default search action
24th AINA Workshops 2010: Perth, Australia
- 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, Perth, Australia, 20-13 April 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4019-1
IEEE First International Workshop on Socio-Technical Aspects of Mashups
- Sergio Martín, Manuel Castro, Alex Talevski, Vidyasagar M. Potdar:
A Middleware for Mobile and Ubiquitous Learning Ecosystems Based on a Reconfigurable Plug-and-Play Architecture: Application to Mashups. 1-6 - Flora Dilys Salim:
Towards Adaptive Mobile Mashups: Opportunities for Designing Effective Persuasive Technology on the Road. 7-11 - Michele Stecca, Massimo Maresca:
Mashup Patterns from Service Component Taxonomy. 12-17
The Sixth International Symposium on Frontiers of Information Systems and Network Applications (FINA)
Cyber Engineering 1
- Wurong Pan, Xuefen Chi, Lin Guan, Yining Wang, Xin Gang Wang:
Evaluation of Error Control Mechanisms Based on System Throughput and Video Playable Frame Rate on Wireless Channel. 18-23 - Kai Hu, Zhe Wang:
An Analytical Model of k-Ary n-Cube under Spatial Communication Locality. 24-29 - Girish Gokuldasan, Arobinda Gupta:
DTCC: A Distributed Congestion Control Scheme for Connectionless Networks. 30-35 - Yan Yang, Fei Yang, Ailixier Aikebaier, Naixue Xiong, Tomoya Enokido, Makoto Takizawa:
Performance Evaluation of an Optimized Load Allocation Approach for Web Server Clusters. 36-41
Human Space Computing 1
- Vinicius Garcia de Oliveira, Marcos Rogério Salvador, Daniel Kenji Takayassu, Vinicius Geraldo Felix, Nelson Luis Saldanha da Fonseca:
Applying Bloom Filter Addressing in Metro Ethernet Network. 42-49 - Ahmed Galib Reza, Tan Saw Chin, Fouad M. Abbou:
A Selective Minimum Delay Value (SMDV) Algorithm for Packet Contention Resolution in Optical Packet Switching. 50-54 - Putu Dana Karningsih, Berman Kayis, Sami Kara:
Development of SCRIS: A Knowledge Based System Tool for Assisting Organizations in Managing Supply Chain Risks. 55-60 - Yoshitaka Sakurai, Kinshuk, Kouhei Takada, Rainer Knauf, Setsuo Tsuruta:
Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration. 61-67
Applications 1
- Rachna Dhand, Gareth Lee, Graeme Cole:
Analytical Temporal Specification Issues for Industrial Control Systems. 68-74 - T. S. Indumathi, T. Srinivas, K. Rajaiah, Velur Rajappa:
Routing Analysis and Flexibility of ROADMs in All Optical Networks. 75-78 - Kwanghoon Pio Kim, Minseok Oh:
A Workflow Fragmentation Framework for Enterprise Grid Workflow Systems. 79-84
Distributed Networks 1
- Omer Khalid, Ivo Maljevic, Richard J. Anthony, Miltos Petridis, Kevin Parrott, Markus Schulz:
Deadline Aware Virtual Machine Scheduler for Grid and Cloud Computing. 85-90 - Mohammad Reza Ahmadi, Davood Maleki:
Effect of Virtual Techniques in Data Storage Access. 91-96 - Suresh L, Jay B. Simha, Rajappa Velur:
Generating Optimum Number of Clusters Using Median Search and Projection Algorithms. 97-102
Application 2
- Pijitra Jomsri, Siripun Sanguansintukul, Worasit Choochaiwattana:
A Framework for Tag-Based Research Paper Recommender System: An IR Approach. 103-108 - Rathiah Hashim, Siti Z. Z. Abidin:
User Interface Development for a Computer-Based User Study: The Universal Model Approach. 109-114 - Xunli Fan, Feng Zheng, Lin Guan, Xingang Wang:
NLAR: A New Approach to AQM. 115-120
Security and Privacy
- Scott Loper, S. Kami Makki:
Data Filtering Utilizing Window Indexing. 121-126 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata:
Proposal of Transmission Control Methods with Multihopped Environments in Cognitive Wireless Networks. 127-132 - Wen-Fong Wang, Fong-Cheng Lee, Guo-Lung Lu:
A Shared-Memory Design for Crosspoint Buffered Switches under Mixed Uni- and Multicast Traffic. 133-138 - Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
JXTA Security in Mobile Constrained Devices. 139-144
Distributed Networks 2
- Vishal Barot, Robert Harrison, Stuart McLeod:
Distribution of Machine Information Using Blackboard Designed Component for Remote Monitoring of Reconfigurable Manufacturing Systems. 145-151 - Farhad Faghani, Ghasem Mirjalily:
Isolated Forwarding Strategy in Ethernet Networks. 152-156 - Jun Sawamoto, Eiji Sugino, Norihisa Segawa, Yuji Wada:
Program Learning Using Static Information and Dynamic Program Execution Slices. 157-162
Human Space Computing 2
- Yasunori Osana, Shin-ichi Kuribayashi:
Enhanced Fair Joint Multiple Resource Allocation Method in All-IP Networks. 163-168 - Ji Qing, Xiaohui Li, Naian Liu, Yongqiang Hei, Guanghui Yu:
A Joint Antenna Selection and Power Allocation Algorithm for CoMP Systems. 169-172 - Masayuki Minoura, Norihiko Shinomiya, Kazuyuki Tajima, Takuya Miyashita, Motoyoshi Sekiya:
An Evaluation Technique Using Network Voronoi Diagram for Balanced Optical Network Design. 173-176
Cyber Engineering 2
- Shiori Toyoshima, Saneyasu Yamaguchi, Masato Oguchi:
Storage Access Optimization with Virtual Machine Migration During Execution of Parallel Data Processing on a Virtual Machine PC Cluster. 177-182 - Kaouthar Fakhfakh, Saïd Tazi, Khalil Drira, Tarak Chaari, Mohamed Jmaiel:
Implementing and Testing a Semantic-Driven Approach Towards a Better Comprehension Between Service Consumers and Providers. 183-188 - Alcides Calsavara, Luiz A. Paula Lima Jr.:
Routing Based on Message Attraction. 189-194 - Arash Rezaei, Hadi Salimi, Mohsen Sharifi:
Improving Software Dependability Using System-Level Virtualization: A Survey. 195-199
Distributed Networks 2
- Atif Sharif, Vidyasagar M. Potdar, Rana Fayyaz Ahmad:
Adaptive Channel Coding and Modulation Scheme Selection for Achieving High Throughput in Wireless Networks. 200-207
Security and Privacy 2
- Mohammed A. Alhabeeb, Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan:
Information Security Threats Classification Pyramid. 208-213 - Yuji Wada, Yuta Watanabe, Keisuke Syoubu, Jun Sawamoto, Takashi Katoh:
Virtual Database Technology for Distributed Database. 214-219 - Fatos Xhafa, Alexandra Poulovassilis:
Requirements for Distributed Event-Based Awareness in P2P Groupware Systems. 220-225
Security and Privacy 3
- Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka:
Security Verification for Authentication and Key Exchange Protocols, Revisited. 226-233 - Chiou-Yng Lee, Yu-Hsin Chiu, Jung-Hui Chiu:
Concurrent Error Detection in Shifted Dual Basis Multiplier over GF(2m) Using Cyclic Code Approach. 234-239 - Gerald Quirchmayr, Christopher C. Wills:
Some Thoughts on the Legal Background of the Continuously Increasing Privacy Risk in Information Systems and on How to Deal with It. 240-244
Cyber Engineering 3
- Tao Yang, Makoto Ikeda, Gjergji Mino, Leonard Barolli, Arjan Durresi, Fatos Xhafa:
Performance Evaluation of Wireless Sensor Networks for Mobile Sink Considering Consumed Energy Metric. 245-250 - Li-Chi Feng, Hsin-Yang Chen, Tsung-Hsien Li, Jr-Jung Chiou, Chung-Chiu Shen:
Design and Implementation of an IEEE 802.15.4 Protocol Stack in Embedded Linux Kernel. 251-256 - Davi Junio Silva de Oliveira, Nelson Souto Rosa:
Evaluating Product Line Architecture for Grid Computing Middleware Systems: Uba Experience. 257-262 - Erwin Adi, Sri Ayu Ningsih:
Ubiquitous Public Transportation Route Guide for a Developing Country. 263-268
Security and Privacy 4
- Takahiro Fujishiro, Akane Sato, Yoko Kumagai, Tadashi Kaji, Kenichi Okada:
Development of Hi-Speed X.509 Certification Path Validation System. 269-274 - Guoyan Zhang:
Practical Threshold One-Time Proxy Signature Scheme. 275-279 - Min-Xiou Chen, Yung-Cheng Chuang:
Supporting Home Security System in OSGi Platform. 280-285 - Markus M. Kohn, Elizabeth Chang, Achim Karduck, Alex Talevski:
SMART CAMP: Environmental Sustainability Through Intelligent Automation Technologies. 286-292
The Sixth International Workshop on Heterogeneous Wireless Networks (HWISE 2010)
Enabling Technologies
- Jiro Iwashige, Leonard Barolli:
Effects of Diffracted Waves for Perfectly Conducting Wedges in Propagation Path of Wireless Communication. 293-298 - Amjed Majeed, Tanveer A. Zia:
Multi-set Architecture for Multi-applications Running on Wireless Sensor Networks. 299-304 - Cheng-Chung Lin, Kumbesan Sandrasegaran, Huda Adibah Mohd Ramli, Minjie Xue:
Requirement of Handover Modeling in the Downlink 3GPP Long Term Evolution System. 305-310
Applications
- Marcelo H. Vithoft, Altair Olivo Santin, Cinthia O. de A. Freitas, Heverson Borba Ribeiro:
SP2MS: A MANet-Based P2P Service. 311-316 - Mahdi Jalili:
A Graph Weighting Method for Reducing Consensus Time in Random Geographical Networks. 317-322 - Ching-Yi Yang, Shou-Chih Lo:
Street Broadcast with Smart Relay for Emergency Messages in VANET. 323-328
Resource Management
- Chien-Yu Wu, Hann-Jang Ho, Sing-Ling Lee:
Cross-Layer Subchannel Assignment with Multicast over WiMAX Networks. 329-334 - Kuo-Hui Yeh, Nai-Wei Lo, Yingjiu Li, Enrico Winata:
An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag Identification. 335-338 - Kwan-Wu Chin:
On the Impact of Wi-Fi Multmedia Power Save Mode on the VoIP Capacity of WLANs. 339-344
Session Security in Wireless Systems
- Donglai Sun, Yue Wu, Tian Wu, Yang Liu, Ning Liu, Junhua Tang:
Design and Construction of a Prototype Secure Wireless Mesh Network Testbed. 345-350 - Raihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar:
Trust Formalization in Mobile Ad-Hoc Networks. 351-356 - Roja Kiran Basukala, Kyu Jin Park, Dong-You Choi, Seung Jo Han:
Secure Mobile IP Communication in Residential Networks. 357-362 - Manjun Zhang, Changxing Pei, Lanjun Dang:
Efficient Mobile IP Registration in Certificateless Signature. 363-366
The Sixth International Symposium on Web and Mobile Information Services (WAMIS 2010)
Web Services
- Chi-Chun Lo, Ding-Yuan Cheng, Chen-Fang Tsai, Kuo-Ming Chao:
Service Selection Based on Fuzzy TOPSIS Method. 367-372 - Thair Khdour, Maria Fasli:
A Semantic-Based Web Service Registry Filtering Mechanism. 373-378 - Zakaria Maamar, Samir Tata, Djamal Benslimane, Philippe Thiran:
How do Goals Drive the Engineering of Capacity-Driven Web Services?. 379-386 - Adeel Shajjar, Hafiz Farooq Ahmad:
Web Service Provisioning to Nomadic Users Using a Light Weight Multi Agent System. 387-394
The Web and Mobile Applications
- Kaori Kobayashi, Ryong Lee, Kazutoshi Sumiya:
Pros and Cons of Utilizing Mobile Navigation Systems in Pedestrian Way Finding. 395-400 - Shuchih Ernest Chang, Chia-Wei Wang:
Effectively Generating and Delivering Personalized Product Information: Adopting the Web 2.0 Approach. 401-406 - Shuchih Ernest Chang, Ching-Huei Tung:
A Web-Feed Based Service for Enhancing Asynchronous Learning on Personal Computers and Mobile Devices. 407-412 - Basit Qureshi, Geyong Min, Demetres D. Kouvatsos, Mohammad Ilyas:
An Adaptive Content Sharing Protocol for P2P Mobile Social Networks. 413-418
Security and Privacy
- Brent Kimpton, Eric Pardede:
Securing Queries to Outsourced XML Databases. 419-424 - Takeru Inoue, Yohei Katayama, Hiroshi Sato, Noriyuki Takahashi:
iAuth: HTTP Authentication Framework Integrated into HTML Forms. 425-430 - Ha-Thanh Le, Deepak Subramanian, Wen-Jing Hsu, Peter Kok Keong Loh:
Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model. 431-436 - Mohammad Hasan Samadani, Mehdi Shajari, Mohammad Mehdi Ahaniha:
Self-Proxy Mobile Signature: A New Client-Based Mobile Signature Model. 437-442
Data Models and Query Processing
- S. Kami Makki, Matthew Rockey:
Query Visualization for Query Trimming in Semantic Caching. 443-448 - Masaki Kohana, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura:
Dynamic Data Allocation Scheme for Multi-server Web-Based MORPG System. 449-454 - Abdullah M. Baqasah, Eric Pardede:
Managing Schema Evolution in Hybrid XML-Relational Database Systems. 455-460
Web Applications
- Andreas Rusnjak, Marwane El Kharbili, Hristomir Hristov, Andreas Speck:
Managing the Dynamics of E/mCommerce with a Hierarchical Overlapping Business-Value-Framework. 461-466 - Tatsuya Fujisaka, Ryong Lee, Kazutoshi Sumiya:
Detection of Unusually Crowded Places through Micro-Blogging Sites. 467-472 - Chun-Hung Wu, Mei-Ling Chiang, Tsung-Lin Lu:
Kernel Mechanisms for Supporting Differentiated Services and Content-Aware Request Distribution in Web Clusters Providing Multiple Services. 473-478
Fifth Workshop on Performance Analysis and Enhancement of Wireless Networks (PAEWN-2010)
Algorithms and Protocols
- Wei-Jhih Lin, Kuen-Ding Lin, K. Robert Lai:
Density Control-Based Algorithms for Dynamic Maintenance in Sensor Networks with Limited Mobility. 479-484
Performance Evaluation and Testing
- Kashif Nisar, Abas Md Said, Halabi Hasbullah:
Enhanced Performance of Packet Transmission over VoIP Network. 485-490 - Leijia Wu, Abdallah E. Al Sabbagh, Kumbesan Sandrasegaran, Maged Elkashlan, Cheng-Chung Lin:
Performance Evaluation on Common Radio Resource Management Algorithms. 491-495 - Daisuke Kasamatsu, Norihiko Shinomiya:
Implementation and Evaluation of Emulator for Testing Service Programs in MANET. 496-501
The Fifth Workshop on Service Oriented Architectures in Converging Networked Environments (SOCNE 2010)
SOA and Embedded Systems
- Stephan Sommer, Andreas Scholz, Irina Gaponova, Alois C. Knoll, Alfons Kemper, Christian Buckl, Gerd Kainz, Jörg Heuer, Anton Schmitt:
Service Migration Scenarios for Embedded Networks. 502-507 - Sebastian Käbisch, Daniel Peintner, Jörg Heuer, Harald Kosch:
Efficient and Flexible XML-Based Data-Exchange in Microcontroller-Based Sensor Actor Networks. 508-513 - Guido Moritz, Dirk Timmermann, Regina Stoll, Frank Golatowski:
Encoding and Compression for the Devices Profile for Web Services. 514-519 - Robert Hilbrich:
An Evaluation of the Performance of DPWS on Embedded Devices in a Body Area Network. 520-525
SOA: Middleware, Platform, and Methodologies
- Oliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing:
Lightweight Policy-Based Management of Quality-Assured, Device-Based Service Systems. 526-531 - Jürgen Tacken, Stephan Flake, Frank Golatowski, Steffen Prüter, Carsten Rust, Alexandra Chapko, Andreas Emrich:
Towards a Platform for User-Generated Mobile Services. 532-538
Large-Scale SOA and Cloud Computing
- Amit Sangroya, Kirti Garg, Vasudeva Varma:
SAGE: An Approach to Evaluate the Impact of SOA Governance Policies. 539-544 - Raphael Zender, Ulrike Lucke, Djamshid Tavangarian:
SOA Interoperability for Large-Scale Pervasive Environments. 545-550 - Martin Randles, David J. Lamb, A. Taleb-Bendiab:
A Comparative Study into Distributed Load Balancing Algorithms for Cloud Computing. 551-556 - Yi-Heng Feng, C. Joseph Lee:
Exploring Development of Service-Oriented Architecture for Next Generation Emergency Management System. 557-561
Third International Workshop on RFID and WSN and its Industrial Applications
RFID
- Nai-Wei Lo, Kuo-Hui Yeh:
A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID Systems. 562-566 - Tongliang Zhang, Feng Wei, Hui Tang, Jianming Cui, Dan Han:
The Performance Analysis Using Multiple Beams for RFID Warehouse Management System. 567-570 - Pritam Gajkumar Shah, Xu Huang, Dharmendra Sharma:
Algorithm Based on One's Complement for Fast Scalar Multiplication in ECC for Wireless Sensor Network. 571-576
Wireless Sensor Networks
- Ashish Kumar Singh, Vidyasagar M. Potdar:
Torpid Mode: Hybrid of Sleep and Idle Mode as Power Saving Mechanism for IEEE 802.16j. 577-582 - Atif Sharif, Vidyasagar M. Potdar, A. J. D. Rathnayaka:
Priority Enabled Transport Layer Protocol for Wireless Sensor Network. 583-588 - Pritam Gajkumar Shah, Xu Huang, Dharmendra Sharma:
Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks. 589-592
The 2010 IEEE International Symposium on Mining and Web (MAW)
Semantic Data Processing
- Dimitrios A. Koutsomitropoulos, Georgia D. Solomou, Tzanetos Pomonis, Panagiotis Aggelopoulos, Theodore S. Papatheodorou:
Developing Distributed Reasoning-Based Applications for the Semantic Web. 593-598 - Si Chen, Gongde Guo, Lifei Chen:
A New Over-Sampling Method Based on Cluster Ensembles. 599-604
Multimedia Mining
- Ahmad Hammoud, Daniel Bourget:
Eye-like Algorithm to produce voice web pages. 605-608 - George Adam, Christos Bouras, Vassilis Poulopoulos:
Image Extraction from Online Text Streams: A Straightforward Template Independent Approach without Training. 609-614 - Jeremy K. Hall, Shuichi Kurabayashi, Yasushi Kiyoki:
Multimedia Data Analysis on a Massively Distributed Parallelization Network of Anonymous Web Clients. 615-620 - Larbi Guezouli, Hassane Essafi:
CASIT: Content Based Identification of Textual Information in a Large Database. 621-625
Web Analysis
- Akira Yamada, Hara Masanori, Yutaka Miyake:
Web Tracking Site Detection Based on Temporal Link Analysis. 626-631
User Models
- Anwar Alhenshiri, Jack Duffy:
User Studies in Web Information Retrieval: User-Centered Measures in Web IR Evaluation. 632-637 - Ishant Arora, V. K. Panchal:
An MIU [Most Influential Users]-Based Model for Recommender Systems. 638-643
Web and Data Mining
- Yu Zhang, Zhaoqing Wang, Chaolun Xia:
Identifying Key Users for Targeted Marketing by Mining Online Social Network. 644-649
The Third International Symposium on Applications of Ad Hoc and Sensor Networks (AASNET '10)
MAC and Routing Protocols
- Daiki Shitara, Toshiaki Miyazaki, Hidenori Igari:
A Function Alternation Algorithm for Wireless Sensor Networks. 650-655 - Kuei-Ping Shih, Yen-Da Chen, Shu-Sheng Liu:
A Collision Avoidance Multi-channel MAC Protocol with Physical Carrier Sensing for Mobile Ad Hoc Networks. 656-661 - Peter Janacik, Emi Mathews, Dalimir Orfanus:
Self-Organizing Data Collection in Wireless Sensor Networks. 662-667
Power Saving Protocols
- Najmeh Kamyabpour, Doan B. Hoang:
A Hierarchy Energy Driven Architecture for Wireless Sensor Networks. 668-673 - Hossein Memarzadeh, Mehdi Dehghan, Sam Jabbehdari:
A New Quorum-Based Power Saving Protocol to Maintain QoS for MANETs with Burst Traffics. 674-679 - Kyung Tae Kim, Chang Hoon Lyu, Sung Soo Moon, Hee Yong Youn:
Tree-Based Clustering(TBC) for En