Default Cover Image

27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07)

June 22 2007 to June 29 2007

Toronto, Canada

ISSN: 1545-0678

ISBN: 0-7695-2838-4

Table of Contents

Technical Program CommitteeFreely available from IEEE.pp. viii-viii
The 5th Int. Workshop on Mobile Distributed Computing (MDC'07)
Message from MDC Workshop ChairsFreely available from IEEE.pp. vi
The 5th Int. Workshop on Mobile Distributed Computing (MDC'07)
Organizing CommitteeFreely available from IEEE.pp. vii
The 5th Int. Workshop on Mobile Distributed Computing (MDC'07)
ReviewersFreely available from IEEE.pp. ix
Session 1: Ad Hoc Networks
Quorum Based IP Address Autoconfiguration in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1
Session 1: Ad Hoc Networks
Predictive Directional Greedy Routing in Vehicular Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 2
Session 1: Ad Hoc Networks
Self-Stabilizing Algorithms of Constructing Spanning Tree and Weakly Connected Minimal Dominating SetFull-text access may be available. Sign in or learn about subscription options.pp. 3
Session 2: Mobile and Wireless Systems
A Service Supplier Database for Location-Based Mobile CommerceFull-text access may be available. Sign in or learn about subscription options.pp. 4
Session 2: Mobile and Wireless Systems
Toward Building a Multi-level Robust Intrusion Detection Architecture for Distributed Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 5
Session 2: Mobile and Wireless Systems
A comparative analysis of VoIP support for HT transmission mechanisms in WLANFull-text access may be available. Sign in or learn about subscription options.pp. 6
Session 3: Distributed and Pervasive Systems
Object-Swapping for Resource-Constrained DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 7
Session 3: Distributed and Pervasive Systems
Adaptive Distance Filter-based Traffic Reduction for Mobile GridFull-text access may be available. Sign in or learn about subscription options.pp. 8
Session 3: Distributed and Pervasive Systems
A Middleware Support for Agent-Based Application Mobility in Pervasive EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 9
Session 3: Distributed and Pervasive Systems
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 10
The 4th International Workshop on Wireless Ad hoc and Sensor Networking (WWASN'07)
Message from WWASN Workshop ChairsFreely available from IEEE.pp. x
The 4th International Workshop on Wireless Ad hoc and Sensor Networking (WWASN'07)
Organizing CommitteeFreely available from IEEE.pp. xi
Session I: Routing
Reception-Aware Routing for Energy Conservation in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 11
Session I: Routing
Secure Multipath Routing Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 12
Session II: Routing and Mesh Networks
Analysing the Impact of Topology Update Strategies on the Performance of a Proactive MANET Routing ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 13
Session II: Routing and Mesh Networks
Group-aware Stream FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 14
Session II: Routing and Mesh Networks
Towards Guaranteed QoS in Mesh Networks: EmulatingWiMAX Mesh over WiFi HardwareFull-text access may be available. Sign in or learn about subscription options.pp. 15
Session III: Sensor Networks (Data Dissemination and Security)
Modeling Data Consistency in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 16
Session III: Sensor Networks (Data Dissemination and Security)
Exploring Symmetric Cryptography for Secure Network ReprogrammingFull-text access may be available. Sign in or learn about subscription options.pp. 17
Session III: Sensor Networks (Data Dissemination and Security)
Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor DeploymentFull-text access may be available. Sign in or learn about subscription options.pp. 18
Session IV: Miscellaneous
A Novel Session Recovery Mechanism for Cluster-based Signaling Architecture for Conferencing in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 19
Session IV: Miscellaneous
Analysis of non-acknowledged, CSMA-CA, slave-slave bridging in 802.15.4 beacon enabled networksFull-text access may be available. Sign in or learn about subscription options.pp. 20
Session IV: Miscellaneous
An Enhanced Random-walk Method for Content Locating in P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 21
The 1st Int. Workshop on Trust and Reputation Management in Massively Distributed Computing Systems (TRAM'07)
Message from TRAM Workshop ChairsFreely available from IEEE.pp. xii
The 1st Int. Workshop on Trust and Reputation Management in Massively Distributed Computing Systems (TRAM'07)
Organizing CommitteeFreely available from IEEE.pp. xiii
Building Trust and Reputation
A Method for the Certification and the Delegation of Trust in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 22
Building Trust and Reputation
Building Trust in Online Rating Systems Through Signal ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 23
Building Trust and Reputation
Towards a Gravity-Based Trust Model for Social Networking SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 24
Trust and Reputation Systems
A Review on Trust and Reputation for Web Service SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 25
Trust and Reputation Systems
Survey of Six Myths and Oversights about Distributed Hash Tables? SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 26
Trust and Reputation Systems
Taxonomy of Email Reputation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 27
Trust in Peer-to-Peer Networks
Integrated Copyright Protection in Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 28
Trust in Peer-to-Peer Networks
A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 29
Trust in Peer-to-Peer Networks
Confidence-based Trustworthiness of Acquaintance Peers in Peer-to-Peer Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 30
Trust in Peer-to-Peer Networks
Impact of Peer Churning in Trusted Gossiping for P2P Information SharingFull-text access may be available. Sign in or learn about subscription options.pp. 31
The 9th International Workshop on Multimedia Network on Systems and Applications (MNSA'07)
Message from Workshop ChairsFreely available from IEEE.pp. xiv
The 9th International Workshop on Multimedia Network on Systems and Applications (MNSA'07)
Program CommitteeFreely available from IEEE.pp. xv
Session 1: Distributed Systems
Performance Analysis of the Superpeer-based Two-layer P2P Overlay Network with the CBF StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 32
Session 1: Distributed Systems
Large Scale Distributed Disaster Information System based on MANET and Overlay NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 33
Session 1: Distributed Systems
Performance Analysis of the Interrogation-based Failure DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 34
Session 2: Multimedia Systems
Dynamic Class-based Control for Improving Perceived Voice QualityFull-text access may be available. Sign in or learn about subscription options.pp. 36
Memorizing What You Did Last Week: Towards Detailed Actigraphy With A Wearable SensorFull-text access may be available. Sign in or learn about subscription options.pp. 47-47
Session 3: Wireless Communications
Wireless Communications for Health Monitoring on HighwaysFull-text access may be available. Sign in or learn about subscription options.pp. 37
Session 3: Wireless Communications
A Fuzzy-based Call Admission Control System forWireless Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 38
Session 3: Wireless Communications
Context-aware User Interface Framework for Mobile ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 39
Session 4: Distributed Applications
X3D Multi-user Virtual Environment Platform for Collaborative Spatial DesignFull-text access may be available. Sign in or learn about subscription options.pp. 40
Session 4: Distributed Applications
A New Teleconference System and Its Applications by Omni-directional Audio and Video TransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 41
Session 4: Distributed Applications
SNEO: Proposal of a Platform for Network Game Using Overlay NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 42
The 7th International Workshop on Smart Appliances and Wearable Computing (IWSAWC'07)
Message from Workshop ChairsFreely available from IEEE.pp. xvi
The 7th International Workshop on Smart Appliances and Wearable Computing (IWSAWC'07)
Program Committee and ReviewersFreely available from IEEE.pp. xvii
Toolkits and Frameworks
The WUI-Toolkit: A Model-Driven UI Development Framework for Wearable User InterfacesFull-text access may be available. Sign in or learn about subscription options.pp. 43
Toolkits and Frameworks
An Automatic Software Decentralization Framework for Distributed Device CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 45
Wearable Sensors
CLAD: a Sensor Management Device forWearable ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 46
Context Awareness
A Context Aware Automatic Traffic Notification System for Cell PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 48
Context Awareness
Context to Make You More AwareFull-text access may be available. Sign in or learn about subscription options.pp. 49
Context Awareness
A Context-aware Reminding System for Daily Activities of Dementia PatientsFull-text access may be available. Sign in or learn about subscription options.pp. 50
Smart Appliances and Environments
OSMOSIS - Semantic Work-Spaces for Smart EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 51
Smart Appliances and Environments
Using a Context Quality Measure for Improving Smart AppliancesFull-text access may be available. Sign in or learn about subscription options.pp. 52
Smart Appliances and Environments
Smart-Furoshiki: RFID-embedded Cloth enabling Multiple Area DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 53
The Sixth International Workshop on Assurance in Distributed Systems and Networks (ADSN'07)
Message from Workshop ChairsFreely available from IEEE.pp. xviii
The Sixth International Workshop on Assurance in Distributed Systems and Networks (ADSN'07)
Organization and Program CommitteeFreely available from IEEE.pp. xix
Session 1: Assurance in Ad Hoc and Sensor Networks
Robcast: A Singlehop Reliable Broadcast Protocol forWireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 54
Session 1: Assurance in Ad Hoc and Sensor Networks
State Transition Model for Test Sequence Generation of MANET Clustering ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 55
Session 1: Assurance in Ad Hoc and Sensor Networks
Performance Evaluation of Autonomous Clustering for Hierarchical Routing Protocols in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 56
Session 2: Assurance Technologies and Applications
Autonomous Community Area Construction Technology to Achieve High AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 57
Session 2: Assurance Technologies and Applications
Multi-layered Data Consistency Technology in Autonomous Decentralized IC Card Ticket SystemFull-text access may be available. Sign in or learn about subscription options.pp. 58
Session 2: Assurance Technologies and Applications
Parallel Downloading Using Variable Length Blocks for Proxy ServersFull-text access may be available. Sign in or learn about subscription options.pp. 59
Session 3: Analysis of Assurance Methods
An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 60
Session 3: Analysis of Assurance Methods
Lower Bounds for Achieving Synchronous Consensus with Orderly Crash FailureFull-text access may be available. Sign in or learn about subscription options.pp. 61
The First International Workshop on Distributed Event Processing, Systems and Applications (DEPSA'07)
Message from Workshop ChairsFreely available from IEEE.pp. xx
The First International Workshop on Distributed Event Processing, Systems and Applications (DEPSA'07)
Organizing CommitteeFreely available from IEEE.pp. xxi
Session 1: Gossip Protocols
Exploiting Gossip for Self-Management in Scalable Event Notification SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 62
Session 1: Gossip Protocols
Towards Fair Event DisseminationFull-text access may be available. Sign in or learn about subscription options.pp. 63
Session 1: Gossip Protocols
A Concept for Flexible Event-Driven Invocation of Distributed Service CompositionsFull-text access may be available. Sign in or learn about subscription options.pp. 64
Session 2: Applications
Using stream queries to measure communication performance of a parallel computing environmentFull-text access may be available. Sign in or learn about subscription options.pp. 65
Session 2: Applications
Automated Ensemble Extraction and Analysis of Acoustic Data StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 66
Session 2: Applications
Event Stream Processing with Out-of-Order Data ArrivalFull-text access may be available. Sign in or learn about subscription options.pp. 67
Session 3: Publish/Subscribe Systems
Transactions in Content-Based Publish/Subscribe MiddlewareFull-text access may be available. Sign in or learn about subscription options.pp. 68
Session 3: Publish/Subscribe Systems
A Distributed Algorithm for Underlay Aware and Available Overlay Formation in Event Broker Networks for Publish/Subscribe SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 69
The First International Workshop on Cooperative Distributed Systems (CDS'07)
Message from Workshop ChairsFreely available from IEEE.pp. xxii
The First International Workshop on Cooperative Distributed Systems (CDS'07)
Organizing CommitteeFreely available from IEEE.pp. xxiii
Session 1: Peer-to-Peer Systems and Frameworks
A P2P Groupware Framework based on Operational TransformationsFull-text access may be available. Sign in or learn about subscription options.pp. 70
Session 1: Peer-to-Peer Systems and Frameworks
Enhancing Neighborship Consistency for Peer-to-Peer Distributed Virtual EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 71
Session 1: Peer-to-Peer Systems and Frameworks
Public Key Management Framework for Two-tier Super Peer ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 72
Session 1: Peer-to-Peer Systems and Frameworks
The ARS Model: Virtual Learning Communities with P2PAgents on the GridFull-text access may be available. Sign in or learn about subscription options.pp. 73
Session 2: Mobile Services
An Enterprise Messaging Middleware for Mobile ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 74
Session 2: Mobile Services
Collaborative Distributed Admission Control (CDAC) for Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 75
Session 3: Distributed Systems Applications
Multi-Agent Cooperative Design Support in Distributed EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 76
Session 3: Distributed Systems Applications
Binary Search Tree: An Efficient Overlay Structure to Support Range QueryFull-text access may be available. Sign in or learn about subscription options.pp. 77
The First International Workshop on Specialized Ad Hoc Networks and Systems (SAHNS'07)
Message from Workshop ChairsFreely available from IEEE.pp. xxiv
Showing 100 out of 112