23. AINA 2009:
Bradford,
United Kingdom
Irfan Awan, Muhammad Younas, Takahiro Hara, Arjan Durresi (Eds.):
The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009.
IEEE Computer Society 2009, ISBN 978-0-7695-3638-5
Keynote Speeches
Performance Modelling and Evaluation 1
Routing and Broadcast Mechanisms
- Ling-Jyh Chen, Che-Liang Chiou, Yi-Chao Chen:
An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks.
50-57
- Sasitharan Balasubramaniam, Dmitri Botvich, Julien Mineraud, William Donnelly:
Parameterised Gradient Based Routing (PGBR) for Future Internet.
58-65
- Nak Beom Sung, Kyung Tae Kim, Sun Sik Park, Hee Yong Youn:
A New Counting Scheme for Multicast Broadcast Service with WiBro.
66-73
- Mukul Goyal, Mohd Soperi, Hossein Hosseini, Kishor S. Trivedi, A. Shaikh, G. Choudhury:
Analyzing the Hold Time Schemes to Limit the Routing Table Calculations in OSPF Protocol.
74-81
Distributed and Parallel Systems
Service Oriented Architecture
- Florian Daniel, Fabio Casati, Vincenzo D'Andrea, Emmanuel Mulo, Uwe Zdun, Schahram Dustdar, Steve Strauch, David Schumm, Frank Leymann, Samir Sebahi, Fabien De Marchi, Mohand-Said Hacid:
Business Compliance Governance in Service-Oriented Architectures.
113-120
- Tim Dörnemann, Markus Mathes, Roland Schwarzkopf, Ernst Juhnke, Bernd Freisleben:
DAVO: A Domain-Adaptable, Visual BPEL4WS Orchestrator.
121-128
- Michael Koch, Markus Hillenbrand, Paul Müller:
A Generic Database Web Service for the Venice Service Grid.
129-136
- Uwe Kylau, Ivonne Thomas, Michael Menzel, Christoph Meinel:
Trust Requirements in Identity Federation Topologies.
137-145
Agents and Trust Management
Video Communication Technology
- Yoong Choon Chang, Sze Wei Lee, Ryoichi Komiya:
An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video Transmission.
175-181
- Jiao Feng, Xuefen Chi, Peng Li, Wang Yining, Lin Guan:
Adaptive FEC Algorithm Based on Prediction of Video Quality and Bandwidth Utilization Ratio.
182-188
- Dario Gallucci, Attilio Fiandrotti, Enrico Masala, Juan Carlos De Martin:
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks.
189-196
- Ahmed B. Abdurrhman, Michael E. Woodward:
Heterogeneous Error Protection of H.264/AVC Video Using Hierarchical 16-QAM.
197-200
Communication Technology and Protocols 1
- Wei Lin, Baoming Bai, Ying Li, Xiao Ma:
Design of q-ary Irregular Repeat-Accumulate Codes.
201-206
- Yuan-Hua Liu, Xin-Mei Wang, Jian-Hua Ma:
Design of Quasi-Cyclic LDPC Codes Based on Euclidean Geometries.
207-211
- Yong-qiang Hei, Xiao-hui Li, Ke-chu Yi, Wen-tao Li:
Multi-user MIMO Broadcast System Grouping Strategy Based on Particle Swarm Optimization.
212-216
- Rafe Khalaf Alasem, M. Alamgir Hossain, Irfan Awan, Hussein Mansour:
ANFIS Based AQM Controller for Congestion Control.
217-224
Autonomic and Advanced Network Systems
Internet Computing and Applications
- Xing Zhou, Thomas Dreibholz, Fu Fa, Wencai Du, Erwin P. Rathgeb:
Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling Systems.
256-262
- Yeim-Kuan Chang, Yen-Cheng Liu, Fang-Chen Kuo:
A Pipelined IP Forwarding Engine with Fast Update.
263-269
- Huaqun Guo, Lek Heng Ngoh, W. C. Wong, Ping Yang, Nazreen Beevi:
DINCast: Optimizing Application-Level Shared-Tree Multicast.
270-277
- Yeim-Kuan Chang, Yung-Chieh Lin:
A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-Tree.
278-284
Ad Hoc and Sensor Networks
Performance Modelling and Evaluation 2
Privacy and Trust Management
Quality of Service in Web Services
Workflows and Reliability in Grid Computing
- Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su:
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA.
411-418
- Henrik Thostrup Jensen, Josva Kleist:
A Highly Available Grid Metadata Catalog.
419-426
- Feilong Tang, Minyi Guo, Minglu Li, Li Li:
Transaction Management for Reliable Grid Applications.
427-434
- Suraj Pandey, William Voorsluys, Mustafizur Rahman, Rajkumar Buyya, James E. Dobson, Kenneth Chiu:
Brain Image Registration Analysis Workflow for fMRI Studies on Global Grids.
435-442
Mobile Networks and Applications
Multimedia Systems and Applications
- Adel Almohammad, Gheorghita Ghinea, Robert M. Hierons:
JPEG Steganography: A Performance Evaluation of Quantization Tables.
471-478
- Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa:
Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia Objects.
479-486
- Marcos Antonio Simplicio Jr., Vlad Coroama, Yeda R. Venturini, Tereza Cristina M. B. Carvalho, Mats Näslund, Makan Pourzandi:
PHD.
487-494
- Hirokazu Miyata, Ryuya Uda, Ken-ichi Okada:
The Efficiency Method of Sanitizable Signature Scheme for SMF.
495-502
Pervasive and Ubiquitous Computing
Security 1:
Intrusion Detection Systems
Wireless Sensor Networks 1
- Yasuhiro Nose, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
Route Construction Based on Measured Characteristics of Radio Propagation in Wireless Sensor Networks.
560-567
- Mohammad Baharloo, Reza Hajisheykhi, Mohammad Arjomand, Amir-Hossein Jahangir:
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol.
568-571
- Soochang Park, Euisin Lee, Fucai Yu, Min-Sook Jin, Sang-Ha Kim:
Information Communication Mechanism for Loosely Coupled Mobile User Groups in Wireless Sensor Fields.
572-579
- Elhadi Shakshuki, Haroon Malik, Tarek R. Sheltami:
Lessons Learned: Simulation Vs WSN Deployment.
580-587
Security 2:
New Languages and Systems
Scheduling and Routing Schemes
Interaction in Web Services
Security 3:
Authentication and Access Control
WLAN,
RFID and OFDM Systems
Networks:
Scalibility,
Survivability,
and Recovery
- Isaac Woungang, Guangyan Ma, Mieso K. Denko, Alireza Sadeghian, Sudip Misra, Alexander Ferworn:
Survivability in Existing ATM-Based Mesh Networks.
719-724
- Saleem N. Bhatti, Martin Bateman:
Effects of On-path Buffering on TCP Fairness.
725-732
- Marta Beltrán, Antonio Guzmán, Fernando Sevillano:
Scalability Analysis to Optimize a Network on Chip.
733-740
- Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan, Maytham Safar, Marina L. Gavrilova:
Network Voronoi Diagram Based Range Search.
741-748
Wireless Sensor Networks 2
Web Technology and Applications
- Hon Wai Lam, Chen Wu:
Finding Influential eBay Buyers for Viral Marketing.
778-785
- D. R. W. Holton, Irfan-Ullah Awan, Muhammad Younas:
Priority Scheduling of Requests to Web Portals.
786-791
- Rei Endo, Kenji Takagi, Hiroshi Shigeno:
GBLT: Load Distribution Method for High Density by User Behavior in MMO Virtual Environment.
792-799
- Keita Matsuo, Leonard Barolli, Fatos Xhafa, Vladi Kolici, Akio Koyama, Arjan Durresi, Rozeta Miho:
Implementation of an E-learning System Using P2P, Web and Sensor Technologies.
800-807
Recovery and Fault Tolerance
- Ailixier Aikebaier, Valbona Barolli, Tomoya Enokido, Makoto Takizawa:
Recoverable Cuts to Make Agreement among Peers.
808-815
- Yoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba, Kazuo Takahata:
A New Ballooned Wireless Mesh Network System for Disaster Use.
816-821
- Omar Khadeer Hussain, Tharam S. Dillon, Elizabeth Chang, Farookh Khadeer Hussain:
Determining the Net Financial Risk for Decision Making in Business Interactions.
822-829
- Yan Yang, Samia Souissi, Xavier Défago, Makoto Takizawa:
Fault-Tolerant Flocking of Mobile Robots with Whole Formation Rotation.
830-837
Security 4:
Architectures and Protocols
- Thomas Badura, Michael Becher:
Testing the Symbian OS Platform Security Architecture.
838-844
- Tomoya Enokido, S. Misbah Deen, Makoto Takizawa:
A Protocol for Releasing Purpose Marks to Prevent Illegal Information Flow.
845-852
- Akira Yamada, Yutaka Miyake, Masahiro Terabe, Kazuo Hashimoto, Nei Kato:
Anomaly Detection for DNS Servers Using Frequent Host Selection.
853-860
- Rongfei Zeng, Chuang Lin, Hongkun Yang, Yuanzhuo Wang, Yang Wang, Peter D. Ungsunan:
A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis.
861-867
Grid and P2P Computing
- Akihiro Iwamaru, Tsuyoshi Itokawa, Teruaki Kitasuka, Masayoshi Aritsugi:
Introducing Group Participation Support into P2P Web Caching Systems.
868-875
- David Antos, Ludek Matyska, Petr Holub, Jirí Sitera:
VirtCloud: Virtualising Network for Grid Environments.
876-883
- Po-Cheng Chen, Jyh-Biau Chang, Jia-Hao Yang, Yi-Chang Zhuang, Ce-Kuen Shieh:
Spigot: Fragment-Level File Sharing and Consistency on Grids.
884-891
- Huey-Ing Liu, Bing-Rong Tang:
DACA: Dynamic Anti-Cheating Architecture for MMOGs.
892-897
Wireless Sensor Networks 3
- Quan Le Trung, Amirhosein Taherkordi, Frank Eliassen, Hai Ngoc Pham, Tor Skeie, Paal E. Engelstad:
DCM-Arch: An Architecture for Data, Control, and Management in Wireless Sensor Networks.
898-905
- Ryouhei Kawano, Toshiaki Miyazaki:
Effective Sensing Function Allocation Using a Distributed Graph Coloring and a Slot Allocation Algorithm in Wireless Sensor Networks.
906-913
- William A. Lintz, John C. McEachen, Murali Tummala:
A Method for Determining Weight Reset Timing in a Wirelessly Networked Array with Independently Mobile Elements.
914-920
- Dawn Rohm, Mukul Goyal, Hossein Hosseini, August Divjak, Yusuf Bashir:
Configuring Beaconless IEEE 802.15.4 Networks Under Different Traffic Loads.
921-928
Distributed Databases and Data Mining
Communication Technology and Protocols 2
Copyright © Tue Mar 16 01:54:29 2010
by Michael Ley (ley@uni-trier.de)