default search action
ICOIN 2016: Kota Kinabalu, Malaysia
- 2016 International Conference on Information Networking, ICOIN 2016, Kota Kinabalu, Malaysia, January 13-15, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-1724-9
- Emil Larsson, Johan Sigholm:
Papering over the cracks: The effects of introducing best practices on the web security ecosystem. 1-6 - Roan Simoes da Silva, Sérgio Donizetti Zorzo:
On the use of proxy re-encryption to control access to sensitive data on information centric networking. 7-12 - Long Nguyen-Vu, Jungsoo Park, Ngoc-Tu Chau, Souhwan Jung:
Signing key leak detection in Google Play Store. 13-16 - Bharat Buddhdev, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi:
Android component vulnerabities: Proof of concepts and mitigation. 17-22 - Shinichi Mori, Akira Sato, Kenichi Yoshida:
Enhancing performance of cardinality analysis by packet filtering. 23-28 - Tatsuya Morita, Takahiro Matsuda, Tetsuya Takine:
Spatially dependent loss tomography for multihop wireless networks. 29-34 - Hiroaki Minami, Yumi Takaki, Chikara Ohta, Hisashi Tamaki:
A study on penetration strategy of on-board unit taking account of the type of vehicles in V2V communications. 35-39 - Daniyal Munir, Syed Tariq Shah, Won-Jin Lee, Min Young Chung, Syed Faraz Hasan:
Selection of relay UE with energy harvesting capabilities in public safety environment. 40-44 - Hyo Hyun Choi, Areeya Rubenecia, Paul Vincent Contreras, Myungwhan Choi:
Collision avoidance scheme for micro UAVs delivering information. 45-50 - Irda Roslan, Takahiro Kawasaki, Toshiki Nishiue, Yumi Takaki, Chikara Ohta, Hisashi Tamaki:
Control of transmission power and carrier sense threshold to enhance throughput and fairness for dense WLANs. 51-56 - Junpei Kawamoto:
An implementation of privacy preserving stream integration system. 57-62 - Hyun Min Song, Ha Rang Kim, Huy Kang Kim:
Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network. 63-68 - Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura:
An incident response support system based on seriousness of infection. 69-74 - Shi Li, Inshil Doh, Kijoon Chae:
An anonymous IP-based privacy protection routing mechanism for CDNi. 75-80 - Ahmed Khalid, Hyeongtae Ahn, Cheeha Kim:
Reliable and Efficient Multi-rate Aware Reactive (REMAR) routing for IEEE 802.11 based MANET. 81-85 - Min Wei, Shuaidong Zhang, Keecheon Kim:
A security testing platform for Wireless Sensor Networks. 86-91 - Yang Song, Enqing Dong, Wei Liu, Xue Peng:
An iterative method of processing node flip ambiguity in wireless sensor networks node localization. 92-97 - Duc-Tai Le, Thang Le Duc, Taeho Kong, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:
Exploring energy-latency trade-off for broadcast in duty-cycled Wireless Sensor Networks. 98-101 - Kazuhiro Yamaguchi, Takaharu Nagahashi, Takuya Akiyama, Takahiro Yamaguchi, Hideaki Matsue:
A routing based on OLSR with traffic load balancing and QoS for Wi-Fi mesh network. 102-107 - Wei Liu, Enqing Dong, Yang Song:
A robust node localization method to address flip ambiguity in wireless networks. 108-113 - Kazuhiro Yamaguchi, Kazunari Mukaiyama, Takuya Akiyama, Tomohiro Kobayashi, Hideaki Matsue:
Performance analysis of routing methods based on OLSR and AODV with traffic load balancing and QoS for Wi-Fi mesh network. 114-119 - Juan Xu, Enqing Dong, Dejing Zhang, Wei Liu, Weichong Zhong:
Performance analysis of two high rate routing protocols for wireless sensor networks based on the Linux platform. 120-123 - Seonhyeok Kim, Jae Hyeok Son, Ashis Talukder, Choong Seon Hong:
Congestion prevention mechanism based on Q-leaning for efficient routing in SDN. 124-128 - Igor Carvalho, Airton Ishimori, Antônio Abelém:
A MultiCriteria Caching Decision for information centric networks. 129-134 - Sungyeon Kim, Jang-Won Lee:
Content allocation in information-centric networks. 135-140 - Kyi Thar, Saeed Ullah, Doo Ho Lee, Choong Seon Hong:
On adaptive pre-fetching and caching the contents in content centric networking. 141-146 - Dinh-Mao Bui, Thien Huynh-The, Sungyoung Lee, Yongik Yoon, Sungik Jun:
Energy savings in processor based on prediction technique. 147-150 - Anuradha Nanayakkara, Subramaniam Thayaparan:
Optimization of receiver FIFO for IEEE 802.3ba 40GBASE PCS Sub layer. 151-154 - Pengcheng Du, Jessie Hui Wang, Jiahai Yang, Jianfeng Wang, Youjian Zhao:
Analyzing intercontinental circuitousness to improve the interconnection and routing for ISPs. 155-160 - Yasser Mawad, Stefan Fischer:
Infrastructure-based delay tolerant network communication. 161-165 - Bo Hu, Lin Xing, Zeng Wang, Na Liu:
MLCS: A multi-level correlation scheduling algorithm for multipath transport. 166-171 - Nusrat Sharmin, HyungJune Lee:
Deadline-aware packet routing based on optimal charging schedule in electric vehicular networks. 172-177 - Kazuaki Ova, Toshinori Watanabe, Hisashi Koga:
Parametric spanning tree generation method for network topology design. 178-183 - Axel Hunger, Pascal A. Klein:
Equalizing latency peaks using a redundant multipath-TCP scheme. 184-189 - Jiwoo Park, Kwangsue Chung:
Client-side rate adaptation scheme for HTTP adaptive streaming based on playout buffer model. 190-194 - Masafumi Katoh, Izuru Sato, Naotoshi Watanabe:
Traffic engineering for IoT. 195-200 - Sangwook Kim, Dooyeol Yun, Kwangsue Chung:
Video quality adaptation scheme for improving QoE in HTTP adaptive streaming. 201-205 - Dooyeol Yun, Kwangsue Chung:
Dynamic segment duration control for live streaming over HTTP. 206-210 - Mi Young Jo, Keecheon Kim:
A research on the regional routing scheme based mobile agent for SDN. 211-213 - Cheng Suo, I-Chen Tsai, Charles H.-P. Wen:
ERIC: Economical & reconfigurable hybrid-band control for software-defined datacenter network. 214-219 - Jae Hyeok Son, DoHyeon Kim, Hyo Sung Kang, Choong Seon Hong:
Forwarding strategy on SDN-based content centric network for efficient content delivery. 220-225 - Hui-Tang Lin, Chia-Lin Lai, Yu-Ying Kao, Tzy Shiah Wang:
ONU-based Decentralized Dynamic Bandwidth Allocation (OD-DBA) scheme over WDM long-reach EPONs. 226-231 - Hui-Tang Lin, Chia-Lin Lai, Wen-Yi Chen, Tzy Shiah Wang:
TRINPON: A novel network architecture for supporting private networking capability over LR EPONs. 232-237 - Heihachiro Yamaguchi, Masayuki Ida:
SaaS virtualization method and its application. 238-243 - Sunwook Kim, JiHyeok Choi, Seongwoon Kim, HagYoung Kim:
Cloud-based virtual desktop service using lightweight network display protocol. 244-248 - Hassan Mahmood Khan, Gaik-Yee Chan, Fang-Fang Chua:
An adaptive monitoring framework for ensuring accountability and quality of services in cloud computing. 249-253 - P. Kiran, M. G. Jibukumar, C. V. Premkumar:
Resource allocation optimization in LTE-A/5G networks using big data analytics. 254-259 - Jun Suk Kim, Won-Jin Lee, Min Young Chung:
A multiple beam management scheme on 5G mobile communication systems for supporting high mobility. 260-264 - Jawaad Ullah Khan, Ho-Shin Cho:
A multihop data-gathering scheme using multiple AUVs in hierarchical underwater sensor networks. 265-267 - Liming Wang, Gang Lu:
The dynamic sub-topology load balancing algorithm for data center networks. 268-273 - Yeongjin Kim, Joohyun Lee, Jaeseong Jeong, Song Chong:
Multi-flow rate control in delayed Wi-Fi offloading systems. 274-279 - Jani Väre, Kari Virtanen, Kimmo Ylander:
Wireless offline offload. 280-284 - Md. Golam Rabiul Alam, Yan Kyaw Tun, Choong Seon Hong:
Multi-agent and reinforcement learning based code offloading in mobile fog. 285-290 - Hailong Lin, Lei Chen:
An optimized fingerprint positioning algorithm for underground garage environment. 291-296 - Kyu-Man Lee, Jaesung Lim, Sunju Choi:
A feasibility study of ARPS in UAT for positioning. 297-302 - Zhaoyu Zhang, Xin Di, Jun Tian, Pei Chen:
A WLAN planning method for indoor positioning system. 303-307 - Green Kim, Keecheon Kim:
A study on the adaptation of the firefly algorithm for the synchronization between multiple controllers in SDN environment. 308-311 - Soonhwa Sung, Cheong Youn, Eunbae Kong, Jaecheol Ryou:
A distributed mobile cloud computing model for secure big data. 312-316 - Tai-Yeon Ku, Hee-Sun Won, Hoon Choi:
Service recommendation system for big data analysis. 317-320 - Jung-Su Han, JongWon Kim:
Analytics-leveraged box visibility for resource-aware orchestration of SmartX multi-site cloud. 321-323 - Anupam Kumar Bairagi, Md. Golam Rabiul Alam, Ashis Talukder, Nguyen Hoang Tran, Daeun Lee, Choong Seon Hong:
An overlapping coalition formation approach to maximize payoffs in cloud computing environment. 324-329 - Chang-Kyu Lee, Wook Hyun, Shin-Gak Kang, Juyoung Park:
P2P network organization method for low signaling overhead and delay. 330-333 - Eunhye Ko, Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim:
SIP amplification attack analysis and detection in VoLTE service network. 334-336 - Hyunsik Yang, Younghan Kim:
SDN-based distributed mobility management. 337-342 - Shin-Young Ahn, Gyu-Il Cha, Young-Ho Kim, Eun-Ji Lim, Seung-Jo Bae, Won-Young Kim:
Design of distributed memory integration framework(DMIf). 343-347 - Jeongju Bae, JongWon Kim:
An experimental continuous delivery framework for SmartX-mini IoT-cloud playground. 348-350 - Sang-Il Kim, Hwa-Sung Kim:
Ontology-based open API composition method for automatic mash-up service generation. 351-356 - Taeyoung Kim, Hyeonwoo Kim, Dongwoo Kwon, Kisu Ok, Isaac Im, Eunggi Lee, Huigwang Je, Nematullo Rakhmatov, Donghyeok An, Hongtaek Ju:
Design of an effective framework for mash-up service development. 357-359 - Eungha Kim, ChangSup Keum:
A study on movable thing edge service platform. 360-362 - Jun-Hwan Huh, Dong-Hyun Kim, Jong-Deok Kim:
oneM2M: Extension of protocol binding: Reuse of binding protocol's legacy services. 363-365 - Minhae Kwon, Hyunggon Park:
The cluster formation strategies for approximate decoding in IoT networks. 366-368 - Muhammad Golam Kibria, Hwa-Suk Kim, Ilyoung Chong:
IoT learning model based on virtual object cognition. 369-371 - Sheik Mohammad Mostakim Fattah, Hwa-Suk Kim, Ilyoung Chong:
Design of composite virtual objects for service entity creation in WoO based IoT environment. 372-374 - Xin Di, Jun Tian, Jie Wu, Zhou Zhu:
Programmable multi-hop wireless networks towards IoT: Architecture and key techniques. 375-377 - Gunjae Yoon, Jungwoo Choi, Huihwan Park, Hoon Choi:
Topic naming service for DDS. 378-381 - Minho Jeong, Sang Hyun Ahn, Hayoung Oh:
A network coding aware routing with considering traffic load balancing for the multi-hop wireless networks. 382-384 - Chang Hyun Hong, Trang Nguyen, Se Bong Jang, Seong-Ho Jeong, Seung Hyong Rhee, Yeong Min Jang:
Channel modeling and system analysis for seaside image sensor communications. 385-389 - Doo Ho Lee, Kyi Thar, DoHyeon Kim, Choong Seon Hong:
Efficient parallel multi-path interest forwarding for mobile user in CCN. 390-394 - Taewon Song, Tae-Yoon Kim, Wonjung Kim, Sangheon Pack:
Channel bonding algorithm for densely deployed wireless LAN. 395-397 - Dong-Hyun Kim, Sheng Hao Sun, Jong-Deok Kim:
Design and implementation of access point for the Wi-Fi broadcasting system. 398-401 - Hyungkeun Lee, Hyukjoon Lee:
Modeling and anaysis of an energy-efficient MAC protocol for wireless sensor networks. 402-405 - Van Dung Nguyen, Oanh Tran Thi Kim, Nguyen Dang Tri, Choong Seon Hong:
Improving time slot acquisition through RSU's coordination for TDMA-based MAC protocol in VANETs. 406-411 - Sangjin Jeong, Yong-Woon Kim:
An energy efficiency evaluation scheme for manufacturing facility. 412-415 - Nguyen Trong Thuong, Hoac Thieu Phong, Dinh-Thuan Do, Phan Van Hieu, Dao Tang Loc:
Android application for WiFi based indoor position: System design and performance analysis. 416-419 - Seungbeom Song, Jaiyong Lee, Kyuho Son, Hangyong Jung, Jihoon Lee:
A congestion avoidance algorithm in SDN environment. 420-423 - Eun-Do Kim, Seungik Lee, Yunchul Choi, Myung-Ki Shin, Hyoung-Jun Kim:
Evaluations of a multiple flow tables construction scheme for service function chaining. 424-426 - Muhammad Usman, Aris Cahyadi Risdianto, JongWon Kim:
Resource monitoring and visualization for OF@TEIN SDN-enabled multi-site cloud. 427-429 - Kyusik Kim, Taeseok Kim:
A frame buffer caching for fast launch of browsers. 430-432 - Chang-Hun Kim, Sang-Min Jung, Sun-Young Jung, Soo-Min Kang, Sang-Kook Han:
Multi-band OFDMA based passive optical network with windowing technique for asynchronous multiple access. 433-435 - Young Jun Yoon, Jae Hwa Seo, Ra Hee Kwon, Young In Jang, In Man Kang:
InGaAs-based junctionless transistor with dual-spacer dielectric for low power loss and high frequency mobile network system. 436-438 - Hyukyeon Lee, Hyunsub Kim, Minjoon Kim, Jaeseok Kim:
A fast convergence LLL algorithm with fixed-complexity for SIC-based MIMO detection. 439-441 - Jae Hwa Seo, Young Jun Yoon, Ra Hee Kwon, Young In Jang, In Man Kang:
Design optimization of Si/Ge-based heterojunction arch-shaped gate-all-around (GAA) tunneling field-effect transistor (TFET) which applicable for future mobile communication systems. 442-444 - Jinsook Bong, Yuhwa Suh, Yongtae Shin:
Fast user authentication method considering mobility in multi clouds. 445-448 - Saad Alsunbul, Phu Dung Le, Jefferson Tan, Bala Srinivasan:
A network defense system for detecting and preventing potential hacking attempts. 449-454 - Mijoo Kim, Tae-Jin Lee, Youngsang Shin, Heung Youl Youm:
A study on behavior-based mobile malware analysis system against evasion techniques. 455-457 - Sung Soo Kim, Daeun Lee, Choong Seon Hong:
Vulnerability detection mechanism based on open API for multi-user's convenience. 458-462 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Securing information flow in content delivery networks with visual and quantum cryptography. 463-468 - Ji-Yong Kim, Ok-Gee Min:
Collaborative local triangles counting in a graph stream by using node resources. 469-471 - Svetlana Kim, Yong-Ik Yoon:
Semantic relationship of contents using tensor factorization for self-growth social broadcasting. 472-475 - Gyuhong Choi, Do-hyung Kim, Ikjun Yeom:
Efficient streaming over CoAP. 476-478 - Nam Tuan Le, Thithanhnhan Le, Yeong Min Jang:
Optical camera communications based invisible watermarking technique. 479-481
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.