By Topic

2010 24th IEEE International Conference on Advanced Information Networking and Applications

Date 20-23 April 2010

Filter Results

Displaying Results 1 - 25 of 190
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (410 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • Message from AINA 2010 General Chairs

    Publication Year: 2010, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (122 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from AINA 2010 Program Chairs

    Publication Year: 2010, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • AINA 2010 Organization Committee

    Publication Year: 2010, Page(s):xxii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • AINA 2010 PC Members/Reviewer List

    Publication Year: 2010, Page(s):xxiv - xxxiv
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • The Crucial Role of Information Communication Technology in Western Australia

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    Western Australia relies heavily on information communication technology to underpin the resources sector, from exploration to mining, refining and restoration. Continual sophisticated monitoring is also required to monitor ocean currents, as predictors of our climate and longer term monitoring of climate change. Protection of our unique biodiversity requires close observation of the environment, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Integration at Scale: From Relational Data Integration to Information Ecosystems

    Publication Year: 2010, Page(s):2 - 3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, and even national security lie hidden in the vast and growing data collections distributed across our Digital Universe. Harvesting the value of data requires finding, integrating, and analyzing data distributed across our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Network Based Software

    Publication Year: 2010, Page(s):4 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    With the increase of Internet bandwidth the World Wide Web is changing the approach for software development. Traditionally, most of the software was developed for one particular platform such as DOS, Windows, Mac, Unix or Linux and it was not portable from one system to another. Usually the user interface is system dependent and it has to be developed individually for every system. It is, however... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Photonics Based Intelligent Airport Surveillance and Tracking System

    Publication Year: 2010, Page(s):11 - 16
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (589 KB) | HTML iconHTML

    Airport terminals will increasingly require ubiquitous communications systems with high levels of computational power to provide the necessary intelligent automation to provide high quality services to passengers, stringent levels of safety and security that is as unobtrusive as possible, efficient processing of commercial goods and luggage, high quality information systems, airport transportation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next Decade of Social, Economical and Ethical Challenges Perspectives of a Networked World

    Publication Year: 2010, Page(s):17 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (98 KB) | HTML iconHTML

    In his seminal book "The New Asian Hemisphere - The irreversible shift of global power to the East" Kishore Mahbubani, the famous Singaporean diplomat and professor at the National University of Singapore gave an in-depth analysis about the changes which are implied by the use of mobile phones in developing countries. Three of his examples should illustrate this: (1) "The Bangladesh economy has go... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical Society

    Publication Year: 2010, Page(s):19 - 26
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Humans have been recognizing, establishing and making use of various relations consciously and unconsciously since the formation of human society. Waving and maintaining various relations accompany everyone's life. Humans' social behaviors create or emphasize relations. Various networks evolve with the development of society. Some relational networks gradually become independent of individuals' li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing: Issues and Challenges

    Publication Year: 2010, Page(s):27 - 33
    Cited by:  Papers (169)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. We first discuss two related computing paradigms - Service-Oriented Computing and Grid computing, and their relationships with Cloud computing. We then identify several challenges from the Cloud computing adoption perspective. Last, we will h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accountability Computing for E-society

    Publication Year: 2010, Page(s):34 - 41
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (693 KB) | HTML iconHTML

    In the business context, accountability has become a major concern for businesses around the world in aftermath of corporate scandals and fallouts. However, accountability has not been rigorously considered in IT system technologies and solutions. The goal of this study is to provide a clear understanding of accountability concept in service-oriented computing and, more generally, e-society. We fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Database Designs

    Publication Year: 2010, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    In this paper we present a formal specification of a queueing network performance evaluation model for database designs. The purpose of the model is to provide what if comparisons of database designs before database system implementation. The performance model is applied to the performance evaluation of three database designs of an implementation of the TPC-C benchmark. Experimental evaluation sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Weighted Fair Queuing System with Multi-class Jobs

    Publication Year: 2010, Page(s):50 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3178 KB) | HTML iconHTML

    This paper analyses the weighted fair queueing (WFQ) system subject to three classes of network applications. The arrival traffic flows follow Poisson processes. The service times is exponentially distributed. The system is modelled as a two-dimensional Markov chain and use matrix geometric technique to solve its stationary probabilities. The determination of the steady state probabilities can be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced DR-Tree for Low Latency Filtering in Publish/Subscribe Systems

    Publication Year: 2010, Page(s):58 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3043 KB) | HTML iconHTML

    Distributed R-tree overlays emerged as an alternative for efficiently implementing DHT-free publish/subscribe communication primitives. Overlays using R-tree index structures offer logarithmic delivery garantis, guarantee zero false negatives and considerably reduce the number of false positives. In this paper we extend the distributed R-trees (DR-trees) in order to reduce event delivery latency. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival Proccess

    Publication Year: 2010, Page(s):66 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Random Early Detection (RED) is recommended as the congestion avoidance mechanism in packet switched networks in RFC2309 and has become the focus of much research into congestion control. Furthermore, RED and WRED are the AQM schemes most widely deployed in commercial Internet routers, such as Cisco and Juniper routers. This paper describes an analytical approach that models RED and WRED schemes u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of VCP Controller on DCCP Traffic

    Publication Year: 2010, Page(s):74 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    TCP is an important communication protocol as more and more multimedia technologies are deployed in the Internet nowadays. However, existing TCP control mechanism has some shortcomings in supporting real-time streaming traffic. Although UDP can be used as an alternative to transmit real-time application data, it lacks congestion control. Introducing a new TCP-friendly protocol that supports the mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Analysis and Evaluation of Botnet Command and Control Models

    Publication Year: 2010, Page(s):82 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (699 KB) | HTML iconHTML

    Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation-Based Performance Evaluation of the SNDP Protocol for Infrastructure WMNs

    Publication Year: 2010, Page(s):90 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (918 KB) | HTML iconHTML

    An Infrastructure Wireless Mesh Network (IWMN) is a multi-hop network that consists of stationary mesh routers, strategically positioned to provide a distributed wireless infrastructure for stationary or mobile mesh clients over a mesh topology. In this paper, we evaluate a scalable neighborhood discovery protocol, called SNDP, which has been specifically designed to detect the presence and status... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Routing Protocol for Bus Networks

    Publication Year: 2010, Page(s):98 - 104
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    Providing Internet access on buses allow people to read news, check emails, watch sport games, and hence can greatly improve the quality of people's life. This paper proposes an adaptive routing protocol, called R-BUS for a bus network. R-BUS selects a route based on the link's lifetime and its communication signal quality. The protocol takes the bus mobility and the radio propagation model into a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.