Default Cover Image

2009 International Conference on Network-Based Information Systems

Aug. 19 2009 to Aug. 21 2009

Indianapolis, Indiana

ISBN: 978-0-7695-3767-2

Table of Contents

Papers
Conference InformationFreely available from IEEE.pp. xiii-xxvii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Parameter Tuning of JXTA-Based P2P PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 97-102
Papers
Evaluation of Purpose Mark Releasing Protocol for Purpose-based Marking (PM) ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Timeliness and QoS Aware Packet Scheduling for Next Generation NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Papers
A Proactive Fault Resilient Overlay Multicast for Media StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 17-23
Papers
Enhancing Simulation Mode Operation of ospfdFull-text access may be available. Sign in or learn about subscription options.pp. 24-28
Papers
Consistency Based Approach for Agreement Achievement among PeersFull-text access may be available. Sign in or learn about subscription options.pp. 29-36
Papers
Minimizing Power Consumption with Performance Efficiency Constraint in Web Server ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 45-51
Papers
A Selective Update Propagation Based on Degree of Data Update in Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 52-59
Papers
A Semantic P2P Overlay Network for Web Service DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 60-66
Papers
Pervasive Scene Map on Wireless Devices for City NavigationFull-text access may be available. Sign in or learn about subscription options.pp. 75-82
Papers
A Mobile Graphics System for Ubiquitous EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 83-90
Papers
The Complexity of Context in Mobile Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 91-96
Papers
Towards Scalable Simulation of Large Scale Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Papers
HAP - A Heterogeneous Ad hoc ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Papers
Design and Implementation of Energy-Efficient and Secure Framework for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Papers
A Survey on Bandwidth Resource Allocation and Scheduling in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 121-128
Papers
Energy Aware Adaptive Clustering for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 129-135
Papers
An Agent Based Layered Framework to Facilitate Intelligent Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 136-141
Papers
Per-Connection Return Routability Test in Mobile IPv6Full-text access may be available. Sign in or learn about subscription options.pp. 142-146
Papers
A Survey of Internet MobilityFull-text access may be available. Sign in or learn about subscription options.pp. 147-154
Papers
H-WSNMS: A Web-Based Heterogeneous Wireless Sensor Networks Management System ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 155-162
Papers
Event Coverage in Sparse Mobile Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 163-170
Papers
A Mobile Personalized RFID SystemFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
Papers
An Implementation of Traffic Light System Using Multi-hop Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 177-181
Papers
A Context-Aware Framework to Enable Adaptation in Pervasive Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 182-187
Papers
A Survey of Security Middleware for Pervasive and Ubiquitous SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 188-193
Papers
A Referral Approach to Finding Medical Informatics ReviewersFull-text access may be available. Sign in or learn about subscription options.pp. 194-199
Papers
Hypotheses Generation Pertaining to Ayurveda Using Automated Vocabulary Generation and Transitive Text MiningFull-text access may be available. Sign in or learn about subscription options.pp. 200-205
Papers
Non-exhaustive Learning for Bacteria DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 206-211
Papers
A Security Framework for JXTA-OverlayFull-text access may be available. Sign in or learn about subscription options.pp. 212-219
Papers
SRJE: Decentralized Authentication Scheme against Sybil AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Papers
Reasonable Security by Effective Risk Management Practices: From Theory to PracticeFull-text access may be available. Sign in or learn about subscription options.pp. 226-233
Papers
Multicasting Key Management in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 234-239
Papers
A Membership-Oriented Group Key Management for Application ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 240-245
Papers
An Attack-Resilient Channel Assignment MAC ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 246-253
Papers
SSL Connection Failover in Web Clusters and its EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 254-259
Papers
Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
Papers
Embedded Soft Processor for Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 268-272
Papers
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric ComparisonFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
Papers
An Indirect Proactive Handoff Scheme Using Location InformationFull-text access may be available. Sign in or learn about subscription options.pp. 279-285
Papers
Toward Ontology-Driven Omics Data Integration in Current Database Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Papers
Bridging Text Mining and Bayesian NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
Papers
Visualizing a Correlative Multi-level Graph of Biology Entity InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 304-309
Papers
Privacy Preserving Portable Health Record (P^3HR)Full-text access may be available. Sign in or learn about subscription options.pp. 310-315
Papers
Secure Routing and Broadcast Authentication in Heterogeneous Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 316-320
Papers
Orthogonal Expansion of Port-scanning PacketsFull-text access may be available. Sign in or learn about subscription options.pp. 321-326
Papers
Performance Evaluation of a MANET Tested for Different TopologiesFull-text access may be available. Sign in or learn about subscription options.pp. 327-334
Papers
Disjointed Conflict Free Address Auto-Configuration for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 343-349
Papers
Investigation and Implementation of Border Nodes in S-MACFull-text access may be available. Sign in or learn about subscription options.pp. 350-357
Papers
A Textbook Editor Based on a Customware ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 358-363
Papers
Development of Web Counseling SystemFull-text access may be available. Sign in or learn about subscription options.pp. 370-375
Papers
Angular Mobility Assisted Coverage in Directional Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 376-379
Papers
Applying the Service-Oriented Architecture for Network Discovery and Selection in the Next Generation Wireless Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 380-385
Papers
LITS: Lightweight Intelligent Traffic SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 386-390
Papers
Web-Disk-Based Efficient Application Delivery Method for GridsFull-text access may be available. Sign in or learn about subscription options.pp. 391-397
Papers
Analysis of Web Alert ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 398-403
Papers
A Middleware Architecture for Web Information ReuseFull-text access may be available. Sign in or learn about subscription options.pp. 404-409
Papers
Genetic Algorithm for QoS-Aware Web Service Selection Based on Chaotic SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 410-416
Papers
Multiple Micro Virtual Disks for Constructing Large-scale StorageFull-text access may be available. Sign in or learn about subscription options.pp. 417-423
Papers
Energy-Efficient Computation Models for Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 424-431
Papers
A Log Management System for Internal ControlFull-text access may be available. Sign in or learn about subscription options.pp. 432-439
Papers
Evaluation of Stateful Reliability Counter in Small-World Cellular Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 440-445
Papers
Run-time Updating of Network Device DriversFull-text access may be available. Sign in or learn about subscription options.pp. 446-450
Papers
Combining N-ary RAID to RAID MPFull-text access may be available. Sign in or learn about subscription options.pp. 451-456
Papers
Applied System of the Social Life Log for Ecological Lifestyle in the HomeFull-text access may be available. Sign in or learn about subscription options.pp. 457-462
Papers
A Conceptual Framework for Modelling Service Value Creation NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 463-468
Papers
The Concept of Web Service Versioning in ProvenanceFull-text access may be available. Sign in or learn about subscription options.pp. 469-474
Papers
Astro-WISE: Tracing and Using Lineage for Scientific Data ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 475-480
Papers
A Multi-Tier Provenance Model for Global Climate ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 481-486
Papers
Supporting Data Regeneration in Integrated Rule Based Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 487-491
Papers
Motion Generation System Using Interactive Evolutionary Computation and Signal ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 492-498
Papers
Selection of Relevant Parameters Based on ConflictFull-text access may be available. Sign in or learn about subscription options.pp. 499-504
Papers
Multiresolution Learning on Neural Network Classifiers: A Systematic ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 505-511
Papers
Balls Hierarchy: A Proximity Query for Metric Spaces and Covering TheoremFull-text access may be available. Sign in or learn about subscription options.pp. 512-518
Study on Realistic Communication Technology with Tiled Displays WallFull-text access may be available. Sign in or learn about subscription options.pp. 612-617
Papers
A Fuzzy Inference Model for Risk based Informed Decision-Making in e-BusinessFull-text access may be available. Sign in or learn about subscription options.pp. 519-524
Papers
Real-Time Public Group Collaboration using IP Multicast Label FiltersFull-text access may be available. Sign in or learn about subscription options.pp. 525-531
Papers
[Publisher's information]Freely available from IEEE.pp. 626
Papers
Self-stabilized Flocking of a Group of Mobile Robots under Memory CorruptionFull-text access may be available. Sign in or learn about subscription options.pp. 532-538
Papers
A Client-Server Architecture for Context-Aware Search ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 539-546
Papers
A Configuration Method for Structured P2P Overlay Network Considering Delay VariationsFull-text access may be available. Sign in or learn about subscription options.pp. 547-552
Papers
Community Based P2P Video Streaming Service by Networked Consumer ElectronicsFull-text access may be available. Sign in or learn about subscription options.pp. 553-558
Papers
Locals Search Algorithms for Efficient Router Nodes Placement in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 572-579
Papers
A New Method for Improving MAC Level Broadcast Receive Ratio Using 2-Phase RTS/CTS Handshakes SequenceFull-text access may be available. Sign in or learn about subscription options.pp. 580-585
Papers
Challenges in the Development of Mobile Applications in Industrial Field ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 586-591
Papers
Power Saving Cognitive Radio LANs for Disaster InformationFull-text access may be available. Sign in or learn about subscription options.pp. 592-596
Papers
Reducing Total Energy Consumption with Collaboration between Network and End SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 603-607
Showing 100 out of 103