Default Cover Image

2009 International Conference on Advanced Information Networking and Applications

May 26 2009 to May 29 2009

Bradford, United Kingdom

ISSN: 1550-445X

ISBN: 978-0-7695-3638-5

Table of Contents

Papers
[Publisher information]Freely available from IEEE.pp. 988
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xv
External reviewersFreely available from IEEE.pp. xxvii-xxvii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the AINA 2009 General ChairsFreely available from IEEE.pp. xvi
Papers
Message from the AINA 2009 Programme ChairsFreely available from IEEE.pp. xvii
Papers
AINA 2009 Organizing CommitteeFreely available from IEEE.pp. xviii-xix
Papers
AINA 2009 Programme CommitteeFreely available from IEEE.pp. xx-xxvi
Papers
Improving QoS through Network Real-Time Measurement and Self-AdaptionFull-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
Wormholes of Communication: Interfacing Virtual Worlds and the Real WorldFull-text access may be available. Sign in or learn about subscription options.pp. 2-9
Papers
Location-Aware Authentication and Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 10-15
Papers
Evaluating the Performance of Network Protocol Processing on Multi-core SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 16-23
Papers
Modeling Web Request and Session Level ArrivalsFull-text access may be available. Sign in or learn about subscription options.pp. 24-32
Papers
Predictive Simulation of HPC ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 33-40
Papers
Modelling Network Performance with a Spatial Stochastic Process AlgebraFull-text access may be available. Sign in or learn about subscription options.pp. 41-49
Papers
An Evaluation of Routing Reliability in Non-collaborative Opportunistic NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 50-57
Papers
Parameterised Gradient Based Routing (PGBR) for Future InternetFull-text access may be available. Sign in or learn about subscription options.pp. 58-65
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 189-196
Papers
A New Counting Scheme for Multicast Broadcast Service with WiBroFull-text access may be available. Sign in or learn about subscription options.pp. 66-73
Papers
Analyzing the Hold Time Schemes to Limit the Routing Table Calculations in OSPF ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 74-81
Papers
Real-Time Task Assignment in Heterogeneous Distributed Systems with Rechargeable BatteriesFull-text access may be available. Sign in or learn about subscription options.pp. 82-89
Papers
Distributed Secure Virtual File System Using Hysteresis SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
Papers
Quarc: A High-Efficiency Network on-Chip ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
Papers
Fair Scheduling with Multiple Gateways in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 106-112
Papers
DAVO: A Domain-Adaptable, Visual BPEL4WS OrchestratorFull-text access may be available. Sign in or learn about subscription options.pp. 121-128
Papers
A Generic Database Web Service for the Venice Service GridFull-text access may be available. Sign in or learn about subscription options.pp. 129-136
Papers
Trust Requirements in Identity Federation TopologiesFull-text access may be available. Sign in or learn about subscription options.pp. 137-145
Papers
Combined On-line and Off-line Trust Mechanism for Agent ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 146-153
Papers
An Ontology-Based Architecture for Federated Identity ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 162-166
Papers
Trust Management in Emergency NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 167-174
Papers
An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video TransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 175-181
Papers
Adaptive FEC Algorithm Based on Prediction of Video Quality and Bandwidth Utilization RatioFull-text access may be available. Sign in or learn about subscription options.pp. 182-188
Papers
Heterogeneous Error Protection of H.264/AVC Video Using Hierarchical 16-QAMFull-text access may be available. Sign in or learn about subscription options.pp. 197-200
Papers
Design of q-ary Irregular Repeat-Accumulate CodesFull-text access may be available. Sign in or learn about subscription options.pp. 201-206
Papers
Design of Quasi-Cyclic LDPC Codes Based on Euclidean GeometriesFull-text access may be available. Sign in or learn about subscription options.pp. 207-211
Papers
Multi-user MIMO Broadcast System Grouping Strategy Based on Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 212-216
Papers
ANFIS Based AQM Controller for Congestion ControlFull-text access may be available. Sign in or learn about subscription options.pp. 217-224
Papers
Probabilistic Network Fault-Diagnosis Using Cross-Layer ObservationsFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
Papers
An Overlay Application-Layer Multicast InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 233-240
Papers
A Measurement Study on Peer Behaviors for a Pure P2P NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 241-248
Papers
N-nary RAID: 3-resilient RAID Based on an N-nary NumberFull-text access may be available. Sign in or learn about subscription options.pp. 249-255
Papers
Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 256-262
Papers
A Pipelined IP Forwarding Engine with Fast UpdateFull-text access may be available. Sign in or learn about subscription options.pp. 263-269
Papers
DINCast: Optimizing Application-Level Shared-Tree MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 270-277
Papers
A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-TreeFull-text access may be available. Sign in or learn about subscription options.pp. 278-284
Papers
Optimized Broadcast in a Geographical Area of Wireless Ad Hoc and Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 285-292
Papers
A Resource Discovery Scheme for Large Scale Ad Hoc Networks Using a Hypercube-Based BackboneFull-text access may be available. Sign in or learn about subscription options.pp. 293-300
Papers
Energy Efficiency: Optimal Transmission Range with Topology Management in Rectangular Ad-hoc Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 301-306
Papers
A Communication Model of Broadcast in Wormhole-Routed Networks on-ChipFull-text access may be available. Sign in or learn about subscription options.pp. 315-322
Papers
An Experimental Evaluation of Sender-Side TCP Enhancements for Wired-to-Wireless Paths: A Real-World Home WLAN Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 323-330
Papers
QoS Enhancements and Performance Analysis for Delay Sensitive ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 331-338
Papers
An Efficient Admission Control Methodology for Satisfying QoS Requirements in NGN NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 339-346
Papers
A Secure Revised Simplex Algorithm for Privacy-Preserving Linear ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 347-354
Papers
Trustworthiness Assessment of Wireless Sensor Data for Business ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 355-362
Papers
Key Management in Web of Trust for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 363-370
Papers
Enabling Fast Bootstrap of Reputation in P2P Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 371-378
Papers
A Survey and Analysis on Semantics in QoS for Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 379-385
Papers
Exploiting Request Characteristics to Improve Performance of Web Services Based Business ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 386-393
Papers
Massively Scalable Web Service DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 394-402
Papers
Towards an Approach to Defining Capacity-Driven Web ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 403-410
Papers
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GAFull-text access may be available. Sign in or learn about subscription options.pp. 411-418
Papers
A Highly Available Grid Metadata CatalogFull-text access may be available. Sign in or learn about subscription options.pp. 419-426
Papers
Transaction Management for Reliable Grid ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 427-434
Papers
Brain Image Registration Analysis Workflow for fMRI Studies on Global GridsFull-text access may be available. Sign in or learn about subscription options.pp. 435-442
Papers
Data Dissemination with Drop BoxesFull-text access may be available. Sign in or learn about subscription options.pp. 451-455
Papers
A Proposal to Enhance and Control Continuous Communications in Proxy Mobile IPv6Full-text access may be available. Sign in or learn about subscription options.pp. 456-462
Papers
Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 463-470
Papers
JPEG Steganography: A Performance Evaluation of Quantization TablesFull-text access may be available. Sign in or learn about subscription options.pp. 471-478
Papers
Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 479-486
Papers
PHDFull-text access may be available. Sign in or learn about subscription options.pp. 487-494
Papers
The Efficiency Method of Sanitizable Signature Scheme for SMFFull-text access may be available. Sign in or learn about subscription options.pp. 495-502
Papers
Situation-Aware Adaptive Recommendation to Assist Mobile Users in a Campus EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 503-509
Papers
Tracking Anonymous Sinks in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 510-516
Papers
Sensor Data Fusion Using DSm Theory for Activity Recognition under Uncertainty in Home-Based CareFull-text access may be available. Sign in or learn about subscription options.pp. 517-524
Papers
A Distributed Dynamic Adaptation Model for Component-Based ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 525-529
A New Space Time Cooperative Diversity Scheme Based on Simple FeedbackFull-text access may be available. Sign in or learn about subscription options.pp. 638-643
Papers
Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 530-538
Papers
Fuzzy ESVDF Approach for Intrusion Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 539-545
Papers
Masquerade Detection Using Command Prediction and Association Rules MiningFull-text access may be available. Sign in or learn about subscription options.pp. 552-559
Papers
Route Construction Based on Measured Characteristics of Radio Propagation in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 560-567
Papers
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 568-571
Papers
Information Communication Mechanism for Loosely Coupled Mobile User Groups in Wireless Sensor FieldsFull-text access may be available. Sign in or learn about subscription options.pp. 572-579
Papers
Lessons Learned: Simulation Vs WSN DeploymentFull-text access may be available. Sign in or learn about subscription options.pp. 580-587
Papers
Similarity Search over DNS Query Streams for Email Worm DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 588-595
Papers
ReAlSec: A Relational Language for Advanced Security EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 596-601
An Analytical Model for MAC Protocol Configuration in WLANFull-text access may be available. Sign in or learn about subscription options.pp. 711-718
Papers
A New Video Surveillance Video Tracking System Based on Omni-directional and Network Controlled CamerasFull-text access may be available. Sign in or learn about subscription options.pp. 602-607
Papers
Exclusion of Forged Files from Multi-source Downloadable P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 608-615
Papers
Packet Scheduling Algorithm with QoS Provision in HSDPAFull-text access may be available. Sign in or learn about subscription options.pp. 616-623
Papers
A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 624-631
Papers
Privacy-Aware Routing Approach for Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 632-637
Papers
On the Synchronization of Web Services InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 644-651
Papers
Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of AdaptersFull-text access may be available. Sign in or learn about subscription options.pp. 652-659
Showing 100 out of 143