default search action
ISCC 2004: Alexandria, Egypt
- Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt. IEEE Computer Society 2004, ISBN 0-7803-8623-X
Volume 1
- Message from the general co-chairs.
- Message from the technical program chairs.
- Committees and chairs.
- Technical program committee.
- Reviewers.
- Author Index.
- Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang:
The construction of a novel agent fault-tolerant migration model. 1-6 - Ibrahim F. Imam:
Adaptive applications of intelligent agents. 7-12 - Carsten Pils, Klaus Deissner, Stefan Diepolder, Jan Kritzner:
The performance server: rational server selection for mobile agents. 13-18 - Xiaodong Lu, Ivan Luque, Miho Kanda, Kinji Mori:
Agent-based autonomous information services integration and allocation to achieve high response and low cost in distributed information service system. 19-24 - Tim Hsin-Ting Hu, Binh Thai, Aruna Seneviratne:
Agent coordination in the mobile agent P2P architecture for supporting mobile devices in a Gnutella file-sharing network. 25-30 - Muhammed S. Peerbocus, Zahir Tari:
A workflow-based dynamic scheduling approach for Web services platforms. 31-37 - Dionisis X. Adamopoulos, Constantine A. Papandreou:
Enabling Web services: towards service grids. 38-43 - Shengru Tu, Eric Normand, S. Kuchimanchi, V. Bizot, S. Shu, Mahdi Abdelguerfi, Jay J. Ratcliff, Kevin Shaw:
Integrating Web services into map image applications. 44-49 - Weimin Lang, Zongkai Yang, Gan Liu, Wenqing Cheng, Yunmeng Tan:
A new efficient micropayment scheme against overspending. 50-55 - Jun Wang, Yiming Hu:
A performance study on Internet Server Provider mail servers. 56-61 - Alaa Amin, Reda Ammar, Ayman El Dessouly:
Scheduling real time parallel structures on cluster computing with possible processor failures. 62-67 - Gamal Attiya, Yskandar Hamam:
Reliability oriented task allocation in heterogeneous distributed computing systems. 68-73 - Sarah Tasneem, Reda A. Ammar, Howard A. Sholl:
A methodology to compute task remaining execution time. 74-79 - Wanjun Huang, Xinhua Zhang, Uwe Roth, Christoph Meinel:
Routing based workflow for construction of distributed applications. 80-85 - Asser N. Tantawi:
Optimized external scheduling for fair service discrimination. 86-91 - Emad A. El-Sebakhy:
Functional networks training algorithm for statistical pattern recognition. 92-97 - Kazuhiro Morita, El-Sayed Atlam, Masao Fuketa, Yuki Kadoya, Toru Sumitomo, Jun-ichi Aoe:
A new classification sentence technique using intension expressions. 98-103 - El-Sayed Atlam, Elmarhomy Ghada, Masao Fuketa, Kazuhiro Morita, Jun-ichi Aoe:
A compact memory space of dynamic full-text search using Bi-gram index. 104-109 - Mehmet Kaya, Reda Alhajj:
Genetic algorithms based optimization of membership functions for fuzzy weighted association rules mining. 110-115 - Tzung-Pei Hong, Chun-Hao Chen, Yu-Lung Wu, Yeong-Chyi Lee:
Using divide-and-conquer GA strategy in fuzzy data mining. 116-121 - Toru Sumitomo, Yuki Kadoya, Masao Fuketa, Kazuhiro Morita, Shinkaku Kashiji, Jun-ichi Aoe:
An new E-mail filtering technique using time priority measurement. 122-127 - Awadhesh Kumar Sharma, A. Goswami, Dharmendra Kumar Gupta:
Discovery of fuzzy inclusion dependencies in fuzzy relational databases. 128-133 - Awadhesh Kumar Sharma, A. Goswami, Dharmendra Kumar Gupta:
FTS relational data model for source-aware fuzzy relational multidatabases. 134-139 - Doaa Saad El Zanfaly, Reda A. Ammar, Ahmed Sharaf Eldin:
Modeling and analysis of a multilevel caching in distributed database systems. 140-145 - Ayla Sayli, Bora Gökçe:
The use of SQO rules in DMLs. 146-151 - Habib M. Ammari, Hesham El-Rewini:
Performance evaluation of hybrid environments with mobile gateways. 152-157 - Hanem A. ElAdly, Thomas M. Chen:
Enhancing the support of multihopping in an IEEE 802.11 ad-hoc network. 158-163 - Maria Fazio, Massimo Villari, Antonio Puliafito:
Merging and partitioning in ad hoc networks. 164-169 - Yu Wang, Ivan Stojmenovic, Xiang-Yang Li:
Bluetooth scatternet formation for single-hop ad hoc networks based on virtual positions. 170-175 - Zhifei Li, Sukumar Nandi, Anil K. Gupta:
Achieving MAC fairness in wireless ad-hoc networks using adaptive transmission control. 176-181 - Hari Rangarajan, J. J. Garcia-Luna-Aceves:
Achieving loop-free incremental routing in ad hoc networks. 182-187 - Yao Hua Ho, Ai Hua Ho, Kien A. Hua, Georgiana L. Hamza-Lup:
A connectionless approach to mobile ad hoc networks. 188-195 - Mariusz A. Fecko, Ulas C. Kozat, Sunil Samtani, M. Ümit Uyar, Ibrahim Hökelek:
Dynamic survivable resource pooling in mobile ad-hoc networks. 196-201 - Huaming Wu, Alhussein A. Abouzeid:
Power aware image transmission in energy constrained wireless networks. 202-207 - Shaobin Cai, Xiao-Zong Yang, Wenbin Yao:
PatchPSMP: an extension of NSMP based on pool node. 208-213 - Jing Ai, Jingfei Kong, Damla Turgut:
An adaptive coordinated medium access control for wireless sensor networks. 214-219 - Wei Yuan, Srikanth V. Krishnamurthy, Satish K. Tripathi:
Improving the reliability of event reports in wireless sensor networks. 220-225 - Jamal N. Al-Karaki, Ahmed E. Kamal:
On the correlated data gathering problem in wireless sensor networks. 226-231 - Hari Rangarajan, J. J. Garcia-Luna-Aceves:
Reliable data delivery in event-driven wireless sensor networks. 232-237 - Thiemo Voigt, Adam Dunkels, Juan M. Alonso, Hartmut Ritter, Jochen H. Schiller:
Solar-aware clustering in wireless sensor networks. 238-243 - Amre El-Hoiydi, Jean-Dominique Decotignie:
WiseMAC: an ultra low power MAC protocol for the downlink of infrastructure wireless sensor networks. 244-251 - Esa Hyytiä, Laura Nieminen:
Linear program formulation for routing problem in OBS networks. 252-257 - Toshihiko Komine, Masao Nakagawa:
Performance evaluation of visible-light wireless communication system using white LED lightings. 258-263 - Ayman Kaheel, Hussein M. Alnuweiri, Fayez Gebali:
A new analytical model for computing blocking probability in optical burst switching networks. 264-269 - Nema Elfaramawy, Amira Awad:
All-optical logic circuits based on the nonlinear properties of the semiconductor optical amplifier. 270-275 - Raza Ul-Mustafa, Ahmed E. Kamal:
On the grooming of multicast traffic in WDM networks. 76-81 - Ahmad Khalil, Chadi Assi, Antonis Hadjiantonis, Georgios Ellinas, Mohamed A. Ali:
On multicast traffic grooming in WDM networks. 282-287 - Stamatis Stefanakos, Thomas Erlebach:
Routing in all-optical ring networks revisited. 288-293 - Nasir Ghani, Chadi Assi, Abdallah Shami, Mohamed A. Ali:
Integrated traffic grooming in converged data-optical networks. 294-299 - M. R. Ahmadi:
Restoration techniques and delay analysis for fault recovery in WDM networks. 300-305 - T. M. Barakat, I. I. Ismail, I. A. Ali, N. Abdrabouh:
Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networks. 306-311 - Sibabrata Ray, Kevin A. Kwiat, Danyang Zhang:
Energy-efficient placement/activation algorithms for authorization servers in sensor network. 312-317 - Bin Xie, Anup Kumar:
A framework for integrated Internet and ad hoc network security. 318-324 - Ozkan M. Erdem:
EDKM: efficient distributed key management for mobile ad hoc networks. 325-330 - Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Rafael T. de Sousa Jr.:
A fully distributed IDS for MANET. 331-338 - Christos Siaterlis, Basil S. Maglaris:
Detecting DDoS attacks with passive measurement based heuristics. 339-344 - Guang Yang, Mario Gerla, M. Y. Sanadidi:
Defense against low-rate TCP-targeted denial-of-service attacks. 345-350 - Bao-Tung Wang, Henning Schulzrinne:
A denial-of-service-resistant IP traceback approach. 351-356 - Fangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu:
Protecting integrity and confidentiality for data communication. 357-362 - Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah:
A2cast: an adaptive source authentication protocol for multicast streams. 363-368 - Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang:
An access control policy for active networks. 369-374 - Zhide Chen, Hong Zhu:
Quantum m-out-of-n oblivious transfer. 375-380 - Ali M. Allam, Ibraliim I. Ibrahim, Ihab A. Ali, Abdel-Rahman H. El-Sawy:
Provably secure entity authentication the three party case. 381-385 - Delia Critchlow, Ning Zhang:
Revocation invocation for accountable anonymous PKI certificate trees. 386-392 - Cássio Ditzel Kropiwiec, Edgard Jamhour, Carlos Maziero:
A framework for protecting Web services with IPsec. 393-398 - Omaima Bamasak, Ning Zhang:
A secure proxy signature protocol for agent-based M-commerce applications. 399-406 - Weimin Lang, Yunmeng Tan, Zongkai Yang, Gan Liu, Bing Peng:
A new efficient ID-based proxy blind signature scheme. 407-411 - Aleksandra Nenadic, Ning Zhang, Stephen K. Barton:
A secure and fair DSA-based signature exchange protocol. 412-417 - Abbas Ghaemi Bafghi, Babak Sadeghiyan:
Finding suitable differential characteristics for block ciphers with Ant colony technique. 418-423 - Wenqing Cheng, Weimin Lang, Zongkai Yang, Gan Liu, Yunmeng Tan:
An identity-based proxy ring signature scheme from bilinear pairings. 424-429 - Mohamed Fahmy Tolba, M. Al-Said Ghonemy, Ismail Abdoul-Hameed Taha, Amal Said Khalifa:
High capacity image steganography using wavelet-based fusion. 430-435 - Mahdi Shabany, Keivan Navaie, Elvino S. Sousa:
Downlink resource allocation for data traffic in heterogenous cellular CDMA networks. 436-441 - Mahdi Shabany, Elvino S. Sousa:
Joint rate allocation and routing scheme in multihop cellular CDMA networks. 442-447 - José Ramón Gállego, Ángela Hernández-Solana, María Canales, Antonio Valdovinos:
Adaptive multimedia traffic multiplexing for dedicated channels in the UMTS system. 448-453 - Gan Liu, Weimin Lang, Weimin Wu, Youlin Ruan, Xiaofeng Shen, Guangxi Zhu:
QoS-guaranteed call admission scheme for broadband multiservices mobile wireless networks. 454-459 - Dario Bruneo, Luca Paladina, Maurizio Paone, Antonio Puliafito:
Resource reservation in mobile wireless networks. 460-465 - Giuseppe Anastasi, Marco Conti, Enrico Gregori, Andrea Passarella:
Experimental analysis of an application-independent energy management policy for Wi-Fi hotspots. 466-471 - Wei Wang, Soung C. Liew, Qixiang Pang, Victor O. K. Li:
A multiplex-multicast scheme that improves system capacity of voice-over-IP on wireless LAN by 100%. 472-477 - Seongkwan Kim, Sangwook Kang, Sunshin An:
Enhanced service differentiation extensions for the IEEE 802.11a wireless network. 478-483 - Enrique Costa-Montenegro, Francisco J. González-Castaño, Ubaldo M. García-Palomares, M. Vilas-Paz, Pedro S. Rodríguez-Hernández:
Distributed and centralized algorithms for large-scale IEEE 802.11b infrastructure planning. 484-491 - Zhe Guang Zhou, Aruna Seneviratne:
Improving wireless connectivity for mobile computing environments. 492-497 - Paolo Bellavista, Antonio Corradi, Luca Foschini:
MUM: a middleware for the provisioning of continuous services to mobile users. 498-505 - Georgios Leoleis, Lila Dimopoulou, Vaggelis Nikas, Iakovos S. Venieris:
Mobility management for multicast sessions in a UMTS-IP converged environment. 506-511 - Azzedine Boukerche, Trivikram Dash, Maria Cristina Pinotti:
Performance analysis of a hybrid push-pull algorithm with QoS adaptations in wireless networks. 512-524 - S. M. S. Masajedian, H. Khoshbin:
Cooperative location management method in next generation cellular networks. 525-530 - Paolo Bellavista, Antonio Corradi:
A QoS management middleware based on mobility prediction for multimedia service continuity in the wireless Internet. 531-538 - Ling-Jyh Chen, Tony Sun, M. Y. Sanadidi, Mario Gerla:
Improving wireless link throughput via interleaved FEC. 539-544 - Kui-Fai Leung, Kwan Lawrence Yeung:
G-Snoop: enhancing TCP performance over wireless networks. 545-550 - Kui-Fai Leung, Kwan Lawrence Yeung:
TCP-swift: an end-host enhancement scheme for TCP over satellite IP networks. 551-555 - Jenn-Wei Lin:
An efficient fault-tolerant multicast approach for wireless mobile systems. 556-561 - Anup Kumar, Mostafa M. El-Said, Adel Said Elmaghraby:
Base station assisted search approach for mitigation of pilot pollution interference. 562-567 - Sayaka Harada, Hiroaki Higaki:
Wireless sporadic communication protocol for supporting cluster-to-base station communication. 568-573
Volume 2
- Yuan-Pei Lin, See-May Phoong:
DFT based transceivers with-windowing. 574-579 - See-May Phoong, Georges Quénot, Eric Castelli:
Recognizing emotions for the audio-visual document indexing. 580-584 - B. Aoued:
Accelerating fractal image compression by domain pool reduction adaptive partitioning and structural block classification. 585-589 - Hong Wen, Fei Hu, Fan Jin:
Design of odd-periodic complementary binary signal set. 590-593 - Mohamed A. S. Hassan, Bayan S. Sharif, Wai Lok Woo, Shihab A. Jimaa:
Semiblind estimation of time varying STFBC-OFDM channels using Kalman filter and CMA. 594-599 - Hung-Chang Yang, Hsiang-Fu Yu, Li-Ming Tseng, Yi-Ming Chen:
Interleaving harmonic broadcasting and receiving scheme with loss-anticipation delivery. 600-605 - Reza Danesfahani, Tony Jeans:
A heuristic approach to optimization of the decision-directed maximum-likelihood feedforward carrier phase error detection algorithm. 606-609 - Adel M. Hmidat, Bayan S. Sharif, Wai Lok Woo, S. A. Jimma:
Nonlinear space-time multiuser detector for non-Gaussian channels. 610-614 - Imed Bouazizi, Mesut Günes:
Distortion-optimized FEC for unequal error protection in MPEG-4 video delivery. 615-620 - M. A. A. Mohamed, Hossam M. H. Shalaby, El-Sayed A. El-Badawy:
Optical CDMA protocol with selective retransmission. 621-626 - Chaiyaporn Khemapatapan, Watit Benjapolakul:
Performance analyses of DPSK-FFHSS and DPSK-FFH-SSMA systems over Nakagami fading channels. 627-632 - P. Sharma:
Time-series model for wireless fading channels in isotropic and non-isotropic scattering environments. 633-638 - João H. Kleinschmidt, Marcelo Eduardo Pellenz, Luiz A. Paula Lima Jr.:
Evaluating and improving Bluetooth piconet performance over Nakagami-m fading channels. 639-644 - Lingzhi Cao, Norman C. Beaulieu:
Closed-form results for the BER of maximal ratio combining with channel estimation errors in Ricean fading channels. 645-650 - Yuling Zhang, Dongfeng Yuan, Haigang Zhang:
Adaptive LDPC for Rayleigh fading channel. 651-656 - Ileana Popescu, Philip Constantinou, M. Nafornita, Ioan Nafornita:
Generalized regression neural network prediction model for indoor environment. 657-661 - Tak-Chung Fu, Fu-Lai Chung, Robert Wing Pong Luk, Chak-man Ng:
Progressive time series visualization in a mobile environment. 662-667 - Jing-yu Hua, Xiao-Hu You, Sheng Bin, Martin Weckerle, Egon Schulz:
A fast convergent scheme for the Doppler shift estimation in mobile communication systems. 668-671 - Min-Xiou Chen, Ben-Jye Chang, Ren-Hung Hwang, Jun-Fan Juang:
MDP-based OVSF code assignment scheme and call admission control for wideband-CDMA communications. 672-677 - Lasse Harju, Jari Nurmi:
A baseband receiver architecture for UMTS-WLAN interworking applications. 678-685 - Weijun Cheng, Laibo Zheng, Jiandong Hu:
Performance analysis of cooperative macro-diversity in mobile cellular networks. 686-689