Default Cover Image

Systems and Networks Communication, International Conference on

Aug. 22 2010 to Aug. 27 2010

Nice, France

ISBN: 978-0-7695-4145-7

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-x
Papers
PrefaceFreely available from IEEE.pp. xi-xii
Papers
CommitteeFreely available from IEEE.pp. xiii-xvi
Papers
list-reviewerFreely available from IEEE.pp. xvii-xix
Papers
Testbed Environment for Wireless Sensor and Actuator NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Authentication and Anti-replay Security Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 7-13
Papers
Sensor Network Management for Healthcare ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 14-20
Papers
Energy Evaluation of PMCMTP for Large-Scale Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Papers
Attacks with Steganography in PHY and MAC Layers of 802.15.4 ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Papers
Fusion-Aware Routing in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 37-45
Papers
Robustness of Receiver-Driven Multi-hop Wireless Network with Soft-State Connectivity ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
Papers
Cooperative Sensor Networks for VRU eSafetyFull-text access may be available. Sign in or learn about subscription options.pp. 52-57
Papers
Performance Evaluation of IEEE 802.15.4 MAC in Beacon-Enabled Tree-Topology Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 58-63
Papers
Robust Data Collection and Lifetime Improvement in Wireless Sensor Networks through Data ImputationFull-text access may be available. Sign in or learn about subscription options.pp. 64-69
Papers
CUPID - Communication Pattern Informed Duty Cycling in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
Papers
Obstacle Handling in Context-Aware Multilayer Hierarchical Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 76-82
Papers
ENS: An Energy Harvesting Wireless Sensor Network PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 83-87
Papers
Impact of Mobile Event Movement on the Performance of Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 88-93
Papers
Modeling Energy Consumption of Wireless Sensor Networks by SystemCFull-text access may be available. Sign in or learn about subscription options.pp. 94-98
Papers
Vehicular Networks in a Computerized City Using Safe MobileFull-text access may be available. Sign in or learn about subscription options.pp. 105-110
Papers
A Novel RSU-Based Message Authentication Scheme for VANETFull-text access may be available. Sign in or learn about subscription options.pp. 111-116
Papers
A System for Managing Vehicle Location Data with Optimal Privacy FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 124-129
Papers
Localization Using Multisensor Fusion of IMM Fixed Lag Smoother in a Cricket Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 130-135
Papers
A Trusted Platform Module for Near Field CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 136-141
Papers
Multiple Loop Antenna against Skimming AttackFull-text access may be available. Sign in or learn about subscription options.pp. 142-147
Papers
Server Impersonation Attacks and Revisions to SLAP, RFID Lightweight Mutual Authentication ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 148-153
Papers
An Approach for Protecting Privacy on Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 154-159
Papers
An Improved Multi-path Key Establishment under REM Attacks in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 160-165
Papers
A Process Approach to Manage the Security of the Communication Systems with Risk Analysis Based on Epidemiological ModelFull-text access may be available. Sign in or learn about subscription options.pp. 166-171
AES Performance Analysis on Several Programming Environments, Operating Systems or Computational PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 172-176
Papers
Efficient Uniform k-out-of-n GeneratorsFull-text access may be available. Sign in or learn about subscription options.pp. 177-182
Papers
A Secure Gateway Service for Accessing Networked AppliancesFull-text access may be available. Sign in or learn about subscription options.pp. 183-188
Papers
A Security Framework to Protect against Social Networks Services ThreatsFull-text access may be available. Sign in or learn about subscription options.pp. 189-194
Papers
Performance Evaluation of a Disaster Recovery System and Practical Network System ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 195-200
Papers
High Avaliability: A Long-Term Feature in Network ElementsFull-text access may be available. Sign in or learn about subscription options.pp. 201-206
Papers
Collaborative Streaming for Colocated Subscribers in Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 207-212
Papers
Automatic Deployment of a Communication Mesh for Synchronous e-Learning ActivitiesFull-text access may be available. Sign in or learn about subscription options.pp. 213-220
Papers
An Aircraft Based Emulation Platform for LEO Satellite Antenna Beam SteeringFull-text access may be available. Sign in or learn about subscription options.pp. 221-228
Papers
Investigation of Channel Formation in a MANETFull-text access may be available. Sign in or learn about subscription options.pp. 229-231
Papers
Computation of a Nash Equilibrium of Multiple-Leader Stackelberg Network GamesFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
Papers
Continuous Nearest Neighbor Queries in Weight Changing Road NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 243-248
Papers
Handing Multiple Communications Sessions for the Next Generation of Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 249-254
Papers
Physical Layer Impact in Wireless Ad Hoc Network RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 255-261
Papers
Evaluation of Quality-of-Service Support in MultiProtocol Label SwitchingFull-text access may be available. Sign in or learn about subscription options.pp. 262-265
Papers
Estimation of Subjective Video Quality as Feedback to Content ProvidersFull-text access may be available. Sign in or learn about subscription options.pp. 266-271
Papers
Creating Web Services Using a Rule-Based LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
A Unicast-Based IPTV Service ControlFull-text access may be available. Sign in or learn about subscription options.pp. 278-282
Papers
IMS Centralized Network Architecture towards Convergence ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
Papers
A Scheduling Algorithm for Overhead Reduction in IEEE 802.16Full-text access may be available. Sign in or learn about subscription options.pp. 289-293
Papers
Cross-Layer Design of Internet Group Management Protocol for Mobile IPTV Services in WiMAXFull-text access may be available. Sign in or learn about subscription options.pp. 294-299
Papers
MANETs from Zones to ThresholdFull-text access may be available. Sign in or learn about subscription options.pp. 300-306
Papers
Reference Signals Power Allocation for Uplink MU-MIMO in LTE SystemFull-text access may be available. Sign in or learn about subscription options.pp. 307-311
Papers
Channel Estimation for Alamouti Coded OFDM over Time Variant Channel with Different ReceiversFull-text access may be available. Sign in or learn about subscription options.pp. 312-319
Papers
Pervasive InfoStation-Based mLearning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Papers
Bootstrapped Iterative Decoding Algorithms for Low Density Parity Check (LDPC) CodesFull-text access may be available. Sign in or learn about subscription options.pp. 335-339
Papers
Long Idle: Making Idle Networks Quiet for Platform Energy-EfficiencyFull-text access may be available. Sign in or learn about subscription options.pp. 340-347
Papers
Interference and Power Minimization in TDMA-OFDMA Infrastructure Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 348-355
Papers
An Easy Cellular Gateway for Providing Shared Services and DataFull-text access may be available. Sign in or learn about subscription options.pp. 356-361
Papers
A Cross-Layer Subcarrier Allocation Scheme with QoS Guarantee and Fairness in IEEE 802.16e SystemFull-text access may be available. Sign in or learn about subscription options.pp. 362-367
Papers
Performance Evaluation of Fixed Routing Algorithms in All-Optical Networks under Non-uniform TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 368-374
Dynamics of Feedback-Induced Packet Delay in Power-Law NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 375-380
Papers
Software-Based Packet Capturing with High Precision Timestamping for LinuxFull-text access may be available. Sign in or learn about subscription options.pp. 381-386
Evaluating Application-Layer Classification Using a Machine Learning Technique over Different High Speed NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 387-391
Papers
A Study of Bare PC SIP Server PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 392-397
Papers
Prefilter Bandwidth Effects in Carrier Wave Phase SynchronizersFull-text access may be available. Sign in or learn about subscription options.pp. 398-401
Papers
Prefilter Bandwidth Effects in Data Symbol Phase Synchronizers of Open LoopFull-text access may be available. Sign in or learn about subscription options.pp. 402-405
Papers
Prefilter Bandwidth Effects in Data Symbol Phase Synchronizers of Mixed LoopFull-text access may be available. Sign in or learn about subscription options.pp. 406-409
Papers
Prefilter Bandwidth Effects in Data Symbol Phase Synchronizers of Closed LoopFull-text access may be available. Sign in or learn about subscription options.pp. 410-413
Papers
Author IndexFreely available from IEEE.pp. 415-417
Papers
[Publisher's information]Freely available from IEEE.pp. 418
Showing 77 out of 77