Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISCC
ISCC 2009
Generate Citations
2009 IEEE Symposium on Computers and Communications
July 5 2009 to July 8 2009
Sousse
Table of Contents
Welcome message from the ISCC organizers
Freely available from IEEE.
ISCC 2009 keynote speakers
Full-text access may be available. Sign in or learn about subscription options.
Transmit Beamforming multi-user MISO systems based on switched sub-codebook
Full-text access may be available. Sign in or learn about subscription options.
by
Imen Sfaihi
,
Noureddine Hamdi
,
Ammar Bouallegue
Multiple router management for SIP-based Network Mobility
Full-text access may be available. Sign in or learn about subscription options.
by
Chung-Ming Huang
,
Chao-Hsien Lee
,
Po-Han Tseng
DoubleCheck: Multi-path verification against man-in-the-middle attacks
Full-text access may be available. Sign in or learn about subscription options.
by
Mansoor Alicherry
,
Angelos D. Keromytis
Topology control protocol for conserving energy in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Bahia Zebbane
,
Manel Chenait
,
Nadjib Badache
,
Houda Zeghilet
PETCAM-A power Efficient TCAM for forwarding tables
Full-text access may be available. Sign in or learn about subscription options.
by
Tania Mishra
,
Sartaj Sahni
Sorting on a Cell Broadband Engine SPU
Full-text access may be available. Sign in or learn about subscription options.
by
Shibdas Bandyopadhyay
,
Sartaj Sahni
An optimization of UWB antenna location
Full-text access may be available. Sign in or learn about subscription options.
by
Yen-Fu Chen
,
Chien-Ching Chiu
,
Chin-Han Lin
A tree-based group key agreement scheme for secure multicast increasing efficiency of rekeying in leave operation
Full-text access may be available. Sign in or learn about subscription options.
by
H. Seba
,
F. Tigrine
,
H. Kheddouci
Image annotation based on constrained clustering and semi-naive bayesian model
Full-text access may be available. Sign in or learn about subscription options.
by
M.Maher Ben Ismail
,
Hichem Frigui
PeerStar: An attractive alternative to existing peer-to-peer topologies
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-134
by
H. Shafiei
,
Z. Aghazadeh
,
A. Khonsari
,
M. Ould-Khaoua
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Issa Khalil
,
Mohammad Hayajneh
,
Mamoun Awad
Design of a Grid workflow for a climate application
Full-text access may be available. Sign in or learn about subscription options.
by
Joerg Schneider
,
Julius Gehr
,
Hans-Ulrich Heiss
,
Tiago Ferreto
,
Cesar De Rose
,
Rodrigo Righi
,
Eduardo R. Rodrigues
,
Nicolas Maillard
,
Philippe Navaux
Integrating user Identity Management systems with the Host Identity Protocol
Full-text access may be available. Sign in or learn about subscription options.
by
Marc Barisch
,
Alfredo Matos
Non-cooperative uplink power control game for CDMA wireless communications systems
Full-text access may be available. Sign in or learn about subscription options.
by
Mohammad Hayajneh
,
Issa Khalil
,
Mamoun Awad
Monitoring connectivity in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Benahmed Khelifa
,
H. Haffaf
,
Merabti Madjid
,
David Llewellyn-Jones
Discrete-time analysis of packet data discarding in high speed multimedia networks
Full-text access may be available. Sign in or learn about subscription options.
by
Attahiru Sule Alfa
,
Haitham Abu-Ghazaleh
Towards self-managed adaptive emulation of grid environments
Full-text access may be available. Sign in or learn about subscription options.
by
Rodrigo N. Calheiros
,
Everton Alexandre
,
Andriele B. do Carmo
,
Cesar A. F. De Rose
,
Rajkumar Buyya
TFRC and RTT thresholds interdependence in a selective retransmission scheme
Full-text access may be available. Sign in or learn about subscription options.
by
Arpad Huszak
,
Sandor Imre
An Enhanced Slotted Binary Tree Algorithm with Intelligent Separation in RFID systems
Full-text access may be available. Sign in or learn about subscription options.
by
SungSoo Kim
,
YongHwan Kim
,
KwangSeon Ahn
A secure variant of the Hill Cipher
Full-text access may be available. Sign in or learn about subscription options.
by
Mohsen Toorani
,
Abolfazl Falahati
A directly public verifiable signcryption scheme based on elliptic curves
Full-text access may be available. Sign in or learn about subscription options.
pp. 713-716
by
Mohsen Toorani
,
A. Beheshti
HCI-enriched approach for DSS development: the UP/U approach
Full-text access may be available. Sign in or learn about subscription options.
by
Hela Ltifi
,
Mounir Ben Ayed
,
Christophe Kolski
,
Adel M. Alimi
Synchronous ultra-wide band wireless sensors networks for oil and gas exploration
Full-text access may be available. Sign in or learn about subscription options.
by
Stefano Savazzi
,
Umberto Spagnolin
Use of load prediction mechanism for dynamic routing optimization
Full-text access may be available. Sign in or learn about subscription options.
by
Abutaleb Abdelmohdi Turky
,
Andreas Mitschele-Thiel
On the performance of adaptive Wireless Push Systems in high bit rate environments
Full-text access may be available. Sign in or learn about subscription options.
by
Petros Nicopolitidis
,
Georgios.I. Papadimitriou
,
Andreas S. Pomportsis
An efficient stream memory architecture for heterogeneous multicore processor
Full-text access may be available. Sign in or learn about subscription options.
by
Rangyu Deng
,
Weixia Xu
,
Qiang Dou
,
Hongwei Zhou
,
Zefu Dai
,
Haiyan Chen
Multivariate reduction in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Orlando Silva Junior
,
Andre L. L. Aquino
,
Raquel A. F. Mini
,
Carlos M. S. Figueiredo
An analysis of the heterogeneity and IP packet reordering over multiple wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Dominik Kaspar
,
Kristian Evensen
,
Audun F. Hansen
,
Paal Engelstad
,
Pal Halvorsen
,
Carsten Griwodz
Distributed Erasure Coding in Data Centric Storage for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Michele Albano
,
Stefano Chessa
Stability and performance analysis of the Open Box Transport Protocol
Full-text access may be available. Sign in or learn about subscription options.
by
Paulo Loureiro
,
Edmundo Monteiro
The significance of label conversion in GMPLS-based optical transport networks
Full-text access may be available. Sign in or learn about subscription options.
by
Nabil Naas
,
Hussein Mouftah
Towards a Java bytecodes compiler for Nios II soft-core processor
Full-text access may be available. Sign in or learn about subscription options.
by
Willian S. Lima
,
Renata S. Lobato
,
Aleardo Manacero
,
Roberta Spolon
Resource selection for fast large-scale Virtual Appliances Propagation
Full-text access may be available. Sign in or learn about subscription options.
by
Alejandra Rodriguez
,
Jesus Carretero
,
Borja Bergua
,
Felix Garcia
A platform for integrated data processing from heterogeneous devices in naval field
Full-text access may be available. Sign in or learn about subscription options.
by
M. Giacobbe
,
E. Guglielmino
,
A. Puliafito
Novel micro-threading techniques on the Cell Broadband Engine
Full-text access may be available. Sign in or learn about subscription options.
by
Mohamed F. Ahmed
,
Reda A. Ammar
,
Sanguthevar Rajasekaran
Assessing the impact of Link Layer Feedback mechanisms on MANET routing protocols
Full-text access may be available. Sign in or learn about subscription options.
by
A. Ariza
,
A. Trivino
,
E. Casilari
,
J.-C. Cano
,
C. T. Calafate
,
P. Manzoni
Adaptive Offset for OBS networks using Feedback Control Techniques
Full-text access may be available. Sign in or learn about subscription options.
by
Wael Hosny Fouad Aly
,
Mohamed Faten Zhani
,
Halima Elbiaze
SimulNet: a wavelength-routed optical network simulation framework
Full-text access may be available. Sign in or learn about subscription options.
by
Francesco Palmieri
,
Ugo Fiore
,
Sergio Ricciardi
Quantization software: application of trellis coded scalar/vector quantization
Full-text access may be available. Sign in or learn about subscription options.
by
Merouane Bouzid
,
Mehdi Ould Hocine
Interaction & handover between IEEE 802.16e and DVB-S/RCS using MSCTP protocol
Full-text access may be available. Sign in or learn about subscription options.
by
Tarek Bchini
,
Nabil Tabbane
,
Emmanuel Chaput
,
Sami Tabbane
,
Andre-Luc Beylot
Hard handover vs soft handover in a city
Full-text access may be available. Sign in or learn about subscription options.
by
Tarek Bchini
,
Nabil Tabbane
,
Emmanuel Chaput
,
Sami Tabbane
,
Andre-Luc Beylot
Specification and synthesis of sensory datasets in pervasive spaces
Full-text access may be available. Sign in or learn about subscription options.
by
Abdelsalam Helal
,
Andres Mendez-Vazquez
,
Shantonu Hossain
Distributed parallel scheduling algorithms for high-speed virtual output queuing switches
Full-text access may be available. Sign in or learn about subscription options.
by
Lotfi Mhamdi
,
Mounir Hamdi
Multi-dimensional traffic anomaly detection based on ICA
Full-text access may be available. Sign in or learn about subscription options.
by
Li Zonglin
,
Hu Guangmin
,
Yao Xingmiao
Adaptive Smooth Simulcast Protocol for multimedia transmission
Full-text access may be available. Sign in or learn about subscription options.
by
Christos Bouras
,
Apostolos Gkamas
,
Georgios Kioumourtzis
Service level negotiation in ubiquitous environments
Full-text access may be available. Sign in or learn about subscription options.
by
Mohamed Aymen Chalouf
,
Francine Krief
Self-Selecting Reliable Path Routing in diverse Wireless Sensor Network environments
Full-text access may be available. Sign in or learn about subscription options.
by
Thomas Babbitt
,
Christopher Morrell
,
Boleslaw Szymanski
Mobility between infrastructure and Ad-Hoc environments: Experimental validation
Full-text access may be available. Sign in or learn about subscription options.
by
R. Costa
,
S. Sargento
Inductive as a support of deductive data visualisation in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Mohammad Hammoudeh
,
Robert Newman
,
Christopher Dennett
,
Sarah Mount
Multi-core aware process mapping and its impact on communication overhead of parallel applications
Full-text access may be available. Sign in or learn about subscription options.
by
Eduardo R. Rodrigues
,
Felipe L. Madruga
,
Philippe O. A. Navaux
,
Jairo Panetta
On the performance of multi-level time sharing policy under heavy-tailed workloads
Full-text access may be available. Sign in or learn about subscription options.
by
Malith Jayasinghe
,
Zahir Tari
,
Panlop Zeephongsekul
,
James Broberg
A QoS-aware congestion control mechanism for DCCP
Full-text access may be available. Sign in or learn about subscription options.
by
Lei Ye
,
Zhijun Wang
Increasing performances of TCP data transfers through multiple parallel connections
Full-text access may be available. Sign in or learn about subscription options.
by
Andrea Baldini
,
Lorenzo De Carli
,
Fulvio Risso
Framework for application-level adaptation of media streams transmitted using DCCP Protocol
Full-text access may be available. Sign in or learn about subscription options.
by
Lukasz Czekierda
,
Tomasz Grobelny
Automatic QoS control in UPnP home networks
Full-text access may be available. Sign in or learn about subscription options.
by
Jukka-Pekka Laulajainen
,
Matti Hirvonen
Context-aware publish-subscribe: Model, implementation, and evaluation
Full-text access may be available. Sign in or learn about subscription options.
by
Gianpaolo Cugola
,
Alessandro Margara
,
Matteo Migliavacca
On securing publish-subscribe systems with security groups
Full-text access may be available. Sign in or learn about subscription options.
by
Gianluca Dini
,
Angelica Lo Duca
Bloumail: an interactive tool for blocking spam at the originator
Full-text access may be available. Sign in or learn about subscription options.
by
Gianluca Dini
,
Isidoro S. La Porta
Design and implementation of a secure XML-based grid file storage system with reliability features
Full-text access may be available. Sign in or learn about subscription options.
by
F. Tusa
,
M. Villari
,
A. Puliafito
Exploiting signal strength detection and collision cancellation for tag identification in RFID systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 500-506
by
Maurizio A. Bonuccelli
,
Francesca Lonetti
,
Francesca Martelli
Measuring the learners' learning style based on tracks analysis in web based learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-103
by
Nabila Bousbia
,
Amar Balla
,
Issam Rebai
Practical and efficient open-loop rate/link adaptation algorithm for high-speed IEEE 802.11n WLANs
Full-text access may be available. Sign in or learn about subscription options.
by
Qiuyan Xia
,
Jian Pu
,
Mounir Hamdi
,
Khaled Ben Letaief
Design and evaluation of a BitTorrent proxy for energy saving
Full-text access may be available. Sign in or learn about subscription options.
by
Giuseppe Anastasi
,
Marco Conti
,
Ilaria Giannetti
,
Andrea Passarella
Enhancing VoWLAN service through adaptive voice coder
Full-text access may be available. Sign in or learn about subscription options.
by
Adlen Ksentini
Energy efficient cluster-based routing in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Houda Zeghilet
,
Nadjib Badache
,
Moufida Maimour
Online spam filtering using support vector machines
Full-text access may be available. Sign in or learn about subscription options.
by
Ola Amayri
,
Nizar Bouguila
Integrated many-to-many multicast addressing and access control method
Full-text access may be available. Sign in or learn about subscription options.
by
Imed Romdhani
,
Ahmed Yassin Al-Dubai
Distributed algorithm for dynamic logical topology reconfiguration in IP over WDM networks
Full-text access may be available. Sign in or learn about subscription options.
by
Phuong Nga Tran
,
Ulrich Killat
Influence of code orthogonality on downlink throughput comparison between MC-CDMA and OFDMA in multi-cellular environments
Full-text access may be available. Sign in or learn about subscription options.
by
Anas F. Alrawi
,
Bayan S. Sharif
,
Charalampos C. Tsimenidis
,
Konstantinos Ntagkounakis
Handling dynamics in gossip-based aggregation schemes
Full-text access may be available. Sign in or learn about subscription options.
by
Nicola Bicocchi
,
Marco Mamei
,
Franco Zambonelli
PPStream characterization: Measurement of P2P live streaming during Olympics
Full-text access may be available. Sign in or learn about subscription options.
by
Wei Liang
,
Rong Wu
,
Jingping Bi
,
Zhenyu Li
P2P cache-and-forward mechanisms for mobile ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
Claudio Casetti
,
Carla-Fabiana Chiasserini
,
Marco Fiore
,
Chi-Anh La
,
Pietro Michiardi
Adaptive nodes scheduling approach for clustered sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Xu Xu
,
Yu-Hen Hu
,
Jingping Bi
,
Wei Liu
An opportunistic indoors positioning scheme based on estimated positions
Full-text access may be available. Sign in or learn about subscription options.
by
GuoDong Kang
,
Tanguy Perennou
,
Michel Diaz
Low complexity scheduling algorithms for the LTE uplink
Full-text access may be available. Sign in or learn about subscription options.
by
Elias Yaacoub
,
Hussein Al-Asadi
,
Zaher Dawy
Design of a message interworking function for converged IP messaging in Next Generation Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Niklas Blum
,
Sebastian Lampe
,
Thomas Magedanz
Transforming UML models to colored petri nets models using graph grammars
Full-text access may be available. Sign in or learn about subscription options.
by
Elhillali Kerkouche
,
Allaoua Chaoui
,
Khaled Khalfaoui
BlueHRT: Hybrid Ring Tree Scatternet Formation in Bluetooth Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Ibrahim Al-Kassem
,
Sanaa Sharafeddine
,
Zaher Dawy
Time-varying network internal loss inference based on unicast end-to-end measurements
Full-text access may be available. Sign in or learn about subscription options.
by
Fei Gaolei
,
Hu Guangmin
,
Qian Feng
A multi-sink swarm-based routing protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Maurizio Paone
,
Luca Paladina
,
Marco Scarpa
,
Antonio Puliafito
On Finding maximally redundant trees in strictly linear time
Full-text access may be available. Sign in or learn about subscription options.
by
Gabor Enyedi
,
Gabor Retvaria
,
Andras Csaszar
Device pairing based on adaptive channel fluctuation control for large-scale organizations
Full-text access may be available. Sign in or learn about subscription options.
by
Takashi Oshiba
,
Hideaki Nebayashi
Facing crosscutting concerns in a middleware for pervasive Service composition
Full-text access may be available. Sign in or learn about subscription options.
by
A. Corradi
,
F. Di Marco
,
S. Monti
,
S. Pasini
Promoting self-imposed end-to-end congestion control via a Sword of Damocles approach
Full-text access may be available. Sign in or learn about subscription options.
by
Shan Chen
,
Brahim Bensaou
,
Ka Lok Hung
Improving end-to-end multicast rate control in wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
W. Kammoun
,
H. Youssef
Priority based intra piconet scheduling scheme for QoS guaranties in Bluetooth networks
Full-text access may be available. Sign in or learn about subscription options.
by
Karima Maalaoui
,
Leila Azouz Saidane
A Tabu Search heuristic for capacitated network design
Full-text access may be available. Sign in or learn about subscription options.
by
Mohamed Zied Ben Hamouda
,
Olivier Brun
,
Jean-Marie Garcia
Automatic verification of conformance of firewall configurations to security policies
Full-text access may be available. Sign in or learn about subscription options.
by
Nihel Ben Youssef
,
Adel Bouhoula
,
Florent Jacquemard
A tool to simplify the management of homogeneous and heterogeneous grids
Full-text access may be available. Sign in or learn about subscription options.
by
Cesar S. Aguiar
,
Daniel I. Cruz
,
Marcos A. Cavenaghi
,
Roberta Spolon
,
Renata S. Lobato
Enhancements to IEEE 802.11 DCF collision avoidance based on MIMO Adaptive Spatial Channels Sharing
Full-text access may be available. Sign in or learn about subscription options.
by
Abduladhim Ashtaiwi
,
Hossam S. Hassanein
Analyzing the application of inter-cell relay in CDMA cellular networks
Full-text access may be available. Sign in or learn about subscription options.
by
Ayman Radwan
,
Hossam S. Hassanein
Malware analysis system using process-level virtualization
Full-text access may be available. Sign in or learn about subscription options.
by
Yu Adachi
,
Yoshihiro Oyama
OS service update for an online adaptive embedded multimedia system
Full-text access may be available. Sign in or learn about subscription options.
by
Kais Loukil
,
Nader Ben Amor
,
Mouna Ben Said
,
Mohamed Abid
Objects detection by expectation-maximisation algorithm application to football images
Full-text access may be available. Sign in or learn about subscription options.
by
Mourad Moussa Jlassi
,
Ali Douik
,
Hassani Messaoud
A Selectivity Function Scheduler for IEEE 802.11e
Full-text access may be available. Sign in or learn about subscription options.
by
Ashraf Ali Bourawy
,
Najah A. AbuAli
,
Hossam S. Hassanein
A Hybrid method for effective multiple sequence alignment
Full-text access may be available. Sign in or learn about subscription options.
by
Abdesslem Layeb
,
Souham Meshoul
,
Mohamed Batouche
Implementing a scalable context-aware middleware
Full-text access may be available. Sign in or learn about subscription options.
by
Antonio Corradi
,
Mario Fanelli
,
Luca Foschini
Performance evaluation of MANETs virtual backbone formation algorithms
Full-text access may be available. Sign in or learn about subscription options.
by
Khalid Almahorg
,
Otman Basir
Showing 100 out of 195
Load More
Load All