By Topic

International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)

23-29 April 2006

Filter Results

Displaying Results 1 - 25 of 234
  • Proceedings ICN 2006, ICONS 2006, MCL 2006 - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • ICN 2006 Sessions [Table of contents]

    Publication Year: 2006, Page(s):v - xxix
    Request permission for commercial reuse | PDF file iconPDF (389 KB)
    Freely Available from IEEE
  • ICN 2006 Preface

    Publication Year: 2006, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (44 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICN 2006 Committees

    Publication Year: 2006, Page(s): xxxi
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • ICONS 2006 Preface

    Publication Year: 2006, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICONS 2006 Committees

    Publication Year: 2006, Page(s): xxxiii
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • MCL 2006 Preface

    Publication Year: 2006, Page(s): xxxiv
    Request permission for commercial reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Freely Available from IEEE
  • MCL 2006 Committees

    Publication Year: 2006, Page(s): xxxv
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Efficient SIP-Specific Event Notification

    Publication Year: 2006, Page(s): 1
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    By Session Initiation Protocol (SIP), the entities in the network can subscribe to the resource or the call state for various resources or calls in the network. Those entities (or entities acting on their behalf) can send notifications when those states change. We propose a new approach to subscribe the information of part resources of the user’s resource list. Unlike existing approaches that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Algorithm for Resource Manager to Enhance the Quality of Service in VoIP Systems

    Publication Year: 2006, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    VoIP has emerged as a very promising technology for future telecommunication networks. One of the most challenging aspects of successful deployment of VoIP systems is the inherent nature of IP that is not designed for real-time information transfer. This adversely affects the quality of transferred voice. To improve the quality of voice received through IP networks, a range of solutions have been ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a new Security Architecture for Telephony

    Publication Year: 2006, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    The security of the telephone network started to be deployed in the forties at the time of the Second World War. The deregulation and the globalization of the telecommunication’s sector opened the door to the evolution of the telephone networks and to their diversification. Although, the evolution of the information technology yields to a converged data and voice network based on IP technolog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dependable Global Location Service using Rendezvous on Hierarchic Distributed Hash Tables

    Publication Year: 2006, Page(s): 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    A location service is the part of a naming architecture that maps identifiers to network addresses. Ideally, the identifiers are globally unique, persistent and semantic-free. It has been acknowledged that Distributed Hash Tables (DHTs) enable, for the first time, the use of semantic-free identifiers in massive, global networks. We argue that hierarchy is essential for dependability in massive, ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues of Establishing a Campus-wide Computational Grid Infrastructure in the GERANIUM Project

    Publication Year: 2006, Page(s): 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    A campus-wide grid and cluster infrastructure using the Rocks clustering software is established. The infrastructure, namely Grid-Enabled Research Network and Info-structure of University of Malaya (GERANIUM), comprises five distinct clusters located at different faculties and institutes. In this paper, the GERANIUM topology and architecture are presented, and issues and experiences concerned are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • gTFRC : a QoS-aware congestion control algorithm

    Publication Year: 2006, Page(s): 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    This study addresses the end-to-end congestion control support over the DiffServ Assured Forwarding (AF) class. The resulting Assured Service (AS) provides a minimum level of throughput guarantee. In this context, this paper describes a new end-to-end mechanism for continuous transfer based on TCP-Friendly Rate Control (TFRC) originally proposed in [11]. The proposed approach modifies TFRC to take... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive Predictive Queue Management for improved QoS in IP Networks

    Publication Year: 2006, Page(s): 7
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    The pursuit of efficient IP resource management has been the main thrust behind Active Queue Management (AQM) research. Random Early Detection (RED), the defacto standard and its different flavours have been proposed as simple solutions to the AQM problem. These approaches, however, are known to suffer from problems like parameter sensitivity and inability to capture variations in the input traffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The pursuit of efficient IP resource management has been

    Publication Year: 2006, Page(s): 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    The time available for network elements to process packets with Quality of Service (QoS) requirements decreases with higher network speed. Packet processing functions such as queuing and scheduling need to be performed at high speed to ensure QoS. The two basic queuing strategies in routers are Output Queuing (OQ) and Input Queuing (IQ). OQ guarantees QoS and gives optimal throughput but it is not... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS Support for End-User Applications

    Publication Year: 2006, Page(s): 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    There are quite sophisticated QoS technologies to implement in data networks but the solutions for application-level QoS support are not very common at all. The aim of our activities is to build an optional extension to classical networking API which allows enduser applications to utilize QoS mechanics implemented in the network. We have selected Java as a destination platform to realize this idea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Approximation Algorithm for Computing Disjoint QoS Paths

    Publication Year: 2006, Page(s): 10
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    The survivability of a network has assumed great importance in against of losing huge volumes of data due to a link cut or node failure. Recently some scholars have proposed some path restoration schemes which used two disjoint paths with multiple constraints to satisfy both the survivability and the QoS requirements. In this paper we will study the issue of how to identify two paths that satisfy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling Dynamic QoS Requirements in a Pervasive System

    Publication Year: 2006, Page(s): 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Quality of Service (QoS) is an important feature of a wireless pervasive computing system affecting both services and underlying networks. In a pervasive environment the user’s context and preferences should be taken into account when determining which services to provide and which networks to use. QoS is an important factor in these preferences. However, the mobility of devices coupled with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UML-based Specification of QoS Contract Negotiation and Service Level Agreements

    Publication Year: 2006, Page(s): 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    To support new applications and services, networks must take into account Quality of Service requirements. However, QoS support increases the network complexity. Network development techniques must apprehend this complexity not only from a functional point of view but also from QoS point of view. Integrating QoS aspects early in the development process allows improving network quality. The object ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS class mapping over heterogeneous networks using Application Service Map

    Publication Year: 2006, Page(s): 13
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Each network has its own distinct quality of service (QoS) class. To support end-to-end QoS QoS class interwoking between different network technologies is very important function especially in Next Generation Networks (NGN). QoS mapping between different networks technologies are broadly categorized as mapping between parameters and mapping between classes in each different networks. However, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple Formula for End-to-End Jitter Estimation in Packet-Switching Networks

    Publication Year: 2006, Page(s): 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    In this paper, an analytic approximation is derived for the end-to-end delay-jitter incurred by a periodic traffic with constant packet size. It is assumed that the periodic traffic is multiplexed with a background packet stream under the FCFS service discipline in each queue along the path to its destination. The processes governing the packet arrivals and the packet sizes of the background traff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Traffic Engineering-QoS Approach to the Traffic Burstiness in Short-Time Scales

    Publication Year: 2006, Page(s): 15
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    The phenomenon of traffic burstiness is a big challenge in the switching equipments of the core of computer network, because it leads to more delay and jitter to be tolerated by users. Therefore, we should use all of the available facilities to improve the traffic behavior. In this paper, we present an idea based on delay management and QoS considerations to decrease the variances in short-time sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.