default search action
IPCCC 2008: Austin, TX, USA
- Ty Znati, Youtao Zhang:
2008 IEEE International Performance, Computing and Communications Conference, IPCCC 2008, Austin, TX, USA, December 7-9, 2008. IEEE Computer Society 2008, ISBN 978-1-4244-3368-1
Wireless Sensor Networks I
- Guilin Li, Jianzhong Li, Yingshu Li:
TIME: Time-based Index Management for Event Query Processing in Wireless Sensor Networks. 1-8 - Kijeung Choi, Thomas G. Robertazzi:
Divisible Load Scheduling inWireless Sensor Networks with Information Utility. 9-17 - Di Wu, Lichun Bao, Min Du, Renfa Li:
Design and Evaluation of Localization Protocols and Algorithms in Wireless Sensor Networks Using UWB. 18-25
Storage
- Cong Liu, Xiao Qin, S. Kulkarni, Chengjun Wang, Shuang Li, Adam Manzanares, Sanjeev Baskiyar:
Distributed Energy-Efficient Scheduling for Data-Intensive Applications with Deadline Constraints on Data Grids. 26-33 - Ahmed Amer, Jehan-François Pâris, Darrell D. E. Long, Thomas J. E. Schwarz:
Progressive Parity-Based Hardening of Data Stores. 34-42 - Shenggang Wan, Qiang Cao, Xubin He, Changsheng Xie, Chentao Wu:
An Adaptive Cache Management Using Dual LRU Stacks to Improve Buffer Cache Performance. 43-50
System Security
- Yubin Li, Zesheng Chen, Chao Chen:
Understanding Divide-Conquer-Scanning Worms. 51-58 - Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh:
Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets. 59-68 - Visham Ramsurrun, K. M. Sunjiv Soyjaudah:
A Highly Available Transparent Linux Cluster Security Model. 69-76
Wireless Sensor Networks II
- Torsha Banerjee, Dharma P. Agrawal:
Increasing Lifetime of Wireless Sensor Networks Using Controllable Mobile Cluster Heads. 77-84 - Rabindranath Ghosh, Koushik Sinha, Debasish Datta, Bhabani P. Sinha:
TSS: An Energy Efficient Communication Scheme for Low Power Wireless Networks. 85-92 - Song Han, Zifei Zhong, Hongxing Li, Guihai Chen, Edward Chan, Aloysius K. Mok:
Coding-Aware Multi-path Routing in Multi-Hop Wireless Networks. 93-100
Internet Computing
- Miguel Jimeno, Ken Christensen, Bruce Nordman:
A Network Connection Proxy to Enable Hosts to Sleep and Save Energy. 101-110 - Kuai Xu, Feng Wang:
Cooperative Monitoring for Internet Data Centers. 111-118 - Paulo R. Farah, Cristina D. Murta:
A Transient Overload Generator forWeb Servers. 119-126
Application Layer and Network Management I
- Abhishek Jaiantilal, Yifei Jiang, Shivakant Mishra:
An Evaluation of Java RMI/JavaSpaces and Ruby DRb/Rinda. 127-134 - Fábio N. Souza, Roberto D. Arteiro, Nelson S. Rosa, Paulo Romero Martins Maciel:
Performance Models for the Instance Pooling Mechanism of the JBoss Application Server. 135-143 - Xiaowen Chu, Kaiyong Zhao, Mea Wang:
Massively Parallel Network Coding on GPUs. 144-151
Wireless Ad Hoc / Mesh Networks I
- Weihuang Fu, Yun Wang, Dharma P. Agrawal:
Delay and Capacity Optimization in Multi-radio Multi-channel Wireless Mesh Networks. 152-159 - Lichun Bao:
Location Authentication Methods for Wireless Network Access Control. 160-167 - Muhannad Quwaider, Jayanthi Rao, Subir Biswas:
Neighborhood Route Diffusion for Packet Salvaging in Networks with High Mobility. 168-175
Effective and SECURE Routing
- Kyung Min Su, Ki Hwan Yum:
Simple and Effective Adaptive Routing Algorithms in Multi-Layer Wormhole Networks. 176-184 - Weirong Jiang, Viktor K. Prasanna:
Towards Green Routers: Depth-Bounded Multi-Pipeline Architecture for Power-Efficient IP Lookup. 185-192 - Ting Yuan, Shiyong Zhang, YiPing Zhong, Jianqing Ma:
KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks. 193-200
P2P and Distributed Networks
- João V. P. Gomes, Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro:
Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy. 201-208 - Chunqi Tian, Shihong Zou, LingWei Chu, Shiduan Cheng:
A New Trust Framework Based on Reputation for Unstructured P2P Networks. 209-216 - Yi Luo, D. Manivannan:
Theoretical and Experimental Evaluation of Communication-Induced Checkpointing Protocols in FE Family. 217-224
Application Layer and Network Management II
- Jani Väre, Jyrki Alamaunu, Harri Pekkonen:
Laboratory Measurements and Verification of PSI/SI Transmission in DVB-H Systems. 225-232 - Hankyul You, Dohyun Kim, XuanTung Hoang, Younghee Lee:
A Group-aware Service Discovery Scheme in Ubiquitous Environment using Service Assignment. 233-238 - Fei Li:
Fairness Analysis in Competitive FIFO Buffer Management. 239-246
Wireless Sensor Networks III
- Tiansi Hu, Yunsi Fei:
QELAR: A Q-learning-based Energy-Efficient and Lifetime-Aware Routing Protocol for Underwater Sensor Networks. 247-255 - Yuxing Huang, Qiang Ye, Yanxia Jia:
UD-GEM: A Multi-Path Routing Algorithm for Wireless Sensor Networks. 256-263 - Amar A. Rasheed, Rabi N. Mahapatra:
An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks. 264-270
Application Layer and Network Management III
- Fulu Li, Ramesh Raskar, Andrew Lippman:
Analysis on Probabilistic View Coverage for Image Sensing - A Geometric Approach. 271-280 - Amirali Sharifi, Eyad H. Abed:
Stability Analysis for Communication of Voice and Data Terminals with Packet Reservation Multiple Access Protocol. 281-288 - Muhammad Ikram, Aminul Haque Chowdhury, Hassen Redwan, Jong-bin Koh, Ki-Hyung Kim, Dong-Kyoo Kim:
A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems. 289-296
Potpourri
- DaPeng Wang, Shoubao Yang, Yun Hu, Peng Zhang:
Directional Double Metric Routing in Wireless Mesh Network. 297-302 - Hao Wen, Chuang Lin, Fengyuan Ren, Hongkun Yang, Tao He, Eryk Dutkiewicz:
Joint Adaptive Redundancy and Partial Retransmission for Reliable Transmission in Wireless Sensor Networks. 303-310 - Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang:
A High Scalability P2P Simulation Framework with Measured Realistic Network Layer Support. 311-318
Transport Layer and Optical Burst Switches
- Ritesh Kumar, Jasleen Kaur:
Towards a Queue Sensitilve Transport Protocol. 319-326 - Xingbo Gao, Mostafa A. Bassiouni:
Modeling and Performance Evaluation of Optical Burst Switched Ring Networks with Efficient Adaptive Routing. 327-334 - Aresh Dadlani, Ahmad Khonsari, Mohammad R. Aghajani, Ali Rajabi:
QoS Behavior of Optical Burst Switching under Multimedia Traffic: an Analytical Approach. 335-342
Workshop: The 1st Workshop on Dynamic Spectrum Access and Cognitive Radio Networks
- Li-Chun Wang, Chung-Wei Wang:
Spectrum Handoff for Cognitive Radio Networks: Reactive-Sensing or Proactive-Sensins? 343-348 - Yu-Sheng Wang, Chun-Ting Chou:
Asynchronous Detection and Avoidance (DAA) Protocol for Interference Mitigation in Dynamic Spectrum Access. 349-353 - Sameer Swami, Chittabrata Ghosh, Rucha P. Dhekne, Dharma P. Agrawal, Ken A. Berman:
Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks. 354-359 - Kapil Jaiswal:
Spectral Sensing of Adaptive Frequency Hopping signal for Cognitive Radio. 360-365 - Qinqin Chen, Ying Wang, Charles W. Bostian:
Universal Classifier Synchronizer Demodulator. 366-371 - An He, Srikathyayani Srikanteswara, Jeffrey H. Reed, Xuetao Chen, William H. Tranter, Kyung Kyoon Bae, Masoud Sajadieh:
Minimizing Energy Consumption Using Cognitive Radio. 372-377
Workshop: The 1st IEEE International Workshop on Generation C Wireless Networks
- Allaa R. Hilal, Amal El-Nahas, Ahmed R. Bashandy, Samir I. Shaheen:
Traffic Differentiating Queue For Enhancing AODV Performance in Real-Time Interactive applications. 378-383 - Saman Kolahdooz, Shahpour Rahmani, Mohsen Sharifi:
Discovering Resources in Tuple-Based Pervasive Systems using Resource-Aware Routing. 384-389 - Tae-Hwan Kim, Tae-Jin Lee:
Throughput Enhancement of Macro and Femto Networks By Frequency Reuse and Pilot Sensing. 390-394 - Jun-Bong Eom, Tae-Jin Lee:
RFID Reader Anti-collision Algorithm Using a Server and Mobile Readers Based on Conflict-Free Multiple Access. 395-399 - Fayçal M'hamed Bouyakoub, Abdelkader Belkhir:
Automatic Generation of User's Profiles for Location-Based Adaptation of Multimedia Documents. 400-405 - Lun Zhang, Yan Lu, Lan Chen:
Fuzzy Evaluation for Wireless Sensor Networks Based on Rough Set Theory. 406-411 - Teek Parval Sharma, Ramesh C. Joshi, Manoj Misra:
Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks. 412-417 - Lun Zhang, Dongxiu Ou:
Assessment Strategy with Markov Chain Utilized in Wireless Sensor Networks. 418-421 - Yazan M. Allawi, Mingon Kim, Minho Kang:
Enhanced Scanning Scheme for Delay-Constrained Fast Handoff in IEEE 802.11 WLANs. 422-426 - Kuheli Louha, Jung Hyun Jun, Dharma P. Agrawal:
Exploring Load Balancing in Heterogeneous Networks by Rate Distribution. 427-432
Workshop: The 1st IEEE International Workshop on Network Security and Privacy
- Richard E. Newman, Ira S. Moskowitz:
Practical Covert Channel Implementation through a Timed Mix-Firewall. 433-438 - Mina Guirguis, Jason Valdez:
Masquerading a Wired Covert Channel into a Wireless-like Channel. 439-444 - Hong Qian, Karen Lu, Asad M. Ali:
A Proxy Agent for Small Network-Enabled Devices. 445-449 - Piyi Yang, Zhenfu Cao, Xiaolei Dong:
Threshold Proxy Re-Signature. 450-455 - Jyh-How Huang, John Black, Shivakant Mishra:
Support for Security and Privacy in SenSearch. 456-461 - Mahalingam Ramkumar:
Proxy Aided Key Pre-distribution Schemes for Sensor Networks. 462-468 - Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel:
Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks. 469-474 - Le Xuan Hung, Hassan Jameel, Riaz Ahmed Shaikh, Syed Muhammad Khaliq-ur-Rahman Raazi, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung:
Activity-based Security Scheme for Ubiquitous Environments. 475-481
Workshop: The 1st IEEE International Workshop on Information and Data Assurance
- Jun-Won Ho:
Distributed Detection of Replica Cluster Attacks in Sensor Networks Using Sequential Analysis. 482-485 - Chet Langin, Hongbo Zhou, Shahram Rahimi:
A Model to Use Denied Internet Traffic to Indirectly Discover Internal Network Security Problems. 486-490 - Junghwan Choi, Donghyun Kang, Hyun-Su Jang, Young Ik Eom:
Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments. 491-498 - Reiner Dojen, Fan Zhang, Tom Coffey:
On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks. 499-506 - Cory J. Antosh, Barry E. Mullins:
The Scalability of Secure Lock. 507-512 - Kevin S. Bauer, Harold Gonzales, Damon McCoy:
Mitigating Evil Twin Attacks in 802.11. 513-516 - Sun-il Kim, Nnamdi Nwanze:
Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems. 517-523 - Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary. 524-531
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.