IPCCC C

75 papers

YearTitle / Authors
20082008 IEEE International Performance, Computing and Communications Conference, IPCCC 2008, Austin, TX, USA, December 7-9, 2008
Ty Znati, Youtao Zhang
2008A Group-aware Service Discovery Scheme in Ubiquitous Environment using Service Assignment.
Hankyul You, Dohyun Kim, XuanTung Hoang, Younghee Lee
2008A High Scalability P2P Simulation Framework with Measured Realistic Network Layer Support.
Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang
2008A Highly Available Transparent Linux Cluster Security Model.
Visham Ramsurrun, K. M. Sunjiv Soyjaudah
2008A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems.
Muhammad Ikram, Aminul Haque Chowdhury, Hassen Redwan, Jong-bin Koh, Ki-Hyung Kim, Dong-Kyoo Kim
2008A Model to Use Denied Internet Traffic to Indirectly Discover Internal Network Security Problems.
Chet Langin, Hongbo Zhou, Shahram Rahimi
2008A Network Connection Proxy to Enable Hosts to Sleep and Save Energy.
Miguel Jimeno, Ken Christensen, Bruce Nordman
2008A New Trust Framework Based on Reputation for Unstructured P2P Networks.
Chunqi Tian, Shihong Zou, LingWei Chu, Shiduan Cheng
2008A Proxy Agent for Small Network-Enabled Devices.
Hong Qian, Karen Lu, Asad M. Ali
2008A Transient Overload Generator forWeb Servers.
Paulo R. Farah, Cristina D. Murta
2008Activity-based Security Scheme for Ubiquitous Environments.
Le Xuan Hung, Hassan Jameel, Riaz Ahmed Shaikh, Syed Muhammad Khaliq-ur-Rahman Raazi, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung
2008Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments.
Junghwan Choi, Donghyun Kang, Hyun-Su Jang, Young Ik Eom
2008An Adaptive Cache Management Using Dual LRU Stacks to Improve Buffer Cache Performance.
Shenggang Wan, Qiang Cao, Xubin He, Changsheng Xie, Chentao Wu
2008An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks.
Amar A. Rasheed, Rabi N. Mahapatra
2008An Evaluation of Java RMI/JavaSpaces and Ruby DRb/Rinda.
Abhishek Jaiantilal, Yifei Jiang, Shivakant Mishra
2008Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy.
João V. P. Gomes, Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro
2008Analysis on Probabilistic View Coverage for Image Sensing - A Geometric Approach.
Fulu Li, Ramesh Raskar, Andrew Lippman
2008Assessment Strategy with Markov Chain Utilized in Wireless Sensor Networks.
Lun Zhang, Dongxiu Ou
2008Asynchronous Detection and Avoidance (DAA) Protocol for Interference Mitigation in Dynamic Spectrum Access.
Yu-Sheng Wang, Chun-Ting Chou
2008Automatic Generation of User's Profiles for Location-Based Adaptation of Multimedia Documents.
Fayçal M'hamed Bouyakoub, Abdelkader Belkhir
2008Coding-Aware Multi-path Routing in Multi-Hop Wireless Networks.
Song Han, Zifei Zhong, Hongxing Li, Guihai Chen, Edward Chan, Aloysius K. Mok
2008Cooperative Monitoring for Internet Data Centers.
Kuai Xu, Feng Wang
2008Delay and Capacity Optimization in Multi-radio Multi-channel Wireless Mesh Networks.
Weihuang Fu, Yun Wang, Dharma P. Agrawal
2008Design and Evaluation of Localization Protocols and Algorithms in Wireless Sensor Networks Using UWB.
Di Wu, Lichun Bao, Min Du, Renfa Li
2008Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets.
Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh
2008Directional Double Metric Routing in Wireless Mesh Network.
Dapeng Wang, Shoubao Yang, Yun Hu, Peng Zhang
2008Discovering Resources in Tuple-Based Pervasive Systems using Resource-Aware Routing.
Saman Kolahdooz, Shahpour Rahmani, Mohsen Sharifi
2008Distributed Detection of Replica Cluster Attacks in Sensor Networks Using Sequential Analysis.
Jun-Won Ho
2008Distributed Energy-Efficient Scheduling for Data-Intensive Applications with Deadline Constraints on Data Grids.
Cong Liu, Xiao Qin, S. Kulkarni, Chengjun Wang, Shuang Li, Adam Manzanares, Sanjeev Baskiyar
2008Divisible Load Scheduling inWireless Sensor Networks with Information Utility.
Kijeung Choi, Thomas G. Robertazzi
2008Enhanced Scanning Scheme for Delay-Constrained Fast Handoff in IEEE 802.11 WLANs.
Yazan M. Allawi, Mingon Kim, Minho Kang
2008Exploring Load Balancing in Heterogeneous Networks by Rate Distribution.
Kuheli Louha, Jung Hyun Jun, Dharma P. Agrawal
2008Fairness Analysis in Competitive FIFO Buffer Management.
Fei Li
2008Fuzzy Evaluation for Wireless Sensor Networks Based on Rough Set Theory.
Lun Zhang, Yan Lu, Lan Chen
2008Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks.
Sameer Swami, Chittabrata Ghosh, Rucha P. Dhekne, Dharma P. Agrawal, Ken A. Berman
2008Increasing Lifetime of Wireless Sensor Networks Using Controllable Mobile Cluster Heads.
Torsha Banerjee, Dharma P. Agrawal
2008Joint Adaptive Redundancy and Partial Retransmission for Reliable Transmission in Wireless Sensor Networks.
Hao Wen, Chuang Lin, Fengyuan Ren, Hongkun Yang, Tao He, Eryk Dutkiewicz
2008KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks.
Ting Yuan, Shiyong Zhang, YiPing Zhong, Jianqing Ma
2008Laboratory Measurements and Verification of PSI/SI Transmission in DVB-H Systems.
Jani Väre, Jyrki Alamaunu, Harri Pekkonen
2008Location Authentication Methods for Wireless Network Access Control.
Lichun Bao
2008Masquerading a Wired Covert Channel into a Wireless-like Channel.
Mina Guirguis, Jason Valdez
2008Massively Parallel Network Coding on GPUs.
Xiaowen Chu, Kaiyong Zhao, Mea Wang
2008Minimizing Energy Consumption Using Cognitive Radio.
An He, Srikathyayani Srikanteswara, Jeffrey H. Reed, Xuetao Chen, William H. Tranter, Kyung Kyoon Bae, Masoud Sajadieh
2008Mitigating Evil Twin Attacks in 802.11.
Kevin S. Bauer, Harold Gonzales, Damon McCoy
2008Modeling and Performance Evaluation of Optical Burst Switched Ring Networks with Efficient Adaptive Routing.
Xingbo Gao, Mostafa A. Bassiouni
2008Neighborhood Route Diffusion for Packet Salvaging in Networks with High Mobility.
Muhannad Quwaider, Jayanthi Rao, Subir Biswas
2008Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems.
Sun-il Kim, Nnamdi Nwanze
2008On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks.
Reiner Dojen, Fan Zhang, Tom Coffey
2008Performance Models for the Instance Pooling Mechanism of the JBoss Application Server.
Fábio N. Souza, Roberto D. Arteiro, Nelson S. Rosa, Paulo Romero Martins Maciel
2008Practical Covert Channel Implementation through a Timed Mix-Firewall.
Richard E. Newman, Ira S. Moskowitz
2008Progressive Parity-Based Hardening of Data Stores.
Ahmed Amer, Jehan-François Pâris, Darrell D. E. Long, Thomas J. E. Schwarz
2008Proxy Aided Key Pre-distribution Schemes for Sensor Networks.
Mahalingam Ramkumar
2008QELAR: A Q-learning-based Energy-Efficient and Lifetime-Aware Routing Protocol for Underwater Sensor Networks.
Tiansi Hu, Yunsi Fei
2008QoS Behavior of Optical Burst Switching under Multimedia Traffic: an Analytical Approach.
Aresh Dadlani, Ahmad Khonsari, Mohammad R. Aghajani, Ali Rajabi
2008RFID Reader Anti-collision Algorithm Using a Server and Mobile Readers Based on Conflict-Free Multiple Access.
Jun-Bong Eom, Tae-Jin Lee
2008Simple and Effective Adaptive Routing Algorithms in Multi-Layer Wormhole Networks.
Kyung Min Su, Ki Hwan Yum
2008Spectral Sensing of Adaptive Frequency Hopping signal for Cognitive Radio.
Kapil Jaiswal
2008Spectrum Handoff for Cognitive Radio Networks: Reactive-Sensing or Proactive-Sensins?
Li-Chun Wang, Chung-Wei Wang
2008Stability Analysis for Communication of Voice and Data Terminals with Packet Reservation Multiple Access Protocol.
AmirAli Sharifi, Eyad H. Abed
2008Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks.
Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel
2008Support for Security and Privacy in SenSearch.
Jyh-How Huang, John Black, Shivakant Mishra
2008TIME: Time-based Index Management for Event Query Processing in Wireless Sensor Networks.
Guilin Li, Jianzhong Li, Yingshu Li
2008TSS: An Energy Efficient Communication Scheme for Low Power Wireless Networks.
Rabindranath Ghosh, Koushik Sinha, Debasish Datta, Bhabani P. Sinha
2008The Scalability of Secure Lock.
Cory J. Antosh, Barry E. Mullins
2008Theoretical and Experimental Evaluation of Communication-Induced Checkpointing Protocols in FE Family.
Yi Luo, D. Manivannan
2008Threshold Proxy Re-Signature.
Piyi Yang, Zhenfu Cao, Xiaolei Dong
2008Throughput Enhancement of Macro and Femto Networks By Frequency Reuse and Pilot Sensing.
Tae-Hwan Kim, Tae-Jin Lee
2008Towards Green Routers: Depth-Bounded Multi-Pipeline Architecture for Power-Efficient IP Lookup.
Weirong Jiang, Viktor K. Prasanna
2008Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary.
Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila
2008Towards a Queue Sensitilve Transport Protocol.
Ritesh Kumar, Jasleen Kaur
2008Traffic Differentiating Queue For Enhancing AODV Performance in Real-Time Interactive applications.
Allaa R. Hilal, Amal El-Nahas, Ahmed R. Bashandy, Samir I. Shaheen
2008Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks.
Teek Parval Sharma, Ramesh C. Joshi, Manoj Misra
2008UD-GEM: A Multi-Path Routing Algorithm for Wireless Sensor Networks.
Yuxing Huang, Qiang Ye, Yanxia Jia
2008Understanding Divide-Conquer-Scanning Worms.
Yubin Li, Zesheng Chen, Chao Chen
2008Universal Classifier Synchronizer Demodulator.
Qinqin Chen, Ying Wang, Charles W. Bostian