default search action
1. NBiS 2007: Regensburg, Germany
- Tomoya Enokido, Leonard Barolli, Makoto Takizawa:
Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings. Lecture Notes in Computer Science 4658, Springer 2007, ISBN 978-3-540-74572-3
Sensor and Ad-Hoc Networks
- Makoto Ikeda, Giuseppe De Marco, Leonard Barolli:
A Simple Statistical Methodology for Testing Ad Hoc Networks. 1-10 - Kiyohiro Morita, Keiji Ozaki, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
Sensor-Actuator Communication Protocols in Wireless Networks. 11-19 - Consolee Mbarushimana, Alireza Shahrabi, Hadi Larijani:
The Effect of Routing Protocol Dynamics on TCP Performance in Mobile Ad Hoc Networks. 20-29 - Fumiaki Sato, Sumito Iijima:
Battery and Power Aware Routing in Mobile Ad Hoc Networks. 30-39 - Yoshitaka Shibata, Yosuke Sato, Kazuya Sakakibara, Kazuo Takahata:
Wireless Balloon Network for Disaster Information System. 40-48 - Krzysztof Gierlowski, Krzysztof Nowicki:
Wireless Networks as an Infrastructure for Mission-Critical Business Applications. 49-58
Network Security
- Iksu Kim, Myungho Kim:
The DecoyPort: Redirecting Hackers to Honeypots. 59-68 - Yeu-Pong Lai, Jui-Heng Tai:
Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard. 69-78 - Sylvia B. Encheva, Sharil Tumin:
Positive and Negative Authorizations to Access Protected Web Resources. 79-87 - Taeshik Shon, Wook Choi:
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. 88-97 - Jin-Cherng Lin, Jan-Min Chen, Hsing-Kuo Wong:
An Automatic Meta-revised Mechanism for Anti-malicious Injection. 98-107 - Chizuro Sakamoto, Giuseppe De Marco, Rihito Yaegashi, Masaharu Tadauchi, Leonard Barolli:
SKEMON: A Simple Certificate-Less Method for Key Exchange by Using Mobile Network. 108-117
Secure System Applications
- Chin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan:
A Secure Authentication Scheme for a Public Terminal Before a Transaction. 118-126 - Michitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. 127-136 - Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng:
A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept. 137-146 - Kuang-Hui Chi, Ji-Han Jiang, Yu-Ching Hsu:
Multigroup Rekeying for a Wireless Network. 147-156
Web Technologies and Middleware Systems
- Matthias Häsel:
Rich Internet Architectures for Browser-Based Multiplayer Real-Time Games - Design and Implementation Issues of virtual-kicker.com. 157-166 - Po-Jen Chuang, Chu-Sing Yang, Ming-Chao Chiang:
Distribution of Lecture Concepts and Relations in Digital Contents. 167-176 - Yuebin Bai, Haixing Ji, Huabin Lu, Chao Li, Qi Zou, Peng Lv:
Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart Environment. 177-186 - Walter Colitti, Kris Steenhaut, Ann Nowé, Jan Lemeire:
Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM Networks. 187-196
Distributed Systems and Applications
- Nuno Lopes, Carlos Baquero:
Implementing Range Queries with a Decentralized Balanced Tree over Distributed Hash Tables. 197-206 - Kai Han, Binoy Ravindran, E. Douglas Jensen:
Byzantine-Tolerant, Information Propagation in Untrustworthy and Unreliable Networks. 207-216 - Ludmila Himmelspach, Mehmet Kolac, Krasimir Kutsarov, Alexander Chernin, Christopher Popfinger, Stefan Conrad:
COMICS: A Global Constraint Manager for Interactive Component Database Systems. 217-226 - Valbona Barolli, Heihachiro Fukuda, Leonard Barolli, Makoto Takizawa:
Guidelines for Network Service Pricing: An Extended Model Considering Increase of Network Users. 227-237
Scheduling
- Tomoya Enokido, Valbona Barolli, Makoto Takizawa:
Role-Based Scheduling and Synchronization Algorithms to Prevent Illegal Information Flow. 238-247 - André Trudel, Elhadi M. Shakshuki, Yiqing Xu:
A Probabilistic Multi-agent Scheduler Implemented in JXTA. 248-257 - Kwok-Wa Lam, Sheung-lun Hung:
Scheduling Real-Time Requests in On-Demand Broadcast Environments. 258-267 - Chih-Ming Wang, Chu-Sing Yang, Ming-Chao Chiang:
A Fair Replica Placement for Parallel Download on Cluster Grid. 268-277
Network Analysis
- Jan Sedmidubský, Stanislav Barton, Vlastislav Dohnal, Pavel Zezula:
Querying Similarity in Metric Social Networks. 278-287 - Aamir Siddique, Abdalla M. Hanashi, Irfan Awan, Michael E. Woodward:
Performance Evaluation of Dynamic Probabilistic Flooding Using Local Density Information in MANETs. 288-297 - Salvador Alcaraz, Katja Gilly, Carlos Juiz, Ramón Puigjaner:
A Token Bucket Model with Assured Forwarding for Web Traffic. 298-307 - Natalia Kryvinska, Peter Zinterhof, Do Van Thanh:
An Analytical Approach to the Efficient Real-Time Events/Services Handling in Converged Network Environment. 308-316 - Toshihiko Yamakami:
Command Transition Probability Analysis on Mobile Internet Command Sequences. 317-324 - Young-Duk Kim, Yeon-Mo Yang, Dong-Ha Lee:
A Solution for Congestion and Performance Enhancement by Dynamic Packet Bursting in Mobile Ad Hoc Networks. 325-334
P2P Systems and Applications
- Markus Aleksy, Martin Schader, Christian Seifried, Makoto Takizawa:
Empirical Study of Design Pattern Usage in Peer-to-Peer Systems. 335-344 - Fatos Xhafa, Raul Fernandez, Thanasis Daradoumis, Leonard Barolli, Santi Caballé:
Improvement of JXTA Protocols for Supporting Reliable Distributed Applications in P2P Systems. 345-354 - Oliver Haase, Alfred Toth, Jürgen Wäsch:
A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications. 355-364 - David C. Faye, Gilles Nachouki, Patrick Valduriez:
Semantic Query Routing in SenPeer, a P2P Data Management System. 365-374 - Kasame Tritrakan, Pakit Kanchana, Veera Muangsin:
Jamjuree Cluster: A Peer-to-Peer Cluster Computing System. 375-384 - Nobuyoshi Sato, Minoru Uehara, Koichiro Shimomura, Hirobumi Yamamoto, Ken'ichi Kamijo:
Evaluations on Classified Selection of Dense Vectors for Vegetable Geographical Origin Identification System Using Trace Elements. 385-396
Pervasive and Ubiquitous Systems
- Arjan Durresi, Arben Merkoci, Mimoza Durresi, Leonard Barolli:
Integrated Biomedical System for Ubiquitous Health Monitoring. 397-405 - Tuyet-Tram Dang-Ngoc, Nicolas Travers:
Tree Graph Views for a Distributed Pervasive Environment. 406-415 - MinHwan Ok, Ja-Won Seo, Myong-Soon Park:
A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing. 416-425 - Zhefan Jiang, Sangwook Kim:
Trust Model for Mobile Devices in Ubiquitous Environment. 426-434
Network Applications and Protocols
- Enrique Pena, Miguel Rios, Christian Oberli, Vladimir Marianov:
PoQBA: A New Path Admission Control for Diffserv Networks. 435-445 - Waqas Ahmad, Irfan Awan, Makoto Takizawa:
An Adaptive Call Admission Control Approach for Multimedia 3G Network. 446-455 - Sangbin Lee, Younghwan Jung, Woojin Park, Sunshin An:
Spatial Correlation Code Based Data Aggregation Scheme for Maximizing Network Lifetime. 456-465 - Dayin Promkotwong, Ohm Sornil:
A Mesh-Based QoS Aware Multicast Routing Protocol. 466-475
Embedded Systems
- Erianto Chai, Minoru Uehara, Hideki Mori, Nobuyoshi Sato:
Virtual Large-Scale Disk System for PC-Room. 476-485 - Sylvia B. Encheva, Sharil Tumin:
Application of Default Logic in an Intelligent Tutoring System. 486-494 - Yong-Ju Lee, SongWoo Sok, Hag-Young Kim, Myung-Joon Kim, Cheolhoon Lee:
Consolidating with Media Streaming Server and Network Storage Card. 495-504 - Shinya Toji, Minoru Uehara, Hideki Mori:
Design of the Tile-Based Embedded Multimedia Processor -TEMP-. 505-512
Fuzzy Systems and Their Applications
- Leonard Barolli, Arjan Durresi, Fatos Xhafa, Akio Koyama:
A Fuzzy-Based Speed-Aware Handoff System for Wireless Cellular Networks. 513-522 - Jung-Hyun Kim, Kwang-Seok Hong:
WPS and Voice-XML-Based Multi-Modal Fusion Agent Using SNNR and Fuzzy Value. 523-532 - Kun-Ming Yu, Zhi-Jie Luo, Chih-Hsun Chou, Cheng-Kwan Chen, Jiayi Zhou:
A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational Grids. 533-542
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.