Default Cover Image

2009 IEEE Symposium on Computers and Communications

July 5 2009 to July 8 2009

Sousse

Table of Contents

Welcome message from the ISCC organizersFreely available from IEEE.
ISCC 2009 keynote speakersFull-text access may be available. Sign in or learn about subscription options.
Transmit Beamforming multi-user MISO systems based on switched sub-codebookFull-text access may be available. Sign in or learn about subscription options.
Multiple router management for SIP-based Network MobilityFull-text access may be available. Sign in or learn about subscription options.
DoubleCheck: Multi-path verification against man-in-the-middle attacksFull-text access may be available. Sign in or learn about subscription options.
Topology control protocol for conserving energy in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
PETCAM-A power Efficient TCAM for forwarding tablesFull-text access may be available. Sign in or learn about subscription options.
Sorting on a Cell Broadband Engine SPUFull-text access may be available. Sign in or learn about subscription options.
An optimization of UWB antenna locationFull-text access may be available. Sign in or learn about subscription options.
Image annotation based on constrained clustering and semi-naive bayesian modelFull-text access may be available. Sign in or learn about subscription options.
PeerStar: An attractive alternative to existing peer-to-peer topologiesFull-text access may be available. Sign in or learn about subscription options.pp. 128-134
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networksFull-text access may be available. Sign in or learn about subscription options.
Integrating user Identity Management systems with the Host Identity ProtocolFull-text access may be available. Sign in or learn about subscription options.
Non-cooperative uplink power control game for CDMA wireless communications systemsFull-text access may be available. Sign in or learn about subscription options.
Monitoring connectivity in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Discrete-time analysis of packet data discarding in high speed multimedia networksFull-text access may be available. Sign in or learn about subscription options.
TFRC and RTT thresholds interdependence in a selective retransmission schemeFull-text access may be available. Sign in or learn about subscription options.
An Enhanced Slotted Binary Tree Algorithm with Intelligent Separation in RFID systemsFull-text access may be available. Sign in or learn about subscription options.
A secure variant of the Hill CipherFull-text access may be available. Sign in or learn about subscription options.
A directly public verifiable signcryption scheme based on elliptic curvesFull-text access may be available. Sign in or learn about subscription options.pp. 713-716
HCI-enriched approach for DSS development: the UP/U approachFull-text access may be available. Sign in or learn about subscription options.
Synchronous ultra-wide band wireless sensors networks for oil and gas explorationFull-text access may be available. Sign in or learn about subscription options.
Use of load prediction mechanism for dynamic routing optimizationFull-text access may be available. Sign in or learn about subscription options.
An efficient stream memory architecture for heterogeneous multicore processorFull-text access may be available. Sign in or learn about subscription options.
Multivariate reduction in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Distributed Erasure Coding in Data Centric Storage for wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Stability and performance analysis of the Open Box Transport ProtocolFull-text access may be available. Sign in or learn about subscription options.
The significance of label conversion in GMPLS-based optical transport networksFull-text access may be available. Sign in or learn about subscription options.
Towards a Java bytecodes compiler for Nios II soft-core processorFull-text access may be available. Sign in or learn about subscription options.
Resource selection for fast large-scale Virtual Appliances PropagationFull-text access may be available. Sign in or learn about subscription options.
A platform for integrated data processing from heterogeneous devices in naval fieldFull-text access may be available. Sign in or learn about subscription options.
Novel micro-threading techniques on the Cell Broadband EngineFull-text access may be available. Sign in or learn about subscription options.
Adaptive Offset for OBS networks using Feedback Control TechniquesFull-text access may be available. Sign in or learn about subscription options.
SimulNet: a wavelength-routed optical network simulation frameworkFull-text access may be available. Sign in or learn about subscription options.
Quantization software: application of trellis coded scalar/vector quantizationFull-text access may be available. Sign in or learn about subscription options.
Hard handover vs soft handover in a cityFull-text access may be available. Sign in or learn about subscription options.
Specification and synthesis of sensory datasets in pervasive spacesFull-text access may be available. Sign in or learn about subscription options.
Distributed parallel scheduling algorithms for high-speed virtual output queuing switchesFull-text access may be available. Sign in or learn about subscription options.
Multi-dimensional traffic anomaly detection based on ICAFull-text access may be available. Sign in or learn about subscription options.
Adaptive Smooth Simulcast Protocol for multimedia transmissionFull-text access may be available. Sign in or learn about subscription options.
Service level negotiation in ubiquitous environmentsFull-text access may be available. Sign in or learn about subscription options.
Mobility between infrastructure and Ad-Hoc environments: Experimental validationFull-text access may be available. Sign in or learn about subscription options.
A QoS-aware congestion control mechanism for DCCPFull-text access may be available. Sign in or learn about subscription options.
Increasing performances of TCP data transfers through multiple parallel connectionsFull-text access may be available. Sign in or learn about subscription options.
Framework for application-level adaptation of media streams transmitted using DCCP ProtocolFull-text access may be available. Sign in or learn about subscription options.
Automatic QoS control in UPnP home networksFull-text access may be available. Sign in or learn about subscription options.
Context-aware publish-subscribe: Model, implementation, and evaluationFull-text access may be available. Sign in or learn about subscription options.
On securing publish-subscribe systems with security groupsFull-text access may be available. Sign in or learn about subscription options.
Bloumail: an interactive tool for blocking spam at the originatorFull-text access may be available. Sign in or learn about subscription options.
Design and implementation of a secure XML-based grid file storage system with reliability featuresFull-text access may be available. Sign in or learn about subscription options.
Measuring the learners' learning style based on tracks analysis in web based learningFull-text access may be available. Sign in or learn about subscription options.pp. 98-103
Design and evaluation of a BitTorrent proxy for energy savingFull-text access may be available. Sign in or learn about subscription options.
Enhancing VoWLAN service through adaptive voice coderFull-text access may be available. Sign in or learn about subscription options.
Energy efficient cluster-based routing in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Online spam filtering using support vector machinesFull-text access may be available. Sign in or learn about subscription options.
Integrated many-to-many multicast addressing and access control methodFull-text access may be available. Sign in or learn about subscription options.
Distributed algorithm for dynamic logical topology reconfiguration in IP over WDM networksFull-text access may be available. Sign in or learn about subscription options.
Handling dynamics in gossip-based aggregation schemesFull-text access may be available. Sign in or learn about subscription options.
PPStream characterization: Measurement of P2P live streaming during OlympicsFull-text access may be available. Sign in or learn about subscription options.
Adaptive nodes scheduling approach for clustered sensor networksFull-text access may be available. Sign in or learn about subscription options.
An opportunistic indoors positioning scheme based on estimated positionsFull-text access may be available. Sign in or learn about subscription options.
Low complexity scheduling algorithms for the LTE uplinkFull-text access may be available. Sign in or learn about subscription options.
Transforming UML models to colored petri nets models using graph grammarsFull-text access may be available. Sign in or learn about subscription options.
BlueHRT: Hybrid Ring Tree Scatternet Formation in Bluetooth NetworksFull-text access may be available. Sign in or learn about subscription options.
Time-varying network internal loss inference based on unicast end-to-end measurementsFull-text access may be available. Sign in or learn about subscription options.
A multi-sink swarm-based routing protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.
On Finding maximally redundant trees in strictly linear timeFull-text access may be available. Sign in or learn about subscription options.
Device pairing based on adaptive channel fluctuation control for large-scale organizationsFull-text access may be available. Sign in or learn about subscription options.
Facing crosscutting concerns in a middleware for pervasive Service compositionFull-text access may be available. Sign in or learn about subscription options.
Promoting self-imposed end-to-end congestion control via a Sword of Damocles approachFull-text access may be available. Sign in or learn about subscription options.
Improving end-to-end multicast rate control in wireless networksFull-text access may be available. Sign in or learn about subscription options.
Priority based intra piconet scheduling scheme for QoS guaranties in Bluetooth networksFull-text access may be available. Sign in or learn about subscription options.
A Tabu Search heuristic for capacitated network designFull-text access may be available. Sign in or learn about subscription options.
Analyzing the application of inter-cell relay in CDMA cellular networksFull-text access may be available. Sign in or learn about subscription options.
Malware analysis system using process-level virtualizationFull-text access may be available. Sign in or learn about subscription options.
OS service update for an online adaptive embedded multimedia systemFull-text access may be available. Sign in or learn about subscription options.
A Selectivity Function Scheduler for IEEE 802.11eFull-text access may be available. Sign in or learn about subscription options.
A Hybrid method for effective multiple sequence alignmentFull-text access may be available. Sign in or learn about subscription options.
Implementing a scalable context-aware middlewareFull-text access may be available. Sign in or learn about subscription options.
Performance evaluation of MANETs virtual backbone formation algorithmsFull-text access may be available. Sign in or learn about subscription options.
Showing 100 out of 195