


default search action
ICOIN 2013: Bangkok, Thailand
- The International Conference on Information Networking 2013, ICOIN 2013, Bangkok, Thailand, January 28-30, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-5740-1

- P. Jongsuebsuk, Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo:

Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacks. 1-5 - Sayonnha Mandal, Gregory Macdonald, Mayssaa El Rifai, Nikhil Punekar, Farnaz Zamani, Yuhua Chen, Subhash C. Kak, Pramode K. Verma, Robert C. Huck, James J. Sluss Jr.

:
Multi-photon implementation of three-stage quantum cryptography protocol. 6-11 - Satoru Shimosaka, Kenta Umebayashi

, Yasuo Suzuki:
A study on stream assignment method for secure MIMO communication. 12-17 - Shi Li, Kyung Choi, Kijoon Chae:

An enhanced measurement transmission scheme for privacy protection in smart grid. 18-23 - Eng Keong Lua, Ruichuan Chen:

A holistic immune system against active P2P worms. 24-29 - Koji Imagawa, Hiroyoshi Miwa:

Detecting protected links to keep reachability to server against failures. 30-35 - Sookyoung Lee, Meejeong Lee:

QRMSC: Efficient QoS-aware relay node placement in wireless sensor networks using Minimum Steiner tree on the Convex hull. 36-41 - Yuki Kasama, Toshiaki Miyazaki:

Movement path estimation for multiple humans in a room using binary infrared sensors. 42-47 - Duc-Tai Le

, Thang Le Duc
, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:
Latency aware Broadcast Scheduling in Duty Cycled wireless sensor networks. 48-53 - Menik Tissera, Robin Doss

, Gang Li
, Lynn Margaret Batten:
Information discovery in multidimensional wireless sensor networks. 54-59 - Imeddine Ben Abid, Noureddine Boudriga:

Game theory for misbehaving detection in wireless sensor networks. 60-65 - Ill-Keun Rhee, Hee-Soo Kim:

Improved DOA estimation of correlated signals in correlated antenna noises environment. 66-70 - Menghan Li, Xiaoping Zhang, Yupeng Tian, Haixiang Zhang:

Potential based routing in B-P2i- architecture. 71-76 - Yang Han, Kei'ichi Koyanagi, Takeshi Tsuchiya

, Tadashi Miyosawa, Hiroo Hirose:
A trust-based routing strategy in structured P2P overlay networks. 77-82 - Soo-Hoon Moon

, Seung-Jae Han, Sunju Park:
Energy-efficient flow control and routing for clustered wireless sensor networks. 83-88 - Hyochun Ahn, Youn Seo, Jaebeom Kim, Young-Bae Ko, Cheolhyo Lee, Chang-Joo Kim:

Multi-metric geo-routing protocol for tactical ad hoc networks. 89-94 - Sebastian Schellenberg, Peggy Begerow, Markus Hager, Jochen Seitz, Thomas Finke, Juergen Schroeder:

Implementation and validation of an address resolution mechanism using adaptive routing. 95-100 - Alisson Barbosa de Souza

, Joaquim Celestino Júnior, Felipe A. Xavier, Francisco D. Oliveira, Ahmed Patel, Maryam Latifi:
Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networks. 101-106 - Ji In Kim, Seok Joo Koh

:
Distributed mobility management in proxy mobile IPv6 using hash function. 107-112 - Tapio Frantti, Mikko Majanen

:
Real-time traffic control for multihomed devices. 113-118 - Nicholas Katanekwa, Neco Ventura

:
Mobile content distribution and selective traffic offload in the 3GPP evolved packet system (EPS). 119-124 - Charna John, Sibonelo Madlopha, Neco Ventura:

PMIPv6-based make-before-break handover for real-time services in 3GPPs Evolved Packet Core. 125-130 - Arto Kaasinen, Yong-Ik Yoon:

Service engagement model for mobile advertising based on user behavior. 131-134 - Pham Ngoc Thanh, Keecheon Kim:

Implementation of open Two-Factor Authentication service applied to Virtual Private Network. 135-140 - Kwang-Chun Go, Jae-Ryong Cha, Seong Keun Oh, Jae-Hyun Kim:

End-to-end performance analysis based on cross-layer retransmission scheme in wireless communication system. 141-144 - Osamu Takada, Kohta Ohshima, Matsuaki Terada:

End-to-end delay analysis method for tandem switches with variable bandwidth links. 145-150 - Tomoaki Tsutsumi, Minoru Koizumi, Tomoichi Ebata, Kohta Ohshima, Matsuaki Terada:

Performance evaluation of synchronous distributed wireless network emulator for high-speed mobility. 151-156 - Kwang-Soon Choi, Young-Choong Park, Byoung-Ha Park, Sung Hee Hong, KwangMo Jung:

FPGA implementation of human emotion reasoning engine. 157-162 - Tuan LeAnh, Nguyen Van Mui, Cuong T. Do, Choong Seon Hong

, Sungwon Lee, Jinpyo Hong:
Optimal network selection coordination in heterogeneous Cognitive Radio Networks. 163-168 - Vishram Mishra, Chiew Tong Lau, Syin Chen:

Deterministic time pattern based channel selection in cognitive Radio network. 169-174 - Camila S. Barbosa, Vinicius C. M. Borges

, Sand Correa, Kleber Vieira Cardoso:
An evolution-inspired algorithm for efficient dynamic spectrum selection. 175-180 - Do-Hoon Kim, Heung-Gyoon Ryu:

An efficient blind turbo equalizer for compensating Doppler effects. 181-185 - Si Yu, Xiaolin Gui, Jiancai Lin:

An approach with two-stage mode to detect cache-based side channel attacks. 186-191 - Yao-Liang Chung:

A green rate-and-power control transmission scheme in multi-carrier base stations. 192-197 - Nuredin Ali Salem Ahmed, Adel Emhemmed, Khaled Elgaid

:
Dual-radios hypermesh network based on CSMA protocol. 198-203 - Chi-Shih Chao, Szu-Pei Lu:

An adaptive probe selection mechanism for k-link fault diagnosis on all-optical mesh networks. 204-209 - Tapio Frantti, Hannu Hietalahti, Reijo Savola:

Requirements of secure WSN-MCN edge router. 210-215 - Jong-Kwan Lee, Hong-Jun Noh, Jaesung Lim:

A cooperative TDMA MAC protocol using dynamic slot assignment scheme. 216-220 - Ramzi Bellazreg, Noureddine Boudriga, Sunshin An:

Border surveillance using sensor based thick-lines. 221-226 - Tin Yu Wu, Wei-Tsong Lee, Jhih-Siang Huang, Chien-Yu Duan, Tain-Wen Suen:

An enhanced approach for estimating writable working set by pre-copy and prediction. 227-231 - Binh Minh Nguyen

, Viet D. Tran
, Ladislav Hluchý
:
A novel approach for developing interoperable services in cloud environment. 232-237 - Pham Phuoc Hung, Bui Tuan-Anh, Eui-Nam Huh:

A solution of thin-thick client collaboration for data distribution and resource allocation in cloud computing. 238-243 - Masakuni Ishii, Jungkyu Han, Hiroyuki Makino:

Design and performance evaluation for Hadoop clusters on virtualized environment. 244-249 - Jin-A. Hong, Sangmin Seo, Namgi Kim, Byoung-Dai Lee:

A study of secure data transmissions in mobile cloud computing from the energy consumption side. 250-255 - Kenko Ota, Kohei Miyasaka, Takaharu Nagahashi, Yoshio Nogami, Shunichi Tada, Hideaki Matsue:

A study on switching symbol timing detection method for continuous OFDM signals. 256-261 - Hyeok Koo Jung:

Alternate time-switched multiplexed space-time block coding technique for single-carrier modulation. 262-267 - Genichiro Murata, Kenta Umebayashi

, Yasuo Suzuki:
A study on detection method of same spreading code signals by multimodulus algorithm. 268-273 - Sika Shrestha, Seung Jo Han, Sun-Kuk Noh, Sunwoong Kim, Hyun-Bai Kim, Dong-You Choi:

Design of modified Sierpinski fractal based miniaturized patch antenna. 274-279 - Young Ju Hwang, Seong-Lyun Kim:

Cooperation through secondary relaying in TDMA cellular networks. 280-285 - Shu-Ming Tseng

, Yueh-Teng Hsu, Shiou-Cheng Ren:
A distributed quasi-orthogonal space time block code for cooperative communication with information exchange errors for decode-and-forward relay networks. 286-290 - Joscha Schneider, Eckhart Korner, Lothar Grimm:

Inter-domain connection of reload-based peer-to-peer overlays. 291-296 - Sheng-Chang Chen, Chung-Ju Chang, Yu-Huang Chu:

A fuzzy cache lifetime determination scheme for LISP mapping systems. 297-302 - Adriano Fiorese

, Paulo Simões
, Fernando Boavida
:
Approach for service search and peer selection in P2P service overlays. 303-308 - Ho Kuen Song, Kwang Myung Kim, Kyung Tae Kim, Hee Yang Youn:

Application of genetic algorithm for logistics based on multi-agent system. 309-314 - Seungoh Choi

, Kwangsoo Kim
, Seongmin Kim, Byeong-Hee Roh
:
Threat of DoS by interest flooding attack in content-centric networking. 315-319 - Hyunwoo Nam, Younghan Kim:

Contents sharing using PPSP in DLNA-based networks. 320-323 - Sabari Somasekharan Nair, Sebastian Schellenberg, Jochen Seitz, Mainak Chatterjee:

Hybrid spectrum sharing in dynamic spectrum access networks. 324-329 - Thant Zin Oo, Choong Seon Hong

, Sungwon Lee:
Alternating renewal framework for estimation in spectrum sensing policy and proactive spectrum handoff. 330-335 - Suriya Kanthalue, Pheeradej Nanan:

Pre- and post- equalization technique combining for wireless communications. 336-340 - Youngpo Lee, Jaewoo Lee, Youngseok Lee, Jeongyoon Shim, Seokho Yoon:

A threshold-based frequency offset estimation scheme for OFDM systems. 341-345 - Jongseon Park, Dosik An, Gihwan Cho:

An adaptive channel number tuning mechanism on parallel transfer with UDT. 346-350 - Chang-Hwan Lee, Young-Tak Kim:

QoS-aware hierarchical token bucket (QHTB) queuing disciplines for QoS-guaranteed Diffserv provisioning with optimized bandwidth utilization and priority-based preemption. 351-358 - Sanon Chimmanee:

PACS metric based on regression for evaluating end-to-end QoS capability over the Internet for telemedicine. 359-364 - Eunhye Choi, Hyunggon Park:

Transformation based low complexity algorithm for Nash bargaining solutions in dynamic networks. 365-370 - Ji-Young Jung

, Dong-Yoon Seo, Jung-Ryun Lee:
VoIP call admission control scheme considering VoIP on-off patterns. 371-374 - Yun-Jae Shin, Jung-Ryun Lee:

Time synchronization protocol in ad hoc network. 375-378 - Jisub Lee, Chenglong Shao

, Heejun Roh
, Wonjun Lee:
Price-based tethering for cooperative networking. 379-384 - Whoi Jin Jung, SeokHong Min, Bong Gyu Kim, Hyung Suk Choi, Jae Yong Lee

, Byung-Chul Kim:
R-HWMP: Reservation-based HWMP supporting end-to-end QoS in Wireless Mesh Networks. 385-390 - Vijayashree Budyal

, Sunilkumar S. Manvi, S. G. Hiremath:
Agent driven multi-constrained quality of service anycast routing in mobile ad hoc networks. 391-396 - Kwangsung Ju, Kwangsue Chung:

Dynamic TXOP allocation for multimedia QoS providing over wireless networks. 397-401 - Yongsun Kim, Hoyong Kang:

Priority-based contention period allocation for directional CSMA/CA in smart home. 402-406 - Jiseon Lee, Hyeonmok Ko, Cheeha Kim:

OSLMAC: One-step look-ahead MAC protocol for concurrent transmission over wireless ad hoc networks. 407-411 - Chavalit Koweerawong, Komwut Wipusitwarakun, Kamol Kaemarungsi:

Indoor localization improvement via adaptive RSS fingerprinting database. 412-416 - Ran Park, Wuwoan Kim, Sangdong Jang:

Improved AOMDV to increase path stability by utilizing the node mobility information in MANET. 417-422 - Dooyeol Yoon, Sungchang Lee, Jinpyo Hong, Kwangsue Chung:

Weighted bandwidth sharing scheme to guarantee the video quality in home networks. 423-427 - Eui-Jik Kim, Jung-Hyok Kwon, Chul-Hee Kang, Sang-Hong Lee:

Transmission frame assignment for latency-bounded data delivery in wsns. 428-433 - Hanan Hussein, Hussein A. Elsayed

, Salwa H. El-Ramly:
Performance evaluation of Cognitive Radio Network Predictive MAC (P-MAC) access algorithm and its enhancement. 434-439 - Saleem Ahmed, Sooyoung Kim

:
An efficient iterative detection scheme for coded MIMO systems. 440-443 - E. Eylem Ozekin, F. Cihan Demirci, Fatih Alagöz:

Self-evaluating reinforcement learning based spectrum management for cognitive Ad Hoc networks. 444-449 - Naoya Maki, Takayuki Nishio, Ryoichi Shinkuma

, Tatsuro Takahashi, Tatsuya Mori
, Noriaki Kamiyama, Ryoichi Kawahara:
Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks. 450-455 - Yutaka Yasuda, Shingo Ata, Ikuo Oka:

Proactive cache management method for content hash based distributed archive system. 456-461 - Amit Kumar Das

, Tamal Adhikary, Md. Abdur Razzaque, Choong Seon Hong
:
An intelligent approach for virtual machine and QoS provisioning in cloud computing. 462-467 - Yeongkwun Kim, Injoo Kim:

Security issues in vehicular networks. 468-472 - ByungRae Cha, JongWon Kim:

Security tactics for secured cloud computing resources. 473-475 - Jungeun Jee, Joopal Jang, Inhee Jo, Yongtae Shin:

A Network Partition Scheme to protect secure zone for malicious code. 476-480 - Peidai Xie, Xicheng Lu, Jinshu Su

, Yongjun Wang, Meijian Li:
iPanda: A comprehensive malware analysis tool. 481-486 - Svetlana Kim, Yongik Yoon:

Media adaptation model based on character object for cognitive TV. 487-492 - Wangxi Jia, Hai Jin, Xiaofei Liao:

A new video search approach based on user's preference and query ambiguity. 493-498 - Jyri Rajamäki, Markus Vuorinen:

Multi-supplier integration management for public protection and disaster relief (PPDR) organizations. 499-504 - Xin Su, KyungHi Chang:

A comparative study on wireless backhaul solutions for beyond 4G network. 505-510 - Junguye Hong, Myoungbeom Chung, Hyunseung Choo:

Novel bulletin board system based on document object model and client-side scripting for improved interaction. 511-516 - Jingjiao Li, Yong Chen, Cholman Ho, Zhenlin Lu:

Binary-tree-based high speed packet classification system on FPGA. 517-522 - Wan Jung, Sang-Il Kim, Hwa-Sung Kim:

Ontology modeling for REST Open APIs and web service mash-up method. 523-528 - Masaharu Imai, Yoshio Sugizaki, Koichi Asatani:

A new estimation method using RTT for available bandwidth of a bottleneck link. 529-534 - Ahmed Triki, Paulette Gavignet, Bernard Arzur, Esther Le Rouzic, Annie Gravey

:
Efficient control plane for passive optical burst switching network. 535-540 - Hatim G. Zaini:

A novel approach for designing a feedback controller of linear time invariant networked control systems with delayed-transmission time. 541-546 - Young Min Kwon, Jun Suk Kim, Jaheon Gu, Min Young Chung:

Andsf-based congestion control procedure in heterogeneous networks. 547-550 - Yao-Liang Chung:

Green dynamic configuration in two-tier LTE femtocell networks. 551-555 - Suwa Kim, Junyeong Bok, Heung-Gyoon Ryu:

Performance evaluation of DCSK system with chaotic maps. 556-559 - Jyri Rajamäki, Pasi Kamppi:

Mobile communications challenges to cross-border tracking operations carried out by law enforcement authorities. 560-565 - Giseop Noh, Young-myoung Kang, Chong-kwon Kim:

Ecsy-Recsy: Considering Sybil attack with time dynamics and economics in recommender system. 566-571 - Sanon Chimmanee:

An effect of variable distance on IP camera performance implemented on WLAN robot. 572-577 - Seung Wook Jung

, Souhwan Jung:
HRP: A HMAC-based RFID mutual authentication protocol using PUF. 578-582 - Sanon Chimmanee, Puttinun Patpituck:

Analysis in the internet traffic pattern based on RTT over ADSL in Thailand. 583-588 - Sanon Chimmanee, Puttinun Patpituck:

Picture archiving and communication system (PACS) characteristic on wired-line and wireless network for traffic simulation. 589-594 - Jaehwa Park, JunSeong Kim:

A classification of network traffic status for various scale networks. 595-599 - Florian Liers, Markus Hager, Sebastian Schellenberg, Jochen Seitz:

Recursive layering of Forwarding on Gates and Traffic Engineering Middleware for Ethernet. 600-605 - Tomoya Kitayama, Go Hasegawa

, Yoshiaki Taniguchi
, Hirotaka Nakano:
Time slot-adding algorithm for improving bottleneck link throughput in IEEE 802.16j relay networks. 606-611 - Michifumi Miyashita, Jun-ichi Takada

:
Influence of multi-rate control function on the end-to-end latency of multi-hop wireless LAN. 612-617 - Hyunjae Woo, Chaewoo Lee, Seong Keun Oh:

Reliable anchor node based range-free localization algorithm in anisotropic wireless sensor networks. 618-622 - Markus Hager, Maik Debes, Sebastian Schellenberg, Jochen Seitz:

IP-based access to sensor networks enabled by a transparent proxy server. 623-627 - Bui Xuan Yen, Do Tronghop, Myungsik Yoo:

Redundant transmission in wireless networked control system over IEEE 802.15.4e. 628-631 - Hyunjae Woo, Sangwoo Lee, Chaewoo Lee:

Range-free localization with isotropic distance scaling in wireless sensor networks. 632-636 - Xu Zhen, Wenzhong Yang:

Bandwidth-aware routing for TDMA-based mobile ad hoc networks. 637-642 - Aruna Jayasuriya, Anselm Teh:

Packet value based scheduling for wireless local area networks. 643-647 - Claudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Wei Li, Albert Y. Zomaya

, José Neuman de Souza
:
A scheduling algorithm for shared sensor and actuator networks. 648-653 - Anbin Kim, Chan Hong Park, Seong-Ho Jeong:

Signaling-based service quality adaptation in heterogeneous networks. 654-657 - Hyun-Dong Chu, Hyunjung Kim, Seung-Joon Seok:

Flow based 3G/WLAN vertical handover scheme using MIH model. 658-663 - Jaesung Park:

Secure handoff method for seamless service provisioning in infrastructure mode 802.11i system. 664-669 - Meijian Li, Yongjun Wang, Peidai Xie:

A binary analysis method for protocol deviation discovery from implementations. 670-675 - Inhye Park, Hyungkeun Lee, Hyukjoon Lee:

Software optimization for embedded communication system. 676-679 - Miguel Angel Patino Gonzalez, Takeshi Higashino, Minoru Okada:

Radio access considerations for data offloading with multipath TCP in cellular/WiFi networks. 680-685 - Jaehoon Jeong, Hyeryung Jang, Yujin Kim, Yung Yi, Jeonghoon Mo:

Network traffic reduction through smart network. 686-689 - Haile B. Weldu, Bosung Kim, Byeong-Hee Roh

:
Deterministic approach to rendezvous channel setup in cognitive radio networks. 690-695 - Bharat S. Rawal, Lewis Berman, Harold Ramcharan:

Multi-client/Multi-server split architecture. 696-701 - Haneul Ko, Younghyun Kim, Minsu Shin, Sangheon Pack

:
An interworking architecture between Internet and contents oriented networks. 702-707 - Zia Ush-Shamszaman

, Safina Showkat Ara, Ilyoung Chong:
Feasibility considerations of multipath TCP in dealing with big data application. 708-713 - Shinho Lee, Hyeonwoo Kim, Dong-kweon Hong, Hongtaek Ju:

Correlation analysis of MQTT loss and delay according to QoS level. 714-717

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














