default search action
ISCC 2009: Sousse, Tunisia
- Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia. IEEE Computer Society 2009, ISBN 978-1-4244-4672-8
ISCC 2009
- Thomas A. Babbitt, Christopher Morrell, Boleslaw K. Szymanski:
Self-Selecting Reliable Path Routing in diverse Wireless Sensor Network environments. 1-7 - Alexandros Karagiannis, Stafanos Kokkorikos, Philip Constantinou:
Energy consumption analysis and optimization techniques for Wireless Sensor Networks. 8-14 - Bashir Yahya, Jalel Ben-Othman:
An adaptive mobility aware and energy efficient MAC protocol for wireless sensor networks. 15-21 - Michele Albano, Stefano Chessa:
Distributed Erasure Coding in Data Centric Storage for wireless sensor networks. 22-27 - Maurizio Paone, Luca Paladina, Marco Scarpa, Antonio Puliafito:
A multi-sink swarm-based routing protocol for Wireless Sensor Networks. 28-33 - Xu Xu, Yu Hen Hu, Jingping Bi, Wei Liu:
Adaptive nodes scheduling approach for clustered sensor networks. 34-39 - Rami Ellouze, Abdelhak Mourad Guéroui, Mohamed Adel Alimi:
Optimising handover for real-time flows in Mobile wimax network. 40-45 - Tarek Bchini, Nabil Tabbane, Emmanuel Chaput, Sami Tabbane, André-Luc Beylot:
Interaction & handover between IEEE 802.16e and DVB-S/RCS using MSCTP protocol. 46-53 - Tarek Bchini, Nabil Tabbane, Emmanuel Chaput, Sami Tabbane, André-Luc Beylot:
Hard handover vs soft handover in a city. 54-60 - Kuei-Ping Shih, Sheng-Shih Wang, Chan-Ying Lien:
A high spectral efficiency and load-aware metric for path selection in IEEE 802.16j multi-hop relay networks. 61-66 - Amir Djouama, Marwen Abdennebi, Lynda Mokdad, Samir Tohmé:
Lifetime aware admission control for infrastructure-less wireless networks. 67-72 - Antonio Corradi, Fulvio Di Marco, Stefano Monti, Samuele Pasini:
Facing crosscutting concerns in a middleware for pervasive Service composition. 73-79 - Niklas Blum, Sebastian Lampe, Thomas Magedanz:
Design of a message interworking function for converged IP messaging in Next Generation Networks. 80-85 - Manos Spanoudakis, Stathes Hadjiefthymiades:
Adaptive partial CDN replication. 86-91 - Jalel Ben-Othman, Lynda Mokdad, Mohamed Ould Cheikh, Mbaye Sene:
Performance analysis of composite web services using Stochastic Automata Networks over IP network. 92-97 - Nabila Bousbia, Amar Balla, Issam Rebaï:
Measuring the learners' learning style based on tracks analysis in web based learning. 98-103 - Willian dos Santos Lima, Renata Spolon Lobato, Aleardo Manacero, Roberta Spolon Ulson:
Towards a Java bytecodes compiler for Nios II soft-core processor. 104-109 - Salma Ktari, Artur Hecker, Houda Labiod:
Exploiting routing unfairness in DHT overlays. 110-115 - Giuseppe Anastasi, Marco Conti, Ilaria Giannetti, Andrea Passarella:
Design and evaluation of a BitTorrent proxy for energy saving. 116-121 - Vasco N. G. J. Soares, Farid Farahmand, Joel J. P. C. Rodrigues:
A layered architecture for Vehicular Delay-Tolerant Networks. 122-127 - Hosein Shafiei, Zahra Aghazadeh, Ahmad Khonsari, Mohamed Ould-Khaoua:
PeerStar: An attractive alternative to existing peer-to-peer topologies. 128-134 - Wei Liang, Rong Wu, Jingping Bi, Zhenyu Li:
PPStream characterization: Measurement of P2P live streaming during Olympics. 135-140 - Husnain Mansoor Ali, Anthony Busson, Véronique Vèque:
Network layer link management using signal strength for ad-hoc networks. 141-146 - Karima Maâlaoui, Leïla Azouz Saïdane:
Priority based intra piconet scheduling scheme for QoS guaranties in Bluetooth networks. 147-152 - Tae-Hoon Kim, David Tipper, Prashant Krishnamurthy:
Connectivity and critical point behavior in mobile ad hoc and sensor networks. 153-158 - Murad Khalid, Ravi Sankar, In-ho Ra:
Towards a Cross Layer Framework for ad hoc wireless networks. 159-164 - Ibrahim Al-Kassem, Sanaa Sharafeddine, Zaher Dawy:
BlueHRT: Hybrid Ring Tree Scatternet Formation in Bluetooth Networks. 165-169 - Andrea Giordanna Oliveira do Nascimento, Edjair de Souza Mota, Saulo Queiroz, Leandro Galvão, Edson Nascimento Silva Jr.:
Towards an efficient header compression scheme to improve VoIP over wireless mesh networks. 170-175 - Yan Li, Sanjay Ranka, Sartaj Sahni:
In-advance path reservation for file transfers In e-Science applications. 176-181 - Sofia A. Paredes, Gregor von Bochmann, Trevor J. Hall:
Deploying agile photonic networks over reconfigurable optical networks. 182-187 - Hichem Mrabet, Iyad Dayoub, Rabah Attia, Nizar Al-Holou, Charles Tatkeu:
Impact of chromatic and modal dispersion on frequency response of optical multimode fibers. 188-194 - Wael Hosny Fouad Aly, Mohamed Faten Zhani, Halima Elbiaze:
Adaptive Offset for OBS networks using Feedback Control Techniques. 195-199 - Walid Abdallah, Mohamed Hamdi, Noureddine Boudriga:
A public key algorithm for optical communication based on lattice cryptography. 200-205 - Gábor Enyedi, Gábor Rétvári, András Császár:
On Finding maximally redundant trees in strictly linear time. 206-211 - Faïza Najjar, Hassenet Slimani:
Compact N-tree: an indexing structure for distance range queries. 212-217 - Shibdas Bandyopadhyay, Sartaj Sahni:
Sorting on a Cell Broadband Engine SPU. 218-223 - Tania Mishra, Sartaj Sahni:
PETCAM-A power Efficient TCAM for forwarding tables. 224-229 - Elhillali Kerkouche, Allaoua Chaoui, Khaled Khalfaoui:
Transforming UML models to colored petri nets models using graph grammars. 230-236 - Sungsoo Kim, YongHwan Kim, Kwangseon Ahn:
An Enhanced Slotted Binary Tree Algorithm with Intelligent Separation in RFID systems. 237-242 - Ayman Radwan, Hossam S. Hassanein:
Analyzing the application of inter-cell relay in CDMA cellular networks. 243-248 - Anas F. Alrawi, Bayan S. Sharif, Charalampos Tsimenidis, Konstantinos Ntagkounakis:
Influence of code orthogonality on downlink throughput comparison between MC-CDMA and OFDMA in multi-cellular environments. 249-254 - Rizwan Khan, Sonia Aïssa, Charles L. Despins:
Seamless vertical handoff algorithm for heterogeneous wireless networks-an advanced filtering approach. 255-260 - Abdelhalim Najjar, Noureddine Hamdi, Ammar Bouallegue:
Efficient frequency reuse scheme for multi-cell OFDMA systems. 261-265 - Elias Yaacoub, Hussein Al-Asadi, Zaher Dawy:
Low complexity scheduling algorithms for the LTE uplink. 266-270 - Tong Shu, Min Liu, Zhongcheng Li:
A performance evaluation model for RSS-based vertical handoff algorithms. 271-276 - Mohammad Hammoudeh, Robert M. Newman, Christopher Dennett, Sarah Mount:
Inductive as a support of deductive data visualisation in Wireless Sensor Networks. 277-280 - Francesco Palmieri, Ugo Fiore, Sergio Ricciardi:
SimulNet: a wavelength-routed optical network simulation framework. 281-286 - Rangyu Deng, Weixia Xu, Qiang Dou, Hongwei Zhou, Zefu Dai, Haiyan Chen:
An efficient stream memory architecture for heterogeneous multicore processor. 287-290 - Fadila Aoussat, Mohamed Ahmed-Nacer:
Reusing heterogeneous software process models. 291-294 - César S. Aguiar, Daniel I. Cruz, Marcos Antonio Cavenaghi, Roberta Spolon Ulson, Renata Spolon Lobato:
A tool to simplify the management of homogeneous and heterogeneous grids. 295-298 - Merouane Bouzid, Mehdi Ould Hocine:
Quantization software: application of trellis coded scalar/vector quantization. 299-302 - Diogo R. Viegas, Mário Antônio Ribeiro Dantas, Michael A. Bauer:
A case study of a multi-cluster utilizing enhanced transport protocols. 303-306 - Luigi Liquori, Cédric Tedeschi, Francesco Bongiovanni:
Babelchord: a social tower of DHT-based overlay networks. 307-312 - Mohsen Toorani, Abolfazl Falahati:
A secure variant of the Hill Cipher. 313-316 - Mourad Moussa Jlassi, Ali Douik, Hassani Messaoud:
Objects detection by expectation-maximisation algorithm application to football images. 317-320 - Sandra P. Tinta, Alexander E. Mohr, Jennifer L. Wong:
Characterizing end-to-end packet reordering with UDP traffic. 321-324 - Gianluca Dini, Isidoro S. La Porta:
Bloumail: an interactive tool for blocking spam at the originator. 325-328 - Leonardo Lemes Fagundes, Luciano Paschoal Gaspary:
Breaking the barriers between security mechanisms through the composition of Web Services: Towards a solution for the detection of multistage distributed attacks. 329-332 - Zonglin Li, Guangmin Hu, Xingmiao Yao:
Multi-dimensional traffic anomaly detection based on ICA. 333-336 - Ola Amayri, Nizar Bouguila:
Online spam filtering using support vector machines. 337-340 - Boutheina A. Fessi, Salah Benabdallah, Mohamed Hamdi, Noureddine Boudriga:
A new genetic algorithm approach for intrusion response system in computer networks. 342-347 - Wael Adi, Noureddine Ouertani, Abdulrahman Hanoun, Bassel Soudan:
Deploying FPGA self-configurable cell structure for micro crypto-functions. 348-354 - Khaled Hamouid, Kamel Adi:
Robust Key Management scheme for certification in mobile ad-hoc networks. 355-360 - Razvi Doomun, Thaier Hayajneh, Prashant Krishnamurthy, David Tipper:
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks. 361-367 - Issa Khalil, Mohammad Hayajneh, Mamoun A. Awad:
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks. 368-373 - Filipe N. Ribeiro, Sérgio Donizetti Zorzo:
LPBS - Location Privacy Based System. 374-379 - Nicola Bicocchi, Marco Mamei, Franco Zambonelli:
Handling dynamics in gossip-based aggregation schemes. 380-385 - Claudio Casetti, Carla-Fabiana Chiasserini, Marco Fiore, Chi-Anh La, Pietro Michiardi:
P2P cache-and-forward mechanisms for mobile ad hoc networks. 386-392 - Petros Nicopolitidis, Georgios I. Papadimitriou, Andreas S. Pomportsis:
On the performance of adaptive Wireless Push Systems in high bit rate environments. 393-398 - Tobias Renk, Friedrich K. Jondral:
Location-dependent performance of cooperative networks with power allocation. 399-403 - Marcos F. Caetano, Jacir Luiz Bordim, Mário Antônio Ribeiro Dantas:
A collaborative cache approach for mobile ad hoc networks. 404-410 - Thabo K. R. Nkwe, Mieso K. Denko:
Self-optimizing cooperative caching in autonomic Wireless Mesh Networks. 411-416 - Lukasz Czekierda, Tomasz Grobelny:
Framework for application-level adaptation of media streams transmitted using DCCP Protocol. 417-423 - Raymond Peterkin, Mohamed Abou-Gabal, Fadi El-Hassan, Dan Ionescu:
Hardware implementation of session initiation protocol servers and clients. 424-430 - M. Maher Ben Ismail, Hichem Frigui:
Image annotation based on constrained clustering and semi-naive bayesian model. 431-436 - Christos Bouras, Apostolos Gkamas, Georgios Kioumourtzis:
Adaptive Smooth Simulcast Protocol for multimedia transmission. 437-442 - Attahiru Sule Alfa, Haitham Abu-Ghazaleh:
Discrete-time analysis of packet data discarding in high speed multimedia networks. 443-448 - Ling Chen, Kai Zheng, Fang Liu, Zhenming Lei, Yangjie:
Fingerprints in the spectrum: Spectral analysis and detection of VoIP traffic. 449-454 - Jukka-Pekka Laulajainen, Matti Hirvonen:
Automatic QoS control in UPnP home networks. 455-460 - Mohamed Zied Ben Hamouda, Olivier Brun, Jean-Marie Garcia:
A Tabu Search heuristic for capacitated network design. 461-467 - Lynda Zitoune, Amel Hamdi, Véronique Vèque, Hugues Mounier:
Using trajectory tracking control for expressive-based SLA applications in internet computing. 468-473 - Ali El Kamel, Habib Youssef:
An efficient hybrid recovery mechanism for MPLS-based networks. 474-480 - Fei Gaolei, Guangmin Hu, Qian Feng:
Time-varying network internal loss inference based on unicast end-to-end measurements. 481-486 - Habib M. Ammari, Sajal K. Das:
Joint k-coverage, duty-cycling, and geographic forwarding in wireless sensor networks. 487-492 - Iuri Bueno Drumond de Andrade, Geraldo Robson Mateus, Fabíola Guerra Nakamura:
A GRASP heuristic to Density Control: Solving multi-period coverage and Routing Problems in Wireless Sensor Networks. 493-499 - Maurizio A. Bonuccelli, Francesca Lonetti, Francesca Martelli:
Exploiting signal strength detection and collision cancellation for tag identification in RFID systems. 500-506 - Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, David Llewellyn-Jones:
Monitoring connectivity in wireless sensor networks. 507-512 - Daniel L. Guidoni, Raquel A. F. Mini, Antonio Alfredo Ferreira Loureiro, Azzedine Boukerche:
An on-line model to design heterogeneous wireless sensor networks based on small world concepts. 513-519 - Maurizio Giacobbe, Eugenio Guglielmino, Antonio Puliafito:
A platform for integrated data processing from heterogeneous devices in naval field. 520-525 - Nihel Ben Youssef, Adel Bouhoula, Florent Jacquemard:
Automatic verification of conformance of firewall configurations to security policies. 526-531 - Gianluca Dini, Angelica Lo Duca:
On securing publish-subscribe systems with security groups. 532-537 - Amina Chaabane, Mohamed Jmaiel:
Security aware content-based publish/subscribe system. 538-543 - Francesco Tusa, Massimo Villari, Antonio Puliafito:
Design and implementation of a secure XML-based grid file storage system with reliability features. 544-549 - Yu Adachi, Yoshihiro Oyama:
Malware analysis system using process-level virtualization. 550-556 - Mansoor Alicherry, Angelos D. Keromytis:
DoubleCheck: Multi-path verification against man-in-the-middle attacks. 557-563 - Abduladhim Ashtaiwi, Hossam S. Hassanein:
Enhancements to IEEE 802.11 DCF collision avoidance based on MIMO Adaptive Spatial Channels Sharing. 564-569 - Mohamed F. Ahmed, Reda A. Ammar, Sanguthevar Rajasekaran:
Novel micro-threading techniques on the Cell Broadband Engine. 570-575 - Imen Sfaihi, Noureddine Hamdi, Ammar Bouallegue:
Transmit Beamforming multi-user MISO systems based on switched sub-codebook. 576-580 - Daniel Benevides da Costa, Sonia Aïssa:
On the statistics of dual-hop semi-blind relaying systems with partial relay selection. 581-586 - Mohammad Hayajneh, Issa Khalil, Mamoun A. Awad:
Non-cooperative uplink power control game for CDMA wireless communications systems. 587-592 - Paulo Loureiro, Edmundo Monteiro:
Stability and performance analysis of the Open Box Transport Protocol. 593-599 - Shan Chen, Brahim Bensaou, Ka-Lok Hung:
Promoting self-imposed end-to-end congestion control via a Sword of Damocles approach. 600-605 - Bader Al-Manthari, Nidal Nasser, Najah A. Abu Ali, Hossam S. Hassanein:
Congestion prevention in broadband wireless access systems: An economic approach. 606-611 - Haifa Touati, Ilhem Lengliz, Farouk Kamoun:
Adapting TCP exponential backoff to multihop ad hoc networks. 612-617 - Árpád Huszák, Sándor Imre:
TFRC and RTT thresholds interdependence in a selective retransmission scheme. 618-623 - Lei Ye, Zhijun Wang:
A QoS-aware congestion control mechanism for DCCP. 624-629 - Andrea Baldini, Lorenzo De Carli, Fulvio Risso:
Increasing performances of TCP data transfers through multiple parallel connections. 630-636 - Dominik Kaspar, Kristian Evensen, Audun Fosselie Hansen, Paal Engelstad, Pål Halvorsen, Carsten Griwodz:
An analysis of the heterogeneity and IP packet reordering over multiple wireless networks. 637-642 - Wafa Kammoun, Habib Youssef:
Improving end-to-end multicast rate control in wireless networks. 643-648 - Imed Romdhani, Ahmed Yassin Al-Dubai:
Integrated many-to-many multicast addressing and access control method. 649-654 - Mohamed Aymen Chalouf, Francine Krief:
Service level negotiation in ubiquitous environments. 655-660 - Qiuyan Xia, Jian Pu, Mounir Hamdi, Khaled Ben Letaief:
Practical and efficient open-loop rate/link adaptation algorithm for high-speed IEEE 802.11n WLANs. 661-666 - Ka-Lok Hung, Brahim Bensaou:
Bandwidth allocation in IEEE 802.11 WLANs in presence of inter-BSSs hidden terminals. 667-672 - Adlen Ksentini:
Enhancing VoWLAN service through adaptive voice coder. 673-678 - Ahmed M. Mahboob, Manjunath M. Prabhu, Khaled A. Harfoush:
Access point-coordinated contention resolution for channel access in wireless LANs. 679-686 - Rizwan Khan, Sonia Aïssa, Charles L. Despins:
MAC layer handoff algorithm for IEEE 802.11 wireless networks. 687-692