2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003.

20-23 Oct. 2003

Filter Results

Displaying Results 1 - 25 of 87
  • MOM-G: message-oriented middleware on grid environment based on OGSA

    Publication Year: 2003, Page(s):424 - 427
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    OGSA (open gird service architecture) implements grid service that is an abstract of every resource via the Web services. But the XML-RPC (remote procedure call based on the eXtensibile Mark Language) convention that grid service commonly uses limits the convenient and massive data transmission. A new mechanism, which is MOM (message-oriented middleware) based on OGSA, is presented here to efficie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency-based reconstruction of multi-description coded JPEG2000 images

    Publication Year: 2003, Page(s):92 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    Multiple description coding (MDC), together with reconstruction, is a popular technique for concealing packets losses in a best-effort network like the Internet. In our previous study, we have developed a sample-based MDC scheme for subband images and an optimal reconstruction-based subband transform (ORB-ST) at senders that takes into account the reconstruction process at receivers. Due to the pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the model of OoS multicast routing problems in active networks

    Publication Year: 2003, Page(s):419 - 422
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    In this paper, we propose the concept of order of services (OoS) and construct the programming model of OoS multicast routing in active networks. We also give methods to assure services and to compute the violation degree of OoS. Then, based on an improved prufer encoding method, we design a novel genetic algorithm for the new model. The complexities of encoding and decoding of our algorithm do no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Double-layer stream scheduling scheme with QoS control for cluster video servers

    Publication Year: 2003, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Researchers have put more emphasis on stream-scheduling policies to build high performance video servers. But the most important aim of these traditional stream-scheduling schemes is to improve the resource utilization, such as memory, network bandwidth and CPU, to maximize the number of concurrent streams. These schemes did not consider the QoS needs of video streaming or described the QoS parame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication and key distribution methods in mobile computing environments

    Publication Year: 2003, Page(s):353 - 356
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    This paper discusses the authentication problem of the mobile user based on public key cryptosystem and shared key cryptosystem. We analyze several authentication and key distribution protocols in mobile environment. Weaknesses of each protocol are pointed out. A global initial authentication and key distribution method based on public key certificate chain is presented. It is argued that using hy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cooperative two-tier framework for efficient routing in MANET

    Publication Year: 2003, Page(s):465 - 469
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    Mobile Ad hoc Networks (MANET) is a collection of randomly moving wireless devices within a particular area. Unlike in cellular networks, there are no fixed base-stations to support routing and mobility management. Further more, many resources such as power energy and bandwidth are very limited in MANET. Concentrating on these problems, we present a cooperative two-tier framework. The framework co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A packet-order-keeping-demultiplexer in parallel-structure router based on flow classification

    Publication Year: 2003, Page(s):415 - 418
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    This paper proposes a structure named Packet-Order-Keeping-Demultiplexer (POKD) and an efficient flow-classification-based packet-scheduling algorithm named FCS to solve the problem of maintaining packet disorder in the same flow for the parallel-structured router. The performances of POKD and FCS are analyzed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast two-way IP lookup algorithm based multibit-trie

    Publication Year: 2003, Page(s):136 - 142
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Due to the rapid growth of traffic in the Internet, backbone links of several gigabits per second are commonly deployed, which means backbone routers must be able to forward millions of packets per second. One of the most important steps of routing is lookup in the routing table, which is also the bottleneck in high-speed routing process. Some traditional IP lookup algorithms are focused at memory... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information service on scalable ad-hoc mobile wireless networks

    Publication Year: 2003, Page(s):190 - 196
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    Mobile ad-hoc networks (MANETs) is one of the new services with a dynamic configuration. It is hard to manage since the topology is frequently changing and growing up. So far, there are no many sound studies focusing on a large scale ad-hoc service model due to its complexity. Therefore, it is an important feature for a MANET with a complete ad-hoc topology information service. In this paper, we p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient distributed admission control for anycast flows

    Publication Year: 2003, Page(s):78 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Anycasting has become an important research topic recently especially for replicated servers where availability and fault-tolerance are critical for quality of service. With anycasting, applications can request the "nearest" server for provision of desired services. We study efficient admission control for anycast (ACA) flows. We focus on algorithms that perform smart destination selection and eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing efficient video-on-demand service

    Publication Year: 2003, Page(s):509 - 512
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    A new video transmission scheme called CMP (Client Multicast Patching) is proposed based on representative Multicast Patching by Bing Wang et al. (2002) for proxy-based distributed VOD. When an appointed client plays a video, it is also acting as a server transmitting the partial video segments via multicast for latter requests in local network, therefore regional abundant network bandwidth is uti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A network early-warning architecture using mobile agent

    Publication Year: 2003, Page(s):349 - 352
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    This paper presents a network early-warning architecture based on intrusion detection using mobile agent. This model can predict potential attacks based on rules among suspicious events, which are produced by basic intrusion detection module. Depending on the current needs of the deduction process, it can dispatch relevant mobile agents to collect further suspicious events. The advantage of this m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traceability of double spending in secure electronic cash system

    Publication Year: 2003, Page(s):330 - 333
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (799 KB) | HTML iconHTML

    With a widespread deployment of Internet and mobile communication skill, digital contents circulation has been in active. However, when people purchase multimedia contents such as multimedia books, online game, music, etc., by credit card, it has a problem that reveals card holder's private information. On the other hand, electronic cash provide user's anonymity and privacy, maintaining the value ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance models in GSM and GPRS networks

    Publication Year: 2003, Page(s):275 - 282
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Queuing networks models are widely used as important tools for the performance modeling and evaluation of both computer systems and communication networks. Exact solutions are generally not attainable except for some special cases. Consequently, numerical techniques and analytic approximations are needed for the study of queuing networks with bursty traffic. This paper presents the performance mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-standard SDR base band platform

    Publication Year: 2003, Page(s):461 - 464
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Software Defined Radio (SDR) is a rapidly evolving technology that will bring enormous benefits to the providers and consumers of wireless services. A multi-standard SDR base band platform for base station is proposed in the paper. The platform consists of reconfigurable and reprogrammable hardware platform which provide different standards with a common platform, the SDR software framework which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis for multimedia CDMA networks under the received power minimization model

    Publication Year: 2003, Page(s):497 - 501
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Performance analysis for multimedia code division multiple access (CDMA) networks under the received power minimization model is addressed in this paper. The received power minimization model considering intercell interference is formulated as a constrained optimization problem, based on which the system admission region is also defined. The handoff prioritized call admission scheme is then descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic broadcast ring based multicast routing protocol for ad hoc networks

    Publication Year: 2003, Page(s):409 - 414
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    Ad hoc networks are self-organizing, dynamic topology networks formed by a collection of mobile nodes through radio links. Characteristics of this network, such as dynamic topology, power constrained, bandwidth constrained links, make multicasting extremely challenging. This paper proposes a novel multicast protocol for ad hoc networks, called Dynamic Broadcast Ring based Multicast routing Protoco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A TCAM-based IP lookup scheme for multi-nexthop routing

    Publication Year: 2003, Page(s):128 - 135
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4257 KB)

    TCAM (ternary content addressable memory) is a popular device for fast routing lookups. TCAM can achieve O(1) lookup complexity with parallel technique. However, TCAM has three explicit disadvantages: high cost; high power consumption; and complex update. For load balancing and policy routing, routers have to hold considerable multi-nexthop routes with multi paths for a destination network. This p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAGE: multi-agent environment

    Publication Year: 2003, Page(s):181 - 188
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Intelligent agent technology has been raised as the primary technology in the intelligent Internet and mobile computing. In this paper, MAGE (multi-agent environment) is introduced which is an environment for rapidly developing distributed, heterogeneous multi-agent systems. Agent model, agent architecture, MAGE platforms, comparison between MAGE and other multi-agent framework is presented in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survey on QoS management of VoIP

    Publication Year: 2003, Page(s):69 - 77
    Cited by:  Papers (11)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    In this paper, we present a survey on management mechanisms used for ensuring the quality of services (QoS) for voice-over IP (VoIP) applications. We first address the motivations of QoS management for VoIP. We then partition the system into two management planes, data plane and control plane, and describe mechanisms in each plane respectively. In data plane, we cover several important techniques ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture of hydrological telemetering software based on Web services

    Publication Year: 2003, Page(s):432 - 437
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    The complex heterogeneity of hydrological telemetering system based on network results in the complexity of the software architecture of system, so it is very difficult to improve the software reusability and integrate several different systems. In order to solve these problems, following the principle of service-oriented architecture to analyses and describe the hydrological telemetering system (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable PKI model based on location information

    Publication Year: 2003, Page(s):362 - 365
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    When introducing public key infrastructure (PKI) in mobile telecommunication systems, one of the challenges is to span different PKI domains to establish certificate chain efficiently, and still keep the autonomy in local areas. The PKI model proposed in this paper improves the traditional PKI's performance on the above aspect. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient and robust conference key distribution protocol

    Publication Year: 2003, Page(s):338 - 340
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    A computationally secure and robust conference key distribution scheme is presented, which requires only the authenticated and encrypted point-to-point channels between each server and each user. By using it, every honest user of a conference can get a common key after running of the protocol, even if some minority of the servers malfunction or misbehave. Analysis shows that a passive adversary ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending life cycle of legacy systems

    Publication Year: 2003, Page(s):291 - 296
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3951 KB)

    IT organizations have consistently failed to re-engineer legacy systems applications over the last two decades. The legacy applications continue to be vital to the business operations of most large corporations. The ability of the IT organization to effectively maintain and evolve these applications is strategic to the future of these businesses. Review of several order management applications dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of multi-access performance based on non-period chaotic frequency hopping sequences

    Publication Year: 2003, Page(s):506 - 508
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (647 KB) | HTML iconHTML

    Based on the chaotic non-period frequency-hopping (FH) sequences, the paper suggests a kind of packet protocol for frequency-hopping networks. In theory, the performance of the packet error and the throughput of frequency-hopping multi-access (FHMA) network are derived, which shows that the ratio of the packet length M to the frequency-hopping points q is the most key parameter to determine the FH... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.