Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NBIS
NBIS 2009
Generate Citations
2009 International Conference on Network-Based Information Systems
Aug. 19 2009 to Aug. 21 2009
Indianapolis, Indiana
ISBN: 978-0-7695-3767-2
Table of Contents
Papers
Conference Information
Freely available from IEEE.
pp. xiii-xxvii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Parameter Tuning of JXTA-Based P2P Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-102
by
Fatos Xhafa
,
Zorion Arrizabalaga
,
Jordi Misse Bertran
,
Leonard Barolli
Papers
Evaluation of Purpose Mark Releasing Protocol for Purpose-based Marking (PM) Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tomoya Enokido
,
Makoto Takizawa
Papers
Timeliness and QoS Aware Packet Scheduling for Next Generation Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Yao-Nan Lien
,
Yung-Chuan Wun
Papers
A Proactive Fault Resilient Overlay Multicast for Media Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-23
by
Bhed Bahadur Bista
Papers
Enhancing Simulation Mode Operation of ospfd
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-28
by
Weigao Xie
,
Balaji Polepalli
,
Mukul Goyal
,
Hossein Hosseini
Papers
Consistency Based Approach for Agreement Achievement among Peers
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-36
by
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Papers
Experimental Results and Evaluation of SmartBox Stimulation Device in a P2P E-learning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Keita Matsuo
,
Leonard Barolli
,
Joan Arnedo-Moreno
,
Fatos Xhafa
,
Akio Koyama
,
Arjan Durresi
Papers
Minimizing Power Consumption with Performance Efficiency Constraint in Web Server Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-51
by
Yan Yang
,
Naixue Xiong
,
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Papers
A Selective Update Propagation Based on Degree of Data Update in Peer-to-Peer Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-59
by
Toshiki Watanabe
,
Akimitsu Kanzaki
,
Takahiro Hara
,
Shojiro Nishio
Papers
A Semantic P2P Overlay Network for Web Service Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-66
by
Mario Bisignano
,
Giuseppe Di Modica
,
Orazio Tomarchio
Papers
Improvement of a Worker's Motion Trace System Using a Terrestrial Magnetism Sensor
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-74
by
Nobuyoshi Sato
,
Toshihiro Takahashi
,
Akira Tajima
,
Shouichi Odashima
,
Jun Suzuki
,
Taiji Ishikawa
,
Yoshitoshi Murata
Papers
Pervasive Scene Map on Wireless Devices for City Navigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-82
by
Jiang Yu Zheng
,
Bing Zheng
,
Hongyuan Cai
Papers
A Mobile Graphics System for Ubiquitous Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-90
by
Hiroaki Nishino
,
Tsuneo Kagawa
,
Kouichi Utsumiya
Papers
The Complexity of Context in Mobile Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-96
by
Philip Moore
Papers
Towards Scalable Simulation of Large Scale Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-108
by
Ciprian Dobre
,
Florin Pop
,
Valentin Cristea
Papers
HAP - A Heterogeneous Ad hoc Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-114
by
Arta Doci
,
Leonard Barolli
,
Fatos Xhafa
Papers
Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-120
by
Eui-Jik Kim
,
Jeongsik In
,
Taeshik Shon
,
Yongsuk Park
,
Bong Wan Jun
Papers
A Survey on Bandwidth Resource Allocation and Scheduling in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-128
by
Mangesh Chitnis
,
Paolo Pagano
,
Giuseppe Lipari
,
Yao Liang
Papers
Energy Aware Adaptive Clustering for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-135
by
Fuad Bajaber
,
Irfan Awan
Papers
An Agent Based Layered Framework to Facilitate Intelligent Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-141
by
Hanh Le
,
André Scholtz
,
Anet Potgieter
Papers
Per-Connection Return Routability Test in Mobile IPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-146
by
Hengky Susanto
,
Byung-Guk Kim
Papers
A Survey of Internet Mobility
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-154
by
Ping Zhang
,
Arjan Durresi
,
Leonard Barolli
Papers
H-WSNMS: A Web-Based Heterogeneous Wireless Sensor Networks Management System Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-162
by
Wei Zhao
,
Yao Liang
,
Qun Yu
,
Yan Sui
Papers
Event Coverage in Sparse Mobile Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-170
by
Mark Snyder
,
Sriram Chellappan
Papers
A Mobile Personalized RFID System
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-176
by
Ruay-Shiung Chang
,
Jih-Sheng Chang
,
Jiing-Hsing Ruey
Papers
An Implementation of Traffic Light System Using Multi-hop Ad hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-181
by
Imran Shafique Ansari
Papers
A Context-Aware Framework to Enable Adaptation in Pervasive Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-187
by
Apostolos Malatras
,
Béat Hirsbrunner
Papers
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-193
by
Jameela Al-Jaroodi
,
Alyaziyah Al-Dhaheri
,
Fatmah Al-Abdouli
,
Nader Mohamed
Papers
A Referral Approach to Finding Medical Informatics Reviewers
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-199
by
Weimao Ke
,
Javed Mostafa
Papers
Hypotheses Generation Pertaining to Ayurveda Using Automated Vocabulary Generation and Transitive Text Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Harsha Gopal Goud Vaka
,
Snehasis Mukhopadhyay
Papers
Non-exhaustive Learning for Bacteria Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-211
by
Ferit Akova
,
Daniel Hirleman
,
Arun K. Bhunia
,
Bartek Rajwa
,
M. Murat Dundar
Papers
A Security Framework for JXTA-Overlay
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-219
by
Joan Arnedo-Moreno
,
Keita Matsuo
,
Leonard Barolli
,
Fatos Xhafa
Papers
SRJE: Decentralized Authentication Scheme against Sybil Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-225
by
Yo Mashimo
,
Masanori Yasutomi
,
Hiroshi Shigeno
Papers
Reasonable Security by Effective Risk Management Practices: From Theory to Practice
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-233
by
Solange Ghernouti-Hélie
,
David Simms
,
Igli Tashi
Papers
Multicasting Key Management in Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-239
by
Yiling Wang
,
Huy Hoang Ngo
,
Phu Dung Le
,
Balasubramaniam Srinivasan
,
Vishv Malhotra
Papers
A Membership-Oriented Group Key Management for Application Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-245
by
Huy Hoang Ngo
,
Yiling Wang
,
Phu Dung Le
,
Balasubramaniam Srinivasan
,
Vishv Malhotra
Papers
An Attack-Resilient Channel Assignment MAC Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-253
by
Wanyu Zang
,
Qijun Gu
,
Meng Yu
,
Peng Liu
Papers
SSL Connection Failover in Web Clusters and its Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-259
by
Satoshi Shimazaki
,
Takamichi Saito
Papers
Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-267
by
Zeeshan Bilal
,
Ashraf Masood
,
Firdous Kausar
Papers
Embedded Soft Processor for Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-272
by
Ali Elkateeb
,
Aiyappa Mandepanda
Papers
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-278
by
Ambarish Karole
,
Nitesh Saxena
Papers
An Indirect Proactive Handoff Scheme Using Location Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-285
by
M. Mansour
,
Abdulaziz Almazyad
Papers
Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
by
Glenford Mapp
,
Fatema Shaikh
,
Mahdi Aiash
,
Renata Porto Vanni
,
Mario Augusto
,
Edson Moreira
Papers
Toward Ontology-Driven Omics Data Integration in Current Database Management Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
John A. Springer
,
Jake Y. Chen
Papers
Bridging Text Mining and Bayesian Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-303
by
Sandeep Raghuram
,
Yuni Xia
,
Mathew Palakal
,
Josette Jones
,
Dave Pecenka
,
Eric Tinsley
,
Jean Bandos
,
Jerry Geesaman
Papers
Visualizing a Correlative Multi-level Graph of Biology Entity Interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-309
by
Qian You
,
Shiaofen Fang
,
Snehasis Mukhopadhyay
,
Harsha Gopal Goud Vaka
,
Jake Chen
Papers
Privacy Preserving Portable Health Record (P^3HR)
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-315
by
Pavan Roy Marupally
,
Vamsi Paruchuri
,
Sriram Chellappan
Papers
Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-320
by
Aasma Abid
,
Mukhtar Hussain
,
Firdous Kausar
Papers
Orthogonal Expansion of Port-scanning Packets
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-326
by
Hiroaki Kikuchi
,
Tomohiro Kobori
,
Masato Terada
Papers
Performance Evaluation of a MANET Tested for Different Topologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-334
by
Makoto Ikeda
,
Leonard Barolli
,
Masahiro Hiyama
,
Tao Yang
,
Giuseppe De Marco
,
Arjan Durresi
Papers
Performance Analysis of OLSR Protocol for Wireless Sensor Networks and Comparison Evaluation with AODV Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-342
by
Tao Yang
,
Leonard Barolli
,
Makoto Ikeda
,
Fatos Xhafa
,
Arjan Durresi
Papers
Disjointed Conflict Free Address Auto-Configuration for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-349
by
Sudath Indrasinghe
,
Rubem Pereira
,
John Haggerty
Papers
Investigation and Implementation of Border Nodes in S-MAC
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-357
by
Elhadi M. Shakshuki
,
Tarek R. Sheltami
,
Haroon Malik
,
Chuoxian Yang
Papers
A Textbook Editor Based on a Customware Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-363
by
Tokuro Matsuo
,
Dzulqarnain Nasir
,
Takayuki Fujimoto
Papers
A Proposal and Trial on a Model of a Motion Monitor System for a Ski Jumper Using Terrestrial Magnetism and Acceleration Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-369
by
Masaki Oikawa
,
Nobuyoshi Sato
,
Yoshitoshi Murata
Papers
Development of Web Counseling System
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-375
by
Yasunori Shiono
,
Takaaki Goto
,
Tetsuro Nishino
,
Chieko Kato
,
Kensei Tsuchida
Papers
Angular Mobility Assisted Coverage in Directional Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-379
by
Cyriac Kandoth
,
Sriram Chellappan
Papers
Applying the Service-Oriented Architecture for Network Discovery and Selection in the Next Generation Wireless Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-385
by
Qiang Duan
Papers
LITS: Lightweight Intelligent Traffic Simulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-390
by
Thomas Winters
,
Matthew Johnson
,
Vamsi Paruchuri
Papers
Web-Disk-Based Efficient Application Delivery Method for Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-397
by
Kenichi Tanaka
,
Minoru Uehara
,
Makoto Murakami
,
Motoi Yamagiwa
Papers
Analysis of Web Alert Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-403
by
Jameela Al-Jaroodi
,
Nader Mohamed
Papers
A Middleware Architecture for Web Information Reuse
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-409
by
Nader Mohamed
,
Jameela Al-Jaroodi
Papers
Genetic Algorithm for QoS-Aware Web Service Selection Based on Chaotic Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-416
by
Chengwen Zhang
,
Yue Ma
Papers
Multiple Micro Virtual Disks for Constructing Large-scale Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-423
by
Minoru Uehara
Papers
Energy-Efficient Computation Models for Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-431
by
Ailixier Aikebaier
,
Yan Yang
,
Tomoya Enokido
,
Makoto Takizawa
Papers
A Log Management System for Internal Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-439
by
Akihiro Tomono
,
Minoru Uehara
,
Makoto Murakami
,
Motoi Yamagiwa
Papers
Evaluation of Stateful Reliability Counter in Small-World Cellular Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-445
by
Katsuyoshi Matsumoto
,
Minoru Uehara
,
Hideki Mori
Papers
Run-time Updating of Network Device Drivers
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-450
by
Hiroyuki Tanaka
,
Yoshinari Nomura
,
Hideo Taniguchi
Papers
Combining N-ary RAID to RAID MP
Full-text access may be available. Sign in or learn about subscription options.
pp. 451-456
by
Minoru Uehara
Papers
Applied System of the Social Life Log for Ecological Lifestyle in the Home
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-462
by
Motoi Yamagiwa
,
Minoru Uehara
,
Makoto Murakami
Papers
A Conceptual Framework for Modelling Service Value Creation Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 463-468
by
Thang Le Dinh
,
Michel Léonard
Papers
The Concept of Web Service Versioning in Provenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 469-474
by
Dayang Hanani Abang Ibrahim
Papers
Astro-WISE: Tracing and Using Lineage for Scientific Data Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 475-480
by
Johnson Mwebaze
,
Danny Boxhoorn
,
Edwin Valentijn
Papers
A Multi-Tier Provenance Model for Global Climate Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-486
by
Eric Stephan
,
Todd Halter
,
Tara Gibson
,
Nathaniel Beagley
,
Karen Schuchardt
Papers
Supporting Data Regeneration in Integrated Rule Based Storage System
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-491
by
Maria Indrawan
,
Minh Vuong
Papers
Motion Generation System Using Interactive Evolutionary Computation and Signal Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-498
by
Yuki Wakayama
,
Shigeru Takano
,
Yoshihiro Okada
,
Hiroaki Nishino
Papers
Selection of Relevant Parameters Based on Conflict
Full-text access may be available. Sign in or learn about subscription options.
pp. 499-504
by
Mourad Benkaci
,
A. Doncescu
,
Nabil Kabbaj
Papers
Multiresolution Learning on Neural Network Classifiers: A Systematic Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-511
by
Qifeng Lu
,
Yao Liang
Papers
Balls Hierarchy: A Proximity Query for Metric Spaces and Covering Theorem
Full-text access may be available. Sign in or learn about subscription options.
pp. 512-518
by
Sinan Kockara
Study on Realistic Communication Technology with Tiled Displays Wall
Full-text access may be available. Sign in or learn about subscription options.
pp. 612-617
by
Yasuo Ebara
,
Yoshitaka Shibata
Papers
A Fuzzy Inference Model for Risk based Informed Decision-Making in e-Business
Full-text access may be available. Sign in or learn about subscription options.
pp. 519-524
by
Omar Hussain
,
Tharam Dillon
,
Elizabeth Chang
,
Farookh Hussain
Papers
Real-Time Public Group Collaboration using IP Multicast Label Filters
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-531
by
Jaipal Singh
,
Prakash Veeraraghavan
,
Samar Singh
,
Vidyasagar Potdar
Papers
[Publisher's information]
Freely available from IEEE.
pp. 626
Papers
Self-stabilized Flocking of a Group of Mobile Robots under Memory Corruption
Full-text access may be available. Sign in or learn about subscription options.
pp. 532-538
by
Yan Yang
,
Xavier Défago
,
Makoto Takizawa
Papers
A Client-Server Architecture for Context-Aware Search Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 539-546
by
Feng Gui
,
Magno Guillen
,
Naphtali Rishe
,
Armando Barreto
,
Jean Andrian
,
Malek Adjouadi
Papers
A Configuration Method for Structured P2P Overlay Network Considering Delay Variations
Full-text access may be available. Sign in or learn about subscription options.
pp. 547-552
by
Tomoya Kitani
,
Yoshitaka Nakamura
Papers
Community Based P2P Video Streaming Service by Networked Consumer Electronics
Full-text access may be available. Sign in or learn about subscription options.
pp. 553-558
by
Yasuhiro Kawano
,
Koji Hashimoto
,
Yoshitaka Shibata
Papers
A Method for Syncronous Transmissions with Exposing Terminal on the Basis of Overheating RTS Header Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 559-563
by
Tetsuya Shigeyasu
,
Hiyuu Shimizu
,
Hiroshi Matsuno
,
Norihiko Morinaga
Papers
A Comparison Study of Two Fuzzy-Based Handover Systems for Avoiding Ping-Pong Effect in Wireless Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 564-571
by
Gjergji Mino
,
Leonard Barolli
,
Arjan Durresi
,
Fatos Xhafa
,
Akio Koyama
Papers
Locals Search Algorithms for Efficient Router Nodes Placement in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 572-579
by
Fatos Xhafa
,
Christian Sánchez
,
Leonard Barolli
Papers
A New Method for Improving MAC Level Broadcast Receive Ratio Using 2-Phase RTS/CTS Handshakes Sequence
Full-text access may be available. Sign in or learn about subscription options.
pp. 580-585
by
Tetsuya Shigeyasu
,
Hiroshi Matsuno
,
Norihiko Morinaga
Papers
Challenges in the Development of Mobile Applications in Industrial Field Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 586-591
by
Markus Aleksy
,
Bernd Stieger
Papers
Power Saving Cognitive Radio LANs for Disaster Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 592-596
by
Goshi Sato
,
Noriki Uchida
,
Daisuke Asahizawa
,
Yoshitaka Shibata
Papers
Processing of Low Level Signals in Mixed Signal Environment - A Hardware Design for Better Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 597-602
by
Atif Sharif
,
Rana Fayyaz Ahmad
,
Malaya Nath
,
Vidyasagar M. Potdar
,
Jaipal Singh
,
Yan Yang
Papers
Reducing Total Energy Consumption with Collaboration between Network and End Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 603-607
by
Kenichi Hatakeyama
,
Yasunori Osana
,
Shin-ichi Kuribayashi
Showing 100 out of 103
Load More
Load All