


default search action
ICON 2011: Singapore
- Bharadwaj Veeravalli, Ian T. Foster:

Proceedings of the 17th IEEE International Conference on Networks, ICON 2011, Singapore, December 14-16, 2011. IEEE 2011, ISBN 978-1-4577-1824-3
Mobile, ad-hoc, mesh and sensor networks (1/3)
- Sanat Sarangi

, Subrat Kar:
Genetic algorithm based mobility aware clustering for energy efficient routing in wireless sensor networks. 1-6 - Linchao Zhang, Erwing Ricardo Sanchez, Maurizio Rebaudengo

:
Performance evaluation of reliable and unreliable opportunistic flooding in wireless sensor network. 7-12 - K. R. Shobha

, Karthik Shetty, K. Rajanikanth:
Efficient flooding using prefetching in on-demand routing protocols for mobile ad-hoc networks. 13-18 - Muhammad Usman, Anders Vastberg, Tomas Edler:

Energy efficient high capacity HETNET by offloading high QoS users through femto. 19-24
Robust and Scalable Multimedia Networking
- Ming Yang, Jianfei Cai

, Yonggang Wen, Chuan Heng Foh
:
Complexity-rate-distortion evaluation of video encoding for cloud media computing. 25-29 - Bin Zhang, Mathias Wien:

Towards robust video streaming for unicast and multicast: Modeling and implementation. 30-35 - Sajid Nazir, Vladimir Stankovic

, Dejan Vukobratovic
:
Scalable broadcasting of sliced H.264/AVC over DVB-H network. 36-40 - Yu Wang

, Xuan Jing, Jo Yew Tham, Kwong Huang Goh, Wei Siong Lee:
Error-resilient slice interleaving for robust video transmission over bursty loss channels. 41-46
Mobile, ad-hoc, mesh and sensor networks (2/3)
- Emir Husni

:
Delay Tolerant Network based internet services for remote areas using train systems. 47-52 - Jau-Wu Huang, Chia-Mao Hung, Kai-Chao Yang, Jia-Shung Wang:

Energy-efficient probabilistic target coverage in wireless sensor networks. 53-58 - Chen Wang, Zhiyun Lin

, Gangfeng Yan:
Multiple moving targets tracking from sensor scheduling perspective. 59-64 - Aaqib Patel

, S. N. Merchant, Uday B. Desai:
Post sensing optimal channel selection in cognitive radio networks. 65-70 - Mohammed Meftah Alrayes, Neeraj Tyagi, Rajeev Tripathi

, A. K. Misra:
Exploiting neighboring relationship for enhancement of AODV in hybrid wireless mesh network. 71-76 - Sook-Chin Yip

, Su-Wei Tan, Teong-Chee Chuah:
Capacity Based Data Rate-Aware Channel Assigment in multi-rate wireless mesh networks. 77-82
Multimedia networking, streaming and QoS
- Kashif Mahmood, Mikko Vehkaperä

, Yuming Jiang
:
Delay constrained throughput analysis of CDMA using stochastic network calculus. 83-88 - Víctor López, Jose Luis Anamuro, Victor Moreno

, Jorge E. López de Vergara
, Javier Aracil, C. Garcia, Juan P. Fernández Palacios, Mikel Izal
:
Implementation of multi-layer techniques using FEDERICA, PASITO and OneLab network infrastructures. 89-94 - Zhiqiang Shi, Dan Ionescu, Dongli Zhang:

Smoothing the XCP sender. 95-99 - Imad Al Ajarmeh, James Yu, Mohamed Amezziane

:
Modeling call arrivals on VoIP networks as linear Gaussian Process under heavy traffic condition. 100-105
Mobile, ad-hoc, mesh and sensor networks (3/3)
- Sijian Zhang, Zhiyun Lin

, Gangfeng Yan:
An autonomous maintenance algorithm for sensor networks subject to practical communication constraints. 106-111 - Karel Heurtefeux

, Florence Maraninchi, Fabrice Valois:
AreaCast: A cross-layer approach for a communication by area in Wireless Sensor Networks. 112-117 - Raida Al Alawi:

RSSI based location estimation in wireless sensors networks. 118-122 - Govind P. Gupta, Manoj Misra, Kumkum Garg:

Performance evaluation of agent and non-agent based data dissemination protocols for wireless sensor networks. 123-128
Cloud, grid and large-scale networking
- Menglan Hu, Bharadwaj Veeravalli:

Scheduling hybrid divisible and indivisible loads on clusters. 141-146 - Ganesh Neelakanta Iyer

, Bharadwaj Veeravalli:
On the resource allocation and pricing strategies in Compute Clouds using bargaining approaches. 147-152 - Anne-Cécile Orgerie

, Laurent Lefèvre:
Energy-efficient overlay for data transfers in private networks. 153-158
Distributed P2P and overlay networks
- Christian Hübsch, Oliver P. Waldhorst:

Flexible tree-based Application-Layer Multicast. 159-164 - Hassan Zeineddine

, Wael Bazzi
:
Rationing data updates with consistency considerations in distributed systems. 165-170 - Zubair A. Baig

, Suli C. Adeniye:
A trust-based mechanism for protecting IPv6 networks against stateless address auto-configuration attacks. 171-176 - Xinbo Jiang, Farzad Safaei

:
Churn performance study of structured peer-to-peer overlay in supporting massively multiplayer online role playing games (MMORPGs). 183-188
Optical networks
- T. Venkatesh, K. Phani Prakash:

A deadline-aware rate-adaptive packet pacing algorithm for small buffer networks. 189-194 - Ajmal Muhammad, Robert Forchheimer:

Reducing blocking probability in dynamic WDM networks by rerouting and set-up delay tolerance. 195-200 - Partha Goswami, Soumya K. Ghosh, Debasish Datta:

Dimesioning and resource provisioning for IP/MPLS-over-WDM network. 201-206 - E. S. Shivaleela, Shrikant S. Tangade

:
Comparison of performance of OCDMA networks with correlation and chiplevel receivers. 207-212 - Ajmal Muhammad, Robert Forchheimer, Lena Wosinska:

Impairment-aware dynamic provisioning in WDM networks with set-up delay tolerance and holding-time awareness. 213-218
Networked systems, applications and services (1/2)
- Ronit Nossenson, Ayal Lior, Kobi Brener:

Application classification in cellular backhaul networks. 219-224 - Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao:

Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis. 231-235 - Yifei Dong

, Salil S. Kanhere
, Chun Tung Chou
, Ren Ping Liu:
Automatic image capturing and processing for PetrolWatch. 236-240 - Rohollah Karimi, Mohammad Kalantari:

Enhancing security and confidentiality on mobile devices by location-based data encryption. 241-245
Network architecture, protocols and routing (1/2)
- M. S. Najeem, C. Siva Ram Murthy:

On enhancing the random linear network coding. 246-251 - Gang Wang, Wei Ding, Shi Dong

:
Classification of UDP traffic from P2P applications. 252-257 - Yi Wu

, Ge Nong:
A scalable routing architecture for prefix tries. 264-269 - Hui Tian, Yingpeng Sang, Hong Shen:

New methods for network traffic matrix estimation based on a probability model. 270-274
Networked systems, applications and services (2/2)
- Ruediger Gad, Martin Kappes, Robin Mueller-Bady, Ingo Ritter:

Network performance in virtualized environments. 275-280 - Ray Hunt, Jill Slay

:
A new approach to developing attack taxonomies for network security - including case studies. 281-286 - Surakarn Duangphasuk, Supakorn Kungpisdan, Sumeena Hankla:

Design and implementation of improved security protocols for DHCP using digital certificates. 287-292
Network architecture, protocols and routing (2/2)
- David Fatseas, Ron Addie

:
Layered design of mobile backhaul networks. 293-298 - Ahmad AlSa'deh

, Feng Cheng, Christoph Meinel:
CS-CGA: Compact and more Secure CGA. 299-304 - Christoph Werle, Sebastian Mies, Martina Zitterbart:

On benchmarking routing protocols. 305-310 - Mohd Zahid M. Soperi

, Mohamad Haider
, Kamalrulnizam Abu Bakar
:
Scheduling of OSPF routing table calculation using Generalized Regression Neural Network. 311-315 - Hiroki Date, Takashi Kurimoto, Akira Misawa:

An offload method for traffic distribution based on service identification. 316-321 - Marius Iulian Corici

, Jens Fiedler, Dragos Vingarzan, Thomas Magedanz:
Optimized low mobility support in massive mobile broadband Evolved Packet Core architecture. 322-327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














