


default search action
1. NetCoM 2009: Chennai, India
- First International Conference on Networks and Communications, NetCoM 2009, Chennai, India, December 27-29, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3924-9

Adhoc and Sensor Networks
- Sumathy Subramaniam

, B. Upendra Kumar:
Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks. 1-6 - K. Thanigaivelu, K. Murugan:

Impact of Sink Mobility on Network Performance in Wireless Sensor Networks. 7-11 - Ehsan Heidari, Ali Movaghar

:
Intelligent Clustering in Wireless Sensor Networks. 12-17 - Sanat Sarangi

, Subrat Kar:
A Novel Algorithm for Graded Precision Localization in Wireless Sensor Networks. 18-22 - Pankaj Gupta, Tarun Bansal, Manoj Misra:

MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor Networks. 23-27 - Abhishek Samanta, Dripto Bakshi, Amitava Mukherjee

, Mita Nasipuri:
Energy Efficient Wireless Sensor MAC Protocol for Collision Avoidance. 28-33 - Neeraj Kumar Nehra

, Manoj Kumar
, R. B. Patel:
Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks. 34-39 - Jianwei Niu

, Chang Liu, Jian Ma:
Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks. 40-45 - Rajiv Misra

, Ajay Shukla:
K Bipartite Partitioning Algorithm for Channel Allocation Problem in Wireless Mesh Networks. 46-51 - Muhannad Quwaider, Azizah Muhammad, Jongeun Choi

, Subir Biswas:
Posture-Predictive Power Control in Body Sensor Networks Using Linear-Quadratic Gaussian Control. 52-59 - Behnam Dezfouli

, Marjan Radi, Mohammad Ali Nematbakhsh:
Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor Networks. 60-65
Heterogeneous Wireless, WLAN, and Mobile Networks
- Chandravva Hebbi, S. V. Saboji:

Vertical Handoff in Heterogeneous Wireless Mobile Networks. 66-71 - Arun Prakash

, Rajesh Verma
, Rajeev Tripathi
, Kshirasagar Naik:
Multiple Mobile Routers Based Seamless Handover Scheme for Next Generation Heterogeneous Networks. 72-77 - Samir K. Sadhukhan, Swarup Mandal, Debashis Saha

:
A Practical Approach for Planning WLAN Deployment under 3G Cellular Network. 78-82 - B. Malarkodi, B. Prasana, B. Venkataramani:

A Scheduling Policy for Battery Management in Mobile Devices. 83-87 - Suparna DasGupta

, Rituparna Chaki:
AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc Networks. 88-92 - Hyo-Beom Lee, Youn-Hee Han, Sung-Gi Min:

Node Mobility Support Scheme Between the Mobile Network and PMIPv6 Networks. 93-97 - Asish K. Mukhopadhyay, Sajal Saha

, Suranjan Ghose, Debasish Saha
, Dhinaharan Nagamalai:
An Analytical Model of Multi-service Call Admission Control in Next Generation Wireless Overlay Networks. 98-103 - Shikha Goel, Sudesh Kumar

:
An Improved Method of Detecting Spoofed Attack in Wireless LAN. 104-108
Measurement and Performance Analysis
- Omar Almomani

, Osman Gazali, Suhaidi Hassan
:
Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet. 109-112 - S. Geetha

, Siva S. Sivatha Sindhu, V. Kabilan, N. Kamaraj:
High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA. 113-118 - Anand Gupta

, Harsh Bedi, M. S. Don Bosco, Vinay Shashidhar:
Accuracy of 3D Location Computation in GSM Through NS2. 119-122 - Shamala Subramaniam, Sangeetha Thavamani, Moqry A:

Cricket/Mica2 Based Discrete Event Simulator for WiHoc Ver.1.0 Localization Analysis. 123-128 - Marcharla Anjaneyulu Bhagyaveni, K. Rajeswari:

Performance Improvement of Wireless Sensor Networks Using Layered Space Time Codes. 129-134 - Mohammed M. Kadhum, Suhaidi Hassan

:
The FN Quadratic Marking/Dropping Probability Function. 135-140 - Anu Bala, Munish Bansal, Jagpreet Singh:

Performance Analysis of MANET under Blackhole Attack. 141-145 - Nilesh B. Prajapati, Rupal R. Agravat, Mosin I. Hasan:

Comparative Study of Various Cooling Schedules for Location Area Planning in Cellular Networks Using Simulated Annealing. 146-150
Network Architectures, Protocols, and Routing
- (Withdrawn) A Pascal Graph Property and Computer Network Topology. 151-154

- A. Revathi

, Y. Venkataramani:
Perceptual Features Based Isolated Digit and Continuous Speech Recognition Using Iterative Clustering Approach. 155-160 - Yaser Miaji

, Suhaidi Hassan
:
Just Queueing (JQ): Scheduling Algorithm for the Internet. 161-165 - A. Nagaraju

, B. Eswar:
Performance of Dominating Sets in AODV Routing Protocol for MANETs. 166-170 - Muhannad Quwaider, Subir Biswas:

On-body Packet Routing Algorithms for Body Sensor Networks. 171-177 - Balakannan S. P

, Yier Yan, Jae Seung Yang, Moon Ho Lee:
End-to-End Network Delay-Constrained for QoS Multicast Routing. 178-183 - Kamaljit I. Lakhtaria

:
Enhancing QoS and QoE in IMS Enabled Next Generation Networks. 184-189
Network Operations and Management
- Siva Rama Krishnan Somayaji, Ch. A. S. Murty

:
Securing Internet Protocol (IP) Storage: A Case Study. 190-195 - Girish Kumar Patnaik, M. M. Gore:

Tree-Like Peer-to-Peer Symmetric Key Management in Mobile Ad Hoc Network. 196-201 - Sasthi C. Ghosh, Roger M. Whitaker, Stuart M. Allen

, Steve Hurley:
Service Coverage Bounds Through Efficient Load Approximation in UMTS Network Planning. 202-207 - S. Muthuramalingam, P. Janani, B. Bavya, R. Rajaram:

An Energy-Conserving Topology Maintenance Algorithm for MANETs. 208-213 - Mydhili K. Nair, V. Gopalakrishna:

Agent Based Web Services with RuleML for Network Management. 214-219 - Boyoung Lee, Sojung Yang, Deokjai Choi:

A Status Monitoring System Design/Implementation for Home Appliances Controlled by Home Server. 220-223 - B. Jagadeesh

, Samayamantula Srinivas Kumar
, K. Raja Rajeswari:
A Genetic Algorithm Based Oblivious Image Watermarking Scheme Using Singular Value Decomposition (SVD). 224-229 - Kilari Veera Swamy

, B. Chandra Mohan, Y. V. Bhaskar Reddy, Samayamantula Srinivas Kumar
:
Energy Based Quantization for Image Compression Using Contourlet Transform. 230-234
Network Security, Trust, and Privacy
- Reshmi Maulik

, Nabendu Chaki
:
PhishNet: Enhancing the Security Aspect of IMS Users. 235-239 - Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:

Fault Analysis of Security Policy Implementations in Enterprise Networks. 240-245 - A. John Prakash

, V. Rhymend Uthariaraj:
Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication. 246-253 - Mosin I. Hasan, Nilesh B. Prajapati:

An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers. 254-258 - Keiichi Sakakima, Shingo Ata, Hiroshi Kitamura:

Anonymous but Traceable IP Address-Based Communication System. 259-264 - K. B. Chandradeep:

A Scheme for the Design and Implementation of a Distributed IDS. 265-270 - Miyeon Yoon, Kwangkyum Lee, Mijoo Kim, Yongtae Shin:

Secure Mobile Multicast Handoff Mechanisms Using a Time-Limited Key. 271-276 - K. Saravanan, Arunkumar Thangavelu, K. Rameshbabu:

A Middleware Architectural framework for Vehicular Safety over VANET (InVANET). 277-282 - Nirnay Ghosh, Soumya K. Ghosh:

An Approach for Security Assessment of Network Configurations Using Attack Graph. 283-288 - Saurav Muralidharan, Sajin Koroth

, Nevil Anto, Rafeeque Pandarachalil:
Galaxia: A Semi-decentralized System for Implementing Secure-Group P2P Networks. 289-294 - Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai:

"Reminder: please update your details": Phishing Trends. 295-300
GRAPH-HOC 09: First Workshop on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks
- Ashwin Ganesan

:
On Some Sufficient Conditions for Distributed Quality-of-Service Support in Wireless Networks. 301-306 - Sarvesh Kumar Varatharajan, Gunes Ercal-Ozkaya:

On a Local Heuristic for a Reverse Multicast Forwarding Game. 307-312 - Osman Yagan, Armand M. Makowski:

Random Key Graphs. 313-318 - Kiran K. Somasundaram, John S. Baras:

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks. 319-325 - Wouter Horré, Kevin Lee

, Danny Hughes, Sam Michiels
, Wouter Joosen:
A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks. 326-331
WiMoNe 2009: First International Workshop on Wireless and Mobile Networks
- Kaushik Ghosh

, Sarbani Roy
, Pradip K. Das:
An Alternative Approach to Find the Fermat Point of a Polygonal Geographic Region for Energy Efficient Geocast Routing Protocols: Global Minima Scheme. 332-337 - Sajal Saha

, Subhasree Bhattacharjee
, Rajib Nath Bhowmick, Asish K. Mukhopadhyay, Dhinaharan Nagamalai:
Analysis of Hierarchical Mobile IP Based Fast Mobility Management Schemes. 338-343 - Stanislav Nonchev, Mikko Valkama

:
Efficient Power-Aware Packet Scheduling for Multiantenna Packet Radio Systems. 344-348 - Susmita Das

, Bikramaditya Das
:
Time Domain Equalization Technique Using RAKE-MMSE Receivers for High Data Rate UWB Communication System. 349-353 - Gaurav Kapoor, Selwyn Piramuthu:

Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols. 354-357 - Chia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin:

Anomaly Behavior Analysis for Web Page Inspection. 358-363 - Sheng-Tzong Cheng, Bo-Fu Chen, Chih-Lun Chou:

Fairness Strategy and Scheduling Algorithm for IEEE 802.16 Wireless Access Systems. 364-369
NCS 2009: The First International Workshop on Network and Communications Security
- Xu Huang, Dharmendra Sharma

:
Fuzzy Switching Controller for the Security in 802.11 Networks. 370-375 - A. Nagaraju

, Ch. Ramya Krishna:
Performance Evaluation of ADV with AODV for Mobile Ad-hoc Networks. 376-380 - Natarajan Jaisankar, R. Saravanan

, K. Durai Swamy:
An Agent Based Security Framework for Protecting Routing Layer Operations in MANET. 381-385 - M. K. Kavitha Devi

, P. Venkatesh
:
An Improved Collaborative Recommender System. 386-391 - Jilong Li, Jangkyu Yun, Junhyung Kim, Icksoo Lee, Kijun Han:

A Handoff Management Scheme for Mobile Station in Wireless Body Area Mesh Networks. 392-395 - Kihyun Kim, Ick-Soo Lee, Mahnsuk Yoon, Junhyung Kim, Honggil Lee, Kijun Han:

An Efficient Routing Protocol Based on Position Information in Mobile Wireless Body Area Sensor Networks. 396-399 - Sooyeol Yang, Jeongbae Yun, Jangkyu Yun, Honggil Lee, Kijun Han:

Analysis and Proposal of Wireless Mesh Network's Routing Metric for WBAN. 400-403 - Young-mi Baek, Byung-hwa Lee, Jeongbae Yun, Keuchul Cho, Kijun Han:

A Self-Adjustable Rate Control in Wireless Body Area Networks. 404-407 - S. Gowrishankar

, Subir Kumar Sarkar, T. G. Basavaraju:
Simulation Based Performance Comparison of Community Model, GFMM, RPGM, Manhattan Model and RWP-SS Mobility Models in MANET. 408-413 - V. Vijayaraghavan, Sanjoy Kumar Paul:

iMeasure Security (iMS): A Novel Framework for Security Quantification. 414-421 - Samrat Mondal

, Shamik Sural
:
Supporting Negative Authorization in Spatiotemporal Role Based Access Control. 422-427 - Alper Ugur, Ibrahim Sogukpinar

:
A Framework for Licensed Digital Signatures. 428-432 - Turker Akyuz, Ibrahim Sogukpinar

:
Packet Marking with Distance Based Probabilities for IP Traceback. 433-438 - Mohammad Yamin

, Yasser Ades:
Crowd Management with RFID and Wireless Technologies. 439-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














