Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
AINA
AINA 2008
Generate Citations
22nd International Conference on Advanced Information Networking and Applications (aina 2008)
March 25 2008 to March 28 2008
Okinawa
Table of Contents
Papers
Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling Support
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-55
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xvii
Papers
list-reviewer
Freely available from IEEE.
pp. xxxii-xxxiv
Papers
Program Committee
Freely available from IEEE.
pp. xxv-xxxi
Papers
Modeling Differentiated Services-Based QoS in Wormhole-Routed NoCs
Full-text access may be available. Sign in or learn about subscription options.
pp. 942-949
Papers
Resource Efficient TCP: Reducing Contention-Induced Spurious Timeouts in QoS -Aware MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1070-1077
Papers
The Impact of Packet Type on Signal Strength in WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-270
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from General Chair(s)
Freely available from IEEE.
pp. xviii
Papers
Message from Program Chair(s)
Freely available from IEEE.
pp. xix
Papers
Message from the Steering Chair
Freely available from IEEE.
pp. xx-xxi
Papers
Organizing Committee
Freely available from IEEE.
pp. xxii-xxiv
Papers
Synchronization is Coming Back,??But is it the Same?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Michel Raynal
Papers
Cyber Science Infrastructure (CSI) for Promoting Research Activities of Academia and Industries in Japan
Full-text access may be available. Sign in or learn about subscription options.
pp. 11
by
Shigeki Yamada
Papers
A Framework for Modeling B2B Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-19
by
Zakaria Maamar
,
Philippe Thiran
,
Nanjangud C. Narendra
,
Sattanathan Subramanian
Papers
Dynamic Web Service Composition: A New Approach in Building Reliable Web Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-25
by
Pat Pik Wah Chan
,
Michael R. Lyu
Papers
Towards a Better Understanding of Semantic Ontology-Based Home Service Modelling
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-31
by
Julia Kantorovitch
,
Jarmo Kalaoja
,
Ilkka Niskanen
,
Toni Piirainen
Papers
A Distributed Trust Management Based on Authorizing Negotiation in Open and Dynamic Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-39
by
Shangyuan Guan
,
Xiaoshe Dong
,
Weiguo Wu
,
Yiduo Mei
,
Guofu Feng
Papers
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story"
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-47
by
Takumi Yamamoto
,
Atsushi Harada
,
Takeo Isarida
,
Masakatsu Nishigaki
Papers
Wireless Sensor Network-Based Adaptive Vehicle Navigation in Multihop-Relay WiMAX Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-63
by
Ben-Jye Chang
,
Bo-Jhang Huang
,
Ying-Hsin Liang
Papers
Development of Pedestrian-to-Vehicle Communication System Prototype for Pedestrian Safety Using both Wide-Area and Direct Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-69
by
Chika Sugimoto
,
Yasuhisa Nakamura
,
Takuya Hashimoto
Papers
A Peer-to-Peer Approach for Mobile File Transfer in Opportunistic People Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-77
by
Ling-Jyh Chen
,
Ting-Kai Huang
Papers
A Fair Channel Scheduling Algorithm in Optical Burst-Switched Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-83
by
Ching-Fang Hsu
,
Li-Cheng Yang
,
Ke-Kuan Hsu
Papers
Fairness of High-Speed TCP Stacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-92
by
Dimitrios Miras
,
Martin Bateman
,
Saleem Bhatti
Papers
An Analytical Model for Priority-Based AQM in the Presence of Heterogeneous Network Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-99
by
Lan Wang
,
Geyong Min
,
Irfan Awan
Papers
Range Assignment Approximation Based on Steiner Tree in Ad Hoc Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Rashid Bin Muhammad
Papers
A Distributed Algorithm for Finding a Tree Trunk and its Application for Multicast in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-113
by
Yamin Li
,
Shietung Peng
,
Wanming Chu
Papers
Mobile Agents for Service Discovery in Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-121
by
R. Tobias Meier
,
J? Dunkel
,
Yoshiaki Kakuda
,
Tomoyuki Ohta
Papers
Composite Subscription and Matching Algorithm for RFID Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-129
by
Xinchao Zhao
,
Beihong Jin
,
Shuang Yu
,
Zhenyue Long
Papers
Hybrid Logics and Model Checking: A Recipe for Query Processing in Location-Aware Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-137
by
Christian Hoareau
,
Ichiro Satoh
Papers
Enhancing Indoor Positioning Accuracy by Utilizing Signals from Both the Mobile Phone Network and the Wireless Local Area Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-145
by
Junyang Zhou
,
Wilson Man-Chung Yeung
,
Joseph Kee-Yin Ng
Papers
Combine Personal Blog Functionalities with LMS Using Tools Interoperability Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Jui-Hung Chen
,
Timothy K. Shih
,
Chun-Chia Wang
,
Shu-Wei Yeh
,
Chen-Yu Lee
Papers
S2Directory ? A Framework for Object-Directory Mapping with Dynamic Implementation Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Jun Futagawa
,
Shuichi Yukita
Papers
Development and Evaluation of a Collaborative Virtual Environment Supporting Self Feedbacks of Electroencephalogram
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-165
by
Akihiro Miyata
,
Shota Yamamoto
,
Masaki Hayashi
,
Takefumi Hayashi
,
Hiroshi Shigeno
,
Kenichi Okada
Papers
A PPM Prediction Model Based on Stochastic Gradient Descent for Web Prefetching
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-173
by
Zhijie Ban
,
Zhimin Gu
,
Yu Jin
A BAT in the Lab: Experimental Results of New Link State Routing Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-302
by
Makoto Ikeda
,
Giuseppe De Marco
,
Leonard Barolli
,
Makoto Takizawa
Papers
A Multiple Layered Audiovisual Streaming System Using the Two-Phase Synchronization and FGS/BSAC Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-180
by
Chung-Ming Huang
,
Chung-Wei Lin
,
Cheng-Yen Chuang
Papers
A Model for Behavioral Patterns in Web-Based Learning Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-187
by
Chih-Ping Chu
,
Yi-Chun Chang
Papers
A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-195
by
Julien Haillot
,
Frederic Guidec
Papers
A Quorum-Based Route Cache Maintenance Protocol for Mobile Ad-Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-203
by
Gwo-Jong Yu
Papers
PACONET: imProved??Ant Colony Optimization Routing Algorithm for Mobile Ad Hoc NETworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-211
by
Eseosa Osagie
,
Parimala Thulasiraman
,
Ruppa K. Thulasiram
Papers
Resource Placement in the Edge Product of Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-218
by
Paria Moinzadeh
,
Hamid Sarbazi-Azad
Papers
Efficient Synchronization in Message Passing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-226
by
Gurdip Singh
,
Ye Su
Papers
Near Optimal Broadcasting in Optimal Triple Loop Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-233
by
Hovhannes A. Harutyunyan
,
Edward Maraachlian
Evaluation of the Processing Workload for Two Models of Communication Control in IP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-354
by
Kazuya Odagiri
,
Giuseppe De Marco
,
Nao Tanoue
,
Rihito Yaegashi
,
Masaharu Tadauchi
,
Naohiro Ishii
Papers
Analysis of User Mobility Effects on Packet Level Performances in Next Generation Mobile Communication Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-240
by
Furong Wang
,
Yasha Liu
,
Lai Tu
,
Peng Zhang
Papers
Analysis of Queueing Property for Self-Similar Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-248
by
Takuo Nakashima
,
Toshinori Sueyoshi
Papers
Performance Analysis of an Efficient Flow Control Mechanism with Job Threshold in InfiniBand Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-256
by
Shihang Yan
,
Irfan Awan
,
Geyong Min
Papers
A Context Transfer Mechanism for IEEE 802.11r in the Centralized Wireless LAN Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-263
by
Chung-Ming Huang
,
Jian-Wei Li
Papers
A Cross-Layer Fine-Tuning Scheduling Scheme to Provide Proportional Delay Differentiation in a Wireless LAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-278
by
Yuan Cheng Lai
,
Arthur Chang
,
Ching-Neng Lai
,
Chih-Chung Lin
Papers
An Effort to Understand the Optimal Routing Performance in Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-286
by
Qinghua Wang
,
Tingting Zhang
,
Stefan Pettersson
Papers
Performance Evaluation of the SERENA Algorithm to SchEdule RoutEr Nodes Activity in Wireless Ad Hoc and Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-294
by
Saoucene Mahfoudh
,
Pascale Minet
Papers
Supporting Live Video on Ad Hoc Wireless Networks: Unbalanced Multiple Description Coding, Single Path Transport and Recursive Error Concealment
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-310
by
Feng Huang
,
Lifeng Sun
,
Bin Li
,
Yuzhuo Zhong
Papers
Joint Quality and Rate Adaptation Scheme for Wireless Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-318
by
Sunhun Lee
,
Kwangsue Chung
Papers
Cross Layer Protocol Support for Live Streaming Media
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-326
by
Syed Hasan
,
Laurent Lefevre
,
Zhiyi Huang
,
Paul Werstein
Papers
Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-333
by
Hung Yu Chien
,
Rung-Ching Chen
,
Annie Shen
Papers
A Certificateless Signature and Group Signature Schemes against Malicious PKG
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-341
by
Guoyan Zhang
,
Shaohui Wang
Papers
Enhancing the Security Promise of a Digital Time-Stamp
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-347
by
Pei-yih Ting
,
Fang-dar Chu
Papers
Delay Restraining of Combined Multiple Input Cross Core Router
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-362
by
Osama Al-Jaber
,
L. Guan
,
X.G. Wang
,
Irfan Awan
,
A. Grigg
,
X. Chi
Papers
On-Line Burst Header Scheduling in Optical Burst Switching Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-369
by
Jian Lin
,
Yuhua Chen
,
A.M.K. Cheng
Papers
A Ubiquitous Supervisory System Based on Social Context Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-377
by
Takuo Suganuma
,
Kazuhiro Yamanaka
,
Yoshikazu Tokairin
,
Hideyuki Takahashi
,
Norio Shiratori
Papers
Dynamic Web Services on a Home Service Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 378-385
by
Andr? Bottaro
,
Eric Simon
,
St?phane Seyvoz
,
Anne G?rodolle
Papers
Performance Evaluation of Trust Management in Pervasive Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-394
by
Tao Sun
,
Mieso K. Denko
Papers
Flexible Address Configurations for Tree-Based ZigBee/IEEE 802.15.4 Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-402
by
Li-Hsing Yen
,
Wei-Ting Tsai
Papers
Study on Backoff Algorithm for IEEE 802.15.4 LR-WPAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 403-409
by
Bih-Hwang Lee
,
Huai-Kuei Wu
Papers
RMC: An Energy-Aware Cross-Layer Data-Gathering Protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-417
by
Khaled Almi?ani
,
S. Selvakennedy
,
Anastasios Viglas
Papers
Performance Analysis of Data Delivery Schemes for a Multi-Sink Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 418-425
by
Hwee-Pink Tan
,
Adriana F. Gabor
,
Winston K.G. Seah
,
Pius W.Q. Lee
Papers
On Improving WLAN Medium Access Control via Uniform Transmission Cycle and Performance Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 426-432
by
Warakorn Srichavengsup
,
Siwaruk Siwamogsatham
,
Suvit Nakpeerayuth
,
Lunchakorn Wuttisittikulkij
Papers
Multiple-Resource Request Scheduling for Differentiated QoS at Website Gateway
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-440
by
Ying-Dar Lin
,
Ching-Ming Tien
,
Shih-Chiang Tsao
,
Ruo-Hua Feng
,
Yuan-Cheng Lai
Papers
Reasoning and Merging in XML Data Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 441-448
by
Zijing Tan
,
Wei Wang
,
Baile Shi
Papers
Intelligent Dynamic XML Documents Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 449-456
by
Laura Irina Rusu
,
Wenny Rahayu
,
David Taniar
Papers
A Learning Content Adaptation Tool with Templates for Different Handhelds
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-463
by
Hsuan-Pu Chang
,
Jason C. Hung
,
Chun-Chia Wang
,
Meng-Ting Weng
,
Timothy K. Shih
,
Chen-Yu Lee
Papers
Seamless QoS Guarantees in Mobile Internet Using NSIS with Advance Resource Reservation
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-471
by
Sooyong Lee
,
Myungchul Kim
,
Kyounghee Lee
,
Soonuk Seol
,
Gabsoo Lee
Papers
A Channel Quality and QoS Aware Bandwidth Allocation Algorithm for IEEE 802.16 Base Stations
Full-text access may be available. Sign in or learn about subscription options.
pp. 472-479
by
Yuan-Cheng Lai
,
Yen-Hung Chen
Papers
Parameter Estimation for MIMO Systems with Multiple Frequency Offsets
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-485
by
Wei Dong
,
Jiandong Li
,
Zhuo Lu
Papers
Document History System and its Application to Abnormal Document Access Pattern Detection with a Probabilistic Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-493
by
Wenxing Peng
,
Taro Terao
,
Yoshihiro Masuda
,
Naofumi Yoshida
,
Jun Miyazaki
Papers
Classification Model Learning for Bulletin Board Site Analysis Based on Unbalanced Textual Examples
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-501
by
Shigeaki Sakurai
,
Ryohei Orihara
Papers
A New Remote Camera Work System for Teleconference Using a Combination of Omni-Directional and Network Controlled Cameras
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-508
by
Yousuke Sato
,
Koji Hashimoto
,
Yoshitaka Shibata
Papers
Distributed Access Scheduling Algorithms in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 509-516
by
Hongju Cheng
,
Naixue Xiong
,
Laurence T. Yang
Papers
Non-Uniform Node Deployment for Lifetime Extension in Large-Scale Randomly Distributed Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-524
by
Yuh-Ren Tsai
,
Kai-Jie Yang
,
Sz-Yi Yeh
Papers
Load Sharing Topology Control Protocol for Harsh Environments in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-530
by
Hsu-Yang Kung
,
Chung-Ming Huang
,
Hao-Hsiang Ku
,
Yen-Ju Tung
Papers
A Distributed Coordination Protocol for Multiple Peer Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-538
by
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Papers
UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent
Full-text access may be available. Sign in or learn about subscription options.
pp. 539-545
by
Wei Li
,
Shanzhi Chen
,
Tao Yu
Papers
Optimal Resource Discovery Paths of Gnutella2
Full-text access may be available. Sign in or learn about subscription options.
pp. 546-553
by
Mikko Vapa
,
Annemari Auvinen
,
Yevgeniy Ivanchenko
,
Niko Kotilainen
,
Jarkko Vuori
Papers
A New Dynamic Wavelength Assignment Scheme in Wavelength-Convertible WBS Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 554-559
by
Ching-Fang Hsu
,
Fang-Sheng Lin
,
Ke-Kuan Hsu
Papers
A Hybrid Design Framework for Video Streaming in IEEE 802.11e Wireless Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 560-567
by
Hung-Chin Jang
,
Yu-Ti Su
Papers
Performance Analysis and Industrial Practice of Peer-Assisted Content Distribution Network for Large-Scale Live Video Streaming
Full-text access may be available. Sign in or learn about subscription options.
pp. 568-574
by
Xuening Liu
,
Hao Yin
,
Chuang Lin
,
Yu Liu
,
Zhijia Chen
,
Xin Xiao
Papers
Fortification of IT Security by Automatic Security Advisory Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 575-582
by
Stefan Fenz
,
Andreas Ekelhart
,
Edgar Weippl
Papers
SRPTES: A Secure Routing Protocol Based on Token Escrow Set for Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 583-589
by
Chen Huang
,
Benxiong Huang
,
Yijun Mo
,
Jianhua Ma
Papers
A Concept of an Anonymous Direct P2P Distribution Overlay System
Full-text access may be available. Sign in or learn about subscription options.
pp. 590-597
by
Igor Margasinski
,
Michal Pioro
Papers
A Method of Visualizing Inter-Module Relations to Support Reuse-Based Embedded Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 598-605
by
Hidetoshi Kambe
,
Hiroko Nagamatsu
,
Hiroyasu Mitsui
,
Hisao Koizumi
,
Jun Sawamoto
Papers
Hybrid Stealthy Communication Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 606-611
by
Arjan Durresi
,
Vamsi Paruchuri
,
Leonard Barolli
Papers
Senceive: A Middleware for a Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 612-619
by
Christian Hermann
,
Waltenegus Dargie
Papers
Parameterless Broadcasting in Static to Highly Mobile Wireless Ad Hoc, Sensor and Actuator Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 620-627
by
Adnan Afsar Khan
,
Ivan Stojmenovic
,
Nejib Zaguia
Papers
A Fault Inference Mechanism in Sensor Networks Using Markov Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 628-635
by
Elhadi Shakshuki
,
Xinyu Xing
Papers
SQUARE: A New TCP Variant for Future High Speed and Long Delay Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 636-643
by
Yansheng Qu
,
Junzhou Luo
,
Wei Li
,
Bo Liu
,
Laurence T. Yang
Papers
An Active Storage System for High Performance Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 644-651
by
Yu Zhang
,
Dan Feng
Papers
Efficient Scheduling Schemes for Sabotage-Tolerance in Volunteer Computing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 652-658
by
Son Hong Ngo
,
Masaru Fukushi
,
Xiaohong Jiang
,
Susumu Horiguchi
Showing 100 out of 159
Load More
Load All