Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICOIN
ICOIN 2013
Generate Citations
2013 International Conference on Information Networking (ICOIN)
Jan. 28 2013 to Jan. 30 2013
Bangkok
Table of Contents
Papers
[Front matter]
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
Papers
Table of contents
Full-text access may be available. Sign in or learn about subscription options.
pp. 2
Papers
[Back matter]
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-24
Program
Freely available from IEEE.
pp. 1-24
Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
P. Jongsuebsuk
,
N. Wattanapongsakorn
,
C. Charnsripinyo
Multi-photon implementation of three-stage quantum cryptography protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-11
by
S. Mandal
,
G. Macdonald
,
Mayssaa El Rifai
,
N. Punekar
,
F. Zamani
,
Yuhua Chen
,
S. Kak
,
P. K. Verma
,
R. C. Huck
,
J. Sluss
A study on stream assignment method for secure MIMO communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-17
by
S. Shimosaka
,
K. Umebayashi
,
Y. Suzuki
An enhanced measurement transmission scheme for privacy protection in smart grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-23
by
Shi Li
,
Kyung Choi
,
Kijoon Chae
A holistic immune system against active P2P worms
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-29
by
Eng Keong Lua
,
Ruichuan Chen
Detecting protected links to keep reachability to server against failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-35
by
K. Imagawa
,
H. Miwa
QRMSC: Efficient QoS-aware relay node placement in wireless sensor networks using Minimum Steiner tree on the Convex hull
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-41
by
Sookyoung Lee
,
Meejeong Lee
Movement path estimation for multiple humans in a room using binary infrared sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Y. Kasama
,
T. Miyazaki
Latency aware Broadcast Scheduling in Duty Cycled wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-53
by
Duc Tai Le
,
Thong Le Duc
,
V. V. Zalyubovskiy
,
Hyunseung Choo
Information discovery in multidimensional wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-59
by
M. Tissera
,
R. Doss
,
Gang Li
,
L. Batten
Game theory for misbehaving detection in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Imeddine Ben Abid
,
N. Boudriga
Improved DOA estimation of correlated signals in correlated antenna noises environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-70
by
Ill-Keun Rhee
,
Hee-Soo Kim
Potential based routing in B-P2i− architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-76
by
Menghan Li
,
Xiaoping Zhang
,
Yupeng Tian
,
Haixiang Zhang
A trust-based routing strategy in structured P2P overlay networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
Yang Han
,
K. Koyanagi
,
T. Tsuchiya
,
T. Miyosawa
,
H. Hirose
Energy-efficient flow control and routing for clustered wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-88
by
Soo-Hoon Moon
,
Seung-Jae Han
,
Sunju Park
Multi-metric geo-routing protocol for tactical ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-94
by
Hyochun Ahn
,
Youn Seo
,
Jaebeom Kim
,
Young-Bae Ko
,
Cheolhyo Lee
,
Chang-Joo Kim
Implementation and validation of an address resolution mechanism using adaptive routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-100
by
S. Schellenberg
,
P. Begerow
,
M. Hager
,
J. Seitz
,
T. Finke
,
J. Schroeder
Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-106
by
A. B. Souza
,
J. Celestino
,
F. A. Xavier
,
F. D. Oliveira
,
A. Patel
,
M. Latifi
Distributed mobility management in proxy mobile IPv6 using hash function
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-112
by
Ji In Kim
,
Seok Joo Koh
Real-time traffic control for multihomed devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-118
by
T. Frantti
,
M. Majanen
Mobile content distribution and selective traffic offload in the 3GPP evolved packet system (EPS)
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
Nicholas Katanekwa
,
Neco Ventura
PMIPv6-based make-before-break handover for real-time services in 3GPPs Evolved Packet Core
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-130
by
C. John
,
S. Madlopha
,
N. Ventura
Service engagement model for mobile advertising based on user behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-134
by
A. Kaasinen
,
Yong-Ik Yoon
Implementation of open Two-Factor Authentication service applied to Virtual Private Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-140
by
Pham Ngoc Thanh
,
Keecheon Kim
End-to-end performance analysis based on cross-layer retransmission scheme in wireless communication system
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-144
by
Kwang-Chun Go
,
Jae-Ryong Cha
,
Seong Keun Oh
,
Jae-Hyun Kim
End-to-end delay analysis method for tandem switches with variable bandwidth links
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-150
by
O. Takada
,
K. Ohshima
,
M. Terada
Performance evaluation of synchronous distributed wireless network emulator for high-speed mobility
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-156
by
T. Tsutsumi
,
M. Koizumi
,
T. Ebata
,
K. Ohshima
,
M. Terada
FPGA implementation of human emotion reasoning engine
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-162
by
Kwang-Soon Choi
,
Young-Choong Park
,
Byoung-Ha Park
,
Sung-Hee Hong
,
Kwang-Mo Jung
Optimal network selection coordination in heterogeneous Cognitive Radio Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-168
by
Tuan LeAnh
,
Mui Van Nguyen
,
C. T. Do
,
Choong Seon Hong
,
Sungwon Lee
,
Jin Pyo Hong
Deterministic time pattern based channel selection in cognitive Radio network
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-174
by
Vishram Mishra
,
Lau Chiew Tong
,
Chan Syin
An evolution-inspired algorithm for efficient dynamic spectrum selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-180
by
C. S. Barbosa
,
V. C. M. Borges
,
S. Correa
,
K. V. Cardoso
An efficient blind turbo equalizer for compensating Doppler effects
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-185
by
Do-Hoon Kim
,
Heung-Gyoon Ryu
An approach with two-stage mode to detect cache-based side channel attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-191
by
Si Yu
,
Xiaolin Gui
,
Jiancai Lin
A green rate-and-power control transmission scheme in multi-carrier base stations
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-197
by
Yao-Liang Chung
Dual-radios hypermesh network based on CSMA protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-203
by
Nuredin Ali Salem Ahmed
,
A. Emhemmed
,
K. Elgaid
An adaptive probe selection mechanism for k-link fault diagnosis on all-optical mesh networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Chi-Shih Chao
,
Szu-Pei Lu
Requirements of secure WSN-MCN edge router
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
T. Frantti
,
H. Hietalahti
,
R. Savola
A cooperative TDMA MAC protocol using dynamic slot assignment scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-220
by
Jong-Kwan Lee
,
Hong-Jun Noh
,
Jaesung Lim
Border surveillance using sensor based thick-lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-226
by
R. Bellazreg
,
N. Boudriga
,
Sunshin An
An enhanced approach for estimating writable working set by pre-copy and prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-231
by
Tin-Yu Wu
,
Wei-Tsong Lee
,
Jhih-Siang Huang
,
Chien-Yu Duan
,
Tain-Wen Suen
A novel approach for developing interoperable services in cloud environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-237
by
Binh Minh Nguyen
,
Viet Tran
,
Ladislav Hluchy
A solution of thin-thick client collaboration for data distribution and resource allocation in cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-243
by
Pham Phuoc Hung
,
Bui Tuan-Anh
,
Eui-Nam Huh
Design and performance evaluation for Hadoop clusters on virtualized environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-249
by
M. Ishii
,
Jungkyu Han
,
H. Makino
A study of secure data transmissions in mobile cloud computing from the energy consumption side
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-255
by
Jin-A Hong
,
Sangmin Seo
,
Namgi Kim
,
Byoung-Dai Lee
A study on switching symbol timing detection method for continuous OFDM signals
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-261
by
K. Ota
,
K. Miyasaka
,
T. Nagahashi
,
Y. Nogami
,
S. Tada
,
H. Matsue
Alternate time-switched multiplexed space-time block coding technique for single-carrier modulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-267
by
Hyeok Koo Jung
A study on detection method of same spreading code signals by multimodulus algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-273
by
G. Murata
,
K. Umebayashi
,
Y. Suzuki
Design of modified Sierpinski fractal based miniaturized patch antenna
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-279
by
S. Shrestha
,
Seung-Jo Han
,
Sun-Kuk Noh
,
Sunwoong Kim
,
Hyun-Bai Kim
,
Dong-You Choi
Cooperation through secondary relaying in TDMA cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-285
by
YoungJu Hwang
,
Seong-Lyun Kim
A distributed quasi-orthogonal space time block code for cooperative communication with information exchange errors for decode-and-forward relay networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-290
by
Shu-Ming Tseng
,
Yueh-Teng Hsu
,
Shiou-Cheng Ren
Inter-domain connection of reload-based peer-to-peer overlays
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-296
by
J. Schneider
,
E. Korner
,
L. Grimm
A fuzzy cache lifetime determination scheme for LISP mapping systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 297-302
by
Sheng-Chang Chen
,
Chung-Ju Chang
,
Yu-Huang Chu
Approach for service search and peer selection in P2P service overlays
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
A. Fiorese
,
P. Simoes
,
F. Boavida
Application of genetic algorithm for logistics based on multi-agent system
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-314
by
Ho Kuen Song
,
Kwang Myung Kim
,
Kyung Tae Kim
,
Hee Yang Youn
Threat of DoS by interest flooding attack in content-centric networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-319
by
Seungoh Choi
,
Kwangsoo Kim
,
Seongmin Kim
,
Byeong-hee Roh
Contents sharing using PPSP in DLNA-based networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-323
by
Hyunwoo Nam
,
Younghan Kim
Hybrid spectrum sharing in dynamic spectrum access networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-329
by
S. S. Nair
,
S. Schellenberg
,
J. Seitz
,
M. Chatterjee
Alternating renewal framework for estimation in spectrum sensing policy and proactive spectrum handoff
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-335
by
Thant Zin Oo
,
Choong Seon Hong
,
Sungwon Lee
Pre- and post- equalization technique combining for wireless communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-340
by
S. Kanthalue
,
P. Nanan
A threshold-based frequency offset estimation scheme for OFDM systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-345
by
Youngpo Lee
,
Jaewoo Lee
,
Youngseok Lee
,
Jeongyoon Shim
,
Seokho Yoon
An adaptive channel number tuning mechanism on parallel transfer with UDT
Full-text access may be available. Sign in or learn about subscription options.
pp. 346-350
by
Jongseon Park
,
Dosik An
,
Gihwan Cho
QoS-aware hierarchical token bucket (QHTB) queuing disciplines for QoS-guaranteed Diffserv provisioning with optimized bandwidth utilization and priority-based preemption
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-358
by
Chang-Hwan Lee
,
Young-Tak Kim
PACS metric based on regression for evaluating end-to-end QoS capability over the Internet for telemedicine
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-364
by
S. Chimmanee
Transformation based low complexity algorithm for Nash bargaining solutions in dynamic networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-370
by
Eunhye Choi
,
Hyunggon Park
VoIP call admission control scheme considering VoIP on-off patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-374
by
Ji-Young Jung
,
Dong-Yoon Seo
,
Jung-Ryun Lee
Time synchronization protocol in ad hoc network
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-378
by
Yun-Jae Shin
,
Jung-Ryun Lee
Price-based tethering for cooperative networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-384
by
Jisub Lee
,
Chenglong Shao
,
Heejun Roh
,
Wonjun Lee
R-HWMP: Reservation-based HWMP supporting end-to-end QoS in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-390
by
Whoi Jin Jung
,
Seok Hong Min
,
Bong Gyu Kim
,
Hyung Suk Choi
,
Jae Yong Lee
,
Byung Chul Kim
Agent driven multi-constrained quality of service anycast routing in mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-396
by
Vijayashree Budyal
,
S. S. Manvi
,
S. G. Hiremath
Dynamic TXOP allocation for multimedia QoS providing over wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-401
by
Kwangsung Ju
,
Kwangsue Chung
Priority-based contention period allocation for directional CSMA/CA in smart home
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-406
by
Yongsun Kim
,
Hoyong Kang
OSLMAC: One-step look-ahead MAC protocol for concurrent transmission over wireless ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-411
by
Jiseon Lee
,
Hyeonmok Ko
,
Cheeha Kim
Indoor localization improvement via adaptive RSS fingerprinting database
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-416
by
C. Koweerawong
,
K. Wipusitwarakun
,
K. Kaemarungsi
Improved AOMDV to increase path stability by utilizing the node mobility information in MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-422
by
Ran Park
,
Wuwoan Kim
,
Sangdong Jang
Weighted bandwidth sharing scheme to guarantee the video quality in home networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-427
by
Dooyeol Yoon
,
Sungchang Lee
,
Jinpyo Hong
,
Kwangsue Chung
Transmission frame assignment for latency-bounded data delivery in wsns
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-433
by
Eui-Jik Kim
,
Jung-Hyok Kwon
,
Chul-Hee Kang
,
Sang-Hong Lee
Performance evaluation of Cognitive Radio Network Predictive MAC (P-MAC) access algorithm and its enhancement
Full-text access may be available. Sign in or learn about subscription options.
pp. 434-439
by
H. Hussein
,
H. A. Elsayed
,
S. Elramly
An efficient iterative detection scheme for coded MIMO systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-443
by
Saleem Ahmed
,
Sooyoung Kim
Self-evaluating reinforcement learning based spectrum management for cognitive Ad Hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-449
by
E. E. Ozekin
,
F. C. Demirci
,
F. Alagoz
Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 450-455
by
N. Maki
,
T. Nishio
,
R. Shinkuma
,
T. Takahashi
,
T. Mori
,
N. Kamiyama
,
R. Kawahara
Proactive cache management method for content hash based distributed archive system
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-461
by
Yutaka Yasuda
,
S. Ata
,
I. Oka
An intelligent approach for virtual machine and QoS provisioning in cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-467
by
A. K. Das
,
T. Adhikary
,
M. A. Razzaque
,
Choong Seon Hong
Security issues in vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 468-472
by
Yeongkwun Kim
,
Injoo Kim
Security tactics for secured cloud computing resources
Full-text access may be available. Sign in or learn about subscription options.
pp. 473-475
by
ByungRae Cha
,
Jongwon Kim
A Network Partition Scheme to protect secure zone for malicious code
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-480
by
Jungeun Jee
,
Joopal Jang
,
Inhee Jo
,
Yongtae Shin
iPanda: A comprehensive malware analysis tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-486
by
Peidai Xie
,
Xicheng Lu
,
Jinshu Su
,
Yongjun Wang
,
Meijian Li
Media adaptation model based on character object for cognitive TV
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-492
by
S. Kim
,
Yong-Ik Yoon
A new video search approach based on user's preference and query ambiguity
Full-text access may be available. Sign in or learn about subscription options.
pp. 493-498
by
Wangxi Jia
,
Hai Jin
,
Xiaofei Liao
Multi-supplier integration management for public protection and disaster relief (PPDR) organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 499-504
by
Jyri Rajamaki
,
M. Vuorinen
A comparative study on wireless backhaul solutions for beyond 4G network
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-510
by
Xin Su
,
KyungHi Chang
Novel bulletin board system based on document object model and client-side scripting for improved interaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 511-516
by
Jung Uye Hong
,
Myoungbeom Chung
,
Hyunseung Choo
Binary-tree-based high speed packet classification system on FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-522
by
Jingjiao Li
,
Yong Chen
,
Cholman Ho
,
Zhenlin Lu
Ontology modeling for REST Open APIs and web service mash-up method
Full-text access may be available. Sign in or learn about subscription options.
pp. 523-528
by
Wan Jung
,
Sang Il Kim
,
Hwa Sung Kim
A new estimation method using RTT for available bandwidth of a bottleneck link
Full-text access may be available. Sign in or learn about subscription options.
pp. 529-534
by
M. Imai
,
Y. Sugizaki
,
K. Asatani
Efficient control plane for passive optical burst switching network
Full-text access may be available. Sign in or learn about subscription options.
pp. 535-540
by
A. Triki
,
P. Gavignet
,
B. Arzur
,
E. L. Rouzic
,
A. Gravey
A novel approach for designing a feedback controller of linear time invariant networked control systems with delayed-transmission time
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-546
by
Hatim G. Zaini
Showing 100 out of 132
Load More
Load All