


default search action
1. NBiS 2007: Regensburg, Germany
- Tomoya Enokido, Leonard Barolli, Makoto Takizawa:

Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings. Lecture Notes in Computer Science 4658, Springer 2007, ISBN 978-3-540-74572-3
Sensor and Ad-Hoc Networks
- Makoto Ikeda, Giuseppe De Marco, Leonard Barolli:

A Simple Statistical Methodology for Testing Ad Hoc Networks. 1-10 - Kiyohiro Morita, Keiji Ozaki, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:

Sensor-Actuator Communication Protocols in Wireless Networks. 11-19 - Consolee Mbarushimana, Alireza Shahrabi

, Hadi Larijani:
The Effect of Routing Protocol Dynamics on TCP Performance in Mobile Ad Hoc Networks. 20-29 - Fumiaki Sato, Sumito Iijima:

Battery and Power Aware Routing in Mobile Ad Hoc Networks. 30-39 - Yoshitaka Shibata, Yosuke Sato, Kazuya Sakakibara, Kazuo Takahata:

Wireless Balloon Network for Disaster Information System. 40-48 - Krzysztof Gierlowski, Krzysztof Nowicki:

Wireless Networks as an Infrastructure for Mission-Critical Business Applications. 49-58
Network Security
- Iksu Kim, Myungho Kim

:
The DecoyPort: Redirecting Hackers to Honeypots. 59-68 - Yeu-Pong Lai, Jui-Heng Tai:

Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard. 69-78 - Sylvia B. Encheva, Sharil Tumin:

Positive and Negative Authorizations to Access Protected Web Resources. 79-87 - Taeshik Shon, Wook Choi:

An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. 88-97 - Jin-Cherng Lin, Jan-Min Chen, Hsing-Kuo Wong:

An Automatic Meta-revised Mechanism for Anti-malicious Injection. 98-107 - Chizuro Sakamoto, Giuseppe De Marco, Rihito Yaegashi, Masaharu Tadauchi, Leonard Barolli:

SKEMON: A Simple Certificate-Less Method for Key Exchange by Using Mobile Network. 108-117
Secure System Applications
- Chin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan:

A Secure Authentication Scheme for a Public Terminal Before a Transaction. 118-126 - Michitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:

Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. 127-136 - Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng:

A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept. 137-146 - Kuang-Hui Chi, Ji-Han Jiang, Yu-Ching Hsu:

Multigroup Rekeying for a Wireless Network. 147-156
Web Technologies and Middleware Systems
- Matthias Häsel:

Rich Internet Architectures for Browser-Based Multiplayer Real-Time Games - Design and Implementation Issues of virtual-kicker.com. 157-166 - Po-Jen Chuang, Chu-Sing Yang, Ming-Chao Chiang:

Distribution of Lecture Concepts and Relations in Digital Contents. 167-176 - Yuebin Bai, Haixing Ji, Huabin Lu, Chao Li, Qi Zou, Peng Lv:

Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart Environment. 177-186 - Walter Colitti, Kris Steenhaut, Ann Nowé, Jan Lemeire:

Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM Networks. 187-196
Distributed Systems and Applications
- Nuno Lopes

, Carlos Baquero:
Implementing Range Queries with a Decentralized Balanced Tree over Distributed Hash Tables. 197-206 - Kai Han, Binoy Ravindran

, E. Douglas Jensen:
Byzantine-Tolerant, Information Propagation in Untrustworthy and Unreliable Networks. 207-216 - Ludmila Himmelspach, Mehmet Kolac, Krasimir Kutsarov, Alexander Chernin, Christopher Popfinger, Stefan Conrad:

COMICS: A Global Constraint Manager for Interactive Component Database Systems. 217-226 - Valbona Barolli, Heihachiro Fukuda, Leonard Barolli, Makoto Takizawa:

Guidelines for Network Service Pricing: An Extended Model Considering Increase of Network Users. 227-237
Scheduling
- Tomoya Enokido, Valbona Barolli, Makoto Takizawa:

Role-Based Scheduling and Synchronization Algorithms to Prevent Illegal Information Flow. 238-247 - André Trudel, Elhadi M. Shakshuki, Yiqing Xu:

A Probabilistic Multi-agent Scheduler Implemented in JXTA. 248-257 - Kwok-Wa Lam, Sheung-lun Hung:

Scheduling Real-Time Requests in On-Demand Broadcast Environments. 258-267 - Chih-Ming Wang, Chu-Sing Yang, Ming-Chao Chiang:

A Fair Replica Placement for Parallel Download on Cluster Grid. 268-277
Network Analysis
- Jan Sedmidubský, Stanislav Barton, Vlastislav Dohnal

, Pavel Zezula:
Querying Similarity in Metric Social Networks. 278-287 - Aamir Siddique, Abdalla M. Hanashi, Irfan Awan, Michael E. Woodward:

Performance Evaluation of Dynamic Probabilistic Flooding Using Local Density Information in MANETs. 288-297 - Salvador Alcaraz, Katja Gilly, Carlos Juiz, Ramón Puigjaner:

A Token Bucket Model with Assured Forwarding for Web Traffic. 298-307 - Natalia Kryvinska

, Peter Zinterhof, Do Van Thanh:
An Analytical Approach to the Efficient Real-Time Events/Services Handling in Converged Network Environment. 308-316 - Toshihiko Yamakami:

Command Transition Probability Analysis on Mobile Internet Command Sequences. 317-324 - Young-Duk Kim, Yeon-Mo Yang, Dong-Ha Lee:

A Solution for Congestion and Performance Enhancement by Dynamic Packet Bursting in Mobile Ad Hoc Networks. 325-334
P2P Systems and Applications
- Markus Aleksy

, Martin Schader, Christian Seifried, Makoto Takizawa:
Empirical Study of Design Pattern Usage in Peer-to-Peer Systems. 335-344 - Fatos Xhafa, Raul Fernandez, Thanasis Daradoumis, Leonard Barolli, Santi Caballé

:
Improvement of JXTA Protocols for Supporting Reliable Distributed Applications in P2P Systems. 345-354 - Oliver Haase, Alfred Toth, Jürgen Wäsch:

A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications. 355-364 - David C. Faye, Gilles Nachouki, Patrick Valduriez:

Semantic Query Routing in SenPeer, a P2P Data Management System. 365-374 - Kasame Tritrakan, Pakit Kanchana, Veera Muangsin

:
Jamjuree Cluster: A Peer-to-Peer Cluster Computing System. 375-384 - Nobuyoshi Sato, Minoru Uehara, Koichiro Shimomura, Hirobumi Yamamoto, Ken'ichi Kamijo:

Evaluations on Classified Selection of Dense Vectors for Vegetable Geographical Origin Identification System Using Trace Elements. 385-396
Pervasive and Ubiquitous Systems
- Arjan Durresi, Arben Merkoci, Mimoza Durresi, Leonard Barolli:

Integrated Biomedical System for Ubiquitous Health Monitoring. 397-405 - Tuyet-Tram Dang-Ngoc, Nicolas Travers:

Tree Graph Views for a Distributed Pervasive Environment. 406-415 - MinHwan Ok, Ja-Won Seo, Myong-Soon Park:

A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing. 416-425 - Zhefan Jiang, Sangwook Kim:

Trust Model for Mobile Devices in Ubiquitous Environment. 426-434
Network Applications and Protocols
- Enrique Pena, Miguel Rios, Christian Oberli, Vladimir Marianov

:
PoQBA: A New Path Admission Control for Diffserv Networks. 435-445 - Waqas Ahmad, Irfan Awan, Makoto Takizawa:

An Adaptive Call Admission Control Approach for Multimedia 3G Network. 446-455 - Sangbin Lee, Younghwan Jung, Woojin Park, Sunshin An:

Spatial Correlation Code Based Data Aggregation Scheme for Maximizing Network Lifetime. 456-465 - Dayin Promkotwong, Ohm Sornil:

A Mesh-Based QoS Aware Multicast Routing Protocol. 466-475
Embedded Systems
- Erianto Chai, Minoru Uehara, Hideki Mori, Nobuyoshi Sato:

Virtual Large-Scale Disk System for PC-Room. 476-485 - Sylvia B. Encheva, Sharil Tumin:

Application of Default Logic in an Intelligent Tutoring System. 486-494 - Yong-Ju Lee, SongWoo Sok, Hag-Young Kim, Myung-Joon Kim, Cheolhoon Lee:

Consolidating with Media Streaming Server and Network Storage Card. 495-504 - Shinya Toji, Minoru Uehara, Hideki Mori:

Design of the Tile-Based Embedded Multimedia Processor -TEMP-. 505-512
Fuzzy Systems and Their Applications
- Leonard Barolli, Arjan Durresi, Fatos Xhafa, Akio Koyama:

A Fuzzy-Based Speed-Aware Handoff System for Wireless Cellular Networks. 513-522 - Jung-Hyun Kim, Kwang-Seok Hong:

WPS and Voice-XML-Based Multi-Modal Fusion Agent Using SNNR and Fuzzy Value. 523-532 - Kun-Ming Yu, Zhi-Jie Luo, Chih-Hsun Chou, Cheng-Kwan Chen, Jiayi Zhou:

A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational Grids. 533-542

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














