Default Cover Image

2013 International Conference on Information Networking (ICOIN)

Jan. 28 2013 to Jan. 30 2013

Bangkok

Table of Contents

Papers
[Front matter]Full-text access may be available. Sign in or learn about subscription options.pp. 3-6
Papers
Table of contentsFull-text access may be available. Sign in or learn about subscription options.pp. 2
Papers
[Back matter]Full-text access may be available. Sign in or learn about subscription options.pp. 17-24
ProgramFreely available from IEEE.pp. 1-24
Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A study on stream assignment method for secure MIMO communicationFull-text access may be available. Sign in or learn about subscription options.pp. 12-17
An enhanced measurement transmission scheme for privacy protection in smart gridFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
A holistic immune system against active P2P wormsFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
Detecting protected links to keep reachability to server against failuresFull-text access may be available. Sign in or learn about subscription options.pp. 30-35
Movement path estimation for multiple humans in a room using binary infrared sensorsFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
Latency aware Broadcast Scheduling in Duty Cycled wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 48-53
Information discovery in multidimensional wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 54-59
Game theory for misbehaving detection in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
Improved DOA estimation of correlated signals in correlated antenna noises environmentFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
Potential based routing in B-P2i− architectureFull-text access may be available. Sign in or learn about subscription options.pp. 71-76
A trust-based routing strategy in structured P2P overlay networksFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
Energy-efficient flow control and routing for clustered wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Multi-metric geo-routing protocol for tactical ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
Implementation and validation of an address resolution mechanism using adaptive routingFull-text access may be available. Sign in or learn about subscription options.pp. 95-100
Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 101-106
Distributed mobility management in proxy mobile IPv6 using hash functionFull-text access may be available. Sign in or learn about subscription options.pp. 107-112
Real-time traffic control for multihomed devicesFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Mobile content distribution and selective traffic offload in the 3GPP evolved packet system (EPS)Full-text access may be available. Sign in or learn about subscription options.pp. 119-124
PMIPv6-based make-before-break handover for real-time services in 3GPPs Evolved Packet CoreFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Service engagement model for mobile advertising based on user behaviorFull-text access may be available. Sign in or learn about subscription options.pp. 131-134
Implementation of open Two-Factor Authentication service applied to Virtual Private NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 135-140
End-to-end delay analysis method for tandem switches with variable bandwidth linksFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Performance evaluation of synchronous distributed wireless network emulator for high-speed mobilityFull-text access may be available. Sign in or learn about subscription options.pp. 151-156
FPGA implementation of human emotion reasoning engineFull-text access may be available. Sign in or learn about subscription options.pp. 157-162
Optimal network selection coordination in heterogeneous Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 163-168
Deterministic time pattern based channel selection in cognitive Radio networkFull-text access may be available. Sign in or learn about subscription options.pp. 169-174
An evolution-inspired algorithm for efficient dynamic spectrum selectionFull-text access may be available. Sign in or learn about subscription options.pp. 175-180
An efficient blind turbo equalizer for compensating Doppler effectsFull-text access may be available. Sign in or learn about subscription options.pp. 181-185
An approach with two-stage mode to detect cache-based side channel attacksFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
A green rate-and-power control transmission scheme in multi-carrier base stationsFull-text access may be available. Sign in or learn about subscription options.pp. 192-197
Dual-radios hypermesh network based on CSMA protocolFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
An adaptive probe selection mechanism for k-link fault diagnosis on all-optical mesh networksFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
Requirements of secure WSN-MCN edge routerFull-text access may be available. Sign in or learn about subscription options.pp. 210-215
A cooperative TDMA MAC protocol using dynamic slot assignment schemeFull-text access may be available. Sign in or learn about subscription options.pp. 216-220
Border surveillance using sensor based thick-linesFull-text access may be available. Sign in or learn about subscription options.pp. 221-226
An enhanced approach for estimating writable working set by pre-copy and predictionFull-text access may be available. Sign in or learn about subscription options.pp. 227-231
A novel approach for developing interoperable services in cloud environmentFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
Design and performance evaluation for Hadoop clusters on virtualized environmentFull-text access may be available. Sign in or learn about subscription options.pp. 244-249
A study of secure data transmissions in mobile cloud computing from the energy consumption sideFull-text access may be available. Sign in or learn about subscription options.pp. 250-255
A study on switching symbol timing detection method for continuous OFDM signalsFull-text access may be available. Sign in or learn about subscription options.pp. 256-261
Alternate time-switched multiplexed space-time block coding technique for single-carrier modulationFull-text access may be available. Sign in or learn about subscription options.pp. 262-267
A study on detection method of same spreading code signals by multimodulus algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 268-273
Design of modified Sierpinski fractal based miniaturized patch antennaFull-text access may be available. Sign in or learn about subscription options.pp. 274-279
Cooperation through secondary relaying in TDMA cellular networksFull-text access may be available. Sign in or learn about subscription options.pp. 280-285
Inter-domain connection of reload-based peer-to-peer overlaysFull-text access may be available. Sign in or learn about subscription options.pp. 291-296
A fuzzy cache lifetime determination scheme for LISP mapping systemsFull-text access may be available. Sign in or learn about subscription options.pp. 297-302
Approach for service search and peer selection in P2P service overlaysFull-text access may be available. Sign in or learn about subscription options.pp. 303-308
Application of genetic algorithm for logistics based on multi-agent systemFull-text access may be available. Sign in or learn about subscription options.pp. 309-314
Threat of DoS by interest flooding attack in content-centric networkingFull-text access may be available. Sign in or learn about subscription options.pp. 315-319
Contents sharing using PPSP in DLNA-based networksFull-text access may be available. Sign in or learn about subscription options.pp. 320-323
Hybrid spectrum sharing in dynamic spectrum access networksFull-text access may be available. Sign in or learn about subscription options.pp. 324-329
Alternating renewal framework for estimation in spectrum sensing policy and proactive spectrum handoffFull-text access may be available. Sign in or learn about subscription options.pp. 330-335
Pre- and post- equalization technique combining for wireless communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 336-340
A threshold-based frequency offset estimation scheme for OFDM systemsFull-text access may be available. Sign in or learn about subscription options.pp. 341-345
An adaptive channel number tuning mechanism on parallel transfer with UDTFull-text access may be available. Sign in or learn about subscription options.pp. 346-350
PACS metric based on regression for evaluating end-to-end QoS capability over the Internet for telemedicineFull-text access may be available. Sign in or learn about subscription options.pp. 359-364
Transformation based low complexity algorithm for Nash bargaining solutions in dynamic networksFull-text access may be available. Sign in or learn about subscription options.pp. 365-370
VoIP call admission control scheme considering VoIP on-off patternsFull-text access may be available. Sign in or learn about subscription options.pp. 371-374
Time synchronization protocol in ad hoc networkFull-text access may be available. Sign in or learn about subscription options.pp. 375-378
Price-based tethering for cooperative networkingFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
Agent driven multi-constrained quality of service anycast routing in mobile ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 391-396
Dynamic TXOP allocation for multimedia QoS providing over wireless networksFull-text access may be available. Sign in or learn about subscription options.pp. 397-401
Priority-based contention period allocation for directional CSMA/CA in smart homeFull-text access may be available. Sign in or learn about subscription options.pp. 402-406
OSLMAC: One-step look-ahead MAC protocol for concurrent transmission over wireless ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 407-411
Indoor localization improvement via adaptive RSS fingerprinting databaseFull-text access may be available. Sign in or learn about subscription options.pp. 412-416
Improved AOMDV to increase path stability by utilizing the node mobility information in MANETFull-text access may be available. Sign in or learn about subscription options.pp. 417-422
Weighted bandwidth sharing scheme to guarantee the video quality in home networksFull-text access may be available. Sign in or learn about subscription options.pp. 423-427
Transmission frame assignment for latency-bounded data delivery in wsnsFull-text access may be available. Sign in or learn about subscription options.pp. 428-433
Performance evaluation of Cognitive Radio Network Predictive MAC (P-MAC) access algorithm and its enhancementFull-text access may be available. Sign in or learn about subscription options.pp. 434-439
An efficient iterative detection scheme for coded MIMO systemsFull-text access may be available. Sign in or learn about subscription options.pp. 440-443
Self-evaluating reinforcement learning based spectrum management for cognitive Ad Hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 444-449
Proactive cache management method for content hash based distributed archive systemFull-text access may be available. Sign in or learn about subscription options.pp. 456-461
An intelligent approach for virtual machine and QoS provisioning in cloud computingFull-text access may be available. Sign in or learn about subscription options.pp. 462-467
Security issues in vehicular networksFull-text access may be available. Sign in or learn about subscription options.pp. 468-472
Security tactics for secured cloud computing resourcesFull-text access may be available. Sign in or learn about subscription options.pp. 473-475
A Network Partition Scheme to protect secure zone for malicious codeFull-text access may be available. Sign in or learn about subscription options.pp. 476-480
iPanda: A comprehensive malware analysis toolFull-text access may be available. Sign in or learn about subscription options.pp. 481-486
Media adaptation model based on character object for cognitive TVFull-text access may be available. Sign in or learn about subscription options.pp. 487-492
A new video search approach based on user's preference and query ambiguityFull-text access may be available. Sign in or learn about subscription options.pp. 493-498
Multi-supplier integration management for public protection and disaster relief (PPDR) organizationsFull-text access may be available. Sign in or learn about subscription options.pp. 499-504
A comparative study on wireless backhaul solutions for beyond 4G networkFull-text access may be available. Sign in or learn about subscription options.pp. 505-510
Binary-tree-based high speed packet classification system on FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 517-522
Ontology modeling for REST Open APIs and web service mash-up methodFull-text access may be available. Sign in or learn about subscription options.pp. 523-528
A new estimation method using RTT for available bandwidth of a bottleneck linkFull-text access may be available. Sign in or learn about subscription options.pp. 529-534
Efficient control plane for passive optical burst switching networkFull-text access may be available. Sign in or learn about subscription options.pp. 535-540
Showing 100 out of 132