


default search action
18th ICCCN 2009: San Francisco, California, USA
- Proceedings of the 18th International Conference on Computer Communications and Networks, IEEE ICCCN 2009, San Francisco, California, USA, August 3-6, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-4581-3

MQoS: Track on multimedia and QoS
- Gennaro Boggia, Pietro Camarda, Rossella Fortuna, Luigi Alfredo Grieco:

A Scheduling Strategy to Avoid Playout Interruptions in Video Streaming Systems. 1-6 - Camille Mazataud, Benny Bing:

A New Lossless FMO Removal Scheme for H.264 Videos. 1-6 - Tareq Hossain, Yi Cui, Yuan Xue:

On the Optimality of Layered Video Streaming Rate in a P2P Mesh Network. 1-6 - Myounghwan Lee, John A. Copeland:

An Adaptive End-to-End Delay Assurance Algorithm with DiffServ Architecture in IEEE 802.11e/IEEE 802.16 Hybrid Mesh/Relay Networks. 1-6
ISSA 1: Track on Internet services, systems and applications
- Scott Jordan:

Some Traffic Management Practices Are Unreasonable. 1-6 - Arijit Ghosh, Tony Givargis:

Source Routing Made Practical in Embedded Networks. 1-6 - Yan Li, Mohamed G. Gouda:

Balanced Peer Lists: Towards a Collusion-Resistant BGP. 1-6 - Hyunwoo Kang, Dongkyun Kim:

HVR: History-Based Vector Routing for Delay Tolerant Networks. 1-6
EWTP: Track on emerging wireless technologies and platforms
- Zainab R. Zaidi, Tien Y. Tan, Yunlei Cheng:

ETX Could Result in Lower Throughput. 1-6 - Harkirat Singh, Su Khiong Yong, Jisung Oh, Chiu Ngo:

Principles of IEEE 802.15.3c: Multi-Gigabit Millimeter-Wave Wireless PAN. 1-6 - Baber Aslam, Ping Wang, Cliff Changchun Zou:

Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals. 1-6 - Tuan Tran, Thinh P. Nguyen, Raviv Raich:

On Achievable Throughput Region of Prioritized Transmissions Via Network Coding. 1-6
ON 1: Track on optical networking
- Yang Wang, Xiaojun Cao

:
A New Hierarchical Waveband Assignment Algorithm for Multi-Granular Optical Networks. 1-6 - Rong He, Kee Chaing Chua, Gurusamy Mohan

:
Connectivity Aware Protected Working Lightpath Envelope. 1-6 - Keen-Mun Yong, Tee-Hiang Cheng, Gee-Swee Poo:

Dynamic Multicast Routing and Wavelength Assignment with Minimal Conversions in Delay-Constrained WDM Networks. 1-6 - Spiridon F. Beldianu, Roberto Rojas-Cessa, Eiji Oki, Sotirios G. Ziavras

:
Re-Configurable Parallel Match Evaluators Applied to Scheduling Schemes for Input-Queued Packet Switches. 1-6
ISSA 2: Track on Internet services, systems and applications
- Jack Brassil, Rick McGeer, Puneet Sharma, Praveen Yalagandula, Brian L. Mark

, S. Zhang, Stephen Schwab:
The Case for Service Overlays. 1-6 - Sireesha Muppala, Xiaobo Zhou:

CoSAC: Coordinated Session-Based Admission Control for Multi-Tier Internet Applications. 1-6 - Kai Wang, Chuang Lin:

Insight into the P2P-VoD System: Performance Modeling and Analysis. 1-6 - Ram Keralapura, Antonio Nucci, Chen-Nee Chuah

:
Self-Learning Peer-to-Peer Traffic Classifier. 1-8
WCSP 1: Track on wireless communication and signal processing
- Jun-Bae Seo, Victor C. M. Leung

:
Design and Analysis of Cross-Layer Contention Resolution Algorithms for Multi-Packet Reception Slotted ALOHA Systems. 1-6 - Hui Zhou, Pingyi Fan

, Hong-Chuan Yang:
Cross-Layer Scheduling for Multiuser Downlink Transmissions with Opportunistic Relaying. 1-6 - Narayanan Krishnan, Balasubramaniam Natarajan

:
Energy Efficiency of Cooperative SIMO Schemes -Amplify Forward and Decode Forward. 1-5
PCGN: Track on pervasive computing and grid networking
- Mais Nijim, Adam Manzanares, Xiaojun Ruan, Xiao Qin

:
HYBUD: An Energy-Efficient Architecture for Hybrid Parallel Disk Systems. 1-6 - Andrei Agapi, Sebastien Soudan, Marcelo Pasin

, Pascale Vicat-Blanc Primet, Thilo Kielmann:
Optimizing Deadline-Driven Bulk Data Transfers in Overlay Networks. 1-8 - Karthik Kumar, Yamini Nimmagadda, Yung-Hsiang Lu:

Establishing Trust for Computation Offloading. 1-6
ON 2: Track on optical networking
- Nattapong Kitsuwan

, Eiji Oki, Naoto Kishi, Tetsuya Miki:
Real-Time Data Allocation Scheme Based on Dynamic Replacement in Burst Photonic Networks. 1-6 - Felix Espina, Mikel Izal

, Daniel Morató
, Eduardo Magaña
:
Performance Analysis of OBS Edge Nodes for Video Streaming. 1-6 - Ankitkumar N. Patel, Yi Zhu, Qingya She, Jason P. Jue:

Routing and Scheduling for Time-Shift Advance Reservation. 1-6 - Fen Zhou, Miklós Molnár

, Bernard Cousin
:
Is Light-Tree Structure Optimal for Multicast Routing in Sparse Light Splitting WDM Networks? 1-7
ISSA 3: Track on Internet services, systems and applications
- Alan Ritacco, Craig E. Wills, Mark Claypool:

How's My Network? A Java Approach to Home Network Measurement. 1-7 - Moo-Yeol Lee, Hyun-Wook Jin, Ikhwan Kim, Taehyoun Kim

:
Improving TCP Goodput over Wireless Networks Using Kernel-Level Data Compression. 1-6 - Maxim Martynov:

Challenges for High-Speed Protocol-Independent Redundancy Eliminating Systems. 1-6 - Yiping Chen, Jimmy Leblet, Gwendal Simon

:
On Reducing the Inter-AS Traffic of Box-Powered CDN. 1-6
WCSP 2: Track on wireless communication and signal processing
- Hyeonmok Ko, Ki-seok Lee, Seoungyoul Oh, Cheeha Kim:

Fast Optimal Discrete Bit-Loading Algorithms for OFDM-Based Systems. 1-6 - Dalin Zhu, Balasubramaniam Natarajan

, Justin S. Dyer:
Peak-to-Average Power Ratio Reduction in MIMO-OFDM with Trellis Exploration Algorithm. 1-6 - Hai Hung Hoang, Bing W. Kwan:

Estimation of MIMO Channel Using Suboptimal Particle Filtering. 1-5
NAP 1: Track on network architecture and protocols
- Alan Kennedy, Zhen Liu, Xiaojun Wang

, Bin Liu:
Multi-Engine Packet Classification Hardware Accelerator. 1-6 - Weirong Jiang

, Viktor K. Prasanna:
Scalable Packet Classification: Cutting or Merging? 1-6 - Eiji Oki, Nattapong Kitsuwan

, Roberto Rojas-Cessa:
Analysis of Space-Space-Space Clos-Network Packet Switch. 1-6 - Youngmann Kim, Taehoon Kim, E. K. Park, Sungwoo Tak:

A Novel Hardware-Software Codesign of Network Protocol Stacks on a SoC Platform. 1-6
WASN 1: Track on wireless ad-hoc and sensor networks
- Fabrice Theoleyre

, Benoît Darties, Andrzej Duda
:
Assignment of Roles and Channels for a Multichannel MAC in Wireless Mesh Networks. 1-6 - Jamie Macbeth, Majid Sarrafzadeh:

Link Scheduling for Scalable Data Aggregation. 1-6 - Gang Zhou, Lei Lu, Sudha Krishnamurthy, Matthew Keally, Zhen Ren:

SAS: Self-Adaptive Spectrum Management for Wireless Sensor Networks. 1-6 - Lei Pan, Hongyi Wu:

PTS: A Probability-Based Tag Selection Algorithm for RFID Systems with Recurring Readings. 1-6
WCSP 3: Track on wireless communication and signal processing
- Hai Zhan, Jean-Yves Le Boudec, Jaouhar Ayadi, John R. Farserotu:

A Novel Bayesian Impulse Radio Ultra-WideBand Ranging Algorithm Based on Importance Sampling. 1-5 - Nuno Souto

, Rui Dinis
, João Carlos Silva
:
Performance Bound for Generalized M-QAM Constellations in Time-Discrete Multipath Rayleigh Fading Channels with Channel Estimation Errors. 1-6 - Rui Dinis

, Paulo Silva
:
Iterative Detection of Multicode DS-CDMA Signals with Strongly Nonlinear Transmitters. 1-6 - Rui Dinis

, Paulo Montezuma
, Tiago Marques:
SC-FDE with OQPSK-Type Schemes: An Efficient Transmission Technique for Broadband Wireless Systems. 1-6
NAP 2: Track on network architecture and protocols
- Kaigui Bian, Jung-Min Park:

A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANs. 1-6 - Lucian Suciu, Mounir Benzaid, Servane Bonjour, Pierrick Louin:

Assessing the Handover Approaches for Heterogeneous Wireless Networks. 1-6 - Ruzana Davoyan, Jörn Altmann

, Wolfgang Effelsberg:
Intercarrier Compensation in Unilateral and Bilateral Arrangements. 1-6 - Jagruti Sahoo, Eric Hsiao-Kuang Wu, Pratap Kumar Sahu, Mario Gerla:

BPAB: Binary Partition Assisted Emergency Broadcast Protocol For Vehicular Ad Hoc Networks. 1-6
WASN 2: Track on wireless ad-hoc and sensor networks
- Duc A. Tran

, Thinh P. Nguyen:
Hop-Count Based Techniques for Passive Target Localization in Sensor Networks. 1-8 - Bin Tang, Xianjin Zhu, Anand Prabhu Subramanian, Jie Gao:

DAL: A Distributed Localization in Sensor Networks Using Local Angle Measurement. 1-6 - Ramakant S. Komali, Allen B. MacKenzie

, Petri Mähönen:
On Selfishness, Local Information, and Network Optimality: A Topology Control Example. 1-7 - Shanshan Jiang, Yuan Xue:

Optimal Wireless Network Restoration under Jamming Attack. 1-6
P2PN 1: Track on peer-to-peer networking
- Rafit Izhak-Ratzin, Nikitas Liogkas, Rupak Majumdar:

Team Incentives in BitTorrent Systems. 1-8 - Anwar Al Hamra, Nikitas Liogkas, Arnaud Legout, Chadi Barakat

:
Swarming Overlay Construction Strategies. 1-6 - Brian Sanderson, Daniel Zappala:

Reducing Source Load in BitTorrent. 1-6 - Yacine Boufkhad, Fabien Mathieu

, Fabien de Montgolfier, Diego Perino, Laurent Viennot:
Fine Tuning of a Distributed VoD System. 1-7
NAPE 1: Track on network algorithms and performance evaluation
- Mario Cola, Giorgio De Lucia, Daria Mazza, Maurizio Patrignani, Massimo Rimondini

:
Covert Channel for One-Way Delay Measurements. 1-6 - Andreas Grau, Klaus Herrmann, Kurt Rothermel:

Efficient and Scalable Network Emulation Using Adaptive Virtual Time. 1-6 - Ravish Khosla, Sonia Fahmy

, Y. Charlie Hu:
On the Impact of Filters on Analyzing Prefix Reachability in the Internet. 1-8
WASN 3: Track on wireless ad-hoc and sensor networks
- Andong Zhan, Guihai Chen

, Wei Wang:
Utilizing Automatic Underwater Vehicles to Prolong the Lifetime of Underwater Sensor Networks. 1-6 - Stanley J. Barr, Benyuan Liu, Jie Wang:

Underwater Sensor Barriers with Auction Algorithms. 1-6 - Ahmad Ababnah, Balasubramaniam Natarajan

:
Sensor Deployment as an Optimal Control Problem. 1-5
NSP 1: Track on network security and privacy
- Yun Li, Jian Ren:

Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks. 1-6 - Andriy Panchenko, Benedikt Westermann, Lexi Pimenidis, Christer Andersson:

SHALON: Lightweight Anonymization Based on Open Standards. 1-7 - Emiliano De Cristofaro, Xuhua Ding

, Gene Tsudik:
Privacy-Preserving Querying in Sensor Networks. 1-6 - Dingbang Xu, Yu Wang, Xinghua Shi:

Enhanced Feature Selection and Generation for 802.11 User Identification. 1-6
P2PN 2: Track on peer-to-peer networking
- Richard Süselbeck, Gregor Schiele, Sebastian Seitz, Christian Becker

:
Adaptive Update Propagation for Low-Latency Massively Multi-User Virtual Environments. 1-6 - Roberto Roverso, Sameh El-Ansary, Seif Haridi:

NATCracker: NAT Combinations Matter. 1-7 - Mohamed Ali Kâafar

, Laurent Mathy, Chadi Barakat
, Kavé Salamatian
, Thierry Turletti, Walid Dabbous:
Certified Internet Coordinates. 1-8 - Amitava Biswas, Suneil Mohan, Rabi N. Mahapatra:

Search Co-Ordination by Semantic Routed Network. 1-7
NAPE 2: Track on network algorithms and performance evaluation
- Jia Zhou, Fengyuan Ren, Chuang Lin:

Modeling the Effects of Variable Bandwidth on TCP Throughput. 1-7 - Junpei Oshio, Shingo Ata, Ikuo Oka:

Identification of Different TCP Versions Based on Cluster Analysis. 1-6 - Yixin Wu, Suman Kumar, Seung-Jong Park

:
On Transport Protocol Performance Measurement over 10Gbps High Speed Optical Networks. 1-6
WASN 4: Track on wireless ad-hoc and sensor networks
- Ataul Bari, Ritu Chaturvedi, Arunita Jaekel, Subir Bandyopadhyay:

Energy Aware Distributed Clustering in Two-Tiered Sensor Networks. 1-8 - Sampath Priyankara, Kazuhiko Kinoshita

, Hideki Tode, Koso Murakami:
A Clustering Method for Wireless Sensor Networks with Heterogeneous Node Types. 1-6 - Hyun Jung Choe, Preetam Ghosh

, Kalyan Basu, Sajal K. Das
:
Class-Based Data Reporting Scheme in Heterogeneous Wireless Sensor Networks. 1-6 - J. J. Garcia-Luna-Aceves, Dhananjay Sampath:

Efficient Multicast Routing in MANETs Using Prefix Labels. 1-8
NSP 2: Track on network security and privacy
- Xiaodong Lin, Rongxing Lu, Xuemin Shen

:
Location-Release Signature for Vehicular Communications. 1-7 - Mooi Choo Chuah, Peng Yang:

Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme. 1-6 - Jie Tian, Guiling Wang

, Tan Yan, Wensheng Zhang:
A Power-Efficient Scheme for Securing Multicast in Hierarchical Sensor Networks. 1-6 - Rakesh Saini

, Bo Zhu, Amin Hammad:
Data Protection on RFID-Based Distributed Storage. 1-6
NAPE 3: Track on network algorithms and performance evaluation
- Eiji Oki, Ayako Iwaki:

Fine Two-Phase Routing with Traffic Matrix. 1-5 - Inja Youn, Brian L. Mark

, Dana Richards:
Statistical Geolocation of Internet Hosts. 1-6 - Girish B. C., Ramaswamy Govindarajan:

Reducing Buffer Requirements in Core Routers Using Dynamic Buffering. 1-6 - Mohammadreza Rahimi, Nima Sarshar:

On Maximizing IP Multicast Throughput in Multi-Source Applications. 1-8
WASN 5: Track on wireless ad-hoc and sensor networks
- Saehoon Kang, Chansu Yu, Chita R. Das, Guohong Cao:

Path-Centric On-Demand Rate Adaptation for Mobile Ad Hoc Networks. 1-6 - Yiwei Wu, Yingshu Li

:
Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks. 1-6 - Sunho Lim, Chansu Yu, Chita R. Das:

Cooperative Cache Invalidation Strategies for Internet-Based Vehicular Ad Hoc Networks. 1-6 - Haiying Shen, Ting Li, Lianyu Zhao, Ze Li:

SDS: Distributed Spatial-Temporal Similarity Data Storage in Wireless Sensor Networks. 1-6
NSP 3: Track on network security and privacy
- Wei Yan, Nirwan Ansari

:
Why Anti-Virus Products Slow Down Your Machine? 1-6 - Prasanth Kalakota, Chin-Tser Huang:

On the Benefits of Early Filtering of Botnet Unwanted Traffic. 1-6 - Ping Wang, Lei Wu, Baber Aslam, Cliff Changchun Zou:

A Systematic Study on Peer-to-Peer Botnets. 1-8 - Changhua Sun, Chengchen Hu, Yi Tang, Bin Liu:

More Accurate and Fast SYN Flood Detection. 1-6
NAPE 4: Track on network algorithms and performance evaluation
- Yilin Song, Min Liu, Zhongcheng Li, Qi Li:

Handover Latency of Predictive FMIPv6 in IEEE 802.11 WLANs: A Cross Layer Perspective. 1-6 - Xiao Chen, Jian Shen, Taylor L. Groves, Jie Wu:

Probability Delegation Forwarding in Delay Tolerant Networks. 1-6
WASN 6: Track on wireless ad-hoc and sensor networks
- Md. Zakirul Alam Bhuiyan

, Guojun Wang, Jie Wu:
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks. 1-6 - Fernando J. Cintron, Kanthakumar Pongaliur, Matt W. Mutka

, Li Xiao:
Energy Balancing Hopping Sensor Network Model to Maximize Coverage. 1-6 - Abhishek Sharma, Kevin Yoon, David Vanhorn, Matheiu Dube, Volus McKenna, Michael S. Bauer:

ScoutNode: A Multimodal Sensor Node for Wide Area Sensor Networks. 1-6 - Mustafa Hammad

, Jonathan Cook:
Lightweight Deployable Software Monitoring for Sensor Networks. 1-6
NSP 4: Track on network security and privacy
- Ze Li, Haiying Shen:

Analysis of a Hybrid Reputation Management System for Mobile Ad hoc Networks. 1-6 - Huanyu Zhao, Xiaolin Li:

VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks. 1-6 - Geethapriya Thamilarasu, Ramalingam Sridhar:

Game Theoretic Modeling of Jamming Attacks in Ad hoc Networks. 1-6 - Ashish Tapdiya, Errin W. Fulp:

Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs. 1-6
International Workshop on Performance Modeling and Evaluation in Computer and Telecommunication Networks (PMECT)
Session I: Large-scale Networks
- Sureshkumar V. Subramanian, Rudra Dutta:

Measurements and Analysis of M/M/1 and M/M/c Queuing Models of the SIP Proxy Server. 1-7 - Lee Booi Lim, Lin Guan

, Alan Grigg, Iain W. Phillips
, Xin Gang Wang
, Irfan-Ullah Awan:
Bounding Queuing Delay in a Router Based on Superposition of N MMBP Arrival Process. 1-6 - Ivan Gudymenko, Waltenegus Dargie

, Alexander Schill:
Evaluation of the Performance of Spontaneously Deployed, Independent Networks. 1-6 - Natalia Vassileva, Francisco Barceló-Arroyo:

Validation of a Traffic-Based CAC Method under General Channel Holding Time. 1-7 - Chongyang Xie, Nasir Ghani:

Admission Control in Networks with Prioritized Advance Reservation. 1-6
Session II: Signaling and storage
- Richard G. Clegg

, Raul Landa, Miguel Rio:
Criticisms of Modelling Packet Traffic Using Long-Range Dependence. 1-5 - Glenford E. Mapp, Dhawal N. Thakker, Orhan Gemikonakli

:
Exploring Gate-Limited Analytical Models for High Performance Network Storage Servers. 1-5 - Kyungtae Kang, Dong Kun Noh

:
Stochastic Timing Analysis of the AES Cipher Algorithm over a Correlated Fading Channel. 1-6
Session III: Wireless sensor networks
- Waltenegus Dargie

:
Analysis of Time and Frequency Domain Features of Accelerometer Measurements. 1-6 - Noriaki Kitakoga, Tomoaki Ohtsuki

:
A Localization Algorithm for Nonuniform Propagation Environments in Sensor Networks. 1-5 - Xin Guan, Lin Guan

, Xin Gang Wang
, Tomoaki Ohtsuki
:
A Novel Routing Algorithm Based on Ant Colony System for Wireless Sensor Networks. 1-5 - Dong Kun Noh

, Kyungtae Kang:
A Practical Flow Control Scheme Considering Optimal Energy Allocation in Solar-Powered WSNs. 1-6 - Jinpyo Hong, Hwangnam Kim:

Refining Elusive User Registration Patterns for Empirical Mobility Models. 1-6
International Workshop on Sensor Networks (SN'2009)
Session-I: Security and Applications
- Piotr Szczechowiak

, Martin Collier
:
Practical Identity-Based Key Agreement For Secure Communication in Sensor Networks. 1-6 - Brian Quanz

, Hongliang Fei, Jun Huan, Joseph B. Evans, Victor Frost, Gary J. Minden, Daniel D. Deavours, Leon S. Searl, Daniel DePardo, Martin Kuehnhausen, Daniel Fokum
, Matt Zeets, Angela Oguna:
Anomaly Detection with Sensor Data for Distributed Security. 1-6 - H. T. Kung, Dario Vlah:

A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks. 1-7 - Yang Xiao

, Yanping Zhang:
Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags. 1-6 - Pedro Melo, Luís D. Pedrosa

, Rui Manuel Rocha
:
Interconnecting WSNs with Fast Moving Nodes: Experiments in Real-World Scenarios. 1-6 - Wang-Cheol Song, Sung-Su Kim, Seung-Joon Seok, Deokjai Choi:

Pastry Based Sensor Data Sharing. 1-6
Session-II: Topology, Routing, and Energy Efficiency
- Ataul Bari, Da Teng, Arunita Jaekel:

Optimal Relay Node Placement in Hierarchical Sensor Networks with Mobile Data Collector. 1-6 - Manki Min, Austin F. O'Brien, Sung Y. Shin:

Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc Networks. 1-6 - Andrew Alunyu Egwar

, Idris A. Rai:
Power Aware Differentiated Routing (PADR) in Wireless Sensor Networks. 1-6 - Mohammad Al-Otaibi, Hamdy S. Soliman:

Efficient Controlled Routeless Routing Protocol With Fixed Channel's Width for Mobile Ad Hoc Sensor Networks. 1-7 - Geng Yang, Jin-Song Xu, Shengshou Chen, Yingzhou Zhang:

GICR: Global Information Based Clustering Routing Mechanism for Wireless Sensor Network. 1-6 - Jorge M. Soares

, Bruno J. Gonçalves
, Rui Manuel Rocha
:
Power Management Extensions for Tagus-SensorNet. 1-6
Session-III: Architecture, Simulations, Testbed, and Various Good Things
- Yanping Zhang, Yang Xiao

:
Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID Tags. 1-5 - Marco Zennaro

, Antoine B. Bagula
:
Design of a Flexible and Reliable Gateway to Collect Sensor Data in Intermittent Power Environments. 1-6 - George F. Zaki, Hany M. Elsayed, Hassanein H. Amer, Magdy S. El-Soudani:

Energy Balanced Model for Data Gathering in Wireless Sensor Networks with Fixed and Mobile Sinks. 1-6 - Adrian F. Kacso, Roland Wismüller:

A Simulation Framework for Energy-Aware Wireless Sensor Network Protocols. 1-7
International Workshop on Cognitive Networks and Communications (CogCom)
Session-I: Spectrum management
- Ayoub Alsarhan, Anjali Agarwal:

Cluster-Based Spectrum Management Using Cognitive Radios in Wireless Mesh Network. 1-6 - Mengfei Yang, David Grace:

Cognitive Radio with Reinforcement Learning Applied to Multicast Downlink Transmission and Distributed Occupancy Detection. 1-6 - Bo Han, David Grace:

Using Cognitive Interference Routing to Avoid Congested Areas in Wireless Ad Hoc Networks. 1-6 - Stephen J. Shellhammer:

A Comparison of Geo-Location and Spectrum Sensing in Cognitive Radio. 1-6
Session-II: Cognitive networking and cognition techniques
- S. Amaar Ahmad, Juan D. Deaton, Umesh Shukla, Ryan E. Irwin, Luiz A. DaSilva, Allen B. MacKenzie

:
A Comparison of Channel Assignment Techniques with Power Control in Ad Hoc Networks. 1-6 - Kareem E. Baddour, Oktay Ureten, Tricia J. Willink:

Efficient Clustering of Cognitive Radio Networks Using Affinity Propagation. 1-6 - Yohannes D. Alemseged, Ha Nguyen Tran, Chen Sun, Hiroshi Harada

:
Dual-Purpose Spectrum Sensor Using IEEE802.15.4a UWB PHY and Energy Detection. 1-5 - Ashwini Kumar, Kang G. Shin, Jianfeng Wang, Kiran S. Challapali:

A Case Study of QoS Provisioning in TV-Band Cognitive Radio Networks. 1-6 - Richard O. Afolabi, Kiseon Kim, Aftab Ahmad:

On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic Signature. 1-5
Session-III: Industry Topics and Applications
- Kuo-Chun Huang, Xiangpeng Jing, Dipankar Raychaudhuri:

MAC Protocol Adaptation in Cognitive Radio Networks: An Experimental Study. 1-6 - Selçuk Tascioglu

, Oktay Ureten:
Bayesian Wideband Spectrum Segmentation for Cognitive Radios. 1-6 - Sunmin Lim, Hoiyoon Jung, Myung Sun Song:

Cooperative Spectrum Sensing for IEEE 802.22 WRAN System. 1-5 - Michael A. Forman, Derek Young:

A Generalized Scheme for the Creation of Shared Secret Keys through Uncorrelated Reciprocal Channels in Multiple Domains. 1-8 - Birsen Sirkeci-Mergen, Vishal Sawant, Robert Morelos-Zaragoza

:
A Trade-Off Analysis of Energy Detectors and Partitioned Search for Primary Detection. 1-4
International Workshop on Multimedia Computing and Communications (MCC)
- Yih Han Tan, Wei Siong Lee, Jo Yew Tham, Susanto Rahardja

:
Complexity-Rate-Distortion Optimization for Real-Time H.264/AVC Encoding. 1-6 - Saeed Nari, Hamid R. Rabiee

, Ali Abedi, Mohammed Ghanbari
:
An Efficient Algorithm for Overlay Multicast Routing in Videoconferencing Applications. 1-6 - Ramdas Satyan, Sunday Nyamweno, Fabrice Labeau

:
Error Resilience Using Leaky Source Channel Prediction Scheme. 1-5 - Masahiko Kitamura, Takahiro Murooka, Mitsuhiro Teshima, Hisaya Hadama, Atsushi Takahara, Tetsuro Fujii:

A Study on the Correlation between QoE of 4K Super High Definition Video Streamings and QoS of Network. 1-6 - Mohsen Akbari

, Fabrice Labeau
:
Adaptive Downsampling in Oversampled Filter Banks in the Presence of Quantization Noise. 1-6 - Susan Elias, Lisa Mathew

, K. S. Easwarakumar
, Richard Chbeir
:
Automatic Temporal Formatting of Multimedia Presentations Using Dynamic Petri Nets. 1-6 - Andrew Blaich, Aaron Striegel

:
Is High Definition a natural DRM? 1-4
International Workshop on Privacy and Trust of Computer and Cyber-Physical Networks (SecureCPN)
Session-I: Network Security Protocols
- Stephen Dabideen, Bradley R. Smith, J. J. Garcia-Luna-Aceves:

The Case for End-to-End Solutions to Secure Routing in MANETs. 1-6 - Athichart Tangpong, George Kesidis, Hung-Yuan Hsu, Ali R. Hurson

:
Robust Sybil Detection for MANETs. 1-6 - Lianyu Zhao, Haiying Shen:

A Low-Cost Anonymous Routing Protocol in MANETs. 1-6 - Gunwoo Nam, Pushkar Patankar, George Kesidis, Chita R. Das, Cetin Seren:

Mass Purging of Stale TCP Flows in Per-Flow Monitoring Systems. 1-6 - Zesheng Chen, Chao Chen, Qian Wang:

Delay-Tolerant Botnets. 1-6
Session-II: System and Theoretical Aspects of Network Security
- Antonio Izquierdo, Nada Golmie, Richard Rouil

:
Optimizing Authentication in Media Independent Handovers Using IEEE 802.21. 1-6 - Thomas E. Carroll

, Daniel Grosu
:
A Game Theoretic Investigation of Deception in Network Security. 1-6 - Turgay Korkmaz:

Analyzing Response Time of Batch Signing. 1-6 - Shi-hai Huang, Chuang Lin, An'an Luo, Zhen Chen, Xin Jiang, Kai Wang, Hui Zhang, Xuehai Peng:

Proxy-Based Security Audit System for Remote Desktop Access. 1-5 - Tingting Mao, John R. Williams, Abel Sanchez:

An Interoperable Internet Scale Solution for RFID Network Security. 1-6
International Workshop on Grid and P2P Systems and Applications (GridPeer)
Session-I: Streaming, Search, and Sharing
- Sachin Agarwal:

Smart Peer-to-Peer Video Streaming: Comparing Adaptation Under Heterogeneous Conditions. 1-6 - Kien Nguyen, Thinh P. Nguyen, Yevgeniy Kovchegov

:
A P2P Video Delivery Network (P2P-VDN). 1-7 - Haibo Zhang, Haiying Shen:

A Social Network Based File Sharing System in Mobile Peer-to-Peer Networks. 1-6 - Cuihua Zuo, Ruixuan Li, Haiying Shen, Zhengding Lu:

High Coverage Search in Multi-Tree Based P2P Overlay Network. 1-6
Session-II: Modeling, Measurement, QoS and Security
- Shilpa Ghadge, Timothy Killingback, Bala Sundaram, Duc A. Tran

:
A Parsimonious Statistical Protocol for Generating Power-Law Networks. 1-6 - Yehia El-khatib

, Christopher Edwards, Michael Mackay, Gareth Tyson:
Providing Grid Schedulers with Passive Network Measurements. 1-6 - Jinu Kurian, Ajay Kulkarni, Hai Trong Vu, Kamil Saraç:

ODON: An On-Demand Security Overlay for Mission-Critical Applications. 1-6 - Patrick McClory, Ezra Kissel, D. Martin Swany

, Michela Taufer
:
MNEMONIC: A Network Environment for Automatic Optimization and Tuning of Data Movement over Advanced Networks. 1-7 - Amos Brocco, Béat Hirsbrunner:

Service Provisioning Framework for a Self-Organized Grid. 1-6 - Jihoon Kim, Younghan Kim:

A Design of Generalized Peer-to-Peer Based IPTV System Using Multiple Chain Architecture. 1-5
International Workshop on Nano, Molecular, and Quantum Communications (NanoCom)
- Bao Liu:

Defect Mapping and Adaptive Configuration of Nanoelectronic Circuits Based on a CNT Crossbar Nano-Architecture. 1-6 - Tien-Sheng Lin, I-Ming Tsai, Sy-Yen Kuo

:
Quantum Transmission Integrity Mechanism for Indirect Communication. 1-6 - Sachin Kadloor, Raviraj Adve:

A Framework to Study the Molecular Communication System. 1-6 - Yang Liu, Alvin R. Lebeck:

Nano-Scale On-Chip Irregular Network Analysis. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














