default search action
21st AINA Workshops 2007: Niagara Falls, Canada
- 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada. IEEE Computer Society 2007
FINA 2007 Symposium on Frontiers in Networking with Applications
Session 1: Intelligent Networking
- Lei Liang, Peter Graham:
Assessment of a Mobile Agent Based Routing Protocol for Mobile Ad-hoc Networks. 1-5 - B. S. Manoj, Rajesh M. Hegde, Bhaskar D. Rao, Ramesh R. Rao:
Sentient Networks: A New Dimension in Network Capability. 6-11 - Hyung-Min Koo, In-Young Ko:
A Cell-Based Approach for Evolutionary Component Repositories for Intelligent Service Robots. 12-17
Session 2: Secrecy and Security
- Amjad Gawanmeh, Sofiène Tahar:
Rank Theorems for Forward Secrecy in Group Key Management Protocols. 18-23 - Amy Beth Corman, Peter Schachte, Vanessa Teague:
A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications. 24-29 - Vesselin Tzvetkov, Holger Zuleger:
Service Provider Implementation of SIP Regarding Security. 30-35 - Fareed Zaffar, Gershon Kedem:
A Service Architecture for Countering Distributed Denial of Service Attacks. 36-42
Session 3: Wireless Sensor Networks
- Md. Ashiqur Rahman, Sajid Hussain:
Effective Caching in Wireless Sensor Network. 43-47 - Ying-Hong Wang, Chih-Peng Hsu, Chien-Min Lee, Kuo-Feng Huang, Ting-Wei Chang:
A Location Mechanism with Mobile Reference Nodes in Wireless Sensor Networks. 48-55 - Malka Halgamuge:
Efficient Battery Management for Sensor Lifetime. 56-61 - Keiji Ozaki, Naohiro Hayashibara, Makoto Takizawa:
Coordination Protocols of Multiple Actuator Nodes in a Multi-Actuator/Multi-Sensor Model. 62-67
Session 4: Network Mechanisms
- Satoshi Kurihara, Kensuke Fukuda, Shin-ya Sato, Toshiharu Sugawara:
Multi-Agent Coordination Mechanism Based on Indirect Interaction. 68-72 - Andreas Rott:
Self-Healing in Distributed Network Environments. 73-78 - Ageliki Tsioliaridou, Christos V. Samaras, Vassilis Tsaoussidis:
On the Miscollaboration of Congestion Control Mechanisms at the Transport and the Network Layers. 79-84 - Han-Ching Wu, Shou-Hsuan Stephen Huang:
Detecting Stepping-Stone with Chaff Perturbations. 85-90
Session 5: Grid, Clustering and P2P Computing
- Sheng Di, Hai Jin, Shengli Li, Ling Chen, Li Qi, Chengwei Wang:
Ontology Based Grid Information Interoperation. 91-96 - Ying-Hong Wang, Chin-Yung Yu, Ping-Fang Fu:
A Coverage and Connectivity Method to Cluster Topology in Wireless Sensor Networks. 97-102 - Toshiki Watanabe, Takahiro Hara, Yuki Kido, Shojiro Nishio:
An Update Propagation Strategy for Delay Reduction and Node Failure Tolerance in Peer-to-Peer Networks. 103-108
Session 6: Network Security
- Chen Yang, Furong Wang, Xinmei Wang:
Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. 109-112 - Xiandeng He, Changxing Pei, Changhua Zhu, Jiandong Li:
BER Analysis of a GMSK System Using Decision Feedback. 113-118 - David Argles, Alex Pease, Robert John Walters:
An Improved Approach to Secure Authentication and Signing. 119-123
Session 7: Routing and Multicasting
- Sudip Misra, B. John Oommen:
The Pursuit Automaton Approach for Estimating All-Pairs Shortest Paths in Dynamically Changing Networks. 124-129 - I-Hsuan Peng, Kuo-Wei Peng, Yen-Wen Chen:
Cross Layer Routing for Reliable Connections in IP over WDM Networks. 130-135 - Chao Peng, Yasuo Tan, Laurence Tianruo Yang:
New Algorithms for the Minimum-Cost Single-Source Unsplittable Flow Problem. 136-141 - Masafumi Watari, Atsushi Tagami, Teruyuki Hasegawa, Shigehiro Ano:
A Scalable and Efficient Client Emulation Method for IP Multicast Performance Evaluation. 142-147
Session 8: Network Applications and Video Streaming
- Akio Koyama, Junpei Arai, Satoshi Sasaki, Takuya Numajiri, Leonard Barolli:
Implementation and Field Experiments of a Remote Medical-Care Supporting System. 148-153 - Yosuke Sato, Yuya Maita, Koji Hashimoto, Yoshitaka Shibata:
Performance Evaluation of a New Teleconference System by High Definition Omni-Directional Video Transmission. 154-159 - Jinfeng Zhang, Jianwei Niu, Rui He, Jian Ma:
Adaptive Video Streaming over P2P Multi-Hop Path. 160-165 - Akhilesh Shrestha, Liudong Xing:
Common-Cause Failure Analysis for Dynamic Hierarchical Systems. 166-171
Session 9: Network Traffic Analysis
- Enchang Sun, Bin Tian, Yongchao Wang, Kechu Yi:
Quasi-Orthogonal Time Division Multiplexing and Its Applications under Rayleigh Fading Channels. 172-176 - Dominik Jungo, David Buchmann, Ulrich Ultes-Nitsche:
Assessment of Code Quality through Classification of Unit Tests in VeriNeC. 177-182 - Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong:
Specification Synthesis for Monitoring and Analysis of MANET Protocols. 183-187
Session 10: Detection and Presence Control
- Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
A Traffic Classification Algorithm for Intrusion Detection. 188-193 - Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A New Approach to Early Detection of an Unknown Worm. 194-198 - Hiroaki Kikuchi, Yuichi Nakamura:
Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent. 199-202 - Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao:
Conditional Random Fields for Intrusion Detection. 203-208
Session 11: Protocols
- Chung-Ming Huang, Ching-Hsien Tsai:
WiMP-SCTP: Multi-Path Transmission Using Stream Control Transmission Protocol (SCTP) in Wireless Networks. 209-214 - Hiroyuki Hisamatsu, Go Hasegawa, Masayuki Murata:
Sizing Router Buffers for Large-Scale TCP/IP Networks. 215-219 - Luis H. García-Muñoz, José Enrique Armendáriz-Iñigo, Hendrik Decker, Francesc D. Muñoz-Escoí:
Recovery Protocols for Replicated Databases - A Survey. 220-227 - Takuo Nakashima, Toshinori Sueyoshi:
Self-Similar Property for TCP Traffic under the Bottleneck Restrainment. 228-233
Session 12: Network Architectures and Algorithms
- João Paulo F. de Oliveira, Michael Schuenck, Glêdson Elias da Silveira:
Sharing Software Components Using a Service-Oriented, Distributed and Secure Infrastructure. 234-239 - Roman Y. Shtykh, Qun Jin:
Enhancing IR with User-Centric Integrated Approach of Interest Change Driven Layered Profiling and User Contributions. 240-245 - Atsushi Watanabe, Hiroshi Haruki, Shun Shimotomai, Takeshi Saito, Tomoyuki Nagase, Yoshio Yoshioka, Yoshiei Hasegawa:
A New Mutable Nonlinear Transformation Algorithm for S-box. 246-251 - Paula Cecilia Fritzsche, Dolores Rexachs, Emilio Luque:
A Computational Approach to TSP Performance Prediction Using Data Mining. 252-259
DMIR 2007 Symposium on Data Mining and Information Retrieval
Session 1: Information Retrieval I
- Elisa Noguera, Fernando Llopis, Antonio Ferrández, Alberto Escapa:
Evaluation of Open-Domain Question Answering Systems within a Time Constraint. 260-265 - Kelvin Wu, Lei Yu, Michal Cutler:
Towards Answering How do I Questions Using Classification. 266-271 - Mohamed A. Mohandes, S. I. Quadri, Mohamed A. Deriche:
Arabic Sign Language Recognition an Image-Based Approach. 272-276
Session 2: Information Retrieval II
- Yuanning Liu, Xiaodong Zhu, Lingge Sui, Zhen Liu:
Morphological Zerotree Compression Coding Based on Integer Wavelet Transform for Iris Image. 277-282 - Shisanu Tongchim, Virach Sornlertlamvanich, Hitoshi Isahara:
Examining the Feasibility of Metasearch Based on Results of Human Judgements on Thai Queries. 283-288 - Dany Gebara, Reda Alhajj:
WaveQ: Combining Wavelet Analysis and Clustering for Effective Image Retrieval. 289-294
Session 3: Information Retrieval III
- Xuheng Xu, Xiaodan Zhang, Xiaohua Hu:
Using Two-Stage Concept-Based Singular Value Decomposition Technique as a Query Expansion Strategy. 295-300 - Jian Wen, Zhoujun Li, Lijuan Zhang, Xiaohua Hu, Huowang Chen:
A New Method of Cluster-Based Topic Language Model for Genomic IR. 301-306 - Masashi Inoue:
Mining Visual Knowledge for Multi-Lingual Image Retrieval. 307-312 - Karlheinz E. S. Toni:
Proactive Documents--A New Paradigm to Access Document Information from Various Contexts. 313-320
Session 4: Data Mining I
- L. M. Spracklin, Lawrence V. Saxton:
Filtering Spam Using Kolmogorov Complexity Estimates. 321-328 - Jiawei Rong, Dejing Dou, Gwen A. Frishkoff, Robert M. Frank, Allen D. Malony, Don M. Tucker:
A Semi-Automatic Framework for Mining ERP Patterns. 329-334 - Jia Zeng, Reda Alhajj:
Effectiveness of Multi-Perspective Representation Scheme on Support Vector Machines. 335-340 - Kin Fun Li, Darshika G. Perera:
An Investigation of Chip-Level Hardware Support for Web Mining. 341-348
Session 5: Information Extraction
- Jee-Hyub Kim, Melanie Hilario:
Learning Relations and Information Extraction Rules for Protein Annotation. 349-354 - Fatima Ashraf, Reda Alhajj:
ClusTex: Information Extraction from HTML Pages. 355-360 - Yuan Jenq Lui, Richard P. Brent, Ani Calinescu:
Extracting Significant Phrases from Text. 361-366
Session 6: Data Mining II
- Jacob Kogan:
Hybrid Clustering of Large Text Data. 367-372 - Sayed W. Qaiyumi, Daniel Stamate:
Reduction in Dimensions and Clustering Using Risk and Return Model. 373-378 - Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, Jun Adachi:
Using Web Directories for Similarity Measurement in Personal Name Disambiguation. 379-384 - Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. 385-391 - Tian Zhu, Sixue Bai:
A Parallel Mining Algorithm for Closed Sequential Patterns. 392-395
SSNDS 2007 Symposium on Security in Networks and Distributed Systems
Session 1: Cryptographic Algorithms
- Adam J. Elbirt:
Fast and Efficient Implementation of AES via Instruction Set Extensions. 396-403 - Peter Lory:
Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values. 404-408 - Eun-Kyung Ryu, Tsuyoshi Takagi:
Efficient Conjunctive Keyword-Searchable Encryption. 409-414
Session 2: Distributed Access Control and Firewalls
- Birger Tödtmann, Erwin P. Rathgeb:
Advanced Packet Filter Placement Strategies for Carrier-Grade IP-Networks. 415-423 - Gansen Zhao, David W. Chadwick, Sassa Otenko:
Obligations for Role Based Access Control. 424-431 - Chunming Rong, Won-Chol Kim:
Effective Storage Security in Incompletely Trusted Environment. 432-437
Session 3: Wireless Ad Hoc and Sensor Network Security
- Canming Jiang, Bao Li, Haixia Xu:
An Efficient Scheme for User Authentication in Wireless Sensor Networks. 438-442 - Sameer Pai, Tanya G. Roosta, Stephen B. Wicker, Shankar Sastry:
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust. 443-450 - Qinghua Wang, Tingting Zhang:
Detecting Anomaly Node Behavior in Wireless Sensor Networks. 451-456 - Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen:
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. 457-462
Session 4: Network Security Issues and Protocols
- Vandana Gunupudi, Stephen R. Tate:
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules. 463-469 - Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong:
Information Security Threats and Access Control Practices in Norwegian Businesses. 470-476 - Slim Trabelsi, Laurent Gomez, Yves Roudier:
Context-Aware Security Policy for the Service Discovery. 477-482 - Lau Cheuk Lung, Marcelo Shinji Higashiyama, Rafael R. Obelheiro, Joni da Silva Fraga:
Adapting the UCON_ABC Usage Control Policies on CORBASec Infrastructure. 483-488
Session 5: Authorization Schemes
- Giovanni Russello, Changyu Dong, Naranker Dulay:
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents. 489-496 - Feike W. Dillema, Simone Lupetti, Tage Stabell-Kulø:
A Decentralized Authorization Architecture. 497-504 - Amirreza Masoumzadeh, Morteza Amini, Rasool Jalili:
Conflict Detection and Resolution in Context-Aware Authorization. 505-511
Session 6: Authentication and Access Control
- Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen:
Authenticated Broadcast Encryption Scheme. 512-518 - Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. 519-524 - Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw:
A Certified Email Protocol Using Key Chains. 525-530
Session 7: Key Management
- Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl:
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy. 531-536 - Khaled Masmoudi, Hossam Afifi:
An Identity-Based Key Management Framework for Personal Networks. 537-543 - Ford-Long Wong, Hoon Wei Lim:
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients. 544-550 - H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar:
A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. 551-556
Session 8: Distributed Intrusion Detection and Protection Systems
- Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Basnet, Andrew H. Sung:
Detecting Coordinated Distributed Multiple Attacks. 557-562 - Neil C. Rowe:
Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. 563-568 - Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig:
Intrusion Detection for Encrypted Web Accesses. 569-576 - Byungseung Kim, Saewoong Bahk:
Relative Entropy-Based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets. 577-582
Session 9: Software Security
- Lifu Wang, Partha Dasgupta:
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. 583-589 - Thawatchai Chomsiri:
HTTPS Hacking Protection. 590-594 - Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
Towards an Aspect Oriented Approach for the Security Hardening of Code. 595-600
Session 10: PKI and Digital Signatures
- Ping Yu, Stephen R. Tate:
An Online/Offline Signature Scheme Based on the Strong RSA Assumption. 601-606 - Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert:
Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. 607-613 - Daniel Kouril, Ludek Matyska, Michal Procházka:
A Robust and Efficient Mechanism to Distribute Certificate Revocation Information Using the Grid Monitoring Architecture. 614-619
Session 11: Privacy and Trust
- Ronggong Song, Larry Korba, George Yee:
Privacy Rights Management for Privacy Compliance Systems. 620-625 - Jakob Illeborg Pagter, Michael Østergaard Pedersen:
The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing. 626-631 - Hilmi Günes Kayacik, Nur Zincir-Heywood:
On the Contribution of Preamble to Information Hiding in Mimicry Attacks. 632-638
BLSC 2007 Symposium on Bioinformatics and Life Science Computing
Session 1: Bioinformatics and Life Science Computing I
- Nawar Malhis, Kelvin Xi Zhang, B. F. Francis Ouellette:
Detecting Protein-Domains DNA-Motifs Association in Saccharomyces cerevisiae Regulatory Networks. 639-644 - Wendy Osborn:
A Spatial Indexing Approach for Protein Structure Modeling. 645-650 - José Antônio Fernandes de Macêdo, Fábio Porto, Sérgio Lifschitz, Philippe Picouet:
Dealing with Some Conceptual Data Model Requirements for Biological Domains. 651-656
Session 2: Bioinformatics and Life Science Computing II
- Mingjun Song, Sanguthevar Rajasekaran:
A Greedy Correlation-Incorporated SVM-Based Algorithm for Gene Selection. 657-661 - Monther Tarawneh, Bing Bing Zhou, Penghao Wang, Albert Y. Zomaya:
Investigation of Relationships among Excavate Taxa Using a New Quartet-Based Phylogenetic Analysis Method. 662-667 - Georges Valétudie, Jacky Desachy, Christophe Sola:
Markov Models to Classify M. tuberculosis Spoligotypes. 668-671
Session 3: Bioinformatics and Life Science Computing III
- Santan Challa, Parimala Thulasiraman:
A Graph Based Approach to Discover Conserved Regions in DNA and Protein Sequences. 672-677 - Mohammed Al-Shalalfa, Reda Alhajj:
Attractive Feature Reduction Approach for Colon Data Classification. 678-683 - Wei-bang Chen, Chengcui Zhang, Xin Chen:
Biological Sequence Clustering and Classification with a Hybrid Method and Dynamic Programming. 684-689 - Andrei Doncescu, Yoshitaka Yamamoto, Katsumi Inoue:
Biological Systems Analysis Using Inductive Logic Programming. 690-695
Session 4: Bioinformatics and Life Science Computing IV
- Hans De Sterck, Chen Zhang, Aleks Papo:
Database-Driven Grid Computing with GridBASE. 696-701 - Yong Li, Xiujuan Chen, Saeid Belkasim, Yi Pan:
Parallel Contour Matching and 3D Partial Retrieval in Bio-Image Database. 702-706 - Jamal Alhiyafi, Cavitha Sabesan, Shiyong Lu, Melphine Harriott, Deborah Jurczyszyn, Raquel P. Ritchie, Felicitas S. Gonzales, Jeffrey L. Ram:
Computational Methods for Analysis of Cryptic Recombination in the Performance of Genomic Recombination Detection Software. 707-712 - Maria Mirto, Massimo Cafaro, Sandro Fiore, Giovanni Aloisio:
A Grid System for the Ingestion of Biological Data into a Relational DBMS. 713-718
Session 5: Bioinformatics and Life Science Computing V
- Jacques Demongeot, Andrés Moreira:
A Circular Hamming Distance, Circular Gumbel Distribution, RNA Relics and Primitive Genome. 719-726 - Hiroshi Kobayashi, Ryuzo Azuma, Akihiko Konagaya:
Kinetic Analysis of Ligand-Receptor Complex Formation with the Aid of Computer Simulation. 727-732 - Mohammed Al-Shalalfa, Reda Alhajj:
Application of Double Clustering to Gene Expression Data for Class Prediction. 733-738 - Mehdi Pirooznia, Youping Deng:
Efficiency of Hybrid Normalization of Microarray Gene Expression: A Simulation Study. 739-744 - Jean-Louis Lassez, Ryan A. Rossi, Axel E. Bernal:
Crick's Hypothesis Revisited: The Existence of a Universal Coding Frame. 745-751
SEC 2007 Symposium on Embedded Computing
Session 1: Software Environments and Simulations
- Antonio Flores, Juan L. Aragón, Manuel E. Acacio:
Sim-PowerCMP: A Detailed Simulator for Energy Consumption Analysis in Future Embedded CMP Architectures. 752-757 - Rongrong Zhong, Yongxin Zhu, Weiwei Chen, Mingliang Lin, Weng-Fai Wong:
An Inter-Core Communication Enabled Multi-Core Simulator Based on SimpleScalar. 758-763 - Rahman Hassan, Antony Harris, Nigel P. Topham, Aristides Efthymiou:
Synthetic Trace-Driven Simulation of Cache Memory. 764-771
Session 2: Scheduling Algorithms
- Nan Guan, Mingsong Lv, Qingxu Deng, Ge Yu:
A Real-Time Scheduling Algorithm with Buffer Optimization for Embedded Signal Processing Systems. 772-777 - Wei Luo, Xiao Qin, Kiranmai Bellam:
Reliability-Driven Scheduling of Periodic Tasks in Heterogeneous Real-Time Systems. 778-783 - Karsten Walther, Jörg Nolte:
A Flexible Scheduling Framework for Deeply Embedded Systems. 784-791
Session 3: Architecture Design and Synthesis
- Abhishek Pillai, Wei Zhang, Laurence Tianruo Yang:
Exploring Functional Unit Design Space of VLIW Processors for Optimizing Both Performance and Energy Consumption. 792-797 - Mallik Kandala, Wei Zhang, Laurence Tianruo Yang:
An Area-Efficient Approach to Improving Register File Reliability against Transient Errors. 798-803 - Gul N. Khan, Usman Ahmed:
Hardware-Software Cosynthesis of Multiprocessor Embedded Architectures. 804-810 - Abhishek Pillai, Wei Zhang, Dimitrios Kagaris:
Detecting VLIW Hard Errors Cost-Effectively through a Software-Based Approach. 811-815
Session 4: Embedded Applications
- Adrian P. Lauf, Richard A. Peters, William H. Robinson:
Embedded Intelligent Intrusion Detection: A Behavior-Based Approach. 816-821 - Abdulhadi Shoufan, Ralf Laue, Sorin A. Huss:
High-Flexibility Rekeying Processor for Key Management in Secure Multicast. 822-829 - Coral Gonzalez-Concejero, V. Rodellar, Agustín Álvarez Marquina, Elvira Martínez de Icaya, Pedro Gómez Vilda:
A Soft-Core for Pattern Recognition. 830-834 - Katsuyoshi Matsumoto, Hideki Mori, Minoru Uehara:
Fault Tolerance in Small World Cellular Neural Networks for Image Processing. 835-839 - Junjie Ni, Yongxin Zhu, Wei Guo:
An Improved RAIM Scheme for Processing Multiple Outliers in GNSS. 840-845
TeNAS 2007 Workshop on Telecommunication Networking, Applications and Systems
Session 1: Network Technologies
- Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar:
Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks. 846-851 - Sudath Indrasinghe, Rubem Pereira, John Haggerty:
Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks. 852-857 - Ying-Dar Lin, Kuo-Kun Tseng, Chen-Chou Hung, Yuan-Cheng Lai:
Scalable Automaton Matching for High-Speed Deep Content Inspection. 858-863
Session 2: Network Technologies
- Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar:
Mobile Event Monitoring Protocol for Wireless Sensor Networks. 864-869 - Pi-Chung Wang, Chia-Tai Chan, Po-Yen Lin:
MAC Address Translation for Enabling Scalable Virtual Private LAN Services. 870-875 - Rubem Pereira, Ella Pereira:
Real Time Scheduling for Audio and Video Streams. 876-881
Session 3: Network Technologies
- Tarag Fahad, Djamel Djenouri, Robert Askwith, Madjid Merabti:
A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET. 882-887 - Minoru Uehara:
A Toolkit for Virtual Large-Scale Storage in a Learning Environment. 888-893 - Kenvi Wang, Lin-Yi Peng, Tsung-Mao Chen, Szu-Yu Chen:
A Fuzzy-Based and Simulated IP Network Traffic Engineering Promoting Multi-Service Performance. 894-899 - Stefan Wallin, Viktor Leijon:
Multi-Purpose Models for QoS Monitoring. 900-905 - Chiou-Yng Lee, Yung-Hui Chen:
Low-Complexity Parallel Systolic Architectures for Computing Multiplication and Squaring over FG(2m). 906-911
Session 4: Network Applications
- Suleiman Y. Yerima, Khalid Al-Begain:
Buffer Management for Multimedia QoS Control over HSDPA Downlink. 912-917 - Te-Lung Liu, C. Eugene Yeh:
Planning and Design of TWAREN: Advanced National Research and Education Network in Taiwan. 918-922 - E. Catherine L. Watts, Madjid Merabti, A. Taleb-Bendiab:
A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality. 923-928 - Fong-Hao Liu:
Constructing Enterprise Information Network Security Risk Management Mechanism by Using Ontology. 929-934 - Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi:
Bridging the Gap between Networked Appliances and Virtual Worlds. 935-940
SOCNE 2007 Workshop on Service Oriented Architectures in Converging Networked Environments
Session 1: Service-oriented Architectures in Embedded Systems
- Daniel Barisic, Martin Krogmann, Guido Stromberg, Peter Schramm:
Making Embedded Software Development More Efficient with SOA. 941-946 - François Jammes, Antoine Mensch, Harm Smit:
Service-Oriented Device Communications Using the Devices Profile for Web services. 947-955 - Elmar Zeeb, Andreas Bobek, Hendrik Bohn, Frank Golatowski:
Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services. 956-963 - Markus Zajac, Brigitte Oesterdiekhoff, Chris Loeser, Hendrik Bohn:
Bilateral Service Mapping Approaches between the Different Service Oriented Architectures Web Services and UPnP. 964-969
Session 2: Key Services in Service-oriented Architectures
- Michael Ditze, Matthias Grawinkel:
Fuzzy Logic Based Admission Control for Multimedia Streams in the UPnP QoS Architecture. 970-976 - Nicolas Van Wambeke, François Armando, Christophe Chassot, Ernesto Exposito:
Architecture and Models for Self-Adaptability of Transport Protocols. 977-982 - Frank Bormann, Stephan Flake, Jürgen Tacken:
Convergent Online Charging for Context-Aware Mobile Services. 983-988 - Davy Preuveneers, Julien Pauty, Dimitri Van Landuyt, Yolande Berbers, Wouter Joosen:
Comparative Evaluation of Converged Service-Oriented Architectures. 989-994
Session 3: Service Management & Service Mediation
- Farhana H. Zulkernine, Patrick Martin:
Conceptual Framework for a Comprehensive Service Management Middleware. 995-1000 - Chen Wu, Elizabeth Chang:
An Analysis of Web Services Mediation Architecture and Pattern in Synapse. 1001-1006 - Lina Fang, Shengqun Tang, Yan Yang, Ruliang Xiao, Ling Li, Xinguo Deng, Yang Xu, Youwei Xu:
An User-Driven Slight Ontology Framework Based on Meta-Ontology for Change Management. 1007-1014
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.