


default search action
ISCC 2008: Marrakech, Morocco
- Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco. IEEE Computer Society 2008, ISBN 978-1-4244-2702-4

- Adel Said Elmaghraby

:
Message from the general chair. - Saad Biaz, Abdelghani Bellaachia:

Message from the technical program chairs.
Keynotes
- Siamak Khorram:

The state-of-the-art in acquiring and processing satellite remotely sensed data worldwide. - Raouf Boutaba:

Distributed pattern matching: Concept and applications in internet-scale networks. - Mahmoud Daneshmand:

Ten years of experimentation in Information Mining & Software Research with applications in telecommunications industry. - Azzedine Boukerche:

The next generation wireless network challenges for an emergency preparedness and response class of applications: A necessary public safety and security. - Saad Biaz:

Success and failures of "de-randomized" congestion losses losses losses. - Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang:

2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systems.
Streaming over Wireless I
- Rouzbeh Razavi, Martin Fleury, Mohammed Ghanbari

:
Block-based rateless coding for energy-efficient video streaming over bluetooth. 1-6 - Anastasios Politis

, Isabella Kotini
, Athanasios Manitsaris:
Streaming video timing analysis in wireless ad-hoc networks. 7-12 - Pietro Zanuttigh, Andrea Zanella

, Guido M. Cortelazzo:
Analysis of compressed depth and image streaming on unreliable networks. 13-18
Streaming over Wireless II
- Kostas Pentikousis, Jarno Pinola

, Esa Piri, Frerk Fitzek:
A measurement study of Speex VoIP and H.264/AVC video over IEEE 802.16d and IEEE 802.11g. 19-24 - Federico Maguolo, Mathieu Lacage, Thierry Turletti:

Efficient collision detection for auto rate fallback algorithm. 25-30 - Davide Brunelli

, Loris Teodorani:
Improving audio streaming over multi-hop ZigBee networks. 31-36
Multimedia Applications over Wireless
- Giorgos Karopoulos, Georgios Kambourakis

, Stefanos Gritzalis
:
Caller identity privacy in SIP heterogeneous realms: A practical solution. 37-43 - Chrysa Papagianni

, Nikolaos D. Tselikas
, Evangelos A. Kosmatos, Andreas E. Papadakis
, Thierry Keutgen, Dimitra I. Kaklamani, Iakovos S. Venieris:
A complete content production and delivery system in a controlled multimedia network. 44-49 - Antonios G. Alexiou, Christos Bouras, Evangelos Rekkas:

Efficient delivery of MBMS multicast traffic over HSDPA. 50-55
Optical Networks
- Wael Hosny Fouad Aly, Mohamed Faten Zhani

, Halima Elbiaze:
On controlling burst loss ratio inside an OBS network. 56-61 - Eun-Sung Jung

, Yan Li, Sanjay Ranka
, Sartaj Sahni:
Performance evaluation of routing and wavelength assignment algorithms for optical networks. 62-67 - Burak Kantarci, Hussein T. Mouftah, Sema F. Oktug

:
Arranging shareability dynamically for the availability-constrained design of optical transport networks. 68-73 - Emad Mahmoud Alsukhni, Hussein T. Mouftah:

A novel distributed destination routing-based Availability-Aware provisioning framework for differentiated protection services in optical mesh networks. 74-79 - Youssef Said

, Houria Rezig, Ammar Bouallegue:
On the application of long soas in linear operating and saturation regimes: Exploitation in high bit rate optical networks. 80-83 - Branka Lakic, Marek Hajduczenia, Henrique J. A. da Silva, Paulo P. Monteiro

:
Using adapted visibility graphs for network planning. 84-90
Service Oriented Architecture
- Xiaodong Lu, Kinji Mori:

Autonomous preference-aware multi-service integration and allocation. 91-96 - Dietrich Van der Weken, Stein Desmet, Bjorn Muylaert, Steven Van Assche, Bruno Volckaert

:
Automating media processes in a service oriented architecture. 97-102 - Pravin Pawar, Julien Subercaze, Pierre Maret, Bert-Jan van Beijnum, Dimitri Konstantas:

Towards business model and technical platform for the service oriented context-aware mobile virtual communities. 103-110 - Antonio Corradi

, Enrico Lodolo
, Stefano Monti, Samuele Pasini:
A user-centric composition model for the Internet of Services. 110-117 - Uthman Baroudi

, B. Abu Qadous:
An efficient adaptive Cross-Layer interaction mechanism for TCP traffic over heterogeneous networks. 118-123 - Basel Alawieh, Yongning Zhang, Chadi Assi, Hussein T. Mouftah:

An efficient rate adaptation scheme for multihop wireless networks using Kalman Filter. 124-129 - Saad Biaz, Shaoen Wu:

Rate adaptation algorithms for IEEE 802.11 networks: A survey and comparison. 130-136 - Cire Sall

, El houcine Chakir El Alaoui, Saïd Doubabi
, Elmostafa Elwarraki
:
A robust controller for the TCP congestion window. 137-142 - Kuei-Ping Shih, San-Yuan Wang, Chien-Min Chou, Li-Jie Cheng:

A dynamic rate adaptation with fragmentation MAC protocol against channel variation for wireless LANs. 143-148 - Niklas Kirschnick, Frank Steuer, Pablo Vidales, Sahin Albayrak

:
Adaptive window size to reduce the influence of heterogeneous mobility on TCP performance. 149-156 - Shan Chen, Junhua Zhu, Brahim Bensaou, Farid Naït-Abdesselam:

F2-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networks. 157-162 - Shie-Yuan Wang, Hsi-Lu Chao, Kuang-Che Liu, Ting-Wei He, Chih-Che Lin, Chih-Liang Chou:

Evaluating and improving the TCP/UDP performances of IEEE 802.11(p)/1609 networks. 163-168
Data Mining I
- Safwat H. Hamad

, Tahany A. Fergany, Reda A. Ammar, Amal A. Abd El-Raouf
:
A Double K-Clustering Approach for restructuring Distributed Object-Oriented software. 169-174 - Hisham El-Shishiny, T. H. Soliman, M. El-Asmar:

Mining drug targets based on microarray experiments. 175-181 - Hisham El-Shishiny, S. Sobhy Deraz, Omar Bahy Badreddin:

Mining software aging: A neural network approach. 182-187 - Aouatif Amine

, Sanaa Ghouzali
, Mohammed Rziza
, Driss Aboutajdine:
Investigation of feature dimension reduction based DCT/SVM for face recognition. 188-193
Cellular and Mobile Communications I
- Khaled A. Ali, Hossam S. Hassanein

, Hussein T. Mouftah:
Power-Controlled Rate and Coverage Adaptation for WCDMA cellular networks. 194-200 - Polychronis Koutsakis

:
Call admission control for H.264 traffic transmission over wireless cellular networks. 201-207 - Khalil Ibrahimi

, Rachid El Azouzi
, El-Houssine Bouyakhf:
Uplink call admission control in multi-services W-CDMA network. 208-213 - Polychronis Koutsakis

:
Efficient traffic policing for videoconference traffic over wireless cellular networks. 214-221 - Woonsik Lee, Minh-Viet Nguyen, Hwang Soo Lee:

A resource allocation algorithm and system architecture to extend the cell coverage and alleviate the inter-cell interference. 222-227 - Toshihiko Komine, Satoshi Konishi, Hiroyuki Shinbo:

A study on optimal termination target of synchronous H-ARQ for the next generation cellular system. 228-233 - Jiao Zhang, Yujun Zhang, Ye Tian, Zhongcheng Li:

CPK-based fast authentication method in Mobile IPv6 networks. 234-239
Secured Networks I
- Pedro B. Velloso

, Rafael P. Laufer, Otto Carlos Muniz Bandeira Duarte, Guy Pujolle:
Analyzing a human-based trust model for mobile ad hoc networks. 240-245 - François Lesueur, Ludovic Mé, Valérie Viet Triem Tong:

A sybilproof distributed identity management for P2P networks. 246-253 - Vincent Toubiana, Houda Labiod, Laurent Reynaud, Yvon Gourhant:

An analysis of ASMA performances against packet dropping attacks in dense networks. 254-259 - Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani:

The impact of wireless LAN security on performance of different Windows operating systems. 260-264
Mesh Networks I
- Jad El-Najjar, Brigitte Jaumard, Chadi Assi:

Efficient routing in WiMax/802.16 based mesh networks with centralized scheduling. 265-271 - Sadeq Ali Makram, Mesut Günes

:
Distributed channel assignment for multi-radio wireless mesh networks. 272-277 - João Paulo Barraca

, Rui L. Aguiar
:
Managing community aware Wireless Mesh Networks. 278-285 - Arlen Nascimento, Edjair de Souza Mota

, Saulo Queiroz
, Edson Nascimento Silva Jr.:
Header compression for VoIP over multi-hop wireless mesh networks. 286-291 - Rafael De T. Valle, Diego G. Passos

, Célio Vinicius N. de Albuquerque
, Débora C. Muchaluat-Saade:
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool. 292-297
Secured Systems
- Xinyan Zha, Sartaj Sahni:

Highly compressed Aho-Corasick automata for efficient intrusion detection. 298-303 - Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai:

Efficient disk encryption and verification through trusted nonce. 304-309 - Zonglin Li, Guangmin Hu, Dan Yang:

Global abnormal correlation analysis for DDoS attack detection. 310-315 - Vinodh Gopal, Satyajit Grover, Michael E. Kounavis:

Fast multiplication techniques for public key cryptography. 316-325 - Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani:

A phishing vulnerability analysis of web based systems. 326-331 - Yang Li, Binxing Fang, Li Guo, Zhihong Tian, Yongzheng Zhang, Zhi-Gang Wu:

UBSF: A novel online URL-Based Spam Filter. 332-339 - Yehia H. Khalil, Adel Said Elmaghraby

, Anup Kumar:
Evaluation of resilience for Data Center systems. 340-345 - Adil Alaoui, Nishant Subbiah, Jeffery Collmann, Kevin Cleary, Seong Ki Mun, Johnathan Coleman:

Building a secure medical research organization. 346-355
Cellular and Mobile Communications II
- Christophoros Christophorou, Andreas Pitsillides:

A new approach for efficient MBMS service provision in UTRAN. 356-361 - Christophoros Christophorou, Andreas Pitsillides:

An enhanced approach for efficient MBMS handovers in 3G networks. 362-367 - Andreas Panayides

, Christophoros Christophorou, Josephine Antoniou
, Andreas Pitsillides, Vasos Vassiliou
:
Power counting for optimized capacity in MBMS enabled UTRAN. 368-373 - Antonios G. Alexiou, Christos Bouras, Vasileios Kokkinos

:
Power saving methods for MBMS transmissions in UTRAN. 374-379 - Qi Li, Mingwei Xu, Xinwen Zhang:

Access control in Group Communication Systems. 380-385
Secured Networks II
- A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono:

FlexBox: Sandboxing internet servers based on layer-7 contexts. 386-391 - Yan Shen, Jun Bi, Jianping Wu, Qiang Liu:

A two-level source address spoofing prevention based on automatic signature and verification mechanism. 392-397 - Yasser Yasami

, Siavash Khorsandi, Saadat Pour Mozaffari, A. Jalalian:
An unsupervised network anomaly detection approach by k-Means clustering & ID3 algorithms. 398-403
Mesh Networks II
- Mohamed Abou El Saoud, Samy A. Mahmoud:

Optimal number and class selection of nodes in Wireless Mesh Networks. 404-410 - Zhiying Gao, Hassan Naser:

End-to-end shared restoration algorithms in multi-domain mesh networks. 411-416 - Ahmed Abd El Al, Tarek N. Saadawi:

High throughput path selection for multi-path video streaming in Ad-hoc networks. 417-422 - Valeria Loscrì

:
A queue based dynamic approach for the Coordinated distributed scheduler of the IEEE 802.16. 423-428 - Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda:

A load-aware routing metric for wireless mesh networks. 429-435 - Kuei-Ping Shih, Hung-Chang Chen, Chun-Chih Li, Hsiang-I Chen:

CLE2aR2: A cross-layer energy-efficient and reliable routing protocol for wireless ad hoc networks. 436-441
Architecture
- Samah A. Senbel:

Pro-active task sharing in a self-organizing server cluster. 442-446 - Alejandra Rodríguez, Javier Fernández

, Jesús Carretero
:
Model for on-demand virtual computing architectures - OVCA. 447-454 - Azzedine Boukerche, YunFeng Gu:

Performance modeling of a grid-based Data Distribution Management protocol. 455-461 - Kiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xiao Qin

, Yiming Yang:
Improving reliability and energy efficiency of disk systems via utilization control. 462-467 - Luiz Carlos Pinto, Rodrigo P. Mendonça, Mario A. R. Dantas

:
Impact of interconnection networks and application granularity to compound cluster environments. 468-473 - Luiz Carlos Pinto, Luiz H. B. Tomazella, Mario A. R. Dantas

:
Building efficient multi-core clusters for high performance computing. 474-479
Peer to Peer
- Fatih Turkmen

, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino:
P-CDN: Extending access control capabilities of P2P systems to provide CDN services. 480-486 - Raime Bustos, Alberto Aguilar, Kia Makki, Raimund K. Ege:

Multicast-P2P content distribution in large-scale enterprise networks. 487-494 - Michele Albano

, Laura Ricci
, Martina Baldanzi, Ranieri Baraglia:
VoRaQue: Range queries on Voronoi overlays. 495-500 - W. D. Yu, J. Patel, M. Chitralamuthu, S. S. Parakh:

An empirical approach to a system design methodology for mobile Peer-to-Peer computing. 501-506 - Marinho P. Barcellos, Rodrigo B. Mansilha

, Francisco V. Brasileiro
:
TorrentLab: investigating BitTorrent through simulation and live experiments. 507-512 - Ya Chu Yang, Chien-Ming Cheng, Pei Yun Lin, Shiao-Li Tsao:

A real-time road traffic information system based on a peer-to-peer approach. 513-518
Applications in Computers and Communications I
- Hazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath:

Formal automated transformation of SDL specifications to Lotos specifications. 519-524 - Chafia Bouanaka

, Faiza Belala:
Tile logic as an architectural model for mobility. 525-530 - Hisham Al-Mubaid

, Anurag Nagar:
Comparison of four similarity measures based on GO annotations for Gene Clustering. 531-536 - Suman Deb Roy, Sneha Aman Singh, Subhrabrata Choudhury, Narayan C. Debnath:

Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. 537-542 - Subhrabrata Choudhury, Kapil Paniker, Anamika Sinha, S. Mukhopadhyay, Narayan C. Debnath:

A proactive burst assembly algorithm for optical burst switched networks. 543-548
Wireless Network Models
- Merlinda Drini, Tarek N. Saadawi:

Modeling wireless channel for ad-hoc network routing protocol. 549-555 - Abdellatif Kobbane, Rachid El Azouzi

, El-Houssine Bouyakhf:
A queuing analysis of packet dropping for real-time applications in wireless networks. 556-561 - Chong Jiang, Brian Smith, Babak Hassibi, Sriram Vishwanath:

Multicast in wireless erasure networks with feedback. 562-565 - Saulo Queiroz

, Arlen Nascimento, Edjair de Souza Mota
, Andrea Oliveira, Leandro Galvão, Edson Nascimento Silva Jr.:
Impact evaluation of radio propagation models on performance parameters of application layer in Wireless Mesh Backbone simulation. 566-571 - Yan He, Dmitri D. Perkins

, Bin Huang:
S-Box: A scalability analysis framework for ad hoc routing protocols. 572-578
Data Mining II
- Fadoua Ataa-Allah

, William I. Grosky, Driss Aboutajdine:
Document clustering based on diffusion maps and a comparison of the k-means performances in various spaces. 579-584 - Hong Shen, Xiao-Long Yan:

Probability Density Estimation over evolving data streams using Tilted Parzen Window. 585-589 - Hichem Frigui, Cheul Hwang:

Semi-supervised Clustering and Aggregation of Relational Data. 590-595
Mobility I
- Cesare Stefanelli, Mauro Tortonesi

, Erika Benvegnu, Niranjan Suri:
Session mobility in the mockets communication middleware. 596-603 - Hanwen Zhang, Yujun Zhang, Chao Ma, Yi Sun, Zhongcheng Li:

Dynamic load balancing among multiple home agents for MIPv6. 604-609 - Hai Lin, Houda Labiod:

Release of unnecessary resource reservation in mobility cases. 610-615 - Omar M. Raoof, Hamed S. Al-Raweshidy

:
Game theory and an interface selection mechanism for Multi-homed Mobile Nodes. 616-623 - Rodrigo Prado, Eduardo Zagari, Tomás Badan, Eleri Cardozo

, Murício Magalhães, José Carrilho, Rossano P. Pinto, André Berenguel, Daniel Barboza, Daniel Moraes, Thienne Johnson, Lars Westberg:
A reference architecture for micro-mobility support in IP networks. 624-630 - Loreno Oliveira, Kyller Costa Gorgônio

, Angelo Perkusich
, Leandro Dias da Silva
:
Pitfalls and tradeoffs on dealing with handoff management in bluetooth-based WPANs for real-time applications. 631-636
Applications in Computers and Communications II
- Anurag Nagar, Hisham Al-Mubaid

:
Using path length measure for gene clustering based on similarity of annotation terms. 637-642 - Hazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath:

Towards sound development of PIXITP, conformance test suites, and conforming implementations for various Formal Description Techniques. 643-648 - Sultan Aljahdali, Ennumeri A. Zanaty:

Combining multiple segmentation methods for improving the segmentation accuracy. 649-653 - Narayan C. Debnath, Lorena Baigorria, Daniel Riesco, German Montejano:

Metrics applied to Aspect Oriented Design using UML profiles. 654-657 - Douglas Dyllon Jeronimo de Macedo

, Hilton Ganzo William Perantunes, Luiz F. J. Maia, Eros Comunello
, Aldo von Wangenheim
, Mario A. R. Dantas
:
An interoperability approach based on asynchronous replication among distributed internet databases. 658-663
Data Communications I
- Josep M. Selga, Agustín Zaballos

, Jaume Abella, Guiomar Corral:
Model for polling in noisy multihop systems with application to PLC and AMR. 664-669 - Atman Jbari

, Abdellah Adib
, Driss Aboutajdine:
A new signal separation technique using double referenced system. 670-673 - Elmahdi Driouch, Wessam Ajib:

A graph theory based scheduling algorithm For MIMO-CDMA systems using zero forcing beamforming. 674-679 - S. M. Sameer, Ratnam V. Raja Kumar:

An efficient maximum likelihood carrier frequency offset estimation technique for OFDM systems. 680-684 - Li Zheng, Doan B. Hoang:

Performance analysis for resource coordination in a high-density wireless environment. 685-690 - Binbin Xu, Jianping An, Zhongxia Simon He

:
MC-CDMA multiuser detection using a hybrid immune clonal selection algorithm with Hopfield Neural Network in fading channels. 691-694
Software & Applications
- Mohammad Reza Nami

, Abbas Malekpour:
Formal specification of a particular banking domain with RAISE specification language. 695-699 - Mohsen Toorani

, Ali Asghar Beheshti Shirazi:
SSMS - A secure SMS messaging protocol for the m-payment systems. 700-705 - Rui Qiao, Yuan Wang, Xinyan Gao, Jinzhao Wu:

Operational semantics of probabilistic Kleene algebra with tests. 706-713 - Xinyan Gao, Jinzhao Wu, Rui Qiao, Jianfeng Chen:

Theory framework for event structure slicing. 714-721 - Mohamed El Ghami

, Ivan Ivanov, Hans Melissen, Cornelis Roos, Trond Steihaug
:
Primal-dual algorithm for linear optimization problems based on a new class of kernel functions. 722-729 - Rajaa Saidi

, Mounia Fredj, Salma Mouline
, Agnès Front, Dominique Rieu:
Variability modeling for Business Component customization. 730-735 - Dolly Sharma

, Vishal Thapar, Reda A. Ammar, Sanguthevar Rajasekaran, Mohamed Ahmed:
Efficient sorting algorithms for the cell broadband engine. 736-741 - Bin Liu, Philippe Martins, Philippe Bertin:

The operation mode selection in FMIPv6. 742-749
Mobility II
- Paolo Bellavista

, Eugenio Magistretti:
How node mobility affects k-hop cluster quality in Mobile Ad Hoc NETworks: A quantitative evaluation. 750-756 - N. G. Ferreira, Susana Sargento

, Rui L. Aguiar
:
Implementation and experimental evaluation of a fast local mobility protocol. 757-763 - Paolo Bellavista

, Antonio Corradi
, Luca Foschini
:
An IMS vertical handoff solution to dynamically adapt mobile multimedia services. 764-771 - Huiming Wang, Xingang Shi, Zhiliang Wang, Xia Yin, Jianping Wu:

Performance testing of Mobile IPv6 protocol. 772-779
Network Management
- Luca Cittadini, Tiziana Refice, Alessio Campisano, Giuseppe Di Battista, Claudio Sasso:

Measuring and visualizing interdomain routing dynamics with BGPATH. 780-787 - Mazen G. Khair, Jun Zheng, Hussein T. Mouftah:

Distributed fault localization for multi-domain all-optical networks with partial power monitoring. 788-793 - Kenji Kumaki, Ikuo Nakagawa, Kenichi Nagami, Tomohiko Ogishi, Shigehiro Ano:

Design and evaluation of a P2MP MPLS-based hierarchical service management system. 794-799 - Natascha Petry Ligocki, Carmem S. Hara

, Christiano Lyra:
A flexible network monitoring tool based on a data stream management system. 800-805 - Ewerton Monteiro Salvador, Lisandro Zambenedetti Granville

:
Using visualization techniques for SNMP traffic analyses. 806-811 - Abderrahmane Ben Abdellahi Ben Doua, Seyeong Choi, Mohamed-Slim Alouini

, Khalid A. Qaraqe
:
Adaptive RAKE combining schemes in the soft handover region. 812-817
Data Communications II
- Manal Taoufiki, Abdellah Adib

, Driss Aboutajdine, Saad Biaz:
Blind MIMO deconvolution of any source distributions via high-order spectra. 818-823 - Adnane Latif, Rachid Hilal, Abdellah Ait Ouahman:

Investigation on folded patch antenna for cellular applications. 824-830 - A. A. Al-Kheir, Khalid A. Qaraqe

, Mohamed-Slim Alouini
:
On the space-time correlation of MIMO fading channels in 3D scattering models. 831-837 - Timo Nihtilä:

Capacity improvement by employing femto cells in a macro cell HSDPA network. 838-843 - Samad S. Kolahi:

Comparison of CDMA tele-traffic models. 844-848
Document Retrieval
- Abdelghani Bellaachia, Ghita Amor-Tijani:

Proper nouns in English-Arabic Cross Language Information Retrieval. 849-857 - Yin-Fu Huang, Shing-Hang Wang:

An Efficient XML query processing based on combining T-Bitmap and index techniques. 858-863 - Mohammad Shirali-Shahreza:

Pseudo-space Persian/Arabic text steganography. 864-868 - Siham Boulaknadel

, Béatrice Daille, Driss Aboutajdine:
Multi-word term indexing for Arabic document retrieval. 869-873 - Abdelghani Bellaachia, Ghita Amor-Tijani:

OOV words in an English-Arabic CLIR system. 874-882
Quality of Service I
- Vitor Jesus

, Rui L. Aguiar
, Peter Steenkiste
:
A stateless architectural approach to inter-domain QoS. 883-890 - José R. Gallardo, Sarai C. Cruz, Dimitrios Makrakis, Abdallah Shami

:
Analysis of the EDCA access mechanism for an IEEE 802.11e-compatible wireless LAN. 891-898 - Pedro Neves, Tuomas Nissilä, Telmo Pereira, Ilkka Harjula, João L. Monteiro, Kostas Pentikousis, Susana Sargento

, Francisco Fontes:
A vendor-independent resource control framework for WiMAX. 899-906 - Mohamad Chaitou

, Jean-Louis Le Roux:
Fast-reroute procedures for multi-point to multi-point MPLS tunnels. 907-914 - Abdelhamid Mellouk, Said Hoceini, Farid Baguenine, Mustapha Cheurfa:

Distributed Quality-of-Service routing of best constrained shortest paths. 915-919
Routing I
- Christine Maindorfer, Bettina Bär, Thomas Ottmann:

Relaxed min-augmented range trees for the representation of dynamic IP router tables. 920-927 - Tan Chen, Xin Xiong:

Searching nearest neighbor in overlay network. 928-933 - Marc Sánchez Artigas, Pedro García López, Antonio Fernandez Gómez-Skarmeta

:
Bypass: Providing secure DHT routing through bypassing malicious peers. 934-941 - Lotfi Mhamdi

:
A Partially Buffered Crossbar packet switching architecture and its scheduling. 942-948 - Thu-Huong Truong

, Mario Baldi, Yoram Ofek:
Scheduling high-rate sessions in Fractional Lambda Switching networks: Algorithm and analysis. 949-956 - Ali Abbasi, Ahmad Khonsari

, N. Farri:
MOTE: Efficient monitoring of top-k set in sensor networks. 957-962
Sensor Networks I
- Aristides Mpitziopoulos, Damianos Gavalas

, Charalampos Konstantopoulos
, Grammati E. Pantziou
:
Exploiting the cloning capability of Mobile Agents for cost-effective data fusion in wireless sensor networks. 963-968 - Nicola Altan, Erwin P. Rathgeb:

On the self-healing properties of an extremely low power indoor metering network. 969-974 - Azeddine Bilami

, Djallel Eddine Boubiche
:
A hybrid energy aware routing algorithm for wireless sensor networks. 975-980 - Wei Huangfu, Yan Liu, Bin Duan, Limin Sun, Jian Ma, Canfeng Chen:

EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor Networks. 981-987 - Hongli Xu, Liusheng Huang, Wang Liu, Ben Xu, Mingjun Xiao:

Topology control for minimal path interference in wireless sensor networks. 988-993
Image Processing
- Saoussen Ben Jabra, Ezzeddine Zagrouba

:
A new approach of 3D watermarking based on image segmentation. 994-999 - Samira Mabtoul, El Hassane Ibn Elhaj, Driss Aboutajdine:

A robust digital image watermarking method using Dual Tree Complex Wavelet Transform. 1000-1004 - Mounir Ait Kerroum

, Ahmed Hammouch, Driss Aboutajdine, Abdelghani Bellaachia:
Using the maximum Mutual Information criterion to textural Feature Selection for satellite image classification. 1005-1009 - Leila Essannouni

, El Hassane Ibn Elhaj, Driss Aboutajdine:
Automatic color face tracking using gray information. 1010-1014
Quality of Service II
- Mario Baldi, Marco Papa Manzillo:

Deterministic service on IEEE 802.11-like networks. 1015-1022 - Sahar Ghazal, Yassine Hadjadj-Aoul, Jalel Ben-Othman

, Farid Naït-Abdesselam:
Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networks. 1023-1028 - Bin Rong, Ibrahim Khalil

, Zahir Tari
:
QoS-aware Application Layer Multicast. 1029-1033 - S. T. EL-Leithy, Walaa M. Sheta

:
Wavelet-based geometry coding for 3D mesh using space frequency quantization. 1034-1039 - Anne Nevin, Yuming Jiang

, Peder J. Emstad:
Robustness study of MBAC algorithms. 1040-1046 - Mohamad Chaitou

, Jean-Louis Le Roux:
Multi-point to multi-point traffic engineering. 1047-1055
Routing II
- Tarik Elamsy, Randa El-Marakby:

Flooding Zone Initialization Protocol (FZIP): Enabling efficient multimedia diffusion for multi-hop wireless networks. 1056-1061 - Ahmed S. Nagy, Amr A. El-Kadi, Mikhail N. Mikhail:

Measuring network performance of swarm power aware routing protocol for MANETs. 1062-1069 - Youndo Lee, Yoonbo Shim, Yanghee Choi, Taekyoung Kwon:

A Reliability Aware Flooding Algorithm (RAFA) in wireless multi-hop networks. 1070-1075
Sensor Networks II
- Paolino Di Felice, Massimo Ianni, Luigi Pomante

:
A spatial extension of TinyDB for wireless sensor networks. 1076-1082 - Azzedine Boukerche, Yan Du, Jing Feng, Richard Werner Nelem Pazzi

:
A reliable synchronous transport protocol for wireless image sensor networks. 1083-1089 - Paulo Sérgio Sausen

, Marco Aurélio Spohn
, Angelo Perkusich
:
Broadcast routing in Wireless Sensor Networks with Dynamic Power Management. 1090-1095 - Giuseppe Anastasi, Marco Conti

, Mario Di Francesco:
Data collection in sensor networks with data mules: An integrated simulation analysis. 1096-1102
Systems
- Mehdi Chehel Amirani

, Mohsen Toorani
, Ali Asghar Beheshti Shirazi:
A new approach to content-based file type detection. 1103-1108 - Laura Ricci

, Luca Genovali:
JaDE: A JXTA support for distributed virtual environments. 1109-1114 - Syed Sajjad Rizvi, Khaled M. Elleithy

, Aasia Riasat:
Reducing null message traffic in large parallel and distributed systems. 1115-1121 - Machigar Ongtang, Ali R. Hurson

, Yu Jiao:
Transactional Agents for Pervasive Computing. 1122-1127 - Wafa Kammoun, Habib Youssef:

Improving the performance of End-to-End single rate Multicast Congestion Control. 1128-1132
VoIP, Multicast, and Load Balancing
- Eduard Garcia Villegas

, Rafael Vidal, Josep Paradells Aspas
:
Cooperative load balancing in IEEE 802.11 networks with cell breathing. 1133-1140 - Esa Piri, Jarno Pinola

, Frerk Fitzek, Kostas Pentikousis:
ROHC and aggregated VoIP over fixed WiMAX: An empirical evaluation. 1141-1146 - Weizhan Zhang, Qinghua Zheng, Yang Li, Yi Che:

LDCOM: a Layered degree-constrained overlay multicast for interactive media. 1147-1152 - Yun-Jung Cheng, Kuochen Wang, Rong-Hong Jan, Chien Chen, Chia-Yuan Huang:

Efficient failover and Load Balancing for dependable SIP proxy servers. 1153-1158 - Hung-Yun Hsieh, Hsiao-Pu Lin, You-En Lin:

Enhancing campus VoIP service for ubiquitous communication on dual-mode mobile handsets. 1159-1165
Sensor Networks III
- Kashif Ali, Hossam S. Hassanein

:
Underwater Wireless Hybrid Sensor Networks. 1166-1171 - Hu Junping, Jin Yuhui, Dou Liang:

A Time-based Cluster-Head Selection Algorithm for LEACH. 1172-1176 - Saleh Ibrahim

, Jun-Hong Cui, Reda A. Ammar:
Efficient surface gateway deployment for underwater sensor networks. 1177-1182 - Azzedine Boukerche, Horacio A. B. F. de Oliveira, Eduardo Freire Nakamura

, Antonio Alfredo Ferreira Loureiro:
Enlightness: An enhanced and lightweight algorithm for time-space localization in Wireless Sensor Networks. 1183-1189 - Clément Saad, Abderrahim Benslimane

, Jean-Claude König:
AT-Angle: A distributed method for localization using angles in sensor networks. 1190-1195

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














