


default search action
3. COMSWARE 2008: Bangalore, India
- Sunghyun Choi, Jim Kurose, Krithi Ramamritham:
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India. IEEE 2008, ISBN 978-1-4244-1797-1
Wireless Sensor Networks
- Arijit Khan
, Lawrence Jenkins:
Undersea wireless sensor network for ocean pollution prevention. 2-8 - Ashok Kumar Das
, Indranil Sengupta:
An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials. 9-16 - Tamma V. Prabhakar, S. Venkatesh, M. S. Sujay, Joy Kuri, K. Praveen:
Simulation blocks for TOSSIM-T2. 17-23
Physical Layer Aspects
- Preetam Kumar, Saswat Chakrabarti:
Performance evaluation of a new overloading scheme for cellular DS-CDMA with iterative multistage interference cancellation receiver. 25-30 - R. Sethi:
Experiments with low power commodity hardware platforms for challenged networks. 31-36 - Aravind Iyengar, Dileep Manisseri Dileep, Andrew Thangaraj
, Srikrishna Bhashyam
:
Thresholds for LDPC codes over OFDM. 37-42
Advanced Wireless Access
- Sahin Albayrak, Muslim Elkotob, Ahmet Cihat Toker:
Smart middleware for mutual service-network awareness in evolving 3GPP networks network aware applications & application aware networks. 44-50 - Arpita Guha, Viswanath Ganapathy:
Power allocation schemes for cognitive radios. 51-56 - Sandip Sarkar, Tamer Kadous, Tingfang Ji, Naga Bhushan, Alexei Gorokhov, Aamod Khandekar, Rajiv Vijayan, Avneesh Agrawal:
MIMO in wireless WAN - the UMB system. 57-64
Applications
- Praveen Kumar, Viswanatha Rao Thumparthy:
Communication in personal healthcare. 66-73 - Flavius Copaciu, Stephan Kluth, Tomasz Porzucek, Werner Zorn:
Hierarchical modeling of the Axis2 web services framework with FMC-QE. 74-81 - Vinayaka Pandit, Natwar Modani, Sougata Mukherjea
, Amit Anil Nanavati, Sambuddha Roy, Amit Agarwal:
Extracting dense communities from telecom call graphs. 82-89
Short Papers: Wireless Sensors
- Shanliang Li, Liusheng Huang, Junmin Wu, Hongli Xu, Jichun Wang:
NBLS: Neighbor-information-based localization system for wireless sensor networks. 91-94 - Anand Seetharam, Abhishek Bhattacharyya, Mrinal K. Naskar, Amitava Mukherjee
:
Estimation of node density for an energy efficient deployment scheme in wireless sensor network. 95-98 - Aloor Gopakumar, Lillykutty Jacob:
Localization in Ultra Wideband sensor networks using Tabu search. 99-102 - Joongheon Kim, Wonjun Lee:
Cooperative relaying strategies for multi-hop wireless sensor networks. 103-106 - Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki:
Estimated replication of data in wireless sensor networks. 107-110
Mobile Location
- Vihang Kamble, Suresh Kalyanasundaram, Rajeev Agrawal:
Enhanced location update mechanism in wireless cellular networks using knowledge of mobility patterns. 112-119 - Oliver Jorns, Oliver Jung, Gerald Quirchmayr:
A platform for the development of location-based mobile applications with privacy protection. 120-127 - Qiaoqiao Chen, Ting Jiang, Zheng Zhou:
A new ranging application of UWB modulated by orthogonal waves in wireless sensor network. 128-131
Wireless Medium Access Control
- Prashanth L. A.
, K. Gopinath:
OFDM-MAC algorithms and their impact on TCP performance in next generation mobile networks. 133-140 - Tamma V. Prabhakar, H. S. Jamadagni, M. Aswath Kumar, Jacques Panchard:
A Slotted Aloha joint MAC - cum - Routing protocol for data gathering sensor network applications. 141-148 - Saptarshi Chaudhuri, Ranjish Bhaskaran, Venkataveen Reddy:
Design of adaptive MAC for high speed packet access system. 149-157
Internet Security
- Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
Collaborative group membership and access control for JXTA. 159-166 - Rajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi:
A robust finger print based two-server authentication and key exchange system. 167-174 - Manpreet Singh, Manjeet Singh Patterh:
Interpretation of policy oriented common criteria components for network computing environment. 175-182
Short Papers: Wireless Networking
- Husain Husna, Santi Phithakkitnukoon
, Enkh-Amgalan Baatarjav, Ram Dantu:
Quantifying presence using calling patterns. 184-187 - Nawal A. El-Fishawy
, Mona Shokair, Waleed Saad
:
Quality of service investigation for multimedia transmission over UWB networks. 188-191 - Zhimeng Zhong, Shihua Zhu, Gangming Lv:
Orthogonal multi-relay networks: capacity bounds and optimal resource allocation. 192-195 - Joseph Thaliath, Mabel M. Joy, Elizabeth Priya John, Debabrata Das
:
Service class downlink scheduling in WiMAX. 196-199 - Debarati Sen, Saswat Chakrabarti, Ratnam V. Raja Kumar:
Symbol timing synchronization for ultra-wideband (UWB) multi-band OFDM (MB-OFDM) systems. 200-203 - Hui Ma, Sumit Roy, Jing Zhu:
PHY/MAC adaptation approaches for dense wireless LAN MESH. 204-207
Wireless Security I
- Rajadurai Rajavelsamy, Sungho Choi:
Security aspects of inter-access system mobility between 3GPP and non-3GPP networks. 209-213 - Ashutosh Saxena
:
Dynamic authentication: Need than a choice. 214-218 - Mounita Saha, Dipanwita Roy Chowdhury, Indranil Sengupta:
A secure verifiable key agreement protocol for mobile conferencing. 219-222
Wireless Medium Access Control II
- P. Samuel David, Anurag Kumar
:
Network coding for TCP throughput enhancement over a multi-hop wireless network. 224-233 - Zhen-Yu Na, Zhenyong Wang
, Qing Guo:
An adaptive CAC algorithm based on fair utility for low earth orbit satellite networks. 234-238 - Srinivas Pinagapany, Anju V. Kulkarni:
Solving channel allocation problem in cellular radio networks using genetic algorithm. 239-244
Internet Security II
- Husain Husna, Santi Phithakkitnukoon
, Srikanth Palla, Ram Dantu:
Behavior analysis of spam botnets. 246-253 - Yassin M. Hasan, Hesham A. Abulenein:
Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. 254-259 - Yassin M. Hasan:
From stream to provably secure block ciphers based on pseudorandom matrix transformations. 260-265
Short Papers: Internet Services
- Hai-yan Wu, Xiao-zhu Lin, Dong-Xing Jiang:
A Petri Net approach to analyze the effect of persistent connection on the scalability of web services. 267-270 - Logambigai Venkatachalam, Krishna Kishore Dhara, Venkatesh Krishnaswamy, Michael Vernick:
Communication enabled web applications The evolution of computer telephony integration. 275-278 - Tathagata Das, Subrata Nandi, Niloy Ganguly:
Community based search on power law networks. 279-282 - Iacopo Carreras, Juwel Rana, Luigi Telesca:
Coordination protocol for financial application in delay tolerant networks. 283-286
Communications Protocols
- Supratim Deb, Anand Srinivasan, Pavan Kuppili Pavan:
An improved DNS server selection algorithm for faster lookups. 288-295 - Ruay-Shiung Chang, Chun-Fu Lin, Jiing-Hsing Ruey, Shih-Chun Hsi:
An efficient and bandwidth sensitive parallel download scheme in data grids. 296-301 - Chitra Balakrishna, Khalid Al-Begain:
A reality check on sip-based streaming applications on the next generation mobile test network. 302-308
Internet security III
- Ofer Hermoni, Niv Gilboa
, Eyal Felstaine, Sharon Shitrit:
Deniability - an alibi for users in P2P networks. 310-317 - Swaminathan Pichumani, Sneha Kumar Kasera:
On implementing security at the transport layer. 318-326 - Jithesh Sathyan, Krishnananda Shenoy:
Realizing unified service experience with SaaS on SOA. 327-332
WiMAX
- Khyati Sanghvi, Piyush K. Jain, Abhijit M. Lele, Debabrata Das
:
Adaptive waiting time threshold estimation algorithm for power saving in sleep mode of IEEE 802.16e. 334-340 - Ji Hoon Lee, Taekyoung Kwon, Yanghee Choi, Sangheon Pack
:
Location management area (LMA)-based MBS handover in mobile WiMAX systems. 341-348 - Hemant Kumar Rath, Abhay Karandikar:
On TCP-aware uplink scheduling in IEEE 802.16 networks. 349-355
Communications protocols II
- Nanjun Li, Werner Zorn:
Introducing Gateway Timeout control in wireless TCP module. 357-364 - T. Rajendran, K. V. Sreenaath:
Hash optimization for cryptographically generated address. 365-369 - Damodar Banodkar, K. K. Ramakrishnan
, Shivkumar Kalyanaraman, Alexandre Gerber, Oliver Spatscheck:
Multicast instant channel change in IPTV systems. 370-379
Mobile Platforms
- Kartik Muralidharan, G. V. Karthik, Puneet Gupta, Atanu Roy Chowdhury:
mConnect: A context aware mobile transaction middleware. 381-386 - Thejovardhana Kote, S. Ramamirtham Jeyashankher, Leena Chandran-Wadia:
A large scale publish-subscribe platform for information delivery to mobile phones. 387-394 - Jae-Wook Nah, Yeong-Hun Cho, Suwook Kim, Jong-Tae Park:
Architecture for extensible mobile instant messaging and presence service over IMS. 395-400
Wireless LAN
- Guoqing Li, Srikathyayani Srikanteswara, Christian Maciocco:
Spectrum-sensing based interference mitigation for WLAN devices. 402-408 - Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar:
Fuzzy based dynamic WEP keymanagement for WLAN security enhancement. 409-414 - Ewa Kusmierek, Rajeev Koodli:
Flow fairness using aggregate packet marking for wireless mesh networks. 415-422
Communications Protocols III
- Kaliappa Nadar Ravindran, Jiang Wu, Mohammad Rabby, Kevin A. Kwiat, Ali Sabbir
:
Performance engineering of replica voting protocols for high assurance data collection systems. 424-433 - Maurelio Boari, Antonio Corradi
, Enrico Lodolo
, Stefano Monti, Samuele Pasini:
Coordination for the internet of services: A user-centric approach. 434-441 - Maarten Wijnants, Wim Lamotte
:
Managing client bandwidth in the presence of both real-time and non real-time network traffic. 442-450
Wireless Security II
- Abhishek Gupta, Joy Kuri:
Deterministic schemes for key distribution in wireless sensor networks. 452-459 - Yong-Hoon Kim, Suwook Kim, Jae-Wook Nah, Jong-Tae Park:
Extension of Fast Mobile IPv6 with multiple pre-registrations: Design and implementation. 460-464 - Iosif Androulidakis
, Chris Basios:
A plain type of mobile attack: Compromise of user's privacy through a simple implementation method. 465-470
Internetwork Handovers
- S. Vijay Anand:
Qos based handover layer for a multi-RAT mobile terminal in UMTS and Wi-MAX networks. 472-479 - Ritesh Kumar Kalle, Vidya Sagar, Sumit Kumar, Abhijit M. Lele, Debabrata Das
:
A novel interface gateway architecture for seamless interoperability between 802.11e and 802.16e. 480-487 - Vikas Bajaj:
Roaming between GSM/UMTS and IMS networks. 488-494
Wireless Sensors
- Jorge Sá Silva
, Ricardo Ruivo, Tiago Camilo, Goncalo Pereira, Fernando Boavida
:
IP in wireless sensor networks Issues and lessons learnt. 496-502 - Mohit Saxena, Puneet Gupta, Bijendra N. Jain:
Experimental analysis of RSSI-based location estimation in wireless sensor networks. 503-510 - Vaishali P. Sadaphal, Bijendra N. Jain:
Tracking target using sensor networks: target detection and route activation under energy constraints. 511-518
MANET's
- Matin Bagherpour, Mohammad Mehdi Sepehri
, Mehdi Sharifyazdi:
Approximation of a confidence interval for link distances in Mobile Ad hoc Networks. 520-527 - Jiong Wang, Sirisha Medidi:
Density-first Ad-hoc routing protocol for MANET. 528-535 - Khaleel Ur Rahman Khan
, Rafi U. Zaman
, A. Venugopal Reddy:
Integrating Mobile Ad Hoc Networks and the Internet: challenges and a review of strategies. 536-543
Wireless Handovers
- Abraham George
, Sherif Rashad, Anup Kumar, Mehmed M. Kantardzic
:
A predictive handoff scheme for multi-hop heterogeneous wireless networks. 545-550 - Yeong-Hun Cho, Kyung Yoon Oh, Jong-Tae Park:
Intelligent mobile IPv6 handover with multiple pre-registrations and late tunneling. 551-554
Wireless Sensors II
- Piyush Shah, Krishna M. Sivalingam
, Prathima Agrawal:
Efficient data gathering in distributed hybrid sensor networks using multiple mobile agents. 556-563 - Matthias Gauger, Pedro José Marrón
, Marcus Handte
, Olga Saukh, Daniel Minder, Andreas Jürgen Lachenmann, Kurt Rothermel:
Integrating sensor networks in pervasive computing environments using symbolic coordinates. 564-573 - Tuan Dinh Le, Yifei Dong
, Ren Ping Liu, Sanjay Jha
, Zvi Rosberg:
Implementation aspects of reliable transport protocols in wireless sensor networks. 574-580
Wireless QoS
- Amirali Sharifi, Eyad H. Abed:
Stability analysis for communication of voice terminals with packet reservation multiple access protocol with high propagation delays. 582-590 - Walter Colitti, Kris Steenhaut, Ann Nowé:
Multilayer traffic engineering and DiffServ in the next generation internet. 591-598 - Noëmie Simoni, Chunyang Yin, Ghislain Du Chéné:
An intelligent user centric middleware for NGN: Infosphere and AmbientGrid. 599-606
Digital Media and Security
- Yassin M. Hasan, Ammar Hassan:
Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique. 608-613 - K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal, Lalit M. Patnaik:
Robust image adaptive steganography using integer wavelets. 614-621 - N. K. Sreelaja, G. A. Vijayalakshmi Pai:
Swarm intelligence based key generation for text encryption in cellular networks. 622-629
Wireless Sensors III
- Nadeem Akhtar, Klaus Moessner
:
Capacity of grid-oriented wireless mesh networks. 631-636 - Himanshukumar B. Soni
, Uday B. Desai, S. N. Merchant:
Packet collision based Multiuser Interference (MUI) analysis for TH-PAM and TH-PPM ultra wideband (UWB) system. 637-641 - Sharmilee Yekkulur, Mohamed Suhail Vaseem Ubaidur, Krishnamurthy Kapil, Krishnan Murugan:
Energy aware distributed data gathering and aggregation protocol to improve wireless sensor network's longevity. 642-648
Industrial Communications
- Ryad Ben-El-Kezadri, Farouk Kamoun
:
A flexible channel access model for wireless network interface cards. 650-656 - Gaurav Kumar Santhalia, Sanatya Singh:
An efficient approach to lane tracking system vehicular telemetics. 657-661 - Su Jin Kim, Guofeng Deng, Sandeep K. S. Gupta, Mary Murphy-Hoye:
Intelligent networked containers for enhancing global supply chain security and enabling new commercial value. 662-669 - Ashok Chandra:
Workshop keynote speech. 670 - Ashok Chandra:
International Telecommunication Union (ITU) and decisions of world radio conference-07 wrt IMT systems and cognitive radio. 671-675 - Jun-Sik Lee, Ju-Hyung Son, Young-Hoon Park, Seung-Woo Seo:
Optimal level-homogeneous tree structure for logical key hierarchy. 677-681 - SeongHan Shin
, Kazukuni Kobara, Hideki Imai:
A security framework for personal networks. 682-690 - Mirza Salim Beg
, Ekram Khan
:
Video over wireless networks: A brief review. 692-698 - R. Sanyal:
Implementation of meid for mobile stations in CDMA network. 699-703 - Ambuj Kumar:
Wireless mobile user's location in an indoor environment - an overview. 704-707 - Evangelos Gkroustiotis:
QoS in heterogeneous mobility management. 708-712
IAMCOM 2008
- Dilip Krishnaswamy, Shanyu Zhao:
Network-aware adaptation with real-time channel statistics for wireless LAN multimedia transmissions in the digital home. 714-719 - Pradeep Macharla, Rakesh Kumar, Anil Kumar Sarje, Manoj Misra:
A QoS routing protocol for delay-sensitive applications in mobile ad hoc networks. 720-727 - A. Dadhich, Anil K. Sarje, K. Garg:
A distributed cooperative approach to improve detection and removal of misbehaving MANET nodes. 728-735 - Xianwen Hao, Yu Dai, Bin Zhang, Tingwei Chen:
Reduced Task-Resource Assignment Graph based Static scheduling for grid workflow application. 736-743 - Ankur Guha Roy, Rajdeep Mandal, Iti Saha Misra, Kalpana Saha:
Pre-emption based call admission control with QoS and dynamic bandwidth reservation for cellular networks. 745-752 - Andreas Ibing, Yosia Hadisusanto, Volker Jungnickel:
Scaleable network multicast for cooperative base stations. 753-756 - Mohammad Asadul Hoque, Farhana Afroz:
Call admission control: QoS issue for VoIP. 757-761 - Muthu Tamilarasi, S. Chandramathi, T. G. Palanivelu:
Overhead reduction and energy management in DSR for MANETs. 762-766 - Walter Colitti, Pasquale Gurzi, Kris Steenhaut, Ann Nowé:
Adaptive multilayer routing in the next generation GMPLS Internet. 768-775 - K. Haribabu
, Dayakar Reddy, Chittaranjan Hota
, Antti Ylä-Jääski, Sasu Tarkoma:
Adaptive lookup for unstructured peer-to-peer overlays. 776-782
Monitoring and sensor networks
- Kandasamy Selvaradjou, Marudachalam Dhanaraj, Buchi Goutham, C. Siva Ram Murthy:
A new battery and redundancy aware node scheduling protocol for Wireless Sensor Networks. 784-790 - Urs Hunkeler, Hong Linh Truong, Andy J. Stanford-Clark:
MQTT-S - A publish/subscribe protocol for Wireless Sensor Networks. 791-798 - Wu Jian, Li Xing Ming:
A dynamic mining algorithm of association rules for alarm correlation in communication networks. 799-802

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.