Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICDCSW
ICDCSW 2008
Generate Citations
2008 The 28th International Conference on Distributed Computing Systems Workshops
June 17 2008 to June 20 2008
ISSN: 1545-0678
ISBN: 978-0-7695-3173-1
Table of Contents
Papers
[Publisher information]
Freely available from IEEE.
pp. 606
Papers
Table of contents
Freely available from IEEE.
pp. v-xv
Papers
ADSN 2008 Reviewers
Freely available from IEEE.
pp. xxix
Papers
Coverage Based Testing for Concurrent Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 533-538
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
WCPS 2008 reviewers
Freely available from IEEE.
pp. xxvi
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Welcome Message from the Conference Chairs
Freely available from IEEE.
pp. vi
Papers
Welcome Message from the Workshop Co-Chairs
Freely available from IEEE.
pp. vii-viii
Papers
Message from MNSA-2008 International Workshop Organizers
Freely available from IEEE.
pp. ix
Papers
MNSA 2008 Organizing Committee
Freely available from IEEE.
pp. x
Papers
Message from the WiMAN 2008 Chairs
Freely available from IEEE.
pp. xi
Papers
WiMAN 2008 Organizing Committee
Freely available from IEEE.
pp. xii-xiii
Papers
Message from the DTMN 2008 Workshop Co-Chairs
Freely available from IEEE.
pp. xiv
Papers
DTMN 2008 Organizing Committee
Freely available from IEEE.
pp. xv
Papers
Message from the TRAM 2008 Program Chairs
Freely available from IEEE.
pp. xvi
Papers
TRAM 2008 Organizing Committee
Freely available from IEEE.
pp. xvii
Papers
Message from the WWASN 2008 Chairs
Freely available from IEEE.
pp. xviii
Papers
WWASN 2008 Organizing Committee
Freely available from IEEE.
pp. xix
Papers
Message from the WiSP 2008 Workshop Chairs
Freely available from IEEE.
pp. xx
Papers
WiSP 2008 Workshop Organization
Freely available from IEEE.
pp. xxi
Papers
Message from the CDS 2008 Workshop Organizers
Freely available from IEEE.
pp. xxii
Papers
CDS 2008 Organizing committee
Freely available from IEEE.
pp. xxiii
Papers
Message from the WCPS 2008 Co-Chairs
Freely available from IEEE.
pp. xxiv
Papers
WCPS 2008 Organizing Committee
Freely available from IEEE.
pp. xxv
Papers
Message from the ADSN 2008 Co-Chairs
Freely available from IEEE.
pp. xxvii
Papers
ADSN 2008 Organizing Committee
Freely available from IEEE.
pp. xxviii
Papers
A Protocol for Making an Agreement in a Peer-to-Peer (P2P) Society
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ailixier Aikebaier
,
Tomoya Enokido
,
Makoto Takizawa
Papers
On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Bin Chang
,
Liang Dai
,
Yi Cui
,
Yuan Xue
Papers
A Measurement Study of Cache Rejection in P2P Live Streaming System
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-17
by
Yishuai Chen
,
Changjia Chen
,
Chunxi Li
Real-Time Routing in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-119
by
Adel Ali Ahmed
,
Liza Abdul Latiff
,
M.A. Sarijari
,
Norsheila Fisal
Papers
A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-23
by
Alireza Goudarzi Nemati
,
Tomoya Enokido
,
Makoto Takizawa
Papers
Role Based Access Control in Distributed Object Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-29
by
Tomoya Enokido
,
Makoto Takizawa
Papers
Security Framework in a Virtual Large-Scale Disk System
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-35
by
Minoru Uehara
Papers
Pose Estimation for Evaluating Standing Long Jumps via Dynamic Bayesian Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-41
by
Hui-Huang Hsu
,
Yao-Bao Yen
,
Chu-Song Chen
,
Chun-Ta Ho
Papers
Delivery Infrastructure for Secure Scalable Coded Multimedia
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Markus Dunte
,
Christoph Ruland
Papers
Adaptive Layered Multimedia Transmissions over Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-53
by
Arjan Durresi
,
Vamsi Paruchuri
,
Mimoza Durresi
,
Leonard Barolli
Papers
Experimental Evaluation of Usage Pattern in Campus Mobile IP Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-59
by
Jaehyuk Ryu
,
Koji Okamura
Papers
An Adaptive Bandwidth Request Scheme for QoS Support in WiMAX Polling Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Cheng-Yueh Liu
,
Yaw-Chung Chen
Papers
Routing Efficiency of AODV and DSR Protocols in Ad-Hoc Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-71
by
Tao Yang
,
Makoto Ikeda
,
Giuseppe De Marco
,
Leonard Barolli
,
Arjan Durresi
,
Fatos Xhafa
Papers
Collaborative and Multimodal Communications System Using Immersive Virtual Reality Environment over Ultrahigh-Speed Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-77
by
Tomoyuki Ishida
,
Akihiro Miyakawa
,
Yoshitaka Shibata
Papers
Open 3D Shared Space Construction Scheme for Symbiotic Collaborative Works
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-83
by
Takayuki Kuroda
,
Akira Sakatoku
,
Gen Kitagata
,
Debasish Chakraborty
,
Norio Shiratori
Papers
Adam ? A Testbed for Distributed Virtual Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-89
by
Jan Sablatnig
,
Jiehua Chen
,
Ruedi Seiler
,
Sven Grottke
,
Andreas Kopke
,
Adam Wolisz
Papers
MultiStream ? A Cross-Platform Display Sharing System Using Multiple Video Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-95
by
Yong Liu
,
Otto J. Anshus
,
Phuong H. Ha
,
Tore Larsen
,
John Markus Bjorndalen
Papers
Bipartite Graph Based Dynamic Spectrum Allocation for Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-101
by
Jianjun Yang
,
Zongming Fei
Papers
Cross-Layer Scheduling for Multiple Video Streams over a Hierarchical Emergency-Deployed Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-107
by
Virginia Corvino
,
Velio Tralli
,
Roberto Verdone
Papers
Joint Routing and Channel Assignment in WMN Using Extended Petri Net
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-113
by
Hejiao Huang
,
Yun Peng
,
Jing Li
Papers
Fast Link Assessment in Wireless Mesh Networks by Using Non-Constant Weight Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-125
by
Ravi Nelavelli
,
Rajesh Prasad
,
Hongyi Wu
Papers
On Load Regulated CSMA
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-131
by
Manzur Ashraf
,
Aruna Jayasuriya
,
Sylvie Perreau
Papers
Maximizing Aggregate Throughput of Wireless Ad Hoc Networks Using Enhanced Physical Carrier Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-137
by
Nyein Aye Maung Maung
,
Taku Noguchi
,
Makoto Kawai
Papers
Flip Error Resistant Stitching in Sensor Network Localizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-143
by
Oh-Heum Kwon
,
Ha-Joo Song
Papers
On Improving the Precision of Localization with Gross Error Removal
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-149
by
Chongming Zhang
,
Xi Zhou
,
Chuanshan Gao
,
Chunmei Wang
Papers
Comparing the Efficiency of Localization Algorithms with the Power-Error-Product (PEP)
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-155
by
Frank Reichenbach
,
Jan Blumenthal
,
Dirk Timmermann
Papers
Local Topology Assisted XOR Coding in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Rajesh Prasad
,
Hongyi Wu
,
Dmitri Perkins
,
Nian-Feng Tzeng
Papers
Game Theoretic Packet Scheduling to Combat Non-Cooperativeness in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-167
by
Zhen Kong
,
Yu-Kwong Kwok
,
Jiangzhou Wang
Papers
A Middleware Services Simulation Platform for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-173
by
Hock Beng Lim
,
Bang Wang
,
Cheng Fu
,
Arpan Phull
,
Di Ma
Papers
An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-179
by
Enkhbold Ochirsuren
,
Leandro Soares Indrusiak
,
Manfred Glesner
Papers
Understanding the Tolerance of Dynamic Networks: A Routing-Oriented Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-185
by
Yifeng Shao
,
Jie Wu
Papers
Reliable and Efficient Alarm Message Routing in VANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-191
by
Hao Jiang
,
Hao Guo
,
Lijia Chen
Papers
A Cooperative ARQ for Delay-Tolerant Vehicular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-197
by
Juli?n Morillo Pozo
,
Oscar Trullols
,
Jos? M. Barcel?
,
Jorge Garc? Vidal
Papers
A Receiver-Based Opportunistic Forwarding Protocol for Mobile Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-203
by
Lian Li
,
Limin Sun
,
Jian Ma
,
Canfeng Chen
Papers
Reality-Check for DTN Routing Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Arshad Islam
,
Marcel Waldvogel
Papers
Bounded-Delay, Probability-Based Routing in Intermittently Connected Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
Xianning Li
,
Xianwei Zhou
Papers
Data Collection with Multiple Mobile Actors in Underwater Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-221
by
Jincheng Wang
,
Deshi Li
,
Mi Zhou
,
Dipak Ghosal
Papers
Remaining Delivery Time Estimation Based Routing for Intermittently Connected Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-227
by
Feng Liu
,
Ming Li
,
Run Zhang
,
He Zhang
,
Zhen Xu
Papers
Online Estimation of Effective Delivery Capability in Delay-Tolerant Mobile Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-233
by
Zhipeng Yang
,
Ha Dang
,
Hongyi Wu
A Grassroots Approach in P2P Reputation Studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-234
by
Xiaoming Li
Papers
H-Trust: A Robust and Lightweight Group Reputation System for Peer-to-Peer Desktop Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-240
by
Huanyu Zhao
,
Xiaolin Li
Papers
Modeling Attack Behaviors in Rating Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-248
by
Qinyuan Feng
,
Yafei Yang
,
Yan Lindsay Sun
,
Yafei Dai
Papers
On the Modeling of Honest Players in Reputation Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-254
by
Qing Zhang
,
Ting Yu
Papers
Computing Reputation Metric in Multi-Agent E-Commerce Reputation System
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-260
by
Anna Gutowska
,
Kevan Buckley
Papers
Manetkit: A Framework for MANET Routing Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-266
by
Rajiv Ramdhany
,
Geoff Coulson
Papers
The (k,l) Coredian Tree for Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 267-272
by
Amit Dvir
,
Michael Segal
Papers
An Effective Algorithm for Computing Energy-Efficient Broadcasting Trees in All-Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-278
by
Doina Bein
,
S.Q. Zheng
Papers
Fast-Converging Distance Vector Routing for Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-284
by
Yangcheng Huang
,
Saleem Bhatti
Papers
Priority-Based Coverage-Aware Congestion Control for Multihop Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-290
by
Xiaoling Qiu
,
Dipak Ghosal
,
Biswanath Mukherjee
,
Jennifer Yick
,
Deshi Li
Papers
Mobility Control for Complete Coverage in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-296
by
Zhen Jiang
,
Jie Wu
,
Robert Kline
,
Jennifer Krantz
Papers
Maintaining Connected Coverage for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-302
by
Jehn-Ruey Jiang
,
Tzu-Ming Sung
Papers
An Enhanced Sensor Scheduling Protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
Cheng Fu
,
Bang Wang
,
Hock Beng Lim
Papers
A Distributed Intrusion Detection Scheme for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
Guorui Li
,
Jingsha He
,
Yingfang Fu
Papers
Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-320
by
Yang Xiao
,
Hui Chen
,
Yanping Zhang
,
Xiaojiang Du
,
Bo Sun
,
Kui Wu
Papers
Design and Implementation of a WSN-Based Intelligent Light Control System
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-326
by
Meng-Shiuan Pan
,
Lun-Wu Yeh
,
Yen-Ann Chen
,
Yu-Hsuan Lin
,
Yu-Chee Tseng
Papers
SCALAR: Scalable Data Lookup and Replication Framework for Mobile Ad-hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-332
by
Emre Atsan
,
Oznur Ozkasap
Papers
Measuring the Node Energy Consumption in USB Based WSN Testbeds
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-338
by
Andreas Kopke
,
Adam Wolisz
Papers
Performance of Incomplete Channel Sensing for Frequency Hopping Cognitive Personal Area Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-344
by
Vojislav B. Misic
,
Jelena Misic
Papers
Impact of Selfish Rate Adaptation on the Performance in IEEE 802.11-Based Wireless Multi-Hop Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-350
by
Pei Li
,
Yinlong Xu
,
Chunpeng Zhang
Papers
Cyber Security: An Obtainable Goal?
Full-text access may be available. Sign in or learn about subscription options.
pp. 351
by
David H.C. Du
Papers
Compromised Sensor Nodes Detection: A Quantitative Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-357
by
Tao Li
,
Min Song
,
Mansoor Alam
Papers
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-363
by
Bo Zhu
,
Kui Ren
,
Lingyu Wang
Papers
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-369
by
Avinash Srinivasan
,
Feng Li
,
Jie Wu
Papers
ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 370-375
by
Haiying Shen
,
Ze Li
Papers
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-381
by
Chae Hoon Lim
Papers
Pairing Devices with Good Quality Output Interfaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-387
by
Nitesh Saxena
,
Jonathan Voris
Papers
Optimized User Revocation for Group Signature Based Privacy-Aware PKI
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-393
by
Wei Ren
,
Kui Ren
,
Wenjing Lou
Papers
Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-399
by
Yan Sun
,
Anup Kumar
Papers
n-LDA: n-Layers Data Aggregation in Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-405
by
Ioana Rodhe
,
Christian Rohner
Papers
Notes on the CRTDH Group Key Agreement Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-411
by
Spyros Magliveras
,
Wandi Wei
,
Xukai Zou
Papers
Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-416
by
Jianbo Yao
,
Guangjun Wen
Papers
Higher Confidence in Event Correlation Using Uncertainty Restrictions
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-422
by
Gerald G. Koch
,
Boris Koldehofe
,
Kurt Rothermel
Showing 100 out of 131
Load More
Load All