default search action
1. COMSWARE 2006: New Delhi, India
- Victor Bahl, Bijendra Nath Jain, Henning Schulzrinne, Alfred Z. Spector:
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), January 8-12, 2006, New Delhi, India. IEEE 2006, ISBN 0-7803-9574-3
Sensor Networks
- Ashima Gupta, Chao Gui, Prasant Mohapatra:
Exploiting multi-channel clustering for power efficiency in sensor networks. 1-10 - Suman Roy, Debapriyay Mukhopadhyay, Chandrashekhar Thejaswi P. S.:
A Sensor network design from a probabilistic automaton model of impersonation attack. 1-7 - Kirsten Terfloth, Georg Wittenburg, Jochen H. Schiller:
FACTS - A rule-based middleware architecture for wireless sensor networks. 1-8
Security
- Suresh Reddy, Sukumar Nandi:
Modular approach for anomaly based NIDS. 1-6 - Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor, S. K. Gupta:
Utilizing network features for privacy violation detection. 1-10 - Somanath Tripathy, Atanu Roy Chowdhury, Sukumar Nandi:
CARA: Cellular automata based remote-user authentication scheme. 1-4
Mobile Ad Hoc
- Ajay Agarwal, Bijendra N. Jain:
QoS-constrained fault-tolerant routing in MANETs based on segment-backup paths. 1-9 - Dominique Dudkowski, Pedro José Marrón, Kurt Rothermel:
Efficient algorithms for probabilistic spatial queries in mobile ad hoc networks. 1-10 - Ash Mohammad Abbas, Bijendra Nath Jain:
Mitigating overheads and path correlation in node-disjoint multipath routing for mobile ad hoc networks. 1-7
Network Management and Operations
- Ashok Singh Sairam, Gautam Barua:
Effective bandwidth utilisation in multihoming networks. 1-8 - Xue Li, Sanjoy Paul:
Class-based bandwidth allocation and admission control for QoS VPN with DiffServ. 1-10 - R. Sai Anand, Thomas Erlebach:
Call control on lines. 1-6
Sensor Networks
- Tuan Dinh Le, Nadeem Ahmed, Nandan Parameswaran, Sanjay K. Jha:
Fault repair framework for mobile sensor networks. 1-8 - Mark Ivester, Alvin S. Lim:
Interactive and extensible framework for execution and monitoring of wireless sensor networks. 1-10 - Vaishali P. Sadaphal, Bijendra N. Jain:
Spread-based heuristic for sensor selection in sensor networks. 1-9 - Kumar Padmanabh, Rajarshi Roy:
Multicommodity flow based routing in wireless sensor network with lifetime latency tradeoff. 1-10
Peer-to-Peer Networks
- Atul Singh, Mads Haahr:
A peer-to-peer reference architecture. 1-10 - Pankaj Garg, Amit Kumar, Huzur Saran:
Enhanced distributed hash tables for complex queries. 1-9 - Chaitanya Krishna Bhavanasi, Sridhar Iyer:
M2MC: Middleware for many to many communication over broadcast networks. 1-10
WLAN/Ad-Hoc Networks
- Atanu Guchhait, Rajeev Muralidhar, Ajay Bakre:
Performance of real-time traffic in edca-based IEEE 802.11 b/g WLANS. 1-7 - Mohammad M. Rashid, Ekram Hossain, Majid Khabbazian, Vijay K. Bhargava:
On access-based self-organized clustering in ad hoc mobile wireless networks. 1-8 - Ash Mohammad Abbas, Bijendra Nath Jain:
Path diminution is unavoidable in node-disjoint multipath routing with single route discovery. 1-10 - Sachin Ganu, Maximilian Ott, Ivan Seskar, Dipankar Raychaudhuri:
Architecture and framework for supporting open-access multi-user wireless experimentation. 1-9 - Shushan Zhao, Daniel Jaskiewicz, Jouni Karvo:
A deployment tool for public safety ad-hoc networks. 1-6
Network-/Transport-/Application-Layer
- Ramachandran Ramjee, Furquan Ansari, Martin Havemann, T. V. Lakshman, Thyagarajan Nandagopal, Krishan K. Sabnani, Thomas Y. C. Woo:
Separating control software from routers. 1-10 - M. Ranganathan, Jean Deruelle, Doug Montgomery:
Programmable active services for SIP. 1-8 - Henning Schulzrinne:
The SIMPLE presence and event architecture. 1-9 - Masahiko Takahashi, Akihito Kohiga, Tomoyoshi Sugawara, Atsuhiro Tanaka:
TCP-Migration with application-layer dispatching: A new HTTP request distribution architecture in locally distributed web server systems. 1-10 - Shourya P. Bhattacharya, Varsha Apte:
A measurement study of the Linux TCP/IP stack performance and scalability on SMP systems. 1-10
Home Networking/Services
- Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva Lijding, Georgi Koprinkov, Paul J. M. Havinga:
WLAN location sharing through a privacy observant architecture. 1-10 - Moinul H. Khan, Vijay K. Madisetti:
A multidomain modeling and simulation for advanced services design. 1-9
Transport-/Application-Layer
- Vivek Jaiswal, Sanjay Kumar:
Intel® IXP28XX network processor based NG edge router. 1-12 - Josep Domenech, Julio Sahuquillo, Ana Pont, José A. Gil:
Design keys to adapt web prefetching algorithms to environment conditions. 1-7 - Kaliappa Nadar Ravindran, Jun Wu:
Dynamic protocol plug-in: A middleware provision for enhancing network service performance. 1-11
SDR/Cellular
- Bin Bin Chen, Mun Choon Chan:
Resource management in heterogenous wireless networks with overlapping coverage. 1-10 - Suresh Kalyanasundaram, Rajeev Agrawal:
An efficient radio admission control algorithm for 2.5G/3G cellular networks. 1-7 - M. Vastram Naik, Ratnajit Bhattacharjee, Anil Mahanta, Harshal B. Nemade:
Blind adaptive recognition of different QPSK modulated signals for software defined radio applications. 1-6 - Yogita Ramesh Dixit, Sameer Muhammed:
Performance trade-offs of a software defined radio for 2G and 3G cellular mobile communication standards. 1-5
Real-Time Applications/Services
- Shipra Agrawal, P. P. S. Narayan, Jeyashankher Ramamirtham, Rajeev Rastogi, Mark A. Smith, Ken Swanson, Marina Thottan:
VoIP service quality monitoring using active and passive probes. 1-10 - Vidyut Samanta, Ricardo V. Oliveira, Advait Dixit, Parixit Aghera, Petros Zerfos, Songwu Lu:
Impact of video encoding parameters on dynamic video transcoding. 1-9 - Arava Uday Kumar, Srikanth Ballal Kunjibettu, Suresh S. Bhat, Dipanjan Dutta:
A low-cost disaster recovery method for H.323 based VoIP network. 1-9
Mobility and Wireless
- K. Gopinath:
Access control in communication systems. 1-8 - Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient cooperative caching in ad hoc networks. 1-8 - Jörg Hähner, Christian Becker, Pedro José Marrón, Kurt Rothermel:
Maintaining update-linearizability for replicated information in MANETs. 1-10
Software/Hardware
- Antonio Mana, Antonio Muñoz:
Protected computing vs. trusted computing. 1-7 - Davide Pozza, Riccardo Sisto, Luca Durante, Adriano Valenzano:
Comparing lexical analysis tools for buffer overflow detection in network software. 1-7
Mobility and Wireless
- Xianping Wu, Osama Dandash, Phu Dung Le, Bala Srinivasan:
The design and implementation of a wireless payment system. COMSWARE 2006 - Vanzara Rakeshkumar, M. Misra:
An efficient mechanism for connecting MANET and internet through complete adaptive gateway discovery. 1-5 - Telemaco Melia, Amardeo Sarma, Rui L. Aguiar, Dieter Hogrefe:
Case study on the use of SDL for specifying an IETF micro mobility protocol. 1-5 - Zoe Antoniou, Govindarajan Krishnamurthi, Franklin Reynolds:
Intuitive service discovery in RFID-enhanced networks. 1-5 - Han Sang Kim, Jin Wook Lee, Sandeep K. S. Gupta, Yann-Hang Lee:
Trust-propagation based authentication protocol in multihop wireless home networks. 1-5
Distributed Systems and Network Management
- Kaliappa Nadar Ravindran, Kevin A. Kwiat, Ali Sabbir, Bei Cao:
Replica voting: A distributed middleware service for real-time dependable systems. 1-7 - Tarun Banka, Panho Lee, Anura P. Jayasumana, V. Chandrasekar:
Application aware overlay one-to-many data dissemination protocol for high-bandwidth sensor actuator networks. 1-5 - Umesh Bellur, Nanjangud C. Narendra:
Towards a programming model and middleware architecture for self-configuring systems. 1-6 - Mohit S. Malhan, Rushin N. Shah:
Dynamic system activity profile forecasting for improved resource selection in quality of service based grid computing model. 1-5
Mobility and Wireless
- Vijay T. Raisinghani, Sridhar Iyer:
Architecting protocol stack optimizations on mobile devices. 1-10 - Anders Lindgren, Kaustubh S. Phanse:
Evaluation of queueing policies and forwarding strategies for routing in intermittently connected networks. 1-10 - Govindarajan Krishnamurthi, Tat-Keung Chan:
Using the liberty alliance architecture to secure ip-level handovers. 1-10
Miscellaneous
- Jarkko Tolvanen, Tapio Suihko, Jaakko Lipasti, N. Asokan:
Remote storage for mobile devices. 1-9 - Salem Hadim, Nader Mohamed:
Middleware for wireless sensor networks: A survey. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.