Default Cover Image

2006 International Conference on Systems and Networks Communications

Oct. 29 2006 to Nov. 3 2006

Tahiti

Table of Contents

Introduction
PrefaceFreely available from IEEE.pp. xviii
Introduction
ICSNS CommitteesFreely available from IEEE.pp. xix
ICSNC 1: Mobility and Ad Hoc
Energy Aware Topology Management in Ad Hoc Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1
ICSNC 1: Mobility and Ad Hoc
Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 2
ICSNC 1: Mobility and Ad Hoc
An Enhanced Gnutella for Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 3
ICSNC 1: Mobility and Ad Hoc
A New EAAODV Routing Protocol based on Mobile AgentFull-text access may be available. Sign in or learn about subscription options.pp. 4
ICSNC 1: Mobility and Ad Hoc
The Case of Multi-hop Peer-to-Peer Implementation of Mobile Social ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 5
ICSNC 1: Mobility and Ad Hoc
Mobile agent communication schemeFull-text access may be available. Sign in or learn about subscription options.pp. 6
ICSNC 2: High Speed
Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 7
ICSNC 2: High Speed
Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 8
ICSNC 2: High Speed
A neuro-forecastwater-filling scheme of server schedulingFull-text access may be available. Sign in or learn about subscription options.pp. 9
ICSNC 2: High Speed
A Two - Phase Distributed Reconfiguration Algorithm for Node Failures in IP-Over-WDM NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 10
ICSNC 2: High Speed
Grooming of Multicast Sessions in Sparse Splitting WDM Mesh Networks using Virtual Source Based TreesFull-text access may be available. Sign in or learn about subscription options.pp. 11
ICSNC 2: High Speed
Cost Benefit Study of Sparse-PartialWavelength Conversion ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 12
ICSNC 3: Multimedia
A new approach of data hiding within speech based on Hash and Hilbert TransformFull-text access may be available. Sign in or learn about subscription options.pp. 13
ICSNC 3: Multimedia
Active Service Quality Management in ASEMA systemFull-text access may be available. Sign in or learn about subscription options.pp. 14
ICSNC 3: Multimedia
End-to-End Differentiation of Congestion and Wireless Losses using a Fuzzy Arithmetic based on Relative EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 15
ICSNC 3: Multimedia
On the Applicability of Remote Rendering of Networked Virtual Environments on Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 16
ICSNC 3: Multimedia
Fast Block Center Weighted Hadamard TransformFull-text access may be available. Sign in or learn about subscription options.pp. 17
ICSNS 4: Security I
Autonomically Improving the Security and Robustness of Structured P2P OverlaysFull-text access may be available. Sign in or learn about subscription options.pp. 18
ICSNS 4: Security I
ASASI: An Environment for Addressing Software Application Security IssuesFull-text access may be available. Sign in or learn about subscription options.pp. 19
ICSNS 4: Security I
Towards Requirement and Modeling Driven Security EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 20
ICSNS 4: Security I
Privacy-Invasive Software and Preventive MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 21
ICSNS 4: Security I
A Real-time Secure Voice Communication System Based on Speech RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 22
ICSNC 5: Security II
Verification of Strict Integrity Policy via Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 23
ICSNC 5: Security II
Security Architecture for Web-based Health Insurance SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 24
ICSNC 5: Security II
Confessible Threshold Ring SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 25
ICSNC 5: Security II
Kleptographic Weaknesses in Benaloh-Tuinstra ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 26
ICSNC 5: Security II
Usage Control Requirements in Mobile and Ubiquitous Computing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 27
ICSNC 6: Sensors I
Neural Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 28
ICSNC 6: Sensors I
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 29
ICSNC 6: Sensors I
Application Development in Vision-Enabled Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 30
ICSNC 6: Sensors I
Topological Hole Detection in Sensor Networks with Cooperative NeighborsFull-text access may be available. Sign in or learn about subscription options.pp. 31
ICSNC 6: Sensors I
Probabilistic-Based Energy Aware Routing for Network Lifetime and Source Level Fairness in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 32
ICSNC 7: Education + Policies
E-Services for an Electronic Education MarketFull-text access may be available. Sign in or learn about subscription options.pp. 33
ICSNC 7: Education + Policies
Components for a pervasive information dissemination architectureFull-text access may be available. Sign in or learn about subscription options.pp. 34
ICSNC 7: Education + Policies
Remote Screen Recording and PlaybackFull-text access may be available. Sign in or learn about subscription options.pp. 35
ICSNC 7: Education + Policies
Jazz Sebastian Bach: A GA System for Music Style ModificationFull-text access may be available. Sign in or learn about subscription options.pp. 36
ICSNC 7: Education + Policies
Forecasting Unstable Policy EnforcementFull-text access may be available. Sign in or learn about subscription options.pp. 37
ICSNC 7: Education + Policies
Beyond the Hype: Policies for Military Network OperationsFull-text access may be available. Sign in or learn about subscription options.pp. 38
ICSNC 7: Education + Policies
A Multi-Layer Ubiquitous Middleware for Bijective Adaptation between Context and Activity in a Mobile and Collaborative learningFull-text access may be available. Sign in or learn about subscription options.pp. 39
ICSNC 8: Sensors II
Security Issues in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 40
ICSNC 8: Sensors II
Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 41
ICSNC 8: Sensors II
Maintaining Coverage by Progressive Crystal-Lattice Permutation in Mobile Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 42
ICSNC 8: Sensors II
Distributed Event Detection in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 43
ICSNC 8: Sensors II
Tracing and Managing hazardous material in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 44
ICSNC 9: Wireless I
A Novel Blind SNR Estimator Based on the Modified PASTd Algorithm for IF SignalsFull-text access may be available. Sign in or learn about subscription options.pp. 45
ICSNC 9: Wireless I
Accelerating VOD Streaming with Adaptive Proxy- Assisted Scheduling, Caching and PatchingFull-text access may be available. Sign in or learn about subscription options.pp. 46
ICSNC 9: Wireless I
Localization with Power Control in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 47
ICSNC 9: Wireless I
Wireless Broadband Internet Access in KoreaFull-text access may be available. Sign in or learn about subscription options.pp. 48
ICSNC 9: Wireless I
Application Programming Interface offering classification services to end-user applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 49
ICSNC 10: Wireless II
A Flexible Weight Based Clustering Algorithm in Mobile Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 50
ICSNC 10: Wireless II
A New Communication Architecture Based on the Spatial Information Field ModelFull-text access may be available. Sign in or learn about subscription options.pp. 51
ICSNC 10: Wireless II
XHTML encoding and compressionFull-text access may be available. Sign in or learn about subscription options.pp. 52
ICSNC 10: Wireless II
A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 53
ICSNC 10: Wireless II
A Novel Bargaining Based Dynamic Spectrum Management Scheme in Reconfigurable SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 54-54
ICSNC 11: Wireless III
Performance Analysis of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 55
ICSNC 11: Wireless III
TCP Based Resource Allocation Method for Base Station Diversity SystemFull-text access may be available. Sign in or learn about subscription options.pp. 56
ICSNC 11: Wireless III
Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LANFull-text access may be available. Sign in or learn about subscription options.pp. 57
ICSNC 11: Wireless III
Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 58
ICSNC 11: Wireless III
A ROD based Fuzzy packet loss differentiating algorithm for TCP in the hybrid wired/wireless networkFull-text access may be available. Sign in or learn about subscription options.pp. 59
ICSNC 12: Wireless IV
Dynamic Cell Coverage Control for Power Saving in IEEE802.16 Mobile MultihopRelay SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 60
ICSNC 12: Wireless IV
Performance Analysis and Evaluation of Bluetooth Networks in Wireless Channel EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 61
ICSNC 12: Wireless IV
Middleware - An Effort towards Making Mobile Applications Platform IndependentFull-text access may be available. Sign in or learn about subscription options.pp. 62
ICSNC 12: Wireless IV
An Energy-Efficient Redundant Nodes Tree Mechanism for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 63
ICNSC 13: Wireless V
A Novel Way of Determining the Optimal Location of a Fragment in a DDBS: BGBRFull-text access may be available. Sign in or learn about subscription options.pp. 64
ICNSC 13: Wireless V
Error Correcting Codes from Modified Butson-Hadamard MatricesFull-text access may be available. Sign in or learn about subscription options.pp. 65
ICNSC 13: Wireless V
Ternary Codes From Modified Hadamard MatricesFull-text access may be available. Sign in or learn about subscription options.pp. 66
ICNSC 13: Wireless V
Codes From Generalized Hadamard MatricesFull-text access may be available. Sign in or learn about subscription options.pp. 67
ICSNC 14: Wireless VI
A Cluster Based Topology Control Algorithm for Wireless Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 68
ICSNC 14: Wireless VI
A Real-Time Study of 802.11b and 802.11gFull-text access may be available. Sign in or learn about subscription options.pp. 69
ICSNC 14: Wireless VI
System capacity in OFDMA-based WiMAXFull-text access may be available. Sign in or learn about subscription options.pp. 70
ICSNC 14: Wireless VI
GPSenseCar -A Collision Avoidance Support System Using Real-Time GPS Data in a Mobile Vehicular NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 71
ICSNC 14: Wireless VI
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 72
Showing 77 out of 77