dblp: ICDCS 2008 - Workshops (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


28th ICDCS 2008: Beijing, China - Workshops

jump to- The 10th International Workshop on Multimedia Network Systems and Applications - MNSA 2008
- The Second International Workshop on Wireless Mesh and Ad Hoc Networks - WiMAN 2008
- The Third International Workshop on Delay/Disruption-Tolerant Mobile Networks - DTMN 2008
- The Second International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems - TRAM 2008
- The Fifth International Workshop on Wireless Ad Hoc and Sensor Networking - WWASN 2008
- The First International Workshop on Wireless Security and Privacy - WiSP'08
- The Second International Workshop on Cooperative Distributed Systems - CDS 2008
- The First International Workshop on Cyber-Physical Systems - WCPS 2008
- The Seventh International Workshop on Assurance in Distributed Systems and Networks - ADSN 2008

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China. IEEE Computer Society 2008, ISBN 978-0-7695-3173-1
The 10th International Workshop on Multimedia Network Systems and Applications - MNSA 2008
P2P and Overlay Networks

Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa
:
A Protocol for Making an Agreement in a Peer-to-Peer (P2P) Society. 1-6
Bin Chang, Liang Dai, Yi Cui, Yuan Xue:
On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis. 7-11
Yishuai Chen, Changjia Chen, Chunxi Li:
A Measurement Study of Cache Rejection in P2P Live Streaming System. 12-17
Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa
:
A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks. 18-23
Distributed Systems

Tomoya Enokido, Makoto Takizawa
:
Role Based Access Control in Distributed Object Systems. 24-29
Minoru Uehara:
Security Framework in a Virtual Large-Scale Disk System. 30-35
Hui-Huang Hsu, Yao-Bao Yen, Chu-Song Chen, Chun-Ta Ho:
Pose Estimation for Evaluating Standing Long Jumps via Dynamic Bayesian Networks. 36-41
Markus Dunte, Christoph Ruland
:
Delivery Infrastructure for Secure Scalable Coded Multimedia. 42-47
Wireless Networks

Arjan Durresi, Vamsi Paruchuri
, Mimoza Durresi, Leonard Barolli:
Adaptive Layered Multimedia Transmissions over Wireless Networks. 48-53
Jaehyuk Ryu, Koji Okamura:
Experimental Evaluation of Usage Pattern in Campus Mobile IP Network. 54-59
Cheng-Yueh Liu, Yaw-Chung Chen:
An Adaptive Bandwidth Request Scheme for QoS Support in WiMAX Polling Services. 60-65
Tao Yang, Makoto Ikeda, Giuseppe De Marco, Leonard Barolli, Arjan Durresi, Fatos Xhafa
:
Routing Efficiency of AODV and DSR Protocols in Ad-Hoc Sensor Networks. 66-71
Multimedia Systems

Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:
Collaborative and Multimodal Communications System Using Immersive Virtual Reality Environment over Ultrahigh-Speed Network. 72-77
Takayuki Kuroda, Akira Sakatoku, Gen Kitagata, Debasish Chakraborty, Norio Shiratori:
Open 3D Shared Space Construction Scheme for Symbiotic Collaborative Works. 78-83
Jan Sablatnig, Jiehua Chen, Ruedi Seiler, Sven Grottke, Andreas Köpke, Adam Wolisz:
Adam A Testbed for Distributed Virtual Environments. 84-89
Yong Liu, Otto J. Anshus, Phuong Hoai Ha
, Tore Larsen, John Markus Bjørndalen:
MultiStream A Cross-Platform Display Sharing System Using Multiple Video Streams. 90-95
The Second International Workshop on Wireless Mesh and Ad Hoc Networks - WiMAN 2008
Routing, Scheduling, and Channel Assignment

Jianjun Yang, Zongming Fei:
Bipartite Graph Based Dynamic Spectrum Allocation for Wireless Mesh Networks. 96-101
Virginia Corvino, Velio Tralli, Roberto Verdone:
Cross-Layer Scheduling for Multiple Video Streams over a Hierarchical Emergency-Deployed Network. 102-107
Hejiao Huang, Yun Peng, Jing Li:
Joint Routing and Channel Assignment in WMN Using Extended Petri Net. 108-113
Adel Ali Ahmed
, Liza Abdul Latiff
, Mohd Adib Sarijari, Norsheila Fisal:
Real-Time Routing in Wireless Sensor Networks. 114-119
MAC Protocols

Ravi Nelavelli, Rajesh Prasad, Hongyi Wu:
Fast Link Assessment in Wireless Mesh Networks by Using Non-Constant Weight Code. 120-125
Manzur Ashraf, Aruna Jayasuriya, Sylvie Perreau:
On Load Regulated CSMA. 126-131
Nyein Aye Maung Maung, Taku Noguchi
, Makoto Kawai:
Maximizing Aggregate Throughput of Wireless Ad Hoc Networks Using Enhanced Physical Carrier Sensing. 132-137
Sensor Networks and Multi-Hop Communications

Oh-Heum Kwon, Ha-Joo Song:
Flip Error Resistant Stitching in Sensor Network Localizations. 138-143
Chongming Zhang
, Xi Zhou, Chuanshan Gao, Chunmei Wang:
On Improving the Precision of Localization with Gross Error Removal. 144-149
Frank Reichenbach, Jan Blumenthal, Dirk Timmermann
:
Comparing the Efficiency of Localization Algorithms with the Power-Error-Product (PEP). 150-155
Rajesh Prasad, Hongyi Wu, Dmitri D. Perkins
, Nian-Feng Tzeng:
Local Topology Assisted XOR Coding in Wireless Mesh Networks. 156-161
Modeling and Performance Evaluations

Zhen Kong, Yu-Kwong Kwok, Jiangzhou Wang:
Game Theoretic Packet Scheduling to Combat Non-Cooperativeness in Wireless Mesh Networks. 162-167
Hock-Beng Lim, Bang Wang, Cheng Fu, Arpan Phull, Di Ma
:
A Middleware Services Simulation Platform for Wireless Sensor Networks. 168-173
Enkhbold Ochirsuren, Leandro Soares Indrusiak
, Manfred Glesner:
An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor Networks. 174-179
The Third International Workshop on Delay/Disruption-Tolerant Mobile Networks - DTMN 2008
Routing, Scheduling, and Channel Assignment

Yifeng Shao, Jie Wu:
Understanding the Tolerance of Dynamic Networks: A Routing-Oriented Approach. 180-185
Hao Jiang
, Hao Guo, Li-jia Chen:
Reliable and Efficient Alarm Message Routing in VANET. 186-191
Julián David Morillo-Pozo, Óscar Trullols-Cruces
, José M. Barceló
, Jorge García-Vidal:
A Cooperative ARQ for Delay-Tolerant Vehicular Networks. 192-197
Routing II

Lian Li, Limin Sun, Jian Ma, Canfeng Chen:
A Receiver-Based Opportunistic Forwarding Protocol for Mobile Sensor Networks. 198-203
Muhammad Arshad Islam, Marcel Waldvogel
:
Reality-Check for DTN Routing Algorithms. 204-209
Xianning Li, Xianwei Zhou:
Bounded-Delay, Probability-Based Routing in Intermittently Connected Mobile Ad Hoc Networks. 210-215
Routing III

Jincheng Wang, Deshi Li, Mi Zhou, Dipak Ghosal:
Data Collection with Multiple Mobile Actors in Underwater Sensor Networks. 216-221
Feng Liu, Ming Li, Run Zhang, He Zhang, Zhen Xu:
Remaining Delivery Time Estimation Based Routing for Intermittently Connected Mobile Networks. 222-227
Zhipeng Yang, Ha Dang, Hongyi Wu:
Online Estimation of Effective Delivery Capability in Delay-Tolerant Mobile Sensor Networks. 228-233
The Second International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems - TRAM 2008
TRAM 2008 Keynote

Xiaoming Li:
A Grassroots Approach in P2P Reputation Studies. 234
Invited Papers

Huanyu Zhao, Xiaolin Li:
H-Trust: A Robust and Lightweight Group Reputation System for Peer-to-Peer Desktop Grid. 235-240
Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei Dai:
Modeling Attack Behaviors in Rating Systems. 241-248
Trust Models and Reputation Systems

Qing Zhang, Ting Yu:
On the Modeling of Honest Players in Reputation Systems. 249-254
Anna Gutowska, Kevan Buckley:
Computing Reputation Metric in Multi-Agent E-Commerce Reputation System. 255-260
The Fifth International Workshop on Wireless Ad Hoc and Sensor Networking - WWASN 2008
Routing and Broadcasting

Rajiv Ramdhany, Geoff Coulson:
Manetkit: A Framework for MANET Routing Protocols. 261-266
Amit Dvir
, Michael Segal
:
The (k, l) Coredian Tree for Ad Hoc Networks. 267-272
Doina Bein
, Si-Qing Zheng:
An Effective Algorithm for Computing Energy-Efficient Broadcasting Trees in All-Wireless Networks. 273-278
Yangcheng Huang, Saleem N. Bhatti
:
Fast-Converging Distance Vector Routing for Wireless Mesh Networks. 279-284
Sensor Networks

Xiaoling Qiu, Dipak Ghosal, Biswanath Mukherjee, Jennifer Yick, Deshi Li:
Priority-Based Coverage-Aware Congestion Control for Multihop Wireless Sensor Networks. 285-290
Zhen Jiang, Jie Wu, Robert Kline, Jennifer Krantz:
Mobility Control for Complete Coverage in Wireless Sensor Networks. 291-296
Jehn-Ruey Jiang, Tzu-Ming Sung:
Maintaining Connected Coverage for Wireless Sensor Networks. 297-302
Cheng Fu, Bang Wang, Hock-Beng Lim:
An Enhanced Sensor Scheduling Protocol for Wireless Sensor Networks. 303-308
Security and Applications

Guorui Li, Jingsha He
, Yingfang Fu:
A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. 309-314
Yang Xiao
, Hui Chen
, Yanping Zhang, Xiaojiang Du, Bo Sun, Kui Wu:
Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. 315-320
Meng-Shiuan Pan
, Lun-Wu Yeh, Yan-Ann Chen, Yu-Hsuan Lin, Yu-Chee Tseng:
Design and Implementation of a WSN-Based Intelligent Light Control System. 321-326
Emre Atsan, Öznur Özkasap
:
SCALAR: Scalable Data Lookup and Replication Framework for Mobile Ad-hoc Networks. 327-332
Modeling and Measurements

Andreas Köpke, Adam Wolisz:
Measuring the Node Energy Consumption in USB Based WSN Testbeds. 333-338
Vojislav B. Misic, Jelena V. Misic:
Performance of Incomplete Channel Sensing for Frequency Hopping Cognitive Personal Area Networks. 339-344
Pei Li, Yinlong Xu, Chunpeng Zhang:
Impact of Selfish Rate Adaptation on the Performance in IEEE 802.11-Based Wireless Multi-Hop Networks. 345-350
The First International Workshop on Wireless Security and Privacy - WiSP'08
Opening Remarks and Keynote

David H. C. Du:
Cyber Security: An Obtainable Goal? 351
Detections and Reputation Management

Tao Li, Min Song, Mansoor Alam:
Compromised Sensor Nodes Detection: A Quantitative Approach. 352-357
Bo Zhu, Kui Ren
, Lingyu Wang:
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. 358-363
Avinash Srinivasan, Feng Li, Jie Wu:
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks. 364-369
Haiying Shen, Ze Li:
ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc Networks. 370-375
Key Agreement and Management

Chae Hoon Lim:
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks. 376-381
Nitesh Saxena, Jonathan Voris:
Pairing Devices with Good Quality Output Interfaces. 382-387
Wei Ren
, Kui Ren
, Wenjing Lou:
Optimized User Revocation for Group Signature Based Privacy-Aware PKI. 388-393
Methodology and Protocol

Yan Sun, Anup Kumar:
Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security Services. 394-399
Ioana Rodhe, Christian Rohner:
n-LDA: n-Layers Data Aggregation in Sensor Networks. 400-405
Spyros S. Magliveras, Wandi Wei, Xukai Zou:
Notes on the CRTDH Group Key Agreement Protocol. 406-411
Jianbo Yao, Guangjun Wen:
Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks. 412-416
The Second International Workshop on Cooperative Distributed Systems - CDS 2008

Gerald G. Koch, Boris Koldehofe, Kurt Rothermel:
Higher Confidence in Event Correlation Using Uncertainty Restrictions. 417-422
Abdessamad Imine:
Flexible Concurrency Control for Real-Time Collaborative Editors. 423-428
Ye-In Chang, Hue-Ling Chen, Sih-Ning Li, Hung-Ze Liu:
A Dynamic Hashing Approach to Supporting Load Balance in P2P Systems. 429-434
Seth Holloway, Christine Julien
:
ROCC: A Communication Overlay Abstraction for Wireless Users. 435-440
Qi Li, Mingwei Xu, Xinwen Zhang:
Towards a Group-Based RBAC Model and Decentralized User-Role Administration. 441-446
Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu:
Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments. 447-452
Mahdi Niamanesh, Rasool Jalili:
A Formalism for Recongurability Analysis in Distributed Non-Blocking Components. 453-458
Yilin Wang, Edward Chan, Wenzhong Li, Sanglu Lu:
Caching Invalidation Strategies for Supporting 'Weak' Location Dependent Queries. 459-464
Yin Chen, Li Tang, Jun Li:
Heuristic Relay Node Selection Algorithm for One-Hop Overlay Routing. 465-470
Ze Li, Haiying Shen:
Probabilistic Routing with Multi-Copies in Delay Tolerant Networks. 471-476
The First International Workshop on Cyber-Physical Systems - WCPS 2008
Invited Talk

Karthik Lakshmanan, Raj Rajkumar:
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation. 477-482
Contributed Papers

Kyoung-Don Kang, Sang Hyuk Son:
Real-Time Data Services for Cyber Physical Systems. 483-488
Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu:
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems. 489-494
Alvaro A. Cárdenas
, Saurabh Amin, Shankar Sastry
:
Secure Control: Towards Survivable Cyber-Physical Systems. 495-500
James E. Weimer, Bruno Sinopoli, Bruce H. Krogh:
A Relaxation Approach to Dynamic Sensor Selection in Large-Scale Wireless Networks. 501-506
Veljko Krunic, Richard Han
:
Towards Cyber-Physical Holodeck Systems Via Physically Rendered Environments (PRE's). 507-512
Le Xie
, Marija D. Ilic:
Module-Based Modeling of Cyber-Physical Power Systems. 513-518
Han Tang, Bruce M. McMillin
:
Security Property Violation in CPS through Timing. 519-524
Honguk Woo, Jianliang Yi, James C. Browne, Aloysius K. Mok, Ella M. Atkins, Fei Xie:
Design and Development Methodology for Resilient Cyber-Physical Systems. 525-528
Albert M. K. Cheng
:
Cyber-Physical Medical and Medication Systems. 529-532
The Seventh International Workshop on Assurance in Distributed Systems and Networks - ADSN 2008
Keynote

Juichi Takahashi, Hideharu Kojima
, Zengo Furukawa:
Coverage Based Testing for Concurrent Software. 533-538
Dependable Computing

Fuad Abujarad, Sandeep S. Kulkarni:
Automated Addition of Fault-Tolerance to SCR Toolset: A Case Study. 539-544
Bastien Mainaud, Mariem Zekri, Hossam Afifi:
Improving Routing Reliability on Wireless Sensors Network with Emergency Paths. 545-550
Autonomous Decentralized Architecture

Yinong Chen
, Xiaoying Bai:
On Robotics Applications in Service-Oriented Architecture. 551-556
Xiaodong Lu, Kinji Mori:
Autonomous Decentralized VoD Architecture to Achieve Service Assurance. 557-562
Khalid Mahmood
, Yuuya Kanamaru, Xiaodong Lu, Kinji Mori:
Autonomous Decentralized Community Construction Technology for High Quality Information Service. 563-568
Networking

Ryotaro Oda, Tomoyuki Ohta, Yoshiaki Kakuda:
An Autonomous Clustering-Based Hierarchical Routing Using Decentralized Route Information Management Scheme for Mobile Ad Hoc Networks. 569-574
Tsuyoshi Mizumoto, Tomoyuki Ohta, Yoshiaki Kakuda:
Route-Split Routing with Resiliency to Simultaneous Failure for Mobile Ad Hoc Networks. 575-580
Takashi Kunifuji, Tadao Miura, Gen Kogure, Hiroyuki Sugahara, Masayuki Matsumoto:
A Novel Railway Signal Control System Based on the Internet Technology and an Assurance Technology. 581-586
Scheduling

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







