By Topic

Computer and Information Technology, 2009. CIT '09. Ninth IEEE International Conference on

Date 11-14 Oct. 2009

Go

Filter Results

Displaying Results 1 - 25 of 78
  • [Front cover - Vol 2]

    Publication Year: 2009 , Page(s): C1
    Request Permissions | PDF file iconPDF (838 KB)  
    Freely Available from IEEE
  • [Title page i - Volume 2]

    Publication Year: 2009 , Page(s): i
    Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2009 , Page(s): iii
    Request Permissions | PDF file iconPDF (98 KB)  
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2009 , Page(s): iv
    Request Permissions | PDF file iconPDF (147 KB)  
    Freely Available from IEEE
  • Table of contents - Volume 2

    Publication Year: 2009 , Page(s): v - ix
    Request Permissions | PDF file iconPDF (178 KB)  
    Freely Available from IEEE
  • Preface - Volume 2

    Publication Year: 2009 , Page(s): x
    Request Permissions | PDF file iconPDF (118 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • CIT 2009 Organizing and Program Committees - Volume 2

    Publication Year: 2009 , Page(s): xi - xiv
    Request Permissions | PDF file iconPDF (82 KB)  
    Freely Available from IEEE
  • Welcome Message from the NSTC 2009 Workshop Chairs - Volume 2

    Publication Year: 2009 , Page(s): xv
    Request Permissions | PDF file iconPDF (94 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • NSTC 2009 Organizing and Program Committees - Volume 2

    Publication Year: 2009 , Page(s): xvi
    Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • Welcome Message from the ACCT 2009 Workshop Chairs - Volume 2

    Publication Year: 2009 , Page(s): xvii
    Request Permissions | PDF file iconPDF (84 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • ACCT 2009 Organizing and Program Committees - Volume 2

    Publication Year: 2009 , Page(s): xviii
    Request Permissions | PDF file iconPDF (75 KB)  
    Freely Available from IEEE
  • Welcome Message from the WiMoA 2009 Workshop Chairs - Volume 2

    Publication Year: 2009 , Page(s): xix
    Request Permissions | PDF file iconPDF (84 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • WiMoA 2009 Organizing and Program Committees - Volume 2

    Publication Year: 2009 , Page(s): xx - xxii
    Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • Keynote Speeches - Volume 2

    Publication Year: 2009 , Page(s): xxiii - xxvi
    Request Permissions | Click to expandAbstract | PDF file iconPDF (221 KB)  

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-Perceived Reliability of Shared Protection Systems with a Finite Number of Repairers

    Publication Year: 2009 , Page(s): 3 - 8
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (361 KB) |  | HTML iconHTML  

    In this paper we investigate the user-perceived availability and Mean Time to Failure (MTTF) of M-for-N shared protection systems with a finite number of repairers. We assume that there are M backup units, N mutually independent users' (working) units, and C repairers (1 les Cles M + N)We investigate a Markov-chain model (with failure rate lambda per unit, repair rate mu per repairer) that is subj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks

    Publication Year: 2009 , Page(s): 9 - 15
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1063 KB) |  | HTML iconHTML  

    A wireless sensor network (WSN) is composed of a large number of sensor nodes which are resource constraints, e.g., limited power. This drives research on how to design routing protocols to gather data efficiently so that the life of the network can be prolonged. A usual concept to collect data by a sink node is to transfer data from sensor nodes to the sink node by multi-hop. However, it gives ri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Top-k Query Scheme in Unstructured P2P Networks

    Publication Year: 2009 , Page(s): 16 - 21
    Request Permissions | Click to expandAbstract | PDF file iconPDF (295 KB) |  | HTML iconHTML  

    There're two major problems in the unstructured p2p systems, one is their heavy network traffic; the other is the problem of query effectiveness, which is caused mainly by high numbers of query answers, many of which are irrelevant for users. A potential solution is to use Top-k queries. The objective of a top-k query is to find the k highest ranked answers to the user defined similarity function.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of End-to-End Loss Differentiation Algorithms in Multi-hop Wireless Networks

    Publication Year: 2009 , Page(s): 22 - 27
    Request Permissions | Click to expandAbstract | PDF file iconPDF (241 KB) |  | HTML iconHTML  

    When TCP operates in wireless networks, it suffers from severe performance degradation. This is because TCP reacts to wireless packet losses by unnecessarily slowing down its sending rate. Although several loss differentiation schemes are proposed to avoid such performance reduction, their accuracies were not evaluated in multi-hop wireless networks because these schemes are designed for only the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Calculating Minimum Buffer Requirement of Constant Rate Transmission Scheme Based on SVM

    Publication Year: 2009 , Page(s): 28 - 33
    Request Permissions | Click to expandAbstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    Constant rate transmission and transport (CRTT) is an effective bandwidth smoothing scheme resulting in one fixed rate during the whole duration of variable bit-rate video, which, however, needs a large client buffer size. The minimum buffer requirement (MBR) of CRTT, besides benefiting the design of some piecewise transmission scheme, can examine whether we can transmit the requested video with a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Tag Collision Detection Method for Active RFID Systems

    Publication Year: 2009 , Page(s): 34 - 39
    Request Permissions | Click to expandAbstract | PDF file iconPDF (294 KB) |  | HTML iconHTML  

    We propose an efficient tag collision detection method using the asynchronous mode of the RF transceiver for active RFID systems. In the proposed method, active RFID tags communicate using the synchronous mode of the RF transceiver to reduce the packet processing overheads and power consumption, but the active RFID reader uses the asynchronous mode for packet reception from the tags to detect the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Partition-Based LEACH Algorithm for Wireless Sensor Networks

    Publication Year: 2009 , Page(s): 40 - 45
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (431 KB) |  | HTML iconHTML  

    Wireless sensor networks (WSN) have been considered as a promising method for reliably monitoring both civil and military environments under hazardous or dangerous conditions. Due to such environments, the power supplies for sensors in the network are not usually rechargeable or replaceable. Therefore, the energy efficiency is critical for the lifetime and cost of WSN. Numerous mechanisms have bee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TACS: A Transparent Application Bandwidth Management System

    Publication Year: 2009 , Page(s): 46 - 51
    Request Permissions | Click to expandAbstract | PDF file iconPDF (549 KB) |  | HTML iconHTML  

    With the rapid advance of computer and network technology, more and more applications are deployed in the customer-side network. These applications require different quality of service (QoS), but have to share a few bandwidth limited Internet connections. Owing to the IP network's best-effort delivery mechanism, the QoS requirements are hard to be satisfied. There have been plenty of QoS solutions... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative Wireless Sensor Network Positioning Based on Time Synchronization

    Publication Year: 2009 , Page(s): 52 - 57
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (403 KB) |  | HTML iconHTML  

    Recently, the sensor network that combines the wireless data transmission, data sinking, and information processing capacities, is a gathering more and more attentions. With the development of research on wireless sensor networks, localization-the determination of the absolute or relative position of sensor nodes is becoming an essential research issue. In this paper, we propose an iterative posit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Modelling of IEEE 802.15.4 MAC in LR-WPAN with Bursty ON-OFF Traffic

    Publication Year: 2009 , Page(s): 58 - 62
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is uniquely designed to meet the requirements of the low data-rate, low power-consumption applications in the Low Rate Wireless Personal Area Network (LR-WPAN). The analytical models of 802.15.4 MAC reported in the literature have been mainly developed under the assumptions of saturated traffic or non-bursty unsaturated traffic conditions. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-Aware Channel Sensing Scheduling in Cognitive Radio Networks

    Publication Year: 2009 , Page(s): 63 - 68
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (510 KB) |  | HTML iconHTML  

    Cognitive radio (CR) has been considered as the most prominent technique for flexible spectrum utilization. Protecting primary users (PUs) from any harmful interference is the most important issue in CR networks. Secondary users (SUs) periodically sense the channels in order to detect the PU's appearance. Without a proper sensing schedule, however, sensing operation may degrade the quality of serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.