


default search action
8. BWCCA 2013: Compiegne, France
- 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France, October 28-30, 2013. IEEE 2013, ISBN 978-0-7695-5093-0

BWCCA 2013
Session 1: Wireless and Mobile Networks
- Mohamed Emam Mohamed Fathy:

Optimized Handover Mechanism between eNBs and the Dynamic Network of HeNBs in 3GPP LTE. 1-8 - Nguyen B. Truong, Chansu Yu:

Investigating Latency in GNU Software Radio with USRP Embedded Series SDR Platform. 9-14 - Noriki Uchida, Noritaka Kawamura, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori:

Proposal of Data Triage Methods for Disaster Information Network System Based on Delay Tolerant Networking. 15-21 - Michal Pióro

, Dritan Nace, Yoann Foquet:
On Protected Traffic Routing in Wireless Networks with Partial Multiple Link Failures. 22-28
Session 2: Wireless Sensor Networks I
- Areeba Rao, Mariam Akbar, Nadeem Javaid

, Saad Noor Mohammad, S. Sarfraz:
AM-DisCNT: Angular Multi-hop DIStance Based Circular Network Transmission Protocol for WSNs. 29-35 - Alfonso Farruggia, Salvatore Vitabile

:
A Novel Approach for Faulty Sensor Detection and Data Correction in Wireless Sensor Network. 36-42 - N. Amjad, Nadeem Javaid

, Arsalan Haider, A. A. Awan, M. Rahman:
DREEM-ME: Distributed Regional Energy Efficient Multi-hop Routing Protocol Based on Maximum Energy in WSNs. 43-48 - Meisam Kamarei, Mojtaba Hajimohammadi, Ahmad Patooghy

, Mahdi Fazeli
:
OLDA: An Efficient On-Line Data Aggregation Method for Wireless Sensor Networks. 49-53 - Ada Gogu, Dritan Nace, Yacine Challal

:
A Framework for Solving the Configuration Problem in Wireless Sensor Networks. 54-60
Session 3: Wireless Mesh Networks
- Tetsuya Oda, Shinji Sakamoto

, Evjola Spaho
, Admir Barolli, Fatos Xhafa:
Mesh Router Node Placement in Wireless Mesh Networks Considering Different Initial Router Placement Methods. 61-67 - Admir Barolli, Tetsuya Oda, Leonard Barolli, Evjola Spaho

, Fatos Xhafa, Makoto Takizawa
:
Effects of Selection Operators for Mesh Router Placement in Wireless Mesh Networks Considering Weibull Distribution of Mesh Clients. 68-73 - Shinji Sakamoto

, Elis Kulla, Tetsuya Oda, Leonard Barolli, Makoto Ikeda, Fatos Xhafa:
Performance Comparison for Different Communication Distances of Mesh Routers in WMN-SA Simulation System. 74-79 - Yuki Kumata, Akio Koyama:

Mesh Net Viewer: A Visualization System for Wireless Mesh Networks. 80-87
Session 4: Wireless Sensor Networks II
- Arsalan Haider, Nadeem Javaid

, N. Amjad, A. A. Awan, Abid Khan, Nasir Khan:
REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for WSNs. 88-92 - Mohsin Raza Jafri

, S. Ahmed, Nadeem Javaid
, Zaheer Ahmad, R. J. Qureshi:
AMCTD: Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks. 93-99 - Yahya Khan, Nadeem Javaid

, Muhammad Junaid Khan, Y. Ahmad, Muhammad H. Zubair, Samia A. Shah:
LPCH and UDLPCH: Location-Aware Routing Techniques in WSNs. 100-105 - Azeddine Attir, Yacine Challal

, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah:
Braided Disjoint Branch Routing Protocol for WSNs. 106-113 - Jen-Shiun Chen:

Target Identification by Radar Sensor Networks with Variable-Interval Sampling and Linear Interpolation. 114-119
Session 5: Wireless Communication Systems
- Shinya Matsuo, Weihua Sun, Naoki Shibata

, Tomoya Kitani, Minoru Ito:
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surrounding a Building. 120-127 - Zhipeng Wang, Tianyu Du, Yong Tang, Dimitrios Makrakis, Hussein T. Mouftah:

ACK with Interference Detection Technique for ZigBee Network under Wi-Fi Interference. 128-135 - Yingni Zhang, Xiaofeng Tao, Dejian Xu:

A Novel Coordinated Method with Enhanced Feedback in MIMO Cooperate Communications. 136-140 - Alban Rakipi

, Enik Shytermeja, Shkelzen Cakaj, Rozeta Miho, Bexhet Kamo:
Performance Analysis of a Positioning Algorithm Using Raw Measurements Taken from a GPS Receiver. 141-145
Session 6: Wireless Sensor Networks III
- Ahmad Movahedian Attar, M. Hamed Izadi, Maedeh Movahedian, Shantia Yarahmadian:

Coverage Estimation in Floorplan Visual Sensor Networks. 146-150 - Cesare Celozzi, Filippo Gandino, Maurizio Rebaudengo

:
Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor Networks. 151-157 - Danish Mahmood

, Nadeem Javaid
, Shaharyar Mahmood, Sanaullah U. Qureshi, A. M. Memon, T. Zaman:
MODLEACH: A Variant of LEACH for WSNs. 158-163 - Qaisar Nadeem, Muhammad Babar Rasheed, Nadeem Javaid

, Zahoor Ali Khan
, Y. Maqsood, Ahmad Din
:
M-GEAR: Gateway-Based Energy-Aware Multi-hop Routing Protocol for WSNs. 164-169
Session 7: Mobile Computing
- Antonios G. Alexiou, Dimitrios Bilios, Christos Bouras:

A Power Control Mechanism Based on Priority Grouping for Small Cell Networks. 170-176 - Junichi Honda, Takuya Otsuyama:

Rapid Ray Tracing Analysis of Scattered Field from an Aircraft Model in Super Wide Area. 177-183 - Vamsi Paruchuri

, Sriram Chellappan:
Context Aware Identity Management Using Smart Phones. 184-190 - Kenta Miura, Fumiaki Sato:

Evaluation of a Hybrid Method of User Location Anonymization. 191-198 - Elis Kulla, Shinji Sakamoto

, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Bexhet Kamo:
Evaluation of a MANET Testbed for Central Bridge and V-Shape Bridge Scenarios Using BATMAN Routing Protocol. 199-205
Session 8: Body Area Sensor Networks
- Anum Tauqir

, Nadeem Javaid
, Sana Akram, Areeba Rao, Saad Noor Mohammad:
Distance Aware Relaying Energy-Efficient: DARE to Monitor Patients in Multi-hop Body Area Sensor Networks. 206-213 - Sana Akram, Nadeem Javaid

, Anum Tauqir
, Areeba Rao, Saad Noor Mohammad:
THE-FAME: THreshold Based Energy-Efficient FAtigue MEasurement for Wireless Body Area Sensor Networks Using Multiple Sinks. 214-220 - Qaisar Nadeem, Nadeem Javaid

, Saad Noor Mohammad, M. Y. Khan, S. Sarfraz, M. Gull:
SIMPLE: Stable Increased-Throughput Multi-hop Protocol for Link Efficiency in Wireless Body Area Networks. 221-226 - Nadeem Javaid

, S. Faisal, Zahoor Ali Khan
, D. Nayab, Maheen Zahid:
Measuring Fatigue of Soldiers in Wireless Body Area Sensor Networks. 227-231 - Anum Tauqir

, Sana Akram, A. H. Khan, Nadeem Javaid
, Mariam Akbar:
Non-invasive Induction Link Model for Implantable Biomedical Microsystems: Pacemaker to Monitor Arrhythmic Patients in Body Area Networks. 232-237
Session 9: Cloud and Cluster Computing
- Abdulaziz M. D. Aljohani, D. R. W. Holton, Irfan Awan:

Modeling and Performance Analysis of Scalable Web Servers Deployed on the Cloud. 238-242 - Yuichiro Takabe, Minoru Uehara:

The Evaluations of Energy Management Methods in Supersaturated Cloud. 243-247 - Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal

:
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management. 248-252 - Dilawaer Doulikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Energy-Efficient Dynamic Clusters of Servers. 253-260 - Gowun Jeong, Hyun Seung Yang, Sang-Soo Yeo

, Yong-Ho Seo:
Known-Key Attack-Resilient Cluster Key Management. 261-264
Session 10: P2P and Health Technologies
- Sonoko Takeda, Hiroki Ushikubo, Hiroshi Shigeno:

SPTrust: Reputation Aggregation Method Based on Similarity to Reputation Scores of Power Nodes in Unstructured P2P Networks. 265-272 - Deepali Arora, Teghan Godkin, Adam Verigin, Stephen W. Neville:

Empirical Evidence for Non-equilibrium Behaviors within Peer-to-Peer Structured Botnets. 273-281 - Ardiana Sula, Evjola Spaho

, Keita Matsuo, Leonard Barolli, Rozeta Miho, Fatos Xhafa:
An IoT-Based System for Supporting Children with Autism Spectrum Disorder. 282-289 - Akio Koyama, Kanako Endo:

A Health Management Support System Using Fuzzy Theory. 290-295
Session 11: MANETs and VANETs
- Masahiro Hiyama, Elis Kulla, Shinji Sakamoto

, Makoto Ikeda, Leonard Barolli:
Investigating the Effect of HELLO Validity Time of OLSR in a MANET Testbed. 296-301 - Evjola Spaho

, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Vladi Kolici
, Jiro Iwashige:
Performance Evaluation of AODV Routing Protocol in VANETs Considering Multi-flows Traffic. 302-307 - Marwane Ayaida, Hacène Fouchal

, Yacine Ghamri-Doudane, Lissan Afilal:
Efficient Coupling of Routing and Location-based Service for VANETs. 308-315 - Mahantesh G. Kambalimath, S. K. Mahabaleshwar, Sunilkumar S. Manvi:

Reliable Data Delivery in Vehicular Ad Hoc Networks. 316-322 - Taiki Honda, Makoto Ikeda, Evjola Spaho

, Masahiro Hiyama, Leonard Barolli:
Effect of Buildings in VANETs Communication: Performance of OLSR Protocol for Video Streaming Application. 323-327
Session 12: Network Algorithms and Systems
- Vladi Kolici

, Xavier Herrero, Fatos Xhafa, Leonard Barolli:
Local Search and Genetic Algorithms for Satellite Scheduling Problems. 328-335 - Tomoya Enokido, Ailixier Aikebaier, Makoto Takizawa

:
Differentiating the Starting Time of Processes in Energy-Efficient Redundant Execution Algorithm. 336-343 - Salvatore Sorce

, Vito Gentile
, Antonio Gentile:
Real-Time Hand Pose Recognition Based on a Neural Network Using Microsoft Kinect. 344-350 - Si-Jung Kim, Bong-Han Kim, Sang-Soo Yeo

, Do-Eun Cho:
Network Anomaly Detection for M-Connected SCADA Networks. 351-354 - Ronan Bocquillon, Antoine Jouglet:

Data Transfer in Delay-Tolerant Networks. 355-359
CWECS 2013
Session 1: Network Security, Health Care, and Robot Emotions
- Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo, William Cheng-Chung Chu:

A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core. 360-365 - Sen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu:

A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security. 366-371 - Ching-Yu Chen, Jwu Rong Lin, Tso-Kwei Peng, Ya-Han Yu:

An Analysis of Operating Efficiency in Senior Citizen Welfare Institutions - Application of Bounded-Variable and Meta-frontier Data Envelopment Analysis. 372-377 - Sueming Hsu, Yalan Chan, Kai-I Huang, Fang-Yie Leu:

An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan's Senior Care Market: A Case Study of Fitness Equipment Industry. 378-381 - Ya-Ting Hsu, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, William Cheng-Chung Chu:

The Simulation of a Robot with Emotions Implemented with Fuzzy Logic. 382-386
Session 2: Data Security and Network Handover
- Raffaele Pizzolante, Bruno Carpentieri

, Arcangelo Castiglione
:
A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images. 387-392 - I-Long Lin, Che-Min Lin, Che-Jui Sun:

A Study on the Integration of ISO 27001 & 27011 and the New Personal Information Protection Act in the Telecom Enterprises in Taiwan. 393-398 - Yu-Shin Huang, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, William Cheng-Chung Chu:

A Handover Scheme for LTE Wireless Networks under the Assistance of GPS. 399-403 - Chin-Ling Chen, Wei-Chen Tsai, Fang-Yie Leu:

Improve Two Remote User Authentication Scheme Using Smart Card. 404-407
MAPWC 2013
Session 1: Methods, Analysis, and Protocols for Wireless Communication
- Jiro Iwashige, Leonard Barolli, Saki Kameyama, Motohiko Iwaida:

Diffracted Fields in Buildings and Wedges: A Comparison Study. 408-413 - Kazunori Uchida, Masafumi Takematsu, Junichi Honda:

Path Loss Estimation for Analytically Expressed Inhomogeneous Random Rough Surface. 414-421 - Hiroshi Maeda

, Kiyotoshi Yasumoto, Kazuya Tomiura, Huili Chen, Daichi Ogata:
Resonance of Cavity in Two-Dimensional Square-Lattice Photonic Crystal by Metallic Pillars. 422-426 - Sofiane Tahraoui, Mounira Ouarzeddine, Boularbah Souissi:

Interferometric Coherence Optimization: A Comparative Study. 427-431 - Makoto Ikeda, Taiki Honda, Evjola Spaho

, Masahiro Hiyama, Leonard Barolli:
Effect of Roadside APs in VANETs: A Comparison Study. 432-436
MNSA 2013
Session 1: Secure and Renewable Systems
- Rashid Munir, Jules Pagna Disso, Irfan Awan, Muhammad Rafiq Mufti:

A Quantitative Measure of the Security Risk Level of Enterprise Networks. 437-442 - Jules Pagna Disso, Kevin Jones, Steven Bailey:

A Plausible Solution to SCADA Security Honeypot Systems. 443-448 - An-Na Kang, Jong Hyuk Park, Leonard Barolli, Hwa-Young Jeong

:
CMMI Security Model for Cloud Manufacturing System's Network. 449-452 - Minoru Uehara, Hideki Mori:

Metabolic Ring: Tape Based Renewable System. 453-458
Session 2: Multimedia Applications
- Nadeem Javaid

, Ilyas Khan, M. N. Ullah, Anzar Mahmood
, Muhammad Umar Farooq:
A Survey of Home Energy Management Systems in Future Smart Grid Communications. 459-464 - Assia Kourgli

, Youcef Oukil:
Very High Resolution Satellite Images Filtering. 465-470 - Akila Kemmouche, Nassim Atmani:

Classification of Dayas Formations on Landsat TM Imagery Using Morphological Profiles. 471-475 - Minh Hoan Pham

, Andrei Doncescu, Sébastien Régis:
Image Medical Diagnostic Using Dynamic Programming. 476-480
Session 3: Parallel and Distributed Systems
- Youssef Baddi

, Mohamed Dafir Ech-Cherif El Kettani
:
Parallel Greedy Randomized Adaptive Search Procedure with Delay and Delay Variation for RP Selection in PIM-SM Multicast Routing. 481-487 - Tan Le, Andrei Doncescu, Pierre Siegel:

Default Logic for Diagnostic of Discrete Time System. 488-493 - Dilawaer Doulikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Group Communication Protocols Based on Hybrid Types of Logical and Physical Clocks. 494-499 - Masashi Nishimine, Kazunori Ueda:

Design and Implementation of a Cache-less P2P Web Proxy. 500-505
NGWMN 2013
Session 1: Wireless Sensor Networks and Geo-location Systems
- S. M. Iddalagi, S. K. Mahabaleshwar:

Dynamic Data Forwarding in Wireless Sensor Networks. 506-511 - Usama Iqbal, Muhammad Mohsin Rahmatullah:

Energy-Efficient Routing Based on Geo-location for Heterogeneous Sensor Networks. 512-517 - João L. Gomes, Marta Rodrigues, Alberto Azevedo

, Gonçalo de Jesus
, Joao Rogeiro, Anabela Oliveira
:
Managing a Coastal Sensors Network in a Nowcast-Forecast Information System. 518-523 - Jen-Yung Lin, Bo-Kai Yang, Tuan Anh Do, Hsing-Chung (Jack) Chen:

The Accuracy Enhancement of GPS Track in Google Map. 524-527
Session 2: MANETs and Smart Grids
- Saad Noor Mohammad, M. J. Ashraf, Saad Wasiq, Sehar Iqbal, Nadeem Javaid

:
Analysis and Modeling of Network Connectivity in Routing Protocols for MANETs and VANETs. 528-533 - Saad Noor Mohammad, Saad Wasiq, Waqar Arshad, Nadeem Javaid

, Sheema Khattak, M. J. Ashraf:
Modeling Probability of Path Loss for DSDV, OLSR and DYMO above 802.11 and 802.11p. 534-538 - Hsing-Chung (Jack) Chen, Jen-Yung Lin:

A Trust-Based Cooperation Bit-Map Routing Protocol for Ad Hoc Networks. 539-544 - M. N. Ullah, Nadeem Javaid

, Ilyas Khan, Anzar Mahmood
, Muhammad Umar Farooq:
Residential Energy Consumption Controlling Techniques to Enable Autonomous Demand Side Management in Future Smart Grid Communications. 545-550
NTCAA 2013
Session 1: Network Applications
- Yoshinari Nomura, Yuya Murata, Hideo Taniguchi, Masakazu Urata, Shinyo Muto:

Bring Your Own Calendar: A CalDAV-Based Virtual Calendar System. 551-556 - Hiroki Mori, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe:

Development of Lecture Videos Delivery System using HTML5 Video Element. 557-559 - Ningping Sun, Kousei Hayata:

The Design and Development of an On-Line 3DCG Builder for Multi-player. 560-565
Session 2: Network Security and Detection
- Shohei Yamashita, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe:

Development of Network User Authentication System Using OpenFlow. 566-569 - Wataru Tsuda, Yoshiaki Hori, Kouichi Sakurai:

Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network. 570-574 - Mai Iwamoto, Shunsuke Oshima, Takuo Nakashima:

A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise. 575-580
RI3C
Session 1: Image Processing and Support Systems
- Sang-Wook Lee, Hyun Seung Yang, Yong-Ho Seo:

Foreground Extraction Algorithm Using Depth Information for Image Segmentation. 581-584 - Dae-Jea Cho:

Study on Method of New Digital Watermark Generation Using QR-Code. 585-588 - Evjola Spaho

, Ardiana Sula, Keita Matsuo, Leonard Barolli, Fatos Xhafa, Jiro Iwashige:
An Integrated System of Robot, SmartBox and RFID as an Approach for Internet of Things. 589-594 - Jeong Ah Kim, Sehoon Kim:

Consistency Checking Rules of Variability in Software Product Lines. 595-597
Session 2: Robotics Applications
- Jong Bin Ryu, Hyun Seung Yang, Yong-Ho Seo:

Real Time Eye Blinking Detection Using Local Ternary Pattern and SVM. 598-601 - Hirotsugu Matsukida, Hiroyuki Fujioka:

Design of Cursive Handwriting Characters with Nonlinear Typeface Reshaping Transformation. 602-607 - Jae-Hyuk Cho:

Design of Scenario-Based Architecture for Supporting Interoperability among Heterogeneous Home Network Middlewares. 608-613
SCMAS 2013
Session 1: Architecture and Advanced Applicationsof Symbiotic Computing
- Takahiro Uchiya, Tetsuo Kinoshita

:
Surveillance Architecture of Evolutional Agent System on Repository-Based Agent Framework. 614-617 - Hideki Hara:

A Method to Configure Autonomous Sensor Nodes. 618-621 - Takuya Kawamura, Toru Abe, Takuo Suganuma:

A Design of State Acquisition Function Using Range Image Sensor for 3D Symbiotic Space. 622-627 - Kouta Awahara, Satoru Izumi, Toru Abe, Takuo Suganuma:

Autonomous Control Method Using AI Planning for Energy-Efficient Network Systems. 628-633

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














