


Остановите войну!
for scientists:


default search action
24th AINA 2010: Perth, Australia
- 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4018-4
Keynote Speeches
- Lyn Beazley:
The Crucial Role of Information Communication Technology in Western Australia. 1 - Michael L. Brodie:
Data Integration at Scale: From Relational Data Integration to Information Ecosystems. 2-3 - Bogdan M. Wilamowski:
Design of Network Based Software. 4-10 - Ian H. White, Michael J. Crisp
, Richard V. Penty:
A Photonics Based Intelligent Airport Surveillance and Tracking System. 11-16 - A Min Tjoa:
Next Decade of Social, Economical and Ethical Challenges. 17-18 - Hai Zhuge:
Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical Society. 19-26 - Tharam S. Dillon, Chen Wu, Elizabeth Chang
:
Cloud Computing: Issues and Challenges. 27-33 - Kwei-Jay Lin, Joe Zou, Yan Wang:
Accountability Computing for E-society. 34-41
Performance Modelling and Evaluation 1
- Rasha Osman
, Irfan-Ullah Awan, Michael E. Woodward:
Performance Evaluation of Database Designs. 42-49 - Amina Al-Sawaai, Irfan-Ullah Awan, Rod J. Fretwell:
Performance of Weighted Fair Queuing System with Multi-class Jobs. 50-57 - Luciana Arantes
, Maria Gradinariu Potop-Butucaru, Pierre Sens
, Mathieu Valero:
Enhanced DR-Tree for Low Latency Filtering in Publish/Subscribe Systems. 58-65 - Lee Booi Lim, Lin Guan
, Alan Grigg, Iain W. Phillips, Xingang Wang
, Irfan-Ullah Awan:
RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival Proccess. 66-73
Performance Modelling and Evaluation 2
- Hanliu Chen, Oliver W. W. Yang, Yang Hong:
Performance Analysis of VCP Controller on DCCP Traffic. 74-81 - Pavan Roy Marupally, Vamsi Paruchuri:
Comparative Analysis and Evaluation of Botnet Command and Control Models. 82-89 - Glêdson Elias da Silveira, Mateus Novaes, Gustavo Cavalcanti, Daniel Charles Ferreira Porto:
Simulation-Based Performance Evaluation of the SNDP Protocol for Infrastructure WMNs. 90-97
Routing and Broadcast Mechanism
- Luobei Kuang, Ming Xu, Zhijun Wang:
An Adaptive Routing Protocol for Bus Networks. 98-104 - Arjan Durresi, Vamsi Paruchuri, Leonard Barolli:
Adaptive Clustering Protocol for Wireless Networks. 105-111 - Ting-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen
:
PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network. 112-119 - Jaipal Singh:
Multicast QoS Routing Using Collaborative Path Exploration. 120-125
Distributed and Parallel Systems 1
- Rodrigue Chakode, Jean-François Méhaut, Francois Charlet:
High Performance Computing on Demand: Sharing and Mutualization of Clusters. 126-133 - Yuji Nakamura, Minoru Uehara:
An Implementation of NaryRAID. 134-141 - Tomoya Enokido, Kota Suzuki, Ailixier Aikebaier, Makoto Takizawa
:
Algorithms for Reducing the Total Power Consumption in Data Communication-Based Applications. 142-149 - Mohammed Goryawala, Magno R. Guillen
, Ruchir N. Bhatt, Anthony J. McGoron, Malek Adjouadi:
A Comparative Study on the Performance of the Parallel and Distributing Computing Operation in MatLab. 150-157
Distributed and Parallel Systems 2
- Chonglei Mei, Hai Jiang, Jeff Jenness:
Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data Assignments. 158-165 - Leonardo Mostarda, Srdjan Marinovic, Naranker Dulay:
Distributed Orchestration of Pervasive Services. 166-173 - Haibiao Chen, Beihong Jin, Fengliang Qi:
Integrating Load Balancing into Channelization Strategy in Publish/Subscribe. 174-181 - Feng Cheng, Thanh-Dien Tran
, Sebastian Roschke, Christoph Meinel:
A Specialized Tool for Simulating Lock-Keeper Data Transfer. 182-189
Distributed and Parallel Systems 3
- Reza Holakouei, Adão Silva
, Atílio Gameiro:
Transmit Power Allocation for Precoded Distributed MIMO OFDM Systems. 190-197 - Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding
, Rebecca Kern, Jianhua Yang:
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. 198-205 - François Bonnet
, Michel Raynal:
Consensus in Anonymous Distributed Systems: Is There a Weakest Failure Detector?. 206-213 - Pedro T. Isaías
, Cristiane Casaca, Sara Pífano:
Recommender Systems for Human Resources Task Assignment. 214-221
Service Oriented Architecture
- Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajkumar Buyya:
Minimizing Execution Costs when Using Globally Distributed Cloud Services. 222-229 - Lizhe Wang
, Gregor von Laszewski
, Marcel Kunze, Jie Tao:
Schedule Distributed Virtual Machines in a Service Oriented Environment. 230-236 - Youakim Badr
, Guy Caplat:
Software-as-a-Service and Versionology: Towards Innovative Service Differentiation. 237-243 - Jian Yu, Quan Z. Sheng
, Paolo Falcarin
:
A Visual Semantic Service Browser Supporting User-Centric Service Composition. 244-251
Communication Technology and Protocols 1
- Walter Wong, Marcus Vinícius Lahr Giraldi, Maurício F. Magalhães, Fábio Luciano Verdi:
An Identifier-Based Architecture for Native Vertical Handover Support. 252-259 - Kazuya Odagiri, Shogo Shimizu, Rihito Yaegashi, Masaharu Takizawa, Naohiro Ishii:
DACS System's Implementation Method to Realize the Next Generation Policy-Based Network Management Scheme. 260-267 - Isamu Tsuneizumi, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa
:
A Scalable Peer-to-Peer Group Communication Protocol. 268-275 - Martin Bateman, Saleem N. Bhatti
:
TCP Testing: How Well Does ns2 Match Reality?. 276-284
Communication Technology and Protocols 2
- Jeongkeun Lee, Puneet Sharma, Jean Tourrilhes, Rick McGeer, Jack Brassil, Andy C. Bavier:
Network Integrated Transparent TCP Accelerator. 285-292 - Jueping Cai, Zheng Liu, Ming Du, Zan Li, Lei Yao:
Integrated Modeling, Generation and Optimization for Packet based NoC Topology. 293-298 - Khalid A. Darabkh
, Backer N. Abu-Jaradeh:
Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. 299-303 - Ruen Chze Loh, Sieteng Soh
, Mihai M. Lazarescu
:
Maximizing Bandwidth Using Disjoint Paths. 304-311
Communication Technology and Protocols 3
- Thomas Dreibholz
, Martin Becke, Jobin Pulinthanath, Erwin P. Rathgeb:
Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer. 312-319 - Changwoo Lee, Wonjun Lee:
Exploiting Spectrum Usage Patterns for Efficient Spectrum Management in Cognitive Radio Networks. 320-327 - Johannes Ulrich Herrmann
:
Improving Reliability Calculation with Augmented Binary Decision Diagrams. 328-333 - Ye Huang, Amos Brocco, Nik Bessis
, Pierre Kuonen, Béat Hirsbrunner:
Community-Aware Scheduling Protocol for Grids. 334-341
Autonomic and Advanced Network Systems 1
- Tarem Ahmed
:
Flow Vector Prediction in Large IP Networks. 342-349 - Nidhal Kamel Taha El-Omari, Mohamad Hisham Alzaghal
:
Utilizing WiMAX as a Public Safety Network in Jordan. 350-355 - Zheng Liu, Jueping Cai, Ming Du, Lei Yao, Zan Li:
Hybrid Communication Reconfigurable Network on Chip for MPSoC. 356-361 - Boyoung Rhee, Sunyoung Han:
An Overlay Multicast that Supports a Distinguished QoS Based on Service Levels and User Environments in the Next Generation Network. 362-368
Autonomic and Advanced Network Systems 2
- Satya Krishna Pindiproli, Kishore Kothapalli:
The Power of Orientation in Symmetry-Breaking. 369-376 - Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara
:
A PCA Analysis of Daily Unwanted Traffic. 377-384 - Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su:
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS. 385-391 - Nashid Shahriar
, Syed Ashker Ibne Mujib, Arup Raton Roy, Ashikur Rahman:
Iterative Route Discovery in AODV. 392-399
Internet Computing and Applications 1
- Suraj Pandey, Linlin Wu, Siddeswara Mayura Guru
, Rajkumar Buyya:
A Particle Swarm Optimization-Based Heuristic for Scheduling Workflow Applications in Cloud Computing Environments. 400-407 - Patricia Takako Endo
, Djamel Fawzi Hadj Sadok:
Whois Based Geolocation: A Strategy to Geolocate Internet Hosts. 408-413 - Krzysztof Sledziewski, Behzad Bordbar, Rachid Anane
:
A DSL-Based Approach to Software Development and Deployment on Cloud. 414-421 - Mohammed Jubaer Arif, Shanika Karunasekera
, Santosh Kulkarni, Ajith Gunatilaka, Branko Ristic
:
Internet Host Geolocation Using Maximum Likelihood Estimation Technique. 422-429
Internet Computing and Applications 2
- Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigaki:
CAPTCHA Using Strangeness in Machine Translation. 430-437 - Masayuki Fukumitsu, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. 438-445 - Bhathiya Wickremasinghe, Rodrigo N. Calheiros
, Rajkumar Buyya:
CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications. 446-452 - Justus Bross, Matthias Quasthoff, Philipp Berger, Patrick Hennig, Christoph Meinel:
Mapping the Blogosphere with RSS-Feeds. 453-460
Ad Hoc and Sensor Networks 1
- Xue Xin, Xiaohui Li, Yongqiang Hei, Weiyi Yin, Guanghui Yu:
A Modified QRD-M Algorithm Based on Layer Branch Pruning for MIMO Systems. 461-464 - Fatos Xhafa
, Christian Sánchez, Leonard Barolli:
Genetic Algorithms for Efficient Placement of Router Nodes in Wireless Mesh Networks. 465-472 - Ranjan Panda, Damith Chinthana Ranasinghe, Ajith Kumar Parlikad
, Duncan C. McFarlane:
A Condition Monitoring Platform Using COTS Wireless Sensor Networks: Lessons and Experience. 473-480 - Kwan-Wu Chin
, Sieteng Soh
, Chen Meng:
A Novel Spatial TDMA Scheduler for Concurrent Transmit/Receive Wireless Mesh Networks. 481-488
Ad Hoc and Sensor Networks 2
- Keyvan Kashkouli Nejad, Xiaohong Jiang, Jianhua Ma:
Probabilistic Proactive Routing with Active Route Trace-Back for Highly Mobile Ad Hoc Networks. 489-494 - Makoto Ikeda, Masahiro Hiyama, Leonard Barolli, Fatos Xhafa
, Arjan Durresi, Makoto Takizawa
:
Mobility Effects of Wireless Multi-hop Networks in Indoor Scenarios. 495-502 - Yves Mahéo, Romeo Said:
Service Invocation over Content-Based Communication in Disconnected Mobile Ad Hoc Networks. 503-510 - Bezawada Bruhadeshwar
, Kishore Kothapalli, Indira Radhika Pulla:
A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks. 511-518
Ad Hoc and Sensor Networks 3
- Nobutoshi Abe, Yusuke Arai, Michiko Nishiyama, Norihiko Shinomiya, Kazuhiro Watanabe, Yoshimi Teshigawara:
A Study on Sensor Multiplicity in Optical Fiber Sensor Networks. 519-525 - Subrata Saha, Syed Rafiul Hussain, Ashikur Rahman:
RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks. 526-532 - Michael A. Osborne, Roman Garnett, Stephen J. Roberts:
Active Data Selection for Sensor Networks with Faults and Changepoints. 533-540 - Stepan Ivanov
, Dmitri Botvich, Sasitharan Balasubramaniam
:
Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks. 541-547 - Takahiro Hara, Sanjay Kumar Madria, Shojiro Nishio:
Investigating Impact of Quorum Construction on Data Processing in Mobile Ad Hoc Networks. 548-555
Privacy and Trust Management
- Tran Hong Ngoc, Isao Echizen, Komei Kamiyama, Hiroshi Yoshiura:
New Approach to Quantification of Privacy on Social Network Sites. 556-564 - Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa
:
Trustworthiness among Peer Processes in Distributed Agreement Protocol. 565-572 - Minako Tada, Hiroaki Kikuchi, Sutheera Puntheeranurak
:
Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items. 573-578 - Sazia Parvin, Song Han, Li Gao, Farookh Khadeer Hussain, Elizabeth Chang
:
Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks. 579-583
Mobile Networks and Applications 1
- Wei Liu, Zhoujun Li:
A Tree Graph Model Based on Mobile Environment. 584-591 - Ryozo Kiyohara, Satoshi Mii:
BPE Acceleration Technique for S/W Update for Mobile Phones. 592-599 - Houda Labiod, Nedal Ababneh
, Miguel Garcia de la Fuente:
An Efficient Scalable Trajectory Based Forwarding Scheme for VANETs. 600-606 - Chung-Ming Huang, Chia-Ching Yang, Chun-Ming Hu:
An Efficient Telematics Service Discovery Scheme over the Centralized Vehicular Peer-to-Peer (C-VP2P) Telematics Service Platform. 607-613
Mobile Networks and Applications 2
- Chung-Ming Huang, Ming-Sian Lin, Wen-Yao Chang:
A Novel Cache Management Using Geographically Partial Matching for Location-Based Services. 614-619 - Waskitho Wibisono, Arkady B. Zaslavsky, Sea Ling:
CoMiHoC: A Middleware Framework for Context Management in MANET Environment. 620-627 - Hoon Choi, Sanghyun Son, Jamje Kim, Yunju Baek:
RF-Based Indoor Locating System for NLOS Environment. 628-633
Mobile Networks and Applications 3
- Anas Al-Roubaiey
, Tarek R. Sheltami
, Ashraf S. Mahmoud
, Elhadi M. Shakshuki
, Hussein T. Mouftah:
AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. 634-640
Mobile Networks and Applications 4
- Mohamed Alnas, Irfan-Ullah Awan, D. R. W. Holton:
A Cross-Layer Decision for Mobile IP Handover. 641-646 - Rakesh Shrestha
, Kyong-Heon Han, Dong-You Choi, Seung Jo Han:
A Novel Cross Layer Intrusion Detection System in MANET. 647-654 - Li Gao, Elizabeth Chang
, Sazia Parvin, Song Han, Tharam S. Dillon:
A Secure Key Management Model for Wireless Mesh Networks. 655-660
Multimedia Systems and Applications
- Salvatore Vitabile
, Alessandra De Paola
, Filippo Sorbello:
Bright Pupil Detection in an Embedded, Real-Time Drowsiness Monitoring System. 661-668 - Byung-Seok Kang
, Kwangcheol Shin, In-Young Ko, Pyoung-Yun Kim:
A Transport Protocol for Multimedia Transmission in Overlay Networks. 669-674 - Naixue Xiong, Shuixian Chen, Jing He, Yanxiang He, Athanasios V. Vasilakos
, Jong Hyuk Park, Yan Yang:
A Survey on Multimedia Communicating Technology Based on Spatial Audio Coding. 675-681
Pervasive and Ubiquitous Computing
- Noha Ibrahim, Stéphane Frénot, Frédéric Le Mouël:
User-Excentric Service Composition in Pervasive Environments. 682-689 - José Bringel Filho, Alina Dia Miron, Ichiro Satoh, Jérôme Gensel
, Hervé Martin:
Modeling and Measuring Quality of Context Information in Pervasive Environments. 690-697 - Julia Kantorovitch
, Ilkka Niskanen:
Interactive Home Supervision Application. 698-704 - Muhammad Younas, Soraya Kouadri Mostéfaoui:
Context-Aware Mobile Services Transactions. 705-712 - Alvin C. Valera
, Hwee Pink Tan, Xiaoping Ma:
Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study. 713-720
Security Intrusion Detection Systems 1
- Silvio Cesare, Yang Xiang
:
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. 721-728 - Igor Nai Fovino, Andrea Carcano, Thibault De Lacheze Murel, Alberto Trombetta
, Marcelo Masera:
Modbus/DNP3 State-Based Intrusion Detection System. 729-736 - Salman Niksefat, Masoud Sabaei:
Efficient Algorithms for Dynamic Detection and Resolution of IPSec/VPN Security Policy Conflicts. 737-744 - Xiujie Zhang, Mingxing He:
Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes. 745-752
Security Intrusion Detection Systems 2
- Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, Andrea J. Cullen, Pravin Mirchandani:
MARS: Multi-stage Attack Recognition System. 753-759 - Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin
:
Against Spyware Using CAPTCHA in Graphical Password Scheme. 760-767 - Valdir Stumm Jr., Lau Cheuk Lung, Miguel Correia
, Joni da Silva Fraga, Jim Lau
:
Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach. 768-774 - Jiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu:
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. 775-780
Security Intrusion Detection Systems 3
- Katerina Goseva-Popstojanova
, Brandon Miller, Risto Pantev
, Ana Dimitrijevikj:
Empirical Analysis of Attackers Activity on Multi-tier Web Systems. 781-788 - Farida Ridzuan
, Vidyasagar M. Potdar
, Alex Talevski, William F. Smyth:
Key Parameters in Identifying Cost of Spam 2.0. 789-796 - Pedram Hayati, Vidyasagar M. Potdar
, Kevin Chai
, Alex Talevski:
Web Spambot Detection Based on Web Navigation Behaviour. 797-803
Wireless Sensor Neworks 1
- Hyun Lee, Jae Sung Choi, Ramez Elmasri:
A Dynamic Normalized Weighting Based Context Reasoning in Home-Based Care. 804-811 - Julia Albath, Mayur Thakur, Sanjay Madria:
Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks. 812-819 - Tales Heimfarth, Edison Pignaton de Freitas
, Carlos Eduardo Pereira
, Armando Morado Ferreira, Flávio Rech Wagner, Tony Larsson:
Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-Oriented Middleware. 820-826 - Hamed Yousefi, Kambiz Mizanian, Amir-Hossein Jahangir
:
Modeling and Evaluating the Reliability of Cluster-Based Wireless Sensor Networks. 827-834 - Atif Sharif, Vidyasagar M. Potdar
, A. J. D. Rathnayaka:
Prioritizing Information for Achieving QoS Control in WSN. 835-842
Wireless Sensor Neworks 2
- Khaled Almiani
, Anastasios Viglas, Lavy Libman:
Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks. 843-850