default search action
CISSE 2008: Bridgeport, CT, USA - TeNe
- Tarek M. Sobh, Khaled M. Elleithy, Ausif Mahmood:
Novel Algorithms and Techniques in Telecommunications and Networking, proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2008, Bridgeport, Connecticut, USA. Springer 2010, ISBN 978-90-481-3661-2 - Michael Sauer:
IP Application Test Framework. 1-7 - Yenumula B. Reddy:
Cross-Layer Based Approach to Detect Idle Channels and Allocate Them Efficiently Using Markov Models. 9-15 - Show-Shiow Tzeng, Ching-Wen Huang:
Threshold Based Call Admission Control for QoS Provisioning in Cellular Wireless Networks with Spectrum Renting. 17-22 - Samad Paydar, Mohsen Kahani:
Ontology-Based Web Application Testing. 23-27 - David C. Wyld:
Preventing the "Worst Case Scenario: " Combating the Lost Laptop Epidemic with RFID Technology. 29-33 - Margareth Stoll, Dietmar Laner:
Information Security and System Development. 35-40 - Agnius Liutkevicius, Arunas Vrubliauskas, Egidijus Kazanavicius:
A Survey of Wireless Sensor Network Interconnection to External Networks. 41-46 - Ehab Ahmed Ibrahim, Mohamed Amr Mokhtar:
Comparing the Performance of UMTS and Mobile WiMAX Convolutional Turbo Code. 47-51 - Zadia Codabux-Rossan, M. Razvi Doomun:
Perfromance of Interleaved Cipher Block Chaining in CCMP. 53-58 - Andriy Shpylchyn, Abdelshakour Abuzneid:
Localization and Frequency of Packet Retransmission as Criteria for Successful Message Propagation in Vehicular Ad Hoc Networks. 59-64 - Zhengping Wu, Alfred C. Weaver:
Authentication Information Alignment for Cross-Domain Federations. 65-70 - Osama A. Rayis:
Formally Specifying Linux Protection. 71-79 - Karena Stannett, Adomas Sutkevicius, Enda Fallon, Yuansong Qiao, Paul Jacob, Austin Hanley:
Path Failure Effects on Video Quality in Multihomed Environments. 81-86 - Ashraf El-Sisi, Sameh M. Shohdy, Nabil A. Ismail:
Reconfigurable Implementation of Karatsuba Multiplier for Galois Field in Elliptic Curves. 87-92 - R. Vahidnia, Mahmoud Najafi, H. Firouzi, M. T. H. Beheshti:
Nonlinear Congestion Control Scheme for Time Delayed Differentiated-Services Networks. 93-97 - Dina Darwish, Imane Aly Saroit, Abdel wehab Hassan:
Effect of Packet Size and Channel Capacity on the performance of EADARP Routing Protocol for Multicast Wireless ad hoc Networks. 99-104 - Abdelshakour Abuzneid, Brandon J. Stark:
Improving BGP Convergence Time via MRAI Timer. 105-110 - Adelshakour Abuzneid, Kotadiya Krunalkumar:
Error Reduction using TCP with Selective Acknowledgement and HTTP with Page Response Time over Wireless Link. 111-116 - Nicolae Crisan, Ligia Chira Cremene:
Enhanced Reconfigurability for MIMO Systems using Parametric Arrays. 117-122 - Mohammed A. Abuhelaleh, Khaled M. Elleithy, Thabet M. Mismar:
Modified LEACH - Energy Efficient Wireless Networks Communication. 123-127 - Vicente Alarcón Aquino, Carlos A. Oropeza-Clavel, Jorge Rodríguez-Asomoza, Oleg Starostenko, Roberto Rosas-Romero:
Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks. 129-134 - Yonggang Wang, Nike Gui, Jian-bin Hu, Zhong Chen:
Automatic Construction and Optimization of Layered Network Attack Graph. 135-138 - Thomas Chowdhury, Rashed Mustafa:
Parallel Data Transmission: A Proposed Multi-layered Reference Model. 139-142 - Zeeshan-ul-hassan Usmani, Fawzi Abdulkhaliq Alghamdi, Amina Tariq, Talal Naveed Puri:
Besides Tracking - Simulation of RFID Marketing and Beyond. 143-148 - Fatima Yousaf, Savera Tanwir, Smh Zaidi:
Light Path Provisioning using Connection Holding Time and Flexible Window. 149-154 - Dongkyun Kim, Kwangjong Cho, Huhnkuk Lim:
Distributed Hybrid Research Network Operations Framework. 155-160 - Teodor B. Iliev, Georgi V. Hristov, Plamen Z. Zahariev, Mihail P. Iliev:
Performance of the Duo-Binary Turbo Codes in WiMAX Systems. 161-165 - Faisal Bashir Hussain, Yalçin Çebi:
A unified event reporting solution for wireless sensor networks. 167-172 - Ying-ying Shan, Xuan Wang:
A Low Computational Complexity Multiple Description Image Coding Algorithm Based on JPEG Standard. 173-176 - Borislav Y. Bedzhev, Mihail P. Iliev:
A General Method for Synthesis of Uniform Sequences with Perfect Periodic Autocorrelation. 177-182 - Georgina O'Mahony Zamora, Susan Bergin, Irwin O. Kennedy:
Using Support Vector Machines for Passive Steady State RF Fingerprinting. 183-188 - Alessandra Esposito, Luciano Tarricone, Stefano Luceri, Marco Zappatore:
Genetic Optimization for Optimum 3G Network Planning: an Agent-Based Parallel Implementation. 189-194 - Md. Abdul Based:
A Survey about IEEE 802.11e for better QoS in WLANs. 195-200 - Igor Sychev, Irina Sycheva:
Method of a Signal Analysis for Imitation Modeling in a Real-Time Network. 201-206 - V. Sinivee:
Simple yet efficient NMEA sentence generator for testing GPS reception firmware and hardware. 207-210 - Igor Mishkovski, Sonja Filiposka, Sasho Gramatikov, Dimitar Trajanov, Ljupco Kocarev:
Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks. 211-216 - Tirthankar Ghosh, Hui Xu:
Modeling Trust in Wireless Ad-Hoc Networks. 217-221 - A. Pachón, M. Veiga, J. M. Madrid:
Address Management in MANETs Using an Ant Colony Metaphor. 223-228 - Justin Champion:
Elitism Between Populations For The Improvement Of The Fitness Of A Genetic Algorithm Solution. 229-233 - Carolin I. Bauer, H. Yu, Brian Boffey:
Adaptive Genetic Algorithm for Neural Network Retraining. 235-238 - Marcus Vinícius de Sousa Lemos, Líliam Barroso Leal, Raimir Holanda Filho:
A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks. 239-244 - Yang Yu, Aixin Zhang, Junhua Tang, Haopeng Chen:
A Dynamic Scheme For Authenticated Group Key Agreement Protocol. 245-250 - Eman Abdelfattah:
Performance Evaluation of TCP Congestion Control Mechanisms. 251-256 - Abdelrahman Elleithy, Syed Sajjad Rizvi, Khaled M. Elleithy:
Optimization and Job Scheduling in Heterogeneous Networks. 257-262 - Allon Rai, Sangita Ale, Syed Sajjad Rizvi, Aasia Riasat:
A New Methodology for Self Localization in Wireless Sensor Networks. 263-268 - Syed Sajjad Rizvi, Majid A. Jafri, Khaled M. Elleithy, Aasia Riasat:
A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET). 269-274 - Syed Sajjad Rizvi, Aasia Riasat, Mustafa A. Khan:
A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET. 275-279 - Syed Sajjad Rizvi, Adil Sheikh, Aasia Riasat:
Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing Algorithm. 281-286 - Jaiminkumar Gorasia, Syed Sajjad Rizvi, Aasia Riasat:
Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD). 287-292 - Syed Sajjad Rizvi, Aasia Riasat, Mustafa A. Khan, Khaled M. Elleithy:
A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution. 293-298 - Syed Sajjad Rizvi, Aasia Riasat, Mohammad A. Sheikh:
A Mathematical Model for Reducing Handover Time at MAC Layer for Wireless Networks. 299-304 - Halûk Gümüskaya, M. V. Nural, S. Dogan:
A Software Solution for Mobile Context Handoff in WLANs. 305-309 - Mao-Quan Li, Zhengquan Xu, Yanyan Xu:
Robust Transmission of Video Stream over Fading Channels. 311-316 - Victor Pasknel de Alencar Ribeiro, Raimir Holanda Filho:
An Attack Classification Tool Based On Traffic Properties and Machine Learning. 317-321 - Keith Griffin, Colin Flanagan:
Browser based Communications Integration using Representational State Transfer. 323-328 - Md. Abdul Based:
Security Aspects of Internet based Voting. 329-332 - Cecil Bruce-Boye, Dmitry A. Kazakov, Helge Colmorgen, Rüdiger zum Beck, Jehan Z. Hassan, Harald Wojtkowiak:
Middleware-based distributed heterogeneous simulation. 333-337 - Arkadiusz Biernacki:
Analysis of the flooding search algorithm with OPNET. 339-342 - Milan Simek, Dan Komosny, Radim Burget, Ricardo M. Silva, Jorge Sá Silva:
Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor Networks. 343-348 - Ali Jamoos, Ahmad Abdo, Hanna Abdel Nour, Éric Grivel:
Two Cross-Coupled H∞ Filters for Fading Channel Estimation in OFDM Systems. 349-353 - Ricardo Luis da Rocha Ataide, Zair Abdelouahab:
An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks. 355-360 - Denílson Cursino Oliveira, Raimir Holanda Filho:
A highly parallel scheduling model for IT change management. 361-366 - Ayssam Yehia Elkady, Tarek M. Sobh:
Design and Implementation of a Multi-sensor Mobile Platform. 367-372 - Mostefa Mohamed-Seghir:
Methods based on fuzzy sets to solve problems of Safe Ship control. 373-377 - Sasho Gramatikov, Dimitar Trajanov, Ljupco Kocarev, Aksenti Grnarov:
Network Topology Impact on Influence Spreading. 379-384 - Ligia Chira Cremene, Nicolae Crisan, Marcel Cremene:
An Adaptive Combiner-Equalizer for Multiple-Input Receivers. 385-390 - Bogdan Crainicu, Florian Mircea Boian:
KSAm - An Improved RC4 Key-Scheduling Algorithm for Securing WEP. 391-396 - Kostas E. Psannis:
Ubiquitous Media Communication Algorithms. 397-401 - Dhawal N. Thakker, Glenford E. Mapp, Orhan Gemikonakli:
Balancing Streaming and Demand Accesses in a Network Based Storage Environment. 403-408 - Xu Wang, Liyan Qian, Jianjun Wu, Tian Liu:
An Energy and Distance Based Clustering Protocol for Wireless Sensor Networks. 409-412 - Serguei A. Mokhov:
Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions. 413-416 - Serguei A. Mokhov, Rajagopalan Jayakumar:
Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web Services. 417-422 - Serguei A. Mokhov, Farid Rassai, Lee Wei Huynh, Lingyu Wang:
The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. 423-429 - Marcelino Minero-Muñoz, Vicente Alarcón Aquino, Jose Galdino García-Fierro, Roberto Rosas-Romero, Jorge Rodríguez-Asomoza, Oleg Starostenko:
Performance Evaluation of MPLS Path Restoration Schemes using OMNET++. 431-436 - Saeid Moslehpour, Jun Kondo, Hisham Alnajjar:
FM Transmitter System for Telemetrized Temperature Sensing Project. 437-442 - Chunyan Bai, Gui Liang Feng:
Enhancing Sensor Network Security with RSL Codes. 443-447 - Serguei A. Mokhov, Lee Wei Huynh, Lingyu Wang:
The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement. 449-455 - Alexei Barbosa de Aguiar, Plácido Rogério Pinheiro, Alvaro de Menezes S. Neto, Rebecca F. Pinheiro, Ruddy P. P. Cunha:
A Multi-layer GSM Network Design Model. 457-460 - Khalida Noori, Sami Ahmed Haider:
Performance Analysis of Multi Carrier CDMA and DSCDMA on the basis of different users and Modulation scheme. 461-463 - Rebecca F. Pinheiro, Alexei Barbosa de Aguiar, Plácido Rogério Pinheiro, Alvaro de Menezes S. Neto, Ruddy P. P. Cunha, Domingos Neto:
Scalability Analysis of a Model for GSM Mobile Network Design. 465-469 - Sherif Rashad:
Location Management in 4G Wireless Heterogeneous Networks using Mobile Data Mining Techniques. 471-476 - Farnaz Dargahi, Amir Masoud Rahmani, Reza Samadabadi:
A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networks. 477-481 - Kostas E. Psannis:
Multiview Media Transmission Algorithm for Next Generation Networks. 483-487 - U. Bala Maheshwaran, Reshmi Raj, S. Sindhu Tharangini, K. A. Narayanan Kutty:
A 4 GHz Clock Synchronized Non Coherent Energy Collection UWB Transceiver. 489-493 - Bharath Sridhar, I. Akram Sheriff, K. A. Narayanan Kutty, S. Sathish Kumar:
Comparison of Cascaded LMS-RLS, LMS and RLS Adaptive Filters in Non-Stationary Environments. 495-499 - Rasha Gaffer Mohammed Helali:
Data Mining Based Network Intrusion Detection System: A Survey. 501-505 - Abdelshakour Abuzneid, Chennaipattinam Raghuram Vijay Iyengar, Ramaswamy Gandhi Dasan Prabhu:
VDisaster recovery with the help of real time video streaming using MANET support. 507-512
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.