Privacy-Aware Routing Approach for Mobile Applications (English)
- New search for: Aleksy, Markus
- New search for: Butter, Thomas
- New search for: Aleksy, Markus
- New search for: Butter, Thomas
In:
2009 International Conference on Advanced Information Networking and Applications
;
632-637
;
2009
-
ISSN:
- Conference paper / Electronic Resource
-
Title:Privacy-Aware Routing Approach for Mobile Applications
-
Contributors:Aleksy, Markus ( author ) / Butter, Thomas ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2009-05-01
-
Size:651635 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Improving QoS through Network Real-Time Measurement and Self-AdaptionGelenbe, Erol et al. | 2009
- 2
-
Wormholes of Communication: Interfacing Virtual Worlds and the Real WorldCampi, Alessandro / Gottlob, Georg / Hoye, Ben et al. | 2009
- 10
-
Location-Aware Authentication and Access Control Concepts and IssuesBertino, Elisa / Kirkpatrick, Michael et al. | 2009
- 16
-
Evaluating the Performance of Network Protocol Processing on Multi-core SystemsFaulkner, Matthew / Brampton, Andrew / Pink, Stephen et al. | 2009
- 24
-
Modeling Web Request and Session Level ArrivalsWang, Xuan / Goseva-Popstojanova, Katerina et al. | 2009
- 33
-
Predictive Simulation of HPC ApplicationsHammond, S.D. / Smith, J.A. / Mudalige, G.R. / Jarvis, S.A. et al. | 2009
- 41
-
Modelling Network Performance with a Spatial Stochastic Process AlgebraGalpin, Vashti et al. | 2009
- 50
-
An Evaluation of Routing Reliability in Non-collaborative Opportunistic NetworksChen, Ling-Jyh / Chiou, Che-Liang / Chen, Yi-Chao et al. | 2009
- 58
-
Parameterised Gradient Based Routing (PGBR) for Future InternetBalasubramaniam, Sasitharan / Botvich, Dmitri / Mineraud, Julien / Donnelly, William et al. | 2009
- 66
-
A New Counting Scheme for Multicast Broadcast Service with WiBroSung, Nak Beom / Kim, Kyung Tae / Park, Sun Sik / Youn, Hee Yong et al. | 2009
- 67
-
An adaptation system for P2P multimedia applicationsMakhlouf, D. / Zine, N.G. / Roose, P. / Dalmau, M. et al. | 2009
- 74
-
Analyzing the Hold Time Schemes to Limit the Routing Table Calculations in OSPF ProtocolGoyal, M. / Soperi, M. / Hosseini, H. / Trivedi, K.S. / Shaikh, A. / Choudhury, G. et al. | 2009
- 82
-
Real-Time Task Assignment in Heterogeneous Distributed Systems with Rechargeable BatteriesLin, Jian / Cheng, Albert M.K. / Kumar, Rashmi et al. | 2009
- 90
-
Distributed Secure Virtual File System Using Hysteresis SignaturesTezuka, Shin / Tomori, Hiroko / Uda, Ryuya / Okada, Ken-ichi et al. | 2009
- 98
-
Quarc: A High-Efficiency Network on-Chip ArchitectureMoadeli, Mahmoud / Maji, Partha / Vanderbauwhede, Wim et al. | 2009
- 106
-
Fair Scheduling with Multiple Gateways in Wireless Mesh NetworksErnst, Jason B. / Denko, Mieso K. et al. | 2009
- 109
-
Privacy protection in passive network monitoring: an access control approachLioudakis, G.V. / Gogoulos, F. / Antonakopoulou, A. / Kaklamani, D.I. / Venieris, I.S. et al. | 2009
- 113
-
Business Compliance Governance in Service-Oriented ArchitecturesDaniel, Florian / Casati, Fabio / D'Andrea, Vincenzo / Mulo, Emmanuel / Zdun, Uwe / Dustdar, Schahram / Strauch, Steve / Schumm, David / Leymann, Frank / Sebahi, Samir et al. | 2009
- 117
-
Performance evaluation of secure call admission control for multiclass Internet servicesAl-Haj, A. / Mellor, J. / Awan, I. et al. | 2009
- 121
-
DAVO: A Domain-Adaptable, Visual BPEL4WS OrchestratorDörnemann, Tim / Mathes, Markus / Schwarzkopf, Roland / Juhnke, Ernst / Freisleben, Bernd et al. | 2009
- 129
-
A Generic Database Web Service for the Venice Service GridKoch, Michael / Hillenbrand, Markus / Müller, Paul et al. | 2009
- 137
-
Trust Requirements in Identity Federation TopologiesKylau, Uwe / Thomas, Ivonne / Menzel, Michael / Meinel, Christoph et al. | 2009
- 146
-
Combined On-line and Off-line Trust Mechanism for Agent ComputingKhosravifar, Babak / Bentahar, Jamal / Gomrokchi, Maziar / Thiran, Philippe et al. | 2009
- 154
-
A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection SystemsSainani, Varsha / Shyu, Mei-Ling et al. | 2009
- 162
-
An Ontology-Based Architecture for Federated Identity ManagementLayouni, Farah / Pollet, Yann et al. | 2009
- 167
-
Trust Management in Emergency NetworksDurresi, Arjan / Durresi, Mimoza / Paruchuri, Vamsi / Barolli, Leonard et al. | 2009
- 175
-
An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video TransmissionChang, Yoong Choon / Lee, Sze Wei / Komiya, Ryoichi et al. | 2009
- 182
-
Adaptive FEC Algorithm Based on Prediction of Video Quality and Bandwidth Utilization RatioFeng, Jiao / Xuefen, Chi / Li, Peng / Yining, Wang / Guan, Lin et al. | 2009
- 189
-
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e NetworksGallucci, Dario / Fiandrotti, Attilio / Masala, Enrico / Martin, Juan Carlos De et al. | 2009
- 197
-
Heterogeneous Error Protection of H.264/AVC Video Using Hierarchical 16-QAMAbdurrhman, Ahmed B. / Woodward, Michael E. et al. | 2009
- 201
-
Design of q-ary Irregular Repeat-Accumulate CodesLin, Wei / Bai, Baoming / Li, Ying / Ma, Xiao et al. | 2009
- 205
-
Network anomaly detection based on statistical approach and time series analysisHuang, Kai / Qi, Zhengwei / Liu, Bo et al. | 2009
- 207
-
Design of Quasi-Cyclic LDPC Codes Based on Euclidean GeometriesLiu, Yuan-Hua / Wang, Xin-Mei / Ma, Jian-Hua et al. | 2009
- 212
-
Multi-user MIMO Broadcast System Grouping Strategy Based on Particle Swarm OptimizationYong-qiang, Hei / LiXiao-hui, / YiKe-chu, / Wen-tao, Li et al. | 2009
- 217
-
ANFIS Based AQM Controller for Congestion ControlAlasem, Rafe / Hossain, Alamgir / Awan, Irfan / Mansour, Hussein et al. | 2009
- 225
-
Probabilistic Network Fault-Diagnosis Using Cross-Layer ObservationsNickelsen, Anders / Grønbæk, Jesper / Renier, Thibault / Schwefel, Hans-Peter et al. | 2009
- 233
-
An Overlay Application-Layer Multicast InfrastructureUchôa, Daniel C. / Kopp, Samuel / Pimentel, Hélcio M. / Matushima, Reinaldo / Silveira, Regina M. et al. | 2009
- 241
-
A Measurement Study on Peer Behaviors for a Pure P2P NetworkOhzahata, Satoshi / Kawashima, Konosuke et al. | 2009
- 249
-
N-nary RAID: 3-resilient RAID Based on an N-nary NumberMatsumoto, Katsuyoshi / Uehara, Minoru et al. | 2009
- 256
-
Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling SystemsZhou, Xing / Dreibholz, Thomas / Fa, Fu / Du, Wencai / Rathgeb, Erwin Paul et al. | 2009
- 263
-
A Pipelined IP Forwarding Engine with Fast UpdateChang, Yeim-Kuan / Liu, Yen-Cheng / Kuo, Fang-Chen et al. | 2009
- 270
-
DINCast: Optimizing Application-Level Shared-Tree MulticastGuo, Huaqun / Ngoh, Lek Heng / Wong, W.C. / Yang, Ping / Beevi, Nazreen et al. | 2009
- 278
-
A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-TreeChang, Yeim-Kuan / Lin, Yung-Chieh et al. | 2009
- 278
-
Trust-based cooperative action control in multi-agent systems for network managementTerauchi, A. / Akashi, O. et al. | 2009
- 285
-
Optimized Broadcast in a Geographical Area of Wireless Ad Hoc and Sensor NetworksAmadou, Ibrahim / Minet, Pascale et al. | 2009
- 292
-
Discovering grid resources and deploying grid services using peer-to-peer technologiesDornemann, K. / Freisleben, B. et al. | 2009
- 293
-
A Resource Discovery Scheme for Large Scale Ad Hoc Networks Using a Hypercube-Based BackboneDekar, Lyes / Kheddouci, Hamamache et al. | 2009
- 301
-
Energy Efficiency: Optimal Transmission Range with Topology Management in Rectangular Ad-hoc Wireless NetworksFeng, Wei / Alshaer, Hamada / Elmirghani, Jaafar M.H. et al. | 2009
- 307
-
Performance Analysis of OLSR and BATMAN Protocols Considering Link Quality ParameterBarolli, Leonard / Ikeda, Makoto / Marco, Giuseppe De / Durresi, Arjan / Xhafa, Fatos et al. | 2009
- 315
-
A Communication Model of Broadcast in Wormhole-Routed Networks on-ChipMoadeli, Mahmoud / Vanderbauwhede, Wim et al. | 2009
- 323
-
An Experimental Evaluation of Sender-Side TCP Enhancements for Wired-to-Wireless Paths: A Real-World Home WLAN Case StudyTaank, Ritesh / Peng, Xiaohong et al. | 2009
- 331
-
QoS Enhancements and Performance Analysis for Delay Sensitive ApplicationsWang, J. / Guan, L. / Wang, X.G. / Grigg, A. / Awan, I. / Phillips, I. / Chi, X. et al. | 2009
- 334
-
Performance evaluation of SSTP- a transport protocol for satellite channelsCanhoto, A.F. / Anzaloni, A. et al. | 2009
- 339
-
An Efficient Admission Control Methodology for Satisfying QoS Requirements in NGN NetworksGhazel, Cherif / Saïdane, Leila et al. | 2009
- 347
-
A Secure Revised Simplex Algorithm for Privacy-Preserving Linear ProgrammingVaidya, Jaideep et al. | 2009
- 355
-
Trustworthiness Assessment of Wireless Sensor Data for Business ApplicationsGomez, Laurent / Laube, Annett / Sorniotti, Alessandro et al. | 2009
- 363
-
Key Management in Web of Trust for Mobile Ad Hoc NetworksDahshan, Hisham / Irvine, James et al. | 2009
- 365
-
Identity-based cryptography for securing mobile phone callsSmith, M. / Schridde, C. / Agel, B. / Freisleben, B. et al. | 2009
- 371
-
Scalable energy-aware dynamic task allocationBokar, A. / Bozyigit, M. / Sener, C. et al. | 2009
- 371
-
Enabling Fast Bootstrap of Reputation in P2P Mobile NetworksCascella, Roberto G. et al. | 2009
- 379
-
A Survey and Analysis on Semantics in QoS for Web ServicesTran, Vuong Xuan / Tsuji, Hidekazu et al. | 2009
- 386
-
Exploiting Request Characteristics to Improve Performance of Web Services Based Business ApplicationsYizhu, Tong / Hao, Wang / Taoying, Liu et al. | 2009
- 394
-
Massively Scalable Web Service DiscoveryAnadiotis, George / Kotoulas, Spyros / Lausen, Holger / Siebes, Ronny et al. | 2009
- 403
-
Towards an Approach to Defining Capacity-Driven Web ServiceMaamar, Zakaria / Tata, Samir / Belaïd, Djamel / Boukadi, Khouloud et al. | 2009
- 411
-
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GAWang, Xiaofeng / Yeo, Chee Shin / Buyya, Rajkumar / Su, Jinshu et al. | 2009
- 419
-
A Highly Available Grid Metadata CatalogJensen, Henrik Thostrup / Kleist, Josva et al. | 2009
- 427
-
Transaction Management for Reliable Grid ApplicationsTang, Feilong / Guo, Minyi / Li, Minglu / Li, Li et al. | 2009
- 435
-
Brain Image Registration Analysis Workflow for fMRI Studies on Global GridsPandey, Suraj / Voorsluys, William / Rahman, Musta?zur / Buyya, Rajkumar / Dobson, James / Chiu, Kenneth et al. | 2009
- 443
-
Name Resolution Middleware Using Relative Positional Relationship to Support Wireless Visible Area CommunicationNoda, Atsushi / Kitasuka, Teruaki / Tagashira, Shigeaki / Nakanishi, Tsuneo / Fukuda, Akira et al. | 2009
- 451
-
Data Dissemination with Drop BoxesLok, Mun J. / Qazi, Bilal R. / Elmirghani, Jaafar M.H. et al. | 2009
- 456
-
A Proposal to Enhance and Control Continuous Communications in Proxy Mobile IPv6Kang, Joon-Suk / Ohmori, Motoyuki / Okamura, Koji et al. | 2009
- 463
-
Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless NetworksYilmaz, Okan / Chen, Ing-Ray et al. | 2009
- 471
-
JPEG Steganography: A Performance Evaluation of Quantization TablesAlmohammad, Adel / Ghinea, Gheorghita / Hierons, Robert M. et al. | 2009
- 476
-
Services to the field: an approach for resource constrained sensor/actor networksBuckl, C. / Sommer, S. / Scholz, A. / Knoll, A. / Kemper, A. / Heuer, J. / Schmitt, A. et al. | 2009
- 479
-
Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia ObjectsNemati, Alireza Goudarzi / Enokido, Tomoya / Takizawa, Makoto et al. | 2009
- 487
-
PHD A Generic and Flexible Architecture for IPTV in Authorized DomainsSimplício Jr., Marcos Antonio / Coroama, Vlad / Venturini, Yeda R. / Carvalho, Tereza / Naslund, Mats / Pourzandi, Makan et al. | 2009
- 495
-
The Efficiency Method of Sanitizable Signature Scheme for SMFMiyata, Hirokazu / Uda, Ryuya / Okada, Kenichi et al. | 2009
- 503
-
Situation-Aware Adaptive Recommendation to Assist Mobile Users in a Campus EnvironmentBouzeghoub, Amel / Do, Kien Ngoc / Wives, Leandro Krug et al. | 2009
- 506
-
Towards distributed composition of real-time service-based applicationsEstevez-Ayres, I. / Garcia-Valls, M. / Basanta-Val, P. et al. | 2009
- 510
-
Tracking Anonymous Sinks in Wireless Sensor NetworksShakshuki, Elhadi M. / Sheltami, Tarek R. / Kang, Nan / Xing, Xinyu et al. | 2009
- 517
-
Sensor Data Fusion Using DSm Theory for Activity Recognition under Uncertainty in Home-Based CareLee, Hyun / Choi, Jae Sung / Elmasri, Ramez et al. | 2009
- 525
-
A Distributed Dynamic Adaptation Model for Component-Based ApplicationsSegarra, M.T. / André, F. et al. | 2009
- 530
-
Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh NetworksGlass, Stephen Mark / Muthukkumarasamy, Vallipuram / Portmann, Marius et al. | 2009
- 539
-
Fuzzy ESVDF Approach for Intrusion Detection SystemsZaman, Safaa / Karray, Fakhri et al. | 2009
- 546
-
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone IntrusionZhao, Guoqing / Yang, Jianhua / Hura, Gurdeep S. / Ni, Long / Huang, Shou-Hsuan Stephen et al. | 2009
- 552
-
Masquerade Detection Using Command Prediction and Association Rules MiningWu, Han-Ching / Huang, Shou-Hsuan Stephen et al. | 2009
- 554
-
An experiment on tele-immersive communication with tiled displays wall over JGN2plus networkEbara, Y. / Shibata, Y. et al. | 2009
- 560
-
Route Construction Based on Measured Characteristics of Radio Propagation in Wireless Sensor NetworksNose, Yasuhiro / Kanzaki, Akimitsu / Hara, Takahiro / Nishio, Shojiro et al. | 2009
- 568
-
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford ProtocolBaharloo, Mohammad / Hajisheykhi, Reza / Arjomand, Mohammad / Jahangir, Amir Hossein et al. | 2009
- 572
-
Information Communication Mechanism for Loosely Coupled Mobile User Groups in Wireless Sensor FieldsPark, Soochang / Lee, Euisin / Yu, Fucai / Jin, Min-Sook / Kim, Sang-Ha et al. | 2009
- 576
-
A trial of a worker's motion trace system using terrestrial magnetism and acceleration sensorsSato, N. / Odashima, S. / Suzuki, J. / Ishikawa, T. / Murata, Y. et al. | 2009
- 580
-
Lessons Learned: Simulation Vs WSN DeploymentShakshuki, Elhadi M. / Malik, Haroon / Sheltami, Tarek R. et al. | 2009
- 588
-
Similarity Search over DNS Query Streams for Email Worm DetectionChatzis, Nikolaos / Brownlee, Nevil et al. | 2009
- 596
-
ReAlSec: A Relational Language for Advanced Security EngineeringHamdi, Mohamed / Essaddi, Nejla / Boudriga, Noureddine et al. | 2009
- 601
-
A comparison between the tunneling process and mapping schemes for IPv4/IPv6 transitionAl-Jaafreh, R. / Mellor, J. / Awan, I. et al. | 2009
- 602
-
A New Video Surveillance Video Tracking System Based on Omni-directional and Network Controlled CamerasSato, Yousuke / Hashimoto, Koji / Shibata, Yoshitaka et al. | 2009
- 607
-
Design of alarm management system in hybrid IP/optical networksLiu, Te-Lung / Tseng, Hui-Min / Chen, Hui-Min / Hu, Jen-Wei / Yang, Chu-Sing / Yeh, C.E. et al. | 2009
- 608
-
Exclusion of Forged Files from Multi-source Downloadable P2P SystemsKim, Yuna / Kim, Jong / You, Junghei / Park, Heejae et al. | 2009
- 612
-
Optimization of iSCSI remote storage access through multiple layersHiga, R. / Matsubara, K. / Okamawari, T. / Yamaguchi, S. / Oguchi, M. et al. | 2009
- 616
-
Packet Scheduling Algorithm with QoS Provision in HSDPAWang, Ying-Hong / Huang, Kuo-Feng / Le, Cheng-Yi et al. | 2009
- 624
-
An RFID-based system for emergency health care servicesTurcu, C. / Popa, V. et al. | 2009
- 624
-
A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc NetworksLee, Ki-seok / Kim, Cheeha et al. | 2009
- 632
-
Privacy-Aware Routing Approach for Mobile ApplicationsAleksy, Markus / Butter, Thomas et al. | 2009
- 638
-
A New Space Time Cooperative Diversity Scheme Based on Simple FeedbackSun, De-chun / Yi, Ke-chu / Li, Xiao-hui et al. | 2009
- 644
-
On the Synchronization of Web Services InteractionsMaamar, Zakaria / Sheng, Quan Z. / Yahyaoui, Hamdi / Boukadi, Khouloud / Li, Xitong et al. | 2009
- 652
-
Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of AdaptersTaher, Y. / Aït-Bachir, A. / Fauvet, M.-C. / Benslimane, D. et al. | 2009
- 660
-
Building Distributed Index for Semantic Web DataLi, Juan et al. | 2009
- 668
-
Advantages of User Authentication Using Unclear Images Automatic Generation of Decoy ImagesYamamoto, Takumi / Harada, Atsushi / Isarida, Takeo / Nishigaki, Masakatsu et al. | 2009
- 675
-
An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular NetworksTeo, Joseph Chee Ming / Ngoh, Lek Heng / Guo, Huaqun et al. | 2009
- 679
-
A robust algorithm for fuzzy document clusteringChen, Lifei / Wang, Shengrui / Jiang, Qingshan et al. | 2009
- 683
-
IGMPx: Port Based Service Access Control for IP MulticastPillai, Prashant / Hu, Yim-Fun et al. | 2009
- 691
-
A Hierarchical Model for Firewall Policy ExtractionHorowitz, Eduardo / Lamb, Luis C. et al. | 2009
- 699
-
Improved 4-ary Query Tree Algorithm for Anti-Collision in RFID SystemKim, Yonghwan / Kim, Sungsoo / Lee, Seongjoon / Ahn, Kwangseon et al. | 2009
- 705
-
Mitigation of Intercarrier Interference Based on General Precoder Design in OFDM SystemsWang, Xia / Zhu, Shihua et al. | 2009
- 711
-
An Analytical Model for MAC Protocol Configuration in WLANLatif, Suhaimi Bin Abd / Rashid, M.A. / Alam, F. et al. | 2009
- 719
-
Survivability in Existing ATM-Based Mesh NetworksWoungang, Isaac / Ma, Guangyan / Denko, Mieso K. / Sadeghian, Alireza / Misra, Sudip / Ferworn, Alexander et al. | 2009
- 725
-
Effects of On-path Buffering on TCP FairnessBhatti, Saleem / Bateman, Martin et al. | 2009
- 733
-
Scalability Analysis to Optimize a Network on ChipBeltrán, Marta / Guzmán, Antonio / Sevillano, Fernando et al. | 2009
- 741
-
Network Voronoi Diagram Based Range SearchXuan, Kefeng / Zhao, Geng / Taniar, David / Srinivasan, Bala / Safar, Maytham / Gavrilova, Marina et al. | 2009
- 749
-
Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic SensorsAbe, Nobutoshi / Shinomiya, Norihiko / Teshigawara, Yoshimi et al. | 2009
- 758
-
Sink Location Service via Inner Rectangular in Wireless Sensor NetworksPark, Hosung / Kim, Taehee / Lee, Jeongcheol / Jin, Min-Sook / Kim, Sang-Ha et al. | 2009
- 762
-
Temporal dynamics of user interests in Web search queriesCayci, A. / Sumengen, S. / Turkay, C. / Balcisoy, S. / Saygin, Y. et al. | 2009
- 763
-
How Long is the Lifetime of a Wireless Sensor Network?Mak, Nok Hang / Seah, Winston K.G. et al. | 2009
- 771
-
Medium Access Control in Large Scale Clusters for Wireless Sensor NetworksBarbosa, P. / White, N.M. / Harris, N.R. et al. | 2009
- 778
-
Finding Influential eBay Buyers for Viral Marketing A Conceptual Model of BuyerRankLam, Hon Wai / Wu, Chen et al. | 2009
- 786
-
Priority Scheduling of Requests to Web PortalsHolton, D.R.W. / Awan, I.U. / Younas, M. et al. | 2009
- 792
-
GBLT: Load Distribution Method for High Density by User Behavior in MMO Virtual EnvironmentEndo, Rei / Takagi, Kenji / Shigeno, Hiroshi et al. | 2009
- 798
-
Analysis of handoff delay components for mobile IP-based 3 GPP UMTS/WLAN interworking architectureAl-Helali, A.A. / Mahmoud, A. / Al-Kharobi, T. / Sheltami, T. et al. | 2009
- 800
-
Implementation of an E-learning System Using P2P, Web and Sensor TechnologiesMatsuo, Keita / Barolli, Leonard / Xhafa, Fatos / Kolici, Valadi / Koyama, Akio / Durresi, Arjan / Miho, Rozeta et al. | 2009
- 808
-
Recoverable Cuts to Make Agreement among PeersAikebaier, Ailixier / Barolli, Valbona / Enokido, Tomoya / Takizawa, Makoto et al. | 2009
- 816
-
A New Ballooned Wireless Mesh Network System for Disaster UseShibata, Yoshitaka / Sato, Yosuke / Ogasawara, Naoki / Chiba, Go / Takahata, Kazuo et al. | 2009
- 822
-
Determining the Net Financial Risk for Decision Making in Business InteractionsHussain, Omar / Dillon, Tharam / Chang, Elizabeth / Hussain, Farookh et al. | 2009
- 830
-
Fault-Tolerant Flocking of Mobile Robots with Whole Formation RotationYang, Yan / Souissi, Samia / Defago, Xavier / Takizawa, Makoto et al. | 2009
- 838
-
Testing the Symbian OS Platform Security ArchitectureBadura, Thomas / Becher, Michael et al. | 2009
- 845
-
A Protocol for Releasing Purpose Marks to Prevent Illegal Information FlowEnokido, Tomoya / Deen, S. Misbah / Takizawa, Makoto et al. | 2009
- 853
-
Anomaly Detection for DNS Servers Using Frequent Host SelectionYamada, Akira / Miyake, Yutaka / Terabe, Masahiro / Hashimoto, Kazuo / Kato, Nei et al. | 2009
- 861
-
A Novel Cookie-Based DDoS Protection Scheme and its Performance AnalysisZeng, Rongfei / Lin, Chuang / Yang, Hongkun / Wang, Yuanzhuo / Wang, Yang / Ungsunan, Peter et al. | 2009
- 868
-
Introducing Group Participation Support into P2P Web Caching SystemsIwamaru, Akihiro / Itokawa, Tsuyoshi / Kitasuka, Teruaki / Aritsugi, Masayoshi et al. | 2009
- 876
-
VirtCloud: Virtualising Network for Grid Environments First ExperiencesAntoš, David / Matyska, Ludek / Holub, Petr / Sitera, Jirí et al. | 2009
- 884
-
Spigot: Fragment-Level File Sharing and Consistency on GridsChen, Po-Cheng / Chang, Jyh-Biau / Yang, Jia-Hao / Zhuang, Yi-Chang / Shieh, Ce-Kuen et al. | 2009
- 892
-
DACA: Dynamic Anti-Cheating Architecture for MMOGsLiu, Huey-Ing / Tang, Bing-Rong et al. | 2009
- 898
-
DCM-Arch: An Architecture for Data, Control, and Management in Wireless Sensor NetworksLe-Trung, Quan / Taherkordi, Amirhosein / Eliassen, Frank / Pham, Hai Ngoc / Skeie, Tor / Engelstad, Paal E. et al. | 2009
- 906
-
Effective Sensing Function Allocation Using a Distributed Graph Coloring and a Slot Allocation Algorithm in Wireless Sensor NetworksKawano, Ryouhei / Miyazaki, Toshiaki et al. | 2009
- 914
-
A Method for Determining Weight Reset Timing in a Wirelessly Networked Array with Independently Mobile ElementsLintz, William A. / McEachen, John C. / Tummala, Murali et al. | 2009
- 921
-
Configuring Beaconless IEEE 802.15.4 Networks Under Different Traffic LoadsRohm, D. / Goyal, M. / Hosseini, H. / Divjak, A. / Bashir, Y. et al. | 2009
- 929
-
Classification of Bloggers Using Social AnnotationsSakurai, Shigeaki / Tsutsui, Hideki / Orihara, Ryohei et al. | 2009
- 937
-
Supporting Complex Scientific Database Schemas in a Grid MiddlewareXiang, Helen X. et al. | 2009
- 945
-
Utilising Multimodal Interaction Metaphors in E-learning Applications: An Experimental StudyAlseid, Marwan / Rigas, Dimitrios et al. | 2009
- 951
-
A New Method of Proactive Recovery Mechanism for Large-Scale Network FailuresHorie, Takuro / Hasegawa, Go / Kamei, Satoshi / Murata, Masayuki et al. | 2009
- 959
-
An Approach to Find Maximal Disjoint Paths with Reliability and Delay ConstraintsLoh, Ruen-Chze / Soh, Sieteng / Lazarescu, Mihai et al. | 2009
- 965
-
Implementation of Lightweight TCP/IP for Small, Wireless Embedded SystemsYoon, In-Su / Chung, Sang-Hwa / Kim, Jeong-Soo et al. | 2009
- 966
-
A contextualized and personalized approach for mobile searchFeng, Gui / Adjouadi, M. / Rishe, N. et al. | 2009
- 971
-
On the False-Positive and False-Negative Behavior of a Soft-State Signaling ProtocolTjiong, Melissa / Lukkien, Johan et al. | 2009
- 980
-
Author index| 2009
- 988
-
Publisher Information| 2009
- 996
-
Knowledge extraction and extrapolation using ancient and modern biomedical literatureVaka, H.G.G. / Mukhopadhyay, S. et al. | 2009
- 1008
-
Analyzing the interaction of ADF/cofilin with actin through molecular dynamics simulationsDurresi, E. / Dalhaimer, P. / Pollard, T.D. et al. | 2009
- 1013
-
Real-time monitoring of vital signsPayli, B. / Durresi, A. / Dincer, D.U. / Barolli, L. et al. | 2009
- 1019
-
A new teleconference system for healthcare applications by GigaEther-based omni-directional video transmissionOokuzu, H. / Sato, Y. / Hashimoto, K. / Shibata, Y. et al. | 2009
- 1124
-
Manipulation of network traffic traces for security evaluationGadelrab, M. / Kalam, A. / Deswarte, Y. et al. | 2009
- 1130
-
Effects of channel estimation errors in OFDM-MIMO-based underwater communicationsHakegard, J.E. / Grythe, K. et al. | 2009
- 1160
-
A novel spatially shared TDMA protocol and quality measure for ad hoc underwater acoustic networkDiamant, R. / Pinkhasevich, M. / Achrak, I. et al. | 2009
- 1178
-
A survey on medium access control in underwater acoustic sensor networksShah, G.A. et al. | 2009
- C1
-
Cover Art| 2009
- i
-
Title Page i| 2009
- iii
-
Title Page iii| 2009
- iv
-
Copyright Page| 2009
- v
-
Table of Contents| 2009
- xvi
-
Message from the AINA 2009 General Chairs| 2009
- xvii
-
Message from the AINA 2009 Programme Chairs| 2009
- xviii
-
AINA 2009 Organizing Committee| 2009
- xx
-
AINA 2009 Programme Committee| 2009
- xxvii
-
External Reviewers| 2009