


default search action
23rd AINA Workshops 2009: Bradford, United Kingdom
- 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3639-2
The Fifth International Symposium on Frontiers of Information Systems and Network Applications (FINA 2009)
Agents and Intelligent Computing
- Takashi Matsuhisa:
Fuzzy Communication Leading to Equilibrium through Possibility Messages. 1-6 - Kari Anne Haaland Thorsen, Trygve Eftestøl, Chunming Rong
, Petter Andreas Steen:
An Integrated Information Sharing Structure for Resuscitation Data. 7-12 - Sinan Kockara, Tansel Halic, Coskun Bayrak:
Real-time Minute Change Detection on GPU for Cellular and Remote Sensor Imaging. 13-18 - Fahmida Abedin, Kuo-Ming Chao
, Nick Godwin, Hisbel Arochena:
Preference Ordering in Agenda Based Multi-issue Negotiation for Service Level Agreement. 19-24
Security, Privacy, and Trust
- Zhengping Wu:
A Semantic Approach for Trust Information Exchange in Federation Systems. 25-30 - Guanchen Chen, Matthew F. Johnson, Pavan Roy Marupally, Naveen K. Singireddy, Xin Yin, Vamsi Paruchuri
:
Combating Typo-Squatting for Safer Browsing. 31-36 - Myung Sil Choi, Yong Soo Park, Kwang Seon Ahn:
Web Site Management System through Private Information Extraction. 37-42
Network Computing and Service Oriented Applications
- Zakaria Maamar, Quan Z. Sheng
, Hamdi Yahyaoui
, Jamal Bentahar
, Khouloud Boukadi
:
A New Approach to Model Web Services' Behaviors Based on Synchronization. 43-49 - Kamran Zamanifar, Alireza Zohali, Naser Nematbakhsh:
Matching Model for Semantic Web Services Discovery. 50-54 - Yuka Kato
, Masahiko Narita, Chuzo Akiguchi:
The Network Service Platform for Real-World Data. 55-60 - Hovhannes A. Harutyunyan, Rahul Katragadda, Calin D. Morosan:
Efficient Heuristic for Multicasting in Arbitrary Networks. 61-66
Multimedia Systems and Networks
- Derdour Makhlouf
, Nacira Ghoualmi-Zine
, Philippe Roose
, Marc Dalmau:
An Adaptation System for P2P Multimedia Applications. 67-72 - Ting Peng, Kai Du:
Requirements and Strategy for Presentation Stage Synchronization of Multi-object Multimedia Applications. 73-77 - Bilal R. Qazi, Ángela A. de Grado Vivero, Omar Y. K. Alani
, Jaafar M. H. Elmirghani
:
Pico Cellular MAC Protocol for Multimedia Communication. 78-83 - Andre Gustavo P. da Silva, Adilson B. Lopes, Felipe A. P. Pinto, Carlos Eduardo da Silva
:
A Model for the Transmission of Multimedia Data Flow Based on the Use of Shared Memory Mechanism. 84-89
Intrusion Detection and Access Control
- Safaa Zaman, Fakhri Karray:
TCP/IP Model and Intrusion Detection Systems. 90-96 - Babak Khosravifar, Maziar Gomrokchi, Jamal Bentahar
:
A Multi-agent-based Approach to Improve Intrusion Detection Systems False Alarm Ratio by Using Honeypot. 97-102 - Moussa Amir Ehsan, Morteza Amini
, Rasool Jalili:
Handling Context in a Semantic-Based Access Control Framework. 103-108 - Georgios V. Lioudakis
, Fotios Gogoulos, Anna Antonakopoulou
, Dimitra I. Kaklamani, Iakovos S. Venieris:
Privacy Protection in Passive Network Monitoring: An Access Control Approach. 109-116
Communication Technology
- A. Al-Haj, John Mellor, Irfan-Ullah Awan:
Performance Evaluation of Secure Call Admission Control for Multiclass Internet Services. 117-121 - Yang Xiang, Zhiliang Wang, Xia Yin:
SIP Robustness Testing Based on TTCN-3. 122-128 - Xue Wang, Linjing Zhao, Jiandong Li:
Improved Channel Estimation Using Wavelet Denoising for OFDM and OFDMA Systems. 129-133
Secure Networks and Systems
- Raphael C.-W. Phan
:
Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes. 134-139 - Yoonyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim
:
Cipher Suite Setting Problem of SSL Protocol and it's Solutions. 140-146 - Raphael C.-W. Phan
:
Security of Group Key Exchange Protocols with Different Passwords. 147-152 - Giovanni Russello, Naranker Dulay:
An Architectural Approach for Self-Managing Security Services. 153-158
Grid, P2P, and Mobile Wireless Networks
- Neander Larsen Brisola, Altair Olivo Santin
, Lau Cheuk Lung, Heverson Borba Ribeiro, Marcelo H. Vithoft:
A Public Keys Based Architecture for P2P Identification, Content Authenticity and Reputation. 159-164 - Andrea Giordanna Oliveira do Nascimento, Edjair de Souza Mota
, Saulo Jorge Beltrao de Queiroz
, Edson do Nascimento Jr.:
An Alternative Approach for Header Compression Over Wireless Mesh Networks. 165-169 - Fatos Xhafa
, Leonard Barolli, Juan Antonio Gonzalez, Pawel Jura:
A Static Benchmarking for Grid Scheduling Problems. 170-175 - Majid Tajamolian
, Majid Taghiloo, Mahnaz Tajamolian:
Lightweight Secure IP Address Auto-Configuration Based on VASM. 176-180
Ad Hoc and Sensor Networks
- Monis Akhlaq, Baber Aslam, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor:
Empowered Certification Authority in VANETs. 181-186 - Mohamed S. El-Azhari, Othman A. Al-Amoudi, Mike E. Woodward, Irfan-Ullah Awan:
Performance Analysis in AODV Based Protocols for MANETs. 187-192 - Fuad Bajaber, Irfan-Ullah Awan:
Centralized Dynamic Clustering for Wireless Sensor Network. 193-198 - Othman A. Al-Amoudi, Mohamed S. El-Azhari, Mike E. Woodward, Irfan-Ullah Awan:
An Efficient Routing Mechanism Based on Heading Angle. 199-204
Network Control, Analysis, and Performance Evaluation
- Kai Huang, Zhengwei Qi, Bo Liu:
Network Anomaly Detection Based on Statistical Approach and Time Series Analysis. 205-211 - Lei (Chris) Liu, Xiaolong Jin, Geyong Min:
Modelling an Integrated Scheduling Scheme under Bursty MMPP Traffic. 212-217 - Amina Al-Sawaai, Irfan-Ullah Awan, Rod J. Fretwell:
Analysis of the Weighted Fair Queuing System with Two Classes of Customers with Finite Buffer. 218-223 - T. S. Indumathi, T. Srinivas, K. Rachaiah, B. Sivakumar, Velur Rajappa:
Evaluating Wavelength Routing Power of Dynamic ROADM Networks(cat-I) for Various Traffic Types. 224-229
Distributed Systems and Data Mining
- Rubén de Juan-Marín, Luis Irún-Briz, Francesc D. Muñoz-Escoí
:
A Cost Analysis of Solving the Amnesia Problems. 230-237 - Hai Dong
, Farookh Khadeer Hussain, Elizabeth Chang
:
A Hybrid Service Metadata Clustering Methodology in the Digital Ecosystem Environment. 238-243 - Zerihun Zewdu, Mieso K. Denko, Mulugeta Libsie:
Workload Characterization of Autonomic DBMSs Using Statistical and Data Mining Techniques. 244-249 - Yoann Pitarch, Anne Laurent, Marc Plantevit
, Pascal Poncelet
:
Multidimensional Data Stream Summarization Using Extended Tilted-Time Windows. 250-254
The Fifth International Symposium on Web and Mobile Information Services (WAMIS 2009)
Context-Aware Mobile and Pervasive Systems
- Gearoid Hynes, Vinny Reynolds, Manfred Hauswirth:
Enabling Mobility between Context-Aware Smart Spaces. 255-260 - Alexander V. Smirnov, Alexey M. Kashevnik
, Nikolay Shilov
, Sergey Boldyrev, Sergey I. Balandin
, Ian Oliver:
Context-Aware SmartSpace: Reference Model. 261-265 - Atif Manzoor, Hong Linh Truong
, Schahram Dustdar
:
Quality Aware Context Information Aggregation System for Pervasive Environments. 266-271 - Eun Sang Noh, Hyun Ko, Chang Hoon Lyu, Hee Yong Youn:
Hybrid Context Matchmaking for Fast Context-Aware Computing. 272-277
Agents and Services Computing
- Atsushi Terauchi, Osamu Akashi:
Trust-Based Cooperative Action Control in Multi-agent Systems for Network Management. 278-283 - James Padgett
, Karim Djemame
, Iain Gourlay, Django Armstrong:
Risk-Aware SLA Brokering Using WS-Agreement. 284-291 - Kay Dörnemann, Bernd Freisleben
:
Discovering Grid Resources and Deploying Grid Services Using Peer-to-Peer Technologies. 292-297 - Jamal Bentahar
, Babak Khosravifar, Maziar Gomrokchi:
Social Network-Based Trust for Agent-Based Services. 298-303
E-Business Systems and XML Technologies
- Michael Ameling, Bernhard Wolf, José Enrique Armendáriz-Iñigo
, Alexander Schill:
A Cost Model for Efficient Business Object Replication. 304-309 - D. R. W. Holton, Irfan-Ullah Awan, Muhammad Younas:
Investigating Interactions between Clients and Server in the Performance Analysis of eCommerce Systems. 310-315 - Hong-Quang Nguyen, J. Wenny Rahayu, Kinh Nguyen, David Taniar:
Schema Mediation for Heterogeneous XML Schema Sources. 316-321 - Antonio Sarasa Cabezuelo
, Bryan Temprado-Battad, José Luis Sierra
, Alfredo Fernández-Valmayor:
XML Language-Oriented Processing with XLOP. 322-327
The Fifth IEEE International Workshop on Heterogeneous Wireless Networks (HWISE 2009)
Performance Evaluation
- Balaji Polepalli, Weigao Xie, Dhanashree Thangaraja, Mukul Goyal, Seyed Hossein Hosseini, Yusuf Bashir:
Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation. 328-333 - Andréa de Fátima Ferreira Canhoto, Alessandro Anzaloni:
Performance Evaluation of SSTP. 334-337 - Ying-Hong Wang, Kuo-Feng Huang, Hsin-Yi Ho:
A Seamless Handover Scheme with Pre-registration in NEMO. 338-344
Enabling Technologies
- Lu Yan:
Cooperative Packet Relaying in Wireless Multi-hop Networks. 345-350 - Pravin Pawar, Bert-Jan van Beijnum, Hermie J. Hermens, Katarzyna Wac
, Dimitri Konstantas:
Context-Aware Computing Support for Network-Assisted Seamless Vertical Handover in Remote Patient Monitoring. 351-358 - Huma Qayyum, Shaleeza Sohail
, Ghalib A. Shah, Aasia Khanum:
A Fuzzy Decision Maker for Wireless Sensor Network in Ubiquitous Network Environment. 359-364 - Matthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben
:
Identity-Based Cryptography for Securing Mobile Phone Calls. 365-370
Energy Efficient Solutions
- Ali Bokar, Muslim Bozyigit, Cevat Sener
:
Scalable Energy-Aware Dynamic Task Allocation. 371-376 - Fumiaki Sato:
An Efficient Shared-tree-Based Multi-source Multicast Routing Protocol in Mobile Networks. 377-382 - Jae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong Youn:
An Energy Efficient Chain-Based Clustering Routing Protocol for Wireless Sensor Networks. 383-388
Applications
- Joao Luis Gomes Moreira, Edjair de Souza Mota
, Edson Nascimento Silva Jr., Leandro S. G. de Carvalho
, Saulo Queiroz
, Christian Hoene:
Voice over Wireless Mesh Networks: A Case Study in the Brazilian Amazon Region during the Rainy Season. 389-394 - Mudasser Iqbal, Hock-Beng Lim, Wenqiang Wang, Yuxia Yao:
A Service Oriented Model for Semantics-Based Data Management in Wireless Sensor Networks. 395-400 - S. V. Srikanth, P. J. Pramod, K. P. Dileep, S. Tapas, Mahesh U. Patil, N. Sarat Chandra Babu:
Design and Implementation of a Prototype Smart PARKing (SPARK) System Using Wireless Sensor Networks. 401-406 - Patricia Morreale
, Feng Qi
, Paul J. Croft, George Chang, Justin Czarnik, Nick Doell, Jhon Espin, Ryan Suleski:
Street CORNERS: Real-Time Contextual Representation of Sensor Network Data for Environmental Trend Identification. 407-412
The Fourth International Workshop on Performance Analysis and Enhancement of Wireless Networks (PAEWN 2009)
Network Protocol
- Boyoung Rhee, Sungchol Cho, Xianshu Jin, Sunyoung Han:
QoS-Aware Router Combining Features of Conventional Routing and Flow-Aware Routing Based on Resource Management over NGN. 413-418 - Johannes Ulrich Herrmann
, Sieteng Soh
, Geoff A. W. West, Suresh Rai:
Using Multi-valued Decision Diagrams to Solve the Expected Hop Count Problem. 419-424 - Elmabruk Laias, Irfan-Ullah Awan, Pauline M. L. Chan
:
Fair and Latency Aware Uplink Scheduler In IEEE 802.16 Using Customized Deficit Round Robin. 425-432 - Prashant Pillai
, Yim-Fun Hu
:
Performance Analysis of EAP Methods Used as GDOI Phase 1 for IP Multicast on Airplanes. 433-438
Measurement, Modelling and Evaluation
- Yuzo Taenaka, Shigeru Kashihara
, Youki Kadobayashi, Suguru Yamaguchi:
Wireless Measurement Framework to Survey an Area with Required Communication Quality. 439-446 - Lan Wang, Geyong Min, Irfan-Ullah Awan:
Analytical Modeling of Active Queue Management under Dynamic Channel Conditions. 447-451 - Takuo Nakashima:
Queue Length Behavior on Restricted Link Under Bursty Self-similar TCP Traffic. 452-457 - Abdalla M. Hanashi, Irfan-Ullah Awan, Mike E. Woodward:
Performance Evaluation Based on Simulation of Improving Dynamic Probabilistic Flooding in MANETs. 458-463
The Fourth International Workshop on Service Oriented Architectures in Converging Network Environments (SOCNE 2009)
SOA and Embedded Systems
- Christoph Fiehe, Anna Litvina, Ingo Lück, Oliver Dohndorf
, Jens Kattwinkel, Franz-Josef Stewing, Jan Krüger, Heiko Krumm:
Location-Transparent Integration of Distributed OSGi Frameworks and Web Services. 464-469 - Christos Goumopoulos, Achilles Kameas, Erik Berg, Ioannis Calemis:
A Service-Oriented Platform for Pervasive Awareness Systems. 470-475 - Christian Buckl, Stephan Sommer, Andreas Scholz, Alois C. Knoll
, Alfons Kemper, Jörg Heuer, Anton Schmitt:
Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks. 476-481 - Guido Moritz, Claas Cornelius, Frank Golatowski
, Dirk Timmermann
, Regina Stoll
:
Differences and Commonalities of Service-Oriented Device Architectures, Wireless Sensor Networks and Networks-on-Chip. 482-487
Real-Time Services and Verification
- Alessio Lomuscio
, Monika Solanki:
Mapping OWL-S Processes to Multi Agent Systems: A Verification Oriented Approach. 488-493 - Marisol García-Valls, Alejandro Alonso Muñoz
, Juan Antonio de la Puente
:
Time-Predictable Reconfiguration with Contract-Based Resource Management. 494-499 - Guilherme Gustavo Ramos Gomes, Paulo Nazareno Maia Sampaio:
A Specification and Tool for the Configuration of. 500-505 - Iria Estévez-Ayres
, Marisol García-Valls
, Pablo Basanta-Val
:
Towards Distributed Composition of Real-Time Service-Based Applications. 506-511
Service-oriented Architectures and Frameworks
- Rolf Lasch, Björn Ricks, Ralf Tönjes:
Service Creation Environment for Business-to-Business Services. 512-517 - Maria Beatriz Felgar de Toledo, Olga Nabuco, Marcos Antônio Rodrigues, Diego Garcia, Miriam A. M. Capretz, Marcelo Fantinato
, Itana Maria de Souza Gimenes, Rodrigo Bonacin
, Ana Guerra, Tarcísio da Rocha, Laura Viana:
A SOA-Based Collaborative Environment for Clinical Trials on Neglected Diseases. 518-523 - Frank Bormann, Andre Braun, Stephan Flake, Jürgen Tacken:
Towards a Policy and Charging Control Architecture for Online Charging. 524-530 - Andreas Hein, Marco Eichelberg, Oliver Nee, Arne Schulz, Axel Helmer, Myriam Lipprandt:
A Service Oriented Platform for Health Services and Ambient Assisted Living. 531-537 - Marisol García-Valls, Pablo Basanta-Val, Iria Estévez-Ayres
:
Concurrency Programming Models in Mobile Real-Time Platforms. 538-543
The Fifth International Workshop on Network-Based Virtual Reality and Tele-Existence (INVITE 2009)
VR and Tele-existence Systems
- Tetsuro Ogi, Daisuke Furuyama, Tetsuro Fujise:
Layer-Based Dome Contents Creation Using Scenario Description Language. 544-549 - Yoshisuke Tateyama, Tetsuro Ogi, Hidekazu Nishimura, Noriyasu Kitamura, Harumi Yashiro:
Development of Immersive Virtual Driving Environment Using OpenCABIN Library. 550-553 - Yasuo Ebara, Yoshitaka Shibata:
An Experiment on Tele-immersive Communication with Tiled Displays Wall over JGN2plus Network. 554-559 - Keisuke Yatsu, Yoshitaka Shibata:
A Middleware System to Realize Virtual Reality on Tele-immersion Environment. 560-563 - Hiroki Ogasawara, Yoshitaka Shibata:
Asynchronous Collaborative Support System by Revision Tree Method. 564-569
The Third International Workshop on Telecommunication Networking, Applications and Systems (TeNAS 2009)
Ad Hoc and Sensor Networks
- Ian Rhead, Madjid Merabti, Hala M. Mokhtar, Paul Fergus
:
A Hierarchically Structured Worldwide Sensor Web Architecture. 570-575 - Nobuyoshi Sato, Shouichi Odashima, Jun Suzuki, Taiji Ishikawa, Yoshitoshi Murata:
A Trial of a Worker's Motion Trace System Using Terrestrial Magnetism and Acceleration Sensors. 576-581 - Waltenegus Dargie
, Alexander Schill, Rami Mochaourab
, Lin Guan
:
A Topology Control Protocol for 2D Poisson Distributed Wireless Sensor Networks. 582-587 - Abdullahi Arabo, Qi Shi, Madjid Merabti:
Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets). 588-594
Systems and Software Management
- Katsuyoshi Matsumoto, Minoru Uehara, Hideki Mori:
Fault Tolerance Small-World Cellular Neural Networks for Inttermitted Faults. 595-600 - Ra'ed AlJa'afreh, John Mellor, Irfan-Ullah Awan:
A Comparison Between the Tunneling Process and Mapping Schemes for IPv4/IPv6 Transition. 601-606 - Te-Lung Liu, Hui-Min Tseng, Hui-Min Chen, Jen-Wei Hu
, Chu-Sing Yang, C. Eugene Yeh:
Design of Alarm Management System in Hybrid IP/Optical Networks. 607-611 - Reika Higa, Kosuke Matsubara, Takao Okamawari, Saneyasu Yamaguchi, Masato Oguchi:
Optimization of iSCSI Remote Storage Access through Multiple Layers. 612-617 - André Bottaro, Levent Gürgen
, Maxime Vincent, François-Gaël Ottogalli, Stéphane Seyvoz:
Software Management of Heterogeneous Execution Platforms. 618-623
The Second Workshop on Security in RFID and it's Industrial Applications (SRIA 2009)
- Cristina Elena Turcu, Cornel Turcu, Valentin Popa
:
An RFID-Based System for Emergency Health Care Services. 624-629 - Valentin Vlad, Adrian Graur, Cristina Elena Turcu, Cezar Popa
:
Enhancing the Flexibility of Manufacturing Systems Using the RFID Technology. 630-635 - Vidyasagar M. Potdar
, Atif Sharif, Elizabeth Chang
:
Wireless Sensor Networks: A Survey. 636-641 - Manohar Potdar, Atif Sharif, Vidyasagar M. Potdar
, Elizabeth Chang
:
Applications of Wireless Sensor Networks in Pharmaceutical Industry. 642-647
The International Symposium on Mining and Web (MAW 2009)
Recommender Systems
- Elica Campochiaro, Riccardo Casatta, Paolo Cremonesi
, Roberto Turrin:
Do Metrics Make Recommender Algorithms?. 648-653 - Kosuke Takano, Kin Fun Li:
An Adaptive Personalized Recommender Based on Web-Browsing Behavior Learning. 654-660 - Saranya Maneeroj, Atsuhiro Takasu:
Hybrid Recommender System Using Latent Features. 661-666 - Michele Gorgoglione, Umberto Panniello
:
Including Context in a Transactional Recommender System Using a Pre-filtering Approach: Two Real E-commerce Applications. 667-672
Clustering and Classification
- Jinbeom Kang, Joongmin Choi, Jaeyoung Yang:
An Enhanced Clustering Method Based on Grid-Shaking. 673-678 - Lifei Chen, Shengrui Wang, Qingshan Jiang:
A Robust Algorithm for Fuzzy Document Clustering. 679-684 - Viet Phan-Luong:
Measures of Class Membership in Association Rule Based Classification. 685-690 - Taoufik Guernine, Kacem Zeroual:
SVM Fuzzy Hierarchical Classification Method for Multi-class Problems. 691-696
Document and Text Information Retrieval
- Lei Zheng, Ingemar J. Cox
:
Document-Oriented Pruning of the Inverted Index in Information Retrieval Systems. 697-702 - George Adam, Christos Bouras, Vassilis Poulopoulos
:
CUTER: An Efficient Useful Text Extraction Mechanism. 703-708 - Alex Spengler, Patrick Gallinari:
Learning to Extract Content from News Webpages. 709-714 - Mitra Nasri
, Mohsen Sharifi
:
Load Balancing Using Consistent Hashing: A Real Challenge for Large Scale Distributed Web Crawlers. 715-720
Web Content Analysis
- Anna Stavrianou, Jean-Hugues Chauchat, Julien Velcin:
A Content-Oriented Framework for Online Discussion Analysis. 721-726 - Nicolas Béchet, Mathieu Roche
, Jacques Chauché:
A Hybrid Approach to Validate Induced Syntactic Relations. 727-732 - Malik Muhammad Saad Missen, Mohand Boughanem:
Sentence-Level Opinion-Topic Association for Opinion Detection in Blogs. 733-737 - Kotaro Nakayama, Masahiro Ito, Takahiro Hara, Shojiro Nishio:
Wikipedia Relatedness Measurement Methods and Influential Features. 738-743
E-learning and Web Search
- Bassam Farran, Craig Saunders:
Voted Spheres: An Online, Fast Approach to Large Scale Learning. 744-749 - María José Casany Guerrero, Marc Alier Forment, Miguel Ángel Conde González
, Francisco José García-Peñalvo
:
SOA Initiatives for eLearning: A Moodle Case. 750-755 - Mehdi Adda
, Rokia Missaoui, Petko Valtchev
:
Toward Feedback-Based Web Search Engine. 756-761 - Aysegul Cayci, Selcuk Sumengen, Cagatay Turkay, Selim Balcisoy
, Yücel Saygin:
Temporal Dynamics of User Interests in Web Search Queries. 762-767
The Second International Workshop on Applications of Ad Hoc and Sensor Networks (AASNET 2009)
Protocols in Ad Hoc and Wireless Sensor Networks
- Richard Tynan, Michael J. O'Grady
, Gregory M. P. O'Hare
, Conor Muldoon:
Benchmarking Latency Effects on Mobility Tracking in WSNs. 768-774 - Evangelos B. Mazomenos
, Jeffrey S. Reeve, Neil M. White:
A Range-Only Tracking Algorithm for Wireless Sensor Networks. 775-780 - Miguel A. Wister
, Dante Arias Torres:
LIFT: An Efficient Cross-Layer Service Discovery Protocol in MANET. 781-786 - Weihuan Shu, Kumar Padmanabh
, Puneet Gupta:
Prioritized Buffer Management Policy for Wireless Sensor Nodes. 787-792
Application of Sensor Networks
- Pablo Pancardo García
, Jorge A. Pardo, Juan Carlos Dueñas López:
Automatic Monitoring for Workers Healthcare in Tropical Climates. 793-797 - Abdul-Aziz Al-Helali, Ashraf S. Hasan Mahmoud
, Talal M. Al-Kharoubi
, Tarek R. Sheltami
:
Analysis of Handoff Delay Components for Mobile IP-Based 3GPP UMTS/WLAN Interworking Architecture. 798-803 - Hwee Pink Tan, Pius W. Q. Lee, Winston Khoon Guan Seah
, Zhi Ang Eu:
Impact of Power Control in Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) for Railroad Health Monitoring. 804-809
Energy-aware and Routing Protocol in Ad Hoc Sensor Networks
- Joshua Ellul
, Kirk Martinez
, David De Roure
:
A Dynamic Size Distributed Program Image Cache for Wireless Sensor Networks. 810-814 - Yi-Chao Wu, Chiu-Ching Tuan, Po-Chun Chen
:
Triangular Power Saving Routing Protocol with Power Balance in Mobile Ad Hoc Networks. 815-819 - Ahmed Redha Mahlous
, Brahim Chaourar
, Mahmoud Mansour:
Performance Evaluation of Max Flow Multipath Protocol with Congestion Awareness. 820-825
The First International Workshop on Opportunistic Networking (WON 2009)
Routing
- Marcello Caleffi
, Luigi Paura:
Opportunistic Routing for Disruption Tolerant Networks. 826-831 - Abdullatif Shikfa
, Melek Önen
, Refik Molva
:
Privacy in Content-Based Opportunistic Networks. 832-837 - Jyh-How Huang, Ying-Yu Chen, Yi-Chao Chen, Shivakant Mishra, Ling-Jyh Chen
:
Improving Opportunistic Data Dissemination via Known Vector. 838-843
Applications
- Rudi Ball, Naranker Dulay:
Approximating Travel Times Using Opportunistic Networking. 844-849 - Nicolas Montavont, Safaà Hachana, Lucien Loiseau:
Opportunistic Social Network Experiments. 850-855
The Second International Workshop on Disaster and Emergency Information Network Systems (IWDENS 2009)
Disaster Information Systems
- Misako Urakami, Keiji Fujii, Mitsuhiro Kota, Hiroshi Matsuno:
A Design of Reduced Data Representation for Information Sharing in the Disaster-Affected Area. 856-861 - Tetsuya Shigeyasu, Misako Urakami, Hiroshi Matsuno:
Wireless Distributed Network System for Relief Activities after Disasters. 862-867 - Hiroaki Yuze, Yuji Aota, Takashi Kawada:
Development of the Student Refuge Information System Using IC Card Type Student Identification Cards. 868-872 - Akihiro Miyakawa, Yoshitaka Shibata:
Information and Communication Network Infrastructure Based on Experiences from Noto-hanto-oki Earthquake. 873-878
Wireless Emergency Networks
- Goshi Sato, Daisuke Asahizawa, Yasuhiro Kawano, Yoshitaka Shibata:
Disaster Information Network by Cognitive Radio LANs. 879-883 - Daisuke Asahizawa, Yosuke Sato, Goshi Sato, Yoshitaka Shibata:
Disaster Surveillance Video Transmission System by Wireless Ballooned Network. 884-889 - Yasuaki Teshirogi, Jun Sawamoto, Norihisa Segawa, Eiji Sugino:
A Proposal of Tsunami Warning System Using Area Mail Disaster Information Service on Mobile Phones. 890-895 - Keisuke Okaya, Takashi Miura, Mikio Tanii, Akiko Yokota, Sho Koshigoe, Kazuo Takahata, Yoshitaka Shibata:
Effective Disaster Communication Method by Personalized Wireless LAN System. 896-901
The International Workshop on Bioinformatics and Life Science Modelling and Computing (BLSMC 2009)
- Omar Gaci, Stefan Balev:
The Small-World Model for Amino Acid Interaction Networks. 902-907 - Jacques Demongeot
, Eric Goles Ch., Sylvain Sené:
Loss of Linearity and Symmetrisation in Regulatory Networks. 908-913 - S. A. Kammouri, M. Elhatri, Mohammed Nabil Kabbaj
:
A Numerical Simulation of Transport and Biodegradation in Saturated Porous Media. 914-917 - Oliver Ray:
Towards a Rational Approach for the Logical Modelling of Inhibition in Metabolic Networks. 918-923 - Hedi Ben Amor, Sebastien Cadau, Adrien Elena, Daniele Dhouailly, Jacques Demongeot
:
Regulatory Networks Analysis: Robustness in Morphogenesis Regulation. 924-929 - Jacques Demongeot
, Andrei Doncescu:
Modeling the Glycolysis: An Inverse Problem Approach. 930-935 - Muhammad Tayyab, Yves Usson
, Thierry Léveillard
, Jacques Demongeot
:
Imaging and Modelling of a Degenerative Disease of Retina. 936-941 - Andrei Doncescu, Baptiste Tauzain, Nabil Kabbaj
:
Machine Learning Applied to BRCA1 Hereditary Breast Cancer Data. 942-947 - Yoshitaka Yamamoto, Katsumi Inoue
, Andrei Doncescu:
Abductive Reasoning in Cancer Therapy. 948-953
The Second International Workshop on Data Management for Wireless and Pervasive Communications (DMWPC 2009)
Data Management and Analysis
- Carlos André Reis Pinheiro, Markus Helfert
:
Mixing Scores from Artificial Neural Network and Social Network Analysis to Improve the Customer Loyalty. 954-959 - Sung-Hyuk Park
, Ho-Jin Lee, Sang Pil Han, Dong-Hoon Lee:
User Age Profile Assessment Using SMS Network Neighbors' Age Profiles. 960-965 - Feng Gui, Malek Adjouadi
, Naphtali Rishe:
A Contextualized and Personalized Approach for Mobile Search. 966-971 - François Siewe, Antonio Cau, Hussein Zedan:
CCA: A Calculus of Context-Aware Ambients. 972-977
Applications/Sensor Networks
- Kenji Ohnishi, Yuki Arase, Takahiro Hara, Toshiaki Uemukai, Shojiro Nishio:
A Content Clipping System for Web Browsing Using Cellular Phones. 978-983 - Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
On a TDMA Slot Assignment Considering the Amount of Traffic in Wireless Sensor Networks. 984-989 - Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga:
Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks. 990-995
The Second International Workshop on Bio Computing (BioCom 2009)
Data Management and Simulations
- Harsha Gopal Goud Vaka, Snehasis Mukhopadhyay:
Knowledge Extraction and Extrapolation Using Ancient and Modern Biomedical Literature. 996-1001 - Ping-Tsai Chung, Fahmeed Afzal, Hsin-Hua Hsiao:
A Software System Development for Probabilistic Relational Database Applications for Biomedical Informatics. 1002-1007 - Ershela Durresi, Paul Dalhaimer, Thomas D. Pollard:
Analyzing the Interaction of ADF/Cofilin with Actin through Molecular Dynamics Simulations. 1008-1012
Enabling Technologies
- Birhan Payli, Arjan Durresi, Deniz U. Dincer, Leonard Barolli:
Real-Time Monitoring of Vital Signs. 1013-1018 - Hirokazu Ookuzu, Yosuke Sato, Koji Hashimoto, Yoshitaka Shibata:
A New Teleconference System for Healthcare Applications by GigaEther-based Omni-directional Video Transmission. 1019-1024 - Magno R. Guillen
, Malek Adjouadi
, Xiaozhen You, Armando Barreto
, Naphtali Rishe, William D. Gaillard:
Toward fMRI Group Identification Based on Brain Lateralization. 1025-1030
The Third International Symposium on Security and Multimodality in Pervasive Environments (SMPE 2009)
- Kevin I. Jones, Helge Janicke
, Antonio Cau:
A Property Based Framework for Trust and Reputation in Mobile Computing. 1031-1036 - Andrei Gagarin, Sajid Hussain, Laurence Tianruo Yang:
Distributed Search for Balanced Energy Consumption Spanning Trees in Wireless Sensor Networks. 1037-1042 - Antonio Coronato
, Giuseppe De Pietro:
Formal Specification of a Safety Critical Pervasive Application for a Nuclear Medicine Department. 1043-1048 - Anand Dersingh, Ramiro Liscano, Allan G. Jost, John Finnson:
Dynamic Role Assignment Using Semantic Contexts. 1049-1054 - Maryam Barzegar, Nasser Mozayani
, Mahmood Fathy:
Secure Safety Messages Broadcasting in Vehicular Network. 1055-1060
The International Workshop on Quantitative Evaluation of Large-scale Systems and Technologies (QuEST 2009)
Performance
- Raul Soriano, Juan Manuel Orduña
:
Improving the Scalability of Communication-Aware Task Mapping Techniques. 1061-1066 - Henrike Barkmann, Rüdiger Lincke, Welf Löwe:
Quantitative Evaluation of Software Quality Metrics in Open-Source Projects. 1067-1072 - Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu:
Modeling Multiprocessor Cache Protocol Impact on MPI Performance. 1073-1078 - Chris Matthews, Yvonne Coady, Stephen W. Neville:
Quantifying Artifacts of Virtualization: A Framework for Mirco-Benchmarks. 1079-1084
System-Level Behaviour
- Jonathan Tate, Iain Bate:
Understanding Behavioural Tradeoffs in Large-Scale Sensornet Design. 1085-1091 - Stephen W. Neville, Kin Fun Li:
The Rational for Developing Larger-scale 1000+ Machine Emulation-Based Research Test Beds. 1092-1099 - Christopher Mueller, Michael Horie, Stephen W. Neville:
A Distributed Application-Level IT System Workload Generator. 1100-1105
Network Traffic and Topology
- Gert Pfeifer, Christof Fetzer:
TopDNS: Experiences Building Internet-Based Topologies with GNP. 1106-1111 - Wooyoung Jung, Sungmin Hong, Minkeun Ha, Young-Joo Kim, Daeyoung Kim:
SSL-Based Lightweight Security of IP-Based Wireless Sensor Networks. 1112-1117 - Yvonne Lai, Wai Sum Lai:
A Graph-Theoretic Model of Routing Hierarchies. 1118-1123 - Mohammed S. Gadelrab
, Anas Abou El Kalam, Yves Deswarte
:
Manipulation of Network Traffic Traces for Security Evaluation. 1124-1129
The First International Conference on Underwater Networks (WUnderNet 2009)
Physical/Link/Network Layer Issues
- Jan Erik Håkegård, Knut Harald Grythe:
Effects of Channel Estimation Errors in OFDM-MIMO-Based Underwater Communications. 1130-1135 - António Silva
, Julien Huillery
, Sérgio M. Jesus
:
Multi-node Processing for Asymmetrical Communications in Underwater Acoustic Networks. 1136-1141 - Leonardo Badia
, Paolo Casari
, Marco Levorato, Michele Zorzi:
Analysis of an Automatic Repeat Request Scheme Addressing Long Delay Channels. 1142-1147 - Nitthita Chirdchoo
, Wee-Seng Soh
, Kee Chaing Chua:
Sector-Based Routing with Destination Location Prediction for Underwater Mobile Networks. 1148-1153 - Weiwei Wu, William Moran, Jonathan H. Manton
, Moshe Zukerman
:
Topology Design of Undersea Cables Considering Survivability Under Major Disasters. 1154-1159
Medium Access Control
- Roee Diamant, Michael Pinkhasevich, Ido Achrak:
A Novel Spatially Shared TDMA Protocol and Quality Measure for Ad Hoc Underwater Acoustic Network. 1160-1165 - Jong-Pil Kim, Jae-Won Lee, Youn-Seon Jang, Kweon Son, Ho-Shin Cho:
A CDMA-Based MAC Protocol in Tree-Topology for Underwater Acoustic Sensor Networks. 1166-1171 - Helge Rustad:
A Lightweight Protocol Suite for Underwater Communication. 1172-1177 - Ghalib Asadullah Shah:
A Survey on Medium Access Control in Underwater Acoustic Sensor Networks. 1178-1183

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.