


default search action
3rd COMSNETS 2011: Bangalore, India
- David B. Johnson, Anurag Kumar:

Third International Conference on Communication Systems and Networks, COMSNETS 2011, Bangalore, India, January 4-8, 2011. IEEE 2011, ISBN 978-1-4244-8952-7
COMSNETS Technical Papers
Security I
- Jonathan White, Nilanjan Banerjee:

Mirage: Mitigating illicit inventorying in a RFID enabled retail environment. 1-9 - Neminath Hubballi, Santosh Biswas, Sukumar Nandi

:
Sequencegram: n-gram modeling of system calls for program based anomaly detection. 1-10 - B. R. Purushothama

, Bharat Amberker:
Group key management scheme for simultaneous multiple groups with overlapped membership. 1-10 - Rajagopalan Vijayasarathy, Serugudi Venkataraman Raghavan, Balaraman Ravindran

:
A system approach to network modeling for DDoS detection using a Naìve Bayesian classifier. 1-10
Pervasive & Ubiquitous Computing
- Derek McAuley

, Richard Mortier
, James Goulding:
The Dataware manifesto. 1-6 - Eduardo Cuervo, Peter Gilbert, Bi Wu, Landon P. Cox:

CrowdLab: An architecture for volunteer mobile testbeds. 1-10 - Vikranth T. Babu, Krishna Kishore Dhara, Venkatesh Krishnaswamy:

Augmenting topic models with user relations in context based communication services. 1-10 - Mahmoud Taghizadeh, Subir Biswas:

Minimizing content provisioning cost in heterogeneous Social Wireless Networks. 1-10
IPTV, Video and Mobility
- Rajesh Mahindra, Ravi Kokku, Honghai Zhang, Sampath Rangarajan:

MESA: Farsighted flow management for video delivery in broadband wireless networks. 1-10 - Mohammad Rabby, Kaliappa Ravindran, Supratik Mukhopadhyay, Ramesh Bharadwaj, Gaurav Mangukiya:

'Control plane' properties for signaling in loss-feedback based video rate adaptation over shared multicast paths. 1-10 - Ashutosh Dutta, J. Bryan Lyles, Henning Schulzrinne:

A formal approach to mobility modeling. 1-10 - Pat Diminico, Vijay Gopalakrishnan, Rittwik Jana, K. K. Ramakrishnan

, Deborah F. Swayne, Vinay A. Vaishampayan
:
Capacity requirements for on-demand IPTV services. 1-10
Security II
- Radia J. Perlman, Charlie Kaufman:

Hierarchical networks with Byzantine Robustness. 1-11 - Faisal M. Sibai, Daniel A. Menascé:

Defeating the insider threat via autonomic network capabilities. 1-10 - Pradeep Bangera, Sergey Gorinsky

:
Impact of prefix hijacking on payments of providers. 1-10 - M. B. Nirmala

, A. S. Manjunath:
Confidential Program update with dynamic key computation for clustered wireless sensor networks. 1-8
Network Topology
- Enrico Gregori, Luciano Lenzini, Chiara Orsini:

k-dense communities in the internet AS-level topology. 1-10 - B. Santhana Krishnan:

Separating event points by Binary Proximity Sensors: An asymptotic analysis. 1-8 - Deepak Jeswani, Ankit Kesharwani, Sneha S. Chaudhari, Vaishali P. Sadaphal, Ratan K. Ghosh:

Efficient target tracking through binary-detection in sparsely deployed WSN. 1-10
Wireless & 4G/WiMax - I
- Adel Aziz, Mathilde Durvy, Olivier Dousse, Patrick Thiran:

Models of 802.11 multi-hop networks: Theoretical insights and experimental validation. 1-10 - Shubhodeep Adhikari:

Downlink transmission mode selection and switching algorithm for LTE. 1-10 - R. Saravana Manickam, C. Siva Ram Murthy:

An instantaneous call admission control using information dissemination for WiMAX mesh networks. 1-8
Resilience & Network Planning
- James P. G. Sterbenz, Egemen K. Çetinkaya

, Mahmood A. Hameed, Abdul Jabbar, Justin P. Rohrer:
Modelling and analysis of network resilience. 1-10 - Yogesh Kumar Agarwal

:
Survivable network design using polyhedral approaches. 1-6 - Hamada Alshaer

, Mohamed Alyafei:
Planning rules for split ratio selection in building GPON-based access networks. 1-10 - Goutam Das, Dimitri Papadimitriou, Bart Puype, Didier Colle, Mario Pickavet, Piet Demeester:

SRLG identification from time series analysis of link state data. 1-10
Multimedia & Wireless I
- Joshua Hare, Dheeraj Agrawal, Arunesh Mishra, Suman Banerjee, Aditya Akella:

A network-assisted system for energy efficiency in mobile devices. 1-10 - Jochen Issing, Stefan Reuschl, Falko Dressler

, Nikolaus Färber:
Flexible playout adaptation for low delay AAC RTP communication. 1-9 - Kameswari Chebrolu, Advait Mishra:

Loss behavior analysis and its application in design of link quality metrics. 1-10 - Krishna Kant:

Multi-state power management of communication links. 1-10
Wireless Protocols
- Bama Muthuramalingam, Srikrishna Bhashyam

, Andrew Thangaraj
:
Processing interference at the physical layer to enhance information flow in wireless networks. 1-6 - G. R. Dattatreya, Ajay Kulkarni:

Optimal contention-free multiplexing for wireless access. 1-6 - Ansuman Bhattacharya

, Rabindranath Ghosh, Koushik Sinha
, Bhabani P. Sinha:
Multimedia communication in cognitive radio networks based on sample division multiplexing. 1-8 - Ajay Kulkarni, Shanthy Menezes, Ravi Prakash

:
FREEZE: Rate adaptation in wireless LANs using channel contention estimates. 1-6
Multimedia & Wireless II
- Vijay Gabale, Ashish Chiplunkar, Bhaskaran Raman, Partha Dutta:

DelayCheck: Scheduling voice over multi-hop multi-channel wireless mesh networks. 1-10 - Pradipta De, Nilanjan Banerjee, Swades De

:
Error-resilient image transmission over multihop wireless networks. 1-10 - Md. Tarikul Islam, Anssi Turkulainen, Jörg Ott:

Voice messaging for mobile delay-tolerant networks. 1-11 - Ville Könönen, Pekka Pääkkönen:

Optimizing power consumption of always-on applications based on timer alignment. 1-8
Network Architectures and Systems
- Dongsu Han

, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki, Srinivasan Seshan
:
Hulu in the neighborhood. 1-10 - Ashish Patro, Yadi Ma, Fatemeh Panahi, Jordan Walker, Suman Banerjee:

A system for audio signalling based NAT Traversal. 1-10 - Rao Naveed Bin Rais

, Marc Mendonca, Thierry Turletti, Katia Obraczka:
Towards truly heterogeneous internets: Bridging infrastructure-based and infrastructure-less networks. 1-10 - Yuh-Rong Chen, Sridhar Radhakrishnan, Sudarshan K. Dhall, Suleyman Karabuk:

On the game server network selection with delay and delay variation constraints. 1-10
Virtualisation & Scaling
- Amre Shakimov, Harold Lim, Ramón Cáceres, Landon P. Cox, Kevin A. Li, Dongtao Liu, Alexander Varshavsky:

Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers. 1-10 - Jiehua Chen, Sven Grottke, Jan Sablatnig, Ruedi Seiler, Adam Wolisz:

Scalability of a distributed virtual environment based on a structured peer-to-peer architecture. 1-8 - Massimiliano Marcon, Marcel Dischinger, P. Krishna Gummadi

, Amin Vahdat:
The local and global effects of traffic shaping in the internet. 1-10 - Bharat S. Rawal, Ramesh K. Karne, Alexander L. Wijesinha:

Splitting HTTP requests on two servers. 1-8
Wireless & 4G/WiMax - II
- Nidhin K. Vaidhiyan, Renu Subramanian, Rajesh Sundaresan:

Interference planning for multicell OFDM downlink. 1-10 - Sayed Chhattan Shah

, Myong-Soon Park:
Energy efficient resource allocation in mobile ad hoc computational grids. 1-10
Network Algorithms
- Yong Oh Lee, Balaji Rengarajan, A. L. Narasimha Reddy:

Reaching approximate Wardrop equilibrium at reduced costs of link state updates. 1-10 - Devavrat Shah:

Three metrics for stochastic networks: Capacity, queue-size and complexity. 1-4
Poster Session
- Swati Sharma

, Huzur Saran, Sorav Bansal:
An Empirical study of clock skew behavior in modern mobile and hand-held devices. 1-4 - Hemanta Kumar Kalita, Manoj Nambiar:

Designing WANem : A Wide Area Network emulator tool. 1-4 - Rusheel Jain, Murali Parameswaran

, Chittaranjan Hota
:
An efficient on-demand routing protocol for MANETs using Bayesian approach. 1-4 - Balwinder Sodhi, T. V. Prabhakar:

Application architecture considerations for cloud platforms. 1-4 - Jaroslaw Adam Gralak, Adam Wierzbicki

:
Guiding P2P control traffic using DHTS. 1-6 - R. Sravan Kumar, Ashutosh Saxena:

Data integrity proofs in cloud storage. 1-4 - Chinmoy Kundu, Sumit Kundu, Gianluigi Ferrari

, Riccardo Raheli
:
Distributed detection with censoring of sensors in Rayleigh faded channel. 1-4 - Santosh Kumar, Sukumar Nandi

, Santosh Biswas:
Research and application of One-class small hypersphere support vector machine for network anomaly detection. 1-4 - Monish Chatterjee, Subhendu Barat, Debojyoti Majumder, Uma Bhattacharya

:
New strategies for static routing and wavelength assignment in de Bruijn WDM networks. 1-4 - Surendra Sharma, Sarang Deshpande, Krishna M. Sivalingam

:
Alpha-beta filter based target tracking in clustered wireless sensor networks. 1-4 - Shanti Chilukuri

, Anirudha Sahoo:
Distributed fault tolerance for WSNs with routing tree overlays. 1-4 - Zeenat Rehena

, Sarbani Roy
, Nandini Mukherjee:
A modified SPIN for wireless sensor networks. 1-4 - P. Balamuralidhar, Rajan Mindigal Alasingara Bhattachar:

Signed graph based approach for on-line optimization in cognitive networks. 1-4 - William Huba, Nicholas Martin, Yamin Al-Mousa, Chukwuchebem Orakwue, Nirmala Shenoy:

A distributed scheduler for airborne backbone networks with directional antennas. 1-4 - Amar Taggu

, Ani Taggu:
TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents. 1-4 - Vivek Kumar Singh, Suhas Hegde Ankadi, Debabrata Das

:
Study of combined effects of zero copy and pre-processing on Input/Output performance of multimedia on demand streaming server. 1-4
COMSNETS 2011 Workshop Papers
WISARD 2011: International Workshop on Wireless Systems Advanced Research and Development
- Krishna Sampigethaya, Radha Poovendran

:
Security and privacy of future aircraft wireless communications with offboard systems. 1-6 - Swaroop Roy, Rijurekha Sen, Swanand Kulkarni, Purushottam Kulkarni, Bhaskaran Raman, Lokendra K. Singh:

Wireless across road: RF based road traffic congestion detection. 1-6 - Hemanta Kumar Kalita, Abhijit Kar:

HySecNJoining: A hybrid secure node joining algorithm for wireless sensor network. 1-6 - Mithun Mukherjee, Preetam Kumar:

A new code allocation algorithm for multirate CI/MC-CDMA system. 1-6 - Tamma V. Prabhakar, Prakruthi Keshavamurthy, Shruti Devasenapathy, H. S. Jamadagni, R. Venkatesha Prasad

, Ignas G. Niemegeers:
Exploring system parameters for viability of energy harvesting technologies. 1-6 - Nitin Dileep Salodkar, Aditya Karnik:

Point-to-point scheduling over a wireless channel with costly channel state information. 1-6
IAMCOM 2011: Fifth Workshop on Intelligent Networks: Adaptation, Communication & Reconfiguration
Self-adaptive Network Systems
- Vijay Arya, Jagabondhu Hazra, Palanivel A. Kodeswaran, Deva P. Seetharam, Nilanjan Banerjee, Shivkumar Kalyanaraman:

CPS-Net: In-network aggregation for synchrophasor applications. 1-8 - H. P. Raghunandan, S. Bedekar:

A parameter-influencer based model of a Self-healing network. 1-8 - K. Ravindran, S. Mukhopadhyay:

Service-level control and management for future network applications. 1-7
Distributed Control Algorithms
- Koninika Pal, Prajna Devi Upadhyay

, Animesh Dutta
:
A petri nets based model for multipoint synchronization in audio conferencing. 1-8 - Awadhesh Kumar Singh, Shantanu Sharma:

Message efficient leader finding algorithm for mobile ad hoc networks. 1-6 - Ravi Sankar Barpanda, Ashok Kumar Turuk

, Bibhudatta Sahoo
, Banshidhar Majhi:
Genetic Algorithm techniques to solve Routing and Wavelength Assignment problem in Wavelength Division Multiplexing all-optical networks. 1-8
Adaptive Network Control
- Samir K. Sadhukhan, Swarup Mandal, Srishti Shaw, Debashis Saha

:
Joint optimization of 2-tier dual-homing for NodeBs and RNCs in UMTS networks using meta-heuristic techniques. 1-8 - Ashwani Sharma

, Swades De
, Hari Mohan Gupta:
Energy-efficient transmission of DWT image over OFDM fading channel. 1-7 - Atri Mukhopadhyay

, Tamal Chakraborty, Suman Bhunia
, Iti Saha Misra, Salil Kumar Sanyal:
Study of enhanced VoIP performance under congested wireless network scenarios. 1-7
Nethealth 2011: Workshop on Networked Healthcare Technology
- Amit Kumar, Rusha Patra, Manjunatha Mahadevappa, Jayanta Mukhopadhyay, Arun K. Majumdar:

An electronic travel aid for navigation of visually impaired persons. 1-5 - Amarjeet Singh, Vinayak S. Naik

, Sangeeta Lal, Raja Sengupta
, Deepak Saxena
, Pushpendra Singh, Anuj Puri:
Improving the efficiency of healthcare delivery system in underdeveloped rural areas. 1-6 - David Kotz

:
A threat taxonomy for mHealth privacy. 1-6
Posters
- Pradnya H. Ghare

, Ashwin G. Kothari
, Avinash G. Keskar
:
Modification of superframe structure of 802.15.4 MAC for body area networks. 1-4 - V. Naveen Kumar, Mrigank Rochan, Santosh Hariharan, Kumar Rajamani

:
Data hiding scheme for medical images using lossless code for mobile HIMS. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














