default search action
28th ICDCS 2008: Beijing, China - Workshops
- 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China. IEEE Computer Society 2008, ISBN 978-0-7695-3173-1
The 10th International Workshop on Multimedia Network Systems and Applications - MNSA 2008
P2P and Overlay Networks
- Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
A Protocol for Making an Agreement in a Peer-to-Peer (P2P) Society. 1-6 - Bin Chang, Liang Dai, Yi Cui, Yuan Xue:
On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis. 7-11 - Yishuai Chen, Changjia Chen, Chunxi Li:
A Measurement Study of Cache Rejection in P2P Live Streaming System. 12-17 - Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa:
A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks. 18-23
Distributed Systems
- Tomoya Enokido, Makoto Takizawa:
Role Based Access Control in Distributed Object Systems. 24-29 - Minoru Uehara:
Security Framework in a Virtual Large-Scale Disk System. 30-35 - Hui-Huang Hsu, Yao-Bao Yen, Chu-Song Chen, Chun-Ta Ho:
Pose Estimation for Evaluating Standing Long Jumps via Dynamic Bayesian Networks. 36-41 - Markus Dunte, Christoph Ruland:
Delivery Infrastructure for Secure Scalable Coded Multimedia. 42-47
Wireless Networks
- Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli:
Adaptive Layered Multimedia Transmissions over Wireless Networks. 48-53 - Jaehyuk Ryu, Koji Okamura:
Experimental Evaluation of Usage Pattern in Campus Mobile IP Network. 54-59 - Cheng-Yueh Liu, Yaw-Chung Chen:
An Adaptive Bandwidth Request Scheme for QoS Support in WiMAX Polling Services. 60-65 - Tao Yang, Makoto Ikeda, Giuseppe De Marco, Leonard Barolli, Arjan Durresi, Fatos Xhafa:
Routing Efficiency of AODV and DSR Protocols in Ad-Hoc Sensor Networks. 66-71
Multimedia Systems
- Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:
Collaborative and Multimodal Communications System Using Immersive Virtual Reality Environment over Ultrahigh-Speed Network. 72-77 - Takayuki Kuroda, Akira Sakatoku, Gen Kitagata, Debasish Chakraborty, Norio Shiratori:
Open 3D Shared Space Construction Scheme for Symbiotic Collaborative Works. 78-83 - Jan Sablatnig, Jiehua Chen, Ruedi Seiler, Sven Grottke, Andreas Köpke, Adam Wolisz:
Adam A Testbed for Distributed Virtual Environments. 84-89 - Yong Liu, Otto J. Anshus, Phuong Hoai Ha, Tore Larsen, John Markus Bjørndalen:
MultiStream A Cross-Platform Display Sharing System Using Multiple Video Streams. 90-95
The Second International Workshop on Wireless Mesh and Ad Hoc Networks - WiMAN 2008
Routing, Scheduling, and Channel Assignment
- Jianjun Yang, Zongming Fei:
Bipartite Graph Based Dynamic Spectrum Allocation for Wireless Mesh Networks. 96-101 - Virginia Corvino, Velio Tralli, Roberto Verdone:
Cross-Layer Scheduling for Multiple Video Streams over a Hierarchical Emergency-Deployed Network. 102-107 - Hejiao Huang, Yun Peng, Jing Li:
Joint Routing and Channel Assignment in WMN Using Extended Petri Net. 108-113 - Adel Ali Ahmed, Liza Abdul Latiff, Mohd Adib Sarijari, Norsheila Fisal:
Real-Time Routing in Wireless Sensor Networks. 114-119
MAC Protocols
- Ravi Nelavelli, Rajesh Prasad, Hongyi Wu:
Fast Link Assessment in Wireless Mesh Networks by Using Non-Constant Weight Code. 120-125 - Manzur Ashraf, Aruna Jayasuriya, Sylvie Perreau:
On Load Regulated CSMA. 126-131 - Nyein Aye Maung Maung, Taku Noguchi, Makoto Kawai:
Maximizing Aggregate Throughput of Wireless Ad Hoc Networks Using Enhanced Physical Carrier Sensing. 132-137
Sensor Networks and Multi-Hop Communications
- Oh-Heum Kwon, Ha-Joo Song:
Flip Error Resistant Stitching in Sensor Network Localizations. 138-143 - Chongming Zhang, Xi Zhou, Chuanshan Gao, Chunmei Wang:
On Improving the Precision of Localization with Gross Error Removal. 144-149 - Frank Reichenbach, Jan Blumenthal, Dirk Timmermann:
Comparing the Efficiency of Localization Algorithms with the Power-Error-Product (PEP). 150-155 - Rajesh Prasad, Hongyi Wu, Dmitri D. Perkins, Nian-Feng Tzeng:
Local Topology Assisted XOR Coding in Wireless Mesh Networks. 156-161
Modeling and Performance Evaluations
- Zhen Kong, Yu-Kwong Kwok, Jiangzhou Wang:
Game Theoretic Packet Scheduling to Combat Non-Cooperativeness in Wireless Mesh Networks. 162-167 - Hock-Beng Lim, Bang Wang, Cheng Fu, Arpan Phull, Di Ma:
A Middleware Services Simulation Platform for Wireless Sensor Networks. 168-173 - Enkhbold Ochirsuren, Leandro Soares Indrusiak, Manfred Glesner:
An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor Networks. 174-179
The Third International Workshop on Delay/Disruption-Tolerant Mobile Networks - DTMN 2008
Routing, Scheduling, and Channel Assignment
- Yifeng Shao, Jie Wu:
Understanding the Tolerance of Dynamic Networks: A Routing-Oriented Approach. 180-185 - Hao Jiang, Hao Guo, Li-jia Chen:
Reliable and Efficient Alarm Message Routing in VANET. 186-191 - Julián David Morillo-Pozo, Óscar Trullols-Cruces, José M. Barceló, Jorge García-Vidal:
A Cooperative ARQ for Delay-Tolerant Vehicular Networks. 192-197
Routing II
- Lian Li, Limin Sun, Jian Ma, Canfeng Chen:
A Receiver-Based Opportunistic Forwarding Protocol for Mobile Sensor Networks. 198-203 - Muhammad Arshad Islam, Marcel Waldvogel:
Reality-Check for DTN Routing Algorithms. 204-209 - Xianning Li, Xianwei Zhou:
Bounded-Delay, Probability-Based Routing in Intermittently Connected Mobile Ad Hoc Networks. 210-215
Routing III
- Jincheng Wang, Deshi Li, Mi Zhou, Dipak Ghosal:
Data Collection with Multiple Mobile Actors in Underwater Sensor Networks. 216-221 - Feng Liu, Ming Li, Run Zhang, He Zhang, Zhen Xu:
Remaining Delivery Time Estimation Based Routing for Intermittently Connected Mobile Networks. 222-227 - Zhipeng Yang, Ha Dang, Hongyi Wu:
Online Estimation of Effective Delivery Capability in Delay-Tolerant Mobile Sensor Networks. 228-233
The Second International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems - TRAM 2008
TRAM 2008 Keynote
- Xiaoming Li:
A Grassroots Approach in P2P Reputation Studies. 234
Invited Papers
- Huanyu Zhao, Xiaolin Li:
H-Trust: A Robust and Lightweight Group Reputation System for Peer-to-Peer Desktop Grid. 235-240 - Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei Dai:
Modeling Attack Behaviors in Rating Systems. 241-248
Trust Models and Reputation Systems
- Qing Zhang, Ting Yu:
On the Modeling of Honest Players in Reputation Systems. 249-254 - Anna Gutowska, Kevan Buckley:
Computing Reputation Metric in Multi-Agent E-Commerce Reputation System. 255-260
The Fifth International Workshop on Wireless Ad Hoc and Sensor Networking - WWASN 2008
Routing and Broadcasting
- Rajiv Ramdhany, Geoff Coulson:
Manetkit: A Framework for MANET Routing Protocols. 261-266 - Amit Dvir, Michael Segal:
The (k, l) Coredian Tree for Ad Hoc Networks. 267-272 - Doina Bein, Si-Qing Zheng:
An Effective Algorithm for Computing Energy-Efficient Broadcasting Trees in All-Wireless Networks. 273-278 - Yangcheng Huang, Saleem N. Bhatti:
Fast-Converging Distance Vector Routing for Wireless Mesh Networks. 279-284
Sensor Networks
- Xiaoling Qiu, Dipak Ghosal, Biswanath Mukherjee, Jennifer Yick, Deshi Li:
Priority-Based Coverage-Aware Congestion Control for Multihop Wireless Sensor Networks. 285-290 - Zhen Jiang, Jie Wu, Robert Kline, Jennifer Krantz:
Mobility Control for Complete Coverage in Wireless Sensor Networks. 291-296 - Jehn-Ruey Jiang, Tzu-Ming Sung:
Maintaining Connected Coverage for Wireless Sensor Networks. 297-302 - Cheng Fu, Bang Wang, Hock-Beng Lim:
An Enhanced Sensor Scheduling Protocol for Wireless Sensor Networks. 303-308
Security and Applications
- Guorui Li, Jingsha He, Yingfang Fu:
A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. 309-314 - Yang Xiao, Hui Chen, Yanping Zhang, Xiaojiang Du, Bo Sun, Kui Wu:
Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks. 315-320 - Meng-Shiuan Pan, Lun-Wu Yeh, Yan-Ann Chen, Yu-Hsuan Lin, Yu-Chee Tseng:
Design and Implementation of a WSN-Based Intelligent Light Control System. 321-326 - Emre Atsan, Öznur Özkasap:
SCALAR: Scalable Data Lookup and Replication Framework for Mobile Ad-hoc Networks. 327-332
Modeling and Measurements
- Andreas Köpke, Adam Wolisz:
Measuring the Node Energy Consumption in USB Based WSN Testbeds. 333-338 - Vojislav B. Misic, Jelena V. Misic:
Performance of Incomplete Channel Sensing for Frequency Hopping Cognitive Personal Area Networks. 339-344 - Pei Li, Yinlong Xu, Chunpeng Zhang:
Impact of Selfish Rate Adaptation on the Performance in IEEE 802.11-Based Wireless Multi-Hop Networks. 345-350
The First International Workshop on Wireless Security and Privacy - WiSP'08
Opening Remarks and Keynote
- David H. C. Du:
Cyber Security: An Obtainable Goal? 351
Detections and Reputation Management
- Tao Li, Min Song, Mansoor Alam:
Compromised Sensor Nodes Detection: A Quantitative Approach. 352-357 - Bo Zhu, Kui Ren, Lingyu Wang:
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. 358-363 - Avinash Srinivasan, Feng Li, Jie Wu:
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks. 364-369 - Haiying Shen, Ze Li:
ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc Networks. 370-375
Key Agreement and Management
- Chae Hoon Lim:
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks. 376-381 - Nitesh Saxena, Jonathan Voris:
Pairing Devices with Good Quality Output Interfaces. 382-387 - Wei Ren, Kui Ren, Wenjing Lou:
Optimized User Revocation for Group Signature Based Privacy-Aware PKI. 388-393
Methodology and Protocol
- Yan Sun, Anup Kumar:
Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security Services. 394-399 - Ioana Rodhe, Christian Rohner:
n-LDA: n-Layers Data Aggregation in Sensor Networks. 400-405 - Spyros S. Magliveras, Wandi Wei, Xukai Zou:
Notes on the CRTDH Group Key Agreement Protocol. 406-411 - Jianbo Yao, Guangjun Wen:
Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor Networks. 412-416
The Second International Workshop on Cooperative Distributed Systems - CDS 2008
- Gerald G. Koch, Boris Koldehofe, Kurt Rothermel:
Higher Confidence in Event Correlation Using Uncertainty Restrictions. 417-422 - Abdessamad Imine:
Flexible Concurrency Control for Real-Time Collaborative Editors. 423-428 - Ye-In Chang, Hue-Ling Chen, Sih-Ning Li, Hung-Ze Liu:
A Dynamic Hashing Approach to Supporting Load Balance in P2P Systems. 429-434 - Seth Holloway, Christine Julien:
ROCC: A Communication Overlay Abstraction for Wireless Users. 435-440 - Qi Li, Mingwei Xu, Xinwen Zhang:
Towards a Group-Based RBAC Model and Decentralized User-Role Administration. 441-446 - Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu:
Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments. 447-452 - Mahdi Niamanesh, Rasool Jalili:
A Formalism for Recongurability Analysis in Distributed Non-Blocking Components. 453-458 - Yilin Wang, Edward Chan, Wenzhong Li, Sanglu Lu:
Caching Invalidation Strategies for Supporting 'Weak' Location Dependent Queries. 459-464 - Yin Chen, Li Tang, Jun Li:
Heuristic Relay Node Selection Algorithm for One-Hop Overlay Routing. 465-470 - Ze Li, Haiying Shen:
Probabilistic Routing with Multi-Copies in Delay Tolerant Networks. 471-476
The First International Workshop on Cyber-Physical Systems - WCPS 2008
Invited Talk
- Karthik Lakshmanan, Raj Rajkumar:
RETROFIT: Reliable Exchanges through Resilient Overlays for Internet Teleoperation. 477-482
Contributed Papers
- Kyoung-Don Kang, Sang Hyuk Son:
Real-Time Data Services for Cyber Physical Systems. 483-488 - Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu:
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems. 489-494 - Alvaro A. Cárdenas, Saurabh Amin, Shankar Sastry:
Secure Control: Towards Survivable Cyber-Physical Systems. 495-500 - James E. Weimer, Bruno Sinopoli, Bruce H. Krogh:
A Relaxation Approach to Dynamic Sensor Selection in Large-Scale Wireless Networks. 501-506 - Veljko Krunic, Richard Han:
Towards Cyber-Physical Holodeck Systems Via Physically Rendered Environments (PRE's). 507-512 - Le Xie, Marija D. Ilic:
Module-Based Modeling of Cyber-Physical Power Systems. 513-518 - Han Tang, Bruce M. McMillin:
Security Property Violation in CPS through Timing. 519-524 - Honguk Woo, Jianliang Yi, James C. Browne, Aloysius K. Mok, Ella M. Atkins, Fei Xie:
Design and Development Methodology for Resilient Cyber-Physical Systems. 525-528 - Albert M. K. Cheng:
Cyber-Physical Medical and Medication Systems. 529-532
The Seventh International Workshop on Assurance in Distributed Systems and Networks - ADSN 2008
Keynote
- Juichi Takahashi, Hideharu Kojima, Zengo Furukawa:
Coverage Based Testing for Concurrent Software. 533-538
Dependable Computing
- Fuad Abujarad, Sandeep S. Kulkarni:
Automated Addition of Fault-Tolerance to SCR Toolset: A Case Study. 539-544 - Bastien Mainaud, Mariem Zekri, Hossam Afifi:
Improving Routing Reliability on Wireless Sensors Network with Emergency Paths. 545-550
Autonomous Decentralized Architecture
- Yinong Chen, Xiaoying Bai:
On Robotics Applications in Service-Oriented Architecture. 551-556 - Xiaodong Lu, Kinji Mori:
Autonomous Decentralized VoD Architecture to Achieve Service Assurance. 557-562 - Khalid Mahmood, Yuuya Kanamaru, Xiaodong Lu, Kinji Mori:
Autonomous Decentralized Community Construction Technology for High Quality Information Service. 563-568
Networking
- Ryotaro Oda, Tomoyuki Ohta, Yoshiaki Kakuda:
An Autonomous Clustering-Based Hierarchical Routing Using Decentralized Route Information Management Scheme for Mobile Ad Hoc Networks. 569-574 - Tsuyoshi Mizumoto, Tomoyuki Ohta, Yoshiaki Kakuda:
Route-Split Routing with Resiliency to Simultaneous Failure for Mobile Ad Hoc Networks. 575-580 - Takashi Kunifuji, Tadao Miura, Gen Kogure, Hiroyuki Sugahara, Masayuki Matsumoto:
A Novel Railway Signal Control System Based on the Internet Technology and an Assurance Technology. 581-586
Scheduling
- Yunpeng Chai, Zhihui Du, Sanli Li:
A New Scheduling Algorithm for Distributed Streaming Media System Based on Multicast. 587-592 - Junichi Funasaka, Akihiko Ishidu, Kenji Ishida:
A File Fetching Method to Reduce the Redundant Traffic on BitTorrent-Like P2P Networks. 593-598 - Zhili Cheng, Zhihui Du, Yinong Chen, Xiaoying Wang:
Virtual Workspace Based Job Execution Methods and Dynamic Makespan Optimized Scheduling Algorithms. 599-604
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.