


Остановите войну!
for scientists:


default search action
19th AINA 2005: Fukuoka, Japan
- 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan. IEEE Computer Society 2005, ISBN 0-7695-2249-1
Volume 1
Multimedia Communication and Synchronization
- Emmanuel Bouix, Marc Dalmau, Philippe Roose, Franck Luthon
:
Multimedia Oriented Component Model. 3-8 - Yasutaka Nishimura, Tomoya Enokido, Makoto Takizawa
:
Design of a Hierarchical Group to Realize a Scalable Group. 9-14 - Yun-Sheng Yen, Weimin Chen, Jia-Cheng Zhuang, Han-Chieh Chao:
A Novel Sliding Weighted Fair Queueing Scheme for Multimedia Transmission. 15-20 - Hsu-Chen Cheng, Frank Yeong-Sung Lin:
Maximum-Revenue Multicast Routing and Partial Admission Control for Multirate Multimedia Distribution. 21-26 - Satoshi Itaya, Tomoya Enokido, Makoto Takizawa
:
A High-Performance Multimedia Streaming Model on Multi-Source Streaming Approach in Peer-to-Peer Networks. 27-32
Multi-Agent Systems
- S. Misbah Deen:
A Multi-Agent Framework for a P2P Data Sharing Facility. 35-40 - Bo Liu, Junzhou Luo, Wei Li:
Multi-Agent Based Network Management Task Decomposition and Scheduling. 41-46 - Jun Sawamoto, Hidekazu Tsuji, Dilmurat Tilwaldi, Hisao Koizumi:
A Proposal of Multi-Agent System Development Framework for Cooperative Problem Solving and Its Experimental Evaluation. 47-52 - Guangzhu Chen, Zhishu Li, Daohua Yuan, Nimazhashi:
A Model of Multi-Agent System Based on Immune Evolution. 53-58 - Emad Farazmand, Afsaneh Shokoufi, Caro Lucas, Farzad Habibipour:
Using a Learning Mechanism in Matchmaking Process of Agents' Negotiation in Multi-Agent Systems. 59-64
Ad Hoc Network I
- Zhenjie Huang, Dan Chen, Yumin Wang:
Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. 67-71 - Chyi-Ren Dow, Pei-Jung Lin
, Sheng-Chang Chen, Jyh-Horng Lin, Shiow-Fen Hwang:
A Study of Recent Research Trends and Experimental Guidelines in Mobile Ad Hoc Networks. 72-77 - Masashi Saito, Jun Tsukamoto, Takaaki Umedu, Teruo Higashino:
Evaluation of Inter-Vehicle Ad Hoc Communication Protocol. 78-83 - Fumiaki Sato, Tadanori Mizuno:
A Route Reconstruction Method Based on Support Group Concept for Mobile Ad Hoc Networks. 84-89 - Bing-Hong Liu, Ming-Jer Tsai, Wei-Chei Ko:
Dynamical Construction of a Core-Based Group-Shared Multicast Tree in Mobile Ad Hoc Networks. 90-95
Real-Time Systems and Tracking
- Goichi Itabashi, Kaoru Takahashi, Yasushi Kato, Takuo Sugamma, Norio Shiratori:
Incremental Design of a State Machine Specification for Mobile and Real-Time Systems . 99-104 - Chun-Chao Yeh:
On the Power-Aware Resource Allocation for Linear-Pipelined Real-Time Tasks. 105-110 - Hui-Huang Hsu, Timothy K. Shih, Chia-Tong Tang, Yi-Chun Liao:
Real-Time Multiple Tracking Using a Combined Technique. 111-116 - D. Frank Hsu, Damian M. Lyons:
A Dynamic Pruning and Feature Selection Strategy for Real-Time Tracking. 117-124 - Simon Sheu, Chang-Yeng Cheng, Alan Chang:
Fast Pattern Detection in Stream Data. 125-130
Semantic Based Information Retrieval
- Qing Li
, Jun Yang, Yueting Zhuang:
Multi-Modal Information Retrieval with a Semantic View Mechanism. 133-138 - Mikio Amano, Daisuke Hironaka, Seio Oda, Genci Capi, Masao Yokota:
Linguistic Interpretation of Human Motion Based on Mental Image Directed Semantic Theory. 139-144 - Seksun Suwanmanee, Djamal Benslimane, Philippe Thiran:
OWL-Based Approach for Semantic Interoperability. 145-150 - Anthony Y. Chang:
An Intelligent Semantic Model for the Design of Consistent Online SMIL Presentations. 151-156 - Jason C. Hung, Ching-Sheng Wang, Che-Yu Yang, Mao-Shuen Chiu, George Yee:
Applying Word Sense Disambiguation to Question Answering System for e-Learning. 157-162
Peer-to-Peer and Real-Time Communications
- Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa
, K. H. (Kane) Kim:
Charge-Based Flooding Algorithm for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks. 165-170 - Nobuhiro Nakamura, Souichirou Takahama, Leonard Barolli, Jianhua Ma, Kaoru Sugita:
A Multiplatform P2P System: Its Implementation and Applications. 171-176 - Wei Ren
, Hai Jin:
Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design . 177-182 - Takahide Gouda, Leonard Barolli, Kaoru Sugita, Akio Koyama, Arjan Durresi, Giuseppe De Marco:
Application of Policing Mechanisms for Broadband Networks: Issues and Difficulties. 183-188 - Marco Comuzzi
, Chiara Francalanci, Paolo Giacomazzi:
Trade-Off Based Negotiation of Traffic Conditioning and Service Level Agreements in DiffServ Networks. 189-194
e-Learning and SCORM
- Yoshihito Takahashi, Tomomi Abiko, Eriko Negishi, Goichi Itabashi, Yasushi Kato, Kaoru Takahashi, Norio Shiratori:
An Ontology-Based e-Learning System for Network Security. 197-202 - Hsiau Wen Lin, Wen-Chih Chang, George Yee, Timothy K. Shih, Chun-Chia Wang, Hsuan-Che Yang:
Applying Petri Nets to Model SCORM Learning Sequence Specification in Collaborative Learning. 203-208 - Jun-Ming Su, Shian-Shyong Tseng, Jui-Feng Weng, Kuan-Ting Chen, Yi-Lin Liu, Yi-Ta Tsai:
An Object Based Authoring Tool for Creating SCORM Compliant Course. 209-214 - Mike Hogeboom, Fuhua Oscar Lin
, Larbi Esmahi, Chunsheng Yang:
Constructing Knowledge Bases for e-Learning Using Protege 2000 and Web Services. 215-220 - Sheng-Tun Li, Chu-Hung Lin:
On the Distributed Management of SCORM-Compliant Course Contents. 221-226
Collaborative Environment and Virtual Space
- Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:
Virtual Traditional Japanese Crafting System Using JGNII in Collaborative Work Environment. 229-234 - Kaoru Sugita, Tomoyuki Ishida, Akihiro Miyakawa, Leonard Barolli, Yoshitaka Shibata:
Experimental Result of Feature Extraction Method for Digital Traditional Japanese Crafting System. 235-240 - Toshitada Ishii, Yoshitaka Shibata:
An Interactive Virtual Space Presentation System Considering Users Background. 241-246 - Masaki Ito, Jin Nakazawa, Hideyuki Tokuda:
mPATH: An Interactive Visualization Framework for Behavior History. 247-252 - Naoki Nakashima, Koji Okamura, Joon-Soo Hahm, Young-Woo Kim
, Hiroshi Mizushima, Haruyuki Tatsumi, Byung-In Moon, Ho-Seong Han, Yong-Jin Park
, Jae-Hwa Lee, Sung-Kwan Youm, Chul-Hee Kang, Shuji Shimizu:
Telemedicine with Digital Video Transport System in Asia-Pacific Area. 253-257
Multicast Protocols and Admission Controls
- Kun Zhang, Heng Wang, Feng-Yu Liu:
An Efficient Algorithm Based on Simulated Annealing for Multicast Routing with Delay and Delay Variation Constraints. 261-266 - Hui Tian, Hong Shen:
Hamming Distance and Hop Count Based Classification for Multicast Network Topology Inference. 267-272 - Bo Rong, Maria Bennani, Michel Kadoch
, Ahmed K. Elhakeem:
Bandwidth Fragmentation Avoided QoS Multicast Routing by Employing Admission Control. 273-278 - Wen-Tsuen Chen, Ho-Ling Hsu, Jeng-Long Chiang:
Logical Key Tree Based Secure Multicast Protocol with Copyright Protection. 279-284
Grid Computing
- Dang Minh Quan, Odej Kao:
On Architecture for SLA-Aware Workflows in Grid Environments. 287-292 - Mingkui Yang, Hongbing Liang, Bin Xu:
S-WFMS: A Service-Based Workflow Management System in Grid Environment. 293-297 - Chao-Tung Yang
, Yi-Chun Hsiung, Heng-Chuan Kan:
Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications. 298-303 - Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang
, Po-Chi Shih:
Integrating Grid with Intrusion Detection. 304-309 - Stephen Childs, Brian A. Coghlan, David O'Callaghan, Geoff Quigley, John Walsh:
A Single-Computer Grid Gateway Using Virtual Machines. 310-315
Sensor Network
- Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, Chun-Yu Lin:
A Probabilistic Signal-Strength-Based Evaluation Methodology for Sensor Network Deployment. 319-324 - Chih-Wei Shiou, Frank Yeong-Sung Lin, Hsu-Chen Cheng, Yean-Fu Wen:
Optimal Energy-Efficient Routing for Wireless Sensor Networks. 325-330 - Lok Hang Lee, Man Hon Wong:
Aggregate Sum Retrieval in Sensor Network by Distributed Prefix Sum Data Cube. 331-336 - Ren C. Luo, Ogst Chen, Liang Chao Tu:
Nodes Localization through Data Fusion in Sensor Network. 337-342 - Arjan Durresi, Vamsi Paruchuri:
Geometric Broadcast Protocol for Sensor and Actor Networks. 343-348
Agent and Distributed Systems I
- Ying-Hong Wang, Huan-Chao Keh, Tsang-Ching Hu, Cheng-Horng Liao:
A Hierarchical Dynamic Monitoring Mechanism for Mobile Agent Location. 351-356 - Min Yang, Shao-yin Huang, Zhi Wang, Zunping Cheng, Dilin Mao, Chuanshan Gao:
PICC: A Secure Mobile Agent Framework Based on Garbled Circuit. 357-362 - Gen Kitagata, Yu Matsushima, Daisuke Hasegawa, Tetsuo Kinoshita
, Norio Shiratori:
An Agent-Based Middleware for Communication Service on Ad Hoc Network. 363-367 - Youhei Tanaka, Tomoya Enokido, Makoto Takizawa
:
Design and Implementation of Transactional Agents for Manipulating Distributed Objects. 368-373 - George Yee, Larry Korba:
An Agent Architecture for e-Services Privacy Policy Compliance. 374-379
Security and Authentication Protocols
- Heping Hu, Hanbing Yao:
A Scheme for Authentication and Authorization in a Grid Application. 383-387 - Tianjie Cao, Dongdai Lin, Rui Xue:
An Efficient ID-Based Deniable Authentication Protocol from Pairings. 388-391 - Chung-Ming Huang, Jian-Wei Li:
Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. 392-397 - Fangguo Zhang, Yi Mu, Willy Susilo
:
Reducing Security Overhead for Mobile Networks. 398-403
Ad Hoc Network II
- Yi-Chung Chen, Jang-Ping Sheu:
Interest-Based Lookup Protocols for Mobile Ad Hoc Networks. 407-413 - Wen-Lin Yang:
Constructing Energy-Efficient Multicast Trees with Delay Constraints in Ad Hoc Networks. 414-419 - Kuei-Ping Shih, Chih-Yung Chang, Chien-Min Chou, Szu-Min Chen:
A Power Saving MAC Protocol by Increasing Spatial Reuse for IEEE 802.11 Ad Hoc WLANs. 420-425 - Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Constantinou:
A Biologically Inspired QoS Routing Algorithm for Mobile Ad Hoc Networks. 426-431 - Wei-Yeh Chen, Jean-Lien C. Wu:
Performance Analysis of Radio Resource Allocation for Multimedia Traffic in Cellular Networks. 432-437
Routing Algorithms
- Chung-Min Chen, Yibei Ling, Marcus Pang, Wai Chen, Shengwei Cai, Yoshihisa Suwa, Onur Altintas:
Scalable Request Routing with Next-Neighbor Load Sharing in Multi-Server Environments. 441-446 - Harri Paloheimo, Antti Ylä-Jääski:
Interoperability of MANET and 4G RAN Routing in Terms of Energy Conservation. 447-452 - Ashraf Uddin Ahmed, Senro Saito, Zixue Cheng:
Zone-Based Routing Algorithm for Congestion Control over the Internet. 453-458 - Sing-Ling Lee, Jung-Chun Liu, YuChing Chen:
An Ear-Decomposition Based Approach for Survivable Routing in WDM Networks. 459-464 - Yan Shi, Zengji Liu, Zhiliang Qiu, Min Sheng:
Load Balance Based Network Bandwidth Allocation for Delay Sensitive Services. 465-470
Admission Control
- Leonard Barolli, Mimoza Durresi, Kaoru Sugita, Arjan Durresi, Akio Koyama:
A CAC Scheme for Multimedia Applications Based on Fuzzy Logic. 473-478 - Deyun Gao, Jianfei Cai
, Liren Zhang:
Physical Rate Based Admission Control for HCCA in IEEE 802.11e WLANs. 479-483 - Changhua Zhu, Changxing Pei, Jiandong Li, Weidong Kou:
QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLAN. 484-487 - Song Xiao, Chengke Wu, Jechang Jeong:
Robust Video Communication Based on Source Modeling and Network Congestion Control. 488-491
Web-Based Systems
- Mario A. Bochicchio
, Nicola Fiore:
Supporting the Conceptual Modeling of Web Applications: The MODE Project. 495-500 - Guillermo de Jesús Hoyos-Rivera, Roberta Lima-Gomes, Jean-Pierre Courtiat:
CoLab: A Flexible Collaborative Web Browsing Tool. 501-506 - Wai Yip Lum
, Francis Chi-Moon Lau:
User-Centric Adaptation of Structured Web Documents for Small Devices. 507-512 - Wassam Zahreddine, Qusay H. Mahmoud
:
A Framework for Automatic and Dynamic Composition of Personalized Web Services. 513-518 - Yeim-Kuan Chang, Ming-Hong Hong, Yi-Wei Ting:
Web-Based Energy-Efficient Cache Invalidation in Wireless Mobile Environment. 519-524
Mobile Systems and Applications
- Katsuhiko Sato, Michiaki Katsumoto, Tetsuya Miki:
Fragmented Patching: New VOD Technique That Supports Client Mobility. 527-532 - Shu-Ming Tseng
, Teng-Chuan Lin, Kuan-Fu Huang:
A Low-Complexity Iterative Detector for COFDM in Mobile Channels. 533-537 - Agustinus Borgy Waluyo, Gabriel Goh, David Taniar, Bala Srinivasan:
On Building a Data Broadcasting System for Mobile Databases. 538-543 - Takaaki Umedu, Shigeharu Urata, Akio Nakata, Teruo Higashino:
Automatic Decomposition of Java Program for Implementation on Mobile Terminals. 544-549
Cellular Network and CDMA
- Ben-Jye Chang:
MDP-Based Fast Handoff with Reducing Waste Rate Method for Management Radio Resource in 3GPP Cellular Networks. 553-558 - Junyang Zhou, Kenneth Man-Kin Chu, Joseph Kee-Yin Ng:
Providing Location Services within a Radio Cellular Network Using Ellipse Propagation Model. 559-564 - Shu-Ming Tseng
, Hung-Chieh Yu, Chi-Lung Chang, Yuan-Ching Tseng, Kuen-Cherng Lin:
EM Vector Channel Estimation and V-BLAST/PIC Detection for Multiuser Long-Code MIMO CDMA in Multipath Rayleigh Fading Channels. 565-569 - Jen-Shun Yang, Chien-Chao Tseng
, Ray-Guang Cheng
:
A Signal-to-Interference Ratio Based Downlink Scheduling Scheme for WCDMA Mobile Communication System. 570-575 - Po-Jen Chuang, Shien-Da Chang:
Performance Analysis on Location Tracking in PCS Networks. 576-582
Encryption and Privacy
- Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen:
An Efficient Decryption Method for RSA Cryptosystem. 585-590 - Tianjie Cao, Dongdai Lin, Rui Xue:
ID-Based Ring Authenticated Encryption. 591-596 - Sheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin:
Key Agreement Protocol Based on Weil Pairing. 597-602 - Willy Susilo
, Fangguo Zhang, Yi Mu:
Privacy-Enhanced Internet Storage. 603-608 - Zhenjie Huang, Zhixiong Chen, Yumin Wang:
Convertible Undeniable Partially Blind Signatures. 609-614
Search Engine and Information Retrieval
- Simon Sheu, Alan Chang, Webber Huang:
Fast Similarity Search in String Databases. 617-622 - Hao-ming Wang, Boqin Feng:
Research of the Chinese Meta-search Engine Model Based on Intelligent Agent. 623-628 - Bo Yang, Ali R. Hurson
:
Ad Hoc Image Retrieval Using Hierarchical Semantic-Based Index. 629-634 - Nobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai:
The Evaluations of FTF-IDF Scoring for Fresh Information Retrieval. 635-640 - Nen-Fu Huang, Rong-Tai Liu, Chih-Hao Chen, Ying-Tsuen Chen, Li-Wen Huang:
A Fast URL Lookup Engine for Content-Aware Multi-Gigabit Switches. 641-646
Distributed Systems
- Shin-Jia Hwang, Kuang-Hsi Chen:
A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection. 649-654 - János Tapolcai
, Pin-Han Ho, Xiaohong Jiang, Susumu Horiguchi:
Shared Protection Based on Matrix Decomposition in Tropical Semi-Rings. 655-660 - Satoshi Fujita, Shigeaki Tagashira, Chen Qiao, Masaya Mito:
Distributed Branch-and-Bound Scheme for Solving the Winner Determination Problem in Combinatorial Auctions. 661-666 - Jingde Cheng:
Connecting Components with Soft System Buses: A New Methodology for Design, Development, and Maintenance of Reconfigurable, Ubiquitous, and Persistent Reactive Systems. 667-672
Agent and Distributed Systems II
- Yu Jiao, Ali R. Hurson
:
Adaptive Power Management for Mobile Agent-Based Information Retrieval. 675-680 - Prasanna Lokuge, Damminda Alahakoon:
Reinforcement Learning in Neuro BDI Agents for Achieving Agent's Intentions in Vessel Berthing Applications. 681-686 - Sameera Abar
, Hideaki Hatori, Toru Abe, Tetsuo Kinoshita
:
Agent-Based Knowledge Acquisition in Network Management Domain. 687-692 - Ssu-Hsuan Lu, Chun-Chieh Yang, Hsiao-Hsi Wang, Kuan-Ching Li
:
On Design of Agent Home Scheme for Prefetching Strategy in DSM Systems. 693-698 - Jun'ichi Yura, Jin Nakazawa, Hideyuki Tokuda:
Galaxy DS: Directory Service for Service Composition Based on Smart Space Structure. 699-704
Security, Cryptographic, and Watermarking
- Yuichi Nakamura, Hiroaki Kikuchi:
Efficient Key Management Based on the Subset Difference Method for Secure Group Communication. 707-712 - Fan Hong, Liang Hong, Cai Fu:
Secure OLSR. 713-718 - Jiali Cao, Zheng-an Yao:
An Improved RSA-Based Access Control Scheme for Hierarchical Groups. 719-723 - Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang:
An AES S-Box to Increase Complexity and Cryptographic Analysis. 724-728 - Ying-Lan Chang, Koun-Tem Sun, Yueh-Hong Chen:
ART2-Based Genetic Watermarking. 729-734
Caching Algorithms and Scheduling
- Rachid El Abdouni Khayari, Michael Best, Axel Lehmann:
Impact of Document Types on the Performance of Caching Algorithms in WWW Proxies: A Trace Driven Simulation Study. 737-742 - Hai Jin, Chao Xie, Kaiqin Fan, Rong Hu, Yunfa Li
:
Single Stream Image and Stream Network Prefetch in Streaming Media Proxy Caching. 743-748 - Iftekhar Ahmad
, Joarder Kamruzzaman
, Srinivas Aswathanarayaniah:
An Improved Preemption Policy for Higher User Satisfaction. 749-754