callback( { "result":{ "query":":facetid:stream:\"streams/conf/netcom\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"71.33" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"80", "@dc":"80", "@oc":"80", "@id":"43362114", "text":":facetid:stream:streams/conf/netcom" } }, "hits":{ "@total":"80", "@computed":"80", "@sent":"80", "@first":"0", "hit":[{ "@score":"1", "@id":"5190143", "info":{"authors":{"author":[{"@pid":"04/2063","text":"Turker Akyuz"},{"@pid":"01/3973","text":"Ibrahim Sogukpinar"}]},"title":"Packet Marking with Distance Based Probabilities for IP Traceback.","venue":"NetCoM","pages":"433-438","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/AkyuzS09","doi":"10.1109/NETCOM.2009.45","ee":"https://doi.org/10.1109/NetCoM.2009.45","url":"https://dblp.org/rec/conf/netcom/AkyuzS09"}, "url":"URL#5190143" }, { "@score":"1", "@id":"5190144", "info":{"authors":{"author":[{"@pid":"01/8395","text":"Omar Almomani"},{"@pid":"58/7503","text":"Osman Gazali"},{"@pid":"72/7411","text":"Suhaidi Hassan"}]},"title":"Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet.","venue":"NetCoM","pages":"109-112","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/AlmomaniGH09","doi":"10.1109/NETCOM.2009.12","ee":"https://doi.org/10.1109/NetCoM.2009.12","url":"https://dblp.org/rec/conf/netcom/AlmomaniGH09"}, "url":"URL#5190144" }, { "@score":"1", "@id":"5190145", "info":{"authors":{"author":[{"@pid":"35/8395","text":"Young-mi Baek"},{"@pid":"96/8394","text":"Byung-hwa Lee"},{"@pid":"33/8395","text":"Jeongbae Yun"},{"@pid":"15/5581","text":"Keuchul Cho"},{"@pid":"h/KJHan","text":"Kijun Han"}]},"title":"A Self-Adjustable Rate Control in Wireless Body Area Networks.","venue":"NetCoM","pages":"404-407","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/BaekLYCH09","doi":"10.1109/NETCOM.2009.38","ee":"https://doi.org/10.1109/NetCoM.2009.38","url":"https://dblp.org/rec/conf/netcom/BaekLYCH09"}, "url":"URL#5190145" }, { "@score":"1", "@id":"5190146", "info":{"authors":{"author":[{"@pid":"51/8395","text":"Anu Bala"},{"@pid":"21/8395","text":"Munish Bansal"},{"@pid":"52/8395","text":"Jagpreet Singh"}]},"title":"Performance Analysis of MANET under Blackhole Attack.","venue":"NetCoM","pages":"141-145","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/BalaBS09","doi":"10.1109/NETCOM.2009.62","ee":"https://doi.org/10.1109/NetCoM.2009.62","url":"https://dblp.org/rec/conf/netcom/BalaBS09"}, "url":"URL#5190146" }, { "@score":"1", "@id":"5190147", "info":{"authors":{"author":[{"@pid":"44/7556","text":"Padmalochan Bera"},{"@pid":"34/9049-1","text":"Soumya Kanti Ghosh 0001"},{"@pid":"39/2452","text":"Pallab Dasgupta"}]},"title":"Fault Analysis of Security Policy Implementations in Enterprise Networks.","venue":"NetCoM","pages":"240-245","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/BeraGD09","doi":"10.1109/NETCOM.2009.82","ee":"https://doi.org/10.1109/NetCoM.2009.82","url":"https://dblp.org/rec/conf/netcom/BeraGD09"}, "url":"URL#5190147" }, { "@score":"1", "@id":"5190148", "info":{"authors":{"author":[{"@pid":"141/0719","text":"Marcharla Anjaneyulu Bhagyaveni"},{"@pid":"09/8395","text":"K. Rajeswari"}]},"title":"Performance Improvement of Wireless Sensor Networks Using Layered Space Time Codes.","venue":"NetCoM","pages":"129-134","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/BhagyaveniR09","doi":"10.1109/NETCOM.2009.27","ee":"https://doi.org/10.1109/NetCoM.2009.27","url":"https://dblp.org/rec/conf/netcom/BhagyaveniR09"}, "url":"URL#5190148" }, { "@score":"1", "@id":"5190149", "info":{"authors":{"author":{"@pid":"47/8395","text":"K. B. Chandradeep"}},"title":"A Scheme for the Design and Implementation of a Distributed IDS.","venue":"NetCoM","pages":"265-270","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/Chandradeep09","doi":"10.1109/NETCOM.2009.49","ee":"https://doi.org/10.1109/NetCoM.2009.49","url":"https://dblp.org/rec/conf/netcom/Chandradeep09"}, "url":"URL#5190149" }, { "@score":"1", "@id":"5190150", "info":{"authors":{"author":[{"@pid":"00/415","text":"Chia-Mei Chen"},{"@pid":"36/8395","text":"Wan-Yi Tsai"},{"@pid":"87/8073","text":"Hsiao-Chung Lin"}]},"title":"Anomaly Behavior Analysis for Web Page Inspection.","venue":"NetCoM","pages":"358-363","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/ChenTL09","doi":"10.1109/NETCOM.2009.72","ee":"https://doi.org/10.1109/NetCoM.2009.72","url":"https://dblp.org/rec/conf/netcom/ChenTL09"}, "url":"URL#5190150" }, { "@score":"1", "@id":"5190151", "info":{"authors":{"author":[{"@pid":"80/4313","text":"Sheng-Tzong Cheng"},{"@pid":"40/7827","text":"Bo-Fu Chen"},{"@pid":"92/7092","text":"Chih-Lun Chou"}]},"title":"Fairness Strategy and Scheduling Algorithm for IEEE 802.16 Wireless Access Systems.","venue":"NetCoM","pages":"364-369","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/ChengCC09","doi":"10.1109/NETCOM.2009.71","ee":"https://doi.org/10.1109/NetCoM.2009.71","url":"https://dblp.org/rec/conf/netcom/ChengCC09"}, "url":"URL#5190151" }, { "@score":"1", "@id":"5190152", "info":{"authors":{"author":[{"@pid":"38/7799","text":"Susmita Das"},{"@pid":"80/7796","text":"Bikramaditya Das"}]},"title":"Time Domain Equalization Technique Using RAKE-MMSE Receivers for High Data Rate UWB Communication System.","venue":"NetCoM","pages":"349-353","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/DasD09","doi":"10.1109/NETCOM.2009.51","ee":"https://doi.org/10.1109/NetCoM.2009.51","url":"https://dblp.org/rec/conf/netcom/DasD09"}, "url":"URL#5190152" }, { "@score":"1", "@id":"5190153", "info":{"authors":{"author":[{"@pid":"38/8395","text":"Suparna DasGupta"},{"@pid":"78/5976","text":"Rituparna Chaki"}]},"title":"AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc Networks.","venue":"NetCoM","pages":"88-92","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/DasGuptaC09","doi":"10.1109/NETCOM.2009.47","ee":"https://doi.org/10.1109/NetCoM.2009.47","url":"https://dblp.org/rec/conf/netcom/DasGuptaC09"}, "url":"URL#5190153" }, { "@score":"1", "@id":"5190154", "info":{"authors":{"author":[{"@pid":"44/775","text":"M. K. Kavitha Devi"},{"@pid":"64/1836","text":"P. Venkatesh 0001"}]},"title":"An Improved Collaborative Recommender System.","venue":"NetCoM","pages":"386-391","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/DeviV09","doi":"10.1109/NETCOM.2009.69","ee":"https://doi.org/10.1109/NetCoM.2009.69","url":"https://dblp.org/rec/conf/netcom/DeviV09"}, "url":"URL#5190154" }, { "@score":"1", "@id":"5190155", "info":{"authors":{"author":[{"@pid":"34/8395","text":"Behnam Dezfouli"},{"@pid":"15/8395","text":"Marjan Radi"},{"@pid":"30/1715","text":"Mohammad Ali Nematbakhsh"}]},"title":"Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor Networks.","venue":"NetCoM","pages":"60-65","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/DezfouliRN09","doi":"10.1109/NETCOM.2009.44","ee":"https://doi.org/10.1109/NetCoM.2009.44","url":"https://dblp.org/rec/conf/netcom/DezfouliRN09"}, "url":"URL#5190155" }, { "@score":"1", "@id":"5190156", "info":{"authors":{"author":[{"@pid":"90/6848","text":"Beatrice Cynthia Dhinakaran"},{"@pid":"60/1721","text":"Jae-Kwang Lee"},{"@pid":"31/4958","text":"Dhinaharan Nagamalai"}]},"title":""Reminder: please update your details": Phishing Trends.","venue":"NetCoM","pages":"295-300","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/DhinakaranLN09","doi":"10.1109/NETCOM.2009.86","ee":"https://doi.org/10.1109/NetCoM.2009.86","url":"https://dblp.org/rec/conf/netcom/DhinakaranLN09"}, "url":"URL#5190156" }, { "@score":"1", "@id":"5190157", "info":{"authors":{"author":{"@pid":"70/5594","text":"Ashwin Ganesan"}},"title":"On Some Sufficient Conditions for Distributed Quality-of-Service Support in Wireless Networks.","venue":"NetCoM","pages":"301-306","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/Ganesan09","doi":"10.1109/NETCOM.2009.17","ee":"https://doi.org/10.1109/NetCoM.2009.17","url":"https://dblp.org/rec/conf/netcom/Ganesan09"}, "url":"URL#5190157" }, { "@score":"1", "@id":"5190158", "info":{"authors":{"author":[{"@pid":"28/2505-1","text":"S. Geetha 0001"},{"@pid":"57/2734","text":"Siva S. Sivatha Sindhu"},{"@pid":"25/8395","text":"V. Kabilan"},{"@pid":"45/2087","text":"N. Kamaraj"}]},"title":"High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA.","venue":"NetCoM","pages":"113-118","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/GeethaSKK09","doi":"10.1109/NETCOM.2009.68","ee":"https://doi.org/10.1109/NetCoM.2009.68","url":"https://dblp.org/rec/conf/netcom/GeethaSKK09"}, "url":"URL#5190158" }, { "@score":"1", "@id":"5190159", "info":{"authors":{"author":[{"@pid":"55/7987","text":"Nirnay Ghosh"},{"@pid":"34/9049-1","text":"Soumya K. Ghosh 0001"}]},"title":"An Approach for Security Assessment of Network Configurations Using Attack Graph.","venue":"NetCoM","pages":"283-288","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/GhoshG09","doi":"10.1109/NETCOM.2009.83","ee":"https://doi.org/10.1109/NetCoM.2009.83","url":"https://dblp.org/rec/conf/netcom/GhoshG09"}, "url":"URL#5190159" }, { "@score":"1", "@id":"5190160", "info":{"authors":{"author":[{"@pid":"68/5514-2","text":"Kaushik Ghosh 0002"},{"@pid":"34/600","text":"Sarbani Roy"},{"@pid":"08/2976","text":"Pradip K. Das"}]},"title":"An Alternative Approach to Find the Fermat Point of a Polygonal Geographic Region for Energy Efficient Geocast Routing Protocols: Global Minima Scheme.","venue":"NetCoM","pages":"332-337","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/GhoshRD09","doi":"10.1109/NETCOM.2009.30","ee":"https://doi.org/10.1109/NetCoM.2009.30","url":"https://dblp.org/rec/conf/netcom/GhoshRD09"}, "url":"URL#5190160" }, { "@score":"1", "@id":"5190161", "info":{"authors":{"author":[{"@pid":"08/1005","text":"Sasthi C. Ghosh 0001"},{"@pid":"41/3683","text":"Roger M. Whitaker"},{"@pid":"45/2500","text":"Stuart M. Allen"},{"@pid":"25/4250","text":"Steve Hurley"}]},"title":"Service Coverage Bounds Through Efficient Load Approximation in UMTS Network Planning.","venue":"NetCoM","pages":"202-207","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/GhoshWAH09","doi":"10.1109/NETCOM.2009.13","ee":"https://doi.org/10.1109/NetCoM.2009.13","url":"https://dblp.org/rec/conf/netcom/GhoshWAH09"}, "url":"URL#5190161" }, { "@score":"1", "@id":"5190162", "info":{"authors":{"author":[{"@pid":"24/8395","text":"Shikha Goel"},{"@pid":"95/8394","text":"Sudesh Kumar"}]},"title":"An Improved Method of Detecting Spoofed Attack in Wireless LAN.","venue":"NetCoM","pages":"104-108","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/GoelK09","doi":"10.1109/NETCOM.2009.75","ee":"https://doi.org/10.1109/NetCoM.2009.75","url":"https://dblp.org/rec/conf/netcom/GoelK09"}, "url":"URL#5190162" }, { "@score":"1", "@id":"5190163", "info":{"authors":{"author":[{"@pid":"34/1560","text":"S. Gowrishankar"},{"@pid":"50/6817","text":"Subir Kumar Sarkar"},{"@pid":"47/4768","text":"T. G. Basavaraju"}]},"title":"Simulation Based Performance Comparison of Community Model, GFMM, RPGM, Manhattan Model and RWP-SS Mobility Models in MANET.","venue":"NetCoM","pages":"408-413","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/GowrishankarSB09","doi":"10.1109/NETCOM.2009.31","ee":"https://doi.org/10.1109/NetCoM.2009.31","url":"https://dblp.org/rec/conf/netcom/GowrishankarSB09"}, "url":"URL#5190163" }, { "@score":"1", "@id":"5190164", "info":{"authors":{"author":[{"@pid":"55/5546","text":"Anand Gupta"},{"@pid":"30/7999","text":"Harsh Bedi"},{"@pid":"40/7998","text":"M. S. Don Bosco"},{"@pid":"65/7998","text":"Vinay Shashidhar"}]},"title":"Accuracy of 3D Location Computation in GSM Through NS2.","venue":"NetCoM","pages":"119-122","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/GuptaBBS09","doi":"10.1109/NETCOM.2009.79","ee":"https://doi.org/10.1109/NetCoM.2009.79","url":"https://dblp.org/rec/conf/netcom/GuptaBBS09"}, "url":"URL#5190164" }, { "@score":"1", "@id":"5190165", "info":{"authors":{"author":[{"@pid":"92/4081","text":"Pankaj Gupta"},{"@pid":"76/5260","text":"Tarun Bansal"},{"@pid":"71/3734","text":"Manoj Misra"}]},"title":"MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor Networks.","venue":"NetCoM","pages":"23-27","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/GuptaBM09","doi":"10.1109/NETCOM.2009.78","ee":"https://doi.org/10.1109/NetCoM.2009.78","url":"https://dblp.org/rec/conf/netcom/GuptaBM09"}, "url":"URL#5190165" }, { "@score":"1", "@id":"5190166", "info":{"authors":{"author":[{"@pid":"28/8395","text":"Mosin I. Hasan"},{"@pid":"36/7997","text":"Nilesh B. Prajapati"}]},"title":"An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers.","venue":"NetCoM","pages":"254-258","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/HasanP09","doi":"10.1109/NETCOM.2009.59","ee":"https://doi.org/10.1109/NetCoM.2009.59","url":"https://dblp.org/rec/conf/netcom/HasanP09"}, "url":"URL#5190166" }, { "@score":"1", "@id":"5190167", "info":{"authors":{"author":[{"@pid":"05/8395","text":"Chandravva Hebbi"},{"@pid":"55/8395","text":"S. V. Saboji"}]},"title":"Vertical Handoff in Heterogeneous Wireless Mobile Networks.","venue":"NetCoM","pages":"66-71","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/HebbiS09","doi":"10.1109/NETCOM.2009.52","ee":"https://doi.org/10.1109/NetCoM.2009.52","url":"https://dblp.org/rec/conf/netcom/HebbiS09"}, "url":"URL#5190167" }, { "@score":"1", "@id":"5190168", "info":{"authors":{"author":[{"@pid":"17/8395","text":"Ehsan Heidari"},{"@pid":"m/AliMovagharRahimabadi","text":"Ali Movaghar 0001"}]},"title":"Intelligent Clustering in Wireless Sensor Networks.","venue":"NetCoM","pages":"12-17","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/HeidariM09","doi":"10.1109/NETCOM.2009.61","ee":"https://doi.org/10.1109/NetCoM.2009.61","url":"https://dblp.org/rec/conf/netcom/HeidariM09"}, "url":"URL#5190168" }, { "@score":"1", "@id":"5190169", "info":{"authors":{"author":[{"@pid":"57/3674","text":"Wouter Horré"},{"@pid":"44/765","text":"Kevin Lee"},{"@pid":"h/DannyHughes","text":"Danny Hughes 0001"},{"@pid":"62/5938","text":"Sam Michiels"},{"@pid":"13/86","text":"Wouter Joosen"}]},"title":"A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks.","venue":"NetCoM","pages":"326-331","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/HorreLHMJ09","doi":"10.1109/NETCOM.2009.18","ee":"https://doi.org/10.1109/NetCoM.2009.18","url":"https://dblp.org/rec/conf/netcom/HorreLHMJ09"}, "url":"URL#5190169" }, { "@score":"1", "@id":"5190170", "info":{"authors":{"author":[{"@pid":"00/2922-1","text":"Xu Huang 0001"},{"@pid":"18/3371-1","text":"Dharmendra Sharma 0001"}]},"title":"Fuzzy Switching Controller for the Security in 802.11 Networks.","venue":"NetCoM","pages":"370-375","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/HuangS09","doi":"10.1109/NETCOM.2009.20","ee":"https://doi.org/10.1109/NetCoM.2009.20","url":"https://dblp.org/rec/conf/netcom/HuangS09"}, "url":"URL#5190170" }, { "@score":"1", "@id":"5190171", "info":{"authors":{"author":[{"@pid":"92/8329","text":"B. Jagadeesh"},{"@pid":"220/2624","text":"Samayamantula Srinivas Kumar"},{"@pid":"86/8151","text":"K. Raja Rajeswari"}]},"title":"A Genetic Algorithm Based Oblivious Image Watermarking Scheme Using Singular Value Decomposition (SVD).","venue":"NetCoM","pages":"224-229","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/JagadeeshKR09","doi":"10.1109/NETCOM.2009.66","ee":"https://doi.org/10.1109/NetCoM.2009.66","url":"https://dblp.org/rec/conf/netcom/JagadeeshKR09"}, "url":"URL#5190171" }, { "@score":"1", "@id":"5190172", "info":{"authors":{"author":[{"@pid":"228/4567","text":"Natarajan Jaisankar"},{"@pid":"04/5469-1","text":"R. Saravanan 0001"},{"@pid":"51/8035","text":"K. Durai Swamy"}]},"title":"An Agent Based Security Framework for Protecting Routing Layer Operations in MANET.","venue":"NetCoM","pages":"381-385","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/JaisankarSS09","doi":"10.1109/NETCOM.2009.64","ee":"https://doi.org/10.1109/NetCoM.2009.64","url":"https://dblp.org/rec/conf/netcom/JaisankarSS09"}, "url":"URL#5190172" }, { "@score":"1", "@id":"5190173", "info":{"authors":{"author":[{"@pid":"12/8395","text":"Jianwen Niu"},{"@pid":"52/5716","text":"Chang Liu"},{"@pid":"26/4870","text":"Jian Ma"}]},"title":"Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks.","venue":"NetCoM","pages":"40-45","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/JianwenCJ09","doi":"10.1109/NETCOM.2009.39","ee":"https://doi.org/10.1109/NetCoM.2009.39","url":"https://dblp.org/rec/conf/netcom/JianwenCJ09"}, "url":"URL#5190173" }, { "@score":"1", "@id":"5190174", "info":{"authors":{"author":[{"@pid":"17/7412","text":"Mohammed M. Kadhum"},{"@pid":"72/7411","text":"Suhaidi Hassan"}]},"title":"The FN Quadratic Marking/Dropping Probability Function.","venue":"NetCoM","pages":"135-140","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/KadhumH09","doi":"10.1109/NETCOM.2009.63","ee":"https://doi.org/10.1109/NetCoM.2009.63","url":"https://dblp.org/rec/conf/netcom/KadhumH09"}, "url":"URL#5190174" }, { "@score":"1", "@id":"5190175", "info":{"authors":{"author":[{"@pid":"03/7449","text":"Gaurav Kapoor"},{"@pid":"10/977","text":"Selwyn Piramuthu"}]},"title":"Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols.","venue":"NetCoM","pages":"354-357","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/KapoorP09","doi":"10.1109/NETCOM.2009.90","ee":"https://doi.org/10.1109/NetCoM.2009.90","url":"https://dblp.org/rec/conf/netcom/KapoorP09"}, "url":"URL#5190175" }, { "@score":"1", "@id":"5190176", "info":{"authors":{"author":[{"@pid":"26/3079","text":"Kihyun Kim"},{"@pid":"50/8395","text":"Ick-Soo Lee"},{"@pid":"06/8395","text":"Mahnsuk Yoon"},{"@pid":"63/6466","text":"Junhyung Kim"},{"@pid":"27/8395","text":"Honggil Lee"},{"@pid":"h/KJHan","text":"Kijun Han"}]},"title":"An Efficient Routing Protocol Based on Position Information in Mobile Wireless Body Area Sensor Networks.","venue":"NetCoM","pages":"396-399","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/KimLYKLH09","doi":"10.1109/NETCOM.2009.36","ee":"https://doi.org/10.1109/NetCoM.2009.36","url":"https://dblp.org/rec/conf/netcom/KimLYKLH09"}, "url":"URL#5190176" }, { "@score":"1", "@id":"5190177", "info":{"authors":{"author":{"@pid":"99/8037","text":"Kamaljit I. Lakhtaria"}},"title":"Enhancing QoS and QoE in IMS Enabled Next Generation Networks.","venue":"NetCoM","pages":"184-189","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/Lakhtaria09","doi":"10.1109/NETCOM.2009.29","ee":"https://doi.org/10.1109/NetCoM.2009.29","url":"https://dblp.org/rec/conf/netcom/Lakhtaria09"}, "url":"URL#5190177" }, { "@score":"1", "@id":"5190178", "info":{"authors":{"author":[{"@pid":"89/6233","text":"Hyo-Beom Lee"},{"@pid":"78/1483","text":"Youn-Hee Han"},{"@pid":"08/1780","text":"Sung-Gi Min"}]},"title":"Node Mobility Support Scheme Between the Mobile Network and PMIPv6 Networks.","venue":"NetCoM","pages":"93-97","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/LeeHM09","doi":"10.1109/NETCOM.2009.85","ee":"https://doi.org/10.1109/NetCoM.2009.85","url":"https://dblp.org/rec/conf/netcom/LeeHM09"}, "url":"URL#5190178" }, { "@score":"1", "@id":"5190179", "info":{"authors":{"author":[{"@pid":"23/8395","text":"Boyoung Lee"},{"@pid":"44/8395","text":"Sojung Yang"},{"@pid":"08/4540","text":"Deokjai Choi"}]},"title":"A Status Monitoring System Design/Implementation for Home Appliances Controlled by Home Server.","venue":"NetCoM","pages":"220-223","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/LeeYC09","doi":"10.1109/NETCOM.2009.21","ee":"https://doi.org/10.1109/NetCoM.2009.21","url":"https://dblp.org/rec/conf/netcom/LeeYC09"}, "url":"URL#5190179" }, { "@score":"1", "@id":"5190180", "info":{"authors":{"author":[{"@pid":"05/7766","text":"Jilong Li"},{"@pid":"18/8395","text":"Jangkyu Yun"},{"@pid":"63/6466","text":"Junhyung Kim"},{"@pid":"19/131","text":"Icksoo Lee"},{"@pid":"h/KJHan","text":"Kijun Han"}]},"title":"A Handoff Management Scheme for Mobile Station in Wireless Body Area Mesh Networks.","venue":"NetCoM","pages":"392-395","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/LiYKLH09","doi":"10.1109/NETCOM.2009.35","ee":"https://doi.org/10.1109/NetCoM.2009.35","url":"https://dblp.org/rec/conf/netcom/LiYKLH09"}, "url":"URL#5190180" }, { "@score":"1", "@id":"5190181", "info":{"authors":{"author":[{"@pid":"06/7688","text":"B. Malarkodi 0001"},{"@pid":"22/8395","text":"B. Prasana"},{"@pid":"58/5172","text":"B. Venkataramani"}]},"title":"A Scheduling Policy for Battery Management in Mobile Devices.","venue":"NetCoM","pages":"83-87","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/MalarkodiPV09","doi":"10.1109/NETCOM.2009.10","ee":"https://doi.org/10.1109/NetCoM.2009.10","url":"https://dblp.org/rec/conf/netcom/MalarkodiPV09"}, "url":"URL#5190181" }, { "@score":"1", "@id":"5190182", "info":{"authors":{"author":[{"@pid":"97/8394","text":"Reshmi Maulik"},{"@pid":"88/4552","text":"Nabendu Chaki"}]},"title":"PhishNet: Enhancing the Security Aspect of IMS Users.","venue":"NetCoM","pages":"235-239","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/MaulikC09","doi":"10.1109/NETCOM.2009.34","ee":"https://doi.org/10.1109/NetCoM.2009.34","url":"https://dblp.org/rec/conf/netcom/MaulikC09"}, "url":"URL#5190182" }, { "@score":"1", "@id":"5190183", "info":{"authors":{"author":[{"@pid":"55/8263","text":"Yaser Miaji"},{"@pid":"72/7411","text":"Suhaidi Hassan"}]},"title":"Just Queueing (JQ): Scheduling Algorithm for the Internet.","venue":"NetCoM","pages":"161-165","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/MiajiH09","doi":"10.1109/NETCOM.2009.25","ee":"https://doi.org/10.1109/NetCoM.2009.25","url":"https://dblp.org/rec/conf/netcom/MiajiH09"}, "url":"URL#5190183" }, { "@score":"1", "@id":"5190184", "info":{"authors":{"author":[{"@pid":"12/1024","text":"Rajiv Misra"},{"@pid":"00/8395","text":"Ajay Shukla"}]},"title":"K Bipartite Partitioning Algorithm for Channel Allocation Problem in Wireless Mesh Networks.","venue":"NetCoM","pages":"46-51","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/MisraS09","doi":"10.1109/NETCOM.2009.11","ee":"https://doi.org/10.1109/NetCoM.2009.11","url":"https://dblp.org/rec/conf/netcom/MisraS09"}, "url":"URL#5190184" }, { "@score":"1", "@id":"5190185", "info":{"authors":{"author":[{"@pid":"99/3101","text":"Samrat Mondal"},{"@pid":"67/3314","text":"Shamik Sural"}]},"title":"Supporting Negative Authorization in Spatiotemporal Role Based Access Control.","venue":"NetCoM","pages":"422-427","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/MondalS09","doi":"10.1109/NETCOM.2009.23","ee":"https://doi.org/10.1109/NetCoM.2009.23","url":"https://dblp.org/rec/conf/netcom/MondalS09"}, "url":"URL#5190185" }, { "@score":"1", "@id":"5190186", "info":{"authors":{"author":[{"@pid":"53/8395","text":"Asish K. Mukhopadhyay"},{"@pid":"32/8395","text":"Sajal Saha"},{"@pid":"50/2798","text":"Suranjan Ghose"},{"@pid":"56/3689","text":"Debasish Saha"},{"@pid":"31/4958","text":"Dhinaharan Nagamalai"}]},"title":"An Analytical Model of Multi-service Call Admission Control in Next Generation Wireless Overlay Networks.","venue":"NetCoM","pages":"98-103","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/MukhopadhyaySGSN09","doi":"10.1109/NETCOM.2009.84","ee":"https://doi.org/10.1109/NetCoM.2009.84","url":"https://dblp.org/rec/conf/netcom/MukhopadhyaySGSN09"}, "url":"URL#5190186" }, { "@score":"1", "@id":"5190187", "info":{"authors":{"author":[{"@pid":"31/8395","text":"Saurav Muralidharan"},{"@pid":"45/8395","text":"Sajin Koroth"},{"@pid":"19/8395","text":"Nevil Anto"},{"@pid":"54/8395","text":"Rafeeque Pandarachalil"}]},"title":"Galaxia: A Semi-decentralized System for Implementing Secure-Group P2P Networks.","venue":"NetCoM","pages":"289-294","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/MuralidharanKAP09","doi":"10.1109/NETCOM.2009.41","ee":"https://doi.org/10.1109/NetCoM.2009.41","url":"https://dblp.org/rec/conf/netcom/MuralidharanKAP09"}, "url":"URL#5190187" }, { "@score":"1", "@id":"5190188", "info":{"authors":{"author":[{"@pid":"88/1593","text":"S. Muthuramalingam"},{"@pid":"16/8395","text":"P. Janani"},{"@pid":"11/8395","text":"B. Bavya"},{"@pid":"80/6463","text":"R. Rajaram"}]},"title":"An Energy-Conserving Topology Maintenance Algorithm for MANETs.","venue":"NetCoM","pages":"208-213","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/MuthuramalingamJBR09","doi":"10.1109/NETCOM.2009.73","ee":"https://doi.org/10.1109/NetCoM.2009.73","url":"https://dblp.org/rec/conf/netcom/MuthuramalingamJBR09"}, "url":"URL#5190188" }, { "@score":"1", "@id":"5190189", "info":{"authors":{"author":[{"@pid":"19/844","text":"A. Nagaraju 0001"},{"@pid":"43/8395","text":"B. Eswar"}]},"title":"Performance of Dominating Sets in AODV Routing Protocol for MANETs.","venue":"NetCoM","pages":"166-170","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/NagarajuE09","doi":"10.1109/NETCOM.2009.67","ee":"https://doi.org/10.1109/NetCoM.2009.67","url":"https://dblp.org/rec/conf/netcom/NagarajuE09"}, "url":"URL#5190189" }, { "@score":"1", "@id":"5190190", "info":{"authors":{"author":[{"@pid":"19/844","text":"A. Nagaraju 0001"},{"@pid":"94/8394","text":"Ch. Ramya Krishna"}]},"title":"Performance Evaluation of ADV with AODV for Mobile Ad-hoc Networks.","venue":"NetCoM","pages":"376-380","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/NagarajuK09","doi":"10.1109/NETCOM.2009.58","ee":"https://doi.org/10.1109/NetCoM.2009.58","url":"https://dblp.org/rec/conf/netcom/NagarajuK09"}, "url":"URL#5190190" }, { "@score":"1", "@id":"5190191", "info":{"authors":{"author":[{"@pid":"54/7526","text":"Mydhili K. Nair"},{"@pid":"37/3275","text":"V. Gopalakrishna"}]},"title":"Agent Based Web Services with RuleML for Network Management.","venue":"NetCoM","pages":"214-219","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/NairG09","doi":"10.1109/NETCOM.2009.53","ee":"https://doi.org/10.1109/NetCoM.2009.53","url":"https://dblp.org/rec/conf/netcom/NairG09"}, "url":"URL#5190191" }, { "@score":"1", "@id":"5190192", "info":{"authors":{"author":[{"@pid":"04/8395","text":"Neeraj Kumar Nehra"},{"@pid":"58/1076-8","text":"Manoj Kumar 0008"},{"@pid":"25/3370","text":"R. B. Patel"}]},"title":"Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks.","venue":"NetCoM","pages":"34-39","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/NehraKP09","doi":"10.1109/NETCOM.2009.56","ee":"https://doi.org/10.1109/NetCoM.2009.56","url":"https://dblp.org/rec/conf/netcom/NehraKP09"}, "url":"URL#5190192" }, { "@score":"1", "@id":"5190193", "info":{"authors":{"author":[{"@pid":"64/7712","text":"Stanislav Nonchev"},{"@pid":"89/6586","text":"Mikko Valkama"}]},"title":"Efficient Power-Aware Packet Scheduling for Multiantenna Packet Radio Systems.","venue":"NetCoM","pages":"344-348","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/NonchevV09","doi":"10.1109/NETCOM.2009.70","ee":"https://doi.org/10.1109/NetCoM.2009.70","url":"https://dblp.org/rec/conf/netcom/NonchevV09"}, "url":"URL#5190193" }, { "@score":"1", "@id":"5190194", "info":{"authors":{"author":[{"@pid":"42/8395","text":"Balakannan S. P"},{"@pid":"71/5626","text":"Yier Yan"},{"@pid":"10/8395","text":"Jae Seung Yang"},{"@pid":"98/4494","text":"Moon Ho Lee"}]},"title":"End-to-End Network Delay-Constrained for QoS Multicast Routing.","venue":"NetCoM","pages":"178-183","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/PYYL09","doi":"10.1109/NETCOM.2009.50","ee":"https://doi.org/10.1109/NetCoM.2009.50","url":"https://dblp.org/rec/conf/netcom/PYYL09"}, "url":"URL#5190194" }, { "@score":"1", "@id":"5190195", "info":{"authors":{"author":[{"@pid":"71/4617","text":"Girish Kumar Patnaik"},{"@pid":"28/885","text":"M. M. Gore"}]},"title":"Tree-Like Peer-to-Peer Symmetric Key Management in Mobile Ad Hoc Network.","venue":"NetCoM","pages":"196-201","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/PatnaikG09","doi":"10.1109/NETCOM.2009.46","ee":"https://doi.org/10.1109/NetCoM.2009.46","url":"https://dblp.org/rec/conf/netcom/PatnaikG09"}, "url":"URL#5190195" }, { "@score":"1", "@id":"5190196", "info":{"authors":{"author":[{"@pid":"36/7997","text":"Nilesh B. Prajapati"},{"@pid":"90/7998","text":"Rupal R. Agravat"},{"@pid":"28/8395","text":"Mosin I. Hasan"}]},"title":"Comparative Study of Various Cooling Schedules for Location Area Planning in Cellular Networks Using Simulated Annealing.","venue":"NetCoM","pages":"146-150","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/PrajapatiAH09","doi":"10.1109/NETCOM.2009.60","ee":"https://doi.org/10.1109/NetCoM.2009.60","url":"https://dblp.org/rec/conf/netcom/PrajapatiAH09"}, "url":"URL#5190196" }, { "@score":"1", "@id":"5190197", "info":{"authors":{"author":[{"@pid":"13/8395","text":"A. John Prakash"},{"@pid":"50/2498","text":"V. Rhymend Uthariaraj"}]},"title":"Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication.","venue":"NetCoM","pages":"246-253","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/PrakashU09","doi":"10.1109/NETCOM.2009.80","ee":"https://doi.org/10.1109/NetCoM.2009.80","url":"https://dblp.org/rec/conf/netcom/PrakashU09"}, "url":"URL#5190197" }, { "@score":"1", "@id":"5190198", "info":{"authors":{"author":[{"@pid":"74/7591","text":"Arun Prakash"},{"@pid":"07/8395","text":"Rajesh Verma"},{"@pid":"54/163","text":"Rajeev Tripathi"},{"@pid":"n/SagarNaik","text":"Kshirasagar Naik"}]},"title":"Multiple Mobile Routers Based Seamless Handover Scheme for Next Generation Heterogeneous Networks.","venue":"NetCoM","pages":"72-77","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/PrakashVTN09","doi":"10.1109/NETCOM.2009.40","ee":"https://doi.org/10.1109/NetCoM.2009.40","url":"https://dblp.org/rec/conf/netcom/PrakashVTN09"}, "url":"URL#5190198" }, { "@score":"1", "@id":"5190199", "info":{"authors":{"author":[{"@pid":"74/7742","text":"Muhannad Quwaider"},{"@pid":"13/7447","text":"Subir Biswas"}]},"title":"On-body Packet Routing Algorithms for Body Sensor Networks.","venue":"NetCoM","pages":"171-177","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/QuwaiderB09","doi":"10.1109/NETCOM.2009.54","ee":"https://doi.org/10.1109/NetCoM.2009.54","url":"https://dblp.org/rec/conf/netcom/QuwaiderB09"}, "url":"URL#5190199" }, { "@score":"1", "@id":"5190200", "info":{"authors":{"author":[{"@pid":"74/7742","text":"Muhannad Quwaider"},{"@pid":"92/8394","text":"Azizah Muhammad"},{"@pid":"65/8083","text":"Jongeun Choi"},{"@pid":"13/7447","text":"Subir Biswas"}]},"title":"Posture-Predictive Power Control in Body Sensor Networks Using Linear-Quadratic Gaussian Control.","venue":"NetCoM","pages":"52-59","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/QuwaiderMCB09","doi":"10.1109/NETCOM.2009.33","ee":"https://doi.org/10.1109/NetCoM.2009.33","url":"https://dblp.org/rec/conf/netcom/QuwaiderMCB09"}, "url":"URL#5190200" }, { "@score":"1", "@id":"5190201", "info":{"authors":{"author":[{"@pid":"73/7741","text":"A. Revathi 0001"},{"@pid":"68/7741","text":"Y. Venkataramani"}]},"title":"Perceptual Features Based Isolated Digit and Continuous Speech Recognition Using Iterative Clustering Approach.","venue":"NetCoM","pages":"155-160","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/RevathiV09","doi":"10.1109/NETCOM.2009.32","ee":"https://doi.org/10.1109/NetCoM.2009.32","url":"https://dblp.org/rec/conf/netcom/RevathiV09"}, "url":"URL#5190201" }, { "@score":"1", "@id":"5190202", "info":{"authors":{"author":[{"@pid":"82/405","text":"Shamala Subramaniam"},{"@pid":"371/4847","text":"Sangeetha Thavamani"},{"@pid":"29/8395","text":"Moqry A"}]},"title":"Cricket/Mica2 Based Discrete Event Simulator for WiHoc Ver.1.0 Localization Analysis.","venue":"NetCoM","pages":"123-128","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/STA09","doi":"10.1109/NETCOM.2009.87","ee":"https://doi.org/10.1109/NetCoM.2009.87","url":"https://dblp.org/rec/conf/netcom/STA09"}, "url":"URL#5190202" }, { "@score":"1", "@id":"5190203", "info":{"authors":{"author":[{"@pid":"02/577","text":"Samir K. Sadhukhan"},{"@pid":"89/1052","text":"Swarup Mandal"},{"@pid":"s/DebashisSaha","text":"Debashis Saha"}]},"title":"A Practical Approach for Planning WLAN Deployment under 3G Cellular Network.","venue":"NetCoM","pages":"78-82","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SadhukhanMS09","doi":"10.1109/NETCOM.2009.65","ee":"https://doi.org/10.1109/NetCoM.2009.65","url":"https://dblp.org/rec/conf/netcom/SadhukhanMS09"}, "url":"URL#5190203" }, { "@score":"1", "@id":"5190204", "info":{"authors":{"author":[{"@pid":"32/8395","text":"Sajal Saha"},{"@pid":"30/8395","text":"Subhasree Bhattacharjee"},{"@pid":"93/8394","text":"Rajib Nath Bhowmick"},{"@pid":"53/8395","text":"Asish K. Mukhopadhyay"},{"@pid":"31/4958","text":"Dhinaharan Nagamalai"}]},"title":"Analysis of Hierarchical Mobile IP Based Fast Mobility Management Schemes.","venue":"NetCoM","pages":"338-343","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SahaBBMN09","doi":"10.1109/NETCOM.2009.81","ee":"https://doi.org/10.1109/NetCoM.2009.81","url":"https://dblp.org/rec/conf/netcom/SahaBBMN09"}, "url":"URL#5190204" }, { "@score":"1", "@id":"5190205", "info":{"authors":{"author":[{"@pid":"98/8394","text":"Keiichi Sakakima"},{"@pid":"49/2403","text":"Shingo Ata"},{"@pid":"87/369","text":"Hiroshi Kitamura"}]},"title":"Anonymous but Traceable IP Address-Based Communication System.","venue":"NetCoM","pages":"259-264","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SakakimaAK09","doi":"10.1109/NETCOM.2009.42","ee":"https://doi.org/10.1109/NetCoM.2009.42","url":"https://dblp.org/rec/conf/netcom/SakakimaAK09"}, "url":"URL#5190205" }, { "@score":"1", "@id":"5190206", "info":{"authors":{"author":[{"@pid":"13/7525","text":"Abhishek Samanta"},{"@pid":"79/8262","text":"Dripto Bakshi"},{"@pid":"98/1512-1","text":"Amitava Mukherjee 0001"},{"@pid":"51/3475","text":"Mita Nasipuri"}]},"title":"Energy Efficient Wireless Sensor MAC Protocol for Collision Avoidance.","venue":"NetCoM","pages":"28-33","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SamantaBMN09","doi":"10.1109/NETCOM.2009.28","ee":"https://doi.org/10.1109/NetCoM.2009.28","url":"https://dblp.org/rec/conf/netcom/SamantaBMN09"}, "url":"URL#5190206" }, { "@score":"1", "@id":"5190207", "info":{"authors":{"author":[{"@pid":"26/8395","text":"Sanat Sarangi"},{"@pid":"69/3743","text":"Subrat Kar"}]},"title":"A Novel Algorithm for Graded Precision Localization in Wireless Sensor Networks.","venue":"NetCoM","pages":"18-22","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SarangiK09","doi":"10.1109/NETCOM.2009.22","ee":"https://doi.org/10.1109/NetCoM.2009.22","url":"https://dblp.org/rec/conf/netcom/SarangiK09"}, "url":"URL#5190207" }, { "@score":"1", "@id":"5190208", "info":{"authors":{"author":[{"@pid":"80/4991","text":"K. Saravanan"},{"@pid":"71/7436","text":"Arunkumar Thangavelu"},{"@pid":"48/8395","text":"K. Rameshbabu"}]},"title":"A Middleware Architectural framework for Vehicular Safety over VANET (InVANET).","venue":"NetCoM","pages":"277-282","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SaravananTR09","doi":"10.1109/NETCOM.2009.57","ee":"https://doi.org/10.1109/NetCoM.2009.57","url":"https://dblp.org/rec/conf/netcom/SaravananTR09"}, "url":"URL#5190208" }, { "@score":"1", "@id":"5190209", "info":{"authors":{"author":[{"@pid":"20/8395","text":"Kiran K. Somasundaram"},{"@pid":"b/JohnSBaras","text":"John S. Baras"}]},"title":"Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks.","venue":"NetCoM","pages":"319-325","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SomasundaramB09","doi":"10.1109/NETCOM.2009.19","ee":"https://doi.org/10.1109/NetCoM.2009.19","url":"https://dblp.org/rec/conf/netcom/SomasundaramB09"}, "url":"URL#5190209" }, { "@score":"1", "@id":"5190210", "info":{"authors":{"author":[{"@pid":"01/8000","text":"Siva Rama Krishnan Somayaji"},{"@pid":"13/7998","text":"Ch. A. S. Murty"}]},"title":"Securing Internet Protocol (IP) Storage: A Case Study.","venue":"NetCoM","pages":"190-195","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SomayajiM09","doi":"10.1109/NETCOM.2009.15","ee":"https://doi.org/10.1109/NetCoM.2009.15","url":"https://dblp.org/rec/conf/netcom/SomayajiM09"}, "url":"URL#5190210" }, { "@score":"1", "@id":"5190211", "info":{"authors":{"author":[{"@pid":"138/5991","text":"Sumathy Subramaniam"},{"@pid":"47/7998","text":"B. Upendra Kumar"}]},"title":"Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks.","venue":"NetCoM","pages":"1-6","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SumathyK09","doi":"10.1109/NETCOM.2009.74","ee":"https://doi.org/10.1109/NetCoM.2009.74","url":"https://dblp.org/rec/conf/netcom/SumathyK09"}, "url":"URL#5190211" }, { "@score":"1", "@id":"5190212", "info":{"authors":{"author":[{"@pid":"21/7998","text":"Kilari Veera Swamy"},{"@pid":"75/1183","text":"B. Chandra Mohan"},{"@pid":"54/7999","text":"Y. V. Bhaskar Reddy"},{"@pid":"220/2624","text":"Samayamantula Srinivas Kumar"}]},"title":"Energy Based Quantization for Image Compression Using Contourlet Transform.","venue":"NetCoM","pages":"230-234","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/SwamyMRK09","doi":"10.1109/NETCOM.2009.26","ee":"https://doi.org/10.1109/NetCoM.2009.26","url":"https://dblp.org/rec/conf/netcom/SwamyMRK09"}, "url":"URL#5190212" }, { "@score":"1", "@id":"5190213", "info":{"authors":{"author":[{"@pid":"14/8395","text":"K. Thanigaivelu"},{"@pid":"88/99","text":"K. Murugan"}]},"title":"Impact of Sink Mobility on Network Performance in Wireless Sensor Networks.","venue":"NetCoM","pages":"7-11","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/ThanigaiveluM09","doi":"10.1109/NETCOM.2009.76","ee":"https://doi.org/10.1109/NetCoM.2009.76","url":"https://dblp.org/rec/conf/netcom/ThanigaiveluM09"}, "url":"URL#5190213" }, { "@score":"1", "@id":"5190214", "info":{"authors":{"author":[{"@pid":"08/8395","text":"Alper Ugur"},{"@pid":"01/3973","text":"Ibrahim Sogukpinar"}]},"title":"A Framework for Licensed Digital Signatures.","venue":"NetCoM","pages":"428-432","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/UgurS09","doi":"10.1109/NETCOM.2009.43","ee":"https://doi.org/10.1109/NetCoM.2009.43","url":"https://dblp.org/rec/conf/netcom/UgurS09"}, "url":"URL#5190214" }, { "@score":"1", "@id":"5190215", "info":{"authors":{"author":[{"@pid":"56/8395","text":"Sarvesh Kumar Varatharajan"},{"@pid":"14/4085","text":"Gunes Ercal-Ozkaya"}]},"title":"On a Local Heuristic for a Reverse Multicast Forwarding Game.","venue":"NetCoM","pages":"307-312","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/VaratharajanE09","doi":"10.1109/NETCOM.2009.16","ee":"https://doi.org/10.1109/NetCoM.2009.16","url":"https://dblp.org/rec/conf/netcom/VaratharajanE09"}, "url":"URL#5190215" }, { "@score":"1", "@id":"5190216", "info":{"authors":{"author":[{"@pid":"08/1267","text":"V. Vijayaraghavan"},{"@pid":"121/9826","text":"Sanjoy Kumar Paul"}]},"title":"iMeasure Security (iMS): A Novel Framework for Security Quantification.","venue":"NetCoM","pages":"414-421","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/VijayaraghavanP09","doi":"10.1109/NETCOM.2009.77","ee":"https://doi.org/10.1109/NetCoM.2009.77","url":"https://dblp.org/rec/conf/netcom/VijayaraghavanP09"}, "url":"URL#5190216" }, { "@score":"1", "@id":"5190217", "info":{"authors":{"author":[{"@pid":"03/8395","text":"Osman Yagan"},{"@pid":"81/4670","text":"Armand M. Makowski"}]},"title":"Random Key Graphs.","venue":"NetCoM","pages":"313-318","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/YaganM09","doi":"10.1109/NETCOM.2009.55","ee":"https://doi.org/10.1109/NetCoM.2009.55","url":"https://dblp.org/rec/conf/netcom/YaganM09"}, "url":"URL#5190217" }, { "@score":"1", "@id":"5190218", "info":{"authors":{"author":[{"@pid":"81/7665","text":"Mohammad Yamin"},{"@pid":"99/8394","text":"Yasser Ades"}]},"title":"Crowd Management with RFID and Wireless Technologies.","venue":"NetCoM","pages":"439-442","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/YaminA09","doi":"10.1109/NETCOM.2009.14","ee":"https://doi.org/10.1109/NetCoM.2009.14","url":"https://dblp.org/rec/conf/netcom/YaminA09"}, "url":"URL#5190218" }, { "@score":"1", "@id":"5190219", "info":{"authors":{"author":[{"@pid":"49/8395","text":"Sooyeol Yang"},{"@pid":"33/8395","text":"Jeongbae Yun"},{"@pid":"18/8395","text":"Jangkyu Yun"},{"@pid":"27/8395","text":"Honggil Lee"},{"@pid":"h/KJHan","text":"Kijun Han"}]},"title":"Analysis and Proposal of Wireless Mesh Network's Routing Metric for WBAN.","venue":"NetCoM","pages":"400-403","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/YangYYLH09","doi":"10.1109/NETCOM.2009.37","ee":"https://doi.org/10.1109/NetCoM.2009.37","url":"https://dblp.org/rec/conf/netcom/YangYYLH09"}, "url":"URL#5190219" }, { "@score":"1", "@id":"5190220", "info":{"authors":{"author":[{"@pid":"236/9427","text":"Miyeon Yoon"},{"@pid":"52/6731","text":"Kwangkyum Lee"},{"@pid":"80/7630","text":"Mijoo Kim"},{"@pid":"82/2993","text":"Yongtae Shin"}]},"title":"Secure Mobile Multicast Handoff Mechanisms Using a Time-Limited Key.","venue":"NetCoM","pages":"271-276","year":"2009","type":"Conference and Workshop Papers","access":"closed","key":"conf/netcom/YoonLKS09","doi":"10.1109/NETCOM.2009.48","ee":"https://doi.org/10.1109/NetCoM.2009.48","url":"https://dblp.org/rec/conf/netcom/YoonLKS09"}, "url":"URL#5190220" }, { "@score":"1", "@id":"5221619", "info":{"title":"First International Conference on Networks and Communications, NetCoM 2009, Chennai, India, December 27-29, 2009","venue":"NetCoM","publisher":"IEEE Computer Society","year":"2009","type":"Editorship","key":"conf/netcom/2009","ee":"https://ieeexplore.ieee.org/xpl/conhome/5379701/proceeding","url":"https://dblp.org/rec/conf/netcom/2009"}, "url":"URL#5221619" }, { "@score":"1", "@id":"5235151", "info":{"title":"A Pascal Graph Property and Computer Network Topology.","venue":"NetCoM","pages":"151-154","year":"2009","type":"Withdrawn Items","access":"withdrawn","key":"conf/netcom/PalSN09","doi":"10.1109/NETCOM.2009.24","ee":"https://doi.org/10.1109/NetCoM.2009.24","url":"https://dblp.org/rec/conf/netcom/PalSN09"}, "url":"URL#5235151" } ] } } } )