|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Preliminary Program Sunday, March 1
Monday, March 2
Tuesday, March 3
Wednesday, March 4
Thursday, March 5
Friday, March 6
DETAILED PROGRAM ICN 2009 ICN 1: Performance evaluation, tools, simulation Simulation Based Performance Analysis of Ethernet MPI Cluster A Program Suite for Distributed Simulation of Networks in Multi-core Environments The Impact of AP Placement in WLAN-Based Indoor Positioning System Designing and Implementing an Embedded Linux for Limited Resource Devices ICN 2: Communication modeling, communication theory & signal processing in communications Measuring Route Diversity in the Internet from Remote Vantage Points Does the Internet Still Demonstrate Fractal Nature? Capacity Theorem for Finite Duration Symbols Filter Design for Image Preprocessing in Image Communication ICN 3: Wireless communications I Application of Game Theory in Ad-Hoc Opportunistic Radios A Node’s Number of Neighbors in Wireless Mobile Ad Hoc Networks: A
Statistical View Simulation Platform for Wireless Sensor Networks Based on Impulse Radio
Ultra Wide Band Self-Configuration Channel in the Wireless Networks ICN 4: Wireless communications II A TDMA-Based MAC Protocol for Mobile Sensor Networks A Hybrid Approach to Actor-Actor Connectivity Restoration in Wireless Sensor
and Actor Networks Proposal of Data Intensive Sensor Networks with Forwarder Nodes QoS in IEEE 802.16e for VoIP and Video with Mechanism of Soft Handover -
FBSS in Highway ICN 5: Wireless communications III On the Path Processing under Energy Constraints LS2RP: Link-State RAID Routing Protocol A Heuristic for Minimum Connected Dominating Set with Local Repair
for Wireless Sensor Networks Performance Tests of the Dynamics of the Wireless Networks ICN 6: Wireless communications IV Power Analysis of Communication of RFID Transponders
with Password-Protected Memory Degree-Based Power Control Method for Increasing Spatial Reuse
in TDMA-Based Wireless Mesh Networks Routing Method for Gateway Load Balancing in Wireless Mesh Networks Group Key Agreement Scheme for Single Link Failure in Ad-Hoc Network ICN 7: Wireless communications V Energy Aware Database Updating Protocols for Autoconfigurable Sensor
Networks A Fair Routing Algorithm for Wireless Mesh Networks Based on Game Theory An Effective Dynamic Spectrum Assignment in WiFi/WiMAX Integrated
Networks An Approach to Data Extraction and Visualisation for Wireless Sensor
Networks ICN 8: Communications switching and routing & distributed communication Efficiency Analysis of Evolutionary Algorithm for Congestion Problem Using
Computer Experimentation System Acquisition of Channel State Information for Routing Purposes in Relay-Based
WiMAX Networks Metric-Based Topology Investigation All-to-All Personalized Exchange Algorithms in Generalized Shuffle-Exchange
Networks ICN 9: Quality of service, service level agreement & Peer-to-peer and overlay networking A Model Based RL Admission Control Algorithm for Next Generation Networks Theoretical Analysis of EDCA Medium Access-Control Method in Simplified
Network Environment PEMS a DiffServ Aware MPLS Traffic Engineering Model for the Networks
of ISP jSon: Network of Active Elements with Peer-to-Peer Control Plane ICN 10: Applications and case studies Managing Data in E-Social Science
Specifications of Secure and Safe Embedded System Networks Trainspotting, a WSN-Based Train Integrity System Implicit Media Knowledge ICN 11: Communications security New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad
Hoc Networks Social Networks as an Attack Platform: Facebook Case Study Secure H.323 Data Transmission between Private Networks Wireless Communication for Mobile Robotics and Industrial Embedded
Devices ICN 12: Network middleware & Voice over IP services CoUniverse: Framework for Building Self-Organizing Collaborative
Environments Using Extreme-Bandwidth Media Applications Effective and Resource-Efficient Multimedia Communication Using
the NIProxy A Holistic Approach to Open-Source VoIP Security: Preliminary Results
from the EUX2010sec Project Impact of Handover on VoIP Speech Quality in WiMAX Networks ICN 13: Mobile networking and systems A Message-Optimal Sink Mobility Model for Wireless Sensor Networks Parameter Setting of Protocol MAC-hs in HSDPA Efficient Channel Allocation Scheme with Triangle Communication Fair Queuing Model for EDCA to Optimize QoS in Ad-Hoc Wireless Network ICN 14: NGN Device Instrumentation, NGN Policy Based Protocol & NGN protocol design and evaluation Solutions and Comparison of Performance to the Key Technologies
of PIM-SM under ForCES Architecture’s Router Achieving a QoS Target in NGN Networks via an Efficient Admission Control
Strategy Multiple Interface Management of Multihomed Mobile Hosts in Heterogeneous
Wireless Environments A Novel DHT-Based Network Architecture for the Next Generation Internet ICN 15: Multimedia and multicast communications, Access and home networks & Telecommunication networks architectures Video Quality Protection Strategies for HDTV in the Presence of Buffer
Overflow HRSQM: Heterogeneous Receivers Supporting QoS Multicast Managing Home Care Networks Distributed Information Object Resolution ICN 16: GRID Networks Characterization of Static/Dynamic Topological Routing for Grid Networks A Cloud Computing Based Real Time Financial System Using Monte Carlo Simulation in Grid Computing Systems for Reliability
Estimation Combining Reliability and Economic Incentives in Peer-to-Peer Grids ICN 17: Network Management, scheduling and policy & Optical Networks Self-Configurable Diagnosis Algorithm on an Isolation Network Design and Validation of an Analytical Model to Evaluate Monitoring
Frameworks Limits CESNET Fiber Optics Transport Network FSA - A Flooding Based Survivable RWA Mechanism for Dynamic Traffic
Demands in WDM Optical Networks ICN 18: Vehicular Networks & High Speed Networks Using Context Ontologies for Addressing and Routing in Mobile Ad Hoc
Networks An Automotive Security System for Anti-theft
Proposal of Distribution Scheme for Vehicle Information in ITS Networks Efficient Virtualization of High-Performance Network Interfaces ICN 19: Reliability, availability, serviceability Research and Design of the Pseudo-VRRP Based High Availability
Mechanism in the ForCES Router Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ
Attacks Understanding Danger to Critical Telecom Infrastructure: A Risky Business
ICONS 2009 ICONS 1: Application-oriented systems & Target Oriented Systems Mobile Agents and Their Ontology Serving a Federated Identity Platform Technologies for the Pseudonymization of Medical Data: A Legal Evaluation Important Nonverbal Attributes for Spontaneous Speech Recognition Evaluation of Tasks Scheduling Algorithms in Multi-core and Multi-queuing
Environments Using System MESMS2 ICONS 2: Systems’ theory and practice Fault Management for Secure Embedded Systems Improving the Sensitivity of Deadlines with a Specific Asynchronous Scenario
for Harmonic Periodic Tasks scheduled by FP Low Cost RT Process Control Using Windows PLC by MATLAB/Simulink
Throw the REX Control System by Secured Wireless Network Ideas on System Thinking and Acting: Basic Issues, Aporetic Constructs
and Application of the Metanoia Principle ICONS 3: Specialized Systems IMS Vertical Handover Optimization Based on Network Resources Implicit Adaptation of User Preferences in Pervasive Systems Power Saving of Real Time Embedded Sensor for Medical Remote Monitoring Modified Multi-layer Feedback Delay Network for Auditory Space Simulation ICONS 4: Security and protection systems I System Dynamics Based Risk Management for Distributed Information
Systems Ontology-Based Decision Support for Information Security Risk Management Multi-sensor Logical Decision Making in the Single Location Surveillance Point
System Authentication and Billing Framework for Service Oriented Architecture ICONS 5: Security and Protection Systems II An Integrated System for Border Surveillance Extracting Value from P2P Content Delivery Authentication Protocol in Mobile RFID Network Attribute-Based Access Control in an Adaptive Hypermedia System ICONS 6: Advanced Systems A Multiple Criteria Decision-Making Method for Enterprise Supply Chain
Finance Cooperative Systems Assessing - Learning - Improving, an Integrated Approach for Self Assessment
and Process Improvement Systems Adaptive Real-Time Video Streaming System for Best-Effort IP Networks Resource Discovery with Dynamic Matchmakers in Ad Hoc Grid ICONS 7: Advanced & Complex Systems Runtime Diversity against Quasirandom Faults The Integrated Unit for MEMS Based Pressure Measurement Utilization of the Fuzzy Theory in the Adaptive Hypermedia Systems
Nine Robot´s Morris: A Challenge for Self-Organizing Robot Teams ICONS 8: Embedded systems and systems-on-the-chip Support for Programming Embedded Software with Dynamically Typed
Languages The System for Detecting Lead in Solders FPGA Based High Date Rate Radio Interfaces for Aerospace Wireless Sensor
Systems Bandpass Sigma-Delta Modulator for Sensor Signal Processing ICONS 9: System Engineering I Defining Requirements for an Incident Management System: A Case Study Signature Matching Applied to Simulation/Frame Duality Production Quality Modeling Based on Regression Rules Extracted
from Trained Artificial Neural Networks Integrated Circuits 3D Silicon Integration ICONS 10: System Engineering II & Safety in industrial systems Using Sysml to Describe a New Methodology for Semiautomatic Software
Generation from Inferred Behavioral and Data Models Iterative Requirements Engineering and Architecting in Systems Engineering Collaboration Strategies for Distributed Teams: A Case Study of CAD Systems
Integration Modeling System Safety Requirements Using Input/Output Constraint
Meta-automata ICONS 11: Posters Use of Magnetic Resonance to Determine the Circumference of Radial Slices
of Norway Spruce Data Processing in Studying the Growth of Early Spruce Embryos, Using MR
Imaging Techniques Implementation of Intrusion Detection System for Automation Devices
within Virtual Automation Network Whole Brain CT Perfusion Maps Ontology Driven E-Government
DBKDA 2009 DBKDA 1: Specifics on application domains databases IRCDB: A Database of Inter-residues Contacts in Protein Chains
Efficient Range-Sum Queries along Dimensional Hierarchies in Data Cubes Multi-level Topological Relations of the Spatial Reasoning System RCC-8 An Extension of XQuery for Graph Analysis of Biological Pathways DBKDA 2: Databases and other domains Replay the Execution History of Rule-Based Information A Classification of Object-Relational Impedance Mismatch Effective Snippet Clustering with Domain Knowledge Using Input Buffers for Streaming XSLT Processing DBKDA 3: Database Techologies Distributed Key Management in Dynamic Outsourced Databases: A
Trie-Based Approach Applying Map-Reduce Paradigm for Parallel Closed Cube Computation A Pseudo Object Database Model and Its Applications on a Highly Complex
Distributed Architecture MyMIDP: An JDBC Driver for Accessing MySQL from Mobile Devices DBKDA 4: Advances in fundamentals on databases Assessing Quality of Derived Non Atomic Data by Considering Conflict
Resolution Function Transaction Processing in Mobile Computing Using Semantic Properties Towards a Combination of Three Representation Techniques for Conceptual
Data Modeling Querying Trajectory Data Warehouses DBKDA 5: Databases content processing Analyzing Malware Log Data to Support Security Information and Event
Management: Some Research Results A Strong Containment Problem for Queries in Conjunctive Form with Negation Research on Cost-Sensitive Communication Models over Distributed Data
Streams Processing Source-Aware Repairs for Inconsistent Databases Towards Connecting Database Applications to Ontologies DBKDA 6: Knowledge and decision data bases Semantic Log Based Replication Model for Optimizing Heterogeneous DBMS
Interaction Web Based Medical Expert System with a Self Training Heuristic Rule Induction Algorithm Extension of Protégé to Support Evolution of Ontology Visualization and Integration of Databases Using Self-Organizing Map An Adaptive Synchronization Policy for Harvesting OAI-PMH Repositories |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2010, IARIA