default search action
1. NetCoM 2009: Chennai, India
- First International Conference on Networks and Communications, NetCoM 2009, Chennai, India, December 27-29, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3924-9
Adhoc and Sensor Networks
- Sumathy Subramaniam, B. Upendra Kumar:
Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks. 1-6 - K. Thanigaivelu, K. Murugan:
Impact of Sink Mobility on Network Performance in Wireless Sensor Networks. 7-11 - Ehsan Heidari, Ali Movaghar:
Intelligent Clustering in Wireless Sensor Networks. 12-17 - Sanat Sarangi, Subrat Kar:
A Novel Algorithm for Graded Precision Localization in Wireless Sensor Networks. 18-22 - Pankaj Gupta, Tarun Bansal, Manoj Misra:
MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor Networks. 23-27 - Abhishek Samanta, Dripto Bakshi, Amitava Mukherjee, Mita Nasipuri:
Energy Efficient Wireless Sensor MAC Protocol for Collision Avoidance. 28-33 - Neeraj Kumar Nehra, Manoj Kumar, R. B. Patel:
Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks. 34-39 - Jianwen Niu, Chang Liu, Jian Ma:
Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks. 40-45 - Rajiv Misra, Ajay Shukla:
K Bipartite Partitioning Algorithm for Channel Allocation Problem in Wireless Mesh Networks. 46-51 - Muhannad Quwaider, Azizah Muhammad, Jongeun Choi, Subir Biswas:
Posture-Predictive Power Control in Body Sensor Networks Using Linear-Quadratic Gaussian Control. 52-59 - Behnam Dezfouli, Marjan Radi, Mohammad Ali Nematbakhsh:
Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor Networks. 60-65
Heterogeneous Wireless, WLAN, and Mobile Networks
- Chandravva Hebbi, S. V. Saboji:
Vertical Handoff in Heterogeneous Wireless Mobile Networks. 66-71 - Arun Prakash, Rajesh Verma, Rajeev Tripathi, Kshirasagar Naik:
Multiple Mobile Routers Based Seamless Handover Scheme for Next Generation Heterogeneous Networks. 72-77 - Samir K. Sadhukhan, Swarup Mandal, Debashis Saha:
A Practical Approach for Planning WLAN Deployment under 3G Cellular Network. 78-82 - B. Malarkodi, B. Prasana, B. Venkataramani:
A Scheduling Policy for Battery Management in Mobile Devices. 83-87 - Suparna DasGupta, Rituparna Chaki:
AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc Networks. 88-92 - Hyo-Beom Lee, Youn-Hee Han, Sung-Gi Min:
Node Mobility Support Scheme Between the Mobile Network and PMIPv6 Networks. 93-97 - Asish K. Mukhopadhyay, Sajal Saha, Suranjan Ghose, Debasish Saha, Dhinaharan Nagamalai:
An Analytical Model of Multi-service Call Admission Control in Next Generation Wireless Overlay Networks. 98-103 - Shikha Goel, Sudesh Kumar:
An Improved Method of Detecting Spoofed Attack in Wireless LAN. 104-108
Measurement and Performance Analysis
- Omar Almomani, Osman Gazali, Suhaidi Hassan:
Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet. 109-112 - S. Geetha, Siva S. Sivatha Sindhu, V. Kabilan, N. Kamaraj:
High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGA. 113-118 - Anand Gupta, Harsh Bedi, M. S. Don Bosco, Vinay Shashidhar:
Accuracy of 3D Location Computation in GSM Through NS2. 119-122 - Shamala Subramaniam, Sangeetha Thavamani, Moqry A:
Cricket/Mica2 Based Discrete Event Simulator for WiHoc Ver.1.0 Localization Analysis. 123-128 - Marcharla Anjaneyulu Bhagyaveni, K. Rajeswari:
Performance Improvement of Wireless Sensor Networks Using Layered Space Time Codes. 129-134 - Mohammed M. Kadhum, Suhaidi Hassan:
The FN Quadratic Marking/Dropping Probability Function. 135-140 - Anu Bala, Munish Bansal, Jagpreet Singh:
Performance Analysis of MANET under Blackhole Attack. 141-145 - Nilesh B. Prajapati, Rupal R. Agravat, Mosin I. Hasan:
Comparative Study of Various Cooling Schedules for Location Area Planning in Cellular Networks Using Simulated Annealing. 146-150
Network Architectures, Protocols, and Routing
- (Withdrawn) A Pascal Graph Property and Computer Network Topology. 151-154
- A. Revathi, Y. Venkataramani:
Perceptual Features Based Isolated Digit and Continuous Speech Recognition Using Iterative Clustering Approach. 155-160 - Yaser Miaji, Suhaidi Hassan:
Just Queueing (JQ): Scheduling Algorithm for the Internet. 161-165 - A. Nagaraju, B. Eswar:
Performance of Dominating Sets in AODV Routing Protocol for MANETs. 166-170 - Muhannad Quwaider, Subir Biswas:
On-body Packet Routing Algorithms for Body Sensor Networks. 171-177 - Balakannan S. P, Yier Yan, Jae Seung Yang, Moon Ho Lee:
End-to-End Network Delay-Constrained for QoS Multicast Routing. 178-183 - Kamaljit I. Lakhtaria:
Enhancing QoS and QoE in IMS Enabled Next Generation Networks. 184-189
Network Operations and Management
- Siva Rama Krishnan Somayaji, Ch. A. S. Murty:
Securing Internet Protocol (IP) Storage: A Case Study. 190-195 - Girish Kumar Patnaik, M. M. Gore:
Tree-Like Peer-to-Peer Symmetric Key Management in Mobile Ad Hoc Network. 196-201 - Sasthi C. Ghosh, Roger M. Whitaker, Stuart M. Allen, Steve Hurley:
Service Coverage Bounds Through Efficient Load Approximation in UMTS Network Planning. 202-207 - S. Muthuramalingam, P. Janani, B. Bavya, R. Rajaram:
An Energy-Conserving Topology Maintenance Algorithm for MANETs. 208-213 - Mydhili K. Nair, V. Gopalakrishna:
Agent Based Web Services with RuleML for Network Management. 214-219 - Boyoung Lee, Sojung Yang, Deokjai Choi:
A Status Monitoring System Design/Implementation for Home Appliances Controlled by Home Server. 220-223 - B. Jagadeesh, Samayamantula Srinivas Kumar, K. Raja Rajeswari:
A Genetic Algorithm Based Oblivious Image Watermarking Scheme Using Singular Value Decomposition (SVD). 224-229 - Kilari Veera Swamy, B. Chandra Mohan, Y. V. Bhaskar Reddy, Samayamantula Srinivas Kumar:
Energy Based Quantization for Image Compression Using Contourlet Transform. 230-234
Network Security, Trust, and Privacy
- Reshmi Maulik, Nabendu Chaki:
PhishNet: Enhancing the Security Aspect of IMS Users. 235-239 - Padmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta:
Fault Analysis of Security Policy Implementations in Enterprise Networks. 240-245 - A. John Prakash, V. Rhymend Uthariaraj:
Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication. 246-253 - Mosin I. Hasan, Nilesh B. Prajapati:
An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers. 254-258 - Keiichi Sakakima, Shingo Ata, Hiroshi Kitamura:
Anonymous but Traceable IP Address-Based Communication System. 259-264 - K. B. Chandradeep:
A Scheme for the Design and Implementation of a Distributed IDS. 265-270 - Miyeon Yoon, Kwangkyum Lee, Mijoo Kim, Yongtae Shin:
Secure Mobile Multicast Handoff Mechanisms Using a Time-Limited Key. 271-276 - K. Saravanan, Arunkumar Thangavelu, K. Rameshbabu:
A Middleware Architectural framework for Vehicular Safety over VANET (InVANET). 277-282 - Nirnay Ghosh, Soumya K. Ghosh:
An Approach for Security Assessment of Network Configurations Using Attack Graph. 283-288 - Saurav Muralidharan, Sajin Koroth, Nevil Anto, Rafeeque Pandarachalil:
Galaxia: A Semi-decentralized System for Implementing Secure-Group P2P Networks. 289-294 - Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai:
"Reminder: please update your details": Phishing Trends. 295-300
GRAPH-HOC 09: First Workshop on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks
- Ashwin Ganesan:
On Some Sufficient Conditions for Distributed Quality-of-Service Support in Wireless Networks. 301-306 - Sarvesh Kumar Varatharajan, Gunes Ercal-Ozkaya:
On a Local Heuristic for a Reverse Multicast Forwarding Game. 307-312 - Osman Yagan, Armand M. Makowski:
Random Key Graphs. 313-318 - Kiran K. Somasundaram, John S. Baras:
Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks. 319-325 - Wouter Horré, Kevin Lee, Danny Hughes, Sam Michiels, Wouter Joosen:
A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks. 326-331
WiMoNe 2009: First International Workshop on Wireless and Mobile Networks
- Kaushik Ghosh, Sarbani Roy, Pradip K. Das:
An Alternative Approach to Find the Fermat Point of a Polygonal Geographic Region for Energy Efficient Geocast Routing Protocols: Global Minima Scheme. 332-337 - Sajal Saha, Subhasree Bhattacharjee, Rajib Nath Bhowmick, Asish K. Mukhopadhyay, Dhinaharan Nagamalai:
Analysis of Hierarchical Mobile IP Based Fast Mobility Management Schemes. 338-343 - Stanislav Nonchev, Mikko Valkama:
Efficient Power-Aware Packet Scheduling for Multiantenna Packet Radio Systems. 344-348 - Susmita Das, Bikramaditya Das:
Time Domain Equalization Technique Using RAKE-MMSE Receivers for High Data Rate UWB Communication System. 349-353 - Gaurav Kapoor, Selwyn Piramuthu:
Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols. 354-357 - Chia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin:
Anomaly Behavior Analysis for Web Page Inspection. 358-363 - Sheng-Tzong Cheng, Bo-Fu Chen, Chih-Lun Chou:
Fairness Strategy and Scheduling Algorithm for IEEE 802.16 Wireless Access Systems. 364-369
NCS 2009: The First International Workshop on Network and Communications Security
- Xu Huang, Dharmendra Sharma:
Fuzzy Switching Controller for the Security in 802.11 Networks. 370-375 - A. Nagaraju, Ch. Ramya Krishna:
Performance Evaluation of ADV with AODV for Mobile Ad-hoc Networks. 376-380 - Natarajan Jaisankar, R. Saravanan, K. Durai Swamy:
An Agent Based Security Framework for Protecting Routing Layer Operations in MANET. 381-385 - M. K. Kavitha Devi, P. Venkatesh:
An Improved Collaborative Recommender System. 386-391 - Jilong Li, Jangkyu Yun, Junhyung Kim, Icksoo Lee, Kijun Han:
A Handoff Management Scheme for Mobile Station in Wireless Body Area Mesh Networks. 392-395 - Kihyun Kim, Ick-Soo Lee, Mahnsuk Yoon, Junhyung Kim, Honggil Lee, Kijun Han:
An Efficient Routing Protocol Based on Position Information in Mobile Wireless Body Area Sensor Networks. 396-399 - Sooyeol Yang, Jeongbae Yun, Jangkyu Yun, Honggil Lee, Kijun Han:
Analysis and Proposal of Wireless Mesh Network's Routing Metric for WBAN. 400-403 - Young-mi Baek, Byung-hwa Lee, Jeongbae Yun, Keuchul Cho, Kijun Han:
A Self-Adjustable Rate Control in Wireless Body Area Networks. 404-407 - S. Gowrishankar, Subir Kumar Sarkar, T. G. Basavaraju:
Simulation Based Performance Comparison of Community Model, GFMM, RPGM, Manhattan Model and RWP-SS Mobility Models in MANET. 408-413 - V. Vijayaraghavan, Sanjoy Kumar Paul:
iMeasure Security (iMS): A Novel Framework for Security Quantification. 414-421 - Samrat Mondal, Shamik Sural:
Supporting Negative Authorization in Spatiotemporal Role Based Access Control. 422-427 - Alper Ugur, Ibrahim Sogukpinar:
A Framework for Licensed Digital Signatures. 428-432 - Turker Akyuz, Ibrahim Sogukpinar:
Packet Marking with Distance Based Probabilities for IP Traceback. 433-438 - Mohammad Yamin, Yasser Ades:
Crowd Management with RFID and Wireless Technologies. 439-442
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.