By Topic

2014 IEEE 28th International Conference on Advanced Information Networking and Applications

13-16 May 2014

Filter Results

Displaying Results 1 - 25 of 170
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (567 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Message from the Steering Committee Co-Chairs

    Publication Year: 2014, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (75 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Co-Chairs

    Publication Year: 2014, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Co-Chairs

    Publication Year: 2014, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshop Co-Chairs

    Publication Year: 2014, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (93 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2014, Page(s):xxii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2014, Page(s):xxv - xxxi
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Reviewers list

    Publication Year: 2014, Page(s):xxxii - xxxiii
    Request permission for commercial reuse | PDF file iconPDF (55 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote talk I - Humanware: The Third Ware Which Creates Innovation in Information Technology

    Publication Year: 2014, Page(s): xxxiv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (73 KB)

    Summary form only given. Information technology has been developing remarkably in both hardware and software. People are now closely interconnected through information networks which together form a complex and dynamic supra-network. One urgent challenge in this rapidly changing information society is the development of an entirely new concept: “human--ware,” which is considered the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote talk II - Video game as a service: Cloud computing enabled video gaming anywhere on any device

    Publication Year: 2014, Page(s): xxxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Summary form only given. There is a growing demand by consumers to access their digital entertainments, which are increasingly cloud-based, whenever and wherever they have access to networks of diverse characteristics, and using whatever devices they have in their hands. To address this diversity, we have embarked on a project is to develop design methodologies and enabling technologies to support... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay Asymmetry Correction Model for Master-Slave Synchronization Protocols

    Publication Year: 2014, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    This paper proposes a Delay Asymmetry Correction (DAC) Model to enhance clock synchronization protocols based on a Master-Slave arrangement such as the IEEE 1588 PTP protocol. The purpose of this work is to mitigate the effects of unpredictable packet delay variations (PDV), which may aggravate asymmetric link delays on timing packets, in order to improve the synchronization accuracy of the slave ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Self-Regulate to Admission Control in Real-Time Traffic Environment

    Publication Year: 2014, Page(s):9 - 16
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    Network Utility Maximization (NUM) has been studied extensively to improve network quality of service (QoS) and to overcome network congestion. However, even with congestion resolved, network is not always able to meet user's minimum demand for QoS. To address this issue, this paper proposes a new "self-regulate" model that considers user tolerance for poor QoS and the price user is willing to pay... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-End Measurement of Hop-by-Hop Available Bandwidth

    Publication Year: 2014, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB) | HTML iconHTML

    Existing techniques for measuring available bandwidth measure the available bandwidth at bottlenecks along the path, and most of them do not specify the bottleneck location. In this paper, we propose an end-to-end measurement method for the hop-by-hop available bandwidth along a network path. Such a technique can facilitate advanced traffic control, especially in heterogeneous network environments... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Analytical View of Multiple CDNs Collaboration

    Publication Year: 2014, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (775 KB) | HTML iconHTML

    Content Distribution Networks (CDN) are a well-known and accepted way to deliver content. Considering the ever growing number of users and also the growing number of small localized CDNs, there is a strong trend for collaboration among them. CDN collaboration may cause cost reduction for CDN providers and better quality of experience for the end user. However, CDN collaboration raises performance ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PUSH: Proactive Unified Spectrum Handoff in CR-MANETs

    Publication Year: 2014, Page(s):33 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    In this paper, Proactive Unified Spectrum Handoff (PUSH) scheme in cognitive radio mobile ad hoc networks (CR-MANETs) through an established route is considered in which the channel availability depends on the Primary User's (PU's) activity, secondary user's (SU's) mobility, and the channel heterogeneity. First, an analytical model for Unified Spectrum Handoff (USH) scheme is introduced in which t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Imperialist Competitive Algorithm for Interference-Aware Cluster-Heads Selection in Ad Hoc Networks

    Publication Year: 2014, Page(s):41 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (997 KB) | HTML iconHTML

    This paper presents the results of applying a new clustering algorithm in ad hoc networks. This algorithm is a centralized method and is designed on the basis of an imperialist competitive algorithm (ICA). This algorithm aims to find a minimum number of cluster-heads while satisfying two constraints, the connectivity and interference. This work is a part of an ongoing research to develop a distrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection

    Publication Year: 2014, Page(s):49 - 56
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    In military operation or emergency response situations, very frequently a commander will need to assemble and dynamically manage Community of Interest (COI) mobile groups to achieve a critical mission assigned despite failure, disconnection or compromise of COI members. We combine the designs of COI hierarchical management for scalability and reconfigurability with COI dynamic trust management for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Available-Bandwidth-Based Routing in IEEE 802.15.4-Based Ad-Hoc Networks: Proactive vs. Opportunistic Technique

    Publication Year: 2014, Page(s):57 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    In this paper, we present an available-bandwidth-based proactive routing protocol for IEEE 802.15.4-based single-sink and multi-sink ad-hoc networks. The available-bandwidth-based proactive routing protocol maintains the best forwarding path in terms of the end-to-end available bandwidth towards each sink node present in a network. Moreover, a node can maintain more than one data forwarding path t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Mobile Live Streaming Considering Neighbor Reception

    Publication Year: 2014, Page(s):65 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (989 KB) | HTML iconHTML

    Recently, a demand for mobile live streaming system has increased with the spread of smartphones. More and more people will enjoy watching video contents with a smartphone in the future. Cellular-WiFi hybrid network is a method enables users to cooperate with each other and watch video contents comfortably if they are in the range of Wi-Fi communication. In Cellular-WiFi hybrid network, each peer ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Node Position Forecast in MANET with PheroCast

    Publication Year: 2014, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    In mobile ad hoc networks (MANET) nodes are free to move on the environment and interact with each other and with the infra-structure, enabling a multitude of applications and services. However, the same mobility that is key to MANET is also the greater limiting factor in the quality of the services provided in this environment, since the infrastructure must keep adapting to the mobility. This pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • USABle -- A Communication Framework for Ubiquitous Systems

    Publication Year: 2014, Page(s):81 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (725 KB) | HTML iconHTML

    The widespread use of mobile devices is reshaping the way users interact, allowing applications to explore physical proximity of devices to offer intelligent services. Although there are several communication technologies available (e.g., Wi- Fi, Wi-Fi Direct, LTE, UMTS, Bluetooth, NFC), building an application from scratch considering both communication and application requirements is not a trivi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.