By Topic

2009 International Conference on Future Networks

7-9 March 2009

Filter Results

Displaying Results 1 - 25 of 68
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2095 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Technical Committee

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Agent-Based User-Profiling Model for Behavior Monitoring

    Publication Year: 2009, Page(s):3 - 7
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    The growing usage of cyber resources like forums, chat groups, browsing, demands the modeling of a framework that may use an individual's personality profile for simulating the user's personality in the cyberspace, Acting as a guard and guide for the respective user by determining Internet resource suitability and monitoring & controlling the user's social interactions with other users on the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Low Cost VoIP Architecture for Private Networks

    Publication Year: 2009, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    Voice over IP (VoIP) is the future of telephony service which is being widely deployed currently besides the legacy public switched telephone network (PSTN). In this paper we review a minimum cost deployment solution for VoIP for private networks using available open source tools with considering the fact that currently private networks are mostly behind the NAT and the fact that in this case VoIP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cross Layered Scheme for Broadcasting at Intersections in Vehicular Ad Hoc Networks

    Publication Year: 2009, Page(s):13 - 17
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    In this paper, we illustrate the design of a cross layered MAC and routing solution for supporting the fast propagation of broadcast messages at intersections in a vehicular ad hoc network (VANET). One of the fundamental services in VANET is broadcasting, that is a challenging task due to different road topologies and network conditions. One of its challenges is broadcasting at intersections, beca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research on Network Virtual Money Supply Model

    Publication Year: 2009, Page(s):18 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    In this paper, two virtual money supply models are set up: Virtual Money Supply Model with No Virtual Banks and Virtual Money Supply Model with Virtual Banks. In the virtual community without any financial institutions,the quantity of virtual money supply strongly depends on the player's total on-line time, which is decided by the virtual money's exchange rate and the in-game attractiveness. In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network-Based Dictionary Attack Detection

    Publication Year: 2009, Page(s):23 - 27
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    This paper describes the novel network-based approach to a dictionary attack detection with the ability to recognize successful attack. We analyzed SSH break-in attempts at a flow level and determined a dictionary attack pattern. This pattern was verified and compared to common SSH traffic to prevent false positives. The SSH dictionary attack pattern was implemented using decision tree technique. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Aware Fuzzy-Based En-route Filtering Scheme in Wireless Sensor Networks

    Publication Year: 2009, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    In sensor networks, a compromised node can generate fabricated reports, which cause severe damage such as false alarms and energy drain. An interleaved hop-by-hop authentication (IHA) scheme addresses the attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are actually nece... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOA--A Performant Paradigm of Developing Integrated Informatics Systems

    Publication Year: 2009, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    It is a fact that the field of informatics is extremely dynamic. Producers and users of software products are looking solutions to the multitude of problems they are confronted with. The focus is on finding cheap, flexible interoperating and reusable for informatic solutions which should meet the requirements of software users and which may be implemented not only by big companies but also by smal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Pow-Law Model for Internet Topology with Hierarchy

    Publication Year: 2009, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    We have understood more precise about the characteristics of Internet, which help us to test the existed network and design new network. In this paper, we analysis the process of Internet construct and propose a new model based on hierarchical framework with multi-ISP (include many routers) in accordance with the actual process of Internet construct. The model can generate a network topology with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Algorithm to Resource Reservation for Prioritized Traffic in MANETs

    Publication Year: 2009, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    In this paper we have given an algorithm for ad hoc networks with respect to their use in commercial production, emergencies, mission critical and broadcasting scenarios where real time transmission require guaranteed QoS. To service these environments our algorithm is designed in such a way so that it provide full package for handling QoS starting from the traffic categories, their route selectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Recognition of Handwritten Numbers by Extracting New Features Using Water Filling Method

    Publication Year: 2009, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    In this paper, a new method is proposed to extract the features of a one-number Persian image in which for the final verification of the extracted features, a three-layer neural network (mesh) of Perceptron has been utilized. The method, which is called Water Filling method, is capable of extracting some ideal features from a one-number image that are stable against rotation, movement, size change... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General BBV Model with High Clustering Scale-Free Networks

    Publication Year: 2009, Page(s):57 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    A weighted evolving model of scale-free network is proposed. Our model has been inspired by the weighted network model proposed by Alain Barrat et al. (BBV for shot), which consider the emergences of new links according to Triad Formation and strength preferential selection mechanism. Interactions more easily occur between neighbors with high-strength in our model. The effects of Tri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-Service Monitoring and Failure Identifying against Fiber Fault in FTTH with Passive In-Line Monitoring (PIM) Device

    Publication Year: 2009, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    This paper focuses on developing a passive in-line monitoring (PIM) device prototype, which used to tap out a small ratio of triple-play signals for in-service monitoring and failure identifying against fiber fault in fiber-to-the-home (FTTH) access network. This device will be installed with the main lines in FTTH permanently to allow the technicians to simply connect it to a portable tester unit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement and Evaluation of RFID Transmission Characteristic for Long Range Systems

    Publication Year: 2009, Page(s):65 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    The radio frequency identification (RFID) is a wireless communications that lets computer reads the identity to tag at 2:45 GHz can be fast identified the high speeds at 3 meters read range guaranteed at speeds of 100 km/hr. This paper used the model for expressway by supposing receiver moves to fixed transmitter, the microstrip antenna was used for both transmitter and receiver, The Friispsilas t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hardware Architecture of Model Predictive Control for a Real-Time Scheduling Algorithm

    Publication Year: 2009, Page(s):69 - 73
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Model predictive control or model-based prediction control is one of the most powerful tools to robust plant control. The controller, particularly in vital and sensitive processes, requires a robust optimization method of cost function such as Quadratic Programming which is very time consuming. Packet Scheduling for data transmission networks is a useful way to achieve better QoS and bandwidth opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Guaranteed Throughput and Best Effort Traffic in Network-on-Chip under Different Traffic Scenario

    Publication Year: 2009, Page(s):74 - 78
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Network on Chip (NoC) paradigm has made it possible to concurrently run multiple applications on IP-core based System on Chip. It is therefore necessary to predict the multi-processor systems-on-chip communication, which is a critical issue and needs to be addressed by the right mix of soft and hard real-time guarantees. To meet this requirement state of the art packet switched networks-on-chip (N... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solution and Optimization of FPGA Routing Algorithm

    Publication Year: 2009, Page(s):79 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    Optimized solvers for the Boolean satisfiability problem have many applications in areas such as FPGA routing, planning, and so forth. In the context of FPGA routing where routing resources are fixed, Boolean formulation methods can prove the unroutability of a given circuit, which is a clear advantage over classical net-at-a-time approaches. This paper introduces a new and efficient hybrid routin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.