Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICCIT
ICCIT 2008
Generate Citations
Convergence Information Technology, International Conference on
Nov. 11 2008 to Nov. 13 2008
ISBN: 978-0-7695-3407-7
Volume:
1
2
Table of Contents
Papers
Implementation Model for RDF Access Control Using Oracle VPD Security Model: Practical Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1101-1106
Papers
[Copyright notice - Volume 2]
Freely available from IEEE.
pp. iv
Papers
Table of contents - Volume 2
Freely available from IEEE.
pp. v-xvii
Papers
Cost Evaluation on the SPARQL-to-SQL Translation System Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1062-1066
Papers
Performance Evaluation of XPath Form-Based Ontology Storage Model Regarding Query Processing and Ontology Update
Full-text access may be available. Sign in or learn about subscription options.
pp. 1067-1074
Papers
Semantic Interoperability for RFID Service Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1075-1080
Papers
Web Metadata Integration for Realizing the Semantic Web
Full-text access may be available. Sign in or learn about subscription options.
pp. 1095-1100
Papers
Title Page i - Volume 2
Freely available from IEEE.
pp. i
Papers
Title Page iii - Volume 2
Freely available from IEEE.
pp. iii
Papers
Welcome Message - Volume 2
Freely available from IEEE.
pp. xviii
Papers
Welcoming Address - Volume 2
Freely available from IEEE.
pp. xix
Papers
Committees - Volume 2
Freely available from IEEE.
pp. xx-xxv
Papers
A Framework of Multicast Transmission on MPLS Network Using PIM-SM Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-8
by
Md. Arifur Rahman
,
A. S. M. Samsuzzaman
,
K. A. M. Lutfullah
,
M. Z. Hassan
,
A. H. Kabir
,
M. R. Amin
Papers
A New Demapping Technique for 16-APSK Modulation for Digital Video Broadcasting in AWGN Channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-12
by
Pervaiz Ali
,
Farhan Hussain
,
Jechang Jeong
Papers
An Efficient Flooding Algorithm for Position-Based Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-20
by
Chan Jaegal
,
Chaewoo Lee
Papers
Architecture and Protocols for Secure LAN by Using a Software-Level Certificate and Cancellation of ARP Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-26
by
Detchasit Pansa
,
Thawatchai Chomsiri
Papers
Congestion Control for Highly Loaded DiffServ/MPLS Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-32
by
Srecko Krile
Papers
Cross-Layer Optimization Based 802.11e MAC Processor toward Wireless Body Area Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-37
by
Youjin Kim
,
Hyungsoo Lee
,
Jaeyoung Kim
Papers
Design and Implementation of V6GEN and V6PCF: A Compact IPv6 Packet Generator and a New Packet Classification Framework for IPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-43
by
Seong-Yee Phang
,
HoonJae Lee
,
Hyotaek Lim
Papers
Design and Implementation of V6SNIFF: An Efficient IPv6 Packet Sniffer
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-49
by
Seong-Yee Phang
,
HoonJae Lee
,
Hyotaek Lim
Papers
Determining the Size of a Static Segment and Analyzing the Utilization of In-vehicle FlexRay Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-53
by
Minkoo Kang
,
Kiejin Park
,
Bongjun Kim
Papers
Dual Handover Procedures for FA Load Balancing in WiBro Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-59
by
Kyung Pil Moon
,
Jinwook Park
,
Jisun Kim
,
Hyunseung Choo
,
Min Young Chung
Papers
End-to-End Tomography and Congestion Control on Multicast Based Videoconferencing
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Xuan Zhang
,
Xing Li
,
Chongrong Li
Papers
Hierarchical Scheduling for Real-Time Distributed Systems Integrating a Validation Resource and a Performance Metric
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-69
by
Antonio Men?ndez L. de C.
,
H?ctor Ben?tez-P?rez
Papers
High Speed Binomial Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-75
by
Yang Xiaogang
Papers
I/O Buffer Cache Mechanism Based on the Frequency of File Usage
Full-text access may be available. Sign in or learn about subscription options.
pp. 76-82
by
Tatsuya Katakami
,
Toshihiro Tabata
,
Hideo Taniguchi
Papers
Improving TCP Performance over WiMAX Networks Using Cross-Layer Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-88
by
Jin Hwang
,
Sang Woo Son
,
Byung Ho Rhee
Papers
IMS Interworking Using IBCF
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-94
by
R. Vargic
,
M. Krhla
,
S. Schumann
,
I. Kotuliak
Papers
Inter-carrier Interference Self-Cancellation Scheme with Improved Bandwidth Efficiency for OFDM Transmission Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-99
by
Yeon-Ho Chung
Papers
Investigating the Relationship between IS Project Risk and Project Performance
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Chun-Hui Wu
,
Shiow-Luan Wang
,
Kwoting Fang
Papers
Low-Cost Application-Aware DVFS for Multi-core Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-111
by
Joonho Kong
,
Jinhang Choi
,
Lynn Choi
,
Sung Woo Chung
Papers
Modeling Unknown Web Attacks in Network Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-116
by
Liang Guangmin
Papers
New Techniques to Reduce Sidelobes in OFDM System
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-121
by
Saleem Ahmed
,
Razi Ur Rehman
,
Humor Hwang
Papers
Nonlinear AQM for Multiple RED Routers
Full-text access may be available. Sign in or learn about subscription options.
pp. 122-127
by
Lingyun Lu
,
Yang Xiao
,
Seok Woo
,
Kiseon Kim
Papers
Ontology-Based Fuzzy Semantic Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-133
by
Yang Cheng
Papers
Ontology-Based Resource Management Model for Computational Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-139
by
Yong Beom Ma
,
Chang Hyen Noh
,
Jong Sik Lee
Papers
Performance Improvement and Low Power Design of Embedded Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Hongkyun Jung
,
Hyoungjun Kim
,
Kwangmyoung Kang
,
Kwangki Ryoo
Papers
Proposal of Instant Synchronous Interprocess Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-149
by
Toshihiro Tabata
,
Kazuhiro Fukutomi
,
Hideo Taniguchi
Papers
Proposal of Mobile Content Delivery Based on Location Estimation with Active RFID
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Tomohisa Yamashita
,
Daisuke Takaoka
,
Noriaki Izumi
,
Akio Sashima
,
Koichi Kurumatani
,
Koiti Hasida
Papers
Reactive Chord for Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Young Hyo Yoon
,
Hu Keun Kwak
,
Kyu Sik Chung
Papers
Study on Automatic Forecasted Process Generation System for Frame Construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-165
by
Jeong-Phil Choi
,
Kyung-Hun Kim
,
Yoon-Sun Lee
,
Kyung-Hwan Kim
,
Jae-Jun Kim
Papers
Towards a Multi-agent Framework for Fault Tolerance and QoS Guarantee in P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-171
by
Nikta Dayhim
,
Amir Masoud Rahmani
,
Sepideh Nazemi Gelyan
,
Golbarg Zarrinzad
Papers
A Design and Simulation for Dynamically Reconfigurable Systolic Array
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-175
by
Toshiyuki Ishimura
,
Akinori Kanasugi
Papers
Frequency Distribution Optimal Diversity System Using Low Correlated Carrier in PB/MC-CDMA System
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-181
by
Kyujin Lee
,
Namil Kim
,
Kyesan Lee
Papers
A Multiple Ant Colony System for Dynamic Vehicle Routing Problem with Time Window
Full-text access may be available. Sign in or learn about subscription options.
pp. 182-187
by
Ashek Ahmmed
,
Md. Ali Ahsan Rana
,
Abul Ahsan Md. Mahmudul Haque
,
Md. Al Mamun
Papers
A New Approach for Open Shortest Path Weight Setting Problem (OSPFWSP)
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-193
by
Ahmed Abo Ghazala
,
Ayman El-Sayed
,
Mervat Mosa
Papers
A New Architecture for Better Resource Management in Grid Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-198
by
Elaheh Afrash
,
Amir Masoud Rahmani
Papers
A New Interestingness Measure for Associative Rules Based on the Geometric Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-203
by
Azarakhsh Jalalvand
,
Behrouz Minaei
,
Golnaz Atabaki
,
Shahab Jalalvand
Papers
A New Load Balanced Survivable Routing Algorithm in Multi-domain WDM Optical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-208
by
Lei Guo
,
Xingwei Wang
,
Ying Li
,
Chongshan Wang
,
Hongming Li
,
Hongpeng Wang
,
Xin Liu
Papers
A New Sub-path Protection Algorithm Based on Auxiliary Virtual Topology in WDM Optical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-213
by
Xuekui Wang
,
Lei Guo
,
Xingwei Wang
,
Yu Zhang
,
Xiaobing Zheng
Papers
A Recommendation Agent System Using HMM-Based Collaborative Filtering in Smart Home Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-217
by
Jong-Hun Kim
,
Kyung-Yong Chung
,
Joong-Kyung Ryu
,
Kee-Wook Rim
,
Jung-Hyun Lee
Papers
A Study on Direct Connection Method from Outside NAT to the Inside
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Hyung-doh Shon
,
Seok-jun Han
,
Seung-chan Kang
Papers
A Study on the Hardware Implementation Of EDAC
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-225
by
Li Hao
,
Lixin Yu
Papers
A Vertical Handoff Algorithm Using MN Velocity for WiBro and WLAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-232
by
Bin Cha
,
GangHeok Kim
,
Yeomin Choi
,
JooSeok Song
Papers
An Adaptive Approach to Alleviate Broadcasting Redundancy in MANET Address Autoconfiguration Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-240
by
Sang-Chul Kim
Papers
CAL: A Model of Providing High Quality Service in TTI Service System
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-247
by
Lv Weifeng
,
Yu Haitao
,
Zhu Tongyu
,
Zhou Yixin
Papers
Computer Vision Inspection for IC Wafer Based on Character of Pixels Distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-251
by
Wu Liming
,
Wu Fengjie
,
Wang Guitang
Papers
Constructing Complete Binary Trees on Petersen-Torus Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-255
by
Seo Jung-hyun
,
Lee HyeongOk
,
Jang Moon-suk
Papers
Design and Implementation of a Linux Phone Emulator Supporting Automated Application Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-259
by
Jae-Ho Lee
,
Yeung-Ho Kim
,
Sun-Ja Kim
Papers
Dimensioning of Next Generation Networks Multiservice Gateway for Achieving a Quality of Service Target
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-267
by
Cherif Ghazel
,
Leila Sa?dane
Papers
Discovering Learning Pattern in Different Cognitive Style of Learners
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-273
by
Hung-Ju Lin
,
Ling-Hsiu Chen
Papers
Error Performance of Low-Priority Data in Advanced T-DMB System
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-277
by
Li Erke
,
Sunggaun Kim
,
Hanjong Kim
Papers
Grid-Based Approach for Energy-Balanced Node Deployment Control in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-285
by
Il-Yong Choi
,
Min-Han Shon
,
Hyunseung Choo
,
Tai-Myoung Chung
Papers
Heterogeneous Architecture-Based Software Reliability Estimation: Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-290
by
Ying Wei
,
Xiang-Heng Shen
Papers
Implementation of IEEE 802.11a Wireless LAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-296
by
Hyun Lee
,
Je-Hoon Lee
,
Seok-Man Kim
,
Kyoung-Rok Cho
Papers
Multi Rate Adaptive Cluster Spreading OFDMA System
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-302
by
Kyujin Lee
,
Kyesan Lee
Papers
Optimal Routing and Hamiltonian Cycle in Petersen-Torus Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
Seo Jung-hyun
,
Lee HyeongOk
,
Jang Moon-suk
Papers
Performance Analysis of mmWave WPAN MAC Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-316
by
S. Mehta
,
Kyung Sup Kwak
Papers
Performance Analysis of Random Beamforming for MIMO Broadcast Channel: Outage Probability Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-323
by
Yohan Kim
,
Hyukjin Chae
,
Kiyeon Kim
,
Janghoon Yang
,
Dong Ku Kim
Papers
Reputation Based Access Point Selection in 802.11 Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-329
by
Qing Ding
,
XinMing Zhang
,
Xi Li
,
XueHai Zhou
Papers
Research for Load Balance Algorithms Based on Queue Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-333
by
Jiong Li
,
GuangChun Luo
,
Haoran Chen
Papers
Resource Allocation and Power Control for Mobile Relay in TDD-OFDMA Downlink
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-339
by
Dae Wook Byun
,
Young Min Cho
,
Dong Ku Kim
Papers
Study on IMS Service Broker
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-343
by
Ning Xia
,
Wen Jun Zhai
Papers
The Learning Cycle of Individual Digital Competency in Organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-350
by
Sang Jun Yoo
,
Choon Seong Leem
,
Byeong Wan Kim
Papers
A New CRT-RSA Scheme Resistant to Power Analysis and Fault Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
JaeCheol Ha
,
ChulHyun Jun
,
JeaHoon Park
,
SangJae Moon
,
CkangKyun Kim
Papers
A New Trapdoor in Knaspsack Public-Key Cryptosystem with Two Sequences as the Public Key
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-362
by
Yasuyuki Murakami
,
Takeshi Nasako
,
Masao Kasahara
Papers
A Note on Security of KMN PKC
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-367
by
Takeshi Nasako
,
Yasuyuki Murakami
,
Masao Kasahara
Papers
A Secure Remote User Authentication Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-373
by
Ji-Hye Park
,
Seong Jun Yim
,
Jik Hyun Chang
Papers
A Study on the Authentication Method for TAmI in Ambient Intelligence (Secure Group Decision Making Toolkit)
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-379
by
Hoon Ko
,
Carlos Freitas
,
Goreti Marreiros
,
Carlos Ramos
Papers
Achieving Interoperability in Conditional Access Systems through the Dynamic Download and Execution of Cryptographic Software for the IPTV System
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-385
by
Jinyoung Moon
,
Jungtae Kim
,
Jongyoul Park
,
Euihyun Paik
Papers
An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-395
by
Lishoy Francis
,
Keith Mayes
,
Konstantinos Markantonakis
Papers
An Efficient Multi-server Password Authenticated Key Agreement Scheme Revisited
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-400
by
Meng-Hui Lim
,
Sanggon Lee
,
Hoonjae Lee
Vulnerability Analysis for X86 Executables Using Genetic Algorithm and Fuzzing
Full-text access may be available. Sign in or learn about subscription options.
pp. 491-497
by
Guang-Hong Liu
,
Gang Wu
,
Zheng Tao
,
Jian-Mei Shuai
,
Zhuo-Chun Tang
Papers
An Improvement of Cyclic Vector Multiplication Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-405
by
Hidehiro Kato
,
Yasuyuki Nogami
,
Tomoki Yoshida
,
Kenta Nekado
,
Shoichi Takeuchi
,
Yoshitaka Morikawa
Papers
An Improvement of Twisted Ate Pairing with Barreto?Naehrig Curve by Using Frobenius Mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-410
by
Yumi Sakemi
,
Hidehiro Kato
,
Yasuyuki Nogami
,
Yoshitaka Morikawa
Papers
Attak Flow Traceback
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-415
by
Heejin Jang
,
Hosang Yun
,
Seongkee Lee
Papers
CADE: Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 416-422
by
Young Ki Kim
,
Hwaseong Lee
,
Kwantae Cho
,
Dong Hoon Lee
Papers
Age in Ubiquitous Computing: A Thin Thread
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-429
by
S?bastien Duval
,
Christian Hoareau
,
Hiromichi Hashizume
Papers
Efficient Pairings on Twisted Elliptic Curve
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-439
by
Yasuyuki Nogami
,
Masataka Akane
,
Yumi Sakemi
,
Yoshitaka Morikawa
Papers
GMEM-BSG: An Improved Large-Scale Memory Sequence Generator for Ubiquitous Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-445
by
HoonJae Lee
,
SangGon Lee
,
HyoTaek Lim
,
HeungKuk Jo
Papers
Implementation of Real Time DMB Encryption on PMP for Copyright Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-449
by
Seong-Yeon Lee
,
Kwang-Seok Moon
,
Jong-Nam Kim
Papers
Implementation of Watermark Detection System for Hardware Based Video Watermark Embedder
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-453
by
Yong-Jae Jeong
,
Won-Hee Kim
,
Kwang-Seok Moon
,
Jong-Nam Kim
Papers
IP Traceback Methodology Using Markov Chain and Bloom Filter in 802.16e
Full-text access may be available. Sign in or learn about subscription options.
pp. 454-459
by
Do Hoon Kim
,
Hoh Peter In
,
Byungsik Yoon
Papers
Processing Certificate of Authorization with Watermark in Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 460-465
by
Tsang-Yean Lee
,
Huey-Ming Lee
,
Nai Wen Kuo
,
Ming Kao
Papers
Secure Mutual Authentication and Fair Billing for Roaming Service in Wireless Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 466-471
by
Tae Ryung Im
,
Hwaseong Lee
,
Kwan Tae Cho
,
Dong Hoon Lee
Papers
Sniffing Packets on LAN without ARP Spoofing
Full-text access may be available. Sign in or learn about subscription options.
pp. 472-477
by
Thawatchai Chomsiri
Papers
Systematic Generation of An Irreducible Polynomial of an Arbitrary Degree m over Fp Such That p > m
Full-text access may be available. Sign in or learn about subscription options.
pp. 478-485
by
Hiroaki Nasu
,
Yasuyuki Nogami
,
Yoshitaka Morikawa
,
Shigeki Kobayashi
,
Tatsuo Sugimura
Papers
Top 10 Free Web-Mail Security Test Using Session Hijacking
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-490
by
Preecha Noiumkar
,
Thawatchai Chomsiri
Papers
Web Application Intrusion Detection System for Input Validation Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-504
by
YongJoon Park
,
JaeChul Park
Papers
A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-510
by
Abdullah Al Hasib
,
Abul Ahsan Md. Mahmudul Haque
Showing 100 out of 221
Load More
Load All