Default Cover Image

20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)

Apr. 18 2006 to Apr. 20 2006

Vienna, Austria

ISSN: 1550-445X

ISBN: 0-7695-2466-4

Volume:

Table of Contents

Introduction
Message from the SNDS 2006 ChairsFreely available from IEEE.pp. xviii
Introduction
Message from the PCAC 2006 General ChairsFreely available from IEEE.pp. xx
Introduction
Message from the WAMIS 2006 ChairsFreely available from IEEE.pp. xxiii
Introduction
Message from the HWISE 2006 ChairsFreely available from IEEE.pp. xxv
Introduction
Message from the PAEWN 2006 ChairsFreely available from IEEE.pp. xxviii
Introduction
Message from the TACS 2006 ChairsFreely available from IEEE.pp. xxxi
Introduction
Message from the SOCNE 2006 ChairsFreely available from IEEE.pp. xxxiv
Introduction
Message from the HiPCoMB 2006 ChairsFreely available from IEEE.pp. xxxvii
Introduction
Message from the INVITE 2006 ChairsFreely available from IEEE.pp. xl
Introduction
Message from the FINA 2006 ChairsFreely available from IEEE.pp. xlii
Introduction
SNDS 2006 CommitteesFreely available from IEEE.pp. xix
Introduction
PCAC 2006 Committees and ReviewersFreely available from IEEE.pp. xxi
Introduction
WAMIS 2006 Program Committee and ReviewersFreely available from IEEE.pp. xxiv
Introduction
HWISE 2006 Committees and ReviewersFreely available from IEEE.pp. xxvi
Introduction
PAEWN 2006 Committees and ReviewersFreely available from IEEE.pp. xxix
Introduction
TACS 2006 Committees and ReviewersFreely available from IEEE.pp. xxxii
Introduction
SOCNE 2006 Committees and ReviewersFreely available from IEEE.pp. xxxv
Introduction
HiPCoMB 2006 Committees and ReviewersFreely available from IEEE.pp. xxxviii
Introduction
INVITE 2006 Committees and ReviewersFreely available from IEEE.pp. xli
Introduction
FINA 2006 Committees and ReviewersFreely available from IEEE.pp. xliii
Session SNDS-1
Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 5-9
Session SNDS-1
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)Full-text access may be available. Sign in or learn about subscription options.pp. 10-14
Session SNDS-1
Certificateless Designated Verifier Signature SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 15-19
Session SNDS-1
Unpuzzling Puzzle (analysis of a video encryption algorithm)Full-text access may be available. Sign in or learn about subscription options.pp. 20-24
Session SNDS-1
A Distributed-Log-based IP Traceback Scheme to Defeat DDoS AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 25-32
Session SNDS-2
Distributed Trust Infrastructure and Trust-Security Articulation: Application to Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 33-38
Session SNDS-2
Analysis of LYSA-calculus with explicit confidentiality annotationsFull-text access may be available. Sign in or learn about subscription options.pp. 39-43
Session SNDS-2
Towards Designing Secure Online GamesFull-text access may be available. Sign in or learn about subscription options.pp. 44-48
Session SNDS-2
EC: an edge-based architecture against DDoS attacks and malware spreadFull-text access may be available. Sign in or learn about subscription options.pp. 49-56
Session SNDS-3
Efficient Authentication for Reactive Routing ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 57-61
Session SNDS-3
A Multi-dimension Rule Update in a TCAM-based High-Performance Network Security SystemFull-text access may be available. Sign in or learn about subscription options.pp. 62-66
Session SNDS-3
Design and Analysis of a Robust and Efficient Block Cipher using Cellular AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 67-71
Host-Based Intrusion Detection for Advanced Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 72-76
Session SNDS-3
Abuse Freedom in Access Control SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 77-86
Session I: Pervasive Systems, Computing, Interoperability Issues
Exploring GSM Signal Strength Levels in Pervasive EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 87-91
Session I: Pervasive Systems, Computing, Interoperability Issues
LooM: An Anonymity Quantification Method in Pervasive Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 92-96
Session I: Pervasive Systems, Computing, Interoperability Issues
Active Storage Framework for Object-based Storage DeviceFull-text access may be available. Sign in or learn about subscription options.pp. 97-101
Session I: Pervasive Systems, Computing, Interoperability Issues
HoNeY: a MHP-based Platform for HOme NEtwork interoperabilityFull-text access may be available. Sign in or learn about subscription options.pp. 102-110
Session II: Mobile and Wireless Networks, Systems & Services
Hierarchical, Multi-spanning Architecture for ManagedWireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 111-115
Session II: Mobile and Wireless Networks, Systems & Services
Distributed IDSs for enhancing Security in Mobile Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 116-120
Session II: Mobile and Wireless Networks, Systems & Services
Optimal Tree-based Adaptive Broadcasting for Mobile Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 121-125
Refining WiFi Indoor Positioning Renders Pertinent Deploying Location-Based Multimedia GuideFull-text access may be available. Sign in or learn about subscription options.pp. 126-132
Session III: Ad Hoc Networking and Communications
ARM: Anonymous Routing Protocol for Mobile Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 133-137
Session III: Ad Hoc Networking and Communications
Wireless Ad-hoc Network-Based Tourist Information Delivery SystemFull-text access may be available. Sign in or learn about subscription options.pp. 138-142
Session III: Ad Hoc Networking and Communications
A New Multi-channel MAC Protocol with Power Control for Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 143-146
Session III: Ad Hoc Networking and Communications
A Probabilistic Certificate Updating Protocol for MANETFull-text access may be available. Sign in or learn about subscription options.pp. 147-154
Session IV: Sensor Networks and Network Security
Analysis of IBS for MANET Security in Emergency and Rescue OperationsFull-text access may be available. Sign in or learn about subscription options.pp. 155-159
Session IV: Sensor Networks and Network Security
Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 160-164
Session IV: Sensor Networks and Network Security
Using Two Nodes and Neighbors Examining to Improve Positioning Capability in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 165-170
Session IV: Sensor Networks and Network Security
Sequential Localization Algorithm for Active Sensor Network DeploymentFull-text access may be available. Sign in or learn about subscription options.pp. 171-178
Session V: QoS Routing, User Interfaces
A Loop-Free Multi-Path Routing With QoS for Wireless Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 179-185
Session V: QoS Routing, User Interfaces
An "intent-oriented" approach for Multi-Device User Interface DesignFull-text access may be available. Sign in or learn about subscription options.pp. 186-194
Session 1: Web Technologies and Information Systems
Framework For Co-browsing On Heterogeneous DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 195-199
Session 1: Web Technologies and Information Systems
The Web and Complex Adaptive SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 200-204
Session 1: Web Technologies and Information Systems
XML-Enabled Relational Database for XML Document UpdateFull-text access may be available. Sign in or learn about subscription options.pp. 205-212
Session 2: Mobile Systems and Service Oriented Computing
Analysis Architecture of a Mobile Sports Replay SystemFull-text access may be available. Sign in or learn about subscription options.pp. 213-218
Session 2: Mobile Systems and Service Oriented Computing
An Architecture for Adaptive Mobile LearningFull-text access may be available. Sign in or learn about subscription options.pp. 219-223
Session 2: Mobile Systems and Service Oriented Computing
Transaction Service Discovery in Mobile EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 224-228
Session 2: Mobile Systems and Service Oriented Computing
Reduction of Handover Latency Using MIH Services in MIPv6Full-text access may be available. Sign in or learn about subscription options.pp. 229-234
Session 2: Mobile Systems and Service Oriented Computing
CCSMOMS:A Composite Communication Scheme for Mobile Object Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 235-239
Session 2: Mobile Systems and Service Oriented Computing
Optimal Multiple QoS Resource Scheduling In Grid ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 240-246
Session 3: Multi-Agents Systems and Applications
Distributed Process Integration: Experiences and Opportunities for Future ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 247-251
Session 3: Multi-Agents Systems and Applications
Software Agents for Meeting SchedulerFull-text access may be available. Sign in or learn about subscription options.pp. 252-256
Session 3: Multi-Agents Systems and Applications
Performance Analysis of Network Topologies in Agent-based Open Connectivity Architecture for DSSFull-text access may be available. Sign in or learn about subscription options.pp. 257-261
Session 3: Multi-Agents Systems and Applications
Toward Role-based Agent Coordination for Mobile and Ubiquitous ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 262-266
Session 3: Multi-Agents Systems and Applications
A Distributed Scheme for Secure Data AccessFull-text access may be available. Sign in or learn about subscription options.pp. 267-271
Session 3: Multi-Agents Systems and Applications
Detecting Junk Mails by Implementing Statistical TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 272-280
Session HWISE-1: Architecture and Design of Heterogeneous Wireless Networ
Approximate Query Answering in Sensor Networks with Hierarchically Distributed CachingFull-text access may be available. Sign in or learn about subscription options.pp. 281-285
Session HWISE-1: Architecture and Design of Heterogeneous Wireless Networ
On Bridge Residence Times in Master-Slave Connected 802.15.4 ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 286-290
Session HWISE-1: Architecture and Design of Heterogeneous Wireless Networ
MEMOSEN: Multi-radio Enabled MObile Wireless SEnsor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 291-295
Session HWISE-1: Architecture and Design of Heterogeneous Wireless Networ
Agent-based System Architecture forWireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 296-302
Session HWISE-2: Networking of Heterogeneous Nodes
A Fault-Tolerant Model forWireless Sensor-Actor SystemFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Session HWISE-2: Networking of Heterogeneous Nodes
An Energy Efficient Routing Mechanism for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 308-312
Session HWISE-2: Networking of Heterogeneous Nodes
Clustering Protocol for Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 313-317
Session HWISE-2: Networking of Heterogeneous Nodes
Cluster-based Hierarchical Time Synchronization for Multi-hop Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
Session HWISE-2: Networking of Heterogeneous Nodes
QoS Routing in a Multi-Robot Network System for Urban Search and RescueFull-text access may be available. Sign in or learn about subscription options.pp. 323-330
Session HWISE-3: Applications of Heterogeneous Wireless Networks
Application Programming Interface for Configuration of Multi-Robot Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 331-335
Session HWISE-3: Applications of Heterogeneous Wireless Networks
Critical Nodes Detection in Mobile Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 336-340
Session HWISE-3: Applications of Heterogeneous Wireless Networks
A Proposal on a Learner?s Context-aware Personalized Education Support Method based on Principles of Behavior ScienceFull-text access may be available. Sign in or learn about subscription options.pp. 341-345
Session HWISE-3: Applications of Heterogeneous Wireless Networks
Home Appliance Translator for Remote Control of Conventional Home ApplianceFull-text access may be available. Sign in or learn about subscription options.pp. 346-350
Session HWISE-3: Applications of Heterogeneous Wireless Networks
Mobility Pattern Learning and Route Prediction Based Location Management in PCS NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 351-360
Session PAEWN-1: Mobility Management
Distributed Mobility Prediction in a Hierarchical Infostation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 361-365
Session PAEWN-1: Mobility Management
A Mobility Management Scheme for Hybrid Wired and Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 366-372
Session PAEWN-2: Wireless Networks-1
Effect of Redundancy on Mean Time to Failure of Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 373-382
Session PAEWN-2: Wireless Networks-1
DS/CDMA Throughput of Multi-hop Sensor Network in a Rayleigh Fading Underwater Acoustic ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 378-382
Session PAEWN-2: Wireless Networks-1
Simulation Architecture for Data Processing Algorithms in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 383-387
Session PAEWN-2: Wireless Networks-1
Optimized Sink node Path using Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 388-394
Session PAEWN-3: Modelling and Performance Studies
Measuring SCTP Throughput and Jitter over Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 395-399
Session PAEWN-3: Modelling and Performance Studies
UMTS Coverage and Capacity Enhancement Using Repeaters and Remote RF HeadsFull-text access may be available. Sign in or learn about subscription options.pp. 400-404
Session PAEWN-3: Modelling and Performance Studies
Towards Building a Fault Tolerant and Conflict-Free Distributed File System for Mobile ClientsFull-text access may be available. Sign in or learn about subscription options.pp. 405-412
Session PAEWN-4: Wireless Networks-2
Performance Evaluation of MPLS and IP on an IXP1200 Network ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 413-417
Session PAEWN-4: Wireless Networks-2
Improving MAC-layer Error Recovery for 3G Cellular BroadcastsFull-text access may be available. Sign in or learn about subscription options.pp. 418-422
Session PAEWN-4: Wireless Networks-2
Location Sensing in Enhanced IEEE802.11e WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 423-428
Session PAEWN-4: Wireless Networks-2
Security Authentication of 3G-WLAN InterworkingFull-text access may be available. Sign in or learn about subscription options.pp. 429-436
Session PAEWN-5: Quality of Service
Using Buffer Management in 3G Radio Bearers to Enhance End-to-End TCP PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 437-441
Session PAEWN-5: Quality of Service
Modelling Active Queue Management with Different Traffic ClassesFull-text access may be available. Sign in or learn about subscription options.pp. 442-446
Session PAEWN-5: Quality of Service
QoS Provisioning with Fast Call Admission and Bandwidth Reallocation SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 447-451
Showing 100 out of 187