Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
AINAW
AINAW 2008
Generate Citations
2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)
March 25 2008 to March 28 2008
Okinawa
Table of Contents
Papers
PAEWN 2008 Organizing Committee
Freely available from IEEE.
pp. lxii-lxiii
Papers
FINA 2008 Reviewers
Freely available from IEEE.
pp. xxxiv-xxxv
Papers
Table of contents
Freely available from IEEE.
pp. v-xxx
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
BLSMC 2008 Workshop Organization
Freely available from IEEE.
pp. xlii-xliv
Papers
HWISE 2008 Reviewers
Freely available from IEEE.
pp. l
Papers
INVITE 2008 Reviewers
Freely available from IEEE.
pp. liii
Papers
IWDENS 2008 Reviewers
Freely available from IEEE.
pp. lvi
Papers
BioCom 2008 Reviewers
Freely available from IEEE.
pp. xl
Papers
DMWPC 2008 Reviewers
Freely available from IEEE.
pp. xlvii
Papers
MAW 2008 Reviewers
Freely available from IEEE.
pp. lx
Papers
PAEWN 2008 Reviewers
Freely available from IEEE.
pp. lxiv
Papers
SOCNE 2008 reviewers
Freely available from IEEE.
pp. lxix
Papers
TeNAS 2008 reviewers
Freely available from IEEE.
pp. lxxii
Papers
WON 2008 reviewers
Freely available from IEEE.
pp. lxxx
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from the AINA 2008 Workshop Chairs
Freely available from IEEE.
pp. xxxi
Papers
Message from the FINA 2008 Symposium Co-Chairs
Freely available from IEEE.
pp. xxxii
Papers
FINA 2008 Organizing Committee
Freely available from IEEE.
pp. xxxiii
Papers
Message from the AASNET 2008 Co-Chairs
Freely available from IEEE.
pp. xxxvi
Papers
AASNET 2008 Committees
Freely available from IEEE.
pp. xxxvii
Papers
Message from the BioCom 2008 Co-Chairs
Freely available from IEEE.
pp. xxxviii
Papers
BioCom 2008 Organizing Committee
Freely available from IEEE.
pp. xxxix
Papers
Message from the BLSMC 2008 Co-Chairs
Freely available from IEEE.
pp. xli
Papers
Message from the DMWPC 2008 Co-Chairs
Freely available from IEEE.
pp. xlv
Papers
DMWPC 2008 Organizing Committee
Freely available from IEEE.
pp. xlvi
Papers
Message from the HWISE 2008 Co-Chairs
Freely available from IEEE.
pp. xlviii
Papers
HWISE 2008 Organizing Committee
Freely available from IEEE.
pp. xlvix
Papers
Message from the INVITE 2008 Chairs
Freely available from IEEE.
pp. li
Papers
INVITE 2008 Organizing Committee
Freely available from IEEE.
pp. lii
Papers
Message from the IWDENS 2008 Co-Chairs
Freely available from IEEE.
pp. liv
Papers
IWDENS 2008 Organizing Committee
Freely available from IEEE.
pp. lv
Papers
Message from the MAW 2008 Co-Chairs
Freely available from IEEE.
pp. lvii
Papers
MAW 2008 Organizing Committee
Freely available from IEEE.
pp. lviii-lvix
Papers
Message from the PAEWN 2008 Chairs
Freely available from IEEE.
pp. lxi
Papers
Message from the Security in RFID??2008 Chair
Freely available from IEEE.
pp. lxv
Papers
Security in RFID 2008 Organizing Committee
Freely available from IEEE.
pp. lxvi
Papers
Message from the SOCNE 2008 Chairs
Freely available from IEEE.
pp. lxvii
Papers
SOCNE 2008 Organizing Committee
Freely available from IEEE.
pp. lxviii
Papers
Message from the TeNAS 2008 Chairs
Freely available from IEEE.
pp. lxx
Selecting a Networked Virtual Environment Platform and the Design of a Collaborative e-Learning Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-49
by
Andreas Konstantinidis
,
Thrasyvoulos Tsiatsos
Papers
TeNAS 2008 Organizing Committee
Freely available from IEEE.
pp. lxxi
Papers
Message from the UASS 2008 Chairs
Freely available from IEEE.
pp. lxxiii
Papers
UASS 2008 Organizing Committee
Freely available from IEEE.
pp. lxxiv-lxxv
Papers
Message from the WAMIS 2008 Chairs
Freely available from IEEE.
pp. lxxvi
Papers
WAMIS 2008 Organizing Committee
Freely available from IEEE.
pp. lxxvii
Hybrid Traffic Model for Multimedia Network Performance Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Priscila Solis Barreto
,
Paulo H.P. de Carvalho
Papers
Message from the WON 2008 Chairs
Freely available from IEEE.
pp. lxxviii
Papers
WON 2008 Organizing Committee
Freely available from IEEE.
pp. lxxix
Papers
Development of Scheduler for Real Time and Embedded System Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
M.V. Panduranga Rao
,
K. Chandrashekar Shet
,
R. Balakrishna
,
K. Roopa
Papers
The Solution Modelling System with Grouped Agents
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Cai Zhiming
,
Yin Jun
,
Huang Liangli
Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-110
by
YongNyuo Shin
,
YongJun Lee
,
Woochang Shin
,
Jinyoung Choi
Papers
Wireless Service Attributes Classification and Matching Mechanism Based on Decision Tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-17
by
Min Peng
,
Laurence T. Yang
,
Wuqing Zhao
,
Naixue Xiong
Papers
RFID-Based Locating Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-23
by
Xuan Gu
,
Dong Wang
,
Huanye Sheng
Papers
Research on Context-Aware Mobile Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-30
by
Li Han
,
Salomaa Jyri
,
Jian Ma
,
Kuifei Yu
Papers
A Student Experiment Method for Learning the Basics of Embedded Software Development Including HW/SW Co-design
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-37
by
Hiroyasu Mitsui
,
Hidetoshi Kambe
,
Satoshi Endo
,
Hisao Koizumi
Papers
A Prototype System to Support the KJ Method by Cooperation between Visually-Impaired Persons and Sighted Persons
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-43
by
Hiroaki Yuze
,
Chaoqun Wang
,
Shigeki Sugiura
,
Takeshi Otofuji
,
Toshiki Aikawa
Papers
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-55
by
Ming-Yang Su
,
Sheng-Cheng Yeh
,
Kai-Chi Chang
,
Hua-Fu Wei
AS Alliance in Inter-Domain Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-156
by
Xiangjiang Hu
,
Peidong Zhu
,
Kaiyu Cai
,
Zhenghu Gong
Papers
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-61
by
Jianhua Yang
,
Byong Lee
,
Stephen S.H. Huang
Papers
A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-67
by
Nen-Fu Huang
,
Hsien-Wei Hung
,
Sheng-Hung Lai
,
Yen-Ming Chu
,
Wen-Yen Tsai
Papers
Performance Evaluation for Scheduling Algorithms in WiMAX Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-74
by
Jin-Cherng Lin
,
Chun-Lun Chou
,
Cheng-Hsiung Liu
Papers
Empirical Performance Evaluation of Stretched Hypercubes
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-79
by
Sina Meraji
,
Hamid Sarbazi-Azad
Papers
A Performance Study of Virtual Machine Migration vs. Thread Migration for Grid Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-91
by
Po-Cheng Chen
,
Cheng-I Lin
,
Sheng-Wei Huang
,
Jyh-Biau Chang
,
Ce-Kuen Shieh
,
Tyng-Yeu Liang
Papers
Model-Driven Automation in Grid Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-99
by
Cameron Kiddle
,
Derek Kivi
,
Rob Simmonds
Papers
A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Xudong Ni
,
Junzhou Luo
Papers
A Workflow-Based Access Control Framework for e-Health Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-120
by
Giovanni Russello
,
Changyu Dong
,
Naranker Dulay
Papers
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-126
by
Sekpon Juntapremjitt
,
Somchart Fugkeaw
,
Piyawit Manpanpanich
Papers
DS-MOSD: A Dynamic Selectable Master OSD Model for Large-Scale Object-Based Storage System
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-132
by
Yinliang Yue
,
Fang Wang
,
Dan Feng
Papers
Distributed Databases in Dynamic R-Tree for Vehicle Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-138
by
Yusuke Murase
,
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Papers
Scalability Analysis for Wireless Sensor Networks Routing Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-144
by
Lubna K. Alazzawi
,
Ali M. Elkateeb
,
Aiyappa Ramesh
,
Waleed Aljuhar
Papers
Maxflow Based Routing for Traffic Engineering and Sustained High Bitrate Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-150
by
Jaiwant Mulik
Papers
A Stochastic Availability Prediction Model for Head Nodes in the HA Cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-161
by
Yong-Ju Lee
,
Hag-Young Kim
,
Cheol-Hoon Lee
Efficient QoS Implementation for MPLS VPN
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-263
by
Mohamed El Hachimi
,
Marc-Andre Breton
,
Maria Bennani
Papers
SOSRAID-6: A Self-Organized Strategy of RAID-6 in the Degraded Mode
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-167
by
Suzhen Wu
,
Dan Feng
,
Bo Mao
,
Jianxi Chen
,
Lingfang Zeng
Papers
Fault Tolerant Small-World Cellular Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-172
by
Katsuyoshi Matsumoto
,
Shingo Nomoto
,
Minoru Uehara
,
Hideki Mori
An Optimal Solution of Byzantine Agreement in a Scale Free Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-275
by
Kuo-Qin Yan
,
Shu-Ching Wang
,
Shun-Sheng Wang
Papers
Parallel Computing of CG Using an Open Source Windows Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-180
by
Kenichi Tanaka
,
Minoru Uehara
,
Hideki Mori
Papers
Script: Simulations from Grid to Ubiquitous Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-186
by
Yih-Jiun Lee
,
Kai-Wen Lien
Papers
Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 187-194
by
Ke Xu
,
Junwei Cao
,
Lianchen Liu
,
Cheng Wu
Papers
A Case Study of a Linux Grid on Windows Using Virtual Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-200
by
Kenichi Tanaka
,
Minoru Uehara
,
Hideki Mori
Papers
Research on Location Service Integration Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-204
by
Yongyi Zhao
,
Jin Li
Papers
Strongly Instrumented Generic Mobility Architecture (SIGMA)
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-210
by
Misbah Mubarak
,
Sara Sultana
,
Zarrar Khan
,
H. Farooq Ahmad
,
Hajra Batool Asghar
,
Hiroki Suguri
Papers
Device Middleware for Heterogeneous Access to Java Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-216
by
Andre Elia Assad
,
Nelson Souto Rosa
Papers
Cross-Correlated FEC Scheme for Multimedia Streaming over Wireless LAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
Eunyong Park
,
Sunyoung Han
,
Heemin Kim
,
Kiwon Son
Papers
A Multi-Purpose Wireless Network Emulator: QOMET
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-228
by
Razvan Beuran
,
Junya Nakata
,
Takashi Okada
,
Lan Tien Nguyen
,
Yasuo Tan
,
Yoichi Shinoda
Papers
A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-234
by
Ngoc Bao Tran
,
Dinh Thuc Nguyen
Papers
A Method of Project Member Arrangement of Using SOM for a Web Community
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Shingo Kawamura
,
Shinya Touji
,
Minoru Uehara
,
Hideki Mori
An Expanded Stochastic Model in DAG Schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-336
by
Kai Hu
,
Yan Jiang
,
Zhibin Yang
,
Shiran Chen
Papers
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-246
by
Yufeng Wang
,
Yoshiaki Hori
,
Kouichi Sakurai
Papers
Delta Compression for Information Push Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-252
by
Junze Wang
,
Yi Guo
,
Benxiong Huang
,
Jianhua Ma
,
Yijun Mo
Papers
Overlay Multicast Architecture Supporting QoS over NGN
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Boyoung Rhee
,
Kwangman Koh
,
Sunyoung Han
Papers
eMuse: QoS Guarantees for Shared Storage Servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-269
by
Dan Feng
,
Chengtao Lu
,
Fang Wang
Annulling SYN Flooding Attacks with Whitelist
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-376
by
Tae-Hyung Kim
,
Young-Sik Choi
,
Jong Kim
,
Sung Je Hong
Papers
A Parallel Computation of the Steiner Tree Algorithm on Server-Client Paradigm
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-280
by
Rashid Bin Muhammad
Papers
LRTG: Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-287
by
Kai Han
,
Binoy Ravindran
,
E.D. Jensen
Papers
Resource-Cost Analysis for Massively Multiplayer Online Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-295
by
Zheng D. Wu
Papers
Credit Token Based Dynamic Resource Renting and Offering Mechanism for Cognitive Radio WRAN BS Spectrum Sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-300
by
Dan Gao
,
Jueping Cai
,
Zan Li
,
Xing Wei
,
Rei Chen
Papers
PTO: A Trust Ontology for Pervasive Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-306
by
Mohsen Taherian
,
Rasool Jalili
,
Morteza Amini
Showing 100 out of 338
Load More
Load All