


default search action
28th ICDCS 2008: Beijing, China - Workshops
- 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China. IEEE Computer Society 2008, ISBN 978-0-7695-3173-1

The 10th International Workshop on Multimedia Network Systems and Applications - MNSA 2008
P2P and Overlay Networks
- Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
A Protocol for Making an Agreement in a Peer-to-Peer (P2P) Society. 1-6 - Bin Chang, Liang Dai, Yi Cui, Yuan Xue:

On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis. 7-11 - Yishuai Chen, Changjia Chen, Chunxi Li:

A Measurement Study of Cache Rejection in P2P Live Streaming System. 12-17 - Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa

:
A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks. 18-23
Distributed Systems
- Tomoya Enokido, Makoto Takizawa

:
Role Based Access Control in Distributed Object Systems. 24-29 - Minoru Uehara:

Security Framework in a Virtual Large-Scale Disk System. 30-35 - Hui-Huang Hsu, Yao-Bao Yen, Chu-Song Chen, Chun-Ta Ho:

Pose Estimation for Evaluating Standing Long Jumps via Dynamic Bayesian Networks. 36-41 - Markus Dunte, Christoph Ruland

:
Delivery Infrastructure for Secure Scalable Coded Multimedia. 42-47
Wireless Networks
- Arjan Durresi, Vamsi Paruchuri

, Mimoza Durresi, Leonard Barolli:
Adaptive Layered Multimedia Transmissions over Wireless Networks. 48-53 - Jaehyuk Ryu, Koji Okamura:

Experimental Evaluation of Usage Pattern in Campus Mobile IP Network. 54-59 - Cheng-Yueh Liu, Yaw-Chung Chen:

An Adaptive Bandwidth Request Scheme for QoS Support in WiMAX Polling Services. 60-65 - Tao Yang, Makoto Ikeda, Giuseppe De Marco, Leonard Barolli, Arjan Durresi, Fatos Xhafa

:
Routing Efficiency of AODV and DSR Protocols in Ad-Hoc Sensor Networks. 66-71
Multimedia Systems
- Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:

Collaborative and Multimodal Communications System Using Immersive Virtual Reality Environment over Ultrahigh-Speed Network. 72-77 - Takayuki Kuroda, Akira Sakatoku, Gen Kitagata, Debasish Chakraborty, Norio Shiratori:

Open 3D Shared Space Construction Scheme for Symbiotic Collaborative Works. 78-83 - Jan Sablatnig, Jiehua Chen, Ruedi Seiler, Sven Grottke, Andreas Köpke, Adam Wolisz:

Adam A Testbed for Distributed Virtual Environments. 84-89 - Yong Liu, Otto J. Anshus, Phuong Hoai Ha

, Tore Larsen, John Markus Bjørndalen:
MultiStream A Cross-Platform Display Sharing System Using Multiple Video Streams. 90-95
The Second International Workshop on Wireless Mesh and Ad Hoc Networks - WiMAN 2008
Routing, Scheduling, and Channel Assignment
- Jianjun Yang, Zongming Fei:

Bipartite Graph Based Dynamic Spectrum Allocation for Wireless Mesh Networks. 96-101 - Virginia Corvino, Velio Tralli, Roberto Verdone:

Cross-Layer Scheduling for Multiple Video Streams over a Hierarchical Emergency-Deployed Network. 102-107 - Hejiao Huang, Yun Peng, Jing Li:

Joint Routing and Channel Assignment in WMN Using Extended Petri Net. 108-113 - Adel Ali Ahmed

, Liza Abdul Latiff
, Mohd Adib Sarijari, Norsheila Fisal:
Real-Time Routing in Wireless Sensor Networks. 114-119
MAC Protocols
- Ravi Nelavelli, Rajesh Prasad, Hongyi Wu:

Fast Link Assessment in Wireless Mesh Networks by Using Non-Constant Weight Code. 120-125 - Manzur Ashraf, Aruna Jayasuriya, Sylvie Perreau:

On Load Regulated CSMA. 126-131 - Nyein Aye Maung Maung, Taku Noguchi

, Makoto Kawai:
Maximizing Aggregate Throughput of Wireless Ad Hoc Networks Using Enhanced Physical Carrier Sensing. 132-137
Sensor Networks and Multi-Hop Communications
- Oh-Heum Kwon, Ha-Joo Song:

Flip Error Resistant Stitching in Sensor Network Localizations. 138-143 - Chongming Zhang

, Xi Zhou, Chuanshan Gao, Chunmei Wang:
On Improving the Precision of Localization with Gross Error Removal. 144-149 - Frank Reichenbach, Jan Blumenthal, Dirk Timmermann

:
Comparing the Efficiency of Localization Algorithms with the Power-Error-Product (PEP). 150-155 - Rajesh Prasad, Hongyi Wu, Dmitri D. Perkins

, Nian-Feng Tzeng:
Local Topology Assisted XOR Coding in Wireless Mesh Networks. 156-161
Modeling and Performance Evaluations
- Zhen Kong, Yu-Kwong Kwok, Jiangzhou Wang:

Game Theoretic Packet Scheduling to Combat Non-Cooperativeness in Wireless Mesh Networks. 162-167 - Hock-Beng Lim, Bang Wang, Cheng Fu, Arpan Phull, Di Ma

:
A Middleware Services Simulation Platform for Wireless Sensor Networks. 168-173 - Enkhbold Ochirsuren, Leandro Soares Indrusiak

, Manfred Glesner:
An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor Networks. 174-179
The Third International Workshop on Delay/Disruption-Tolerant Mobile Networks - DTMN 2008
Routing, Scheduling, and Channel Assignment
- Yifeng Shao, Jie Wu:

Understanding the Tolerance of Dynamic Networks: A Routing-Oriented Approach. 180-185 - Hao Jiang

, Hao Guo, Li-jia Chen:
Reliable and Efficient Alarm Message Routing in VANET. 186-191 - Julián David Morillo-Pozo, Óscar Trullols-Cruces

, José M. Barceló
, Jorge García-Vidal:
A Cooperative ARQ for Delay-Tolerant Vehicular Networks. 192-197
Routing II
- Lian Li, Limin Sun, Jian Ma, Canfeng Chen:

A Receiver-Based Opportunistic Forwarding Protocol for Mobile Sensor Networks. 198-203 - Muhammad Arshad Islam, Marcel Waldvogel

:
Reality-Check for DTN Routing Algorithms. 204-209 - Xianning Li, Xianwei Zhou:

Bounded-Delay, Probability-Based Routing in Intermittently Connected Mobile Ad Hoc Networks. 210-215
Routing III
- Jincheng Wang, Deshi Li, Mi Zhou, Dipak Ghosal:

Data Collection with Multiple Mobile Actors in Underwater Sensor Networks. 216-221 - Feng Liu, Ming Li, Run Zhang, He Zhang, Zhen Xu:

Remaining Delivery Time Estimation Based Routing for Intermittently Connected Mobile Networks. 222-227 - Zhipeng Yang, Ha Dang, Hongyi Wu:

Online Estimation of Effective Delivery Capability in Delay-Tolerant Mobile Sensor Networks. 228-233
The Second International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems - TRAM 2008
TRAM 2008 Keynote
- Xiaoming Li:

A Grassroots Approach in P2P Reputation Studies. 234
Invited Papers
- Huanyu Zhao, Xiaolin Li:

H-Trust: A Robust and Lightweight Group Reputation System for Peer-to-Peer Desktop Grid. 235-240 - Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei Dai:

Modeling Attack Behaviors in Rating Systems. 241-248
Trust Models and Reputation Systems
- Qing Zhang, Ting Yu:

On the Modeling of Honest Players in Reputation Systems. 249-254 - Anna Gutowska, Kevan Buckley:

Computing Reputation Metric in Multi-Agent E-Commerce Reputation System. 255-260
The Fifth International Workshop on Wireless Ad Hoc and Sensor Networking - WWASN 2008
Routing and Broadcasting
- Rajiv Ramdhany, Geoff Coulson:

Manetkit: A Framework for MANET Routing Protocols. 261-266 - Amit Dvir

, Michael Segal
:
The (k, l) Coredian Tree for Ad Hoc Networks. 267-272 - Doina Bein

, Si-Qing Zheng:
An Effective Algorithm for Computing Energy-Efficient Broadcasting Trees in All-Wireless Networks. 273-278 - Yangcheng Huang, Saleem N. Bhatti

:
Fast-Converging Distance Vector Routing for Wireless Mesh Networks. 279-284
Sensor Networks
- Xiaoling Qiu, Dipak Ghosal, Biswanath Mukherjee, Jennifer Yick, Deshi Li:

Priority-Based Coverage-Aware Congestion Control for Multihop Wireless Sensor Networks. 285-290 - Zhen Jiang, Jie Wu, Robert Kline, Jennifer Krantz:

Mobility Control for Complete Coverage in Wireless Sensor Networks. 291-296 - Jehn-Ruey Jiang, Tzu-Ming Sung:

Maintaining Connected Coverage for Wireless Sensor Networks. 297-302 - Cheng Fu, Bang Wang, Hock-Beng Lim:

An Enhanced Sensor Scheduling Protocol for Wireless Sensor Networks. 303-308
Security and Applications
- Guorui Li, Jingsha He

, Yingfang Fu:
A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. 309-314 - Yang Xiao

, Hui Chen
, Yanping Zhang, Xiaojiang Du, Bo Sun, Kui Wu:
Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. 315-320 - Meng-Shiuan Pan

, Lun-Wu Yeh, Yan-Ann Chen, Yu-Hsuan Lin, Yu-Chee Tseng:
Design and Implementation of a WSN-Based Intelligent Light Control System. 321-326 - Emre Atsan, Öznur Özkasap

:
SCALAR: Scalable Data Lookup and Replication Framework for Mobile Ad-hoc Networks. 327-332
Modeling and Measurements
- Andreas Köpke, Adam Wolisz:

Measuring the Node Energy Consumption in USB Based WSN Testbeds. 333-338 - Vojislav B. Misic, Jelena V. Misic:

Performance of Incomplete Channel Sensing for Frequency Hopping Cognitive Personal Area Networks. 339-344 - Pei Li, Yinlong Xu, Chunpeng Zhang:

Impact of Selfish Rate Adaptation on the Performance in IEEE 802.11-Based Wireless Multi-Hop Networks. 345-350
The First International Workshop on Wireless Security and Privacy - WiSP'08
Opening Remarks and Keynote
- David H. C. Du:

Cyber Security: An Obtainable Goal? 351
Detections and Reputation Management
- Tao Li, Min Song, Mansoor Alam:

Compromised Sensor Nodes Detection: A Quantitative Approach. 352-357 - Bo Zhu, Kui Ren

, Lingyu Wang:
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. 358-363 - Avinash Srinivasan, Feng Li, Jie Wu:

A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks. 364-369 - Haiying Shen, Ze Li:

ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc Networks. 370-375
Key Agreement and Management
- Chae Hoon Lim:

LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks. 376-381 - Nitesh Saxena, Jonathan Voris:

Pairing Devices with Good Quality Output Interfaces. 382-387 - Wei Ren

, Kui Ren
, Wenjing Lou:
Optimized User Revocation for Group Signature Based Privacy-Aware PKI. 388-393
Methodology and Protocol
- Yan Sun, Anup Kumar:

Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security Services. 394-399 - Ioana Rodhe, Christian Rohner:

n-LDA: n-Layers Data Aggregation in Sensor Networks. 400-405 - Spyros S. Magliveras, Wandi Wei, Xukai Zou:

Notes on the CRTDH Group Key Agreement Protocol. 406-411 - Jianbo Yao, Guangjun Wen:

Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks. 412-416
The Second International Workshop on Cooperative Distributed Systems - CDS 2008
- Gerald G. Koch, Boris Koldehofe, Kurt Rothermel:

Higher Confidence in Event Correlation Using Uncertainty Restrictions. 417-422 - Abdessamad Imine:

Flexible Concurrency Control for Real-Time Collaborative Editors. 423-428 - Ye-In Chang, Hue-Ling Chen, Sih-Ning Li, Hung-Ze Liu:

A Dynamic Hashing Approach to Supporting Load Balance in P2P Systems. 429-434 - Seth Holloway, Christine Julien

:
ROCC: A Communication Overlay Abstraction for Wireless Users. 435-440 - Qi Li, Mingwei Xu, Xinwen Zhang:

Towards a Group-Based RBAC Model and Decentralized User-Role Administration. 441-446 - Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu:

Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments. 447-452 - Mahdi Niamanesh, Rasool Jalili:

A Formalism for Recongurability Analysis in Distributed Non-Blocking Components. 453-458 - Yilin Wang, Edward Chan, Wenzhong Li, Sanglu Lu:

Caching Invalidation Strategies for Supporting 'Weak' Location Dependent Queries. 459-464 - Yin Chen, Li Tang, Jun Li:

Heuristic Relay Node Selection Algorithm for One-Hop Overlay Routing. 465-470 - Ze Li, Haiying Shen:

Probabilistic Routing with Multi-Copies in Delay Tolerant Networks. 471-476
The First International Workshop on Cyber-Physical Systems - WCPS 2008
Invited Talk
- Karthik Lakshmanan, Raj Rajkumar:

RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation. 477-482
Contributed Papers
- Kyoung-Don Kang, Sang Hyuk Son:

Real-Time Data Services for Cyber Physical Systems. 483-488 - Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu:

A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems. 489-494 - Alvaro A. Cárdenas

, Saurabh Amin, Shankar Sastry
:
Secure Control: Towards Survivable Cyber-Physical Systems. 495-500 - James E. Weimer, Bruno Sinopoli, Bruce H. Krogh:

A Relaxation Approach to Dynamic Sensor Selection in Large-Scale Wireless Networks. 501-506 - Veljko Krunic, Richard Han

:
Towards Cyber-Physical Holodeck Systems Via Physically Rendered Environments (PRE's). 507-512 - Le Xie

, Marija D. Ilic:
Module-Based Modeling of Cyber-Physical Power Systems. 513-518 - Han Tang, Bruce M. McMillin

:
Security Property Violation in CPS through Timing. 519-524 - Honguk Woo, Jianliang Yi, James C. Browne, Aloysius K. Mok, Ella M. Atkins, Fei Xie:

Design and Development Methodology for Resilient Cyber-Physical Systems. 525-528 - Albert M. K. Cheng

:
Cyber-Physical Medical and Medication Systems. 529-532
The Seventh International Workshop on Assurance in Distributed Systems and Networks - ADSN 2008
Keynote
- Juichi Takahashi, Hideharu Kojima

, Zengo Furukawa:
Coverage Based Testing for Concurrent Software. 533-538
Dependable Computing
- Fuad Abujarad, Sandeep S. Kulkarni:

Automated Addition of Fault-Tolerance to SCR Toolset: A Case Study. 539-544 - Bastien Mainaud, Mariem Zekri, Hossam Afifi:

Improving Routing Reliability on Wireless Sensors Network with Emergency Paths. 545-550
Autonomous Decentralized Architecture
- Yinong Chen

, Xiaoying Bai:
On Robotics Applications in Service-Oriented Architecture. 551-556 - Xiaodong Lu, Kinji Mori:

Autonomous Decentralized VoD Architecture to Achieve Service Assurance. 557-562 - Khalid Mahmood

, Yuuya Kanamaru, Xiaodong Lu, Kinji Mori:
Autonomous Decentralized Community Construction Technology for High Quality Information Service. 563-568
Networking
- Ryotaro Oda, Tomoyuki Ohta, Yoshiaki Kakuda:

An Autonomous Clustering-Based Hierarchical Routing Using Decentralized Route Information Management Scheme for Mobile Ad Hoc Networks. 569-574 - Tsuyoshi Mizumoto, Tomoyuki Ohta, Yoshiaki Kakuda:

Route-Split Routing with Resiliency to Simultaneous Failure for Mobile Ad Hoc Networks. 575-580 - Takashi Kunifuji, Tadao Miura, Gen Kogure, Hiroyuki Sugahara, Masayuki Matsumoto:

A Novel Railway Signal Control System Based on the Internet Technology and an Assurance Technology. 581-586
Scheduling
- Yunpeng Chai, Zhihui Du

, Sanli Li:
A New Scheduling Algorithm for Distributed Streaming Media System Based on Multicast. 587-592 - Junichi Funasaka, Akihiko Ishidu, Kenji Ishida:

A File Fetching Method to Reduce the Redundant Traffic on BitTorrent-Like P2P Networks. 593-598 - Zhili Cheng, Zhihui Du

, Yinong Chen
, Xiaoying Wang
:
Virtual Workspace Based Job Execution Methods and Dynamic Makespan Optimized Scheduling Algorithms. 599-604

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














