Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

Fourth International Conference on Networking and Services (icns 2008)

16-21 March 2008

Filter Results

Displaying Results 1 - 25 of 56
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (53 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2008, Page(s):xi - xviii
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • An XML Firewall on Embedded Network Processor

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    XML-based services with flexible and intelligent structures for data expression and exchange are quickly gaining popularity. Enterprises are deploying XML-based services as a central component of the application integration. As the application data are crucial to the enterprises, the XML messages must be secured to ensure the reliability of these services. This paper presents the design of an embe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Adaptive Transmission Scheduling in Packet Radio Networks

    Publication Year: 2008, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    The topology of the packet radio network changes dynamically. The initial slot assignments may cause interferences among the nodes while transmitting. In this paper, the author propose a new adaptive transmission scheduling to packet radio networks that computes the transmission assignments according to the changes in the topology. The node gathers information from its local neighborhood. In addit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System for Automated Aircraft Seat Floatation Device Inspection

    Publication Year: 2008, Page(s):13 - 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Airlines are governed by government and/or safety regulations that require each aircraft seat is properly equipped with a floatation device for use by the passenger in the unlikely event of a water landing. The current known aircraft inspection process to verify that each seat has the requisite floatation device is time consuming and labor intensive. The Boeing Company has defined and developed a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling of Interference Using Power Penalty Analysis and Frequency Assignment Problem Approach in Communication

    Publication Year: 2008, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    As communication is making the whole world a global village, there seems to be tremendous pressure on the service providers in this field. The greatest demand is for Quality Of Service (QoS) wherein the most important role is played by Interference. There are numerous parameters leading to interference in both wired and wireless communication. In this paper an attempt is made to minimize interfere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Evidence of Data Integrity from an Untrusted Storage Service

    Publication Year: 2008, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of business communications. In this paper we consider the problem of getting reliable evidence of the integrity and existence of some data from a storage service even if the data is not available for reference anymore and ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environmental Monitoring Based on Emerging Wireless Technologies

    Publication Year: 2008, Page(s):30 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (999 KB) | HTML iconHTML

    Biological research in agriculture needs a lot of specialized electronic sensors in order to fulfill different goals, like as: climate monitoring, soil and fruit assessment, control of insects and diseases, chemical pollutants, identification and control of weeds, crop tracking, and so on. That research must be supported by consistent biological models able to simulate diverse environmental condit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-geocast Algorithms for Wireless Sparse or Dense Ad Hoc Sensor Networks

    Publication Year: 2008, Page(s):35 - 39
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Multi-geocasting in wireless sensor network and ad hoc network is the delivery of packets from a source (or sink) to all the nodes located in several geographic areas. The objectives of a multi-geocasting protocol are guaranteed message delivery and low transmission cost. All the existing protocols guarantee delivery only in dense networks. In this paper, we present two multi-geocast protocols whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effairness: Dealing with Time in Congestion Control Evaluation

    Publication Year: 2008, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    Congestion control algorithms are traditionally evaluated in contrast to ideal capacity allocations that specify instantaneous efficient fair rates for application sessions but ignore time. While the latter is tenable for local networks and networks where all application sessions last long, instantaneous ideal allocations are inadequate standards for congestion control evaluation in dynamic wide-a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Corouting: An IP Hybrid Routing Approach

    Publication Year: 2008, Page(s):46 - 52
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    We propose a hybrid routing scheme that combines traditional shortest-path based OSPF mechanisms as well as a new form of explicit routing executed at the flow level. The scheme consists of finding explicit routes for real-time UDP flows, on network links that -at flow entry time- do not present more than 50% bandwidth utilisation. As for TCP packets, they will be routed on the unique least-cost p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Optimizing Leaf Initiated Point to Multi Point Trees in MPLS

    Publication Year: 2008, Page(s):53 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Resource ReSerVation Protocol-Traffic Engineering (RSVP-TE), and Label Distribution Protocol (LDP) may be used to set up Point to Multi Point (P2MP) trees in MPLS. RSVP-TE performs better in optimizing network resources, while LDP is simpler but has no guarantee on resource optimization. This paper presents a comparative study between RSVP-TE and LDP in regards of resource optimization and the res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An IMS Control and Access Layer PR-SCTP Based Network

    Publication Year: 2008, Page(s):61 - 66
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    The recent growth of peer-to-peer traffic and the popularity of streaming video is a cause for possible instability of the networks because most of these services run over UDP, without any mechanism for congestion control. Moreover, the adaptive features of peer-to-peer traffic may lead a misuse of the classical QoS rules legitimately applied to end-user applications. This paper proposes the usage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DiProNN: Distributed Programmable Network Node Architecture

    Publication Year: 2008, Page(s):67 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    The programmable network approach allows processing of passing user data in a network, which is highly suitable especially for multimedia streams processing. However, programming of complex stream processing applications for programmable nodes is not effortless since they usually do not provide sufficient flexibility (both programming flexibility and execution environment flexibility). In this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VPN Analysis and New Perspective for Securing Voice over VPN Networks

    Publication Year: 2008, Page(s):73 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    Security and privacy become mandatory requirements for VoIP communications that needs security services such as confidentiality, integrity, authentication, non-replay and non- repudiation. The available solutions are generic and do not respect voice specificities and constraints. Thus, QoS of the voice is affected by delay, jitter, and packet loss. New security solutions must take into account the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Study of PANA Pre-authentication for Interdomain Handover

    Publication Year: 2008, Page(s):79 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (859 KB) | HTML iconHTML

    To provide seamless mobility to the wireless user, a continuous connection to the Internet is required while moving from one administration domain to another. To enable continuous connectivity, one prerequisite is the incorporation of seamless handover. The make-before-break approach facilitates seamless handover by means of executing an authentication to a new domain simultaneously while maintain... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration of Broadband Wireless Technologies and PMR Systems for Professional Communications

    Publication Year: 2008, Page(s):84 - 89
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    The paper contributes to the evolution of Public Safety and Disaster Relief (PSDR) communications by specifying a solution for interoperability and integration among Professional Mobile Radio systems (TETRA and Simulcast), public systems (GSM/GPRS/UMTS), and broadband wireless technologies, such as WiMAX. A policy for PSDR services scheduling and fundamental guidelines for mapping the quality of s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jitter-Buffer Management for VoIP over Wireless LAN in a Limited Resource Device

    Publication Year: 2008, Page(s):90 - 95
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    VoIP over WLAN is a promising technology as a powerful replacement for current local wireless telephony systems. Packet timing Jitter is a constant issue in QoS of IEEE802.11 networks and exploiting an optimum jitter handling algorithm is an essential part of any VoIP over WLAN (VoWiFi) devices especially for the low cost devices with limited resources. In this paper two common algorithms using bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Scheduling Techniques in Distributed Parallel Environments Using Mobile Agents

    Publication Year: 2008, Page(s):96 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    The proposed mobile agent collects the load index and performs the distributed scheduling considering the behavior of the different kinds of applications. The environments obtained were considered due to the application of parallel processing of using medical images as well as the comparison of their performance time to measure them. The objective of this paper is to offer alternatives of processe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test-Bed Evaluation of Ingress Queuing for Improved Packet Delivery

    Publication Year: 2008, Page(s):102 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    In addition to bit errors and packet collisions, packets in ad hoc networks are lost due to missing routes and unreachable next hop nodes. The latter is costly, since these packets consume scarce network resources as they are retransmitted up to transmission-threshold times before being discarded. In this paper we demonstrate, through experimental test beds and simulation, the advantage of ingress... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.