default search action
ICOIN 2013: Bangkok, Thailand
- The International Conference on Information Networking 2013, ICOIN 2013, Bangkok, Thailand, January 28-30, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-5740-1
- P. Jongsuebsuk, Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo:
Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacks. 1-5 - Sayonnha Mandal, Gregory Macdonald, Mayssaa El Rifai, Nikhil Punekar, Farnaz Zamani, Yuhua Chen, Subhash C. Kak, Pramode K. Verma, Robert C. Huck, James J. Sluss Jr.:
Multi-photon implementation of three-stage quantum cryptography protocol. 6-11 - Satoru Shimosaka, Kenta Umebayashi, Yasuo Suzuki:
A study on stream assignment method for secure MIMO communication. 12-17 - Shi Li, Kyung Choi, Kijoon Chae:
An enhanced measurement transmission scheme for privacy protection in smart grid. 18-23 - Eng Keong Lua, Ruichuan Chen:
A holistic immune system against active P2P worms. 24-29 - Koji Imagawa, Hiroyoshi Miwa:
Detecting protected links to keep reachability to server against failures. 30-35 - Sookyoung Lee, Meejeong Lee:
QRMSC: Efficient QoS-aware relay node placement in wireless sensor networks using Minimum Steiner tree on the Convex hull. 36-41 - Yuki Kasama, Toshiaki Miyazaki:
Movement path estimation for multiple humans in a room using binary infrared sensors. 42-47 - Duc-Tai Le, Thang Le Duc, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:
Latency aware Broadcast Scheduling in Duty Cycled wireless sensor networks. 48-53 - Menik Tissera, Robin Doss, Gang Li, Lynn Margaret Batten:
Information discovery in multidimensional wireless sensor networks. 54-59 - Imeddine Ben Abid, Noureddine Boudriga:
Game theory for misbehaving detection in wireless sensor networks. 60-65 - Ill-Keun Rhee, Hee-Soo Kim:
Improved DOA estimation of correlated signals in correlated antenna noises environment. 66-70 - Menghan Li, Xiaoping Zhang, Yupeng Tian, Haixiang Zhang:
Potential based routing in B-P2i- architecture. 71-76 - Yang Han, Kei'ichi Koyanagi, Takeshi Tsuchiya, Tadashi Miyosawa, Hiroo Hirose:
A trust-based routing strategy in structured P2P overlay networks. 77-82 - Soo-Hoon Moon, Seung-Jae Han, Sunju Park:
Energy-efficient flow control and routing for clustered wireless sensor networks. 83-88 - Hyochun Ahn, Youn Seo, Jaebeom Kim, Young-Bae Ko, Cheolhyo Lee, Chang-Joo Kim:
Multi-metric geo-routing protocol for tactical ad hoc networks. 89-94 - Sebastian Schellenberg, Peggy Begerow, Markus Hager, Jochen Seitz, Thomas Finke, Juergen Schroeder:
Implementation and validation of an address resolution mechanism using adaptive routing. 95-100 - Alisson B. Souza, Joaquim Celestino Júnior, Felipe A. Xavier, Francisco D. Oliveira, Ahmed Patel, Maryam Latifi:
Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networks. 101-106 - Ji In Kim, Seok Joo Koh:
Distributed mobility management in proxy mobile IPv6 using hash function. 107-112 - Tapio Frantti, Mikko Majanen:
Real-time traffic control for multihomed devices. 113-118 - Nicholas Katanekwa, Neco Ventura:
Mobile content distribution and selective traffic offload in the 3GPP evolved packet system (EPS). 119-124 - Charna John, Sibonelo Madlopha, Neco Ventura:
PMIPv6-based make-before-break handover for real-time services in 3GPPs Evolved Packet Core. 125-130 - Arto Kaasinen, Yong-Ik Yoon:
Service engagement model for mobile advertising based on user behavior. 131-134 - Pham Ngoc Thanh, Keecheon Kim:
Implementation of open Two-Factor Authentication service applied to Virtual Private Network. 135-140 - Kwang-Chun Go, Jae-Ryong Cha, Seong Keun Oh, Jae-Hyun Kim:
End-to-end performance analysis based on cross-layer retransmission scheme in wireless communication system. 141-144 - Osamu Takada, Kohta Ohshima, Matsuaki Terada:
End-to-end delay analysis method for tandem switches with variable bandwidth links. 145-150 - Tomoaki Tsutsumi, Minoru Koizumi, Tomoichi Ebata, Kohta Ohshima, Matsuaki Terada:
Performance evaluation of synchronous distributed wireless network emulator for high-speed mobility. 151-156 - Kwang-Soon Choi, Young-Choong Park, Byoung-Ha Park, Sung Hee Hong, KwangMo Jung:
FPGA implementation of human emotion reasoning engine. 157-162 - Tuan LeAnh, Nguyen Van Mui, Cuong T. Do, Choong Seon Hong, Sungwon Lee, Jinpyo Hong:
Optimal network selection coordination in heterogeneous Cognitive Radio Networks. 163-168 - Vishram Mishra, Chiew Tong Lau, Syin Chen:
Deterministic time pattern based channel selection in cognitive Radio network. 169-174 - Camila S. Barbosa, Vinicius C. M. Borges, Sand Correa, Kleber Vieira Cardoso:
An evolution-inspired algorithm for efficient dynamic spectrum selection. 175-180 - Do-Hoon Kim, Heung-Gyoon Ryu:
An efficient blind turbo equalizer for compensating Doppler effects. 181-185 - Si Yu, Xiaolin Gui, Jiancai Lin:
An approach with two-stage mode to detect cache-based side channel attacks. 186-191 - Yao-Liang Chung:
A green rate-and-power control transmission scheme in multi-carrier base stations. 192-197 - Nuredin Ali Salem Ahmed, Adel Emhemmed, Khaled Elgaid:
Dual-radios hypermesh network based on CSMA protocol. 198-203 - Chi-Shih Chao, Szu-Pei Lu:
An adaptive probe selection mechanism for k-link fault diagnosis on all-optical mesh networks. 204-209 - Tapio Frantti, Hannu Hietalahti, Reijo Savola:
Requirements of secure WSN-MCN edge router. 210-215 - Jong-Kwan Lee, Hong-Jun Noh, Jaesung Lim:
A cooperative TDMA MAC protocol using dynamic slot assignment scheme. 216-220 - Ramzi Bellazreg, Noureddine Boudriga, Sunshin An:
Border surveillance using sensor based thick-lines. 221-226 - Tin Yu Wu, Wei-Tsong Lee, Jhih-Siang Huang, Chien-Yu Duan, Tain-Wen Suen:
An enhanced approach for estimating writable working set by pre-copy and prediction. 227-231 - Binh Minh Nguyen, Viet D. Tran, Ladislav Hluchý:
A novel approach for developing interoperable services in cloud environment. 232-237 - Pham Phuoc Hung, Bui Tuan-Anh, Eui-Nam Huh:
A solution of thin-thick client collaboration for data distribution and resource allocation in cloud computing. 238-243 - Masakuni Ishii, Jungkyu Han, Hiroyuki Makino:
Design and performance evaluation for Hadoop clusters on virtualized environment. 244-249 - Jin-A. Hong, Sangmin Seo, Namgi Kim, Byoung-Dai Lee:
A study of secure data transmissions in mobile cloud computing from the energy consumption side. 250-255 - Kenko Ota, Kohei Miyasaka, Takaharu Nagahashi, Yoshio Nogami, Shunichi Tada, Hideaki Matsue:
A study on switching symbol timing detection method for continuous OFDM signals. 256-261 - Hyeok Koo Jung:
Alternate time-switched multiplexed space-time block coding technique for single-carrier modulation. 262-267 - Genichiro Murata, Kenta Umebayashi, Yasuo Suzuki:
A study on detection method of same spreading code signals by multimodulus algorithm. 268-273 - Sika Shrestha, Seung Jo Han, Sun-Kuk Noh, Sunwoong Kim, Hyun-Bai Kim, Dong-You Choi:
Design of modified Sierpinski fractal based miniaturized patch antenna. 274-279 - Young Ju Hwang, Seong-Lyun Kim:
Cooperation through secondary relaying in TDMA cellular networks. 280-285 - Shu-Ming Tseng, Yueh-Teng Hsu, Shiou-Cheng Ren:
A distributed quasi-orthogonal space time block code for cooperative communication with information exchange errors for decode-and-forward relay networks. 286-290 - Joscha Schneider, Eckhart Korner, Lothar Grimm:
Inter-domain connection of reload-based peer-to-peer overlays. 291-296 - Sheng-Chang Chen, Chung-Ju Chang, Yu-Huang Chu:
A fuzzy cache lifetime determination scheme for LISP mapping systems. 297-302 - Adriano Fiorese, Paulo Simões, Fernando Boavida:
Approach for service search and peer selection in P2P service overlays. 303-308 - Ho Kuen Song, Kwang Myung Kim, Kyung Tae Kim, Hee Yang Youn:
Application of genetic algorithm for logistics based on multi-agent system. 309-314 - Seungoh Choi, Kwangsoo Kim, Seongmin Kim, Byeong-Hee Roh:
Threat of DoS by interest flooding attack in content-centric networking. 315-319 - Hyunwoo Nam, Younghan Kim:
Contents sharing using PPSP in DLNA-based networks. 320-323 - Sabari Somasekharan Nair, Sebastian Schellenberg, Jochen Seitz, Mainak Chatterjee:
Hybrid spectrum sharing in dynamic spectrum access networks. 324-329 - Thant Zin Oo, Choong Seon Hong, Sungwon Lee:
Alternating renewal framework for estimation in spectrum sensing policy and proactive spectrum handoff. 330-335 - Suriya Kanthalue, Pheeradej Nanan:
Pre- and post- equalization technique combining for wireless communications. 336-340 - Youngpo Lee, Jaewoo Lee, Youngseok Lee, Jeongyoon Shim, Seokho Yoon:
A threshold-based frequency offset estimation scheme for OFDM systems. 341-345 - Jongseon Park, Dosik An, Gihwan Cho:
An adaptive channel number tuning mechanism on parallel transfer with UDT. 346-350 - Chang-Hwan Lee, Young-Tak Kim:
QoS-aware hierarchical token bucket (QHTB) queuing disciplines for QoS-guaranteed Diffserv provisioning with optimized bandwidth utilization and priority-based preemption. 351-358 - Sanon Chimmanee:
PACS metric based on regression for evaluating end-to-end QoS capability over the Internet for telemedicine. 359-364 - Eunhye Choi, Hyunggon Park:
Transformation based low complexity algorithm for Nash bargaining solutions in dynamic networks. 365-370 - Ji-Young Jung, Dong-Yoon Seo, Jung-Ryun Lee:
VoIP call admission control scheme considering VoIP on-off patterns. 371-374 - Yun-Jae Shin, Jung-Ryun Lee:
Time synchronization protocol in ad hoc network. 375-378 - Jisub Lee, Chenglong Shao, Heejun Roh, Wonjun Lee:
Price-based tethering for cooperative networking. 379-384 - Whoi Jin Jung, SeokHong Min, Bong Gyu Kim, Hyung Suk Choi, Jae Yong Lee, Byung-Chul Kim:
R-HWMP: Reservation-based HWMP supporting end-to-end QoS in Wireless Mesh Networks. 385-390 - Vijayashree Budyal, Sunilkumar S. Manvi, S. G. Hiremath:
Agent driven multi-constrained quality of service anycast routing in mobile ad hoc networks. 391-396 - Kwangsung Ju, Kwangsue Chung:
Dynamic TXOP allocation for multimedia QoS providing over wireless networks. 397-401 - Yongsun Kim, Hoyong Kang:
Priority-based contention period allocation for directional CSMA/CA in smart home. 402-406 - Jiseon Lee, Hyeonmok Ko, Cheeha Kim:
OSLMAC: One-step look-ahead MAC protocol for concurrent transmission over wireless ad hoc networks. 407-411 - Chavalit Koweerawong, Komwut Wipusitwarakun, Kamol Kaemarungsi:
Indoor localization improvement via adaptive RSS fingerprinting database. 412-416 - Ran Park, Wuwoan Kim, Sangdong Jang:
Improved AOMDV to increase path stability by utilizing the node mobility information in MANET. 417-422 - Dooyeol Yoon, Sungchang Lee, Jinpyo Hong, Kwangsue Chung:
Weighted bandwidth sharing scheme to guarantee the video quality in home networks. 423-427 - Eui-Jik Kim, Jung-Hyok Kwon, Chul-Hee Kang, Sang-Hong Lee:
Transmission frame assignment for latency-bounded data delivery in wsns. 428-433 - Hanan Hussein, Hussein A. Elsayed, Salwa H. El-Ramly:
Performance evaluation of Cognitive Radio Network Predictive MAC (P-MAC) access algorithm and its enhancement. 434-439 - Saleem Ahmed, Sooyoung Kim:
An efficient iterative detection scheme for coded MIMO systems. 440-443 - E. Eylem Ozekin, F. Cihan Demirci, Fatih Alagöz:
Self-evaluating reinforcement learning based spectrum management for cognitive Ad Hoc networks. 444-449 - Naoya Maki, Takayuki Nishio, Ryoichi Shinkuma, Tatsuro Takahashi, Tatsuya Mori, Noriaki Kamiyama, Ryoichi Kawahara:
Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks. 450-455 - Yutaka Yasuda, Shingo Ata, Ikuo Oka:
Proactive cache management method for content hash based distributed archive system. 456-461 - Amit Kumar Das, Tamal Adhikary, Md. Abdur Razzaque, Choong Seon Hong:
An intelligent approach for virtual machine and QoS provisioning in cloud computing. 462-467 - Yeongkwun Kim, Injoo Kim:
Security issues in vehicular networks. 468-472 - ByungRae Cha, JongWon Kim:
Security tactics for secured cloud computing resources. 473-475 - Jungeun Jee, Joopal Jang, Inhee Jo, Yongtae Shin:
A Network Partition Scheme to protect secure zone for malicious code. 476-480 - Peidai Xie, Xicheng Lu, Jinshu Su, Yongjun Wang, Meijian Li:
iPanda: A comprehensive malware analysis tool. 481-486 - Svetlana Kim, Yongik Yoon:
Media adaptation model based on character object for cognitive TV. 487-492 - Wangxi Jia, Hai Jin, Xiaofei Liao:
A new video search approach based on user's preference and query ambiguity. 493-498 - Jyri Rajamäki, Markus Vuorinen:
Multi-supplier integration management for public protection and disaster relief (PPDR) organizations. 499-504 - Xin Su, KyungHi Chang:
A comparative study on wireless backhaul solutions for beyond 4G network. 505-510 - Junguye Hong, Myoungbeom Chung, Hyunseung Choo:
Novel bulletin board system based on document object model and client-side scripting for improved interaction. 511-516 - Jingjiao Li, Yong Chen, Cholman Ho, Zhenlin Lu:
Binary-tree-based high speed packet classification system on FPGA. 517-522 - Wan Jung, Sang-Il Kim, Hwa-Sung Kim:
Ontology modeling for REST Open APIs and web service mash-up method. 523-528 - Masaharu Imai, Yoshio Sugizaki, Koichi Asatani:
A new estimation method using RTT for available bandwidth of a bottleneck link. 529-534 - Ahmed Triki, Paulette Gavignet, Bernard Arzur, Esther Le Rouzic, Annie Gravey:
Efficient control plane for passive optical burst switching network. 535-540 - Hatim G. Zaini:
A novel approach for designing a feedback controller of linear time invariant networked control systems with delayed-transmission time. 541-546 - Young Min Kwon, Jun Suk Kim, Jaheon Gu, Min Young Chung:
Andsf-based congestion control procedure in heterogeneous networks. 547-550 - Yao-Liang Chung:
Green dynamic configuration in two-tier LTE femtocell networks. 551-555 - Suwa Kim, Junyeong Bok, Heung-Gyoon Ryu:
Performance evaluation of DCSK system with chaotic maps. 556-559 - Jyri Rajamäki, Pasi Kamppi:
Mobile communications challenges to cross-border tracking operations carried out by law enforcement authorities. 560-565 - Giseop Noh, Young-myoung Kang, Chong-kwon Kim:
Ecsy-Recsy: Considering Sybil attack with time dynamics and economics in recommender system. 566-571 - Sanon Chimmanee:
An effect of variable distance on IP camera performance implemented on WLAN robot. 572-577 - Seung Wook Jung, Souhwan Jung:
HRP: A HMAC-based RFID mutual authentication protocol using PUF. 578-582 - Sanon Chimmanee, Puttinun Patpituck:
Analysis in the internet traffic pattern based on RTT over ADSL in Thailand. 583-588 - Sanon Chimmanee, Puttinun Patpituck:
Picture archiving and communication system (PACS) characteristic on wired-line and wireless network for traffic simulation. 589-594 - Jaehwa Park, JunSeong Kim:
A classification of network traffic status for various scale networks. 595-599 - Florian Liers, Markus Hager, Sebastian Schellenberg, Jochen Seitz:
Recursive layering of Forwarding on Gates and Traffic Engineering Middleware for Ethernet. 600-605 - Tomoya Kitayama, Go Hasegawa, Yoshiaki Taniguchi, Hirotaka Nakano:
Time slot-adding algorithm for improving bottleneck link throughput in IEEE 802.16j relay networks. 606-611 - Michifumi Miyashita, Jun-ichi Takada:
Influence of multi-rate control function on the end-to-end latency of multi-hop wireless LAN. 612-617 - Hyunjae Woo, Chaewoo Lee, Seong Keun Oh:
Reliable anchor node based range-free localization algorithm in anisotropic wireless sensor networks. 618-622 - Markus Hager, Maik Debes, Sebastian Schellenberg, Jochen Seitz:
IP-based access to sensor networks enabled by a transparent proxy server. 623-627 - Bui Xuan Yen, Do Tronghop, Myungsik Yoo:
Redundant transmission in wireless networked control system over IEEE 802.15.4e. 628-631 - Hyunjae Woo, Sangwoo Lee, Chaewoo Lee:
Range-free localization with isotropic distance scaling in wireless sensor networks. 632-636 - Xu Zhen, Wenzhong Yang:
Bandwidth-aware routing for TDMA-based mobile ad hoc networks. 637-642 - Aruna Jayasuriya, Anselm Teh:
Packet value based scheduling for wireless local area networks. 643-647 - Claudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Wei Li, Albert Y. Zomaya, José Neuman de Souza:
A scheduling algorithm for shared sensor and actuator networks. 648-653