By Topic

Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on

Date 7-12 Jan. 2007

Filter Results

Displaying Results 1 - 25 of 191
  • Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops - Cover

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (443 KB)  
    Freely Available from IEEE
  • Proceedings of the 2007 2nd International Conference on Communication System Software Middleware and Workshops - Title page

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (16 KB)  
    Freely Available from IEEE
  • Copyright

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (37 KB)  
    Freely Available from IEEE
  • Sponsors

    Save to Project icon | Request Permissions | PDF file iconPDF (372 KB)  
    Freely Available from IEEE
  • General Chairs Message

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (74 KB)  
    Freely Available from IEEE
  • Steering Committee Chair Message

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (77 KB)  
    Freely Available from IEEE
  • Steering Committee Chair Message

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • TPC Chair's message

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • Workshop Chairs Message

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • Workshop Chairs Message

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (83 KB)  
    Freely Available from IEEE
  • Tutorial Chairs Message

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (79 KB)  
    Freely Available from IEEE
  • COMSBIZ Chairs welcome letter

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (55 KB)  
    Freely Available from IEEE
  • Keynote Speaker- N.R. Narayana Murthy

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (84 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker - Kiran Karnik

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (73 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker - Prof. Jim Kurose

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (52 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker - Prof. Dipankar Raychaudhuri

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (55 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker - Dr. Hamid Ahmadi

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (120 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speaker

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (102 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speaker

    Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (53 KB)  

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (9 KB)  
    Freely Available from IEEE
  • A Peer-to-Peer Scheme to Discover and Select QoS Enhanced Alternate Paths

    Page(s): 1 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5387 KB) |  | HTML iconHTML  

    Increasing number of communication softwares are built on distributed architectures based on the Peer-to-Peer (P2P) model, such as Skype [1], and PeerCast [2]. This model provides several significant benefits, such as deployment scalability, resilience to single points of failure, communication cost sharing, and anonymity. In a former contribution, we proposed an unstructured Super-Peer architecture (SPAD) that further uses the P2P paradigm to provide enhanced Quality of Service (QoS) between two users of these communication softwares. SPAD allows the discovery and use of composite alternate end-to-end paths that experience better delay than the path given by the default IP routing mechanisms. This paper extends SPAD's capabilities to multi-QoS constrained alternate-paths. It presents two extensions: i) the capability to discover alternate paths with better packet-loss and/or delay, ii) multiple schemes to select among the discovered paths the ones that best meets the requirements of the users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPROMISE: Reliable Multi-Sender Algorithm for Peer-to-Peer Networks

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3862 KB) |  | HTML iconHTML  

    Due to the constraints of P2P networks (such as bandwidth limitation) multiple senders should be employed for reliable multimedia streaming. This paper introduces a mathematic approach to select a set of senders among all available senders to provide the most reliable stream for the receiver. This selection is based on upload bandwidths and availability of peers as well as bandwidth of links connecting the senders and the receiver. Our method is called IPROMISE as it is an improved version of the PROMISE algorithm. Simulation results demonstrate improved media quality delivered to the receiver, while the complexity of sender selection remains the same. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation of Fujiwhara Effect on a Structured Agent-Based Peer-to-Peer System

    Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3975 KB) |  | HTML iconHTML  

    We present an agent-based P2P system, called Visitant, to integrate mobile agent technology with P2P computing. The use of structured P2P systems as the base layer allows agents to efficiently locate resources and communicate with each other. It also allows us to incorporate a security control mechanism to prevent malicious hosts from colluding with each other to paralyze the system. To demonstrate Visitant, we built an application to simulate Fujiwhara effect-the tendency of two nearby tropical cyclones to rotate around each other. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Enhancement in Hierarchical Peer-to-Peer Systems

    Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1565 KB) |  | HTML iconHTML  

    Increased popularity of decentralized peer-to-peer (P2P) architecture comes with several challenges, like how to handle efficient lookup and query routing, frequent joining and leaving of nodes and scalability problem. Several key based deterministic routing approaches in a structured P2P networks have been proposed to overcome with these problems. Still, problems become worse if nodes are heterogenous in processing speed, power, stability and storage capability. To bridge the heterogeneity, we propose a 2-tier hierarchical distributed hash table (DHT) in which nodes are classified into three categories: temporary, stable and fully stable nodes. We have achieved intra-group lookup and query routing in O(log(|Gj|)) steps, where |Gj| is the number of (super)peers in destination group Gj, while inter-group lookup in O(1) steps. We have also saved at least 66.67% messages in repairing the routing table due to frequent joining and leaving of nodes in average case. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (9 KB)  
    Freely Available from IEEE