default search action
3rd COMSNETS 2011: Bangalore, India
- David B. Johnson, Anurag Kumar:
Third International Conference on Communication Systems and Networks, COMSNETS 2011, Bangalore, India, January 4-8, 2011. IEEE 2011, ISBN 978-1-4244-8952-7
COMSNETS Technical Papers
Security I
- Jonathan White, Nilanjan Banerjee:
Mirage: Mitigating illicit inventorying in a RFID enabled retail environment. 1-9 - Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Sequencegram: n-gram modeling of system calls for program based anomaly detection. 1-10 - B. R. Purushothama, Bharat Amberker:
Group key management scheme for simultaneous multiple groups with overlapped membership. 1-10 - Rajagopalan Vijayasarathy, Serugudi Venkataraman Raghavan, Balaraman Ravindran:
A system approach to network modeling for DDoS detection using a Naìve Bayesian classifier. 1-10
Pervasive & Ubiquitous Computing
- Derek McAuley, Richard Mortier, James Goulding:
The Dataware manifesto. 1-6 - Eduardo Cuervo, Peter Gilbert, Bi Wu, Landon P. Cox:
CrowdLab: An architecture for volunteer mobile testbeds. 1-10 - Vikranth T. Babu, Krishna Kishore Dhara, Venkatesh Krishnaswamy:
Augmenting topic models with user relations in context based communication services. 1-10 - Mahmoud Taghizadeh, Subir Biswas:
Minimizing content provisioning cost in heterogeneous Social Wireless Networks. 1-10
IPTV, Video and Mobility
- Rajesh Mahindra, Ravi Kokku, Honghai Zhang, Sampath Rangarajan:
MESA: Farsighted flow management for video delivery in broadband wireless networks. 1-10 - Mohammad Rabby, Kaliappa Ravindran, Supratik Mukhopadhyay, Ramesh Bharadwaj, Gaurav Mangukiya:
'Control plane' properties for signaling in loss-feedback based video rate adaptation over shared multicast paths. 1-10 - Ashutosh Dutta, J. Bryan Lyles, Henning Schulzrinne:
A formal approach to mobility modeling. 1-10 - Pat Diminico, Vijay Gopalakrishnan, Rittwik Jana, K. K. Ramakrishnan, Deborah F. Swayne, Vinay A. Vaishampayan:
Capacity requirements for on-demand IPTV services. 1-10
Security II
- Radia J. Perlman, Charlie Kaufman:
Hierarchical networks with Byzantine Robustness. 1-11 - Faisal M. Sibai, Daniel A. Menascé:
Defeating the insider threat via autonomic network capabilities. 1-10 - Pradeep Bangera, Sergey Gorinsky:
Impact of prefix hijacking on payments of providers. 1-10 - M. B. Nirmala, A. S. Manjunath:
Confidential Program update with dynamic key computation for clustered wireless sensor networks. 1-8
Network Topology
- Enrico Gregori, Luciano Lenzini, Chiara Orsini:
k-dense communities in the internet AS-level topology. 1-10 - B. Santhana Krishnan:
Separating event points by Binary Proximity Sensors: An asymptotic analysis. 1-8 - Deepak Jeswani, Ankit Kesharwani, Sneha S. Chaudhari, Vaishali P. Sadaphal, Ratan K. Ghosh:
Efficient target tracking through binary-detection in sparsely deployed WSN. 1-10
Wireless & 4G/WiMax - I
- Adel Aziz, Mathilde Durvy, Olivier Dousse, Patrick Thiran:
Models of 802.11 multi-hop networks: Theoretical insights and experimental validation. 1-10 - Shubhodeep Adhikari:
Downlink transmission mode selection and switching algorithm for LTE. 1-10 - R. Saravana Manickam, C. Siva Ram Murthy:
An instantaneous call admission control using information dissemination for WiMAX mesh networks. 1-8
Resilience & Network Planning
- James P. G. Sterbenz, Egemen K. Çetinkaya, Mahmood A. Hameed, Abdul Jabbar, Justin P. Rohrer:
Modelling and analysis of network resilience. 1-10 - Yogesh Kumar Agarwal:
Survivable network design using polyhedral approaches. 1-6 - Hamada Alshaer, Mohamed Alyafei:
Planning rules for split ratio selection in building GPON-based access networks. 1-10 - Goutam Das, Dimitri Papadimitriou, Bart Puype, Didier Colle, Mario Pickavet, Piet Demeester:
SRLG identification from time series analysis of link state data. 1-10
Multimedia & Wireless I
- Joshua Hare, Dheeraj Agrawal, Arunesh Mishra, Suman Banerjee, Aditya Akella:
A network-assisted system for energy efficiency in mobile devices. 1-10 - Jochen Issing, Stefan Reuschl, Falko Dressler, Nikolaus Färber:
Flexible playout adaptation for low delay AAC RTP communication. 1-9 - Kameswari Chebrolu, Advait Mishra:
Loss behavior analysis and its application in design of link quality metrics. 1-10 - Krishna Kant:
Multi-state power management of communication links. 1-10
Wireless Protocols
- Bama Muthuramalingam, Srikrishna Bhashyam, Andrew Thangaraj:
Processing interference at the physical layer to enhance information flow in wireless networks. 1-6 - G. R. Dattatreya, Ajay Kulkarni:
Optimal contention-free multiplexing for wireless access. 1-6 - Ansuman Bhattacharya, Rabindranath Ghosh, Koushik Sinha, Bhabani P. Sinha:
Multimedia communication in cognitive radio networks based on sample division multiplexing. 1-8 - Ajay Kulkarni, Shanthy Menezes, Ravi Prakash:
FREEZE: Rate adaptation in wireless LANs using channel contention estimates. 1-6
Multimedia & Wireless II
- Vijay Gabale, Ashish Chiplunkar, Bhaskaran Raman, Partha Dutta:
DelayCheck: Scheduling voice over multi-hop multi-channel wireless mesh networks. 1-10 - Pradipta De, Nilanjan Banerjee, Swades De:
Error-resilient image transmission over multihop wireless networks. 1-10 - Md. Tarikul Islam, Anssi Turkulainen, Jörg Ott:
Voice messaging for mobile delay-tolerant networks. 1-11 - Ville Könönen, Pekka Pääkkönen:
Optimizing power consumption of always-on applications based on timer alignment. 1-8
Network Architectures and Systems
- Dongsu Han, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki, Srinivasan Seshan:
Hulu in the neighborhood. 1-10 - Ashish Patro, Yadi Ma, Fatemeh Panahi, Jordan Walker, Suman Banerjee:
A system for audio signalling based NAT Traversal. 1-10 - Rao Naveed Bin Rais, Marc Mendonca, Thierry Turletti, Katia Obraczka:
Towards truly heterogeneous internets: Bridging infrastructure-based and infrastructure-less networks. 1-10 - Yuh-Rong Chen, Sridhar Radhakrishnan, Sudarshan K. Dhall, Suleyman Karabuk:
On the game server network selection with delay and delay variation constraints. 1-10
Virtualisation & Scaling
- Amre Shakimov, Harold Lim, Ramón Cáceres, Landon P. Cox, Kevin A. Li, Dongtao Liu, Alexander Varshavsky:
Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers. 1-10 - Jiehua Chen, Sven Grottke, Jan Sablatnig, Ruedi Seiler, Adam Wolisz:
Scalability of a distributed virtual environment based on a structured peer-to-peer architecture. 1-8 - Massimiliano Marcon, Marcel Dischinger, P. Krishna Gummadi, Amin Vahdat:
The local and global effects of traffic shaping in the internet. 1-10 - Bharat S. Rawal, Ramesh K. Karne, Alexander L. Wijesinha:
Splitting HTTP requests on two servers. 1-8
Wireless & 4G/WiMax - II
- Nidhin K. Vaidhiyan, Renu Subramanian, Rajesh Sundaresan:
Interference planning for multicell OFDM downlink. 1-10 - Sayed Chhattan Shah, Myong-Soon Park:
Energy efficient resource allocation in mobile ad hoc computational grids. 1-10
Network Algorithms
- Yong Oh Lee, Balaji Rengarajan, A. L. Narasimha Reddy:
Reaching approximate Wardrop equilibrium at reduced costs of link state updates. 1-10 - Devavrat Shah:
Three metrics for stochastic networks: Capacity, queue-size and complexity. 1-4
Poster Session
- Swati Sharma, Huzur Saran, Sorav Bansal:
An Empirical study of clock skew behavior in modern mobile and hand-held devices. 1-4 - Hemanta Kumar Kalita, Manoj Nambiar:
Designing WANem : A Wide Area Network emulator tool. 1-4 - Rusheel Jain, Murali Parameswaran, Chittaranjan Hota:
An efficient on-demand routing protocol for MANETs using Bayesian approach. 1-4 - Balwinder Sodhi, T. V. Prabhakar:
Application architecture considerations for cloud platforms. 1-4 - Jaroslaw Adam Gralak, Adam Wierzbicki:
Guiding P2P control traffic using DHTS. 1-6 - R. Sravan Kumar, Ashutosh Saxena:
Data integrity proofs in cloud storage. 1-4 - Chinmoy Kundu, Sumit Kundu, Gianluigi Ferrari, Riccardo Raheli:
Distributed detection with censoring of sensors in Rayleigh faded channel. 1-4 - Santosh Kumar, Sukumar Nandi, Santosh Biswas:
Research and application of One-class small hypersphere support vector machine for network anomaly detection. 1-4 - Monish Chatterjee, Subhendu Barat, Debojyoti Majumder, Uma Bhattacharya:
New strategies for static routing and wavelength assignment in de Bruijn WDM networks. 1-4 - Surendra Sharma, Sarang Deshpande, Krishna M. Sivalingam:
Alpha-beta filter based target tracking in clustered wireless sensor networks. 1-4 - Shanti Chilukuri, Anirudha Sahoo:
Distributed fault tolerance for WSNs with routing tree overlays. 1-4 - Zeenat Rehena, Sarbani Roy, Nandini Mukherjee:
A modified SPIN for wireless sensor networks. 1-4 - P. Balamuralidhar, Rajan Mindigal Alasingara Bhattachar:
Signed graph based approach for on-line optimization in cognitive networks. 1-4 - William Huba, Nicholas Martin, Yamin Al-Mousa, Chukwuchebem Orakwue, Nirmala Shenoy:
A distributed scheduler for airborne backbone networks with directional antennas. 1-4 - Amar Taggu, Ani Taggu:
TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agents. 1-4 - Vivek Kumar Singh, Suhas Hegde Ankadi, Debabrata Das:
Study of combined effects of zero copy and pre-processing on Input/Output performance of multimedia on demand streaming server. 1-4
COMSNETS 2011 Workshop Papers
WISARD 2011: International Workshop on Wireless Systems Advanced Research and Development
- Krishna Sampigethaya, Radha Poovendran:
Security and privacy of future aircraft wireless communications with offboard systems. 1-6 - Swaroop Roy, Rijurekha Sen, Swanand Kulkarni, Purushottam Kulkarni, Bhaskaran Raman, Lokendra K. Singh:
Wireless across road: RF based road traffic congestion detection. 1-6 - Hemanta Kumar Kalita, Abhijit Kar:
HySecNJoining: A hybrid secure node joining algorithm for wireless sensor network. 1-6 - Mithun Mukherjee, Preetam Kumar:
A new code allocation algorithm for multirate CI/MC-CDMA system. 1-6 - Tamma V. Prabhakar, Prakruthi Keshavamurthy, Shruti Devasenapathy, H. S. Jamadagni, R. Venkatesha Prasad, Ignas G. Niemegeers:
Exploring system parameters for viability of energy harvesting technologies. 1-6 - Nitin Dileep Salodkar, Aditya Karnik:
Point-to-point scheduling over a wireless channel with costly channel state information. 1-6
IAMCOM 2011: Fifth Workshop on Intelligent Networks: Adaptation, Communication & Reconfiguration
Self-adaptive Network Systems
- Vijay Arya, Jagabondhu Hazra, Palanivel A. Kodeswaran, Deva P. Seetharam, Nilanjan Banerjee, Shivkumar Kalyanaraman:
CPS-Net: In-network aggregation for synchrophasor applications. 1-8 - H. P. Raghunandan, S. Bedekar:
A parameter-influencer based model of a Self-healing network. 1-8 - K. Ravindran, S. Mukhopadhyay:
Service-level control and management for future network applications. 1-7
Distributed Control Algorithms
- Koninika Pal, Prajna Devi Upadhyay, Animesh Dutta:
A petri nets based model for multipoint synchronization in audio conferencing. 1-8 - Awadhesh Kumar Singh, Shantanu Sharma:
Message efficient leader finding algorithm for mobile ad hoc networks. 1-6 - Ravi Sankar Barpanda, Ashok Kumar Turuk, Bibhudatta Sahoo, Banshidhar Majhi:
Genetic Algorithm techniques to solve Routing and Wavelength Assignment problem in Wavelength Division Multiplexing all-optical networks. 1-8
Adaptive Network Control
- Samir K. Sadhukhan, Swarup Mandal, Srishti Shaw, Debashis Saha:
Joint optimization of 2-tier dual-homing for NodeBs and RNCs in UMTS networks using meta-heuristic techniques. 1-8 - Ashwani Sharma, Swades De, Hari Mohan Gupta:
Energy-efficient transmission of DWT image over OFDM fading channel. 1-7 - Atri Mukhopadhyay, Tamal Chakraborty, Suman Bhunia, Iti Saha Misra, Salil Kumar Sanyal:
Study of enhanced VoIP performance under congested wireless network scenarios. 1-7
Nethealth 2011: Workshop on Networked Healthcare Technology
- Amit Kumar, Rusha Patra, Manjunatha Mahadevappa, Jayanta Mukhopadhyay, Arun K. Majumdar:
An electronic travel aid for navigation of visually impaired persons. 1-5 - Amarjeet Singh, Vinayak S. Naik, Sangeeta Lal, Raja Sengupta, Deepak Saxena, Pushpendra Singh, Anuj Puri:
Improving the efficiency of healthcare delivery system in underdeveloped rural areas. 1-6 - David Kotz:
A threat taxonomy for mHealth privacy. 1-6
Posters
- Pradnya H. Ghare, Ashwin G. Kothari, Avinash G. Keskar:
Modification of superframe structure of 802.15.4 MAC for body area networks. 1-4 - V. Naveen Kumar, Mrigank Rochan, Santosh Hariharan, Kumar Rajamani:
Data hiding scheme for medical images using lossless code for mobile HIMS. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.