404-410 - Thabo K. R. Nkwe, Mieso K. Denko:
Self-optimizing cooperative caching in autonomic Wireless Mesh Networks. 411-416 - Lukasz Czekierda, Tomasz Grobelny:
Framework for application-level adaptation of media streams transmitted using DCCP Protocol. 417-423 - Raymond Peterkin, Mohamed Abou-Gabal, Fadi El-Hassan
, Dan Ionescu:
Hardware implementation of session initiation protocol servers and clients. 424-430 - M. Maher Ben Ismail, Hichem Frigui:
Image annotation based on constrained clustering and semi-naive bayesian model. 431-436 - Christos Bouras, Apostolos Gkamas
, Georgios Kioumourtzis
:
Adaptive Smooth Simulcast Protocol for multimedia transmission. 437-442 - Attahiru Sule Alfa, Haitham Abu-Ghazaleh
:
Discrete-time analysis of packet data discarding in high speed multimedia networks. 443-448 - Ling Chen, Kai Zheng, Fang Liu, Zhenming Lei, Yangjie:
Fingerprints in the spectrum: Spectral analysis and detection of VoIP traffic. 449-454 - Jukka-Pekka Laulajainen, Matti Hirvonen:
Automatic QoS control in UPnP home networks. 455-460 - Mohamed Zied Ben Hamouda, Olivier Brun, Jean-Marie Garcia:
A Tabu Search heuristic for capacitated network design. 461-467 - Lynda Zitoune, Amel Hamdi, Véronique Vèque, Hugues Mounier:
Using trajectory tracking control for expressive-based SLA applications in internet computing. 468-473 - Ali El Kamel
, Habib Youssef:
An efficient hybrid recovery mechanism for MPLS-based networks. 474-480 - Fei Gaolei, Guangmin Hu, Qian Feng:
Time-varying network internal loss inference based on unicast end-to-end measurements. 481-486 - Habib M. Ammari, Sajal K. Das
:
Joint k-coverage, duty-cycling, and geographic forwarding in wireless sensor networks. 487-492 - Iuri Bueno Drumond de Andrade, Geraldo Robson Mateus, Fabíola Guerra Nakamura:
A GRASP heuristic to Density Control: Solving multi-period coverage and Routing Problems in Wireless Sensor Networks. 493-499 - Maurizio A. Bonuccelli, Francesca Lonetti, Francesca Martelli:
Exploiting signal strength detection and collision cancellation for tag identification in RFID systems. 500-506 - Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, David Llewellyn-Jones:
Monitoring connectivity in wireless sensor networks. 507-512 - Daniel L. Guidoni, Raquel A. F. Mini, Antonio Alfredo Ferreira Loureiro, Azzedine Boukerche:
An on-line model to design heterogeneous wireless sensor networks based on small world concepts. 513-519 - Maurizio Giacobbe
, Eugenio Guglielmino
, Antonio Puliafito:
A platform for integrated data processing from heterogeneous devices in naval field. 520-525 - Nihel Ben Youssef, Adel Bouhoula, Florent Jacquemard:
Automatic verification of conformance of firewall configurations to security policies. 526-531 - Gianluca Dini
, Angelica Lo Duca
:
On securing publish-subscribe systems with security groups. 532-537 - Amina Chaabane, Mohamed Jmaiel:
Security aware content-based publish/subscribe system. 538-543 - Francesco Tusa
, Massimo Villari
, Antonio Puliafito:
Design and implementation of a secure XML-based grid file storage system with reliability features. 544-549 - Yu Adachi, Yoshihiro Oyama:
Malware analysis system using process-level virtualization. 550-556 - Mansoor Alicherry, Angelos D. Keromytis:
DoubleCheck: Multi-path verification against man-in-the-middle attacks. 557-563 - Abduladhim Ashtaiwi
, Hossam S. Hassanein:
Enhancements to IEEE 802.11 DCF collision avoidance based on MIMO Adaptive Spatial Channels Sharing. 564-569 - Mohamed F. Ahmed, Reda A. Ammar, Sanguthevar Rajasekaran:
Novel micro-threading techniques on the Cell Broadband Engine. 570-575 - Imen Sfaihi, Noureddine Hamdi, Ammar Bouallegue:
Transmit Beamforming multi-user MISO systems based on switched sub-codebook. 576-580 - Daniel Benevides da Costa
, Sonia Aïssa:
On the statistics of dual-hop semi-blind relaying systems with partial relay selection. 581-586 - Mohammad Hayajneh
, Issa Khalil
, Mamoun A. Awad
:
Non-cooperative uplink power control game for CDMA wireless communications systems. 587-592 - Paulo Loureiro
, Edmundo Monteiro
:
Stability and performance analysis of the Open Box Transport Protocol. 593-599 - Shan Chen, Brahim Bensaou, Ka-Lok Hung:
Promoting self-imposed end-to-end congestion control via a Sword of Damocles approach. 600-605 - Bader Al-Manthari, Nidal Nasser, Najah A. Abu Ali
, Hossam S. Hassanein:
Congestion prevention in broadband wireless access systems: An economic approach. 606-611 - Haifa Touati, Ilhem Lengliz, Farouk Kamoun
:
Adapting TCP exponential backoff to multihop ad hoc networks. 612-617 - Árpád Huszák, Sándor Imre
:
TFRC and RTT thresholds interdependence in a selective retransmission scheme. 618-623 - Lei Ye, Zhijun Wang:
A QoS-aware congestion control mechanism for DCCP. 624-629 - Andrea Baldini, Lorenzo De Carli
, Fulvio Risso
:
Increasing performances of TCP data transfers through multiple parallel connections. 630-636 - Dominik Kaspar, Kristian Evensen, Audun Fosselie Hansen, Paal Engelstad, Pål Halvorsen, Carsten Griwodz:
An analysis of the heterogeneity and IP packet reordering over multiple wireless networks. 637-642 - Wafa Kammoun, Habib Youssef:
Improving end-to-end multicast rate control in wireless networks. 643-648 - Imed Romdhani, Ahmed Yassin Al-Dubai:
Integrated many-to-many multicast addressing and access control method. 649-654 - Mohamed Aymen Chalouf, Francine Krief:
Service level negotiation in ubiquitous environments. 655-660 - Qiuyan Xia, Jian Pu, Mounir Hamdi
, Khaled Ben Letaief:
Practical and efficient open-loop rate/link adaptation algorithm for high-speed IEEE 802.11n WLANs. 661-666 - Ka-Lok Hung, Brahim Bensaou:
Bandwidth allocation in IEEE 802.11 WLANs in presence of inter-BSSs hidden terminals. 667-672 - Adlen Ksentini:
Enhancing VoWLAN service through adaptive voice coder. 673-678 - Ahmed M. Mahboob, Manjunath M. Prabhu, Khaled A. Harfoush:
Access point-coordinated contention resolution for channel access in wireless LANs. 679-686 - Rizwan Khan, Sonia Aïssa, Charles L. Despins:
MAC layer handoff algorithm for IEEE 802.11 wireless networks. 687-692 - Jean Frédéric Myoupo
, Mohamed Naimi, Ousmane Thiare
:
A clustering Group Mutual Exclusion algorithm for mobile ad hoc networks. 693-696 - Hamida Seba, Fouad Tigrine, Hamamache Kheddouci:
A tree-based group key agreement scheme for secure multicast increasing efficiency of rekeying in leave operation. 697-700 - Houda Zeghilet, Nadjib Badache, Moufida Maimour
:
Energy efficient cluster-based routing in wireless sensor networks. 701-704 - Suliman Albasheir, Sofiène Tahar, Claude Gauthier, Jean Roussel Personna:
Radio Access Network traffic generation for Mobile Switching Center. 705-710 - Yen-Fu Chen, Chien-Ching Chiu, Chin-Han Lin:
An optimization of UWB antenna location. 711-712 - Mohsen Toorani
, Ali Asghar Beheshti Shirazi:
A directly public verifiable signcryption scheme based on elliptic curves. 713-716 - Bahia Zebbane, Manel Chenait, Nadjib Badache, Houda Zeghilet:
Topology control protocol for conserving energy in wireless sensor networks. 717-720 - Kais Loukil, Nader Ben Amor
, Mouna Ben Said, Mohamed Abid:
OS service update for an online adaptive embedded multimedia system. 721-725 - Orlando Silva Junior, André L. L. de Aquino, Raquel A. F. Mini, Carlos Maurício S. Figueiredo:
Multivariate reduction in wireless sensor networks. 726-729 - Emad Mahmoud Alsukhni, Hussein T. Mouftah:
Distributed Holding-Time-Aware shared-path-protection provisioning framework for optical networks. 730-735 - Selma Batti, Mourad Zghal, Noureddine Boudriga, Trevor Hall:
An all-optical synchronizer for switching node using single-sideband modulator and fiber Bragg gratings. 736-741 - Abdelhamid E. Eshoul, Hussein T. Mouftah, Nabil Naas:
Extended adaptive search for routing multi-granular path allocation in optical networks. 742-747 - Phuong Nga Tran, Ulrich Killat:
Distributed algorithm for dynamic logical topology reconfiguration in IP over WDM networks. 748-756 - Nabil Naas, Hussein T. Mouftah:
The significance of label conversion in GMPLS-based optical transport networks. 757-762 - Sadeq Ali Makram, Fahad Samad, Mesut Günes
:
Neighborhood Nodes Collaboration to support QoS routing in Wireless Mesh Networks. 763-769 - Alfonso Ariza-Quintana
, Alicia Triviño-Cabrera, Eduardo Casilari-Pérez
, Juan-Carlos Cano
, Carlos Miguel Tavares Calafate
, Pietro Manzoni
:
Assessing the impact of Link Layer Feedback mechanisms on MANET routing protocols. 770-775 - Lotfi Benmohamed, Robert Cole, Bharat T. Doshi:
Address-Identifier Mapping System for scalable routing. 776-781 - Abutaleb Abdelmohdi Turky, Andreas Mitschele-Thiel:
Use of load prediction mechanism for dynamic routing optimization. 782-786 - Khalid Almahorg, Otman Basir
:
Performance evaluation of MANETs virtual backbone formation algorithms. 787-792 - Jörg Schneider, Julius Gehr, Hans-Ulrich Heiss, Tiago Ferreto, César A. F. De Rose
, Rodrigo da Rosa Righi, Eduardo Rocha Rodrigues, Nicolas Maillard
, Philippe Olivier Alexandre Navaux:
Design of a Grid workflow for a climate application. 793-799 - Quan T. Nguyen, Saïd Bettayeb:
The upper bound and lower bound of the genus of pancake graphs. 800-804 - Luciano Paschoal Gaspary, Weverton Luis da Costa Cordeiro, Sidnei Roberto Selzler Franco, Marinho P. Barcellos, Gerson Geraldo Homrich Cavalheiro:
AGRADC: An architecture for autonomous deployment and configuration of grid computing applications. 805-810 - Eduardo Rocha Rodrigues, Felipe Lopes Madruga, Philippe Olivier Alexandre Navaux, Jairo Panetta
:
Multi-core aware process mapping and its impact on communication overhead of parallel applications. 811-817 - Rodrigo N. Calheiros
, Everton Alexandre, Andriele B. do Carmo, César A. F. De Rose
, Rajkumar Buyya:
Towards self-managed adaptive emulation of grid environments. 818-823 - Alejandra Rodríguez, Jesús Carretero
, Borja Bergua, Félix García Carballeira:
Resource selection for fast large-scale Virtual Appliances Propagation. 824-829 - Marc Barisch, Alfredo Matos:
Integrating user Identity Management systems with the Host Identity Protocol. 830-836 - Rui A. Costa, Susana Sargento
:
Mobility between infrastructure and Ad-Hoc environments: Experimental validation. 837-843 - GuoDong Kang, Tanguy Pérennou, Michel Diaz:
An opportunistic indoors positioning scheme based on estimated positions. 844-850 - Lifang Guo, Khaled Harfoush, Huimin Xu:
The impacts of network configuration and node mobility on path dynamics in mobile ad hoc networks. 851-856 - Azzedine Boukerche, Zhenxia Zhang, Samer Samarah:
A WiFi-based wireless mesh network with inter-domain mobility management. 857-862 - Chung-Ming Huang, Chao-Hsien Lee, Po-Han Tseng:
Multiple router management for SIP-based Network Mobility. 863-868 - Antonio Corradi
, Mario Fanelli, Luca Foschini
:
Implementing a scalable context-aware middleware. 868-874 - Gianpaolo Cugola, Alessandro Margara, Matteo Migliavacca:
Context-aware publish-subscribe: Model, implementation, and evaluation. 875-881 - Pravin Pawar, Hanga Boros, Fei Liu, Geert J. Heijenk
, Bert-Jan van Beijnum:
Bridging Context Management Systems in the ad hoc and mobile environments. 882-888 - Thais R. M. Braga Silva, Linnyer Beatrys Ruiz, Antonio Alfredo Ferreira Loureiro:
Solving collective conflicts in a disaster emergency attendance application. 889-894 - Hela Ltifi, Mounir Ben Ayed, Christophe Kolski
, Adel M. Alimi
:
HCI-enriched approach for DSS development: the UP/U approach. 895-900 - Takashi Oshiba
, Hideaki Nebayashi:
Device pairing based on adaptive channel fluctuation control for large-scale organizations. 901-906 - Stefano Savazzi
, Umberto Spagnolini:
Synchronous ultra-wide band wireless sensors networks for oil and gas exploration. 907-912 - Ángel Cuevas
, Manuel Urueña
, Annett Laube, Laurent Gomez:
LWESP: Light-Weight Exterior Sensornet Protocol. 913-919 - Abdelsalam Helal
, Andres Mendez-Vazquez, Shantonu Hossain:
Specification and synthesis of sensory datasets in pervasive spaces. 920-925 - Youssef Iraqi
, Nafaâ Jabeur
:
Service admission control in multi-service sensor networks. 926-931 - Saleh Ibrahim
, Reda A. Ammar, Jun-Hong Cui:
Geometry-assisted gateway deployment for underwater sensor networks. 932-937 - Samer Samarah, Alexander Shema Habyalimana, Azzedine Boukerche:
Target-based Association Rules for point-of-coverage wireless sensor networks. 938-943 - Lotfi Mhamdi
, Mounir Hamdi
:
Distributed parallel scheduling algorithms for high-speed virtual output queuing switches. 944-949 - Ashraf Ali Bourawy
, Najah A. Abu Ali
, Hossam S. Hassanein:
A Selectivity Function Scheduler for IEEE 802.11e. 950-955 - Malith Jayasinghe, Zahir Tari
, Panlop Zeephongsekul, James Broberg:
On the performance of multi-level time sharing policy under heavy-tailed workloads. 956-962 - Malika Bourenane, Abdelhamid Mellouk, Djilali Benhamamouch:
A coordination mechanism based on a combined technique applied to dynamic Packet scheduling in routers. 963-969 - Abdesslem Layeb
, Souham Meshoul
, Mohamed Batouche
:
A Hybrid method for effective multiple sequence alignment. 970-975 - Abdelhalim Driouech, Wessam Ajib, Elmahdi Driouch:
An efficient scheduling scheme for MIMO wireless mesh networks with fairness constraints. 976-981
IEEE Workshop on Performance evaluation of communications in distributed systems and Web based service architectures 2009
- Wassim Abbessi
, Hédi Nabli
:
Comparison of computation methods for the steady-state markov modulated fluid queues. 1-6 - Jean-Michel Fourneau, Lynda Mokdad, Nihal Pekergin:
Stochastic bounds for performance evaluation of web services. 7-12 - Tadeusz Czachórski
, Tomasz Nycz, Ferhan Pekergin:
Transcient states analysis - diffusion approximation as an alternative to Markov models, fluid-flow approximation and simulation. 13-18 - Marc Drewniok, Massimo Maresca, Sancho Rego, Jürgen Sienel, Michele Stecca:
Experiments and performance evaluation of Event Driven Mashups. 19-22 - Mohamed Escheikh, Kamel Barkaoui:
Opportunistic MAC layer design with Stochastic Petri Nets for multimedia Ad Hoc Networks. 23-29 - Rami Baroody, Nizar Al-Holou, Utayba Mohammad:
Scalability in a Dynamic Discovery Service-based Jini for the Next Generation vehicle network. 30-35 - Anthony Busson:
An overview of results on ad hoc network performances using spatial model. 36-40 - Nathalie Dessart, Hacène Fouchal
, Philippe Hunel, Harry Gros-Desormeaux, Nicolas Vidot:
Message optimisation in wireless sensors networks for distributed diagnosis. 42-47 - Aref Meddeb, Enis Elgueder, Issam Harrathi, Habib Youssef:
Benefits of a pure layer 2 security approach in Metro Ethernet. 48-49 - Dirceu Cavendish, Yuji Oie, Hiroshi Koide
, Mario Gerla:
A Mean Value Analysis approach to transaction performance evaluation on multi-server systems. 50-55 - Antonio J. Reinoso, Jesús M. González-Barahona
, Gregorio Robles
, Felipe Ortega
:
A quantitative approach to the use of the Wikipedia. 56-61 - Soraya Zertal, Claude Timsit, Majed Chatti:
Communication/synchronisation mechanism for multiprocessor on Chip architectures. 62-66 - Antoine Rollet, Sébastien Salva:
Testing robustness of communicating systems using ioco-based approach. 67-72 - Erica Sousa, Paulo Romero Martins Maciel, Carlos Araújo, Gabriel Alves, Fábio Chicout:
Performance modeling for evaluation and planning of Electronic Funds Transfer Systems. 73-76 - Bogdan Harjoc, Florian Schreiner, Dragos Vingarzan, Thomas Magedanz:
Automated fault localization based on unified Web service and NGN benchmarking. 77-82 - Riadh Ben Halima, Emna Fki, Khalil Drira, Mohamed Jmaiel:
Experiments results and large scale measurement data for web services performance assessment. 83-88 - Majed Alhaisoni, Antonio Liotta
, Mohammed Ghanbari
:
Performance analysis and evaluation of P2PTV streaming behavior. 89-94 - Youssou Kasse, Lynda Mokdad, Mbaye Sene:
Performance analysis of Web services architecture. 94-98 - Aref Meddeb, Abdelwahed Berguiga
, Habib Youssef:
Optimal VPN design: The ILEC/CLEC dilemma. 99-100
Fourth Workshop on MultiMedia Applications over Wireless Networks Media WiN 2009
- Rouzbeh Razavi, Martin Fleury, Mohammed Ghanbari
, Hanadi Sammak:
Allocation of IPTV streams over broadband wireless through fuzzy logic control. 1-6 - Lukasz Kondrad, Imed Bouazizi, Moncef Gabbouj
:
Media aware FEC for Ccalable Video Coding transmission. 7-12 - Eliseo Catalan, Jordi Casademont
, Xavier Sanchez-Loro, Josep Lluis Ferrer:
Rate adaptation in 3GPP video streaming using track switching over a multihop WLAN. 13-18 - Matteo Petracca
, Gustavo Litovsky, Alessandro Rinotti, Marco Tacca, Juan Carlos De Martin, Andrea Fumagalli:
Perceptual based voice multi-hop transmission over wireless sensor networks. 19-24 - Domenico Giustiniano
, Eduard Goma Llairo
, Julián David Morillo-Pozo, Alberto López Toledo, Pablo Rodriguez:
ClubADSL: When your neighbors are your friends. 25-29 - Daniele Munaretto
, Luca Scalia, Tushar Soni, Jörg Widmer
:
Reliable broadcast streaming over 802.11 WLANs with minimum channel usage. 30-35 - Andrea Detti
, Giuseppe Bianchi
, Claudio Pisa, Francesco Saverio Proto, Pierpaolo Loreti
, Wolfgang Kellerer, Srisakul Thakolsri, Jörg Widmer
:
SSVF: an open-source experimental evaluation framework for H.264 scalable video streaming. 36-41 - Vitor Bernardo
, Bruno Sousa
, Marília Curado
:
VoIP over WiMAX: Quality of experience evaluation. 42-47 - Paolo Bellavista
, Antonio Corradi
, Luca Foschini
:
Effective adaptation decisions based on context-aware proactive handoff for mobile multimedia continuity maintenance. 48-53

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.