default search action
26th AINA 2012: Fukuoka, Japan
- Leonard Barolli, Tomoya Enokido, Fatos Xhafa, Makoto Takizawa:
IEEE 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0714-7
Keynotes
- Shoichi Noguchi:
The Design Principle of the Robust Communication System under the Great Disaster Environment. 1-4 - David Taniar:
High Performance Database Processing. 5-6 - Fatos Xhafa:
Data Replication and Synchronization in P2P Collaborative Systems. 7
Internet Computing and Web Applications
- Yi Chen, Ajit Narayanan, Shaoning Pang, Ban Tao:
Malicioius Software Detection Using Multiple Sequence Alignment and Data Mining. 8-14 - Sijin He, Li Guo, Yike Guo, Chao Wu, Moustafa Ghanem, Rui Han:
Elastic Application Container: A Lightweight Approach for Cloud Resource Provisioning. 15-22 - Shin Tezuka, Ryuya Uda, Ken-ichi Okada:
ADEC: Assured Deletion and Verifiable Version Control for Cloud Storage. 23-30 - Sachiko Nakagawa, Naoto Ohyama, Kazuaki Sakaguchi, Hisashi Nakayama, Noboru Igarashi, Ryota Tsunoda, Shogo Shimizu, Masahiko Narita, Yuka Kato:
A Distributed Service Framework for Integrating Robots with Internet Services. 31-37
Wireless Mesh Networks
- Sanjay Kumar Dhurandher, Isaac Woungang, Kirti Kumar, Mamta Joshi, Monika Verma:
A Rate Adaptive Admission Control Protocol for Multimedia Wireless Mesh Networks. 38-43 - Byoungheon Shin, Seon-Yeong Han, Dongman Lee:
Dynamic Link Quality Aware Routing Protocol for Multi-radio Wireless Mesh Networks. 44-50 - Chien-Yu Wu, Hann-Jang Ho, Sing-Ling Lee, Shu-Jye Chang:
Energy-Aware Link Scheduling Algorithms to Maximize Life Cycle of Relay Nodes on IEEE 802.16e Mesh Networks. 51-58 - Jie Zhou, Jiannong Cao, Jun Zhang, Chisheng Zhang, Yao Yu:
Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed. 59-66
Dependable and Fault Tolerant Systems
- Minoru Uehara:
Design and Implementation of Mesh RAID with Multiple Parities in Virtual Large-Scale Disks. 67-72 - Darko Petrovic, André Schiper:
Implementing Virtual Machine Replication: A Case Study Using Xen and KVM. 73-80 - Hanane Abdeldjelil, Noura Faci, Zakaria Maamar, Djamal Benslimane:
A Diversity-Based Approach for Managing Faults in Web Services. 81-88 - Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori:
A Large Scale Robust Disaster Information System Based on Never Die Network. 89-96
Vehicular Networks and Applications
- Chung-Ming Huang, Tzu-Hua Lin, Cheng-Hsiu Chang:
The Proactive Member-Centric Routing Protocol Using the Several Strategy (PMCS) for the Fleet Scenario in the Hybrid VANET. 97-104 - Naruhiro Kusumine, Susumu Ishihara:
Abiding Regional Data Distribution Using Relay and Random Network Coding on VANETs. 105-112 - Jason Barnes, Vamsi Paruchuri:
Optimal Phase Ordering of Traffic Signals to Reduce Stopped Delay. 113-119
Energy-Efficient Wireless Networks
- Stefan Föll, Klaus Herrmann, Kurt Rothermel:
Energy-Efficient Update Protocols for Mobile User Context. 120-127 - Yuan-Po Chi, Hsung-Pin Chang:
TARS: An Energy-Efficient Routing Scheme for Wireless Sensor Networks with Mobile Sinks and Targets. 128-135 - Patrick Baier, Frank Dürr, Kurt Rothermel:
PSense: Reducing Energy Consumption in Public Sensing Systems. 136-143 - Subhasis Dash, Amulya Ratna Swain, Anuja Ajay:
Reliable Energy Aware Multi-token Based MAC Protocol for WSN. 144-151
Intelligent Systems and Applications
- Khamisi Kalegele, Hideyuki Takahashi, Johan Sveholm, Kazuto Sasai, Gen Kitagata, Tetsuo Kinoshita:
On-demand Data Numerosity Reduction for Learning Artifacts. 152-159 - Sheng-Tzong Cheng, Ju-Hsien Chou:
Fuzzy-Based Actuators Controlling for Minimizing Power Consumption in Cyber-physical System. 160-166 - Hongzhi Liu, Zhonghai Wu, D. Frank Hsu:
Combination of Multiple Retrieval Systems Using Rank-Score Function and Cognitive Diversity. 167-174
Distributed Database and Data Mining
- Hisashi Koga, Masayuki Oguri, Toshinori Watanabe:
MIXED-LSH: Reduction of Remote Accesses in Distributed Locality-Sensitive Hashing Based on L1-distance. 175-182 - Viet Phan-Luong:
Auto Determining Parameters in Class-Association Mining. 183-190 - Qian Wu, Feilong Tang, Li Li, Leonard Barolli, Ilsun You, Yi Luo, Huakang Li:
Recommendation of More Interests Based on Collaborative Filtering. 191-198 - Jason Thompson, J. Wenny Rahayu, Torab Torabi:
An Interactive Region-Based Filter for Moving Objects Datasets: Making Sense of Chaos. 199-206
Communication Protocols
- Yuan-Cheng Lai, Yen-Hung Chen, Ching-Neng Lai:
A Channel Quality Aware Algorithm for IEEE 802.16 Uplink Burst Construction. 207-214 - Satoshi Utsumi, Salahuddin Muhammad Salim Zabir:
Utilization-based Congestion Control: Improvement of Friendliness with TCP over Wireless Links. 215-220 - Yan-Jing Wu, Tsang-Ling Sheu, I-Chieh Lin:
A Bandwidth Negotiation Scheduling for Prioritized Traffic in MMR Networks. 221-228 - Prasanthi Sreekumari, Sang-Hwa Chung, Yong-Hyun Jo:
A New Loss Recovery Algorithm for Increasing the Performance of TCP Over Wireless Mesh Networks. 229-236
Pervasive/Ubiquitous Computing and Services
- Quang Tran Minh, Muhammad Ariff Baharudin, Eiji Kamioka:
Uncertain Low Penetration Rate - A Practical Issue in Mobile Intelligent Transportation Systems. 237-244 - Daijiro Komaki, Takahiro Hara, Shojiro Nishio:
How Does Mobile Context Affect People's Web Search Behavior?: A Diary Study of Mobile Information Needs and Search Behaviors. 245-252 - Jiantao Wang, Kam-yiu Lam, Song Han, Sang Hyuk Son, Aloysius K. Mok:
On Co-scheduling of Periodic Update and Application Transactions with Fixed Priority Assignment for Real-Time Monitoring. 253-260 - Quan Jia Cheng, Joseph Kee-Yin Ng, Kevin Chin Yiu Shum:
A Wireless LAN Location Estimation System Using Center of Gravity as an Algorithm Selector for Enhancing Location Estimation. 261-268
Intelligent Computing and Networks
- Li-Yeh Chuang, Cheng-Yi Chiang, Cheng-Hong Yang:
A Quantum Genetic Algorithm for Operon Prediction. 269-275 - Yeim-Kuan Chang, Chao-Yen Chien:
Layer Partitioned Search Tree for Packet Classification. 276-282 - Li-Yeh Chuang, Li-Wei Huang, Cheng-Hong Yang:
Chaos Embedded Particle Swarm Optimization for Tag Single Nucleotide Polymorphism Selection. 283-288 - Daniel L. Kovacs, Wuyungerile Li, Naoki Fukuta, Takashi Watanabe:
Mixed Observability Markov Decision Processes for Overall Network Performance Optimization in Wireless Sensor Networks. 289-298
Communication Systems
- Fatos Xhafa, Junzi Sun, Admir Barolli, Makoto Takizawa, Kazunori Uchida:
Evaluation of Genetic Algorithms for Single Ground Station Scheduling Problem. 299-306 - Yuncheng Zhu, Akihiro Nakao:
Upload Cache in Edge Networks. 307-313 - Ming-Feng Chang, Chi-Hua Chen:
Temporary Call-Back Telephone Number Service. 314-318 - Raymond Peterkin, Dan Ionescu:
An Architecture for Heterogeneous Data Dissemination Using IMS. 319-325
Distributed Systems and Networking
- Damien Imbs, Michel Raynal:
Trying to Unify the LL/SC Synchronization Primitive and the Notion of a Timed Register. 326-330 - Konstantin Mikhaylov, Jouni Tervonen:
Experimental Evaluation of Alkaline Batteries's Capacity for Low Power Consuming Applications. 331-337 - Markus Aleksy, Axel Korthaus:
Time-Dependent Execution Pattern. 338-343 - Hiroshi Umeo:
Realizing Global Synchronizations for Locally-Connected Two-Dimensional Rectangle Cellular Arrays. 344-351
Semantics Computing and Networks
- Mohamed Amin Sakka, Bruno Defude, Jorge Tellez:
A Semantic Framework for the Management of Enriched Provenance Logs. 352-359 - Julian Schütte:
Goal-Based Policies for Self-Protecting Systems. 360-367 - Annie Ibrahim Rana, Brendan Jennings:
Semantic Uplift of Monitoring Data to Select Policies to Manage Home Area Networks. 368-375 - Vivek Natarajan, Sencun Zhu, Mudhakar Srivatsa, Jeff Opper:
Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks. 376-383
Ad Hoc Networks and Routing
- Elis Kulla, Makoto Ikeda, Tetsuya Oda, Leonard Barolli, Fatos Xhafa, Aleksander Biberaj:
Evaluation of a MANET Testbed in Outdoor Bridge Environment Using BATMAN Routing Protocol. 384-390 - Po-Jen Chuang, Po-Hsun Yen, Ting-Yi Chu:
Efficient Route Discovery and Repair in Mobile Ad-hoc Networks. 391-398 - Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs. 399-405 - Deepali Arora, Eamon Millman, Stephen W. Neville:
Assessing the Expected Performance of the OLSR Routing Protocol for Denser Urban Core Ad Hoc Network Deployments. 406-414
P2P Networks and Applications
- Khalid Ashraf, Rachid Anane, Behzad Bordbar:
File Management in a Mobile DHT-based P2P Environment. 415-422 - Kazuma Kadowaki, Satoshi Fujita:
Collaborative Admission Control Scheme for Group-Based P2P Contents Sharing Systems. 423-430 - S. M. Saif Shams, Paal E. Engelstad, Amund Kvalbein:
On Randomness in ISP-friendly P2P Applications. 431-437 - Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens, Xavier Bonnaire:
Optimized Range Queries for Large Scale Networks. 438-445
Wireless Sensor Networks and Applications
- Sunil Kumar Vuppala, Animikh Ghosh, Ketan A. Patil, Kumar Padmanabh:
A Scalable WSN Based Data Center Monitoring Solution with Probabilistic Event Prediction. 446-453 - Tetsuya Oda, Admir Barolli, Evjola Spaho, Fatos Xhafa, Leonard Barolli, Makoto Takizawa, Kazunori Uchida:
Effect of Population Size for Node Placement in WMNs Considering Giant Component and Number of Covered Users Parameters. 454-459 - Ikjune Yoon, Dong Kun Noh, Dongeun Lee, Rony Teguh, Toshihisa Honma, Heonshik Shin:
Reliable Wildfire Monitoring with Sparsely Deployed Wireless Sensor Networks. 460-466
Mobile Networks and Applications
- Muhammad Qasim Khan, Steinar Hidle Andresen:
Zero Scanning Time for 802.11 Networks by Using Media Independent Information Server (MIIS). 467-473 - Liang Zhou, Xiaohui Li, Yongqiang Hei, Weiyi Yin:
Channel Orthogonalization (CO) and its Combination with THP (CO-THP) for Multiuser MIMO Systems. 474-478 - Sheetal Jadhav, Haibo Zhang, Zhiyi Huang:
MOS-based Handover Protocol for Next Generation Wireless Networks. 479-486 - Muhammad Ariff Baharudin, Quang Tran Minh, Eiji Kamioka:
Evaluations of Ant Colony Optimization Inspired SCTP Optimal Path Selection Using E-model. 487-494
Trust and Security
- Dong Hao, Kouichi Sakurai:
A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks. 495-502 - Nitin Chiluka, Nazareno Andrade, Dimitra Gkorou, Johan A. Pouwelse:
Personalizing EigenTrust in the Face of Communities and Centrality Attack. 503-510 - Sadegh Dorri Nogoorani, Rasool Jalili:
Uncertainty in Probabilistic Trust Models. 511-517 - Sazia Parvin, Farookh Khadeer Hussain:
Trust-Based Security for Community-Based Cognitive Radio Networks. 518-525
Cloud Computing and Systems
- Ding-Jie Huang, Kai-Ting Yang, Chien-Chun Ni, Wei-Chung Teng, Tien-Ruey Hsiang, Yuh-Jye Lee:
Clock Skew Based Client Device Identification in Cloud Environments. 526-533 - Lingfang Zeng, Bharadwaj Veeravalli, Xiaorong Li:
ScaleStar: Budget Conscious Scheduling Precedence-Constrained Many-task Workflow Applications in Cloud. 534-541 - William Voorsluys, Rajkumar Buyya:
Reliable Provisioning of Spot Instances for Compute-intensive Applications. 542-549 - Ricky K. K. Ma, Cho-Li Wang:
Lightweight Application-Level Task Migration for Mobile Cloud Computing. 550-557
Communication Networks and Routing
- Xiangyang Jin, Thomas Kunz, Ivan Stojmenovic:
Multi-retransmission Route Discovery Schemes for Ad Hoc Wireless Networks with a Realistic Physical Layer. 558-565 - Ching-Fang Hsu, Tzu-Huan Tang:
On Multicast Routing with Traffic Grooming in Light-Trail Networks. 566-572 - Muhammad Siraj Rathore, Markus Hidell, Peter Sjödin:
PC-based Router Virtualization with Hardware Support. 573-580 - Donghong Qin, Jiahai Yang, Zhuolin Liu, Jessie Hui Wang, Bin Zhang, Wei Zhang:
AMIR: Another Multipath Interdomain Routing. 581-588
QoS and Service Oriented Architecture
- Miroslav Zivkovic, Joost W. Bosman, Hans van den Berg, Rob van der Mei, Hendrik B. Meeuwissen, Rudesindo Núñez-Queija:
Run-time Revenue Maximization for Composite Web Services with Response Time Commitments. 589-596 - Tadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Completable Quorums of Multimedia Objects. 597-604 - Quang Hieu Vu, Tran Vu Pham, Hong Linh Truong, Schahram Dustdar, Rasool Asal:
DEMODS: A Description Model for Data-as-a-Service. 605-612 - Simone A. Ludwig:
Applying Particle Swarm Optimization to Quality-of-Service-Driven Web Service Composition. 613-620
Mobile and Ad Hoc Networks
- Makoto Ikeda, Elis Kulla, Masahiro Hiyama, Leonard Barolli, Makoto Takizawa:
Impact of Multi-flow Traffic in Wireless Mobile Ad-hoc Networks. 621-628 - Evjola Spaho, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Aleksander Biberaj, Jiro Iwashige:
Performance Comparison of DSDV and DYMO Protocols for Vehicular Ad Hoc Networks. 629-634 - Shyr-Kuen Chen, Pi-Chung Wang:
Shortcut Anycast Tree Routing in MANETs. 635-640 - Dang-Quang Bui, Won-Joo Hwang:
Proportionally Quasi-fair Scheduling Optimization in Wireless Ad Hoc Networks. 641-648
Multimedia and Social Networking
- Joseph C. Tsai, Timothy K. Shih, Kanoksak Wattanachote, Kuan-Ching Li:
Video Editing Using Motion Inpainting. 649-654 - Leila Weitzel, Paulo Quaresma, José Palazzo M. de Oliveira:
Evaluating Quality of Health Information Sources. 655-662 - Makoto Kikkawa, Ginga Kamei, Ken-ichi Okada:
Instruction for Remote MR Cooperative Work with Captured Still Worker's View Video. 663-670 - Hiroaki Nishino, Yuki Fukakusa, Akari Hatano, Tsuneo Kagawa, Kouichi Utsumiya:
A Tangible Information Explorer Using Vibratory Touch Screen. 671-677
Authentication and Secure Systems
- Toan-Thinh Truong, Minh Tran, Anh Duc Duong:
Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme. 678-685 - Danilo Valeros Bernardo, Doan B. Hoang:
Compositional Logic for Proof of Correctness of Proposed UDT Security Mechanisms. 686-694 - Amlan Jyoti Choudhury, Hyotaek Lim, Hoon-Jae Lee:
An Efficient FPGA Design of PingPong-128 Stream Cipher for Secure Computing. 695-700 - Po-Jen Chuang, Yi-Ping Liao:
Efficient and Secure Cross-Realm Client-to-Client Password-Authenticated Key Exchange. 701-708
Wireless Sensor Networks
- Tao Yang, Tetsuya Oda, Leonard Barolli, Jiro Iwashige, Arjan Durresi, Fatos Xhafa:
Investigation of Packet Loss in Mobile WSNs for AODV Protocol and Different Radio Models. 709-715 - Junichi Honda, Kazunori Uchida:
Analysis of Field Intensity Distribution in Inhomogeneous Propagation Environment. 716-723 - Tianzhen Cheng, Ping Li, Sencun Zhu:
An Algorithm for Jammer Localization in Wireless Sensor Networks. 724-731 - Karel Heurtefeux, Fabrice Valois:
Is RSSI a Good Choice for Localization in Wireless Sensor Network? 732-739
Cryptographic Techniques and Systems
- Hsiao-Ying Lin, Shiuan-Tzuo Shen, Wen-Guey Tzeng, Bao-Shuh Paul Lin:
Toward Data Confidentiality via Integrating Hybrid Encryption Schemes and Hadoop Distributed File System. 740-747 - Shang-Ming Jen, Tse-Lin Lai, Chia-Yu Lu, Jar-Ferr Yang:
Knapsack Cryptosystems and Unreliable Reliance on Density. 748-754 - Munetoshi Iwakiri, Ta Minh Thanh:
Fundamental Incomplete Cryptography Method to Digital Rights Management Based on JPEG Lossy Compression. 755-762 - Munetoshi Iwakiri, Ta Minh Thanh:
Incomplete Cryptography Method Using Invariant Huffman Code Length to Digital Rights Management. 763-770
P2P and Scalable Systems
- Jun'ichi Shimada, Kei Ohnishi, Hitomi Tamura, Yuji Oie:
Inducing Scale-Free Characteristics of Dynamic Unstructured P2P Networks. 771-778 - Davi da Silva Böger, Joni da Silva Fraga, Eduardo Adílio Pelinson Alchieri, Michelle S. Wangham:
Intrusion-Tolerant Shared Memory through a P2P Overlay Segmentation. 779-786 - Yusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa, J. Wenny Rahayu, Yi-Ping Phoebe Chen:
A Scheduling Method for Node Relay-based Webcast Considering Reconnection. 787-794 - Hoai Son Nguyen, Yasuo Tan, Yoichi Shinoda:
Building Distributed Attribute-Value Trees on DHT-based Networks. 795-802
Wireless Sensor Networks and Systems
- Jeongcheol Lee, Hosung Park, Seungmin Oh, Yongbin Yim, Sang-Ha Kim:
A Radio-disjoint Geographic Multipath Routing in Wireless Sensor Networks. 803-809 - Haosong Gou, Younghwan Yoo:
A Low Cost Reliable Data Transmission Protocol over Multipath in Wireless Sensor Networks. 810-816 - Seungmin Oh, Yongbin Yim, Jeongcheol Lee, Hosung Park, Sang-Ha Kim:
A Reliable Communication Strategy for Real-Time Data Dissemination in Wireless Sensor Networks. 817-823 - Chih-Yung Cheng, Chi-Cheng Chuang, Ray-I Chang:
Three-Dimensional Location-Based IPv6 Addressing for Wireless Sensor Networks in Smart Grid. 824-831
Communication Systems and Networks
- Ilpo Järvinen, Aaron Yi Ding, Aki Nyrhinen, Markku Kojo:
Harsh RED: Improving RED for Limited Aggregate Traffic. 832-840 - Jiseon Lee, Hyeonmok Ko, Cheeha Kim:
Distributed Reservation-Based MAC Protocol for UWB WiMedia MAC. 841-845 - Lei Jing, Zixue Cheng, Yinghui Zhou:
Delay Guaranteed Media Access Control for Wireless Home Automation Networks. 846-853
Scalable and Secure Computing
- Mohsen Amini Salehi, Bahman Javadi, Rajkumar Buyya:
Preemption-aware Admission Control in a Virtualized Grid Federation. 854-861 - Yingjie Sheng, Yongzhong Zhang, Jianhua Yang:
Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion. 862-867 - Apichat Taweesiriwate, Bundit Manaskasemsak, Arnon Rungsawang:
Web Spam Detection Using Link-Based Ant Colony Optimization. 868-873 - Stelios Sotiriadis, Nik Bessis, Fatos Xhafa, Nick Antonopoulos:
From Meta-computing to Interoperable Infrastructures: A Review of Meta-schedulers for HPC, Grid and Cloud. 874-883
Wireless Networks
- Masahiro Hiyama, Elis Kulla, Tetsuya Oda, Makoto Ikeda, Leonard Barolli:
Experimental Results of a MANET Testbed in a Mixed Environment Considering Horizontal and Vertical Topologies. 884-889 - Ngoc-Thai Pham, Won-Joo Hwang, Nak Woon Sung:
Scheduling and Flow Control for Delay Guarantees in Multi-hop Wireless Networks. 890-897 - Thong Huynh, Ngoc-Thai Pham, Won-Joo Hwang, Fabrice Theoleyre:
Stochastic Optimization for Minimum Outage in Cooperative Ad-hoc Network. 898-905 - Hiroyuki Suzuki, Akio Koyama:
Implementation and Evaluation of a Real Object-Oriented Communication Method for Ad-hoc Networks. 906-911
Energy-Efficient and Green Computing
- Tomoya Enokido, Makoto Takizawa:
An Extended Power Consumption Model for Distributed Applications. 912-919 - Takuro Inoue, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Algorithms for Selecting Energy-Efficient Storage Servers in Storage and Computation Oriented Applications. 920-927 - Wei Meng, Yi Wang, Chengchen Hu, Keqiang He, Jun Li, Bin Liu:
Greening the Internet Using Multi-frequency Scaling Scheme. 928-935
Dependable Systems and Autonomic Computing
- Nils Müllner, Oliver E. Theel, Martin Fränzle:
Combining Decomposition and Reduction for State Space Analysis of a Self-Stabilizing System. 936-943 - Fan-Hsun Tseng, Chi-Yuan Chen, Li-Der Chou, Tin Yu Wu, Han-Chieh Chao:
A Study on Coverage Problem of Network Planning in LTE-Advanced Relay Networks. 944-950 - Hisashi Iwamoto, Yuji Yano, Yasuto Kuroda, Koji Yamamoto, Shingo Ata, Kazunari Inoue:
Deterministic High Density Packet-Buffer System for Low Cost Network Systems. 951-956
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.