Default Cover Image

22nd International Conference on Advanced Information Networking and Applications (aina 2008)

March 25 2008 to March 28 2008

Okinawa

Table of Contents

Papers
Extension of a Methodology for Risk-Aware Business Process Modeling and Simulation Enabling Process-Oriented Incident Handling SupportFull-text access may be available. Sign in or learn about subscription options.pp. 48-55
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xvii
Papers
list-reviewerFreely available from IEEE.pp. xxxii-xxxiv
Papers
Program CommitteeFreely available from IEEE.pp. xxv-xxxi
Papers
Modeling Differentiated Services-Based QoS in Wormhole-Routed NoCsFull-text access may be available. Sign in or learn about subscription options.pp. 942-949
Papers
Resource Efficient TCP: Reducing Contention-Induced Spurious Timeouts in QoS -Aware MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1070-1077
Papers
The Impact of Packet Type on Signal Strength in WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 264-270
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from General Chair(s)Freely available from IEEE.pp. xviii
Papers
Message from Program Chair(s)Freely available from IEEE.pp. xix
Papers
Message from the Steering ChairFreely available from IEEE.pp. xx-xxi
Papers
Organizing CommitteeFreely available from IEEE.pp. xxii-xxiv
Papers
Synchronization is Coming Back,??But is it the Same?Full-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Cyber Science Infrastructure (CSI) for Promoting Research Activities of Academia and Industries in JapanFull-text access may be available. Sign in or learn about subscription options.pp. 11
Papers
A Framework for Modeling B2B ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 12-19
Papers
Dynamic Web Service Composition: A New Approach in Building Reliable Web ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 20-25
Papers
Towards a Better Understanding of Semantic Ontology-Based Home Service ModellingFull-text access may be available. Sign in or learn about subscription options.pp. 26-31
Papers
A Distributed Trust Management Based on Authorizing Negotiation in Open and Dynamic EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 32-39
Papers
Wireless Sensor Network-Based Adaptive Vehicle Navigation in Multihop-Relay WiMAX NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 56-63
Papers
A Peer-to-Peer Approach for Mobile File Transfer in Opportunistic People NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 70-77
Papers
A Fair Channel Scheduling Algorithm in Optical Burst-Switched NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 78-83
Papers
Fairness of High-Speed TCP StacksFull-text access may be available. Sign in or learn about subscription options.pp. 84-92
Papers
An Analytical Model for Priority-Based AQM in the Presence of Heterogeneous Network TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 93-99
Papers
Range Assignment Approximation Based on Steiner Tree in Ad Hoc Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 100-105
Papers
A Distributed Algorithm for Finding a Tree Trunk and its Application for Multicast in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
Papers
Mobile Agents for Service Discovery in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 114-121
Papers
Composite Subscription and Matching Algorithm for RFID ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 122-129
Papers
Hybrid Logics and Model Checking: A Recipe for Query Processing in Location-Aware EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 130-137
Papers
Combine Personal Blog Functionalities with LMS Using Tools Interoperability ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
Papers
S2Directory ? A Framework for Object-Directory Mapping with Dynamic Implementation InjectionFull-text access may be available. Sign in or learn about subscription options.pp. 152-157
Papers
A PPM Prediction Model Based on Stochastic Gradient Descent for Web PrefetchingFull-text access may be available. Sign in or learn about subscription options.pp. 166-173
A BAT in the Lab: Experimental Results of New Link State Routing ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 295-302
Papers
A Multiple Layered Audiovisual Streaming System Using the Two-Phase Synchronization and FGS/BSAC TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 174-180
Papers
A Model for Behavioral Patterns in Web-Based Learning EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 181-187
Papers
A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 188-195
Papers
A Quorum-Based Route Cache Maintenance Protocol for Mobile Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 196-203
Papers
PACONET: imProved??Ant Colony Optimization Routing Algorithm for Mobile Ad Hoc NETworksFull-text access may be available. Sign in or learn about subscription options.pp. 204-211
Papers
Resource Placement in the Edge Product of GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 212-218
Papers
Efficient Synchronization in Message Passing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 219-226
Papers
Near Optimal Broadcasting in Optimal Triple Loop GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 227-233
Papers
Analysis of User Mobility Effects on Packet Level Performances in Next Generation Mobile Communication NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 234-240
Papers
Analysis of Queueing Property for Self-Similar TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 241-248
Papers
Performance Analysis of an Efficient Flow Control Mechanism with Job Threshold in InfiniBand NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 249-256
Papers
A Context Transfer Mechanism for IEEE 802.11r in the Centralized Wireless LAN ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 257-263
Papers
An Effort to Understand the Optimal Routing Performance in Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 279-286
Papers
Performance Evaluation of the SERENA Algorithm to SchEdule RoutEr Nodes Activity in Wireless Ad Hoc and Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 287-294
Papers
Joint Quality and Rate Adaptation Scheme for Wireless Video StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 311-318
Papers
Cross Layer Protocol Support for Live Streaming MediaFull-text access may be available. Sign in or learn about subscription options.pp. 319-326
Papers
Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 327-333
Papers
A Certificateless Signature and Group Signature Schemes against Malicious PKGFull-text access may be available. Sign in or learn about subscription options.pp. 334-341
Papers
Enhancing the Security Promise of a Digital Time-StampFull-text access may be available. Sign in or learn about subscription options.pp. 342-347
Papers
Delay Restraining of Combined Multiple Input Cross Core RouterFull-text access may be available. Sign in or learn about subscription options.pp. 355-362
Papers
On-Line Burst Header Scheduling in Optical Burst Switching NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 363-369
Papers
A Ubiquitous Supervisory System Based on Social Context AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 370-377
Papers
Dynamic Web Services on a Home Service PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 378-385
Papers
Performance Evaluation of Trust Management in Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 386-394
Papers
Flexible Address Configurations for Tree-Based ZigBee/IEEE 802.15.4 Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 395-402
Papers
Study on Backoff Algorithm for IEEE 802.15.4 LR-WPANFull-text access may be available. Sign in or learn about subscription options.pp. 403-409
Papers
RMC: An Energy-Aware Cross-Layer Data-Gathering Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 410-417
Papers
Performance Analysis of Data Delivery Schemes for a Multi-Sink Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 418-425
Papers
Multiple-Resource Request Scheduling for Differentiated QoS at Website GatewayFull-text access may be available. Sign in or learn about subscription options.pp. 433-440
Papers
Reasoning and Merging in XML Data IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 441-448
Papers
Intelligent Dynamic XML Documents ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 449-456
Papers
A Learning Content Adaptation Tool with Templates for Different HandheldsFull-text access may be available. Sign in or learn about subscription options.pp. 457-463
Papers
Seamless QoS Guarantees in Mobile Internet Using NSIS with Advance Resource ReservationFull-text access may be available. Sign in or learn about subscription options.pp. 464-471
Papers
A Channel Quality and QoS Aware Bandwidth Allocation Algorithm for IEEE 802.16 Base StationsFull-text access may be available. Sign in or learn about subscription options.pp. 472-479
Papers
Parameter Estimation for MIMO Systems with Multiple Frequency OffsetsFull-text access may be available. Sign in or learn about subscription options.pp. 480-485
Papers
Classification Model Learning for Bulletin Board Site Analysis Based on Unbalanced Textual ExamplesFull-text access may be available. Sign in or learn about subscription options.pp. 494-501
Papers
Distributed Access Scheduling Algorithms in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 509-516
Papers
Non-Uniform Node Deployment for Lifetime Extension in Large-Scale Randomly Distributed Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 517-524
Papers
Load Sharing Topology Control Protocol for Harsh Environments in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 525-530
Papers
A Distributed Coordination Protocol for Multiple Peer ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 531-538
Papers
UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrentFull-text access may be available. Sign in or learn about subscription options.pp. 539-545
Papers
Optimal Resource Discovery Paths of Gnutella2Full-text access may be available. Sign in or learn about subscription options.pp. 546-553
Papers
A New Dynamic Wavelength Assignment Scheme in Wavelength-Convertible WBS NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 554-559
Papers
A Hybrid Design Framework for Video Streaming in IEEE 802.11e Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 560-567
Papers
Fortification of IT Security by Automatic Security Advisory ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 575-582
Papers
SRPTES: A Secure Routing Protocol Based on Token Escrow Set for Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 583-589
Papers
A Concept of an Anonymous Direct P2P Distribution Overlay SystemFull-text access may be available. Sign in or learn about subscription options.pp. 590-597
Papers
Hybrid Stealthy Communication ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 606-611
Papers
Senceive: A Middleware for a Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 612-619
Papers
Parameterless Broadcasting in Static to Highly Mobile Wireless Ad Hoc, Sensor and Actuator NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 620-627
Papers
A Fault Inference Mechanism in Sensor Networks Using Markov ChainFull-text access may be available. Sign in or learn about subscription options.pp. 628-635
Papers
SQUARE: A New TCP Variant for Future High Speed and Long Delay EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 636-643
Papers
An Active Storage System for High Performance ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 644-651
Papers
Efficient Scheduling Schemes for Sabotage-Tolerance in Volunteer Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 652-658
Showing 100 out of 159