


default search action
25th AINA Workshops 2011: Biopolis, Singapore
- 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, Biopolis, Singapore, March 22-25, 2011. IEEE Computer Society 2011, ISBN 978-0-7695-4338-3

The Seventh International Symposium on Frontiers of Information Systems and Network Applications (FINA 2011)
Distributed and Parallel Computing
- Somayyeh Koohi, Alireza Shafaei, Shaahin Hessabi:

An Optical Wavelength Switching Architecture for a High-Performance Low-Power Photonic NoC. 1-6 - Srikanth Srungarapu, Durga Prasad Reddy, Kishore Kothapalli, P. J. Narayanan

:
Fast Two Dimensional Convex Hull on the GPU. 7-12 - Raihan Al-Ekram, Richard C. Holt:

QoS-Aware Middleware for Scalable Replication. 13-20 - Nils Müllner, Oliver E. Theel:

The Degree of Masking Fault Tolerance vs. Temporal Redundancy. 21-28
Semantic Web and Systems
- Jakub Klímek

, Martin Necaský
:
Generating Lowering and Lifting Schema Mappings for Semantic Web Services. 29-34 - Kevin Koidl

, Owen Conlan
, Lai Wei, Ann Marie Saxton:
Non-invasive Browser Based User Modeling Towards Semantically Enhanced Personlization of the Open Web. 35-40 - Alexandre Kouznetsov, Jonas B. Laurila, Christopher J. O. Baker

, Bradley Shoebottom:
Algorithm for Population of Object Property Assertions Derived from Telecom Contact Centre Product Support Documentation. 41-46 - Lyazid Sabri, Abdelghani Chibani, Yacine Amirat, Gian Piero Zarri:

Semantic Reasoning Framework to Supervise and Manage Contexts and Objects in Pervasive Computing Environments. 47-52
Distributed and Parallel Systems
- Ha Manh Tran

, Jürgen Schönwälder
:
Evaluation of the Distributed Case-Based Reasoning System on a Distributed Computing Platform. 53-58 - Tsuyoshi Ota, Shusuke Okamoto:

Using I/O Schedulers to Reduce I/O Load in Virtualization Environments. 59-62 - Yoshimasa Ohnishi, Takaichi Yoshida:

Design and Evaluation of a Distributed Shared Memory Network for Application-Specific PC Cluster Systems. 63-70 - Kiran Kumar Matam, Kishore Kothapalli:

GPU Accelerated Lanczos Algorithm with Applications. 71-76
Mobile Networks and Systems
- Sheng-Cheng Yeh, Chia-Hui Wang

, Wu-Hsiao Hsu, Ming-Yang Su:
The Research of Locating Methods for Mobile Stations Based on IEEE 802.16e Multi-hop WMANs. 77-80 - Daisuke Fuji, Toshihiko Yamakami, Kunihiro Ishiguro:

A Fast-Boot Method for Embedded Mobile Linux: Toward a Single-Digit User Sensed Boot Time for Full-Featured Commercial Phones. 81-85 - Ji In Kim, Seok Joo Koh

:
Extension of Proxy Mobile IPv6 with Bicasting for Support of Multi-homing and Mobility in Wireless Networks. 86-89 - Thu Nguyen Tran Minh

, Dong Thi Bich Thuy:
An Efficient Model for Cooperative Caching in Mobile Information Systems. 90-95
Peer-to-Peer (P2P) Computing
- Yukie Kobayashi, Tomoki Yoshihisa, Takahiro Hara, Shojiro Nishio:

A Dynamic Cluster Construction Method Based on Characteristics of Query Generation in Peer-to-Peer Networks. 96-101 - Joan Arnedo-Moreno, Marc Domingo-Prieto:

An Anonymity Layer for JXTA Services. 102-107 - Atsushi Takeda, Takuma Oide, Akiko Takahashi:

New Structured P2P Network with Dynamic Load Balancing Scheme. 108-113 - K. Haribabu

, Arindam Paul, Chittaranjan Hota
:
Detecting Sybils in Peer-to-Peer Overlays Using Psychometric Analysis Methods. 114-119
Mobile Networks and Applications
- Masayuki Terada

, Takayasu Yamaguchi, Sadayuki Hongo:
Providing Secure Integrity in Peer-to-Peer Oriented Mobile Environments. 120-126 - Edison Pignaton de Freitas

, Tales Heimfarth, Ivayr Farah Netto, Carlos Eduardo Pereira
, Armando Morado Ferreira, Flávio Rech Wagner, Tony Larsson:
Handling Failures of Static Sensor Nodes in Wireless Sensor Network by Use of Mobile Sensors. 127-134
Scalable Computing
- Stelios Sotiriadis, Nik Bessis

, Ye Huang, Pierre Kuonen, Nick Antonopoulos:
A JADE Middleware for Grid Inter-cooperated Infrastructures. 135-140 - Tyng-Yeu Liang, Yu-Wei Chang:

GridCuda: A Grid-Enabled CUDA Programming Toolkit. 141-146 - Kamen Kanev, Nikolay N. Mirenkov:

Satellite Cloud Computing. 147-152
Internet Computing and Web Applications
- Toshihiro Ajiki, Hiroshi Fukuda, Tomohiro Kokogawa, Junko Itou, Jun Munemori:

Application to the Disaster Data of an Idea Generation Consistent Support System. 153-158 - Chung-Ming Huang, Hao-Hsiang Ku, Yen-Wen Chen:

Design and Implementation of a Web 2.0 Service Platform for DPWS-Based Home-Appliances in the Cloud Environment. 159-163
Opportunistic and Delay Tolerant Networks
- Chen Su, Kaiping Xue

, Peilin Hong, Hancheng Lu:
A Novel Bandwidth Estimation Scheme Used in Admission Control for Wireless Mesh Networks. 164-169 - Girish Kumar Patnaik, M. M. Gore:

Trustworthy Path Discovery in MANET - A Message Oriented Cross-Correlation Approach. 170-177 - Youn-Chul Cho, Sun-Joong Yoon, Young-Bae Ko:

Modifying the IEEE 802.11 MAC Protocol for Multi-hop Reservation in MIMC Tactical Ad Hoc Networks. 178-183
Agent and Dependable Systems
- Elton Domnori

, Giacomo Cabri
, Letizia Leonardi
:
Coordination Issues in an Agent-Based Approach for Territorial Emergence Management. 184-189 - Izabela Moise, Michel Hurfin, Linda Zeghache, Nadjib Badache:

Cloud-Based Support for Transactional Mobile Agents. 190-197 - Andrés J. Gonzalez, Bjarne E. Helvik

:
Analysis of Failures Characteristics in the UNINETT IP Backbone Network. 198-203 - Lei Xiong, Qingping Tan, Jianjun Xu:

Effects of Soft Error to System Reliability. 204-209
Intelligent Computing and Applications
- Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal

:
Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach. 210-215 - Md. Osman Gani, Sarah Isnain Binte Ashraf, Nafia Malik, Bushra Hossain, M. Afzal Hossain, Hasan Sarwar:

Recursive Implementation of Markov Model, A New Approach. 216-220 - Muhammad Qasim Khan

, Steinar Hidle Andresen:
An Intelligent Scan Mechanism for 802.11 Networks by Using Media Independent Information Server (MIIS). 221-225 - Ray Carroll, Sasitharan Balasubramaniam

, Dmitri Botvich, William Donnelly:
Bio-inspired Service Management Framework: Green Data-Centres Case Study. 226-231
Communication Networks
- Zhao Li, Qin Liu, Linjing Zhao:

Space Division Multiplexing Aided Opportunistic Spectrum Access for Cognitive Radio Networks. 232-237 - T. S. Indumathi, T. Srinivas, K. Rajaiah, Velur Rajappa:

Comparison of Performance of ROADMs in Optical Networks with BPP Traffic Models. 238-242 - Linjing Zhao, Xi Chen, Gangshan Zhang:

A Novel Spectrum Sensing Algorithm Based on Compressive Sensing for Cognitive Radio. 243-246
Service Oriented Architecture and Applications
- Zakaria Maamar

, Sami Bhiri
, Samir Tata, Khouloud Boukadi
, Wathiq Mansoor
:
Conceptual Analysis of Transactional-, Capacity-Driven Web Services. 247-252 - Basem Suleiman

, Carlos Eduardo da Silva
, Sherif Sakr
:
One Size Does Not Fit All: A Group-Based Service Selection for Web-Based Business Processes. 253-260 - Chee Shin Yeo

, Elaine Wong Kay Li, Yong Siang Foo:
Handling Large Datasets in Parallel Metaheuristics: A Spares Management and Optimization Case Study. 261-266 - Mohamed-Hedi Karray, Chirine Ghedira

, Zakaria Maamar
:
Towards a Self-Healing Approach to Sustain Web Services Reliability. 267-272 - Chengwen Zhang:

Adaptive Genetic Algorithm for QoS-aware Service Selection. 273-278
Security
- Nicolas Nobelis, Karima Boudaoud, Christian Delettre, Michel Riveill

:
A Component-Based Approach to Security Protocol Design. 279-284 - Husna Osman, Hamish Taylor:

Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems. 285-290
Communication Networks and Applications
- Wu-Hsiao Hsu, Yuh-Pyng Shieh, Sheng-Cheng Yeh, Pei-Siou Hung:

A Simple Path Diversity Algorithm for Interdomain Routing. 291-296 - Rong Sun, Jingwei Liu

, Pingli Zhang, Baoming Bai:
On the Rateless Character of Irregular RA Codes. 297-301 - Yao Hua Ho

:
Hybrid Virtual Router and Mesh Networks: A Cost Effective Strategy for Road Tunnels. 302-307 - Samad S. Kolahi, Burjiz K. Soorty:

Evaluation of Gigabit Ethernet Local Area Networks in Windows Vista-Server 2008 Environment. 308-312
Sensor Networks
- Xin Yang, Huanyu Zhao, Xiaolin Li:

SmartChannel: A Robust and Energy-Aware Multi-channel Management Scheme in Wireless Sensor Networks. 313-318 - Yuuki Tanno, Toshiaki Miyazaki:

Decentralized Multi-sink Data Transfer Protocol for Wireless Sensor Networks. 319-324 - Mohamed A. Mohandes

, Mohamed A. Haleem
, A. Abul-Hussain, Kaviarasu Balakrishnan:
Pilgrims Tracking Using Wireless Sensor Network. 325-328 - Zongqing Lu, Su-Lim Tan, Jit Biswas:

Fusion Function Placement Algorithm for Distributed Data Fusion Application in Wireless Sensor Networks. 329-334
Security and Privacy
- Danilo Valeros Bernardo, Doan B. Hoang:

Empirical Survey: Experimentation and Implementations of High Speed Protocol Data Transfer for GRID. 335-340 - Masaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:

Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace. 341-348 - Pruthvi Reddy Sabbu, Ganugula Umadevi, Kannan Srinathan, Bezawada Bruhadeshwar

:
An Oblivious Image Retrieval Protocol. 349-354 - Masayuki Ohta, Yoshiki Kanda, Kensuke Fukuda, Toshiharu Sugawara

:
Analysis of Spoofed IP Traffic Using Time-to-Live and Identification Fields in IP Headers. 355-361
Distributed Systems and Network Applications
- Harsh Trivedi, Prakash Veeraraghavan

, Seng Wai Loke, Aniruddha Desai
, Jack Singh:
SmartVANET: The Case for a Cross-Layer Vehicular Network Architecture. 362-368 - Xiaorong Li, Henry Novianus Palit, Yong Siang Foo, Terence Hung:

Building an HPC-as-a-Service Toolkit for User-Interactive HPC Services in the Cloud. 369-374 - Kenichi Fujii, Motoi Yamagiwa, Minoru Uehara:

Proposal for Solar Powered Grid Based on Reused PCs. 375-380 - Alexandre Otto Strube, Dolores Rexachs

, Emilio Luque
:
Improving Probe Usability. 381-387
Wireless Sensor Networks
- Leonard Barolli, Hironori Ando, Fatos Xhafa

, Arjan Durresi, Rozeta Miho, Akio Koyama:
Evaluation of an Intelligent Fuzzy-Based Cluster Head Selection System for WSNs Using Different Parameters. 388-395 - Ghalib A. Shah, Mehwish Hassan:

A Reliable Event Response Framework for Wireless Sensor and Actor Networks. 396-401 - Behnam Dezfouli

, Marjan Radi, Mohammad Ali Nematbakhsh, Shukor Abd Razak
:
A Medium Access Control Protocol with Adaptive Parent Selection Mechanism for Large-Scale Sensor Networks. 402-408 - Malayam Parambath Gilesh

, R. C. Hansdah:
An Adaptive Reliable Transport Protocol Based on Automatic reSend reQuest(ASQ) Technique for Wireless Sensor Networks. 409-416
Security and Intelligent Systems
- Julian Schütte

, Stephan Heuser:
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence. 417-423 - Dimitris Geneiatakis, Angelos D. Keromytis:

Towards a Forensic Analysis for Multimedia Communication Services. 424-429 - Sadiq Almuairfi

, Prakash Veeraraghavan
, Naveen K. Chilamkurti:
IPAS: Implicit Password Authentication System. 430-435 - Samiran Bag, Sushmita Ruj:

Key Distribution in Wireless Sensor Networks Using Finite Affine Plane. 436-441
The Fourth International Symposium on Applications of Ad Hoc and Sensor Networks (AASNET 2011)
- Tulika Mishra, Deepak Garg

, Manoj Madhava Gore:
A Publish/Subscribe Communication Infrastructure for VANET Applications. 442-446 - José Cecílio

, João Pedro Costa, Pedro Martins, Pedro Furtado
:
Configuration Interface for Industrial Wireless Sensor Networks. 447-452
The Third IEEE International Workshop on Bio and Intelligent Computing (BICom 2011)
- Irena Bojanova, Augustine Samba:

Analysis of Cloud Computing Delivery Architecture Models. 453-458 - Qingti Guo, Carol S. Smidts:

A Facility Framework for Distributed Application. 459-466 - Kiyoto Kadena, Kiyoshi Nakayama, Norihiko Shinomiya:

Network Failure Recovery with Tie-Sets. 467-472
The 2011 IEEE International Workshop on Bioinformatics and Life Science Modeling and Computing (BLSMC 11)
Life Science Modeling and Computing
- Muhammad Tayyab, Athanasios Lontos, Emmanuel Promayon

, Jacques Demongeot
:
Modelling and Image Processing of Constriction and Proliferation in the Gastrulation Process of Drosophila melanogaster. 473-477 - Julie Mintsa, Mustapha Rachdi

, Jacques Demongeot
:
Stochastic Approach in Modelling Epidemic Spread. 478-482 - Jacques Demongeot

, Adrien Elena, Mathilde Noual, Sylvain Sené:
Random Boolean Networks and Attractors of their Intersecting Circuits. 483-487 - Nicolas Glade, Adrien Elena, Fabien Corblin, Eric Fanchon, Jacques Demongeot

, Hedi Ben Amor:
Determination, Optimization and Taxonomy of Regulatory Networks: The Example of Arabidopsis thaliana Flower Morphogenesis. 488-494
Bioinformatics and Biocumputing
- Grégoire Lejay, Katsumi Inoue

, Andrei Doncescu:
Application of Meta-level Abduction for the Treatment of Hypertension Using SOLAR. 495-500 - Pierre Siegel, Andrei Doncescu:

Operator Decision in Simulation of Biological Systems. 501-506
The First International Workshop on Cloud Computing and Services (CCS 2011)
- Tomasz Wiktor Wlodarczyk, Yi Han, Chunming Rong

:
Performance Analysis of Hadoop for Query Processing. 507-513 - Rui Máximo Esteves, Rui Pais, Chunming Rong

:
K-means Clustering in the Cloud - A Mahout Test. 514-519 - Ji Su Park, Heon-Chang Yu

, Kwang-Sik Chung
, EunYoung Lee:
Markov Chain Based Monitoring Service for Fault Tolerance in Mobile Cloud Computing. 520-525 - Fabian Romero, Thomas J. Hacker:

Live Migration of Parallel Applications with OpenVZ. 526-531
The Fourth International Workshop on Data Management for Wireless and Pervasive Communications (DMWPC 2011)
- Yoshihiro Kosaka, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

A P2P Network Construction Method Based on Cycle of Sensing and Location in Ubiquitous Sensor Environment. 532-537 - Taku Fukushima, Takashi Yoshino, Aguri Shigeno:

Proposal and Evaluation of an Extraction Method for Inaccurate Example Sentences Using a Web Search Engine for Multilingual Parallel Texts. 538-543 - Muhammad Sajidur Rahman

, Khondoker Asif Akter, Shakil Hossain, Anjon Basak, Syed Ishtiaque Ahmed
:
Smart Blood Query: A Novel Mobile Phone Based Privacy-Aware Blood Donor Recruitment and Management System for Developing Regions. 544-548
The Seventh IEEE International Workshop on Heterogeneous Wireless Networks (HWISE 2011)
- Shohei Sato, Akio Koyama, Leonard Barolli:

MANET-Viewer II: A Visualization System for Visualizing Packet Flow in Mobile Ad-hoc Networks. 549-554 - Khalid Ashraf, Rachid Anane

, Nick Blundell:
Resilient and Secure File Dispersal in a Mobile P2P System. 555-560
The First International Workshop on Interworking and Interoperable Networks and Services (I2NS 2011)
- Adel Saeed Alshamrani:

PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks. 561-568 - Felipe Lalanne, Stephane Maag:

Protocol Data Parts Inclusion in a Formal Passive Testing Approach. 569-573
Information Security and Risk Management (iSeRiM 2011)
Security Tools and Solutions
- Tetsuya Izu, Masami Izumi, Noboru Kunihiro

, Kazuo Ohta:
Yet Another Sanitizable and Deletable Signatures. 574-579 - Jeanne Blair, Fuhua Lin

:
An Approach for Integrating 3D Virtual Worlds with Multiagent Systems. 580-585 - Ha-Thanh Le, Peter Kok Keong Loh:

Using Natural Language Tool to Assist VPRG Automated Extraction from Textual Vulnerability Description. 586-592 - Hiroki Ikeda, Keiichi Iwamura:

Selective Encryption Scheme and Mode to Avoid Generating Marker Codes in JPEG2000 Code Streams with Block Cipher. 593-600
Security Governance and Management Issues
- Akihiro Tomono, Minoru Uehara, Yuji Shimada:

Improvement and Evaluation of a Method to Manage Multiple Types of Logs. 601-606 - Ghazi Ben Ayed:

Digital Identity Metadata Scheme: A Technical Approach to Reduce Digital Identity Risks. 607-612 - Solange Ghernaouti-Helie, Igli Tashi, David Simms:

Optimizing Security Efficiency through Effective Risk Management. 613-619
The 2011 International Symposium on Mining and Web (MAW 2011)
Mining Techniques
- Maike Erdmann, Andrew M. Finch, Kotaro Nakayama, Eiichiro Sumita, Takahiro Hara, Shojiro Nishio:

Calculating Wikipedia Article Similarity Using Machine Translation Evaluation Metrics. 620-625 - Tomonobu Ozaki, Minoru Etoh:

Closed and Maximal Subgraph Mining in Internally and Externally Weighted Graph Databases. 626-631 - Bruno Ohana, Brendan Tierney

, Sarah Jane Delany
:
Domain Independent Sentiment Classification with Many Lexicons. 632-637 - Tanakorn Wichaiwong, Chuleerat Jaruskulchai:

XML Retrieval More Efficient Using ADXPI Indexing Scheme. 638-643
Web Applications
- Belkacem Chikhaoui, Mauricio Chiazzaro, Shengrui Wang:

An Improved Hybrid Recommender System by Combining Predictions. 644-649 - Kosuke Takano, Kin Fun Li, Mark Graham Johnson:

The Design of a Web-Based Multimedia Sport Instructional System. 650-657
The Sixth International Workshop on Performance Analysis and Enhancement of Wireless Networks (PAEWN 2011)
- Yu-Hsuang Chen, Tin Yu Wu, Wei-Tsong Lee:

A Novel Mechanism to Improve Handover Efficiency Considering the Duplicate Address Occurs in HMIPv6. 658-663 - Van Quang Bien, R. Venkatesha Prasad

, Ignas G. Niemegeers:
A Handoff Scheme Using Movement Prediction in Radio over Fiber Indoor Network at 60 GHz. 664-669 - Miguel A. Wister

, Pablo Pancardo
, Francisco D. Acosta
, Dante Arias Torres:
Performance Evaluation of AODV and DYMO as a Plattform for Rescue Task Applications in MANETs. 670-675 - Imene Lahyani, Mohamed Jmaiel:

Experimentations for QoS Evaluation of Publish/Subscribe Systems Deployed on Ad-hoc Network. 676-681
The First International Workshop on Protocols and Applications with Multi-homing Support (PAMS 2011)
Network
- Antti Mäkelä, Jukka Manner:

Bundling Consumer Connections - A Performance Analysis. 682-689 - Glenford E. Mapp, Mahdi Aiash

, Hélio Crestana Guardia
, Jon Crowcroft
:
Exploring Multi-homing Issues in Heterogeneous Environments. 690-695 - Kenji Ohira

, Yasuo Okabe:
Host-Centric Site-Exit Router Selection in IPv6 Site Multihoming Environment. 696-703
Transport and Mobility
- Shin Maruyama, Masahiro Kozuka, Yasuo Okabe, Motonori Nakamura:

Policy-Based IP Address Selection in SCTP Automatic Address Reconfiguration. 704-707 - Hakim Adhari, Thomas Dreibholz

, Martin Becke, Erwin P. Rathgeb, Michael Tüxen:
Evaluation of Concurrent Multipath Transfer over Dissimilar Paths. 708-714 - Shin-Jer Yang, Chun-Hsiu Cheng, Rei-Yao Wu:

Enhanced CAC with QoS Scheme for Improving the Efficiency of Resource Allocation on the IEEE 802.16 Network. 715-720 - Alton Yeow-Kuan Chua, Radhika Shenoy Balkunje, Dion Hoe-Lian Goh:

The Influence of User-Context on Mobile Information Needs. 721-726
The 2011 International Workshop on Quantitative Evaluation of Large-Scale Systems and Technologies (QuEST 2011)
- Takashi Yokota

, Kanemitsu Ootsu, Takanobu Baba:
Steady/Unsteady Communication Performance in Large-Scale Regular Networks. 727-732 - Eamon Millman, Deepali Arora, Stephen W. Neville:

STARS: A Framework for Statistically Rigorous Simulation-Based Network Research. 733-739 - Katsuyoshi Matsumoto, Minoru Uehara, Hideki Mori:

Evaluations of Resettable Stateful NMR. 740-745 - Sudsanguan Ngamsuriyaroj, Pak Rattidham, Ittipon Rassameeroj, Pisut Wongbuchasin, Nuttida Aramkul, Suttatip Rungmano:

Performance Evaluation of Load Balanced Web Proxies. 746-750 - Dhirendra Sharma, Vikram Kumar

, Marco Zennaro
, Vikram Singh
:
A Study of Efficiency-Campus Networks in Western Himalayan Universities of India. 751-756
The Fifth International Symposium on Security and Multimodality in Pervasive Environments (SMPE 2011)
Pervasive Network and Communication
- Nader F. Mir, Meera M. Nataraja, Savitha Ravikrishnan:

A Performance Evaluation Study of Video-on-Demand Traffic over IP Networks. 757-762 - Lukas J. Oslislo, Alex Talevski, Achim Karduck:

SMART CAMP: Benefits of Media and Smart Service Convergence. 763-768 - Ejaz Ahmed, Nik Bessis

, Yong Yue
, Peter Norrington
, Muhammad Sarfraz:
A Prototyping Development of ArabGrid Toolkit Using MML-GSCATS Methodology. 769-776
Pervasive Security and Privacy
- Peng Li

, Samad S. Kolahi, Mustafa Safdari, Mulugeta Argawe:
Effect of WPA2 Security on IEEE 802.11n Bandwith and Round Trip Time in Peer-Peer Wireless Local Area Networks. 777-782 - Hwasu Shin, Jongsub Moon, Manhyun Chung:

A Distributed and Dynamic System for Detecting Malware. 783-788 - Rodrigo Roman, Javier López

, Cristina Alcaraz
, Hsiao-Hwa Chen:
SenseKey - Simplifying the Selection of Key Management Schemes for Sensor Networks. 789-794
The Fifth International Workshop on Telecommunication Networking, Applications and Systems (TeNAS 2011)
Network Technologies
- Whai-En Chen, Tzu-Hsuan Wu:

IPv6 VoIP Deployment on Taiwan Academic Network (TANet). 795-799 - Wun-Yuan Huang, Jen-Wei Hu

, Te-Lung Liu:
The Design of Real-Time Warning System in Future Internet Environment. 800-804 - Hung-Yi Chang, I-Kai Chen, Wen-Ching Chiang:

A Simple Network-Engineering Approach for Improving Connection Availability in WDM Networks. 805-807
Sensor Networking
- Muhammad Asim

, Hala M. Mokhtar, Muhammad Zahid Khan, Madjid Merabti:
A Sensor Relocation Scheme for Wireless Sensor Networks. 808-813 - Chutima Prommak, Sujitra Modhirun:

Optimal Wireless Sensor Network Design for Efficient Energy Utilization. 814-819 - Muhammad Zahid Khan, Bob Askwith, Faycal Bouhafs, Muhammad Asim

:
Limitations of Simulation Tools for Large-Scale Wireless Sensor Networks. 820-825
Mobile Computing
- Ming-Yang Chen, Ya-Chun Li, Tin Yu Wu, Wei-Tsong Lee:

An Enhanced Power Control Transmission Scheme Based on CVIA. 826-829 - Guan-Hsiung Liaw, Chun-Yen Kuo, Kuo-Huang Chung:

Optimizing Power Consumption for Mobile Stations with Multiple Uplink and Downlink Connections in a Mobile WiMAX Network. 830-836
The Seventh International Symposium on Web and Mobile Information Services (WAMIS 2011)
Service Provisioning
- Khalil ur Rehman Laghari, Noël Crespi, Benjamín Molina, Carlos Enrique Palau

:
QoE Aware Service Delivery in Distributed Environment. 837-842 - Natalia Kryvinska

, Christine Strauss
, Muhammad Younas, Do Van Thanh:
A Generic Approach to the Services Delivery in Enterprise eBusiness Platforms. 843-848 - Mihai Tanase, Valentin Cristea:

Quality of Service in Large Scale Mobile Distributed Systems Based on Opportunistic Networks. 849-854
Data Models and Query Processing 1
- Yongrui Qin

, Hua Wang
, Lili Sun:
Cluster-Based Scheduling Algorithm for Periodic XML Data Broadcast in Wireless Environments. 855-860 - Agustinus Borgy Waluyo, David Taniar

, Bala Srinivasan, J. Wenny Rahayu, Makoto Takizawa
:
Adaptive and Efficient Data Dissemination in Mobile P2P Environments. 861-866 - Binh Viet Phan, Eric Pardede

, J. Wenny Rahayu:
Towards Improvement of Active XML Representation. 867-872
Data Models and Query Processing 2
- Yanbo Wu, Quan Z. Sheng

, Damith Chinthana Ranasinghe:
Tracing Moving Objects in Internet-Based RFID Networks. 873-878 - Ahmad Kamran Malik, Schahram Dustdar

:
A Hybrid Sharing Control Model for Context Sharing and Privacy in Collaborative Systems. 879-884
Web and Mobile Applications
- Toshihiko Yamakami:

A Three-Dimension Analysis of Driving Factors for Mobile Application Stores: Implications of Open Mobile Business Engineering. 885-889 - Soichiro Ushio, Yuka Ito, Kazunori Okada, Tomoki Kitahara, Hidenori Tsuji, Satoko Moriguchi, Masahiko Narita, Yuka Kato:

The Digital Travel Diary System Using the Network Service Platform. 890-895 - Yilun Chia, Flora S. Tsai, Wee Tiong Ang, Rajaraman Kanagasabai:

Context-Aware Mobile Learning with a Semantic Service-Oriented Infrastructure. 896-901
The Third International Conference on Underwater Networks (WUnderNet 2011)
- Wouter van Kleunen, Nirvana Meratnia, Paul J. M. Havinga:

A Set of Simplified Scheduling Constraints for Underwater Acoustic MAC Scheduling. 902-907 - Marc Waldmeyer, Hwee Pink Tan, Winston Khoon Guan Seah

:
Multi-stage AUV-aided Localization for Underwater Wireless Sensor Networks. 908-913

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














