By Topic

19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers)

28-30 March 2005

Go

Filter Results

Displaying Results 1 - 25 of 183
  • 19th International Conference on Advanced Information Networking and Applications [front matter]

    Publication Year: 2005, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • 19th International Conference on Advanced Information Networking and Applications - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • 19th International Conference on Advanced Information Networking and Applications - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • 19th International Conference on Advanced Information Networking and Applications - Table of contents

    Publication Year: 2005, Page(s):v - xvii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Message from the INA Co-Chairs

    Publication Year: 2005, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • INA Organizing Committee

    Publication Year: 2005, Page(s):xix - xxi
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • INA Reviewers

    Publication Year: 2005, Page(s):xxii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • Message from the USW Chairs

    Publication Year: 2005, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • USW Organizing Committee

    Publication Year: 2005, Page(s):xxv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • WAMIS Preface

    Publication Year: 2005, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • WAMIS Organizing Committee

    Publication Year: 2005, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • IPv6 Preface

    Publication Year: 2005, Page(s):xxix - xxx
    Request permission for commercial reuse | PDF file iconPDF (142 KB) | HTML iconHTML
    Freely Available from IEEE
  • IPv6 Organizing Committee

    Publication Year: 2005, Page(s): xxxi
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Designing secure wireless mobile ad hoc networks

    Publication Year: 2005, Page(s):5 - 8 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB) | HTML iconHTML

    In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured through a newly designed protocol, which deploys cryptographic mechanisms over the pre-established information. In this paper, we suggest three dimensions to secure the communications in wireless mobile ad hoc networks. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of mobility on the critical transmitting range for connectivity in wireless ad hoc networks

    Publication Year: 2005, Page(s):9 - 12 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    The effect of mobility on the critical transmitting range in wireless ad hoc networks is discussed in this paper. A new parameter, pause probability Ppause, which is the function of the minimum velocity Vmin, the maximum velocity Vmax and the pause time tpause of random waypoint (RWP) mobility model, is defined. Simulation results show that the effect of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-efficient QoS routing protocol for mobile ad hoc networks

    Publication Year: 2005, Page(s):13 - 16 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB) | HTML iconHTML

    A novel CEQRP (cost-efficient QoS routing protocol) for mobile ad hoc networks (MANETs) is proposed. CEQRP can provide QoS guarantee and is aimed at extending the battery's lifetime at each host by selecting the hosts with a long battery's remaining lifetime to forward packets. Simulation results show that CEQRP has good network performance. Furthermore, CEQRP shows distinct performance advantages... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signal strength-based routing protocol for mobile ad hoc networks

    Publication Year: 2005, Page(s):17 - 20 vol.2
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Mobile ad hoc networks (MANET) have many applications in the civilian environment, law enforcement, military and disaster recovery arenas. To facilitate these applications, with heavy traffic among nodes, a stable and efficient routing protocol is crucial. In this paper, a signal strength-based, on-demand routing protocol has been proposed, which first uses the earliest established path to forward... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synchronous and multiplexed time slots and radio blocks allocation for mobile packet data networks

    Publication Year: 2005, Page(s):21 - 24 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    This paper studies the radio resource allocation for GPRS (general packet radio service) downlink traffic supporting two class of mobile terminals with different bandwidth requirements. We proposed a complete time-slot partitioning and complete radio-block sharing scheme. The allocation strategy can not only characterize the practical multiplexing scheme but also provide high performance. By both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CRMA: a novel multiple access protocol for power efficient wireless LAN

    Publication Year: 2005, Page(s):25 - 28 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (93 KB) | HTML iconHTML

    To improve the binary exponential backoff algorithm (BEB)'s channel throughput of IEEE 802.11 protocol, we propose a novel collision reduced multiple access (CRMA) protocol based on slow contention window decrease mechanism and runtime optimization method. CRMA protocol can record the current backoff stage of the latest successful transmission under the overload network precisely. As a result, it ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of relationship between video contents and subjective video quality for Internet broadcasting

    Publication Year: 2005, Page(s):31 - 34 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    This paper analyzes relationship between video contents and subjective video quality for Internet broadcasting, and applies the results to the rate control methods. In this analysis, we classify video programs into some groups in which a large majority of users feel the same subjective video quality. We investigate the relationship by conducting an experiment with method of paired comparisons, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault tolerant routing and broadcasting in de Bruijn networks

    Publication Year: 2005, Page(s):35 - 40 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    In this paper, we study fault tolerant routing and broadcasting in interconnection networks based on de Bruijn graph (dBG) for constructing large scale multiprocessors networks. Our paper presents a new approach to provide fault tolerance routing and broadcasting which haven't been investigated. The proposed approach is based on multi level discrete set concept in order to find a fault free shorte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A switched Ethernet protocol for hard real-time embedded system applications

    Publication Year: 2005, Page(s):41 - 44 vol.2
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    This paper presents a protocol to support traffic for hard real-time applications over non real-time LAN technology, with a switched Ethernet based network concept without any modifications of existing Ethernet hardware. Simulation results demonstrate the proposed Ethernet protocol has better real-time performances, higher bandwidth and a larger data frame, and meets the requirements of reliabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The advanced international case study using high speed Internet

    Publication Year: 2005, Page(s):45 - 48 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    The recent relationship between Japan and Korea has become close aspects of politics, culture, and so on. There are many research activities cooperated with Korean researchers in Kyushu University. This is because Kyushu University is one of core stations about gigabit network between Japan and Korea. Many experiments of the advanced applications were performed using this network. However most of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid CIP/M&M for micro-mobility management under the multilayer wireless network

    Publication Year: 2005, Page(s):51 - 54 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    We reference the EVOLUTE (Reinbold and Bonaventure, 2003) (Information Society Technologies, IST project) that mingles session initiation protocol (SIP) with mobile IP (MIP) to support macro-mobility management and provide seamless multimedia services for roaming users. In the part of micro-mobility, we utilize multicast-based mobility (M&M) to assist with cellular IP (CIP) infrastructure. They co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm of dynamic resource reservation for multimedia wireless communication

    Publication Year: 2005, Page(s):55 - 59 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Wireless communication that provides voice only is not sufficient to support the necessity of user. In the future, the major advantage of third generation wireless communication (3G) are providing packet data communication, mobile Internet, and mobile multimedia data communication. This kind of data type requires more bandwidth to transmit data. Sometimes, the communication would be encountered th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.