By Topic

Computers and Communications, 2006. ISCC '06. Proceedings. 11th IEEE Symposium on

Date 26-29 June 2006

Filter Results

Displaying Results 1 - 25 of 170
  • 11th IEEE Symposium on Computers and Communications - Cover

    Publication Year: 2006 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (225 KB)  
    Freely Available from IEEE
  • 11th IEEE Symposium on Computers and Communications - Title

    Publication Year: 2006 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (127 KB)  
    Freely Available from IEEE
  • 11th IEEE Symposium on Computers and Communications - Copyright

    Publication Year: 2006 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (97 KB)  
    Freely Available from IEEE
  • 11th IEEE Symposium on Computers and Communications - TOC

    Publication Year: 2006 , Page(s): v - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (192 KB)  
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2006 , Page(s): xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (139 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2006 , Page(s): xix - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (142 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2006 , Page(s): xxi
    Save to Project icon | Request Permissions | PDF file iconPDF (144 KB)  
    Freely Available from IEEE
  • Technical Progrram Committee

    Publication Year: 2006 , Page(s): xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (150 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2006 , Page(s): xxiii - xxv
    Save to Project icon | Request Permissions | PDF file iconPDF (160 KB)  
    Freely Available from IEEE
  • Towards Integrated Wireless Systems: Inter-Mode Monitoring Techniques

    Publication Year: 2006 , Page(s): 3 - 7
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (320 KB) |  | HTML iconHTML  

    Inter-operation between the heterogeneous wireless networks and systems available now and in the future is of considerable interest. Fundamental to such work is the ability to discover available alternative systems, and to monitor these modes to determine whether they are more attractive in some way than the current system. This paper presents a survey of different solutions to the problem of mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WISENEP: A Network Processor for Wireless Sensor Networks

    Publication Year: 2006 , Page(s): 8 - 14
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (608 KB) |  | HTML iconHTML  

    Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources and one or more base stations, which are much more powerful laptopclass nodes that connect the sensor nodes to the rest of the world. The advent of this tecnology over the last decade enables largescale deployment of such sensors. On the other hand, this poses the challenging of how the great... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Support of Real-Time Services over Integrated 802.16 Metropolitan and Local Area Networks

    Publication Year: 2006 , Page(s): 15 - 22
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (512 KB) |  | HTML iconHTML  

    The growing demand of high bandwidth services and applications, and the increasing will of access to these services anywhere, is motivating the requirement to integrate the current Internet with the mobile networks. However, there will always be remote areas where Internet access will be difficult to achieve. The IEEE 802.16 is an attractive broadband wireless technology for these scenarios, non-w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Synchronization Scheme for OFDM WLANs Using Cyclic-Shifted Preamble

    Publication Year: 2006 , Page(s): 23 - 28
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (256 KB) |  | HTML iconHTML  

    In this paper, we present a novel cyclic-shifted preamble which is suitable for use in synchronization in orthogonal frequency division multiplexing (OFDM) wireless local area networks (WLANs). Based on the novel cyclic-shifted preamble, we proposed two improved symbol timing estimators and a joint estimation method for carrier frequency and sampling clock offsets. It is shown that by simulations,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Characterization and Evaluation of Mobile Attack Strategies in Wireless Ad Hoc Networks

    Publication Year: 2006 , Page(s): 29 - 34
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (456 KB) |  | HTML iconHTML  

    The spread of active attacks has become a frequent cause of vast systems breakdown in modern communication networks. In this paper, we first present a probabilistic modeling framework for the propagation of an energy-constrained mobile threat in a wireless ad hoc network. The introduced formulation is used to identify and evaluate different attack strategies and approaches, which in turn can help ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Wireless Distributed Intrusion Detection System and a New Attack Model

    Publication Year: 2006 , Page(s): 35 - 40
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (192 KB) |  | HTML iconHTML  

    Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propose a distributed intrusion detection system in which each node monitors the traffic flow on the network and collects relevant statistics about it. By combining each node’s view we are able to tell if (and which type o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security for the Mythical Air-Dropped Sensor Network

    Publication Year: 2006 , Page(s): 41 - 47
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The security aspects of such networks are addressed as well, and in particular many security papers investigating the security aspects of such networks make important assumptions about the capabilities of low-cost sensors. Conseq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multilayer Approach of Anomaly Detection for Email Systems

    Publication Year: 2006 , Page(s): 48 - 53
    Cited by:  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    Many techniques have been applied to anomaly detection to detect novel attacks, such as statistical analysis, clustering, support vector machines, neural networks and etc. Although the results are promising, there’s still a serious problem, high false positive rates, which make anomaly detection systems practically unusable. We observe that most network Intrusion Detection systems (IDSs) work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ARSL: A Language for Authorization Rule Specification in Software Security

    Publication Year: 2006 , Page(s): 54 - 62
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (240 KB) |  | HTML iconHTML  

    Web services constitute an important part of distributed applications, providing flexibility in the development of distributed applications. One of the key challenges in Web Service security is to determine whether an authenticated user has access to only those services for which he has authorization. Since all authorization patterns for accessing resources cannot be anticipated and hence the acce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication Channel Management for Maintenance of Strong Overlay Connectivity

    Publication Year: 2006 , Page(s): 63 - 68
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (216 KB) |  | HTML iconHTML  

    A fundamental problem for both structured and unstructured peer-to-peer networks is how to maintain connected the topology of a network in the presence of processes that, possibly concurrently, join and leave the network. In this paper we firstly define a model of the computation well-suited to analyze connectivity maintenance among processes carrying out a distributed computation considering unbo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing the Architecture of P2P-Based Network Management Systems

    Publication Year: 2006 , Page(s): 69 - 75
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    P2P-based network management has been recently proposed. However, the entities involved in this new management model have not been detailed up to today. In this paper we introduce the internal architecture of management peers. According to the set of elements internally employed, a management peer may act in the role of a top level or mid level manager, or in the role of a hybrid entity with mixed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GTapestry: A Locality-Aware Overlay Network for High Performance Computing

    Publication Year: 2006 , Page(s): 76 - 81
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (264 KB) |  | HTML iconHTML  

    A locality-aware overlay network for high performance computing, GTapestry, is proposed in this paper. GTapestry assembles physically neighboring nodes in the Internet into self-organized groups. The routing mechanism of GTapestry is divided into inter-group routing, used by groups that communicate with others through their leaders, and intra-group routing, used by group members to communicate wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimized Peer-to-Peer Overlay Network for Service Discovery

    Publication Year: 2006 , Page(s): 82 - 87
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    In this paper, we propose DINPeer, an optimized peer-to-peer (P2P) overlay network for service discovery by overcoming limitations in current multicast discovery approaches and P2P overlay systems. DINPeer exploits a spiral-ring method to discover an inner ring with most powerful nodes (DIN Nodes) to form a logical DINloop. With the facilitation of the DINloop, multiple DIN Nodes easily form Stein... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Semantic Overlay Network for P2P Schema-Based Data Integration

    Publication Year: 2006 , Page(s): 88 - 94
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (232 KB) |  | HTML iconHTML  

    Today data sources are pervasive and their number is growing tremendously. Current tools are not prepared to exploit this unprecedented amount of information and to cope with this highly heterogeneous, autonomous and dynamic environment. In this paper, we propose a novel semantic overlay network architecture, PARIS, aimed at addressing these issues. In PARIS, the combination of decentralized seman... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience of Conformance Testing on IPv6 Protocols

    Publication Year: 2006 , Page(s): 95 - 100
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (200 KB) |  | HTML iconHTML  

    CERNET2 is the biggest IPv6-only network in the world and one of the China Next Generation Internet (CNGI) backbones. In order to evaluate and choose the best core routers for these core nodes, we tested all the core routers based on both our IPv6 Protocol Integrated Test System (PITS) and AX4000 (invented by Spirent Company). The paper first briefly introduces IPv6, ICMPv6 and Path MTU protocols ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Embedded Linux ATM for MPC8260 and Derivatives

    Publication Year: 2006 , Page(s): 101 - 108
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    Linux over the past few years has gained in popularity as the OS fit for embedded networking equipment. Its reliability, low cost and undisputed networking capabilities made it one of the most popular choices for the networking market. This paper demystifies for the first time the performance of embedded Linux ATM on the MPC8260 communications processor and derivative CPUs. UTOPIA and serial ATM p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.