Default Cover Image

2008 22nd International Conference on Advanced Information Networking and Applications (AINA 2008)

March 25 2008 to March 28 2008

Okinawa

Table of Contents

Papers
PAEWN 2008 Organizing CommitteeFreely available from IEEE.pp. lxii-lxiii
Papers
FINA 2008 ReviewersFreely available from IEEE.pp. xxxiv-xxxv
Papers
Table of contentsFreely available from IEEE.pp. v-xxx
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
BLSMC 2008 Workshop OrganizationFreely available from IEEE.pp. xlii-xliv
Papers
HWISE 2008 ReviewersFreely available from IEEE.pp. l
Papers
INVITE 2008 ReviewersFreely available from IEEE.pp. liii
Papers
IWDENS 2008 ReviewersFreely available from IEEE.pp. lvi
Papers
BioCom 2008 ReviewersFreely available from IEEE.pp. xl
Papers
DMWPC 2008 ReviewersFreely available from IEEE.pp. xlvii
Papers
MAW 2008 ReviewersFreely available from IEEE.pp. lx
Papers
PAEWN 2008 ReviewersFreely available from IEEE.pp. lxiv
Papers
SOCNE 2008 reviewersFreely available from IEEE.pp. lxix
Papers
TeNAS 2008 reviewersFreely available from IEEE.pp. lxxii
Papers
WON 2008 reviewersFreely available from IEEE.pp. lxxx
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the AINA 2008 Workshop ChairsFreely available from IEEE.pp. xxxi
Papers
Message from the FINA 2008 Symposium Co-ChairsFreely available from IEEE.pp. xxxii
Papers
FINA 2008 Organizing CommitteeFreely available from IEEE.pp. xxxiii
Papers
Message from the AASNET 2008 Co-ChairsFreely available from IEEE.pp. xxxvi
Papers
AASNET 2008 CommitteesFreely available from IEEE.pp. xxxvii
Papers
Message from the BioCom 2008 Co-ChairsFreely available from IEEE.pp. xxxviii
Papers
BioCom 2008 Organizing CommitteeFreely available from IEEE.pp. xxxix
Papers
Message from the BLSMC 2008 Co-ChairsFreely available from IEEE.pp. xli
Papers
Message from the DMWPC 2008 Co-ChairsFreely available from IEEE.pp. xlv
Papers
DMWPC 2008 Organizing CommitteeFreely available from IEEE.pp. xlvi
Papers
Message from the HWISE 2008 Co-ChairsFreely available from IEEE.pp. xlviii
Papers
HWISE 2008 Organizing CommitteeFreely available from IEEE.pp. xlvix
Papers
Message from the INVITE 2008 ChairsFreely available from IEEE.pp. li
Papers
INVITE 2008 Organizing CommitteeFreely available from IEEE.pp. lii
Papers
Message from the IWDENS 2008 Co-ChairsFreely available from IEEE.pp. liv
Papers
IWDENS 2008 Organizing CommitteeFreely available from IEEE.pp. lv
Papers
Message from the MAW 2008 Co-ChairsFreely available from IEEE.pp. lvii
Papers
MAW 2008 Organizing CommitteeFreely available from IEEE.pp. lviii-lvix
Papers
Message from the PAEWN 2008 ChairsFreely available from IEEE.pp. lxi
Papers
Message from the Security in RFID??2008 ChairFreely available from IEEE.pp. lxv
Papers
Security in RFID 2008 Organizing CommitteeFreely available from IEEE.pp. lxvi
Papers
Message from the SOCNE 2008 ChairsFreely available from IEEE.pp. lxvii
Papers
SOCNE 2008 Organizing CommitteeFreely available from IEEE.pp. lxviii
Papers
Message from the TeNAS 2008 ChairsFreely available from IEEE.pp. lxx
Papers
TeNAS 2008 Organizing CommitteeFreely available from IEEE.pp. lxxi
Papers
Message from the UASS 2008 ChairsFreely available from IEEE.pp. lxxiii
Papers
UASS 2008 Organizing CommitteeFreely available from IEEE.pp. lxxiv-lxxv
Papers
Message from the WAMIS 2008 ChairsFreely available from IEEE.pp. lxxvi
Papers
WAMIS 2008 Organizing CommitteeFreely available from IEEE.pp. lxxvii
Hybrid Traffic Model for Multimedia Network Performance EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
Papers
Message from the WON 2008 ChairsFreely available from IEEE.pp. lxxviii
Papers
WON 2008 Organizing CommitteeFreely available from IEEE.pp. lxxix
Papers
Development of Scheduler for Real Time and Embedded System DomainFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
The Solution Modelling System with Grouped AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 106-110
Papers
Wireless Service Attributes Classification and Matching Mechanism Based on Decision TreeFull-text access may be available. Sign in or learn about subscription options.pp. 12-17
Papers
RFID-Based Locating ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
Papers
Research on Context-Aware Mobile ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 24-30
Papers
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 50-55
AS Alliance in Inter-Domain RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 151-156
Papers
Monitoring Network Traffic to Detect Stepping-Stone IntrusionFull-text access may be available. Sign in or learn about subscription options.pp. 56-61
Papers
A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 62-67
Papers
Performance Evaluation for Scheduling Algorithms in WiMAX NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 68-74
Papers
Empirical Performance Evaluation of Stretched HypercubesFull-text access may be available. Sign in or learn about subscription options.pp. 75-79
Papers
Model-Driven Automation in Grid EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 92-99
Papers
A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual OrganizationsFull-text access may be available. Sign in or learn about subscription options.pp. 100-105
Papers
A Workflow-Based Access Control Framework for e-Health ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 111-120
Papers
An SSO-Capable Distributed RBAC Model with High Availability across Administrative DomainFull-text access may be available. Sign in or learn about subscription options.pp. 121-126
Papers
DS-MOSD: A Dynamic Selectable Master OSD Model for Large-Scale Object-Based Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 127-132
Papers
Distributed Databases in Dynamic R-Tree for Vehicle Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 133-138
Papers
Scalability Analysis for Wireless Sensor Networks Routing ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 139-144
Papers
Maxflow Based Routing for Traffic Engineering and Sustained High Bitrate ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Papers
A Stochastic Availability Prediction Model for Head Nodes in the HA ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 157-161
Efficient QoS Implementation for MPLS VPNFull-text access may be available. Sign in or learn about subscription options.pp. 259-263
Papers
SOSRAID-6: A Self-Organized Strategy of RAID-6 in the Degraded ModeFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
Papers
Fault Tolerant Small-World Cellular Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 168-172
An Optimal Solution of Byzantine Agreement in a Scale Free NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 270-275
Papers
Parallel Computing of CG Using an Open Source Windows GridFull-text access may be available. Sign in or learn about subscription options.pp. 173-180
Papers
Script: Simulations from Grid to Ubiquitous ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 181-186
Papers
Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 187-194
Papers
A Case Study of a Linux Grid on Windows Using Virtual MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 195-200
Papers
Research on Location Service Integration StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 201-204
Papers
Strongly Instrumented Generic Mobility Architecture (SIGMA)Full-text access may be available. Sign in or learn about subscription options.pp. 205-210
Papers
Device Middleware for Heterogeneous Access to Java ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 211-216
Papers
Cross-Correlated FEC Scheme for Multimedia Streaming over Wireless LANFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
Papers
A Multi-Purpose Wireless Network Emulator: QOMETFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Papers
A Graph Isomorphism Based Authentication Protocol for Access Control in WLANFull-text access may be available. Sign in or learn about subscription options.pp. 229-234
Papers
A Method of Project Member Arrangement of Using SOM for a Web CommunityFull-text access may be available. Sign in or learn about subscription options.pp. 235-240
An Expanded Stochastic Model in DAG SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 331-336
Papers
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information SystemFull-text access may be available. Sign in or learn about subscription options.pp. 241-246
Papers
Delta Compression for Information Push ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 247-252
Papers
Overlay Multicast Architecture Supporting QoS over NGNFull-text access may be available. Sign in or learn about subscription options.pp. 253-258
Papers
eMuse: QoS Guarantees for Shared Storage ServersFull-text access may be available. Sign in or learn about subscription options.pp. 264-269
Annulling SYN Flooding Attacks with WhitelistFull-text access may be available. Sign in or learn about subscription options.pp. 371-376
Papers
A Parallel Computation of the Steiner Tree Algorithm on Server-Client ParadigmFull-text access may be available. Sign in or learn about subscription options.pp. 276-280
Papers
LRTG: Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 281-287
Papers
Resource-Cost Analysis for Massively Multiplayer Online GamesFull-text access may be available. Sign in or learn about subscription options.pp. 288-295
Papers
Credit Token Based Dynamic Resource Renting and Offering Mechanism for Cognitive Radio WRAN BS Spectrum SharingFull-text access may be available. Sign in or learn about subscription options.pp. 296-300
Papers
PTO: A Trust Ontology for Pervasive EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 301-306
Showing 100 out of 338