By Topic

Computer Networks and Mobile Computing, 2001. Proceedings. 2001 International Conference on

Date 16-19 Oct. 2001

Filter Results

Displaying Results 1 - 25 of 77
  • Proceedings 2001 International Conference on Computer Networks and Mobile Computing

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (314 KB)
    Freely Available from IEEE
  • Managing code assignment in multi-code CDMA wireless networks for the delivery of H.263 video streams

    Publication Year: 2001, Page(s):473 - 478
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    We study the problem of how to efficiently distribute network resources among H.263 packet video streams in a multi-code CDMA network. Due to high flexibility of both the video encoding system and CDMA system, it is not trivial to find an optimal solution for the problem. We present different algorithms for transferring video in CDMA networks. We compare those algorithms in our simulation environm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2001, Page(s):527 - 529
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • PMMAP: a mobile agents platform for program mining

    Publication Year: 2001, Page(s):347 - 355
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (765 KB) | HTML iconHTML

    Presents a platform called PMMAP, a Java-based mobile agents platform that is oriented for program mining. Program mining is a kind of novel computing paradigm that supports computing on demand in distributed networks. The whole process of program mining is based on mobile agents technology. In order to implement program mining, we develop a powerful and suitable mobile agents platform. It not onl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A distributed computing model and its application

    Publication Year: 2001, Page(s):341 - 346
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    Presents a Java-based distributed computing model for deploying networking systems. The proposed model can raise the level of abstraction for network or distributed system programming, from network protocol level to the object interface level, it provides a mechanism to enable smooth adding, removal, and finding of software components and services on the network. Software components providers use ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast IP lookup scheme for longest-matching prefix

    Publication Year: 2001, Page(s):407 - 412
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    One of the key design issues for the next generation IP routers is the IP Lookup mechanism. IP lookup is an important action in router that is to find the next hop of each incoming packet with a longest-prefix-match address in the routing table. In this paper, we propose an IP lookup mechanism with the number of memory access for an IP lookup being one in the best case and being four in the worst ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An investigation of CC's contribution to confidence in security

    Publication Year: 2001, Page(s):333 - 338
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    To facilitate the availability of commercial computer products with sufficient security, excellent evaluation criteria have to be of the potential to drive the course of the security marketplace. The newness and the lack of experiences in the exercise of the Common Criteria (CC), which was adopted in 1999 as an international standard for security product evaluation, make it imperative that efforts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model of electric market operation support system based on UML

    Publication Year: 2001, Page(s):13 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (409 KB) | HTML iconHTML

    This paper presents an electric market operation support system model developed by visual tool rational rose2000. Using cases such as TMR, TMS, EMS, SBS, CMS, SIS, SPDnet and GBS are formed according to the system requirements. The use case view and main class view of the system are formed at the same time. For various UML views of the system, this paper focuses the discussion on the class view, c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault recovery for a distributed QoS-based multicast routing algorithm

    Publication Year: 2001, Page(s):396 - 403
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (806 KB) | HTML iconHTML

    This paper proposes a new minimum spanning tree (MST) based distributed QoS-based multicast routing algorithm which is capable of constructing a delay constrained multicast tree when node failures occur during the tree construction period and recovering from any node failure in a multicast tree during the on-going multicast session without interrupting the running traffic on the unaffected portion... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytic throughput model for TCP Reno over wireless networks

    Publication Year: 2001, Page(s):111 - 116
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    Many wireless network applications are built on TCP, and will continue to be in the foreseeable future. It is important to study TCP performance in wireless networks scenario with high loss rate. In this paper, we develop a simple analytic characterization of the steady state throughput of a bulk transfer TCP Reno flow over wireless networks, as a function of loss rate and round trip time. Our mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configurable and networked web-based vertical applications

    Publication Year: 2001, Page(s):41 - 46
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    As network and mobile computing technologies evolving, the enterprise applications are also expanded to web-based platforms facilitated by these enabling technologies. The progress is further propelled by large-scale e-commerce activities such as B2C (business-to-consume) and B2B (business-to-business) applications. This paper proposes the use of observations and models of brain development in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving on service-customizing for applications in PGPS-based IntServ/RSVP architecture

    Publication Year: 2001, Page(s):209 - 214
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    The future Internet is expected to support applications with quality of service (QoS) requirements. For this end several mechanisms are suggested in the IETF to support signaling, one of the most promising component among them is IntServ. In this paper, we study the relationship between the QoS implementing mechanism and application demands, and make a set of an improved application interface beyo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intranet security with micro-firewalls and mobile agents for proactive intrusion response

    Publication Year: 2001, Page(s):325 - 332
    Cited by:  Papers (7)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (775 KB) | HTML iconHTML

    We propose a distributed multi-level architecture to solve the intranet security problem. The basic idea is to build micro firewalls on all hosts in the intranet, as a second line of defense behind the gateway firewall. A distributed intrusion detection system (IDS) is developed to achieve proactive intrusion responses with dynamic policy changes. Mobile agents, CORBA, and RMI are evaluated for dy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new semantic expression method for web pages based on OCDB

    Publication Year: 2001, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (467 KB) | HTML iconHTML

    Designing web pages by HTML documents brings many questions such as maintaining data uniformity, reusing a part of a page and searching information from the page. Semantic web is an important area and is very useful to search information from the web resources. There is much work in the area such as the resource description framework and the extensible markup language (XML). This paper presents a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From generic MAS to C2D2-Agents: a software architecture for CSCW

    Publication Year: 2001, Page(s):390 - 395
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (549 KB) | HTML iconHTML

    In order to accommodate the new change brought by the computer support cooperative work (CSCW) application system, a new CSCW system integration platform based on multi-C2D2-Agent is required. In this paper, a method in the form of MAS-based model for designing CSCW system and C2D2-Agent concepts are proposed. The architectural property of this type of C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulations of TCP congestion control mechanism model with large buffer size

    Publication Year: 2001, Page(s):105 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    The Transmission Control Protocol (TCP) is the main protocol of the transport layer in today's Internet. Many works have studied the performance of TCP and researchers are trying to analytically characterize the throughput of TCP's congestion control mechanism. We summarize previous works and present the simulation result with large buffer size and give a qualitative analysis of the result. Our co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic delayed ACK control scheme on MobileIP networks

    Publication Year: 2001, Page(s):35 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    During TCP/IP communications, MobileIP routing optimization functions may transmit out-of-order TCP packet sequences. To solve this problem, we propose a dynamic delayed ACK control scheme in which the wireless link-state management part notifies the upper TCP/IP layer of base-station hand-over, and at this time the TCP/IP layer sends dynamic delayed ACKs in response by using two-level-timer (i.e.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effect on the inter-fairness of TCP and TFRC by the phase of TCP traffics

    Publication Year: 2001, Page(s):131 - 136
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    TFRC (TCP friendly rate control) is a protocol designed for multimedia communication with rate control, which can make multimedia streams smoothly share network bandwidth with TCP flows. But in DropTail router network, the fairness between TCP flows and TFRC flows is very poor due to the periodic phase of TCP flows. This paper discusses quantitatively the effect of TCP phase on the inter fairness ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localized credentials for server assisted mobile wallet

    Publication Year: 2001, Page(s):203 - 208
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (598 KB) | HTML iconHTML

    We propose a fully distributed multiparty secure architecture so that the user can leave most of the content of his/hers electronic wallet in the security of his/hers home while travelling with his/hers mobile terminals. Emerging GSM and UMTS mobile terminals supporting both short range Bluetooth and cellular GPRS are excellent platforms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and performance evaluation of differentiated services router for next generation Internet

    Publication Year: 2001, Page(s):316 - 321
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    The current Internet provides only "best effort" services, however, applications and users expect different QoS (Quality of Service). To meet these requirements, the differentiated services (DiffServ) architecture is introduced. Because DiffServ is regarded as the foundation of the next generation Internet QoS architecture, it is helpful to design a DiffServ Router (DSR) and evaluate its performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of a content oriented web architectural model

    Publication Year: 2001, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    Many larger and complex web applications, such as e-commerce, ASP, portals, are content oriented, in which content is the critical elements and always under constant updates : content organization and presentation generally is required custom-tailored. Developing and maintaining such web applications demands a suitable model that can capture its features. For architectural descriptions address hig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configurable mobile agent and its fault-tolerance mechanism

    Publication Year: 2001, Page(s):380 - 389
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (869 KB) | HTML iconHTML

    The idea of performing client-server computing by transmission of executable programs between clients and servers has become highly popular among researchers and developers who are engaged in intelligent network services. Computing based on mobile agents is an important aspect of this idea. This paper focuses on researching the migration process of agents. A model based on modules is devised for c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of a RSVP-capable router for multiple QoS support

    Publication Year: 2001, Page(s):254 - 259
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    For the accuracy of the Intserv/RSVP and the scalability of the Diffserv, the two service models which IETF introduced to provide end-to-end quality of service, can complement each other in many respects and can coexist for a long time. Most of the specifications for "gluing" the Intserv and Diffserv and RSVP together have not been standardized yet, therefore an important challenge for router vend... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified TCP algorithm for service differentiation and minimum bandwidth guarantee in the Internet

    Publication Year: 2001, Page(s):99 - 104
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    Proposes a modified TCP Reno algorithm to provide differentiated services and assured services in the Internet. We introduce two new parameters, slow-start threshold hopping coefficient and minimum congestion window, to the TCP Reno algorithm. The algorithm supports both relative service differentiation among best-effort traffic as well as minimum bandwidth guarantee for assured service connection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transaction management in mobile multidatabase systems

    Publication Year: 2001, Page(s):513 - 518
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB) | HTML iconHTML

    Tremendous advances in wireless networks and portable computing devices have led to development of mobile computing. Traditional transaction management in multidatabase systems cannot be applied to mobile environment. In this paper, we analyze the features of mobile multidatabase environment. A mobile transaction model based on nested transactions is proposed and a serializability theory is presen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.