default search action
ICOIN 2012: Bali, Indonesia
- Younghan Kim, Cheeha Kim, Panjai Tantatsanawong:
2012 International Conference on Information Networking, ICOIN 2012, Bali, Indonesia, February 1-3, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0251-7 - Makoto Sugita, Yoshihiro Kainuma, Kenko Ota, Hideaki Matsue:
A route discovery method based on received power of repeater nodes for sensor networks. 1-6 - Xu Huang, Muhammad Ahmed, Dharmendra Sharma:
Timing control for protecting from internal attacks in wireless sensor networks. 7-12 - Kazutaka Fukuda, Eiji Okamoto:
Performance improvement of TOA localization using IMR-based NLOS detection in sensor networks. 13-18 - Jung-Hyok Kwon, Eui-Jik Kim, Hyunhee Park, Sang-Hong Lee, Chul-Hee Kang:
DC-MAC: Directional cooperative MAC for ad-hoc networks. 19-24 - Hikaru Ookura, Hiroshi Yamamoto, Katsuyuki Yamazaki:
Development and evaluation of walking path estimation system using sensors of Android device and vector map matching. 25-29 - Shuta Yokoyama, Hiroshi Yamamoto, Katsuyuki Yamazaki:
The evaluation of communication characteristic of cellular network and development of Retransmission-Controlled TCP. 30-35 - Maroua Bakri, Mohamed Koubàa, Ammar Bouallegue:
An iterative partial path protection-based approach for routing static D-connections in WDM transparent networks with SRLG constraints. 36-41 - Sheng-Wei Wang, Chin-Yen Wen:
Lightpath-level active rerouting algorithms in all-optical WDM networks with alternate routing and traffic grooming. 42-46 - Ahmed Frikha, Samer Lahoud, Bernard Cousin:
Candidate-cycle-based heuristic algorithm for node-and-link protection of dynamic multicast traffic in optical DWDM networks. 47-52 - Vijayakrishnan Nagarajan, Dijiang Huang:
Secure web referral service. 53-58 - Nassim Laga, Emmanuel Bertin, Noël Crespi:
Promoting Mashup creation through unstructured data extraction. 59-64 - Cuong T. Do, Nguyen Hoang Tran, Choong Seon Hong:
Throughput maximization for the secondary user over multi-channel cognitive radio networks. 65-69 - Christian Schwartz, Rastin Pries, Phuoc Tran-Gia:
A queuing analysis of an energy-saving mechanism in data centers. 70-75 - Sunghee Lee, Seoung-Jun Oh, Jinpyo Hong, Kwangsue Chung:
Adaptive rate control scheme to improve QoS of multimedia streaming application. 76-80 - Zaw Htike, Jun Lee, Choong Seon Hong:
A MAC protocol for cognitive radio networks with reliable control channels assignment. 81-85 - Chan-Myung Kim, Yong-hwan Kim, In-Seok Kang, Kang-Whan Lee, Youn-Hee Han:
A scheduling algorithm for connected target coverage under probabilistic coverage model. 86-91 - Tuan Anh Le, Choong Seon Hong, Eui-nam Huh:
Coordinated TCP Westwood congestion control for multiple paths over wireless networks. 92-96 - Yongping Kong, Zhimin Zhong, Guanglong Yang, Xin Luo, Albert Kai-Sun Wong, Haibin Zhai:
A Non-Parametric Kernel method for CDMA2000 network indoor localization using multiple observations. 97-101 - Kwang Myung Kim, Sukjung Yong, Back Sun Sim, Hee Yong Youn, Ohyoung Song:
Effective packet buffering for FMIPv6 Protocol over Diffserv domain. 102-107 - Dong-Hyun Kim, Jong-Deok Kim:
Broadcast packet collision and avoidance method in Wi-Fi based broadcasting system. 108-113 - Youngjun Kim, Eung Kyu Kim, Byoung Woo Nam, Ilyoung Chong:
Service composition using new DSON platform architecture for M2M service. 114-119 - Md. Nurul Huda, Farzana Yasmeen, Shigeki Yamada, Noboru Sonehara:
An approach for short message resilience in disaster-stricken areas. 120-125 - Haosong Gou, Sungryul Kim, Younghwan Yoo:
A bit collision detection based Query Tree protocol for sensor tags in logistics management. 126-131 - Kohta Ohshima, Hiroshi Hara, Yoichi Hagiwara, Matsuaki Terada:
Field investigation of the radio transmission performance and distance in a environmental wireless sensor network. 132-137 - Emad Aboelela, Altaf H. Khan:
Wireless sensors and neural networks for intruders detection and classification. 138-143 - Jaekwang Kim, Jee-Hyong Lee:
ViTAMin: A Virtual Backbone Tree Algorithm for Minimal energy consumption in wireless sensor network routing. 144-149 - Ahmed M. Shamsan Almshreqi, Borhanuddin Mohd Ali, Mohd Fadlee A. Rasid, Alyani Ismail, Pooria Varahram:
An improved routing mechanism using bio-inspired for energy balancing in wireless sensor networks. 150-153 - Gunwoo Kim, Songnan Bai, Pyungsun Park, Joonghyun Moon, Jaeil Jung:
A structured TDMA-based V2I MAC protocol for automated guided vehicle control systems. 154-158 - Adnan Nasir, Hock Beng Lim, Boon-Hee Soong:
An integrated vehicular and urban sensing system: Framework and modeling. 159-164 - Sanghwan Lee, Min Sun Jeong, Hyuncheol Jeong, Hyang Jin Lee, Eun Young Choi:
A practical group based key management scheme for Ubiquitous Sensor Networks. 165-170 - Xiaoli Wang, Albert Kai-Sun Wong, Yongpmg Kong:
Mobility tracking using GPS, Wi-Fi and Cell ID. 171-176 - Woojin Ahn, Yongsu Gwak, Young Yong Kim:
A low-complexity delay injection algorithm for improving TCP performance during LTE intra handover. 177-181 - Shin Moriyasu, Koji Tajima, Kohta Ohshima, Matsuaki Terada:
Group synchronization method with fast response time for VoD services. 182-187 - Kabsu Han, Yongseop Kwon, Wooyeon Kim, Jeonghun Cho:
Distributed hierarchical service network for automotive embedded system. 188-192 - Kazuhito Matsuda, Go Hasegawa, Satoshi Kamei, Masayuki Murata:
Centralized and distributed heuristic algorithms for application-level traffic routing. 193-198 - Ginhung Wang, Kuochen Wang:
An efficient hybrid P2P MMOG cloud architecture for dynamic load management. 199-204 - Hye-Jeong Cho, Kwangsue Chung, Seoung-Jun Oh:
A new bit rate estimation scheme for unsupervised segmentation of video content in IPTV services. 205-209 - Soung-Yue Liew, Ming-Lee Gan:
An exact optimum paths-finding algorithm for α+1 path protection. 210-215 - Hyungjin Kim, Sanghwan Lee:
Greedy virtual network embedding under an exponential cost function. 216-221 - Donghong Qin, Jiahai Yang, Jessie Hui Wang, Bin Zhang, Lei Gao, Zhuolin Liu:
Multipath interdomain routing via deviation from primary path. 222-227 - Chi-Shih Chao, Szu-Pei Lu:
Toward efficient multi-link failure diagnosis by using monitoring cycle for all-optical mesh networks. 228-233 - Hyeokju Lee, Myoungjin Kim, Joon Her, Hanku Lee:
Implementation of MapReduce-based image conversion module in cloud computing environment. 234-238 - Shu-Ming Chang, Ren-Song Ko:
Fast enlarging a BitTorrent Swarm via social networking. 239-244 - Natasa Zivic:
Iterative method for correction of messages protected by symmetric cryptographic check values. 245-250 - Xu Huang, Shirantha Wijesekera, Dharmendra Sharma:
Quantum cryptography based key distribution in WiFi networks. 251-256 - Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel:
Stopping time condition for practical IPv6 Cryptographically Generated Addresses. 257-262 - Yung-Ting Chuang, Isai Michel Lombera, P. M. Melliar-Smith, Louise E. Moser:
Detecting and defending against malicious attacks in the iTrust information retrieval network. 263-268 - Hosnieh Rafiee, Ahmad AlSa'deh, Christoph Meinel:
Multicore-based auto-scaling SEcure Neighbor Discovery for Windows operating systems. 269-274 - Kohei Kotera, Osamu Muta, Hiroshi Furukawa:
Efficient nonlinear equalization scheme for MIMO constant envelope modulation receivers affected by quantization error. 275-279 - Haeseong Jeong, Do-Hoon Kim, Heung-Gyoon Ryu:
Doppler spread and its compensation by FDE and turbo code. 280-284 - Yazan A. Alqudah:
Power analysis and modeling based on field measurements using 3.5 GHz WiMAX network. 285-289 - Yong-hwan Kim, Chan-Myung Kim, Dong-Sun Yang, Young-jun Oh, Youn-Hee Han:
Regular sensor deployment patterns for p-coverage and q-connectivity in wireless sensor networks. 290-295 - Ting Zhou, Youjian Zhao, Yunmei Xiao:
Performance evaluation of crosspoint queued switch supporting multicast traffic. 296-301 - Minoru Koizumi, Tomoichi Ebata, Tomoaki Tsutsumi, Kohta Ohshima, Matsuaki Terada:
Design and implementation of scalable distributed wireless network emulator for high-speed mobility. 302-307 - Sungwoo Tak, Hyejin Kim, Taehoon Kim, Heekyum Kim:
A performance comparision study of k-shortest disjoint forwarding paths in ship backbone networks. 308-311 - Xu Huang, Dharmendra Sharma, Hongyan Cui:
Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks. 312-317 - Won-Hyuk Yang, Jin-Hyo Jung, Young-Chon Kim:
Performance evaluation of energy saving in core router architecture with Low Power Idle for OBS networks. 318-323 - Jin-Hyo Jung, Won-Hyuk Yang, Young-Chon Kim:
A bandwidth allocation algorithm for improving QoS in EPON with sleep mode. 324-328 - Yonchanok Khaokaew, Sirikarn Pukkawanna:
Time series anomaly detection using recessive subsequence. 329-333 - Hee-seong Kim, Jun Yeol Choi, Kyu Sung Ahn, Hee Yong Youn, Ohyoung Song:
An efficient AP channel scanning scheme for mobility over WiMAX. 334-339 - Hyo-Cheol Jeong, Hyeonjun Jeong, Younghwan Yoo:
Dynamic probabilistic flooding algorithm based-on neighbor information in wireless sensor networks. 340-345 - Anbin Kim, Seong-Ho Jeong:
A QoS/QoE control architecture for multimedia communications. 346-349 - Yan Pu, Akihiro Nakao:
A deployable upload acceleration service for mobile devices. 350-353 - Do Tronghop, Junho Hwang, Souhwan Jung, Yoan Shin, Myungsik Yoo:
Modeling and analysis of the wireless channel formed by LED angle in visible light communication. 354-357 - Md Habibul Islam, Zbigniew Dziong, Kazem Sohraby, Mahmoud Daneshmand, Rittwik Jana:
Capacity-optimal relay and base station placement in wireless networks. 358-363 - Gunhee Lee, Jae Hoon Ko, Seoungyoul Oh, Cheeha Kim:
Sensing and transmission parameter determination for cognitive radio networks. 364-367 - KwangHyun Jeon, Bing Hui, KyungHi Chang, Hyeong-Sook Park, Youn-Ok Park:
SISO polarized flat fading channel modeling for dual-polarized antenna systems. 368-373 - Woo-Sik Lee, Min Choi, Namgi Kim:
Experimental link channel characteristics in wireless body sensor systems. 374-378 - Sang-woo Chang, Jin Cha, Sang-Sun Lee:
Adaptive EDCA mechanism for vehicular ad-hoc network. 379-383 - Ossi Karkulahti, Jussi Kangasharju:
Surveying Wikipedia activity: Collaboration, commercialism, and culture. 384-389 - Whoi Jin Jung, Jae Yong Lee, Byung-Chul Kim:
Inter-pMIPv6 mobility management using core-edge separation network. 390-393 - Sangdo Lee, Aran Kim, Hyeopgeon Lee, Yongtae Shin:
A secure information flow architecture for public web service. 394-398 - Kyung Choi, Minjung Yun, Kijoon Chae, Mihui Kim:
An enhanced key management using ZigBee Pro for wireless sensor networks. 399-403 - Sho Nishimura, Masayoshi Shimamura, Hiroyuki Koga, Takeshi Ikenaga:
Transparent caching scheme on advanced relay nodes for streaming services. 404-409 - Mi-Seon Kang, Dong-Won Kum, Jae-Seung Bae, You Ze Cho, Anh-Ngoc Le:
Mobility Aware Hybrid Routing protocol for mobile ad hoc network. 410-414 - Jiwon Jang, Hyunwoo Nam, Younghan Kim:
Mobile device-controlled live streaming traffic transfer for multi-screen services. 415-420 - Farman Ullah, Ghulam Sarwar, Sung Chang Lee, YunKyung Park, Kyeong-Deok Moon, Jin Tae Kim:
Hybrid recommender system with temporal information. 421-425 - Seung-Chur Yang, Jong-Deok Kim:
Association information management using MAC subnet addressing in Wireless Mesh Networks. 426-430 - Sami J. Habib, Paulvanna Nayaki Marimuthu:
Carbon offsetting through computer network redesign. 431-436 - Ching-Lung Chang, Xan-Hua Hsieh, Wei-Ming Chen:
The design of video streaming proxy in high-speed train. 437-441 - Yoonhee Kim, Sanghyun Ahn:
A reliable contents distribution middleware system for peer-to-peer networks. 442-446 - Hiroomi Isozaki, Shingo Ata, Ikuo Oka:
Modeling of flows based on behavior of applications. 447-452 - Anbin Kim, Seong-Ho Jeong, PyungKoo Park, Ho Yong Ryu:
QoS support for advanced multimedia systems. 453-456 - Jin-Sun Kim, Jong-Won Choe, Hyukjoon Lee:
Multipath AODV extension with CORE-node using path accumulation. 457-461 - Saowaphak Sasanus, Kamol Kaemarungsi:
Differences in bandwidth requirements of various applications due to IPv6 migration. 462-467 - Min Woo Kim, Dong Geun Yun, Jong Min Lee, Seong Gon Choi:
Battery life time extension method using selective data reception on smartphone. 468-471 - Hyungkun Park, Yillbyung Lee:
A method for transferring more information between objects on offline network. 472-477 - Seung Hyong Rhee, Hwa-Sung Kim, Seung-Won Sohn:
The effect of decentralized resource allocation in network-centric warfare. 478-481 - Takayoshi Ichikawa, Toshiro Nunome, Shuji Tasaka:
Multidimensional assessment and principal component analysis of QoE in interactive Multi-View Video and Audio IP communications. 482-487 - Jae Hoon Choi, Junyeong Bok, Heung-Gyoon Ryu:
Power analysis and communication capacity of 160GHz wireless communication in multipath environment. 488-491 - Dosik An, Jongseon Park, Gicheol Wang, Gihwan Cho:
An adaptive UDT congestion control method with reflecting of the network status. 492-496 - Sung-Min Jung, Nam-Uk Kim, Tai-Myoung Chung:
The clusterhead chaining scheme considering scalability of the wireless sensor networks. 497-500 - Byeongsik Kim, Seunghyun Yoon, Youhyeon Jeong, Hoyoung Song:
Implementation of inter-domain path computation element. 501-505 - Hongseok Lee, Kang-Woo Lee, Kwan Min Lee, Hyunseung Choo:
Similarity attraction effects in mobile advertisement: Interaction between user personality and advertisement personality. 506-511 - JunSeong Kim, JongSu Yi, Ho-Hyun Park:
A case study on oscillating behavior of end-to-end network latency. 512-516 - Ji-Young Choi, Hyo-Jin Kim, Jin-Ki Park, JunSeong Kim, Ho-Hyun Park:
A trust-based broadcasting algorithm for safe USN. 517-522 - Min Wei, Keecheon Kim, Ping Wang:
Research on a mutual authentication scheme for wireless sensor networks. 523-528 - Yunseok Kang, Sooyeol Im, Hyuckjae Lee:
Dynamic spectrum allocation in adjacent regions with physical interference based geographic coupling parameter. 529-534 - Kyengheum Na, Heungwoo Nam, Sunshin An:
Wireless sensor network using internetworking. 535-538 - Hyunjun Kim, Sungwon Lee:
FiRST Cloud Aggregate Manager development over FiRST: Future Internet testbed. 539-544 - Gaolei Fei, Guangmin Hu:
Temporal dependence network loss tomography using maximum pseudo likelihood method. 545-550 - Guofu Xiang, Hai Jin, Deqing Zou:
A comprehensive monitoring framework for virtual computing environment. 551-556 - Jun-Cheol Jeon, Kang-Joong Seo, Kee-Won Kim:
Hardware complexity of SHA-1 and SHA-256 based on area and time analysis. 557-561 - K. S. Kim, K. Y. Kim, K.-H. Lee, T. K. Kim, W. S. Cho:
Design and implementation of web crawler based on dynamic web collection cycle. 562-566
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.