default search action
2. NBiS 2008: Turin, Italy
- Makoto Takizawa, Leonard Barolli, Tomoya Enokido:
Network-Based Information Systems, 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings. Lecture Notes in Computer Science 5186, Springer 2008, ISBN 978-3-540-85692-4
Keynote Talk
- Arjan Durresi:
Patterns in Internet Architecture. 1
Wireless Networks
- Giuseppe De Marco:
GAMesh: Automatic Placement of Wireless Mesh Nodes Via Genetic Algorithms. 2-11 - Markus Aleksy, Thomas Butter, Martin Schader:
Context-Aware Loading for Mobile Applications. 12-20 - Othman A. Al-Amoudi, Mohamed S. El-Azhari, Michael E. Woodward, Irfan Awan:
Performance Analysis of Angle Routing in MANETs. 21-29 - Yoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba, Kazuo Takahata:
Dynamic Network Reconfiguration by Combination of Different Wireless LANs. 30-37
Heterogeneous Networks
- Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Making an Agreement in an Order-Heterogeneous Group. 38-48 - Leonard Barolli, Makoto Ikeda, Arjan Durresi, Fatos Xhafa, Akio Koyama:
Performance Evaluation of Two Search Space Reduction Methods for a Distributed Network Architecture. 49-59 - Nobuyoshi Sato, Shouichi Odashima, Jun Suzuki, Taiji Ishikawa, Yoshitoshi Murata:
Prototype of a Workers' Motion Trace System Using Terrestrial Magnetism and Acceleration Sensors. 60-70 - Christos P. Antonopoulos, Evangelos Topalis, Aggeliki S. Prayati, Spilios Giannoulis, Antonis Athanasopoulos, Stavros A. Koubias:
Framework Design Supporting QoS-Power Trade-Offs for Heterogeneous Networked Systems. 71-80
Ad-Hoc Networks
- Young-Duk Kim, Jin-Wook Kim, Won-Seok Kang, Dong-Ha Lee:
Route Cache Based Load Balancing Scheme for Mobile Ad-Hoc Networks. 81-90 - Zomahoun Jean-Eudes, Akio Koyama, Tomoyuki Tanno, Junpei Arai, Leonard Barolli:
Performance Evaluation of Load-Balancing Multi-path Routing Protocol for Mobile Ad-Hoc Networks. 91-100 - Consolee Mbarushimana, Alireza Shahrabi:
A TCP Enhancement for QoS-Aware Mobile Ad-Hoc Networks. 101-110 - Makoto Ikeda, Leonard Barolli, Giuseppe De Marco, Tao Yang, Arjan Durresi:
Experimental and Simulation Evaluation of OLSR Protocol for Mobile Ad-Hoc Networks. 111-121
P2P, Grid and Internet Computing
- Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa:
A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks. 122-131 - Kenichi Tanaka, Minoru Uehara, Hideki Mori:
Building a Linux Grid on a Virtual Machine Using a Windows Grid. 132-141 - Qinglin Guo:
The Similarity Computing of Documents Based on VSM. 142-148 - Erianto Chai, Minoru Uehara, Hideki Mori:
Case Study on the Recovery of a Virtual Large-Scale Disk. 149-158
Ad-Hoc and Sensor Networks
- Dimitrios Liarokapis, Ali Shahrabi, Colin Raeburn:
Constant-Width Zones Broadcast Algorithm in Mobile Ad-Hoc Networks. 159-168 - Marc Lihan, Takeshi Tsuchiya, Kei'ichi Koyanagi:
Orientation-Aware Indoor Localization Path Loss Prediction Model for Wireless Sensor Networks. 169-178 - Hanh Le, Doan B. Hoang, Ravi Poliah:
S-Web: An Efficient and Self-organizing Wireless Sensor Network Model. 179-188 - Haroon Malik, Elhadi M. Shakshuki, Tarek R. Sheltami:
Agent Based Analytical Model for Energy Consumption among Border Nodes in Wireless Sensor Networks. 189-201
Intelligent Algorithms and Systems
- John K. Debenham, Ante Prodan:
A Self-organising Network Based on Lightweight Agents. 202-211 - Leonard Barolli, Arjan Durresi, Fatos Xhafa, Akio Koyama:
A Fuzzy-Based Handover System for Wireless Cellular Networks: A Case Study for Handover Enforcement. 212-222 - Katsuyoshi Matsumoto, Minoru Uehara, Hideki Mori:
Fault Tolerance for Small-World Cellular Neural Networks. 223-231 - Toshihiko Yamakami:
A 4+1 Bit Month-Scale Regularity Mining Algorithm with One-Path and Distributed Server Constraints for Mobile Internet. 232-241
Secure Systems and Applications
- Tomoya Enokido, Makoto Takizawa:
Preventing Illegal Information Flow Based on Role-Based Access Control Model. 242-251 - Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai:
Authentication Binding between TLS and HTTP. 252-262 - Tetsuo Kamina, Noboru Koshizuka, Ken Sakamura:
Embedding Legacy Keyword Search into Queries for the Ubiquitous ID Database. 263-272 - Arjan Durresi, Mimoza Durresi, Leonard Barolli:
Secure Ubiquitous Health Monitoring System. 273-282
Network Tools and Architectures
- Sara Grilli, Andrea Villa, Christoforos D. Kavadias:
COMANCHE: An Architecture for Software Configuration Management in the Home Environment. 283-292 - Shingo Nomoto, Kensuke Fukuda, Minoru Uehara, Hideki Mori:
Graphic Drawing Tools for Network Traffic Simulation. 293-302 - Natalia Kryvinska, Lukas Auer, Christine Strauss, Peter Zinterhof:
A Methodology for the Enterprise Information and Communication Infrastructure Design Process. 303-312 - Yosuke Sato, Koji Hashimoto, Yoshitaka Shibata:
A New Networked Surveillance Video System by Combination of Omni-Directional and Network Controlled Cameras. 313-322
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.