IGMPx: Port Based Service Access Control for IP Multicast (Englisch)
- Neue Suche nach: Pillai, Prashant
- Neue Suche nach: Hu, Yim-Fun
- Neue Suche nach: Pillai, Prashant
- Neue Suche nach: Hu, Yim-Fun
In:
2009 International Conference on Advanced Information Networking and Applications
;
683-690
;
2009
-
ISSN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:IGMPx: Port Based Service Access Control for IP Multicast
-
Beteiligte:Pillai, Prashant ( Autor:in ) / Hu, Yim-Fun ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.05.2009
-
Format / Umfang:547478 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Improving QoS through Network Real-Time Measurement and Self-AdaptionGelenbe, Erol et al. | 2009
- 2
-
Wormholes of Communication: Interfacing Virtual Worlds and the Real WorldCampi, Alessandro / Gottlob, Georg / Hoye, Ben et al. | 2009
- 10
-
Location-Aware Authentication and Access Control Concepts and IssuesBertino, Elisa / Kirkpatrick, Michael et al. | 2009
- 16
-
Evaluating the Performance of Network Protocol Processing on Multi-core SystemsFaulkner, Matthew / Brampton, Andrew / Pink, Stephen et al. | 2009
- 24
-
Modeling Web Request and Session Level ArrivalsWang, Xuan / Goseva-Popstojanova, Katerina et al. | 2009
- 33
-
Predictive Simulation of HPC ApplicationsHammond, S.D. / Smith, J.A. / Mudalige, G.R. / Jarvis, S.A. et al. | 2009
- 41
-
Modelling Network Performance with a Spatial Stochastic Process AlgebraGalpin, Vashti et al. | 2009
- 50
-
An Evaluation of Routing Reliability in Non-collaborative Opportunistic NetworksChen, Ling-Jyh / Chiou, Che-Liang / Chen, Yi-Chao et al. | 2009
- 58
-
Parameterised Gradient Based Routing (PGBR) for Future InternetBalasubramaniam, Sasitharan / Botvich, Dmitri / Mineraud, Julien / Donnelly, William et al. | 2009
- 66
-
A New Counting Scheme for Multicast Broadcast Service with WiBroSung, Nak Beom / Kim, Kyung Tae / Park, Sun Sik / Youn, Hee Yong et al. | 2009
- 67
-
An adaptation system for P2P multimedia applicationsMakhlouf, D. / Zine, N.G. / Roose, P. / Dalmau, M. et al. | 2009
- 74
-
Analyzing the Hold Time Schemes to Limit the Routing Table Calculations in OSPF ProtocolGoyal, M. / Soperi, M. / Hosseini, H. / Trivedi, K.S. / Shaikh, A. / Choudhury, G. et al. | 2009
- 82
-
Real-Time Task Assignment in Heterogeneous Distributed Systems with Rechargeable BatteriesLin, Jian / Cheng, Albert M.K. / Kumar, Rashmi et al. | 2009
- 90
-
Distributed Secure Virtual File System Using Hysteresis SignaturesTezuka, Shin / Tomori, Hiroko / Uda, Ryuya / Okada, Ken-ichi et al. | 2009
- 98
-
Quarc: A High-Efficiency Network on-Chip ArchitectureMoadeli, Mahmoud / Maji, Partha / Vanderbauwhede, Wim et al. | 2009
- 106
-
Fair Scheduling with Multiple Gateways in Wireless Mesh NetworksErnst, Jason B. / Denko, Mieso K. et al. | 2009
- 109
-
Privacy protection in passive network monitoring: an access control approachLioudakis, G.V. / Gogoulos, F. / Antonakopoulou, A. / Kaklamani, D.I. / Venieris, I.S. et al. | 2009
- 113
-
Business Compliance Governance in Service-Oriented ArchitecturesDaniel, Florian / Casati, Fabio / D'Andrea, Vincenzo / Mulo, Emmanuel / Zdun, Uwe / Dustdar, Schahram / Strauch, Steve / Schumm, David / Leymann, Frank / Sebahi, Samir et al. | 2009
- 117
-
Performance evaluation of secure call admission control for multiclass Internet servicesAl-Haj, A. / Mellor, J. / Awan, I. et al. | 2009
- 121
-
DAVO: A Domain-Adaptable, Visual BPEL4WS OrchestratorDörnemann, Tim / Mathes, Markus / Schwarzkopf, Roland / Juhnke, Ernst / Freisleben, Bernd et al. | 2009
- 129
-
A Generic Database Web Service for the Venice Service GridKoch, Michael / Hillenbrand, Markus / Müller, Paul et al. | 2009
- 137
-
Trust Requirements in Identity Federation TopologiesKylau, Uwe / Thomas, Ivonne / Menzel, Michael / Meinel, Christoph et al. | 2009
- 146
-
Combined On-line and Off-line Trust Mechanism for Agent ComputingKhosravifar, Babak / Bentahar, Jamal / Gomrokchi, Maziar / Thiran, Philippe et al. | 2009
- 154
-
A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection SystemsSainani, Varsha / Shyu, Mei-Ling et al. | 2009
- 162
-
An Ontology-Based Architecture for Federated Identity ManagementLayouni, Farah / Pollet, Yann et al. | 2009
- 167
-
Trust Management in Emergency NetworksDurresi, Arjan / Durresi, Mimoza / Paruchuri, Vamsi / Barolli, Leonard et al. | 2009
- 175
-
An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video TransmissionChang, Yoong Choon / Lee, Sze Wei / Komiya, Ryoichi et al. | 2009
- 182
-
Adaptive FEC Algorithm Based on Prediction of Video Quality and Bandwidth Utilization RatioFeng, Jiao / Xuefen, Chi / Li, Peng / Yining, Wang / Guan, Lin et al. | 2009
- 189
-
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e NetworksGallucci, Dario / Fiandrotti, Attilio / Masala, Enrico / Martin, Juan Carlos De et al. | 2009
- 197
-
Heterogeneous Error Protection of H.264/AVC Video Using Hierarchical 16-QAMAbdurrhman, Ahmed B. / Woodward, Michael E. et al. | 2009
- 201
-
Design of q-ary Irregular Repeat-Accumulate CodesLin, Wei / Bai, Baoming / Li, Ying / Ma, Xiao et al. | 2009
- 205
-
Network anomaly detection based on statistical approach and time series analysisHuang, Kai / Qi, Zhengwei / Liu, Bo et al. | 2009
- 207
-
Design of Quasi-Cyclic LDPC Codes Based on Euclidean GeometriesLiu, Yuan-Hua / Wang, Xin-Mei / Ma, Jian-Hua et al. | 2009
- 212
-
Multi-user MIMO Broadcast System Grouping Strategy Based on Particle Swarm OptimizationYong-qiang, Hei / LiXiao-hui, / YiKe-chu, / Wen-tao, Li et al. | 2009
- 217
-
ANFIS Based AQM Controller for Congestion ControlAlasem, Rafe / Hossain, Alamgir / Awan, Irfan / Mansour, Hussein et al. | 2009
- 225
-
Probabilistic Network Fault-Diagnosis Using Cross-Layer ObservationsNickelsen, Anders / Grønbæk, Jesper / Renier, Thibault / Schwefel, Hans-Peter et al. | 2009
- 233
-
An Overlay Application-Layer Multicast InfrastructureUchôa, Daniel C. / Kopp, Samuel / Pimentel, Hélcio M. / Matushima, Reinaldo / Silveira, Regina M. et al. | 2009
- 241
-
A Measurement Study on Peer Behaviors for a Pure P2P NetworkOhzahata, Satoshi / Kawashima, Konosuke et al. | 2009
- 249
-
N-nary RAID: 3-resilient RAID Based on an N-nary NumberMatsumoto, Katsuyoshi / Uehara, Minoru et al. | 2009
- 256
-
Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling SystemsZhou, Xing / Dreibholz, Thomas / Fa, Fu / Du, Wencai / Rathgeb, Erwin Paul et al. | 2009
- 263
-
A Pipelined IP Forwarding Engine with Fast UpdateChang, Yeim-Kuan / Liu, Yen-Cheng / Kuo, Fang-Chen et al. | 2009
- 270
-
DINCast: Optimizing Application-Level Shared-Tree MulticastGuo, Huaqun / Ngoh, Lek Heng / Wong, W.C. / Yang, Ping / Beevi, Nazreen et al. | 2009
- 278
-
A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-TreeChang, Yeim-Kuan / Lin, Yung-Chieh et al. | 2009
- 278
-
Trust-based cooperative action control in multi-agent systems for network managementTerauchi, A. / Akashi, O. et al. | 2009
- 285
-
Optimized Broadcast in a Geographical Area of Wireless Ad Hoc and Sensor NetworksAmadou, Ibrahim / Minet, Pascale et al. | 2009
- 292
-
Discovering grid resources and deploying grid services using peer-to-peer technologiesDornemann, K. / Freisleben, B. et al. | 2009
- 293
-
A Resource Discovery Scheme for Large Scale Ad Hoc Networks Using a Hypercube-Based BackboneDekar, Lyes / Kheddouci, Hamamache et al. | 2009
- 301
-
Energy Efficiency: Optimal Transmission Range with Topology Management in Rectangular Ad-hoc Wireless NetworksFeng, Wei / Alshaer, Hamada / Elmirghani, Jaafar M.H. et al. | 2009
- 307
-
Performance Analysis of OLSR and BATMAN Protocols Considering Link Quality ParameterBarolli, Leonard / Ikeda, Makoto / Marco, Giuseppe De / Durresi, Arjan / Xhafa, Fatos et al. | 2009
- 315
-
A Communication Model of Broadcast in Wormhole-Routed Networks on-ChipMoadeli, Mahmoud / Vanderbauwhede, Wim et al. | 2009
- 323
-
An Experimental Evaluation of Sender-Side TCP Enhancements for Wired-to-Wireless Paths: A Real-World Home WLAN Case StudyTaank, Ritesh / Peng, Xiaohong et al. | 2009
- 331
-
QoS Enhancements and Performance Analysis for Delay Sensitive ApplicationsWang, J. / Guan, L. / Wang, X.G. / Grigg, A. / Awan, I. / Phillips, I. / Chi, X. et al. | 2009
- 334
-
Performance evaluation of SSTP- a transport protocol for satellite channelsCanhoto, A.F. / Anzaloni, A. et al. | 2009
- 339
-
An Efficient Admission Control Methodology for Satisfying QoS Requirements in NGN NetworksGhazel, Cherif / Saïdane, Leila et al. | 2009
- 347
-
A Secure Revised Simplex Algorithm for Privacy-Preserving Linear ProgrammingVaidya, Jaideep et al. | 2009
- 355
-
Trustworthiness Assessment of Wireless Sensor Data for Business ApplicationsGomez, Laurent / Laube, Annett / Sorniotti, Alessandro et al. | 2009
- 363
-
Key Management in Web of Trust for Mobile Ad Hoc NetworksDahshan, Hisham / Irvine, James et al. | 2009
- 365
-
Identity-based cryptography for securing mobile phone callsSmith, M. / Schridde, C. / Agel, B. / Freisleben, B. et al. | 2009
- 371
-
Scalable energy-aware dynamic task allocationBokar, A. / Bozyigit, M. / Sener, C. et al. | 2009
- 371
-
Enabling Fast Bootstrap of Reputation in P2P Mobile NetworksCascella, Roberto G. et al. | 2009
- 379
-
A Survey and Analysis on Semantics in QoS for Web ServicesTran, Vuong Xuan / Tsuji, Hidekazu et al. | 2009
- 386
-
Exploiting Request Characteristics to Improve Performance of Web Services Based Business ApplicationsYizhu, Tong / Hao, Wang / Taoying, Liu et al. | 2009
- 394
-
Massively Scalable Web Service DiscoveryAnadiotis, George / Kotoulas, Spyros / Lausen, Holger / Siebes, Ronny et al. | 2009
- 403
-
Towards an Approach to Defining Capacity-Driven Web ServiceMaamar, Zakaria / Tata, Samir / Belaïd, Djamel / Boukadi, Khouloud et al. | 2009
- 411
-
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GAWang, Xiaofeng / Yeo, Chee Shin / Buyya, Rajkumar / Su, Jinshu et al. | 2009
- 419
-
A Highly Available Grid Metadata CatalogJensen, Henrik Thostrup / Kleist, Josva et al. | 2009
- 427
-
Transaction Management for Reliable Grid ApplicationsTang, Feilong / Guo, Minyi / Li, Minglu / Li, Li et al. | 2009
- 435
-
Brain Image Registration Analysis Workflow for fMRI Studies on Global GridsPandey, Suraj / Voorsluys, William / Rahman, Musta?zur / Buyya, Rajkumar / Dobson, James / Chiu, Kenneth et al. | 2009
- 443
-
Name Resolution Middleware Using Relative Positional Relationship to Support Wireless Visible Area CommunicationNoda, Atsushi / Kitasuka, Teruaki / Tagashira, Shigeaki / Nakanishi, Tsuneo / Fukuda, Akira et al. | 2009
- 451
-
Data Dissemination with Drop BoxesLok, Mun J. / Qazi, Bilal R. / Elmirghani, Jaafar M.H. et al. | 2009
- 456
-
A Proposal to Enhance and Control Continuous Communications in Proxy Mobile IPv6Kang, Joon-Suk / Ohmori, Motoyuki / Okamura, Koji et al. | 2009
- 463
-
Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless NetworksYilmaz, Okan / Chen, Ing-Ray et al. | 2009
- 471
-
JPEG Steganography: A Performance Evaluation of Quantization TablesAlmohammad, Adel / Ghinea, Gheorghita / Hierons, Robert M. et al. | 2009
- 476
-
Services to the field: an approach for resource constrained sensor/actor networksBuckl, C. / Sommer, S. / Scholz, A. / Knoll, A. / Kemper, A. / Heuer, J. / Schmitt, A. et al. | 2009
- 479
-
Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia ObjectsNemati, Alireza Goudarzi / Enokido, Tomoya / Takizawa, Makoto et al. | 2009
- 487
-
PHD A Generic and Flexible Architecture for IPTV in Authorized DomainsSimplício Jr., Marcos Antonio / Coroama, Vlad / Venturini, Yeda R. / Carvalho, Tereza / Naslund, Mats / Pourzandi, Makan et al. | 2009
- 495
-
The Efficiency Method of Sanitizable Signature Scheme for SMFMiyata, Hirokazu / Uda, Ryuya / Okada, Kenichi et al. | 2009
- 503
-
Situation-Aware Adaptive Recommendation to Assist Mobile Users in a Campus EnvironmentBouzeghoub, Amel / Do, Kien Ngoc / Wives, Leandro Krug et al. | 2009
- 506
-
Towards distributed composition of real-time service-based applicationsEstevez-Ayres, I. / Garcia-Valls, M. / Basanta-Val, P. et al. | 2009
- 510
-
Tracking Anonymous Sinks in Wireless Sensor NetworksShakshuki, Elhadi M. / Sheltami, Tarek R. / Kang, Nan / Xing, Xinyu et al. | 2009
- 517
-
Sensor Data Fusion Using DSm Theory for Activity Recognition under Uncertainty in Home-Based CareLee, Hyun / Choi, Jae Sung / Elmasri, Ramez et al. | 2009
- 525
-
A Distributed Dynamic Adaptation Model for Component-Based ApplicationsSegarra, M.T. / André, F. et al. | 2009
- 530
-
Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh NetworksGlass, Stephen Mark / Muthukkumarasamy, Vallipuram / Portmann, Marius et al. | 2009
- 539
-
Fuzzy ESVDF Approach for Intrusion Detection SystemsZaman, Safaa / Karray, Fakhri et al. | 2009
- 546
-
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone IntrusionZhao, Guoqing / Yang, Jianhua / Hura, Gurdeep S. / Ni, Long / Huang, Shou-Hsuan Stephen et al. | 2009
- 552
-
Masquerade Detection Using Command Prediction and Association Rules MiningWu, Han-Ching / Huang, Shou-Hsuan Stephen et al. | 2009
- 554
-
An experiment on tele-immersive communication with tiled displays wall over JGN2plus networkEbara, Y. / Shibata, Y. et al. | 2009
- 560
-
Route Construction Based on Measured Characteristics of Radio Propagation in Wireless Sensor NetworksNose, Yasuhiro / Kanzaki, Akimitsu / Hara, Takahiro / Nishio, Shojiro et al. | 2009
- 568
-
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford ProtocolBaharloo, Mohammad / Hajisheykhi, Reza / Arjomand, Mohammad / Jahangir, Amir Hossein et al. | 2009
- 572
-
Information Communication Mechanism for Loosely Coupled Mobile User Groups in Wireless Sensor FieldsPark, Soochang / Lee, Euisin / Yu, Fucai / Jin, Min-Sook / Kim, Sang-Ha et al. | 2009
- 576
-
A trial of a worker's motion trace system using terrestrial magnetism and acceleration sensorsSato, N. / Odashima, S. / Suzuki, J. / Ishikawa, T. / Murata, Y. et al. | 2009
- 580
-
Lessons Learned: Simulation Vs WSN DeploymentShakshuki, Elhadi M. / Malik, Haroon / Sheltami, Tarek R. et al. | 2009
- 588
-
Similarity Search over DNS Query Streams for Email Worm DetectionChatzis, Nikolaos / Brownlee, Nevil et al. | 2009
- 596
-
ReAlSec: A Relational Language for Advanced Security EngineeringHamdi, Mohamed / Essaddi, Nejla / Boudriga, Noureddine et al. | 2009
- 601
-
A comparison between the tunneling process and mapping schemes for IPv4/IPv6 transitionAl-Jaafreh, R. / Mellor, J. / Awan, I. et al. | 2009
- 602
-
A New Video Surveillance Video Tracking System Based on Omni-directional and Network Controlled CamerasSato, Yousuke / Hashimoto, Koji / Shibata, Yoshitaka et al. | 2009
- 607
-
Design of alarm management system in hybrid IP/optical networksLiu, Te-Lung / Tseng, Hui-Min / Chen, Hui-Min / Hu, Jen-Wei / Yang, Chu-Sing / Yeh, C.E. et al. | 2009
- 608
-
Exclusion of Forged Files from Multi-source Downloadable P2P SystemsKim, Yuna / Kim, Jong / You, Junghei / Park, Heejae et al. | 2009
- 612
-
Optimization of iSCSI remote storage access through multiple layersHiga, R. / Matsubara, K. / Okamawari, T. / Yamaguchi, S. / Oguchi, M. et al. | 2009
- 616
-
Packet Scheduling Algorithm with QoS Provision in HSDPAWang, Ying-Hong / Huang, Kuo-Feng / Le, Cheng-Yi et al. | 2009
- 624
-
An RFID-based system for emergency health care servicesTurcu, C. / Popa, V. et al. | 2009
- 624
-
A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc NetworksLee, Ki-seok / Kim, Cheeha et al. | 2009
- 632
-
Privacy-Aware Routing Approach for Mobile ApplicationsAleksy, Markus / Butter, Thomas et al. | 2009
- 638
-
A New Space Time Cooperative Diversity Scheme Based on Simple FeedbackSun, De-chun / Yi, Ke-chu / Li, Xiao-hui et al. | 2009
- 644
-
On the Synchronization of Web Services InteractionsMaamar, Zakaria / Sheng, Quan Z. / Yahyaoui, Hamdi / Boukadi, Khouloud / Li, Xitong et al. | 2009
- 652
-
Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of AdaptersTaher, Y. / Aït-Bachir, A. / Fauvet, M.-C. / Benslimane, D. et al. | 2009
- 660
-
Building Distributed Index for Semantic Web DataLi, Juan et al. | 2009
- 668
-
Advantages of User Authentication Using Unclear Images Automatic Generation of Decoy ImagesYamamoto, Takumi / Harada, Atsushi / Isarida, Takeo / Nishigaki, Masakatsu et al. | 2009
- 675
-
An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular NetworksTeo, Joseph Chee Ming / Ngoh, Lek Heng / Guo, Huaqun et al. | 2009
- 679
-
A robust algorithm for fuzzy document clusteringChen, Lifei / Wang, Shengrui / Jiang, Qingshan et al. | 2009
- 683
-
IGMPx: Port Based Service Access Control for IP MulticastPillai, Prashant / Hu, Yim-Fun et al. | 2009
- 691
-
A Hierarchical Model for Firewall Policy ExtractionHorowitz, Eduardo / Lamb, Luis C. et al. | 2009
- 699
-
Improved 4-ary Query Tree Algorithm for Anti-Collision in RFID SystemKim, Yonghwan / Kim, Sungsoo / Lee, Seongjoon / Ahn, Kwangseon et al. | 2009
- 705
-
Mitigation of Intercarrier Interference Based on General Precoder Design in OFDM SystemsWang, Xia / Zhu, Shihua et al. | 2009
- 711
-
An Analytical Model for MAC Protocol Configuration in WLANLatif, Suhaimi Bin Abd / Rashid, M.A. / Alam, F. et al. | 2009
- 719
-
Survivability in Existing ATM-Based Mesh NetworksWoungang, Isaac / Ma, Guangyan / Denko, Mieso K. / Sadeghian, Alireza / Misra, Sudip / Ferworn, Alexander et al. | 2009
- 725
-
Effects of On-path Buffering on TCP FairnessBhatti, Saleem / Bateman, Martin et al. | 2009
- 733
-
Scalability Analysis to Optimize a Network on ChipBeltrán, Marta / Guzmán, Antonio / Sevillano, Fernando et al. | 2009
- 741
-
Network Voronoi Diagram Based Range SearchXuan, Kefeng / Zhao, Geng / Taniar, David / Srinivasan, Bala / Safar, Maytham / Gavrilova, Marina et al. | 2009
- 749
-
Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic SensorsAbe, Nobutoshi / Shinomiya, Norihiko / Teshigawara, Yoshimi et al. | 2009
- 758
-
Sink Location Service via Inner Rectangular in Wireless Sensor NetworksPark, Hosung / Kim, Taehee / Lee, Jeongcheol / Jin, Min-Sook / Kim, Sang-Ha et al. | 2009
- 762
-
Temporal dynamics of user interests in Web search queriesCayci, A. / Sumengen, S. / Turkay, C. / Balcisoy, S. / Saygin, Y. et al. | 2009
- 763
-
How Long is the Lifetime of a Wireless Sensor Network?Mak, Nok Hang / Seah, Winston K.G. et al. | 2009
- 771
-
Medium Access Control in Large Scale Clusters for Wireless Sensor NetworksBarbosa, P. / White, N.M. / Harris, N.R. et al. | 2009
- 778
-
Finding Influential eBay Buyers for Viral Marketing A Conceptual Model of BuyerRankLam, Hon Wai / Wu, Chen et al. | 2009
- 786
-
Priority Scheduling of Requests to Web PortalsHolton, D.R.W. / Awan, I.U. / Younas, M. et al. | 2009
- 792
-
GBLT: Load Distribution Method for High Density by User Behavior in MMO Virtual EnvironmentEndo, Rei / Takagi, Kenji / Shigeno, Hiroshi et al. | 2009
- 798
-
Analysis of handoff delay components for mobile IP-based 3 GPP UMTS/WLAN interworking architectureAl-Helali, A.A. / Mahmoud, A. / Al-Kharobi, T. / Sheltami, T. et al. | 2009
- 800
-
Implementation of an E-learning System Using P2P, Web and Sensor TechnologiesMatsuo, Keita / Barolli, Leonard / Xhafa, Fatos / Kolici, Valadi / Koyama, Akio / Durresi, Arjan / Miho, Rozeta et al. | 2009
- 808
-
Recoverable Cuts to Make Agreement among PeersAikebaier, Ailixier / Barolli, Valbona / Enokido, Tomoya / Takizawa, Makoto et al. | 2009
- 816
-
A New Ballooned Wireless Mesh Network System for Disaster UseShibata, Yoshitaka / Sato, Yosuke / Ogasawara, Naoki / Chiba, Go / Takahata, Kazuo et al. | 2009
- 822
-
Determining the Net Financial Risk for Decision Making in Business InteractionsHussain, Omar / Dillon, Tharam / Chang, Elizabeth / Hussain, Farookh et al. | 2009
- 830
-
Fault-Tolerant Flocking of Mobile Robots with Whole Formation RotationYang, Yan / Souissi, Samia / Defago, Xavier / Takizawa, Makoto et al. | 2009
- 838
-
Testing the Symbian OS Platform Security ArchitectureBadura, Thomas / Becher, Michael et al. | 2009
- 845
-
A Protocol for Releasing Purpose Marks to Prevent Illegal Information FlowEnokido, Tomoya / Deen, S. Misbah / Takizawa, Makoto et al. | 2009
- 853
-
Anomaly Detection for DNS Servers Using Frequent Host SelectionYamada, Akira / Miyake, Yutaka / Terabe, Masahiro / Hashimoto, Kazuo / Kato, Nei et al. | 2009
- 861
-
A Novel Cookie-Based DDoS Protection Scheme and its Performance AnalysisZeng, Rongfei / Lin, Chuang / Yang, Hongkun / Wang, Yuanzhuo / Wang, Yang / Ungsunan, Peter et al. | 2009
- 868
-
Introducing Group Participation Support into P2P Web Caching SystemsIwamaru, Akihiro / Itokawa, Tsuyoshi / Kitasuka, Teruaki / Aritsugi, Masayoshi et al. | 2009
- 876
-
VirtCloud: Virtualising Network for Grid Environments First ExperiencesAntoš, David / Matyska, Ludek / Holub, Petr / Sitera, Jirí et al. | 2009
- 884
-
Spigot: Fragment-Level File Sharing and Consistency on GridsChen, Po-Cheng / Chang, Jyh-Biau / Yang, Jia-Hao / Zhuang, Yi-Chang / Shieh, Ce-Kuen et al. | 2009
- 892
-
DACA: Dynamic Anti-Cheating Architecture for MMOGsLiu, Huey-Ing / Tang, Bing-Rong et al. | 2009
- 898
-
DCM-Arch: An Architecture for Data, Control, and Management in Wireless Sensor NetworksLe-Trung, Quan / Taherkordi, Amirhosein / Eliassen, Frank / Pham, Hai Ngoc / Skeie, Tor / Engelstad, Paal E. et al. | 2009
- 906
-
Effective Sensing Function Allocation Using a Distributed Graph Coloring and a Slot Allocation Algorithm in Wireless Sensor NetworksKawano, Ryouhei / Miyazaki, Toshiaki et al. | 2009
- 914
-
A Method for Determining Weight Reset Timing in a Wirelessly Networked Array with Independently Mobile ElementsLintz, William A. / McEachen, John C. / Tummala, Murali et al. | 2009
- 921
-
Configuring Beaconless IEEE 802.15.4 Networks Under Different Traffic LoadsRohm, D. / Goyal, M. / Hosseini, H. / Divjak, A. / Bashir, Y. et al. | 2009
- 929
-
Classification of Bloggers Using Social AnnotationsSakurai, Shigeaki / Tsutsui, Hideki / Orihara, Ryohei et al. | 2009
- 937
-
Supporting Complex Scientific Database Schemas in a Grid MiddlewareXiang, Helen X. et al. | 2009
- 945
-
Utilising Multimodal Interaction Metaphors in E-learning Applications: An Experimental StudyAlseid, Marwan / Rigas, Dimitrios et al. | 2009
- 951
-
A New Method of Proactive Recovery Mechanism for Large-Scale Network FailuresHorie, Takuro / Hasegawa, Go / Kamei, Satoshi / Murata, Masayuki et al. | 2009
- 959
-
An Approach to Find Maximal Disjoint Paths with Reliability and Delay ConstraintsLoh, Ruen-Chze / Soh, Sieteng / Lazarescu, Mihai et al. | 2009
- 965
-
Implementation of Lightweight TCP/IP for Small, Wireless Embedded SystemsYoon, In-Su / Chung, Sang-Hwa / Kim, Jeong-Soo et al. | 2009
- 966
-
A contextualized and personalized approach for mobile searchFeng, Gui / Adjouadi, M. / Rishe, N. et al. | 2009
- 971
-
On the False-Positive and False-Negative Behavior of a Soft-State Signaling ProtocolTjiong, Melissa / Lukkien, Johan et al. | 2009
- 980
-
Author index| 2009
- 988
-
Publisher Information| 2009
- 996
-
Knowledge extraction and extrapolation using ancient and modern biomedical literatureVaka, H.G.G. / Mukhopadhyay, S. et al. | 2009
- 1008
-
Analyzing the interaction of ADF/cofilin with actin through molecular dynamics simulationsDurresi, E. / Dalhaimer, P. / Pollard, T.D. et al. | 2009
- 1013
-
Real-time monitoring of vital signsPayli, B. / Durresi, A. / Dincer, D.U. / Barolli, L. et al. | 2009
- 1019
-
A new teleconference system for healthcare applications by GigaEther-based omni-directional video transmissionOokuzu, H. / Sato, Y. / Hashimoto, K. / Shibata, Y. et al. | 2009
- 1124
-
Manipulation of network traffic traces for security evaluationGadelrab, M. / Kalam, A. / Deswarte, Y. et al. | 2009
- 1130
-
Effects of channel estimation errors in OFDM-MIMO-based underwater communicationsHakegard, J.E. / Grythe, K. et al. | 2009
- 1160
-
A novel spatially shared TDMA protocol and quality measure for ad hoc underwater acoustic networkDiamant, R. / Pinkhasevich, M. / Achrak, I. et al. | 2009
- 1178
-
A survey on medium access control in underwater acoustic sensor networksShah, G.A. et al. | 2009
- C1
-
Cover Art| 2009
- i
-
Title Page i| 2009
- iii
-
Title Page iii| 2009
- iv
-
Copyright Page| 2009
- v
-
Table of Contents| 2009
- xvi
-
Message from the AINA 2009 General Chairs| 2009
- xvii
-
Message from the AINA 2009 Programme Chairs| 2009
- xviii
-
AINA 2009 Organizing Committee| 2009
- xx
-
AINA 2009 Programme Committee| 2009
- xxvii
-
External Reviewers| 2009