Default Cover Image

Convergence Information Technology, International Conference on

Nov. 11 2008 to Nov. 13 2008

ISBN: 978-0-7695-3407-7

Volume:

Table of Contents

Papers
Implementation Model for RDF Access Control Using Oracle VPD Security Model: Practical ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1101-1106
Papers
[Copyright notice - Volume 2]Freely available from IEEE.pp. iv
Papers
Table of contents - Volume 2Freely available from IEEE.pp. v-xvii
Papers
Cost Evaluation on the SPARQL-to-SQL Translation System ModelFull-text access may be available. Sign in or learn about subscription options.pp. 1062-1066
Papers
Performance Evaluation of XPath Form-Based Ontology Storage Model Regarding Query Processing and Ontology UpdateFull-text access may be available. Sign in or learn about subscription options.pp. 1067-1074
Papers
Semantic Interoperability for RFID Service FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1075-1080
Papers
Web Metadata Integration for Realizing the Semantic WebFull-text access may be available. Sign in or learn about subscription options.pp. 1095-1100
Papers
Title Page i - Volume 2Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 2Freely available from IEEE.pp. iii
Papers
Welcome Message - Volume 2Freely available from IEEE.pp. xviii
Papers
Welcoming Address - Volume 2Freely available from IEEE.pp. xix
Papers
Committees - Volume 2Freely available from IEEE.pp. xx-xxv
Papers
A New Demapping Technique for 16-APSK Modulation for Digital Video Broadcasting in AWGN ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 9-12
Papers
An Efficient Flooding Algorithm for Position-Based Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 13-20
Papers
Architecture and Protocols for Secure LAN by Using a Software-Level Certificate and Cancellation of ARP ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 21-26
Papers
Congestion Control for Highly Loaded DiffServ/MPLS NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 27-32
Papers
Cross-Layer Optimization Based 802.11e MAC Processor toward Wireless Body Area NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 33-37
Papers
Design and Implementation of V6SNIFF: An Efficient IPv6 Packet SnifferFull-text access may be available. Sign in or learn about subscription options.pp. 44-49
Papers
Determining the Size of a Static Segment and Analyzing the Utilization of In-vehicle FlexRay NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 50-53
Papers
Dual Handover Procedures for FA Load Balancing in WiBro SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 54-59
Papers
End-to-End Tomography and Congestion Control on Multicast Based VideoconferencingFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
Papers
High Speed Binomial ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
Papers
I/O Buffer Cache Mechanism Based on the Frequency of File UsageFull-text access may be available. Sign in or learn about subscription options.pp. 76-82
Papers
Improving TCP Performance over WiMAX Networks Using Cross-Layer DesignFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Papers
IMS Interworking Using IBCFFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
Papers
Inter-carrier Interference Self-Cancellation Scheme with Improved Bandwidth Efficiency for OFDM Transmission SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 95-99
Papers
Investigating the Relationship between IS Project Risk and Project PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 100-105
Papers
Low-Cost Application-Aware DVFS for Multi-core ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 106-111
Papers
Modeling Unknown Web Attacks in Network Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 112-116
Papers
New Techniques to Reduce Sidelobes in OFDM SystemFull-text access may be available. Sign in or learn about subscription options.pp. 117-121
Papers
Nonlinear AQM for Multiple RED RoutersFull-text access may be available. Sign in or learn about subscription options.pp. 122-127
Papers
Ontology-Based Fuzzy Semantic ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 128-133
Papers
Ontology-Based Resource Management Model for Computational GridFull-text access may be available. Sign in or learn about subscription options.pp. 134-139
Papers
Performance Improvement and Low Power Design of Embedded ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 140-145
Papers
Proposal of Instant Synchronous Interprocess CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 146-149
Papers
Reactive Chord for Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
Papers
Study on Automatic Forecasted Process Generation System for Frame ConstructionFull-text access may be available. Sign in or learn about subscription options.pp. 162-165
Papers
Towards a Multi-agent Framework for Fault Tolerance and QoS Guarantee in P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
Papers
A Design and Simulation for Dynamically Reconfigurable Systolic ArrayFull-text access may be available. Sign in or learn about subscription options.pp. 172-175
Papers
Frequency Distribution Optimal Diversity System Using Low Correlated Carrier in PB/MC-CDMA SystemFull-text access may be available. Sign in or learn about subscription options.pp. 176-181
Papers
A Multiple Ant Colony System for Dynamic Vehicle Routing Problem with Time WindowFull-text access may be available. Sign in or learn about subscription options.pp. 182-187
Papers
A New Approach for Open Shortest Path Weight Setting Problem (OSPFWSP)Full-text access may be available. Sign in or learn about subscription options.pp. 188-193
Papers
A New Architecture for Better Resource Management in Grid SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 194-198
Papers
A New Interestingness Measure for Associative Rules Based on the Geometric ContextFull-text access may be available. Sign in or learn about subscription options.pp. 199-203
Papers
A New Load Balanced Survivable Routing Algorithm in Multi-domain WDM Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 204-208
Papers
A New Sub-path Protection Algorithm Based on Auxiliary Virtual Topology in WDM Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 209-213
Papers
A Recommendation Agent System Using HMM-Based Collaborative Filtering in Smart Home EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 214-217
Papers
A Study on Direct Connection Method from Outside NAT to the InsideFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Papers
A Study on the Hardware Implementation Of EDACFull-text access may be available. Sign in or learn about subscription options.pp. 222-225
Papers
A Vertical Handoff Algorithm Using MN Velocity for WiBro and WLANFull-text access may be available. Sign in or learn about subscription options.pp. 226-232
Papers
An Adaptive Approach to Alleviate Broadcasting Redundancy in MANET Address Autoconfiguration ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 233-240
Papers
CAL: A Model of Providing High Quality Service in TTI Service SystemFull-text access may be available. Sign in or learn about subscription options.pp. 241-247
Papers
Computer Vision Inspection for IC Wafer Based on Character of Pixels DistributionFull-text access may be available. Sign in or learn about subscription options.pp. 248-251
Papers
Constructing Complete Binary Trees on Petersen-Torus NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 252-255
Papers
Design and Implementation of a Linux Phone Emulator Supporting Automated Application TestingFull-text access may be available. Sign in or learn about subscription options.pp. 256-259
Papers
Dimensioning of Next Generation Networks Multiservice Gateway for Achieving a Quality of Service TargetFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
Papers
Discovering Learning Pattern in Different Cognitive Style of LearnersFull-text access may be available. Sign in or learn about subscription options.pp. 268-273
Papers
Error Performance of Low-Priority Data in Advanced T-DMB SystemFull-text access may be available. Sign in or learn about subscription options.pp. 274-277
Papers
Grid-Based Approach for Energy-Balanced Node Deployment Control in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 278-285
Papers
Heterogeneous Architecture-Based Software Reliability Estimation: Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 286-290
Papers
Implementation of IEEE 802.11a Wireless LANFull-text access may be available. Sign in or learn about subscription options.pp. 291-296
Papers
Multi Rate Adaptive Cluster Spreading OFDMA SystemFull-text access may be available. Sign in or learn about subscription options.pp. 297-302
Papers
Optimal Routing and Hamiltonian Cycle in Petersen-Torus NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 303-308
Papers
Performance Analysis of mmWave WPAN MAC ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 309-316
Papers
Performance Analysis of Random Beamforming for MIMO Broadcast Channel: Outage Probability ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 317-323
Papers
Reputation Based Access Point Selection in 802.11 NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 324-329
Papers
Research for Load Balance Algorithms Based on Queue TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 330-333
Papers
Resource Allocation and Power Control for Mobile Relay in TDD-OFDMA DownlinkFull-text access may be available. Sign in or learn about subscription options.pp. 334-339
Papers
Study on IMS Service BrokerFull-text access may be available. Sign in or learn about subscription options.pp. 340-343
Papers
The Learning Cycle of Individual Digital Competency in OrganizationsFull-text access may be available. Sign in or learn about subscription options.pp. 344-350
Papers
A New CRT-RSA Scheme Resistant to Power Analysis and Fault AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Papers
A New Trapdoor in Knaspsack Public-Key Cryptosystem with Two Sequences as the Public KeyFull-text access may be available. Sign in or learn about subscription options.pp. 357-362
Papers
A Note on Security of KMN PKCFull-text access may be available. Sign in or learn about subscription options.pp. 363-367
Papers
A Secure Remote User Authentication SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 368-373
Papers
A Study on the Authentication Method for TAmI in Ambient Intelligence (Secure Group Decision Making Toolkit)Full-text access may be available. Sign in or learn about subscription options.pp. 374-379
Papers
An Efficient Multi-server Password Authenticated Key Agreement Scheme RevisitedFull-text access may be available. Sign in or learn about subscription options.pp. 396-400
Vulnerability Analysis for X86 Executables Using Genetic Algorithm and FuzzingFull-text access may be available. Sign in or learn about subscription options.pp. 491-497
Papers
An Improvement of Cyclic Vector Multiplication AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 401-405
Papers
An Improvement of Twisted Ate Pairing with Barreto?Naehrig Curve by Using Frobenius MappingFull-text access may be available. Sign in or learn about subscription options.pp. 406-410
Papers
Attak Flow TracebackFull-text access may be available. Sign in or learn about subscription options.pp. 411-415
Papers
CADE: Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 416-422
Papers
Age in Ubiquitous Computing: A Thin ThreadFull-text access may be available. Sign in or learn about subscription options.pp. 423-429
Papers
Efficient Pairings on Twisted Elliptic CurveFull-text access may be available. Sign in or learn about subscription options.pp. 430-439
Papers
GMEM-BSG: An Improved Large-Scale Memory Sequence Generator for Ubiquitous ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 440-445
Papers
Implementation of Real Time DMB Encryption on PMP for Copyright ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 446-449
Papers
Implementation of Watermark Detection System for Hardware Based Video Watermark EmbedderFull-text access may be available. Sign in or learn about subscription options.pp. 450-453
Papers
IP Traceback Methodology Using Markov Chain and Bloom Filter in 802.16eFull-text access may be available. Sign in or learn about subscription options.pp. 454-459
Papers
Processing Certificate of Authorization with Watermark in SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 460-465
Papers
Secure Mutual Authentication and Fair Billing for Roaming Service in Wireless Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 466-471
Papers
Sniffing Packets on LAN without ARP SpoofingFull-text access may be available. Sign in or learn about subscription options.pp. 472-477
Papers
Top 10 Free Web-Mail Security Test Using Session HijackingFull-text access may be available. Sign in or learn about subscription options.pp. 486-490
Papers
Web Application Intrusion Detection System for Input Validation AttackFull-text access may be available. Sign in or learn about subscription options.pp. 498-504
Papers
A Comparative Study of the Performance and Security Issues of AES and RSA CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 505-510
Showing 100 out of 221