|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note: For updated information on getting to the conference site, check the Hotels and Travel link in the left side menu. Conference rooms: "Le Campus" PRELIMINARY PROGRAM Saturday, August 26
Sunday, August 27
Monday, August 28
Tuesday, August 29
Wednesday, August 30
Thursday, August 31
DETAILED PROGRAM The current program is based on your original submissions, not the camera ready versions. Any changes to the title or authors is reflected on the CD and the IEEE Xplore Digital Library. If any change is needed on the posted program, please send an email request to cosmin@iaria.org ICISP1: MONIT Monitoring of SIP-Based Communication - Using Signalling Information for Performance Measurements VIP Bridge: Integrating Several Sensor Networks into One Virtual Sensor Network Measurement Based Approach of Congestion Control for enforcing a robust QoS in the Internet Monitoring & Forensic Analysis for Wireless Networks ICISP2: IPERF I Evaluation of a Multi-Queue Web Caching Scheme that Differences the Content-Type of Documents Complementary Visualization of perfSONAR Network Performance Measurements Internet Traffic Modeling: Performance Limits Design and Evaluation of an Overload Control System for Crisis-Related Web Server Systems ICISP3: IPERF II The Interaction of IGP Weight Optimization with BGP Public Domain P2P File-sharing networks measurements and modelation Overload Protection in a SIP Signaling Network Evolution of Current Telecommunication Networks and Next Generation Optical Networks ICISP4: TRASI I Initial Results from an IPv6 Darknet Traffic Analysis of a Congested Link Flow-Based Identification of P2P Heavy-Hitters ICISP5: TRASI II Crawler Detection: A Bayesian Approach On the Power-Law of the Internet and the Hierarchy of BGP Convergence Monitoring Challenges and Approaches for P2P File-Sharing Systems ICISP6: SYNEV Improving Network Infrastructure Security by Partitioning Networks Running Spanning Tree Protocol Disaster Recovery Sites as a Tool of Managing Extreme Attacks Simple provisioning, complex consolidation - pragmatic step towards a new optical layer A New Planning Methodology for IP Networks with Dynamic Traffic Demand and Full Survivability Guarantee Against Link Failures ICISP7: USSAF I Authentication in an Internet Banking Environment; Towards Developing a Strategy for Fraud Detection A Generic Authentication System based on SIM Using the Discrete Squaring Function in the Delayed Message Authentication Protocol Cooperative Itinerant Agents (CIA): Security scheme for Intrusion Detection Systems ICISP8: USSAF II Technical infrastructure of a CSIRT Home and Small Office Monitoring and Automation over the Internet SEMAFOR : framework for authentication of adaptive multimedia content platform ICISP9: RTSEC SeCReT: A Security Framework for Enhancing Chain of Response Trust in Session Initiation Protocol Towards new security framework for voice over IP TOES: Trustful and Open e-Ordering Service for SMEs ICDT1: SIGNAL I A Data-Flow Platform for Implementing Algorithm-Dependent ASIC Hardware Using Data-Driven Processors Design of Mobile receiver in Ultrawideband Impulse Radio System Using Time-Hopping and PPM Modulation Data-aided Equalization Scheme for Filtered Multitone Modulation System HNN-based Multiuser Receiving for Uplink CDMA Systems ICDT2: SIGNAL II Viterbi Algorithm in Continuous-Phase Frequency Shift Keying Perceptual acoustic echo suppressor for audio communication over packet networks Skip Prediction and Early Termination for Fast Mode Decision in H.264/AVC Spatio-Temporal MIMO Systems for Multiuser Communications under Frequency Selective Fading ICDT3: SIGNAL III A novel channel estimator based on polynomial fitting method in PSAM communication systems An Artificial Immune-based Feature Interaction Detection Method Addaptive Reduced-Rank Interference Suppression for MIMO-OFDM Decoding ICDT4: VIDEO I A New Rate Control Scheme for H.264/AVC Collaborative Video Annotation Environments: Implemented Features and a new Approach for Object Detection and Recognition Adaptive Pruned 4�4 DCT Algorithm for H.264 Fast Motion Estimation using Evolutionary Strategy Search Algorithm ICDT5: VIDEO II A Fast Coefficients Convertion Method For The Transform Domain MPEG-2 To H.264 Transcoding Fast Frame/Field Coding for H.264/AVC A simplified Scalable Wavelet Video Codec with MCTF Structure ICDT6: VIDEO III Multiple Description Coding versus Transport Layer FEC for Resilient Video Transmission A Novel Temporal Error Concealment Base on Statistical Pixel Estimation Model Performance Comparison of Emerging Dirac Video Codec with H.264/AVC 802.11g WLANs Design for Rural Environments Video-surveillance ICDT7: CONTENT Web Content Management Systems: using Plone open software to built a website for a research institute needs Per-Subscriber On-Demand QoS Assurance in Distributed Web Cache System Data popularity and shortest-job-first scheduling of network transfers ICDT8: IMAGE Content based Frame Sampling for Efficient Video Delivery over Low/Varying Bandwidth Networks A Novel Palmprint Recognition Algorithm Based on PCA&FLD Chaotic Watermarking System for Colour images Based on Texture segmentation in WaveleTransform Domaint ICDT9: AUDIO Perceptually Controlled Error Protection for Audio Streaming over IP Networks A Comparative Analysis and Experimental Study on Wireless Aerial and Underwater Acoustic Communications Two-stage Classification of Emotional Speech ICDT10: MULTE I Synchronized chaotic Lu system in CDMA satellite communication using genetic algorithm Sliding Header Schemes for Simplifying Hunting-Free Framer Design for Digital Transmission and Multiplexing Novel PAPR Reduction Technique based on Circular Data Allocation Novel Channel Estimation and Interference Suppression for Uplink Multiuser CDMA Systems ICDT11: MULTE II Impact of Bit Errors on the DCF Throughput in Wireless LAN over Ricean Fading Channels Jitter Ratio Based TFRC Scheme In Wireless-Wired Hybrid Network Video Applications Quality Improvement in Wireless Systems: QoS Negotiation and Rate Control Audio Signal Watermarking in MCLT Domain with the Aid of 2D Pattern ICDT12: MULTE III A Novel Multiresolution Perceptual And Statistically Based Image Coding Scheme Multiple Description Video Coding over Multiple Path Routing Networks Power Estimation for an Application on the Xscale Platform Using PMU events A Software Simulation Study of a MD DS/SSMA Communication System with Adaptive Channel Coding ICDT13: MULTE IV Towards an Interactive IPTV for Mobile Subscribers Architectures For Person to Person Communications in Disaggregated Networks Quality of Service Support for ODMRP Unicast Routing in Ad hoc Networks Design and Implementation of The High Speed VP (Variable Parameter)-Cubic Interpolator for The System of MB-OFDM UWB. ICDT14: MULTE V Mobile Multimedia End-User Quality of Experience Modeling Merging Prioritized Security Policies Performance Analysis of Weighted Fair Queues with Variable Service Rates Distributed Connection Admission Control and Dynamic Channel Allocation in Ad Hoc Cellular Networks ICDT15: MULTE VI Media Privacy in SIP Conferencing Systems Triple Play Service Simulation and Packet Scheduling Performance Evaluation Broadcast Television Services Suited for Mobile Handheld Devices Design and Testing of two Secure Video Conferencing Applications Based on JMF and VIC ICDT16: DATA I Providing the QoS with the Help of Transport Coding Contention MAC Protocols Efficiency Testing in a Small Wireless Network Fair Allocation of Link Capacity through Feedback of Bottleneck Information Latency of Energy Efficient MAC Protocols for Wireless Sensor Networks ICDT17: DATA II Using Voice Servers For Speech Analytics Multimedia content authentication for proxy-side Adaptation Using of Clustering and Ant-Colony Algorithms CWSP-PAM-ANT for Network Planning Quantum information authentication using entangled states ICDT18: VOICE I Reliable Multi-Path Routing Schemes for Voice over Packet Networks Clock Skew Compensation by Speech Interpolation An overview of some techniques to exploit VoIP over WLAN ICDT19: VOICE II SIP Spam Detection Satellite VoIP Access Gateway Aggregate Traffic Models for VoIP Applications ICDT20: MEDMAN Optical Channel Assignment for Hierarchical Cellular Networks A Practical Multipurpose Color Image Watermarking Algorithm for Copyright Protection and Image Authentication Development of Applications for Real-Time Video Signal Processing Prediction Strategies for Proactive Management in Dynamic Distributed Systems Call Admission Control for a Wireless Mobile Multimedia Network Serving Narrowband and Wideband Customers |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006, IARIA