International Symposium on Computers and Communications 2008 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


ISCC 2008: Marrakech, Morocco

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco. IEEE Computer Society 2008, ISBN 978-1-4244-2702-4

Adel Said Elmaghraby
:
Message from the general chair.

Saad Biaz, Abdelghani Bellaachia:
Message from the technical program chairs.
Keynotes

Siamak Khorram:
The state-of-the-art in acquiring and processing satellite remotely sensed data worldwide.
Raouf Boutaba:
Distributed pattern matching: Concept and applications in internet-scale networks.
Mahmoud Daneshmand:
Ten years of experimentation in Information Mining & Software Research with applications in telecommunications industry.
Azzedine Boukerche:
The next generation wireless network challenges for an emergency preparedness and response class of applications: A necessary public safety and security.
Saad Biaz:
Success and failures of "de-randomized" congestion losses losses losses.
Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang:
2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systems.
Streaming over Wireless I
Streaming over Wireless II

Kostas Pentikousis, Jarno Pinola
, Esa Piri, Frerk Fitzek:
A measurement study of Speex VoIP and H.264/AVC video over IEEE 802.16d and IEEE 802.11g. 19-24
Federico Maguolo, Mathieu Lacage, Thierry Turletti:
Efficient collision detection for auto rate fallback algorithm. 25-30
Davide Brunelli
, Loris Teodorani:
Improving audio streaming over multi-hop ZigBee networks. 31-36
Multimedia Applications over Wireless

Giorgos Karopoulos, Georgios Kambourakis
, Stefanos Gritzalis
:
Caller identity privacy in SIP heterogeneous realms: A practical solution. 37-43
Chrysa Papagianni
, Nikolaos D. Tselikas
, Evangelos A. Kosmatos, Andreas E. Papadakis
, Thierry Keutgen, Dimitra I. Kaklamani, Iakovos S. Venieris:
A complete content production and delivery system in a controlled multimedia network. 44-49
Antonios G. Alexiou, Christos Bouras, Evangelos Rekkas:
Efficient delivery of MBMS multicast traffic over HSDPA. 50-55
Optical Networks

Wael Hosny Fouad Aly, Mohamed Faten Zhani
, Halima Elbiaze:
On controlling burst loss ratio inside an OBS network. 56-61
Eun-Sung Jung
, Yan Li, Sanjay Ranka
, Sartaj Sahni:
Performance evaluation of routing and wavelength assignment algorithms for optical networks. 62-67
Burak Kantarci, Hussein T. Mouftah, Sema F. Oktug
:
Arranging shareability dynamically for the availability-constrained design of optical transport networks. 68-73
Emad Mahmoud Alsukhni, Hussein T. Mouftah:
A novel distributed destination routing-based Availability-Aware provisioning framework for differentiated protection services in optical mesh networks. 74-79
Youssef Said
, Houria Rezig, Ammar Bouallegue:
On the application of long soas in linear operating and saturation regimes: Exploitation in high bit rate optical networks. 80-83
Branka Lakic, Marek Hajduczenia, Henrique J. A. da Silva, Paulo P. Monteiro
:
Using adapted visibility graphs for network planning. 84-90
Service Oriented Architecture

Xiaodong Lu, Kinji Mori:
Autonomous preference-aware multi-service integration and allocation. 91-96
Dietrich Van der Weken, Stein Desmet, Bjorn Muylaert, Steven Van Assche, Bruno Volckaert
:
Automating media processes in a service oriented architecture. 97-102
Pravin Pawar, Julien Subercaze, Pierre Maret, Bert-Jan van Beijnum, Dimitri Konstantas:
Towards business model and technical platform for the service oriented context-aware mobile virtual communities. 103-110
Antonio Corradi
, Enrico Lodolo
, Stefano Monti, Samuele Pasini:
A user-centric composition model for the Internet of Services. 110-117
Uthman Baroudi
, B. Abu Qadous:
An efficient adaptive Cross-Layer interaction mechanism for TCP traffic over heterogeneous networks. 118-123
Basel Alawieh, Yongning Zhang, Chadi Assi, Hussein T. Mouftah:
An efficient rate adaptation scheme for multihop wireless networks using Kalman Filter. 124-129
Saad Biaz, Shaoen Wu:
Rate adaptation algorithms for IEEE 802.11 networks: A survey and comparison. 130-136
Cire Sall
, El houcine Chakir El Alaoui, Saïd Doubabi
, Elmostafa Elwarraki
:
A robust controller for the TCP congestion window. 137-142
Kuei-Ping Shih, San-Yuan Wang, Chien-Min Chou, Li-Jie Cheng:
A dynamic rate adaptation with fragmentation MAC protocol against channel variation for wireless LANs. 143-148
Niklas Kirschnick, Frank Steuer, Pablo Vidales, Sahin Albayrak
:
Adaptive window size to reduce the influence of heterogeneous mobility on TCP performance. 149-156
Shan Chen, Junhua Zhu, Brahim Bensaou, Farid Naït-Abdesselam:
F2-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networks. 157-162
Shie-Yuan Wang, Hsi-Lu Chao, Kuang-Che Liu, Ting-Wei He, Chih-Che Lin, Chih-Liang Chou:
Evaluating and improving the TCP/UDP performances of IEEE 802.11(p)/1609 networks. 163-168
Data Mining I

Safwat H. Hamad
, Tahany A. Fergany, Reda A. Ammar, Amal A. Abd El-Raouf
:
A Double K-Clustering Approach for restructuring Distributed Object-Oriented software. 169-174
Hisham El-Shishiny, T. H. Soliman, M. El-Asmar:
Mining drug targets based on microarray experiments. 175-181
Hisham El-Shishiny, S. Sobhy Deraz, Omar Bahy Badreddin:
Mining software aging: A neural network approach. 182-187
Aouatif Amine
, Sanaa Ghouzali
, Mohammed Rziza
, Driss Aboutajdine:
Investigation of feature dimension reduction based DCT/SVM for face recognition. 188-193
Cellular and Mobile Communications I

Khaled A. Ali, Hossam S. Hassanein
, Hussein T. Mouftah:
Power-Controlled Rate and Coverage Adaptation for WCDMA cellular networks. 194-200
Polychronis Koutsakis
:
Call admission control for H.264 traffic transmission over wireless cellular networks. 201-207
Khalil Ibrahimi
, Rachid El Azouzi
, El-Houssine Bouyakhf:
Uplink call admission control in multi-services W-CDMA network. 208-213
Polychronis Koutsakis
:
Efficient traffic policing for videoconference traffic over wireless cellular networks. 214-221
Woonsik Lee, Minh-Viet Nguyen, Hwang Soo Lee:
A resource allocation algorithm and system architecture to extend the cell coverage and alleviate the inter-cell interference. 222-227
Toshihiko Komine, Satoshi Konishi, Hiroyuki Shinbo:
A study on optimal termination target of synchronous H-ARQ for the next generation cellular system. 228-233
Jiao Zhang, Yujun Zhang, Ye Tian, Zhongcheng Li:
CPK-based fast authentication method in Mobile IPv6 networks. 234-239
Secured Networks I

Pedro B. Velloso
, Rafael P. Laufer, Otto Carlos Muniz Bandeira Duarte, Guy Pujolle:
Analyzing a human-based trust model for mobile ad hoc networks. 240-245
François Lesueur, Ludovic Mé, Valérie Viet Triem Tong:
A sybilproof distributed identity management for P2P networks. 246-253
Vincent Toubiana, Houda Labiod, Laurent Reynaud, Yvon Gourhant:
An analysis of ASMA performances against packet dropping attacks in dense networks. 254-259
Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani:
The impact of wireless LAN security on performance of different Windows operating systems. 260-264
Mesh Networks I

Jad El-Najjar, Brigitte Jaumard, Chadi Assi:
Efficient routing in WiMax/802.16 based mesh networks with centralized scheduling. 265-271
Sadeq Ali Makram, Mesut Günes
:
Distributed channel assignment for multi-radio wireless mesh networks. 272-277
João Paulo Barraca
, Rui L. Aguiar
:
Managing community aware Wireless Mesh Networks. 278-285
Arlen Nascimento, Edjair de Souza Mota
, Saulo Queiroz
, Edson Nascimento Silva Jr.:
Header compression for VoIP over multi-hop wireless mesh networks. 286-291
Rafael De T. Valle, Diego G. Passos
, Célio Vinicius N. de Albuquerque
, Débora C. Muchaluat-Saade:
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool. 292-297
Secured Systems

Xinyan Zha, Sartaj Sahni:
Highly compressed Aho-Corasick automata for efficient intrusion detection. 298-303
Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai:
Efficient disk encryption and verification through trusted nonce. 304-309
Zonglin Li, Guangmin Hu, Dan Yang:
Global abnormal correlation analysis for DDoS attack detection. 310-315
Vinodh Gopal, Satyajit Grover, Michael E. Kounavis:
Fast multiplication techniques for public key cryptography. 316-325
Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani:
A phishing vulnerability analysis of web based systems. 326-331
Yang Li, Binxing Fang, Li Guo, Zhihong Tian, Yongzheng Zhang, Zhi-Gang Wu:
UBSF: A novel online URL-Based Spam Filter. 332-339
Yehia H. Khalil, Adel Said Elmaghraby
, Anup Kumar:
Evaluation of resilience for Data Center systems. 340-345
Adil Alaoui, Nishant Subbiah, Jeffery Collmann, Kevin Cleary, Seong Ki Mun, Johnathan Coleman:
Building a secure medical research organization. 346-355
Cellular and Mobile Communications II

Christophoros Christophorou, Andreas Pitsillides:
A new approach for efficient MBMS service provision in UTRAN. 356-361
Christophoros Christophorou, Andreas Pitsillides:
An enhanced approach for efficient MBMS handovers in 3G networks. 362-367
Andreas Panayides
, Christophoros Christophorou, Josephine Antoniou
, Andreas Pitsillides, Vasos Vassiliou
:
Power counting for optimized capacity in MBMS enabled UTRAN. 368-373
Antonios G. Alexiou, Christos Bouras, Vasileios Kokkinos
:
Power saving methods for MBMS transmissions in UTRAN. 374-379
Qi Li, Mingwei Xu, Xinwen Zhang:
Access control in Group Communication Systems. 380-385
Secured Networks II

A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono:
FlexBox: Sandboxing internet servers based on layer-7 contexts. 386-391
Yan Shen, Jun Bi, Jianping Wu, Qiang Liu:
A two-level source address spoofing prevention based on automatic signature and verification mechanism. 392-397
Yasser Yasami
, Siavash Khorsandi, Saadat Pour Mozaffari, A. Jalalian:
An unsupervised network anomaly detection approach by k-Means clustering & ID3 algorithms. 398-403
Mesh Networks II

Mohamed Abou El Saoud, Samy A. Mahmoud:
Optimal number and class selection of nodes in Wireless Mesh Networks. 404-410
Zhiying Gao, Hassan Naser:
End-to-end shared restoration algorithms in multi-domain mesh networks. 411-416
Ahmed Abd El Al, Tarek N. Saadawi:
High throughput path selection for multi-path video streaming in Ad-hoc networks. 417-422
Valeria Loscrì
:
A queue based dynamic approach for the Coordinated distributed scheduler of the IEEE 802.16. 423-428
Lan Tien Nguyen, Razvan Beuran, Yoichi Shinoda:
A load-aware routing metric for wireless mesh networks. 429-435
Kuei-Ping Shih, Hung-Chang Chen, Chun-Chih Li, Hsiang-I Chen:
CLE2aR2: A cross-layer energy-efficient and reliable routing protocol for wireless ad hoc networks. 436-441
Architecture

Samah A. Senbel:
Pro-active task sharing in a self-organizing server cluster. 442-446
Alejandra Rodríguez, Javier Fernández
, Jesús Carretero
:
Model for on-demand virtual computing architectures - OVCA. 447-454
Azzedine Boukerche, YunFeng Gu:
Performance modeling of a grid-based Data Distribution Management protocol. 455-461
Kiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xiao Qin
, Yiming Yang:
Improving reliability and energy efficiency of disk systems via utilization control. 462-467
Luiz Carlos Pinto, Rodrigo P. Mendonça, Mario A. R. Dantas
:
Impact of interconnection networks and application granularity to compound cluster environments. 468-473
Luiz Carlos Pinto, Luiz H. B. Tomazella, Mario A. R. Dantas
:
Building efficient multi-core clusters for high performance computing. 474-479
Peer to Peer

Fatih Turkmen
, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino:
P-CDN: Extending access control capabilities of P2P systems to provide CDN services. 480-486
Raime Bustos, Alberto Aguilar, Kia Makki, Raimund K. Ege:
Multicast-P2P content distribution in large-scale enterprise networks. 487-494
Michele Albano
, Laura Ricci
, Martina Baldanzi, Ranieri Baraglia:
VoRaQue: Range queries on Voronoi overlays. 495-500
W. D. Yu, J. Patel, M. Chitralamuthu, S. S. Parakh:
An empirical approach to a system design methodology for mobile Peer-to-Peer computing. 501-506
Marinho P. Barcellos, Rodrigo B. Mansilha
, Francisco V. Brasileiro
:
TorrentLab: investigating BitTorrent through simulation and live experiments. 507-512
Ya Chu Yang, Chien-Ming Cheng, Pei Yun Lin, Shiao-Li Tsao:
A real-time road traffic information system based on a peer-to-peer approach. 513-518
Applications in Computers and Communications I

Hazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath:
Formal automated transformation of SDL specifications to Lotos specifications. 519-524
Chafia Bouanaka
, Faiza Belala:
Tile logic as an architectural model for mobility. 525-530
Hisham Al-Mubaid
, Anurag Nagar:
Comparison of four similarity measures based on GO annotations for Gene Clustering. 531-536
Suman Deb Roy, Sneha Aman Singh, Subhrabrata Choudhury, Narayan C. Debnath:
Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. 537-542
Subhrabrata Choudhury, Kapil Paniker, Anamika Sinha, S. Mukhopadhyay, Narayan C. Debnath:
A proactive burst assembly algorithm for optical burst switched networks. 543-548
Wireless Network Models

Merlinda Drini, Tarek N. Saadawi:
Modeling wireless channel for ad-hoc network routing protocol. 549-555
Abdellatif Kobbane, Rachid El Azouzi
, El-Houssine Bouyakhf:
A queuing analysis of packet dropping for real-time applications in wireless networks. 556-561
Chong Jiang, Brian Smith, Babak Hassibi, Sriram Vishwanath:
Multicast in wireless erasure networks with feedback. 562-565
Saulo Queiroz
, Arlen Nascimento, Edjair de Souza Mota
, Andrea Oliveira, Leandro Galvão, Edson Nascimento Silva Jr.:
Impact evaluation of radio propagation models on performance parameters of application layer in Wireless Mesh Backbone simulation. 566-571
Yan He, Dmitri D. Perkins
, Bin Huang:
S-Box: A scalability analysis framework for ad hoc routing protocols. 572-578
Data Mining II

Fadoua Ataa-Allah
, William I. Grosky, Driss Aboutajdine:
Document clustering based on diffusion maps and a comparison of the k-means performances in various spaces. 579-584
Hong Shen, Xiao-Long Yan:
Probability Density Estimation over evolving data streams using Tilted Parzen Window. 585-589
Hichem Frigui, Cheul Hwang:
Semi-supervised Clustering and Aggregation of Relational Data. 590-595
Mobility I

Cesare Stefanelli, Mauro Tortonesi
, Erika Benvegnu, Niranjan Suri:
Session mobility in the mockets communication middleware. 596-603
Hanwen Zhang, Yujun Zhang, Chao Ma, Yi Sun, Zhongcheng Li:
Dynamic load balancing among multiple home agents for MIPv6. 604-609
Hai Lin, Houda Labiod:
Release of unnecessary resource reservation in mobility cases. 610-615
Omar M. Raoof, Hamed S. Al-Raweshidy
:
Game theory and an interface selection mechanism for Multi-homed Mobile Nodes. 616-623
Rodrigo Prado, Eduardo Zagari, Tomás Badan, Eleri Cardozo
, Murício Magalhães, José Carrilho, Rossano P. Pinto, André Berenguel, Daniel Barboza, Daniel Moraes, Thienne Johnson, Lars Westberg:
A reference architecture for micro-mobility support in IP networks. 624-630
Loreno Oliveira, Kyller Costa Gorgônio
, Angelo Perkusich
, Leandro Dias da Silva
:
Pitfalls and tradeoffs on dealing with handoff management in bluetooth-based WPANs for real-time applications. 631-636
Applications in Computers and Communications II

Anurag Nagar, Hisham Al-Mubaid
:
Using path length measure for gene clustering based on similarity of annotation terms. 637-642
Hazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath:
Towards sound development of PIXITP, conformance test suites, and conforming implementations for various Formal Description Techniques. 643-648
Sultan Aljahdali, Ennumeri A. Zanaty:
Combining multiple segmentation methods for improving the segmentation accuracy. 649-653
Narayan C. Debnath, Lorena Baigorria, Daniel Riesco, German Montejano:
Metrics applied to Aspect Oriented Design using UML profiles. 654-657
Douglas Dyllon Jeronimo de Macedo
, Hilton Ganzo William Perantunes, Luiz F. J. Maia, Eros Comunello
, Aldo von Wangenheim
, Mario A. R. Dantas
:
An interoperability approach based on asynchronous replication among distributed internet databases. 658-663
Data Communications I

Josep M. Selga, Agustín Zaballos
, Jaume Abella, Guiomar Corral:
Model for polling in noisy multihop systems with application to PLC and AMR. 664-669
Atman Jbari
, Abdellah Adib
, Driss Aboutajdine:
A new signal separation technique using double referenced system. 670-673
Elmahdi Driouch, Wessam Ajib:
A graph theory based scheduling algorithm For MIMO-CDMA systems using zero forcing beamforming. 674-679
S. M. Sameer, Ratnam V. Raja Kumar:
An efficient maximum likelihood carrier frequency offset estimation technique for OFDM systems. 680-684
Li Zheng, Doan B. Hoang:
Performance analysis for resource coordination in a high-density wireless environment. 685-690
Binbin Xu, Jianping An, Zhongxia Simon He
:
MC-CDMA multiuser detection using a hybrid immune clonal selection algorithm with Hopfield Neural Network in fading channels. 691-694
Software & Applications

Mohammad Reza Nami
, Abbas Malekpour:
Formal specification of a particular banking domain with RAISE specification language. 695-699
Mohsen Toorani
, Ali Asghar Beheshti Shirazi:
SSMS - A secure SMS messaging protocol for the m-payment systems. 700-705
Rui Qiao, Yuan Wang, Xinyan Gao, Jinzhao Wu:
Operational semantics of probabilistic Kleene algebra with tests. 706-713
Xinyan Gao, Jinzhao Wu, Rui Qiao, Jianfeng Chen:
Theory framework for event structure slicing. 714-721
Mohamed El Ghami
, Ivan Ivanov, Hans Melissen, Cornelis Roos, Trond Steihaug
:
Primal-dual algorithm for linear optimization problems based on a new class of kernel functions. 722-729
Rajaa Saidi
, Mounia Fredj, Salma Mouline
, Agnès Front, Dominique Rieu:
Variability modeling for Business Component customization. 730-735
Dolly Sharma
, Vishal Thapar, Reda A. Ammar, Sanguthevar Rajasekaran, Mohamed Ahmed:
Efficient sorting algorithms for the cell broadband engine. 736-741
Bin Liu, Philippe Martins, Philippe Bertin:
The operation mode selection in FMIPv6. 742-749
Mobility II
Network Management

Luca Cittadini, Tiziana Refice, Alessio Campisano, Giuseppe Di Battista, Claudio Sasso:
Measuring and visualizing interdomain routing dynamics with BGPATH. 780-787
Mazen G. Khair, Jun Zheng, Hussein T. Mouftah:
Distributed fault localization for multi-domain all-optical networks with partial power monitoring. 788-793
Kenji Kumaki, Ikuo Nakagawa, Kenichi Nagami, Tomohiko Ogishi, Shigehiro Ano:
Design and evaluation of a P2MP MPLS-based hierarchical service management system. 794-799
Natascha Petry Ligocki, Carmem S. Hara
, Christiano Lyra:
A flexible network monitoring tool based on a data stream management system. 800-805
Ewerton Monteiro Salvador, Lisandro Zambenedetti Granville
:
Using visualization techniques for SNMP traffic analyses. 806-811
Abderrahmane Ben Abdellahi Ben Doua, Seyeong Choi, Mohamed-Slim Alouini
, Khalid A. Qaraqe
:
Adaptive RAKE combining schemes in the soft handover region. 812-817
Data Communications II

Manal Taoufiki, Abdellah Adib
, Driss Aboutajdine, Saad Biaz:
Blind MIMO deconvolution of any source distributions via high-order spectra. 818-823
Adnane Latif, Rachid Hilal, Abdellah Ait Ouahman:
Investigation on folded patch antenna for cellular applications. 824-830
A. A. Al-Kheir, Khalid A. Qaraqe
, Mohamed-Slim Alouini
:
On the space-time correlation of MIMO fading channels in 3D scattering models. 831-837
Timo Nihtilä:
Capacity improvement by employing femto cells in a macro cell HSDPA network. 838-843
Samad S. Kolahi:
Comparison of CDMA tele-traffic models. 844-848
Document Retrieval

Abdelghani Bellaachia, Ghita Amor-Tijani:
Proper nouns in English-Arabic Cross Language Information Retrieval. 849-857
Yin-Fu Huang, Shing-Hang Wang:
An Efficient XML query processing based on combining T-Bitmap and index techniques. 858-863
Mohammad Shirali-Shahreza:
Pseudo-space Persian/Arabic text steganography. 864-868
Siham Boulaknadel
, Béatrice Daille, Driss Aboutajdine:
Multi-word term indexing for Arabic document retrieval. 869-873
Abdelghani Bellaachia, Ghita Amor-Tijani:
OOV words in an English-Arabic CLIR system. 874-882
Quality of Service I

Vitor Jesus
, Rui L. Aguiar
, Peter Steenkiste
:
A stateless architectural approach to inter-domain QoS. 883-890
José R. Gallardo, Sarai C. Cruz, Dimitrios Makrakis, Abdallah Shami
:
Analysis of the EDCA access mechanism for an IEEE 802.11e-compatible wireless LAN. 891-898
Pedro Neves, Tuomas Nissilä, Telmo Pereira, Ilkka Harjula, João L. Monteiro, Kostas Pentikousis, Susana Sargento
, Francisco Fontes:
A vendor-independent resource control framework for WiMAX. 899-906
Mohamad Chaitou
, Jean-Louis Le Roux:
Fast-reroute procedures for multi-point to multi-point MPLS tunnels. 907-914
Abdelhamid Mellouk, Said Hoceini, Farid Baguenine, Mustapha Cheurfa:
Distributed Quality-of-Service routing of best constrained shortest paths. 915-919
Routing I

Christine Maindorfer, Bettina Bär, Thomas Ottmann:
Relaxed min-augmented range trees for the representation of dynamic IP router tables. 920-927
Tan Chen, Xin Xiong:
Searching nearest neighbor in overlay network. 928-933
Marc Sánchez Artigas, Pedro García López, Antonio Fernandez Gómez-Skarmeta
:
Bypass: Providing secure DHT routing through bypassing malicious peers. 934-941
Lotfi Mhamdi
:
A Partially Buffered Crossbar packet switching architecture and its scheduling. 942-948
Thu-Huong Truong
, Mario Baldi, Yoram Ofek:
Scheduling high-rate sessions in Fractional Lambda Switching networks: Algorithm and analysis. 949-956
Ali Abbasi, Ahmad Khonsari
, N. Farri:
MOTE: Efficient monitoring of top-k set in sensor networks. 957-962
Sensor Networks I

Aristides Mpitziopoulos, Damianos Gavalas
, Charalampos Konstantopoulos
, Grammati E. Pantziou
:
Exploiting the cloning capability of Mobile Agents for cost-effective data fusion in wireless sensor networks. 963-968
Nicola Altan, Erwin P. Rathgeb:
On the self-healing properties of an extremely low power indoor metering network. 969-974
Azeddine Bilami
, Djallel Eddine Boubiche
:
A hybrid energy aware routing algorithm for wireless sensor networks. 975-980
Wei Huangfu, Yan Liu, Bin Duan, Limin Sun, Jian Ma, Canfeng Chen:
EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor Networks. 981-987
Hongli Xu, Liusheng Huang, Wang Liu, Ben Xu, Mingjun Xiao:
Topology control for minimal path interference in wireless sensor networks. 988-993
Image Processing

Saoussen Ben Jabra, Ezzeddine Zagrouba
:
A new approach of 3D watermarking based on image segmentation. 994-999
Samira Mabtoul, El Hassane Ibn Elhaj, Driss Aboutajdine:
A robust digital image watermarking method using Dual Tree Complex Wavelet Transform. 1000-1004
Mounir Ait Kerroum
, Ahmed Hammouch, Driss Aboutajdine, Abdelghani Bellaachia:
Using the maximum Mutual Information criterion to textural Feature Selection for satellite image classification. 1005-1009
Leila Essannouni
, El Hassane Ibn Elhaj, Driss Aboutajdine:
Automatic color face tracking using gray information. 1010-1014
Quality of Service II

Mario Baldi, Marco Papa Manzillo:
Deterministic service on IEEE 802.11-like networks. 1015-1022
Sahar Ghazal, Yassine Hadjadj-Aoul, Jalel Ben-Othman
, Farid Naït-Abdesselam:
Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networks. 1023-1028
Bin Rong, Ibrahim Khalil
, Zahir Tari
:
QoS-aware Application Layer Multicast. 1029-1033
S. T. EL-Leithy, Walaa M. Sheta
:
Wavelet-based geometry coding for 3D mesh using space frequency quantization. 1034-1039
Anne Nevin, Yuming Jiang
, Peder J. Emstad:
Robustness study of MBAC algorithms. 1040-1046
Mohamad Chaitou
, Jean-Louis Le Roux:
Multi-point to multi-point traffic engineering. 1047-1055
Routing II

Tarik Elamsy, Randa El-Marakby:
Flooding Zone Initialization Protocol (FZIP): Enabling efficient multimedia diffusion for multi-hop wireless networks. 1056-1061
Ahmed S. Nagy, Amr A. El-Kadi
, Mikhail N. Mikhail:
Measuring network performance of swarm power aware routing protocol for MANETs. 1062-1069
Youndo Lee, Yoonbo Shim, Yanghee Choi, Taekyoung Kwon:
A Reliability Aware Flooding Algorithm (RAFA) in wireless multi-hop networks. 1070-1075
Sensor Networks II
Systems

Mehdi Chehel Amirani
, Mohsen Toorani
, Ali Asghar Beheshti Shirazi:
A new approach to content-based file type detection. 1103-1108
Laura Ricci
, Luca Genovali:
JaDE: A JXTA support for distributed virtual environments. 1109-1114
Syed Sajjad Rizvi, Khaled M. Elleithy
, Aasia Riasat:
Reducing null message traffic in large parallel and distributed systems. 1115-1121
Machigar Ongtang, Ali R. Hurson
, Yu Jiao:
Transactional Agents for Pervasive Computing. 1122-1127
Wafa Kammoun, Habib Youssef:
Improving the performance of End-to-End single rate Multicast Congestion Control. 1128-1132
VoIP, Multicast, and Load Balancing

Eduard Garcia Villegas
, Rafael Vidal, Josep Paradells Aspas
:
Cooperative load balancing in IEEE 802.11 networks with cell breathing. 1133-1140
Esa Piri, Jarno Pinola
, Frerk Fitzek, Kostas Pentikousis:
ROHC and aggregated VoIP over fixed WiMAX: An empirical evaluation. 1141-1146
Weizhan Zhang, Qinghua Zheng, Yang Li, Yi Che:
LDCOM: a Layered degree-constrained overlay multicast for interactive media. 1147-1152
Yun-Jung Cheng, Kuochen Wang, Rong-Hong Jan, Chien Chen, Chia-Yuan Huang:
Efficient failover and Load Balancing for dependable SIP proxy servers. 1153-1158
Hung-Yun Hsieh, Hsiao-Pu Lin, You-En Lin:
Enhancing campus VoIP service for ubiquitous communication on dual-mode mobile handsets. 1159-1165
Sensor Networks III

Kashif Ali, Hossam S. Hassanein
:
Underwater Wireless Hybrid Sensor Networks. 1166-1171
Hu Junping, Jin Yuhui, Dou Liang:
A Time-based Cluster-Head Selection Algorithm for LEACH. 1172-1176
Saleh Ibrahim
, Jun-Hong Cui, Reda A. Ammar:
Efficient surface gateway deployment for underwater sensor networks. 1177-1182
Azzedine Boukerche, Horacio A. B. F. de Oliveira, Eduardo Freire Nakamura
, Antonio Alfredo Ferreira Loureiro:
Enlightness: An enhanced and lightweight algorithm for time-space localization in Wireless Sensor Networks. 1183-1189
Clément Saad, Abderrahim Benslimane
, Jean-Claude König:
AT-Angle: A distributed method for localization using angles in sensor networks. 1190-1195

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






