


default search action
3. COMSWARE 2008: Bangalore, India
- Sunghyun Choi, Jim Kurose, Krithi Ramamritham:

Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India. IEEE 2008, ISBN 978-1-4244-1797-1
Wireless Sensor Networks
- Arijit Khan

, Lawrence Jenkins:
Undersea wireless sensor network for ocean pollution prevention. 2-8 - Ashok Kumar Das

, Indranil Sengupta:
An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. 9-16 - Tamma V. Prabhakar, S. Venkatesh, M. S. Sujay, Joy Kuri, K. Praveen:

Simulation blocks for TOSSIM-T2. 17-23
Physical Layer Aspects
- Preetam Kumar, Saswat Chakrabarti:

Performance evaluation of a new overloading scheme for cellular DS-CDMA with iterative multistage interference cancellation receiver. 25-30 - R. Sethi:

Experiments with low power commodity hardware platforms for challenged networks. 31-36 - Aravind Iyengar, Dileep Manisseri Dileep, Andrew Thangaraj

, Srikrishna Bhashyam
:
Thresholds for LDPC codes over OFDM. 37-42
Advanced Wireless Access
- Sahin Albayrak, Muslim Elkotob, Ahmet Cihat Toker:

Smart middleware for mutual service-network awareness in evolving 3GPP networks network aware applications & application aware networks. 44-50 - Arpita Guha, Viswanath Ganapathy:

Power allocation schemes for cognitive radios. 51-56 - Sandip Sarkar, Tamer Kadous, Tingfang Ji, Naga Bhushan, Alexei Gorokhov, Aamod Khandekar, Rajiv Vijayan, Avneesh Agrawal:

MIMO in wireless WAN - the UMB system. 57-64
Applications
- Praveen Kumar, Viswanatha Rao Thumparthy:

Communication in personal healthcare. 66-73 - Flavius Copaciu, Stephan Kluth, Tomasz Porzucek, Werner Zorn:

Hierarchical modeling of the Axis2 web services framework with FMC-QE. 74-81 - Vinayaka Pandit, Natwar Modani, Sougata Mukherjea

, Amit Anil Nanavati, Sambuddha Roy, Amit Agarwal:
Extracting dense communities from telecom call graphs. 82-89
Short Papers: Wireless Sensors
- Shanliang Li, Liusheng Huang, Junmin Wu, Hongli Xu, Jichun Wang:

NBLS: Neighbor-information-based localization system for wireless sensor networks. 91-94 - Anand Seetharam, Abhishek Bhattacharyya, Mrinal K. Naskar, Amitava Mukherjee

:
Estimation of node density for an energy efficient deployment scheme in wireless sensor network. 95-98 - Aloor Gopakumar, Lillykutty Jacob:

Localization in Ultra Wideband sensor networks using Tabu search. 99-102 - Joongheon Kim

, Wonjun Lee:
Cooperative relaying strategies for multi-hop wireless sensor networks. 103-106 - Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki:

Estimated replication of data in wireless sensor networks. 107-110
Mobile Location
- Vihang Kamble, Suresh Kalyanasundaram, Rajeev Agrawal:

Enhanced location update mechanism in wireless cellular networks using knowledge of mobility patterns. 112-119 - Oliver Jorns, Oliver Jung, Gerald Quirchmayr:

A platform for the development of location-based mobile applications with privacy protection. 120-127 - Qiaoqiao Chen, Ting Jiang, Zheng Zhou:

A new ranging application of UWB modulated by orthogonal waves in wireless sensor network. 128-131
Wireless Medium Access Control
- Prashanth L. A.

, K. Gopinath:
OFDM-MAC algorithms and their impact on TCP performance in next generation mobile networks. 133-140 - Tamma V. Prabhakar, H. S. Jamadagni, M. Aswath Kumar, Jacques Panchard:

A Slotted Aloha joint MAC - cum - Routing protocol for data gathering sensor network applications. 141-148 - Saptarshi Chaudhuri, Ranjish Bhaskaran, Venkataveen Reddy:

Design of adaptive MAC for high speed packet access system. 149-157
Internet Security
- Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:

Collaborative group membership and access control for JXTA. 159-166 - Rajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi

:
A robust finger print based two-server authentication and key exchange system. 167-174 - Manpreet Singh, Manjeet Singh Patterh:

Interpretation of policy oriented common criteria components for network computing environment. 175-182
Short Papers: Wireless Networking
- Husain Husna, Santi Phithakkitnukoon

, Enkh-Amgalan Baatarjav, Ram Dantu:
Quantifying presence using calling patterns. 184-187 - Nawal A. El-Fishawy

, Mona Shokair, Waleed Saad
:
Quality of service investigation for multimedia transmission over UWB networks. 188-191 - Zhimeng Zhong, Shihua Zhu, Gangming Lv:

Orthogonal multi-relay networks: capacity bounds and optimal resource allocation. 192-195 - Joseph Thaliath, Mabel M. Joy, Elizabeth Priya John, Debabrata Das

:
Service class downlink scheduling in WiMAX. 196-199 - Debarati Sen, Saswat Chakrabarti, Ratnam V. Raja Kumar:

Symbol timing synchronization for ultra-wideband (UWB) multi-band OFDM (MB-OFDM) systems. 200-203 - Hui Ma, Sumit Roy, Jing Zhu:

PHY/MAC adaptation approaches for dense wireless LAN MESH. 204-207
Wireless Security I
- Rajadurai Rajavelsamy, Sungho Choi:

Security aspects of inter-access system mobility between 3GPP and non-3GPP networks. 209-213 - Ashutosh Saxena

:
Dynamic authentication: Need than a choice. 214-218 - Mounita Saha, Dipanwita Roy Chowdhury, Indranil Sengupta:

A secure verifiable key agreement protocol for mobile conferencing. 219-222
Wireless Medium Access Control II
- P. Samuel David, Anurag Kumar

:
Network coding for TCP throughput enhancement over a multi-hop wireless network. 224-233 - Zhen-Yu Na, Zhenyong Wang

, Qing Guo:
An adaptive CAC algorithm based on fair utility for low earth orbit satellite networks. 234-238 - Srinivas Pinagapany, Anju V. Kulkarni

:
Solving channel allocation problem in cellular radio networks using genetic algorithm. 239-244
Internet Security II
- Husain Husna, Santi Phithakkitnukoon

, Srikanth Palla, Ram Dantu:
Behavior analysis of spam botnets. 246-253 - Yassin M. Hasan, Hesham A. Abulenein:

Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. 254-259 - Yassin M. Hasan:

From stream to provably secure block ciphers based on pseudorandom matrix transformations. 260-265
Short Papers: Internet Services
- Hai-yan Wu, Xiao-zhu Lin, Dong-Xing Jiang:

A Petri Net approach to analyze the effect of persistent connection on the scalability of web services. 267-270 - Logambigai Venkatachalam, Krishna Kishore Dhara, Venkatesh Krishnaswamy, Michael Vernick:

Communication enabled web applications The evolution of computer telephony integration. 275-278 - Tathagata Das, Subrata Nandi, Niloy Ganguly:

Community based search on power law networks. 279-282 - Iacopo Carreras, Juwel Rana, Luigi Telesca:

Coordination protocol for financial application in delay tolerant networks. 283-286
Communications Protocols
- Supratim Deb, Anand Srinivasan, Pavan Kuppili Pavan:

An improved DNS server selection algorithm for faster lookups. 288-295 - Ruay-Shiung Chang, Chun-Fu Lin, Jiing-Hsing Ruey, Shih-Chun Hsi:

An efficient and bandwidth sensitive parallel download scheme in data grids. 296-301 - Chitra Balakrishna, Khalid Al-Begain:

A reality check on sip-based streaming applications on the next generation mobile test network. 302-308
Internet security III
- Ofer Hermoni, Niv Gilboa

, Eyal Felstaine, Sharon Shitrit:
Deniability - an alibi for users in P2P networks. 310-317 - Swaminathan Pichumani, Sneha Kumar Kasera:

On implementing security at the transport layer. 318-326 - Jithesh Sathyan, Krishnananda Shenoy:

Realizing unified service experience with SaaS on SOA. 327-332
WiMAX
- Khyati Sanghvi, Piyush K. Jain, Abhijit M. Lele, Debabrata Das

:
Adaptive waiting time threshold estimation algorithm for power saving in sleep mode of IEEE 802.16e. 334-340 - Ji Hoon Lee, Taekyoung Kwon, Yanghee Choi, Sangheon Pack

:
Location management area (LMA)-based MBS handover in mobile WiMAX systems. 341-348 - Hemant Kumar Rath, Abhay Karandikar:

On TCP-aware uplink scheduling in IEEE 802.16 networks. 349-355
Communications protocols II
- Nanjun Li, Werner Zorn:

Introducing Gateway Timeout control in wireless TCP module. 357-364 - T. Rajendran, K. V. Sreenaath:

Hash optimization for cryptographically generated address. 365-369 - Damodar Banodkar, K. K. Ramakrishnan

, Shivkumar Kalyanaraman, Alexandre Gerber, Oliver Spatscheck:
Multicast instant channel change in IPTV systems. 370-379
Mobile Platforms
- Kartik Muralidharan, G. V. Karthik, Puneet Gupta, Atanu Roy Chowdhury:

mConnect: A context aware mobile transaction middleware. 381-386 - Thejovardhana Kote, S. Ramamirtham Jeyashankher, Leena Chandran-Wadia:

A large scale publish-subscribe platform for information delivery to mobile phones. 387-394 - Jae-Wook Nah, Yeong-Hun Cho, Suwook Kim, Jong-Tae Park:

Architecture for extensible mobile instant messaging and presence service over IMS. 395-400
Wireless LAN
- Guoqing Li, Srikathyayani Srikanteswara, Christian Maciocco:

Spectrum-sensing based interference mitigation for WLAN devices. 402-408 - Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar:

Fuzzy based dynamic WEP keymanagement for WLAN security enhancement. 409-414 - Ewa Kusmierek, Rajeev Koodli:

Flow fairness using aggregate packet marking for wireless mesh networks. 415-422
Communications Protocols III
- Kaliappa Nadar Ravindran, Jiang Wu, Mohammad Rabby, Kevin A. Kwiat, Ali Sabbir

:
Performance engineering of replica voting protocols for high assurance data collection systems. 424-433 - Maurelio Boari, Antonio Corradi

, Enrico Lodolo
, Stefano Monti, Samuele Pasini:
Coordination for the internet of services: A user-centric approach. 434-441 - Maarten Wijnants, Wim Lamotte

:
Managing client bandwidth in the presence of both real-time and non real-time network traffic. 442-450
Wireless Security II
- Abhishek Gupta, Joy Kuri:

Deterministic schemes for key distribution in wireless sensor networks. 452-459 - Yong-Hoon Kim, Suwook Kim, Jae-Wook Nah, Jong-Tae Park:

Extension of Fast Mobile IPv6 with multiple pre-registrations: Design and implementation. 460-464 - Iosif Androulidakis

, Chris Basios:
A plain type of mobile attack: Compromise of user's privacy through a simple implementation method. 465-470
Internetwork Handovers
- S. Vijay Anand:

Qos based handover layer for a multi-RAT mobile terminal in UMTS and Wi-MAX networks. 472-479 - Ritesh Kumar Kalle, Vidya Sagar, Sumit Kumar, Abhijit M. Lele, Debabrata Das

:
A novel interface gateway architecture for seamless interoperability between 802.11e and 802.16e. 480-487 - Vikas Bajaj:

Roaming between GSM/UMTS and IMS networks. 488-494
Wireless Sensors
- Jorge Sá Silva

, Ricardo Ruivo, Tiago Camilo, Goncalo Pereira, Fernando Boavida
:
IP in wireless sensor networks Issues and lessons learnt. 496-502 - Mohit Saxena, Puneet Gupta, Bijendra N. Jain:

Experimental analysis of RSSI-based location estimation in wireless sensor networks. 503-510 - Vaishali P. Sadaphal, Bijendra N. Jain:

Tracking target using sensor networks: target detection and route activation under energy constraints. 511-518
MANET's
- Matin Bagherpour, Mohammad Mehdi Sepehri

, Mehdi Sharifyazdi:
Approximation of a confidence interval for link distances in Mobile Ad hoc Networks. 520-527 - Jiong Wang, Sirisha Medidi:

Density-first Ad-hoc routing protocol for MANET. 528-535 - Khaleel Ur Rahman Khan

, Rafi U. Zaman
, A. Venugopal Reddy:
Integrating Mobile Ad Hoc Networks and the Internet: challenges and a review of strategies. 536-543
Wireless Handovers
- Abraham George

, Sherif Rashad, Anup Kumar, Mehmed M. Kantardzic
:
A predictive handoff scheme for multi-hop heterogeneous wireless networks. 545-550 - Yeong-Hun Cho, Kyung Yoon Oh, Jong-Tae Park:

Intelligent mobile IPv6 handover with multiple pre-registrations and late tunneling. 551-554
Wireless Sensors II
- Piyush Shah, Krishna M. Sivalingam

, Prathima Agrawal:
Efficient data gathering in distributed hybrid sensor networks using multiple mobile agents. 556-563 - Matthias Gauger, Pedro José Marrón

, Marcus Handte
, Olga Saukh, Daniel Minder, Andreas Jürgen Lachenmann, Kurt Rothermel:
Integrating sensor networks in pervasive computing environments using symbolic coordinates. 564-573 - Tuan Dinh Le, Yifei Dong

, Ren Ping Liu, Sanjay Jha
, Zvi Rosberg:
Implementation aspects of reliable transport protocols in wireless sensor networks. 574-580
Wireless QoS
- Amirali Sharifi, Eyad H. Abed:

Stability analysis for communication of voice terminals with packet reservation multiple access protocol with high propagation delays. 582-590 - Walter Colitti, Kris Steenhaut, Ann Nowé:

Multilayer traffic engineering and DiffServ in the next generation internet. 591-598 - Noëmie Simoni, Chunyang Yin, Ghislain Du Chéné:

An intelligent user centric middleware for NGN: Infosphere and AmbientGrid. 599-606
Digital Media and Security
- Yassin M. Hasan, Ammar Hassan:

Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique. 608-613 - K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal, Lalit M. Patnaik:

Robust image adaptive steganography using integer wavelets. 614-621 - N. K. Sreelaja, G. A. Vijayalakshmi Pai:

Swarm intelligence based key generation for text encryption in cellular networks. 622-629
Wireless Sensors III
- Nadeem Akhtar, Klaus Moessner

:
Capacity of grid-oriented wireless mesh networks. 631-636 - Himanshukumar B. Soni

, Uday B. Desai, S. N. Merchant:
Packet collision based Multiuser Interference (MUI) analysis for TH-PAM and TH-PPM ultra wideband (UWB) system. 637-641 - Sharmilee Yekkulur, Mohamed Suhail Vaseem Ubaidur, Krishnamurthy Kapil, Krishnan Murugan:

Energy aware distributed data gathering and aggregation protocol to improve wireless sensor network's longevity. 642-648
Industrial Communications
- Ryad Ben-El-Kezadri

, Farouk Kamoun
:
A flexible channel access model for wireless network interface cards. 650-656 - Gaurav Kumar Santhalia, Sanatya Singh

:
An efficient approach to lane tracking system vehicular telemetics. 657-661 - Su Jin Kim, Guofeng Deng, Sandeep K. S. Gupta, Mary Murphy-Hoye:

Intelligent networked containers for enhancing global supply chain security and enabling new commercial value. 662-669 - Ashok Chandra:

Workshop keynote speech. 670 - Ashok Chandra:

International Telecommunication Union (ITU) and decisions of world radio conference-07 wrt IMT systems and cognitive radio. 671-675 - Jun-Sik Lee, Ju-Hyung Son, Young-Hoon Park, Seung-Woo Seo:

Optimal level-homogeneous tree structure for logical key hierarchy. 677-681 - SeongHan Shin

, Kazukuni Kobara, Hideki Imai:
A security framework for personal networks. 682-690 - Mirza Salim Beg

, Ekram Khan
:
Video over wireless networks: A brief review. 692-698 - R. Sanyal:

Implementation of meid for mobile stations in CDMA network. 699-703 - Ambuj Kumar:

Wireless mobile user's location in an indoor environment - an overview. 704-707 - Evangelos Gkroustiotis:

QoS in heterogeneous mobility management. 708-712
IAMCOM 2008
- Dilip Krishnaswamy, Shanyu Zhao:

Network-aware adaptation with real-time channel statistics for wireless LAN multimedia transmissions in the digital home. 714-719 - Pradeep Macharla, Rakesh Kumar, Anil Kumar Sarje, Manoj Misra:

A QoS routing protocol for delay-sensitive applications in mobile ad hoc networks. 720-727 - A. Dadhich, Anil K. Sarje, K. Garg:

A distributed cooperative approach to improve detection and removal of misbehaving MANET nodes. 728-735 - Xianwen Hao, Yu Dai, Bin Zhang, Tingwei Chen:

Reduced Task-Resource Assignment Graph based Static scheduling for grid workflow application. 736-743 - Ankur Guha Roy, Rajdeep Mandal, Iti Saha Misra, Kalpana Saha:

Pre-emption based call admission control with QoS and dynamic bandwidth reservation for cellular networks. 745-752 - Andreas Ibing, Yosia Hadisusanto, Volker Jungnickel:

Scaleable network multicast for cooperative base stations. 753-756 - Mohammad Asadul Hoque, Farhana Afroz:

Call admission control: QoS issue for VoIP. 757-761 - Muthu Tamilarasi, S. Chandramathi, T. G. Palanivelu:

Overhead reduction and energy management in DSR for MANETs. 762-766 - Walter Colitti, Pasquale Gurzi, Kris Steenhaut, Ann Nowé:

Adaptive multilayer routing in the next generation GMPLS Internet. 768-775 - K. Haribabu

, Dayakar Reddy, Chittaranjan Hota
, Antti Ylä-Jääski, Sasu Tarkoma:
Adaptive lookup for unstructured peer-to-peer overlays. 776-782
Monitoring and sensor networks
- Kandasamy Selvaradjou, Marudachalam Dhanaraj, Buchi Goutham, C. Siva Ram Murthy:

A new battery and redundancy aware node scheduling protocol for Wireless Sensor Networks. 784-790 - Urs Hunkeler, Hong Linh Truong, Andy J. Stanford-Clark:

MQTT-S - A publish/subscribe protocol for Wireless Sensor Networks. 791-798 - Wu Jian, Li Xing Ming:

A dynamic mining algorithm of association rules for alarm correlation in communication networks. 799-802

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














