22. AINA Workshops 2008:
Gino-wan City,
Okinawa,
Japan
22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008.
IEEE Computer Society 2008
- M. V. Panduranga Rao, K. Chandrashekar Shet, R. Balakrishna, K. Roopa:
Development of Scheduler for Real Time and Embedded System Domain.
1-6
- Cai Zhiming, Yin Jun, Huang Liangli:
The Solution Modelling System with Grouped Agents.
7-11
- Min Peng, Laurence Tianruo Yang, Wuqing Zhao, Naixue Xiong:
Wireless Service Attributes Classification and Matching Mechanism Based on Decision Tree.
12-17
- Xuan Gu, Dong Wang, Huanye Sheng:
RFID-Based Locating Management.
18-23
- Li Han, Jyri P. Salomaa, Jian Ma, Kuifei Yu:
Research on Context-Aware Mobile Computing.
24-30
- Hiroyasu Mitsui, Hidetoshi Kambe, Satoshi Endo, Hisao Koizumi:
A Student Experiment Method for Learning the Basics of Embedded Software Development Including HW/SW Co-design.
31-37
- Hiroaki Yuze, Chaoqun Wang, Shigeki Sugiura, Takeshi Otofuji, Toshiki Aikawa:
A Prototype System to Support the KJ Method by Cooperation between Visually-Impaired Persons and Sighted Persons.
38-43
- Andreas Konstantinidis, Thrasyvoulos Tsiatsos:
Selecting a Networked Virtual Environment Platform and the Design of a Collaborative e-Learning Environment.
44-49
- Ming-Yang Su, Sheng-Cheng Yeh, Kai-Chi Chang, Hua-Fu Wei:
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems.
50-55
- Jianhua Yang, Byong Lee, Stephen S. H. Huang:
Monitoring Network Traffic to Detect Stepping-Stone Intrusion.
56-61
- Nen-Fu Huang, Hsien-Wei Hung, Sheng-Hung Lai, Yen-Ming Chu, Wen-Yen Tsai:
A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection Systems.
62-67
- Jin-Cherng Lin, Chun-Lun Chou, Cheng-Hsiung Liu:
Performance Evaluation for Scheduling Algorithms in WiMAX Network.
68-74
- Sina Meraji, Hamid Sarbazi-Azad:
Empirical Performance Evaluation of Stretched Hypercubes.
75-79
- Priscila Solís Barreto, Paulo Henrique Portela de Carvalho:
Hybrid Traffic Model for Multimedia Network Performance Evaluation.
80-85
- Po-Cheng Chen, Cheng-I Lin, Sheng-Wei Huang, Jyh-Biau Chang, Ce-Kuen Shieh, Tyng-Yeu Liang:
A Performance Study of Virtual Machine Migration vs. Thread Migration for Grid Systems.
86-91
- Cameron Kiddle, Derek Kivi, Rob Simmonds:
Model-Driven Automation in Grid Environments.
92-99
- Xudong Ni, Junzhou Luo:
A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations.
100-105
- YongNyuo Shin, YongJun Lee, Woochang Shin, Jinyoung Choi:
Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records Systems.
106-110
- Giovanni Russello, Changyu Dong, Naranker Dulay:
A Workflow-Based Access Control Framework for e-Health Applications.
111-120
- Sekpon Juntapremjitt, Somchart Fugkeaw, Piyawit Manpanpanich:
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain.
121-126
- Yinliang Yue, Fang Wang, Dan Feng:
DS-MOSD: A Dynamic Selectable Master OSD Model for Large-Scale Object-Based Storage System.
127-132
- Yusuke Murase, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Distributed Databases in Dynamic R-Tree for Vehicle Information Systems.
133-138
- Lubna K. Alazzawi, Ali M. Elkateeb, Aiyappa Ramesh, Waleed Aljuhar:
Scalability Analysis for Wireless Sensor Networks Routing Protocols.
139-144
- Jaiwant Mulik:
Maxflow Based Routing for Traffic Engineering and Sustained High Bitrate Applications.
145-150
- Xiangjiang Hu, Peidong Zhu, Kaiyu Cai, Zhenghu Gong:
AS Alliance in Inter-Domain Routing.
151-156
- Yong-Ju Lee, Hag-Young Kim, Cheol-Hoon Lee:
A Stochastic Availability Prediction Model for Head Nodes in the HA Cluster.
157-161
- Suzhen Wu, Dan Feng, Bo Mao, Jianxi Chen, Lingfang Zeng:
SOSRAID-6: A Self-Organized Strategy of RAID-6 in the Degraded Mode.
162-167
- Katsuyoshi Matsumoto, Shingo Nomoto, Minoru Uehara, Hideki Mori:
Fault Tolerant Small-World Cellular Neural Networks.
168-172
- Kenichi Tanaka, Minoru Uehara, Hideki Mori:
Parallel Computing of CG Using an Open Source Windows Grid.
173-180
- Yih-Jiun Lee, Kai-Wen Lien:
Script: Simulations from Grid to Ubiquitous Computing.
181-186
- Ke Xu, Junwei Cao, Lianchen Liu, Cheng Wu:
Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis.
187-194
- Kenichi Tanaka, Minoru Uehara, Hideki Mori:
A Case Study of a Linux Grid on Windows Using Virtual Machines.
195-200
- Yongyi Zhao, Jin Li:
Research on Location Service Integration Strategy.
201-204
- Misbah Mubarak, Sara Sultana, Zarrar Khan, Hafiz Farooq Ahmad, Hajra Batool Asghar, Hiroki Suguri:
Strongly Instrumented Generic Mobility Architecture (SIGMA).
205-210
- Andre Elia Assad, Nelson Souto Rosa:
Device Middleware for Heterogeneous Access to Java Services.
211-216
- Eunyong Park, Sunyoung Han, Heemin Kim, Kiwon Son:
Cross-Correlated FEC Scheme for Multimedia Streaming over Wireless LAN.
217-222
- Razvan Beuran, Junya Nakata, Takashi Okada, Lan Tien Nguyen, Yasuo Tan, Yoichi Shinoda:
A Multi-Purpose Wireless Network Emulator: QOMET.
223-228
- Ngoc Bao Tran, Dinh Thuc Nguyen:
A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN.
229-234
- Shingo Kawamura, Shinya Toji, Minoru Uehara, Hideki Mori:
A Method of Project Member Arrangement of Using SOM for a Web Community.
235-240
- Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System.
241-246
- Junze Wang, Yi Guo, Benxiong Huang, Jianhua Ma, Yijun Mo:
Delta Compression for Information Push Services.
247-252
- Boyoung Rhee, Kwangman Koh, Sunyoung Han:
Overlay Multicast Architecture Supporting QoS over NGN.
253-258
- Mohamed El Hachimi, Marc-Andre Breton, Maria Bennani:
Efficient QoS Implementation for MPLS VPN.
259-263
- Dan Feng, Chengtao Lu, Fang Wang:
eMuse: QoS Guarantees for Shared Storage Servers.
264-269
- Kuo-Qin Yan, Shun-Sheng Wang, Shu-Ching Wang:
An Optimal Solution of Byzantine Agreement in a Scale Free Network.
270-275
- Rashid Bin Muhammad:
A Parallel Computation of the Steiner Tree Algorithm on Server-Client Paradigm.
276-280
- Kai Han, Binoy Ravindran, E. Douglas Jensen:
LRTG: Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems.
281-287
- Zheng D. Wu:
Resource-Cost Analysis for Massively Multiplayer Online Games.
288-295
- Dan Gao, Jueping Cai, Zan Li, Xing Wei, Rei Chen:
Credit Token Based Dynamic Resource Renting and Offering Mechanism for Cognitive Radio WRAN BS Spectrum Sharing.
296-300
- Mohsen Taherian, Rasool Jalili, Morteza Amini:
PTO: A Trust Ontology for Pervasive Environments.
301-306
- MingChu Li, Yizhi Ren, Kouichi Sakurai, Yongrui Cui, Wang Zhihui:
Granularity Considering in a Trust Model for P2P Networks.
307-312
- Yoshio Nakajima, Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa:
Trustworthiness and Confidence of Peers in Peer-to-Peer (P2P) Network.
313-318
- Alireza Goudarzi Nemati, Makoto Takizawa:
Application Level QoS in Multimedia Peer-to-Peer (P2P) Networks.
319-324
- Xuping Tu, Hai Jin, Xiaofei Liao, Weidong Wang, Sirui Yang, Qi Huang:
Collaboratively Scheduling to Decrease Inter-AS Traffic in P2P Live Streaming.
325-330
- Kai Hu, Yan Jiang, Zhibin Yang, Shiran Chen:
An Expanded Stochastic Model in DAG Schemes.
331-336
- Jing Du, Canqun Yang, Fujiang Ao, Xuejun Yang:
OSS: Efficient Compiler Approach for Selecting Optimal Strip Size on the Imagine Stream Processor.
337-342
- Yuehua Shi, Feng Zhao, Zhong Zhang:
Hardware Implementation of ADABOOST ALGORITHM and Verification.
343-346
- Mehrdad Manaffar, Hamidreza Bakhshi, Mostafa Pilevari:
A New Dynamic Pricing Scheme with Call Admission Control to Reduce Network Congestion.
347-352
- Mohammad Mirza-Aghatabar, Somayyeh Koohi, Shaahin Hessabi, Dara Rahmati:
An Adaptive Approach to Manage the Number of Virtual Channels.
353-358
- Muhammad Bilal Ali, Muhammad Kamran, Hafiz Farooq Ahmad, Hiroki Suguri, Ali Liaqat:
Cell Level Co-Operation for SLA Based Radio Resource Management.
359-364
- Ying Huang, Xiangsheng Fu, Qiang Hou, Zifan Yu:
The Early Detection of DDoS Based on the Persistent Increment Feature of the Traffic Volume.
365-370
- Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je Hong:
Annulling SYN Flooding Attacks with Whitelist.
371-376
- Yacine Djemaiel, Noureddine Boudriga:
Dynamic Detection and Tolerance of Attacks in Storage Area Networks.
377-382
- Benting Wan:
Scheduling Strategy of Subtask Decomposed.
383-386
- Gonzalo Huerta Cánepa, Dongman Lee:
An Adaptable Application Offloading Scheme Based on Application Behavior.
387-392
- Pedro Nuno San-Bento Furtado:
Efficient Shared Computations over Distributed Sites.
393-398
- Yoshitaka Yokokawa, Koji Hashimoto, Yoshitaka Shibata:
PLEXCast: Peer-to-Peer Flexble Broadcast System.
399-406
- Keita Matsuo, Leonard Barolli, Fatos Xhafa, Akio Koyama, Arjan Durresi, Makoto Takizawa:
Design and Implementation of a JXTA-Overlay P2P System and Smart Box Environment.
407-412
- Ying Wang, Xinjun Du, Hui Li, Yumin Wang:
The Design of Optimal Period Interleaver.
413-415
- Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
An Anonymous and Deniable Conversation for a Thin Client.
416-421
- Jingwei Liu, Rong Sun, Wenping Ma, Ying Li, Xinmei Wang:
Fair Exchange Signature Schemes.
422-427
- Guoyan Zhang, Shaohui Wang:
Aggregate and Separate of Signatures in Wireless Network.
428-433
- Joel J. P. C. Rodrigues, Mário M. Freire:
Performance Assessment of Enhanced Just-in-Time Protocol in OBS Networks Taking into Account Control Packet Processing and Optical Switch Configuration Times.
434-439
- Shu-Ming Tseng, Yu-Chin Kuo, Yueh-Teng Hsu:
Simpler and More Accurate Throughput Analysis of CDMA Pure ALOHA Networks with Variable Length Traffic.
440-444
- Cheng-Feng Tai, Lin-Huang Chang, Ting-Wei Hou:
Improvement of SCTP Performance during Handshake Process.
445-450
- Wu-Hong Tsai, Yuan-Sun Chu:
A Core Migration Method to Minimize Inter-Destination Delay Variation.
451-456
- R. Gunasundari, S. Shanmugavel, K. Bakyalakshmi:
Fault Tolerant HAWAII Protocol for IP services in Wireless Networks.
457-462
- Dai Bin, Furong Wang, Jianhua Ma, Liu Jian:
Enhanced Chord-Based Routing Protocol Using Neighbors' Neighbors Links.
463-466
- Ivan Tomek, Rick Giles, Hai Zhang, Li Di:
FVE A Virtual Environment for Collaboration.
467-472
- Cin-Shung Yang, Pang-Chieh Wang, Cheng-Liang Lin, Ting-Wei Hou:
Personalized iDTV Program in Multimedia Home Platform.
473-476
- Akihiro Miyakawa, Tomoyuki Ishida, Yoshitaka Shibata:
Visual and Physical Feature Analysis for Kansei Retrieval Method in VR Japanese Crafting Presentation System.
477-482
- Atsushi Takeda, Kazuo Hashimoto, Gen Kitagata, Salahuddin Muhammad Salim Zabir, Tetsuo Kinoshita, Norio Shiratori:
A New Authentication Method with Distributed Hash Table for P2P Network.
483-488
- Jedsada Phengsuwan, Naiyana Sahavechaphan:
WindChimer: The Partially Centralized and Controlled P2P System for Better Discovery.
489-494
- Masakazu Maruoka, Alireza Goudarzi Nemati, Valbona Barolli, Tomoya Enokido, Makoto Takizawa:
Role-Based Access Control in Peer-to-Peer (P2P) Societies.
495-500
- Eiji Sugino, Katsuyoshi Onodera, Norihisa Segawa, Jun Sawamoto:
Construction of Distributed Terminal Management System in Consideration of Hierarchical Subnet in Intranet.
501-507
- Hoyoung Lee, Jing Liu, Sunyoung Han:
Practical Multicast Security Architecture Using Sleep State.
508-513
- Mohammad Mirza-Aghatabar, Arash Tavakkol, Hamid Sarbazi-Azad, Abbas Nayebi:
An Adaptive Software-Based Deadlock Recovery Technique.
514-519
- Yan Shi, Min Sheng:
Study of a Scheduling Algorithm Based on Simple Network Coding with High Throughput and Low Delay.
520-525
- Lechang Cheng, Norman C. Hutchinson, Mabo Robert Ito:
RealNet: A Topology Generator Based on Real Internet Topology.
526-532
- Masaaki Noro, Fumiaki Tameshige, Ken-ichi Baba, Shinji Shimojo:
Performance Evaluation of Advanced High-Speed Data Transfer Methods in Long-Distance Broadband Networks.
533-540
- Fan Zhang, Furong Wang, Bin Dai, Yafang Li:
Performance Evaluation of IEEE 802.15.4 Beacon-Enabled Association Process.
541-546
- Vasaka Visoottiviseth, Niwat Bureenok:
Performance Comparison of ISATAP Implementations on FreeBSD, RedHat, and Windows 2003.
547-552
- Koji Hashimoto, Yoshitaka Shibata:
Design and Implementation of Adaptive Streaming Modules for Multipoint Video Communication.
553-560
- Tarek Sheltami:
Neighbor-Aware Clusterhead for SNET.
561-566
- Bunthit Watanapa, Saowaluk Watanapa:
A Fuzzy Approach for Personalized Product Clustering with Flexible Discriminating Power.
567-572
- Wei-Hua Jiang, Jun Du, Feng Liu:
Research on System Integrative Evaluation Method Based on Survivability.
573-577
- Xin Xiao, Yuanchun Shi, Zhijia Chen, Baopeng Zhang:
On Constructing High Performance Overlay for Layered Streaming in Heterogeneous Networks.
578-584
- Jiandong Li, Xiaoyan Sun, Pengyu Huang, Jiyong Pang:
Performance Analysis of Active Target Localization Using TDOA and FDOA Measurements in WSN.
585-589
- Chun-Hsin Wang, Yen-Chih Chiang:
Multi-Layer Traceback under the Hierarchical Tracers Deployment.
590-595
- Ming Dong Wan, Han-Ching Wu, Ying-Wei Kuo, James Marshall, Shou-Hsuan Stephen Huang:
Detecting Masqueraders Using High Frequency Commands as Signatures.
596-601
- Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu:
An Automatic Mechanism for Adjusting Validation Function.
602-607
- Yong Liu, Zhong Chen, Yu Chen:
How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor.
608-614
- Jongwoo Sung, Sungjin Ahn, Taesoo Park, Seonghun Jang, Dongheui Yun, Jonggu Kang, Seongeun Yoo, Pohkit Chong, Daeyoung Kim:
Wireless Sensor Networks for Cultural Property Protection.
615-620
- Emad A. El-Sebakhy:
New Computational Intelligence Paradigm for Estimating the Software Project Effort.
621-627
- Seongeun Yoo, Pohkit Chong, Taisoo Park, Youngsoo Kim, Daeyoung Kim, Changsub Shin, Kyungbok Sung, Hyunhak Kim:
DGS: Driving Guidance System Based on Wireless Sensor Network.
628-633
- Amirhosein Taherkordi, Reza Mohammadi, Frank Eliassen:
A Communication-Efficient Distributed Clustering Algorithm for Sensor Networks.
634-638
- Yi Wang, Furong Wang, Chunming Rong, Sufang Wang:
SPM: A Security Policy Based on Micropayment in Ad Hoc Networks.
639-643
- Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks.
644-649
- Yu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang:
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent.
650-655
- Himanshu Pagey:
Building User Confidence in RFID Technology for Mobile and Retail Environments.
656-661
- Taehong Kim, Young-Guk Ha, Jihoon Kang, Daeyoung Kim, Pohkit Chong, Joo-Chan Sohn:
Experiments on Building Ubiquitous Robotic Space for Mobile Robot Using Wireless Sensor Networks.
662-667
- Paul Werstein:
An Experimental Network Proxy for Power Managed End Nodes.
668-674
- Ali El Kateeb, Lubna Al Azzawi:
Hardware Reconfiguration Capability for Third Generation Sensor Nodes: Design and Challenges.
675-680
- Pedro N. E. S. Barbosa, Neil M. White, Nick R. Harris:
Wireless Sensor Network for Localized Maritime Monitoring.
681-686
- Soohong Park, Minho Lee, Cheolju Hwang:
Location Information Look-Up for Intelligent Handover Decision.
687-691
- Benting Wan:
Business-Based SMS Mobile Search.
692-695
- Rogério Luís de Carvalho Costa, Pedro Furtado:
Scheduling in Grid Databases.
696-701
- Hu Haiyang, Hu Hua:
Energy Optimization for Data Flow in Mobile Ad Hoc Wireless Networks Using Cooperative Communication.
702-707
- Snehasis Mukhopadhyay, Niranjan Jayadevaprakash:
Automated Metadata Generation and its Application to Biological Association Extraction.
708-713
- Hiram Firpi, Eunseog Youn, Sean Mooney:
Comparative Study of Particle Swarm Approaches for the Prediction of Functionally Important Residues in Protein Structures.
714-719
- Ping-Tsai Chung, Hsin-Hua Hsiao:
Probabilistic Relational Database Applications for Biomedical Informatics.
720-725
- Che-Lun Hung, Chun-Yuan Lin, Yeh-Ching Chung, Chuan Yi Tang:
Introducing Variable Gap Penalties into Three-Sequence Alignment for Protein Sequences.
726-731
- Dong Seong Kim, Sazia Parvin, Jong Sou Park:
Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks.
732-737
- Soonmok Kwon, Jeonggyu Kim, Cheeha Kim:
An Efficient Tree Structure for Delay Sensitive Data Gathering in Wireless Sensor Networks.
738-743
- Ben-Jye Chang, Yan-Min Lin, Ying-Hsin Liang:
Distributed Wireless Links Repair for Maximizing Reliability and Utilization in Multicast MANET.
744-749
- Kai Wang, Yan Sui, Xukai Zou, Arjan Durresi, Shiaofen Fang:
Pervasive and Trustworthy Healthcare.
750-755
- Mahmood Hasanlou, Ebrahim Fazli, Ali Movaghar, Hossein Mohammadi:
3MOKAN: A Novel Mobility Management Mechanism Based on Keeping Alternative Nodes.
756-761
- Jing Zuo, Xuefen Chi, Lin Guan, Hongxia Li:
Service-Aware Multi-Constrained Routing Protocol with QoS Guarantee Based on Fuzzy Logic.
762-767
- Jen-Yi Pan, Jing-Luen Lin, Kai-Fung Pan:
Multiple Care-of Addresses Registration and Capacity-Aware Preference on Multi-Rate Wireless Links.
768-773
- Jacques Demongeot:
Biological Boundaries and Biological Age: Solutions of Variational Problems.
774-781
- Jacques Demongeot, Michel Morvan, Sylvain Sené:
Impact of Fixed Boundary Conditions on the Basins of Attraction in the Flowers Morphogenesis of Arabidopsis Thaliana.
782-789
- Emmanuel Montseny, Andrei Doncescu:
Reduction of Complexity via Operatorial Parametric Formulations for Some Nonlinear Dynamic Problems of Biology.
790-795
- Tobias Sayre, Rahul Singh:
Protein Structure Comparison and Alignment Using Residue Contexts.
796-801
- Suk Hoon Jung, Desok Kim, Dong-Soo Han:
Conserved Domain Combination Identification in Human Proteins.
802-807
- Yoshitaka Yamamoto, Katsumi Inoue, Andrei Doncescu:
Estimation of Possible Reaction States in Metabolic Pathways Using Inductive Logic Programming.
808-813
- Connie Phong, Raul Singh:
Missing Value Estimation for Time Series Microarray Data Using Linear Dynamical Systems Modeling.
814-819
- Hong-Soog Kim, Woo-Hyuk Jang, Dong-Soo Han:
Communication Protocols and Message Formats for BLAST Parallelization on Cluster Systems.
820-825
- Hassan Sharabaty, Bruno Jammes, Daniel Esteve:
EEG Analysis Using HHT: One Step Toward Automatic Drowsiness Scoring.
826-831
- Dominique Dudkowski, Harald Weinschrott, Pedro José Marrón:
Design and Implementation of a Reference Model for Context Management in Mobile Ad-Hoc Networks.
832-837
- Somkiat Sae-Ueng, Sineenard Pinyapong, Akihiro Ogino, Toshikazu Kato:
Personalized Shopping Assistance Service at Ubiquitous Shop Space.
838-843
- Sébastien Duval, Christian Hoareau, Hiromichi Hashizume:
Design of a Ubiquitous System for Affective Bonding and Support within the Family.
844-849
- Sébastien Duval, Christian Hoareau, Hiromichi Hashizume:
Fundamental Needs in Intelligent Environments: Specificities for Older Adults.
850-855
- Akimitsu Kanzaki, Tetsuya Taniguchi, Takahiro Hara, Shojiro Nishio:
A Data Propagation Using Mobile Terminal in Locally Distributed Ad-Hoc Networks.
856-861
- Shahram Ghandeharizadeh, Shahin Shayandeh, Tooraj Helmi:
To Share or Not to Share Storage in Mesh Networks: A System Throughput Perspective.
862-867
- Lars Frank:
A Transaction Model for Mobile Atomic Transactions.
868-873
- Masako Shinohara, Takahiro Hara, Shojiro Nishio:
On Effective Data Transmission in Mobile Ad Hoc Networks.
874-879
- I-Shyan Hwang, Bor-Jiunn Hwang, K. Robert Lai, Ling-Feng Ku, Chien-Chieh Hwang:
Adaptive QoS-Aware Resource Management in Heterogeneous Wireless Networks.
880-885
- Rita de Cássia Acioli Lima, Nelson Souto Rosa, Igor Roberto L. Marques:
TS-Mid: Middleware for Wireless Sensor Networks Based on Tuple Space.
886-891
- Ali El Kateeb, Aiyappa Ramesh, Lubna Al Azzawi:
Wireless Sensor Nodes Processor Architecture and Design.
892-897
- Katsumi Onodera, Toshiaki Miyazaki:
An Autonomous Algorithm for Construction of Energy-conscious Communication Tree in Wireless Sensor Networks.
898-903
- Abbas Nayebi, Hamid Sarbazi-Azad, Kasra Alishahi:
Analysis of k-Neigh Topology Control Protocol for Wireless Networks.
904-909
- Ismat K. Maarouf, Tarek Sheltami:
Simulation-Based Analysis for GEAR Performance Optimization.
910-915
- Chiu-Kuo Liang, Yu-Jie Huang, Jian-Da Lin:
An Energy Efficient Routing Scheme in Wireless Sensor Networks.
916-921
- Cheng-Zen Yang, Chun-Ta Lin, I-Hsuan Huang:
TPSF+C: A Two-Phase On-Demand Scatternet Formation Algorithm Considering Route Stability.
922-927
- Jung-Hwan Kim, Sajjad Hussain Chauhdary, WenCheng Yang, Dong-Sub Kim, Myong-Soon Park:
PRODUCE: A Probability-Driven Unequal Clustering Mechanism for Wireless Sensor Networks.
928-933
- Ryouhei Kawano, Toshiaki Miyazaki:
Distributed Data Aggregation in Multi-sink Sensor Networks Using a Graph Coloring Algorithm.
934-940
- Seung-Joon Choi, Ki-Hyuk Kwon, Sang-Jo Yoo:
An Efficient Cross-Layer Based Flooding Algorithm with Retransmission Node Selection for Wireless Sensor Networks.
941-948
- Lei Chen, Chung-wei Lee:
The Effects of Mobility and Redundancy on Wireless Video Streaming over MANETs.
949-953
- Huafeng Wu, Chaojian Shi, Xi Zhou, Haiguang Chen, Chuanshan Gao:
eSeagull: Design of Mobile P2P File Sharing System at Sea.
954-959
- Eiji Takimoto, Yoshihisa Kondo, Satoko Itaya, Ryutaro Suzuki, Sadao Obana:
Evaluation of Multi-Channel Flooding for Inter-Vehicle Communication.
960-965
- Kuo-Hui Yeh, N. W. Lo, Enrico Winata:
An Efficient Tree-Based Tag Identification Protocol for RFID Systems.
966-970
- Khurram Shahzad, Arshad Ali, N. D. Gohar:
ETSP: An Energy-Efficient Time Synchronization Protocol for Wireless Sensor Networks.
971-976
- Daishi Inoue, Tetsuya Shigeyasu, Hiroshi Matsuno, Norihiko Morinaga:
A New MAC Protocol for Avoiding Needless Transmission Deferment Induced by Missed RTS/CTS Handshake.
977-982
- Stéphane Maag, Cyril Grepet:
A Node Self Similarity Approach for Interoperability Testing of Ad Hoc Routing Protocols.
983-988
- I-Shyan Hwang, Bor-Jiunn Hwang, Ruey-Rong Su, K. Robert Lai, Chyi-Jy Lin:
An Integrated ISV Call Management Strategy in Heterogeneous Wireless Networks.
989-994
- Xiaoyan Sun, Jiandong Li, Pengyu Huang, Jiyong Pang:
Total Least-Squares Solution of Active Target Localization Using TDOA and FDOA Measurements in WSN.
995-999
- Yusuke Gotoh, Yasuo Ebara, Tomoki Yoshihisa, Koji Koyamada, Masanori Kanazawa:
Development of Tea Ceremony e-Learning Environment within Immersive Projection Technology.
1000-1005
- Satoshi Oonuki, Tetsuro Ogi:
VR BBS Using Immersive Virtual Environment.
1006-1011
- Go Chiba, Tomoyuki Ishida, Yoshitaka Shibata:
High-Resolution Presentation Environment Using Multi Displays.
1012-1016
- Yasuo Ebara, Nobuyuki Kukimoto, Koji Koyamada:
Evaluation Experiment on Eye-to-Eye Contact in Remote Communication with Tiled Displays Environments.
1017-1022
- Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:
Proposal of Multimodal Communications System Using Tele-Immersion Technology.
1023-1028
- Hironori Kaida, Masahiro Okuda:
Image Compression Suitable for High Dynamic Range Image Rendering.
1029-1033
- Shunji Uchino, Norihiro Abe, Hiroshi Takada, Tetsuya Yagi, Hirokazu Taki, Shoujie He:
Virtual Reality Interaction System between User and Avatar with Distributed Processing.
1034-1039
- Hiroki Ogasawara, Yoshitaka Shibata:
Asynchronous Collaborative Virtual Environment Support System by Using Revision Tree Presentation Method.
1040-1045
- Shih Ta Kuan, Bang Ye Wu, Wan-Jui Lee:
Finding Friend Groups in Blogosphere.
1046-1050
- Nikolay N. Mirenkov, Kamen Kanev, Hiroshi Takezawa:
Quality of Life Supporters Employing Music Therapy.
1051-1056
- Tsutomu Okawa, Tsukasa Kaminishi, Syuichi Hirabayashi, Hisao Koizumi, Jun Sawamoto:
An Information System Development Method Based on the Link of Business Process Modeling with Executable UML Modeling and its Evaluation by Prototyping.
1057-1064
- Han-Bin Chang, Timothy K. Shih, Hui-Huang Hsu, Chun-Chia Wang:
An Interactive Video Course Platform with Authoring and Playback Systems.
1065-1070
- Nobuo Funabiki, Aki Mouri, Walaa Hassan, Toru Nakanishi:
A Lecture Scene Playback System Using Digital Picture-Card Show for Distance Learning.
1071-1076
- Yuka Kato:
A Rate Control Method for Subjective Video Quality on Mobile Data Terminals.
1077-1082
- Koichi Gyoda, Nam Hoang Nguyen, Kazunori Okada, Osamu Takizawa:
Analysis of Ad Hoc Network Performance in Emergency Communication Models.
1083-1088
- Kanae Sakamoto, Misako Urakami, Tetsuya Shigeyasu, Hiroshi Matsuno:
Disaster Information Service System for Relief Activities Using Ad-Hoc Network A Network Construction Algorithm and Results of Field Experiments.
1089-1094
- Takahiro Fujiwara, Takashi Watanabe:
A Scheme for Damage Information Gathering Based on Micro Perspective in Sensor Networks.
1095-1100
- Hiroyuki Echigo, Yoshitaka Shibata:
Performance Evaluation of Large Scale Disaster Information System over Japan Gigabit Network.
1101-1106
- Hiroaki Yuze, Zhengyi Zhang, Yuki Yoshida, Takashi Kawada, Chaoqun Wang:
Development of the Universal Safety Information Registration System for Vulnerable People Using a Mobile Phone.
1107-1112
- Nobuhiro Sawano, Tsuyoshi Hoshikawa, Takayuki Obata:
Web-Based Support Coordination by Using WIDIS - Case Study of Chuesu-oki Earthquake in 2007.
1113-1117
- Yoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba:
Ballooned Wireless Mesh Network for Emergency Information System.
1118-1122
- Osamu Takizawa, Masafumi Hosokawa, Ken'ichi Takanashi, Yasushi Hada, Akihiro Shibayama, Byeong-pyo Jeong:
Pinpointing the Place of Origin of a Cellular Phone Emergency Call Using Active RFID Tags.
1123-1128
- Kazuo Takahata, Shinya Takada, Yoshitaka Shibata:
Disaster Communication Network by Combination of Different Wireless LANs.
1129-1133
- Nobuhiro Sawano:
Current Situation of Digitalized Ship Navigation System for Safety.
1134-1137
- Kulwadee Somboonviwat, Shinji Suzuki, Masaru Kitsuregawa:
Structure of the Thai Web Graph.
1138-1143
- Verayuth Lertnattee, Thanaruk Theeramunkong:
Improving Thai Academic Web Page Classification Using Inverse Class Frequency and Web Link Information.
1144-1149
- Kotaro Nakayama, Masahiro Ito, Takahiro Hara, Shojiro Nishio:
Wikipedia Mining for Huge Scale Japanese Association Thesaurus Construction.
1150-1155
- Akio Kitahara, Taichi Joutou, Keiji Yanai:
Associating Faces and Names in Japanese Photo News Articles on the Web.
1156-1161
- Masashi Toyoda:
Mining and Visualizing the Evolution of the Web Graph Structure.
1162
- Zhiling Hong, Qingshan Jiang:
Hybrid Content-Based Trademark Retrieval Using Region and Contour Features.
1163-1168
- Atsushi Fujii, Seiji Takegata:
A Question Answering System for the Operation of Software Applications.
1169-1174
- Chien-Chih Chen, Kai-Hsiang Yang, Hung-Yu Kao, Jan-Ming Ho:
BibPro: A Citation Parser Based on Sequence Alignment Techniques.
1175-1180
- Min-Feng Wang, Jui-Hwa Feng, Meng-Feng Tsai:
A Data Warehousing Approach to Discover Knowledge in Peer-to-Peer Application.
1181-1186
- Takahiro Hayashi, Koji Abe, Rikio Onai:
Retrieval of Personal Web Documents by Extracting Subjective Expressions.
1187-1192
- Kai Cheng, Xiaodong You, Yanchun Zhang:
Efficient Management of Semi-Persistent Data for the Evolving Web.
1193-1198
- Yasuaki Yoshida, Takanori Ueda, Takashi Tashiro, Yu Hirate, Hayato Yamana:
What's Going on in Search Engine Rankings?
1199-1204
- Minghua Pei, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:
Constructing a Global Ontology by Concept Mapping Using Wikipedia Thesaurus.
1205-1210
- Minghua Pei, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:
An Integrated Method for Web Resource Categorization.
1211-1216
- Lifei Chen, Yanfang Ye, Qingshan Jiang:
A New Centroid-Based Classifier for Text Categorization.
1217-1222
- Zhiwei Zhang, Xuan Hieu Phan, Susumu Horiguchi:
An Efficient Feature Selection Using Hidden Topic in Text Categorization.
1223-1228
- Haojun Sun, Zhihui Liu, Lingjun Kong:
A Document Clustering Method Based on Hierarchical Algorithm with Model Clustering.
1229-1233
- Toshihiko Yamakami:
A Weak-Tie Based Regularity Analysis of Mobile Clickstreams.
1234-1239
- Guangwei Wang, Kenji Araki:
A Graphic Reputation Analysis System for Mining Japanese Weblog Based on both Unstructured and Structured Information.
1240-1245
- Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai:
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System.
1246-1252
- Saoucene Mahfoudh, Pascale Minet:
An Energy Efficient Routing Based on OLSR in Wireless Ad Hoc and Sensor Networks.
1253-1259
- N. H. Saeed, M. F. Abbod, H. S. Al-Raweshidy:
Intelligent MANET Routing System.
1260-1265
- Ehsan Ahvar, Mahmood Fathy:
Special Evaluation: A Practical Simulation-Based Method for Accurate Performance Evaluation of Routing Protocols in Wireless Sensor Networks.
1266-1271
- Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou:
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks.
1272-1277
- Siwaruk Siwamogsatham:
On Backoff Timer Scheduling for Smart-DCF and Performance Evaluation.
1278-1284
- S. A. Mahmud, S. Khan, Qiang Ni, H. S. Al-Raweshidy:
Capacity Issues in Meshed High Data Rate WPANs.
1285-1290
- Ji Zhang, Jouni Korhonen, SooHong Park, David Pearce:
TCP Quick-Adjust by Utilizing Explicit Link Characteristic Information.
1291-1298
- Okan Yilmaz, Ing-Ray Chen, Gregory Kulczycki, William B. Frakes:
Spillover-Partitioning Call Admission Control for Revenue Optimization with QoS Guarantees for Multiple Service Classes in Mobile Wireless Networks.
1299-1304
- Zhanqiang Huo, Naishuo Tian, Wuyi Yue, Shunfu Jin:
Simulation Study of a Connection-Oriented Internet Service Based on a Queueing Model.
1305-1310
- Song Guo, Mianxiong Dong, Minyi Guo:
Performance Analysis of Heuristic Algorithms for Lifetime-Aware Directional Multicasting in Wireless Ad Hoc Networks.
1311-1316
- Hao-Hsiang Hung, Ling-Jyh Chen:
An Analytical Study of Wireless Error Models for Bluetooth Networks.
1317-1322
- Mikko Multanen, Kimmo Raivio, Pasi Lehtimäki:
Outlier Detection in Cellular Network Data Exploration.
1323-1328
- Qingcheng Li, Jin Zhang, Xiaoli Gong, Zhenhua Zhang:
A Novel License Distribution Mechanism in DRM System.
1329-1334
- Mahmoud Nasreldin, Heba Kamal Aslan, Magdy El-Hennawy, Adel El-Hennawy:
WiMax Security.
1335-1340
- Tudor Joan Cerlinca, Cristina Turcu, Marius Cristian Cerlinca:
Integrating Mobile Applications into RFID Based B2B Systems.
1341-1345
- Yawer Yousuf, Vidyasagar Potdar:
A Survey of RFID Authentication Protocols.
1346-1350
- Vasile Gaitan, Cornel Turcu, Alexandru Goloca:
High Complexity Control Gates with Advanced RFID Features for Production Process Monitoring.
1351-1356
- Atif Sharif, Vidyasagar Potdar:
A Critical Analysis of RFID Security Protocols.
1357-1362
- Stéphanie Chollet, Philippe Lalanda, André Bottaro:
Transparently Adding Security Properties to Service Orchestration.
1363-1368
- José L. Ruiz, Juan C. Dueñas, Félix Cuadrado:
A Service Component Deployment Architecture for e-Banking.
1369-1374
- Frank Bormann, Stephan Flake, Jürgen Tacken, Carsten Zoth:
Third-Party-Initiated Context-Aware Real-Time Charging and Billing on an Open SOA Platform.
1375-1380
- Elmar Zeeb, Steffen Prüter, Frank Golatowski, Frank Berger:
A Context Aware Service-Oriented Maintenance System for the B2B Sector.
1381-1386
- Hendrik Bohn, Andreas Bobek, Frank Golatowski:
WS-BPEL Process Compiler for Resource-Constrained Embedded Systems.
1387-1392
- Andre Pohl, Heiko Krumm, Felix Holland, Franz-Josef Stewing, Ingo Lück:
Service-Orientation and Flexible Service Binding in Distributed Automation and Control Systems.
1393-1398
- Félix Cuadrado, Boni García, Juan C. Dueñas, Hugo A. Parada G.:
A Case Study on Software Evolution towards Service-Oriented Architecture.
1399-1404
- Xiaorong Li, Stephen John Turner, Kok Heng Tong, Hoong-Maeng Chan, Terence Hung:
Design of an SLA-Driven QoS Management Platform for Provisioning Multimedia Personalized Services.
1405-1409
- Corina Popescu, Jose L. Martinez Lastra:
A Method for the Formal Representation of the Boolean Conditions of Orchestrated Services.
1410-1415
- Witold Abramowicz, Konstanty Haniewicz, Monika Kaczmarek, Raúl Palma, Dominik Zyskowski:
NFP Ontology for Discovery and Sharing Web Services in Distributed Registries.
1416-1421
- Félix Cuadrado, Juan C. Dueñas, José L. Ruiz, Jesús Bermejo, Miguel García:
An Open Source Platform for the Integration of Distributed Services.
1422-1427
- YaNing Liu, Hongbo Wang, Yu Lin, Shiduan Cheng:
Modeling and Quantifying the Impact of P2P File Sharing Traffic on Traditional Internet Traffic.
1428-1433
- Sudath Indrasinghe, Rubem Pereira, John Haggerty:
Protocol Specification for Conflict Free MANET Address Allocation Mechanisms.
1434-1439
- Hung-Yi Chang, Pi-Chung Wang, Chia-Tai Chan, Chun-Liang Lee:
A New Service Level Agreement Model for Best-Effort Traffics in IP over WDM.
1440-1443
- Kenvi Wang, Tong-Tai Chiang, Lin-Yi Peng, Madjid Merabti:
A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance.
1444-1449
- Jen-Chun Chiang, Hsiang-Fu Lo, Wei-Tsong Lee:
Scalable Video Coding of H.264/AVC Video Streaming with QoS-Based Active Dropping in 802.16e Networks.
1450-1455
- Rubem Pereira, Ella Grishikashvili Pereira:
Packet Size Variability in Real Time Transmission of Smoothed MPEG-4 Streams.
1456-1461
- Yi-Ting Fang, Tzung-Chian Huang, Pi-Chung Wang:
Ternary CAM Compaction for IP Address Lookup.
1462-1467
- Stefan Wallin, Leif Landen:
Telecom Alarm Prioritization Using Neural Networks.
1468-1473
- Dong-liang Lee, Lawrence Y. Deng:
Digital Certificate Mobile Agent Technologies in Distance Learning.
1474-1479
- Nobuyoshi Sato, Yoshitoshi Murata:
Quality Control Schemes for Industrial Production by Workers Motion Capture.
1480-1485
- Sheng-Yuan Yang:
Developing of an Ontological Focused-Crawler for Ubiquitous Services.
1486-1491
- Shu-Cheng Lin, Hui-Min Tseng, Yi-Cheng Chang, Hui-Lan Lee, Te-Lung Liu, Chu-Sing Yang, C. Eugene Yeh:
TWAREN Optical Network Laboratory and Lightpath Control System.
1492-1498
- Chiou-Yng Lee:
Concurrent Error Detection in Digit-Serial Normal Basis Multiplication over GF(2m).
1499-1504
- Chun-Liang Hsu, Teng-Yaw Hsu, Kuan-Yen Ho, Wei-Bin Wu:
Practical Design of Intelligent Living-Space Based on Blue-Tooth System.
1505-1510
- Hideaki Yanagisawa, Minoru Uehara, Hideki Mori:
Interface Implementation Using Ajax for Web-Based Instruction Set Simulator.
1511-1516
- Lawrence Y. Deng, Yi-Jen Liu:
Semantic Analysis and Video Event Mining in Sports Video.
1517-1522
- Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
On the Security of an Identity-Based Aggregate Signature Scheme.
1523-1528
- Hangbae Chang, Jong Hyuk Park, Hongsuk Kang:
The Security System Design in Online Game for u Entertainment.
1529-1533
- Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:
Key Distribution Scheme Using Matched Filter Resistant against DoS Attack.
1534-1539
- Binod Vaidya, Byung-Lok Cho, Jong-An Park, Seung Jo Han:
Investigating Secure Framework for Hybrid Multipath Ad Hoc Network.
1540-1545
- Hye-Young Kim, Young-Sik Jeong, Laurence Tianruo Yang:
Intra Domain Route Optimization for Ubiquitous.
1546-1550
- Koichi Miyashita, Tsutomu Terada, Shojiro Nishio:
A Map Matching Algorithm for Car Navigation Systems that Predict User Destination.
1551-1556
- Jong-Hyouk Lee, Yeong-Deok Kim, Tai-Myoung Chung:
An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMM.
1557-1560
- Nguyen Hoang Viet, Ngo Anh Vien, SeungGwan Lee, TaeChoong Chung:
Efficient Distributed Sensor Dispatch in Mobile Sensor Network.
1561-1566
- Ching-Hsien Hsu, Jong Hyuk Park, Chia-Hao Yu:
Adaptive Scheduling Mechanisms toward Intelligent Services in Mobile and Wireless RFID Environments.
1567-1572
- Hong Chen, Nozomi Ikeuchi, Qun Jin:
Implementation of Ubiquitous Personal Study Using Web 2.0 Mash-up and OSS Technologies.
1573-1578
- Yanxiang He, Haowen Liu, Naixue Xiong, Laurence Tianruo Yang:
Selecting News and Elders in Unstructured Peer-to-Peer Network under Churn.
1579-1584
- Hiroyuki Nakamura, Qiangfu Zhao:
Information Hiding Based on Image Morphing.
1585-1590
- Jung-Sik Cho, Sang-Soo Yeo, Suchul Hwang, Sang-Yong Rhee, Sung Kwon Kim:
Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups.
1591-1596
- Kari Anne Haaland Thorsen, Chunming Rong:
Data Integration in Oil and Gas at Norwegian Continental Shelf.
1597-1602
- Said Elnaffar, Zakaria Maamar, Hamdi Yahyaoui, Jamal Bentahar, Philippe Thiran:
Reputation of Communities of Web Services - Preliminary Investigation.
1603-1608
- Dang Minh Quan, Jörn Altmann:
Bilateral Bargaining Game and Fuzzy Logic in the System Handling SLA-Based Workflow.
1609-1614
- Wei Shi, Jian Wu, Shaolin Zhou, Ling Zhang, Yuyu Yin, Zhaohui Wu:
Facilitating the Flexible Modeling of Human-Driven Workflow in BPEL.
1615-1624
- Toshihiko Yamakami:
A Long Interval Method to Identify Regular Monthly Mobile Internet Users.
1625-1630