


default search action
21st AINA Workshops 2007: Niagara Falls, Canada
- 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada. IEEE Computer Society 2007

FINA 2007 Symposium on Frontiers in Networking with Applications
Session 1: Intelligent Networking
- Lei Liang, Peter Graham:

Assessment of a Mobile Agent Based Routing Protocol for Mobile Ad-hoc Networks. 1-5 - B. S. Manoj

, Rajesh M. Hegde, Bhaskar D. Rao, Ramesh R. Rao:
Sentient Networks: A New Dimension in Network Capability. 6-11 - Hyung-Min Koo, In-Young Ko:

A Cell-Based Approach for Evolutionary Component Repositories for Intelligent Service Robots. 12-17
Session 2: Secrecy and Security
- Amjad Gawanmeh

, Sofiène Tahar:
Rank Theorems for Forward Secrecy in Group Key Management Protocols. 18-23 - Amy Beth Corman

, Peter Schachte
, Vanessa Teague:
A Secure Group Agreement (SGA) Protocol for Peer-to-Peer Applications. 24-29 - Vesselin Tzvetkov, Holger Zuleger:

Service Provider Implementation of SIP Regarding Security. 30-35 - Fareed Zaffar, Gershon Kedem:

A Service Architecture for Countering Distributed Denial of Service Attacks. 36-42
Session 3: Wireless Sensor Networks
- Md. Ashiqur Rahman, Sajid Hussain:

Effective Caching in Wireless Sensor Network. 43-47 - Ying-Hong Wang, Chih-Peng Hsu, Chien-Min Lee, Kuo-Feng Huang, Ting-Wei Chang:

A Location Mechanism with Mobile Reference Nodes in Wireless Sensor Networks. 48-55 - Malka Halgamuge

:
Efficient Battery Management for Sensor Lifetime. 56-61 - Keiji Ozaki, Naohiro Hayashibara, Makoto Takizawa

:
Coordination Protocols of Multiple Actuator Nodes in a Multi-Actuator/Multi-Sensor Model. 62-67
Session 4: Network Mechanisms
- Satoshi Kurihara, Kensuke Fukuda, Shin-ya Sato, Toshiharu Sugawara

:
Multi-Agent Coordination Mechanism Based on Indirect Interaction. 68-72 - Andreas Rott:

Self-Healing in Distributed Network Environments. 73-78 - Ageliki Tsioliaridou, Christos V. Samaras, Vassilis Tsaoussidis

:
On the Miscollaboration of Congestion Control Mechanisms at the Transport and the Network Layers. 79-84 - Han-Ching Wu, Shou-Hsuan Stephen Huang:

Detecting Stepping-Stone with Chaff Perturbations. 85-90
Session 5: Grid, Clustering and P2P Computing
- Sheng Di, Hai Jin, Shengli Li, Ling Chen, Li Qi, Chengwei Wang:

Ontology Based Grid Information Interoperation. 91-96 - Ying-Hong Wang, Chin-Yung Yu, Ping-Fang Fu:

A Coverage and Connectivity Method to Cluster Topology in Wireless Sensor Networks. 97-102 - Toshiki Watanabe, Takahiro Hara, Yuki Kido, Shojiro Nishio:

An Update Propagation Strategy for Delay Reduction and Node Failure Tolerance in Peer-to-Peer Networks. 103-108
Session 6: Network Security
- Chen Yang, Furong Wang, Xinmei Wang:

Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. 109-112 - Xiandeng He, Changxing Pei, Changhua Zhu, Jiandong Li:

BER Analysis of a GMSK System Using Decision Feedback. 113-118 - David Argles, Alex Pease, Robert John Walters:

An Improved Approach to Secure Authentication and Signing. 119-123
Session 7: Routing and Multicasting
- Sudip Misra, B. John Oommen

:
The Pursuit Automaton Approach for Estimating All-Pairs Shortest Paths in Dynamically Changing Networks. 124-129 - I-Hsuan Peng, Kuo-Wei Peng, Yen-Wen Chen:

Cross Layer Routing for Reliable Connections in IP over WDM Networks. 130-135 - Chao Peng, Yasuo Tan, Laurence Tianruo Yang:

New Algorithms for the Minimum-Cost Single-Source Unsplittable Flow Problem. 136-141 - Masafumi Watari, Atsushi Tagami, Teruyuki Hasegawa, Shigehiro Ano:

A Scalable and Efficient Client Emulation Method for IP Multicast Performance Evaluation. 142-147
Session 8: Network Applications and Video Streaming
- Akio Koyama, Junpei Arai, Satoshi Sasaki, Takuya Numajiri, Leonard Barolli:

Implementation and Field Experiments of a Remote Medical-Care Supporting System. 148-153 - Yosuke Sato, Yuya Maita, Koji Hashimoto, Yoshitaka Shibata:

Performance Evaluation of a New Teleconference System by High Definition Omni-Directional Video Transmission. 154-159 - Jinfeng Zhang, Jianwei Niu

, Rui He, Jian Ma:
Adaptive Video Streaming over P2P Multi-Hop Path. 160-165 - Akhilesh Shrestha, Liudong Xing:

Common-Cause Failure Analysis for Dynamic Hierarchical Systems. 166-171
Session 9: Network Traffic Analysis
- Enchang Sun, Bin Tian, Yongchao Wang, Kechu Yi:

Quasi-Orthogonal Time Division Multiplexing and Its Applications under Rayleigh Fading Channels. 172-176 - Dominik Jungo, David Buchmann, Ulrich Ultes-Nitsche

:
Assessment of Code Quality through Classification of Unit Tests in VeriNeC. 177-182 - Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong:

Specification Synthesis for Monitoring and Analysis of MANET Protocols. 183-187
Session 10: Detection and Presence Control
- Tarek Abbes, Adel Bouhoula

, Michaël Rusinowitch:
A Traffic Classification Algorithm for Intrusion Detection. 188-193 - Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:

A New Approach to Early Detection of an Unknown Worm. 194-198 - Hiroaki Kikuchi, Yuichi Nakamura:

Online and Offline Presence Information Integrated with RFID and Instant Messaging Agent. 199-202 - Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao

:
Conditional Random Fields for Intrusion Detection. 203-208
Session 11: Protocols
- Chung-Ming Huang, Ching-Hsien Tsai:

WiMP-SCTP: Multi-Path Transmission Using Stream Control Transmission Protocol (SCTP) in Wireless Networks. 209-214 - Hiroyuki Hisamatsu, Go Hasegawa

, Masayuki Murata
:
Sizing Router Buffers for Large-Scale TCP/IP Networks. 215-219 - Luis H. García-Muñoz

, José Enrique Armendáriz-Iñigo
, Hendrik Decker, Francesc D. Muñoz-Escoí
:
Recovery Protocols for Replicated Databases - A Survey. 220-227 - Takuo Nakashima, Toshinori Sueyoshi:

Self-Similar Property for TCP Traffic under the Bottleneck Restrainment. 228-233
Session 12: Network Architectures and Algorithms
- João Paulo F. de Oliveira, Michael Schuenck, Glêdson Elias da Silveira:

Sharing Software Components Using a Service-Oriented, Distributed and Secure Infrastructure. 234-239 - Roman Y. Shtykh, Qun Jin:

Enhancing IR with User-Centric Integrated Approach of Interest Change Driven Layered Profiling and User Contributions. 240-245 - Atsushi Watanabe, Hiroshi Haruki, Shun Shimotomai, Takeshi Saito, Tomoyuki Nagase, Yoshio Yoshioka, Yoshiei Hasegawa:

A New Mutable Nonlinear Transformation Algorithm for S-box. 246-251 - Paula Cecilia Fritzsche

, Dolores Rexachs
, Emilio Luque
:
A Computational Approach to TSP Performance Prediction Using Data Mining. 252-259
DMIR 2007 Symposium on Data Mining and Information Retrieval
Session 1: Information Retrieval I
- Elisa Noguera, Fernando Llopis

, Antonio Ferrández
, Alberto Escapa:
Evaluation of Open-Domain Question Answering Systems within a Time Constraint. 260-265 - Kelvin Wu, Lei Yu, Michal Cutler:

Towards Answering How do I Questions Using Classification. 266-271 - Mohamed A. Mohandes

, S. I. Quadri, Mohamed A. Deriche
:
Arabic Sign Language Recognition an Image-Based Approach. 272-276
Session 2: Information Retrieval II
- Yuanning Liu, Xiaodong Zhu, Lingge Sui, Zhen Liu:

Morphological Zerotree Compression Coding Based on Integer Wavelet Transform for Iris Image. 277-282 - Shisanu Tongchim, Virach Sornlertlamvanich, Hitoshi Isahara:

Examining the Feasibility of Metasearch Based on Results of Human Judgements on Thai Queries. 283-288 - Dany Gebara, Reda Alhajj:

WaveQ: Combining Wavelet Analysis and Clustering for Effective Image Retrieval. 289-294
Session 3: Information Retrieval III
- Xuheng Xu, Xiaodan Zhang, Xiaohua Hu:

Using Two-Stage Concept-Based Singular Value Decomposition Technique as a Query Expansion Strategy. 295-300 - Jian Wen, Zhoujun Li

, Lijuan Zhang, Xiaohua Hu, Huowang Chen:
A New Method of Cluster-Based Topic Language Model for Genomic IR. 301-306 - Masashi Inoue

:
Mining Visual Knowledge for Multi-Lingual Image Retrieval. 307-312 - Karlheinz E. S. Toni:

Proactive Documents--A New Paradigm to Access Document Information from Various Contexts. 313-320
Session 4: Data Mining I
- L. M. Spracklin, Lawrence V. Saxton:

Filtering Spam Using Kolmogorov Complexity Estimates. 321-328 - Jiawei Rong, Dejing Dou, Gwen A. Frishkoff, Robert M. Frank, Allen D. Malony, Don M. Tucker:

A Semi-Automatic Framework for Mining ERP Patterns. 329-334 - Jia Zeng, Reda Alhajj:

Effectiveness of Multi-Perspective Representation Scheme on Support Vector Machines. 335-340 - Kin Fun Li, Darshika G. Perera:

An Investigation of Chip-Level Hardware Support for Web Mining. 341-348
Session 5: Information Extraction
- Jee-Hyub Kim

, Melanie Hilario:
Learning Relations and Information Extraction Rules for Protein Annotation. 349-354 - Fatima Ashraf, Reda Alhajj:

ClusTex: Information Extraction from HTML Pages. 355-360 - Yuan Jenq Lui, Richard P. Brent

, Ani Calinescu:
Extracting Significant Phrases from Text. 361-366
Session 6: Data Mining II
- Jacob Kogan:

Hybrid Clustering of Large Text Data. 367-372 - Sayed W. Qaiyumi, Daniel Stamate:

Reduction in Dimensions and Clustering Using Risk and Return Model. 373-378 - Quang Minh Vu, Tomonari Masada, Atsuhiro Takasu, Jun Adachi:

Using Web Directories for Similarity Measurement in Personal Name Disambiguation. 379-384 - Chunhua Su, Feng Bao, Jianying Zhou

, Tsuyoshi Takagi, Kouichi Sakurai:
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. 385-391 - Tian Zhu, Sixue Bai:

A Parallel Mining Algorithm for Closed Sequential Patterns. 392-395
SSNDS 2007 Symposium on Security in Networks and Distributed Systems
Session 1: Cryptographic Algorithms
- Adam J. Elbirt:

Fast and Efficient Implementation of AES via Instruction Set Extensions. 396-403 - Peter Lory:

Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values. 404-408 - Eun-Kyung Ryu, Tsuyoshi Takagi:

Efficient Conjunctive Keyword-Searchable Encryption. 409-414
Session 2: Distributed Access Control and Firewalls
- Birger Tödtmann, Erwin P. Rathgeb:

Advanced Packet Filter Placement Strategies for Carrier-Grade IP-Networks. 415-423 - Gansen Zhao, David W. Chadwick

, Sassa Otenko:
Obligations for Role Based Access Control. 424-431 - Chunming Rong

, Won-Chol Kim:
Effective Storage Security in Incompletely Trusted Environment. 432-437
Session 3: Wireless Ad Hoc and Sensor Network Security
- Canming Jiang, Bao Li, Haixia Xu:

An Efficient Scheme for User Authentication in Wireless Sensor Networks. 438-442 - Sameer Pai, Tanya G. Roosta, Stephen B. Wicker, Shankar Sastry:

Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust. 443-450 - Qinghua Wang

, Tingting Zhang:
Detecting Anomaly Node Behavior in Wireless Sensor Networks. 451-456 - Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen

:
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. 457-462
Session 4: Network Security Issues and Protocols
- Vandana Gunupudi, Stephen R. Tate:

Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules. 463-469 - Janne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong

:
Information Security Threats and Access Control Practices in Norwegian Businesses. 470-476 - Slim Trabelsi, Laurent Gomez, Yves Roudier:

Context-Aware Security Policy for the Service Discovery. 477-482 - Lau Cheuk Lung, Marcelo Shinji Higashiyama, Rafael R. Obelheiro, Joni da Silva Fraga:

Adapting the UCON_ABC Usage Control Policies on CORBASec Infrastructure. 483-488
Session 5: Authorization Schemes
- Giovanni Russello, Changyu Dong, Naranker Dulay:

Enforcing Fine-Grained Authorization Policies for Java Mobile Agents. 489-496 - Feike W. Dillema, Simone Lupetti, Tage Stabell-Kulø:

A Decentralized Authorization Architecture. 497-504 - Amirreza Masoumzadeh, Morteza Amini

, Rasool Jalili:
Conflict Detection and Resolution in Context-Aware Authorization. 505-511
Session 6: Authentication and Access Control
- Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen:

Authenticated Broadcast Encryption Scheme. 512-518 - Sunam Ryu, Kevin R. B. Butler

, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. 519-524 - Jan Cederquist

, Muhammad Torabi Dashti
, Sjouke Mauw
:
A Certified Email Protocol Using Key Chains. 525-530
Session 7: Key Management
- Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl:

Heuristics for Improving Cryptographic Key Assignment in a Hierarchy. 531-536 - Khaled Masmoudi, Hossam Afifi:

An Identity-Based Key Management Framework for Personal Networks. 537-543 - Ford-Long Wong, Hoon Wei Lim:

Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients. 544-550 - H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar:

A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies. 551-556
Session 8: Distributed Intrusion Detection and Protection Systems
- Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Basnet, Andrew H. Sung:

Detecting Coordinated Distributed Multiple Attacks. 557-562 - Neil C. Rowe:

Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace. 563-568 - Akira Yamada

, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig:
Intrusion Detection for Encrypted Web Accesses. 569-576 - Byungseung Kim, Saewoong Bahk:

Relative Entropy-Based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets. 577-582
Session 9: Software Security
- Lifu Wang, Partha Dasgupta:

Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. 583-589 - Thawatchai Chomsiri

:
HTTPS Hacking Protection. 590-594 - Azzam Mourad

, Marc-André Laverdière, Mourad Debbabi
:
Towards an Aspect Oriented Approach for the Security Hardening of Code. 595-600
Session 10: PKI and Digital Signatures
- Ping Yu, Stephen R. Tate:

An Online/Offline Signature Scheme Based on the Strong RSA Assumption. 601-606 - Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert:

Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences. 607-613 - Daniel Kouril, Ludek Matyska

, Michal Procházka:
A Robust and Efficient Mechanism to Distribute Certificate Revocation Information Using the Grid Monitoring Architecture. 614-619
Session 11: Privacy and Trust
- Ronggong Song, Larry Korba, George Yee:

Privacy Rights Management for Privacy Compliance Systems. 620-625 - Jakob Illeborg Pagter, Michael Østergaard Pedersen:

The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing. 626-631 - Hilmi Günes Kayacik, Nur Zincir-Heywood

:
On the Contribution of Preamble to Information Hiding in Mimicry Attacks. 632-638
BLSC 2007 Symposium on Bioinformatics and Life Science Computing
Session 1: Bioinformatics and Life Science Computing I
- Nawar Malhis

, Kelvin Xi Zhang, B. F. Francis Ouellette:
Detecting Protein-Domains DNA-Motifs Association in Saccharomyces cerevisiae Regulatory Networks. 639-644 - Wendy Osborn:

A Spatial Indexing Approach for Protein Structure Modeling. 645-650 - José Antônio Fernandes de Macêdo, Fábio Porto, Sérgio Lifschitz

, Philippe Picouet:
Dealing with Some Conceptual Data Model Requirements for Biological Domains. 651-656
Session 2: Bioinformatics and Life Science Computing II
- Mingjun Song, Sanguthevar Rajasekaran:

A Greedy Correlation-Incorporated SVM-Based Algorithm for Gene Selection. 657-661 - Monther Tarawneh

, Bing Bing Zhou
, Penghao Wang
, Albert Y. Zomaya
:
Investigation of Relationships among Excavate Taxa Using a New Quartet-Based Phylogenetic Analysis Method. 662-667 - Georges Valétudie, Jacky Desachy, Christophe Sola

:
Markov Models to Classify M. tuberculosis Spoligotypes. 668-671
Session 3: Bioinformatics and Life Science Computing III
- Santan Challa, Parimala Thulasiraman:

A Graph Based Approach to Discover Conserved Regions in DNA and Protein Sequences. 672-677 - Mohammed Al-Shalalfa, Reda Alhajj:

Attractive Feature Reduction Approach for Colon Data Classification. 678-683 - Wei-bang Chen, Chengcui Zhang, Xin Chen:

Biological Sequence Clustering and Classification with a Hybrid Method and Dynamic Programming. 684-689 - Andrei Doncescu, Yoshitaka Yamamoto, Katsumi Inoue

:
Biological Systems Analysis Using Inductive Logic Programming. 690-695
Session 4: Bioinformatics and Life Science Computing IV
- Hans De Sterck, Chen Zhang, Aleks Papo:

Database-Driven Grid Computing with GridBASE. 696-701 - Yong Li, Xiujuan Chen, Saeid Belkasim, Yi Pan:

Parallel Contour Matching and 3D Partial Retrieval in Bio-Image Database. 702-706 - Jamal Alhiyafi

, Cavitha Sabesan, Shiyong Lu, Melphine Harriott
, Deborah Jurczyszyn, Raquel P. Ritchie, Felicitas S. Gonzales, Jeffrey L. Ram:
Computational Methods for Analysis of Cryptic Recombination in the Performance of Genomic Recombination Detection Software. 707-712 - Maria Mirto, Massimo Cafaro

, Sandro Fiore
, Giovanni Aloisio
:
A Grid System for the Ingestion of Biological Data into a Relational DBMS. 713-718
Session 5: Bioinformatics and Life Science Computing V
- Jacques Demongeot

, Andrés Moreira:
A Circular Hamming Distance, Circular Gumbel Distribution, RNA Relics and Primitive Genome. 719-726 - Hiroshi Kobayashi, Ryuzo Azuma, Akihiko Konagaya:

Kinetic Analysis of Ligand-Receptor Complex Formation with the Aid of Computer Simulation. 727-732 - Mohammed Al-Shalalfa, Reda Alhajj:

Application of Double Clustering to Gene Expression Data for Class Prediction. 733-738 - Mehdi Pirooznia

, Youping Deng:
Efficiency of Hybrid Normalization of Microarray Gene Expression: A Simulation Study. 739-744 - Jean-Louis Lassez, Ryan A. Rossi

, Axel E. Bernal:
Crick's Hypothesis Revisited: The Existence of a Universal Coding Frame. 745-751
SEC 2007 Symposium on Embedded Computing
Session 1: Software Environments and Simulations
- Antonio Flores, Juan L. Aragón

, Manuel E. Acacio
:
Sim-PowerCMP: A Detailed Simulator for Energy Consumption Analysis in Future Embedded CMP Architectures. 752-757 - Rongrong Zhong, Yongxin Zhu, Weiwei Chen, Mingliang Lin, Weng-Fai Wong

:
An Inter-Core Communication Enabled Multi-Core Simulator Based on SimpleScalar. 758-763 - Rahman Hassan, Antony Harris, Nigel P. Topham, Aristides Efthymiou

:
Synthetic Trace-Driven Simulation of Cache Memory. 764-771
Session 2: Scheduling Algorithms
- Nan Guan

, Mingsong Lv
, Qingxu Deng, Ge Yu:
A Real-Time Scheduling Algorithm with Buffer Optimization for Embedded Signal Processing Systems. 772-777 - Wei Luo, Xiao Qin

, Kiranmai Bellam:
Reliability-Driven Scheduling of Periodic Tasks in Heterogeneous Real-Time Systems. 778-783 - Karsten Walther, Jörg Nolte:

A Flexible Scheduling Framework for Deeply Embedded Systems. 784-791
Session 3: Architecture Design and Synthesis
- Abhishek Pillai, Wei Zhang, Laurence Tianruo Yang:

Exploring Functional Unit Design Space of VLIW Processors for Optimizing Both Performance and Energy Consumption. 792-797 - Mallik Kandala, Wei Zhang, Laurence Tianruo Yang:

An Area-Efficient Approach to Improving Register File Reliability against Transient Errors. 798-803 - Gul N. Khan

, Usman Ahmed:
Hardware-Software Cosynthesis of Multiprocessor Embedded Architectures. 804-810 - Abhishek Pillai, Wei Zhang, Dimitrios Kagaris:

Detecting VLIW Hard Errors Cost-Effectively through a Software-Based Approach. 811-815
Session 4: Embedded Applications
- Adrian P. Lauf

, Richard A. Peters, William H. Robinson
:
Embedded Intelligent Intrusion Detection: A Behavior-Based Approach. 816-821 - Abdulhadi Shoufan

, Ralf Laue, Sorin A. Huss:
High-Flexibility Rekeying Processor for Key Management in Secure Multicast. 822-829 - Coral Gonzalez-Concejero, V. Rodellar, Agustín Álvarez-Marquina

, Elvira Martínez de Icaya, Pedro Gómez-Vilda
:
A Soft-Core for Pattern Recognition. 830-834 - Katsuyoshi Matsumoto, Hideki Mori, Minoru Uehara:

Fault Tolerance in Small World Cellular Neural Networks for Image Processing. 835-839 - Junjie Ni, Yongxin Zhu, Wei Guo:

An Improved RAIM Scheme for Processing Multiple Outliers in GNSS. 840-845
TeNAS 2007 Workshop on Telecommunication Networking, Applications and Systems
Session 1: Network Technologies
- Shih-Hao Chang, Madjid Merabti, Hala M. Mokhtar:

Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks. 846-851 - Sudath Indrasinghe, Rubem Pereira, John Haggerty:

Conflict Free Address Allocation Mechanism for Mobile Ad Hoc Networks. 852-857 - Ying-Dar Lin, Kuo-Kun Tseng, Chen-Chou Hung, Yuan-Cheng Lai:

Scalable Automaton Matching for High-Speed Deep Content Inspection. 858-863
Session 2: Network Technologies
- Faycal Bouhafs

, Madjid Merabti, Hala M. Mokhtar:
Mobile Event Monitoring Protocol for Wireless Sensor Networks. 864-869 - Pi-Chung Wang

, Chia-Tai Chan, Po-Yen Lin:
MAC Address Translation for Enabling Scalable Virtual Private LAN Services. 870-875 - Rubem Pereira, Ella Pereira

:
Real Time Scheduling for Audio and Video Streams. 876-881
Session 3: Network Technologies
- Tarag Fahad, Djamel Djenouri

, Robert Askwith, Madjid Merabti:
A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET. 882-887 - Minoru Uehara:

A Toolkit for Virtual Large-Scale Storage in a Learning Environment. 888-893 - Kenvi Wang, Lin-Yi Peng, Tsung-Mao Chen, Szu-Yu Chen:

A Fuzzy-Based and Simulated IP Network Traffic Engineering Promoting Multi-Service Performance. 894-899 - Stefan Wallin, Viktor Leijon:

Multi-Purpose Models for QoS Monitoring. 900-905 - Chiou-Yng Lee, Yung-Hui Chen:

Low-Complexity Parallel Systolic Architectures for Computing Multiplication and Squaring over FG(2m). 906-911
Session 4: Network Applications
- Suleiman Y. Yerima, Khalid Al-Begain:

Buffer Management for Multimedia QoS Control over HSDPA Downlink. 912-917 - Te-Lung Liu, C. Eugene Yeh:

Planning and Design of TWAREN: Advanced National Research and Education Network in Taiwan. 918-922 - E. Catherine L. Watts, Madjid Merabti, A. Taleb-Bendiab:

A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality. 923-928 - Fong-Hao Liu:

Constructing Enterprise Information Network Security Risk Management Mechanism by Using Ontology. 929-934 - Paul Fergus

, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi:
Bridging the Gap between Networked Appliances and Virtual Worlds. 935-940
SOCNE 2007 Workshop on Service Oriented Architectures in Converging Networked Environments
Session 1: Service-oriented Architectures in Embedded Systems
- Daniel Barisic, Martin Krogmann, Guido Stromberg, Peter Schramm:

Making Embedded Software Development More Efficient with SOA. 941-946 - François Jammes, Antoine Mensch, Harm Smit:

Service-Oriented Device Communications Using the Devices Profile for Web services. 947-955 - Elmar Zeeb, Andreas Bobek, Hendrik Bohn

, Frank Golatowski
:
Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services. 956-963 - Markus Zajac

, Brigitte Oesterdiekhoff, Chris Loeser, Hendrik Bohn
:
Bilateral Service Mapping Approaches between the Different Service Oriented Architectures Web Services and UPnP. 964-969
Session 2: Key Services in Service-oriented Architectures
- Michael Ditze, Matthias Grawinkel:

Fuzzy Logic Based Admission Control for Multimedia Streams in the UPnP QoS Architecture. 970-976 - Nicolas Van Wambeke, François Armando, Christophe Chassot, Ernesto Exposito

:
Architecture and Models for Self-Adaptability of Transport Protocols. 977-982 - Frank Bormann, Stephan Flake, Jürgen Tacken:

Convergent Online Charging for Context-Aware Mobile Services. 983-988 - Davy Preuveneers, Julien Pauty, Dimitri Van Landuyt

, Yolande Berbers, Wouter Joosen:
Comparative Evaluation of Converged Service-Oriented Architectures. 989-994
Session 3: Service Management & Service Mediation
- Farhana H. Zulkernine, Patrick Martin:

Conceptual Framework for a Comprehensive Service Management Middleware. 995-1000 - Chen Wu, Elizabeth Chang

:
An Analysis of Web Services Mediation Architecture and Pattern in Synapse. 1001-1006 - Lina Fang, Shengqun Tang, Yan Yang, Ruliang Xiao

, Ling Li, Xinguo Deng, Yang Xu, Youwei Xu:
An User-Driven Slight Ontology Framework Based on Meta-Ontology for Change Management. 1007-1014

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














