|  |  |  |  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|      |  |  |  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 
 
 PRELIMINARY PROGRAM 
 Sunday, January 23 
 Monday, January 24 
 Tuesday, January 25 
 Wednesday, January 26 
 Thursday, January 27 
 Friday, January 28 
 
 DETAILED PROGRAM 
 ICN 2011, The Tenth International Conference on Networks ICN 1: Communications Security I Trust Model-based Secure Cooperative Sensing Techniques for Cognitive Radio   Networks Customer Security Concerns in Cloud Computing Access Control in a Form of Active Queuing Management in Congested Network   Environment IPv6: Now You See Me, Now You Don't ICN 2: Communications Security II A Review Study on Image Digital Watermarking Security Analysis of LTE Access Network Anonymous Key Issuing Protocol for Distributed Sakai-Kasahara Identity-based   Scheme Efficiency Optimisation Of Tor Using Diffie-Hellman Chain ICN 3: NGN I Interaction between an Online Charging System and a Policy Server StepRoute - A MultiRoute Variant Based on Congestion Intervals A Naming Scheme for Identifiers in a Locator/Identifier-Split Internet   Architecture Address-Translation-Based Network Virtualization ICN 4: NGN II Next Generation Access Networks (NGANs) and the geographical segmentation of   markets Does Cloud Computing Matter? Networking IT and Services Value in   Organizations Motivations and Challenges of Global Mobility with Universal Identity: A   Review A new Hybrid SPD-based Scheduling for EPONs ICN 5: Performance Evaluation, Tools, Simulation I Link Emulation on the Data Link Layer in a Linux-based Future Internet   Testbed Environment User utility function as Quality of Experience (QoE) Tuning Self-Similar Traffic to Improve Loss Performance in Small Buffer   Routers ICN 6: Performance Evaluation, Tools, Simulation II Performance evaluation of Burst deflection in OBS networks using   Multi-Topology routing Modeling and Evaluation of SWAP Scheduling Policy Under Varying Job Size   Distributions Optical Protection with Pre-configured Backup Paths and Limited Backup   Resource Sharing DNS Security Control Measures: A heuristic-based Approach to Identify   Real-time incidents ICN 7: Communications Switching and Routing Design Experience with Routing SW and Related Applications Adaptive Load Balanced Routing for 2-Dilated Flattened Butterfly Switching   Network A Review of IPv6 Multihoming Solutions ICN 8: Voice over IP An Analytic and Experimental Study on the Impact of Jitter Playout Buffer on   the E-model in VoIP Quality Measurement SIP Providers' Awareness of Media Connectivity Improving SIP authentication ICN 9: Vehicular and Mobile Networks Performance Evaluation of Inter-Vehicle Communications Based on the Proposed   IEEE 802.11p Physical and MAC Layers Specifications Cooperative Vehicle Information Delivery Scheme for ITS Networks with OFDM   Modulation Techniques An Adaptive Mechanism for Access Control in VANETs Methodology of Dynamic Architectural Adaptation for Ad hoc Networks Operating   in Disturbed Environment ICN 10: Applications and Case Studies A Regional City Council mGovernment Case Study: Success Factors for   Acceptance and Trust Evaluation of Buffer Size for Middleware using Multiple Interface in Wireless   Communication Mobile Ad-hoc Networks: an Experimentation System and Evaluation of Routing   Algorithms Home Automation with IQRF Wireless Communication Platform: A Case   Study ICN 11: Wireless Communications I Secure Packet Transfer in Wireless Sensor Networks - A Trust-based   Approach Opportunistic Sensing in Wireless Sensor Networks Adaptive Techniques for Elimination of Redundant Handovers in   Femtocells Reconfigurable Tactical Impulse Radio UWB for Communication and Indoor   Localization ICN 12: Wireless Communications II CQI Reporting Imperfections and their Consequences in LTE   Networks HyRA: A Software-defined Radio Architecture for Wireless Embedded   Systems Sensors Deployment Strategies for Rescue Applications in Wireless Sensor   etworks UHF-RFID-Based Localization Using Spread-Spectrum Signals ICN 13: Wireless Communications III An Error Reduction Algorithm for Position Estimation Systems Using   Transmitted Directivity Information A Dynamic Bandwidth Allocation Scheme for Interactive Multimedia Applications   over Cellular Networks Distributed TDMA MAC Protocol with Source-Driven Combined Resource Allocation   in Ad Hoc Networks A Primitive Capacity Analysis of a Cognitive Network with Single and Double   Threshold ICN 14: Mobile Networking and Systems I Loss Differentiation and Recovery in TCP over Wireless Wide-Area   Networks By Use of Frequency Diversity and High Priority in Wireless Packet   Retransmissions Kernel Monitor of Transport Layer Developed for Android Working on Mobile   Phone Terminals Path Selection in WiMAX Networks with Mobile Relay Stations ICN 15: Mobile Networking and Systems II Planning with Joint Clustering in Multi-hop Wireless Mesh and Sensor   Networks Anomaly Detection Framework for Tracing Problems in Radio   Networks A New Path Failure Detection Method for Multi-homed Transport Layer   Protocol A Mechanism for Semantic Web Services Discovery in Mobile   Environments ICN 16: On-demand Networks, Utility Computing Architectures Towards Efficient Energy Management: Defining HEMS, AMI and Smart Grid   Objectives Experimental Assessment of Routing for Grid and Cloud Scalability of Distributed Dynamic Load Balancing Mechanisms Moving to the Cloud: New Vision towards Collaborative Delivery for   Open-IPTV ICN 17: Signal Processing in Communications Half-Band FIR Filters for Signal Compression Comb Filters for Communication Technology Outage Performance Analysis of Alamouti STBC in Backward Link for Wireless   Cooperative Networks Exact Error Probabilities Analysis of Arbitrary 2-D Modulation-OFDM Systems   with I/Q Imbalances in Frequency-Flat Rayleigh Fading Channel ICN 18: Peer-to-Peer and Overlay Networking Performance Issues in the Design of a VPN Resistant to Traffic   Analysis Layer Optimization for DHT-based Peer-to-Peer Network Performance Evaluation of Split Connection Methods for Session-based   Group-oriented Communications Efficient Location-aware Replication Scheme for Reliable Group Communication   Applications ICN 19: Multimedia and Multicast Communications I2P Data Communication System Experimental IPTV and IPv6 Extended Provisioning in a Virtual   Testbed Analysis of the Implementation of Utility Functions to Define an Optimal   Partition of a Multicast Group A Survey on Robust Wireless JPEG 2000 Images and Video Transmission   Systems ICN 20: Reliability, Availability, Serviceability Analysis of Reliable and Scalable Video-On-Demand Networks Usability Evaluation and Study of a Video-Conferencing Service Provided via   the Virtual Conference Centre Multi-Episodic Dependability Assessments for Large-Scale   Networks Soft Errors Mask Analysis on Program Level 
 ICONS 2011, The Sixth International Conference on Systems ICONS 1: Embedded Systems and Systems-on-the-chip I Implementation of MCU Invariant I2C Slave Driver Using Bit   Banging A Programmable Interconnection Network for Multiple Communication   Patterns A Cyber-Physical System Design Approach Event Driven Programming for Embedded Systems - A Finite State Machine Based   Approach ICONS 2: Embedded Systems and Systems-on-the-chip II Optimizing Collective Communications on the K-port Spidergon   Network A Hardware-in-the-Loop Testing Platform Based on a Common Off-The-Shelf   Non-Real-Time Simulation PC Novel Modulo 2n+1 Subtractor and Multiplier Real-time Component Labelling with Centre of Gravity Calculation on   FPGA ICONS 3: Systems Engineering Improved Performance of a Microstrip Antenna Array Using a tree structure   patch fed by electromagnetic coupling Access Control for Coordinated Multi-antenna Cellular Architecture with   Scheduling Using Grounded Theory as a Supportive Technique for System Requirements   Analysis Mobile agent for orchestrating web services ICONS 4: Security and Protection Systems I Architecture Patterns for a Ubiquitous Identity Management   System Instantaneous Autonomous Aerial Reconnaissance for Civil   Applications Multifactor Authentication Device ICONS 5: Security and Protection Systems II Protect Critical Information Infrastructure Systems in Financial and   Healthcare Sectors: Actor Network Theory Mobile RFID Mutual Authentication and Ownership Transfer Intrusion Detection System for wide Automation Network Based on the Ethernet   Compatible Communication Protocols ICONS 6: Systems' Theory and Practice End-User Development Success Factors and their Application to Composite Web   Development Environments Towards building health systems Comparative Analysis of the Practice of Telecom Operators in the Realization   of IPTV Systems Based on ITIL V3 Recommendations for the Supplier Management   Process An Approach to Service Deployment to the Service Cloud ICONS 7: Application-oriented Systems Qualitative Assessment Dynamics For Trust Management in e-Business   Environments An Experimentation System for Bus Route Planning and Testing Metaheuristics   Algorithms Reconstruction Quality of Congested Freeway Traffic Patterns from Probe   Vehicles Based on Kerner's Three-Phase Traffic Theory ICONS 8: Advanced Systems Innovation Process - Managing Complexity through Financial   Aspects A Service-Oriented Monitoring System of Pressurized Air in Industrial Systems   for Energy Awareness 
 DBKDA 2011, The Third International Conference on Advances in Databases, Knowledge, and Data Applications DBKDA 1: Data Quality and Uncertainty Trusted Data in IBM's Master Data Management A Field Analysis of Relational Database Schemas in Open-source   Software The Use of Data Cleansing in Mobile Devices DBKDA 2: Data Query, Access, Mining, and Correlation Remote Comparison of Database Tables An Approach for Distributed Streams Mining Using Combination of Naïve Bayes   and Decision Trees Systems Biology Warehousing: Challenges and Strategies toward Effective Data   Integration Studying the Impact of Partition on Data Reduction for Very Large   Spatio-temporal Datasets DBKDA 3: Data Privacy Hybrid DCT-CT Digital Image Adaptive Watermarking A Secure Database System using Homomorphic Encryption Schemes SQRM: An Effective Solution to Suspicious Users in Database DBKDA 4: Databases and Other Domains Exploring the Essence of an Object-Relational Impedance Mismatch - A novel   technique based on Equivalence in the context of a Framework Symbolic Representation and Reasoning for Rectangles with   Superposition New fuzzy multi-class methode to train SVM classifier MAXCLIQUE Problem Solved Using SQL DBKDA 5: XML-driven Data, Knowledge, Databases I Managing and Processing Office Documents in Oracle XML Database An Algorithm for Clustering XML Data Stream Using Sliding   Window Societal View on Knowledge Representation and Management: A Case Study of an   ICT Consulting Company DBKDA 6: XML-driven Data, Knowledge, Databases II Exploring Statistical Information for Applications-Specific Design and   Evaluation of Hybrid XML storage. Transforming XPath Expressions into Relational Algebra Expressions With   Kleene Closure Large Software Component Repositories into Small Index Files DBKDA 7: Data Management Intelligent Database Flexible Querying System by Approximate Query   Processing IMA: Identification of Multi-author Student Assignment Submissions Using a   Data A Representation of Certain Answers for Views and Queries with   Negation Formation of Triads in Mobile Telecom Network DBKDA 8: Databases Technologies Ambients of Persistent Concurrent Objects Modeling Temporal Databases and Temporal Constraints Optimal Query Operator Materialization Strategy for Hybrid   Databases From Synchronous Corpus to Monitoring Corpus, LIVAC: The Chinese   Case DBKDA 9: Advances in Fundamentals on Databases Efficient Access to Non-Sequential Elements of a Search Tree An Optimistic Transaction Model for a Disconnected Integration   Architecture A Concept for a Compression Scheme of Medium-Sparse Bitmaps Merging Differential Updates in In-Memory Column Store |  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|  |  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2011, IARIA