|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PRELIMINARY PROGRAM
Sunday, January 23
Monday, January 24
Tuesday, January 25
Wednesday, January 26
Thursday, January 27
Friday, January 28
DETAILED PROGRAM
ICN 2011, The Tenth International Conference on Networks ICN 1: Communications Security I Trust Model-based Secure Cooperative Sensing Techniques for Cognitive Radio Networks Customer Security Concerns in Cloud Computing Access Control in a Form of Active Queuing Management in Congested Network Environment IPv6: Now You See Me, Now You Don't ICN 2: Communications Security II A Review Study on Image Digital Watermarking Security Analysis of LTE Access Network Anonymous Key Issuing Protocol for Distributed Sakai-Kasahara Identity-based Scheme Efficiency Optimisation Of Tor Using Diffie-Hellman Chain ICN 3: NGN I Interaction between an Online Charging System and a Policy Server StepRoute - A MultiRoute Variant Based on Congestion Intervals A Naming Scheme for Identifiers in a Locator/Identifier-Split Internet Architecture Address-Translation-Based Network Virtualization ICN 4: NGN II Next Generation Access Networks (NGANs) and the geographical segmentation of markets Does Cloud Computing Matter? Networking IT and Services Value in Organizations Motivations and Challenges of Global Mobility with Universal Identity: A Review A new Hybrid SPD-based Scheduling for EPONs ICN 5: Performance Evaluation, Tools, Simulation I Link Emulation on the Data Link Layer in a Linux-based Future Internet Testbed Environment User utility function as Quality of Experience (QoE) Tuning Self-Similar Traffic to Improve Loss Performance in Small Buffer Routers ICN 6: Performance Evaluation, Tools, Simulation II Performance evaluation of Burst deflection in OBS networks using Multi-Topology routing Modeling and Evaluation of SWAP Scheduling Policy Under Varying Job Size Distributions Optical Protection with Pre-configured Backup Paths and Limited Backup Resource Sharing DNS Security Control Measures: A heuristic-based Approach to Identify Real-time incidents ICN 7: Communications Switching and Routing Design Experience with Routing SW and Related Applications Adaptive Load Balanced Routing for 2-Dilated Flattened Butterfly Switching Network A Review of IPv6 Multihoming Solutions ICN 8: Voice over IP An Analytic and Experimental Study on the Impact of Jitter Playout Buffer on the E-model in VoIP Quality Measurement SIP Providers' Awareness of Media Connectivity Improving SIP authentication ICN 9: Vehicular and Mobile Networks Performance Evaluation of Inter-Vehicle Communications Based on the Proposed IEEE 802.11p Physical and MAC Layers Specifications Cooperative Vehicle Information Delivery Scheme for ITS Networks with OFDM Modulation Techniques An Adaptive Mechanism for Access Control in VANETs Methodology of Dynamic Architectural Adaptation for Ad hoc Networks Operating in Disturbed Environment ICN 10: Applications and Case Studies A Regional City Council mGovernment Case Study: Success Factors for Acceptance and Trust Evaluation of Buffer Size for Middleware using Multiple Interface in Wireless Communication Mobile Ad-hoc Networks: an Experimentation System and Evaluation of Routing Algorithms Home Automation with IQRF Wireless Communication Platform: A Case Study ICN 11: Wireless Communications I Secure Packet Transfer in Wireless Sensor Networks - A Trust-based Approach Opportunistic Sensing in Wireless Sensor Networks Adaptive Techniques for Elimination of Redundant Handovers in Femtocells Reconfigurable Tactical Impulse Radio UWB for Communication and Indoor Localization ICN 12: Wireless Communications II CQI Reporting Imperfections and their Consequences in LTE Networks HyRA: A Software-defined Radio Architecture for Wireless Embedded Systems Sensors Deployment Strategies for Rescue Applications in Wireless Sensor etworks UHF-RFID-Based Localization Using Spread-Spectrum Signals ICN 13: Wireless Communications III An Error Reduction Algorithm for Position Estimation Systems Using Transmitted Directivity Information A Dynamic Bandwidth Allocation Scheme for Interactive Multimedia Applications over Cellular Networks Distributed TDMA MAC Protocol with Source-Driven Combined Resource Allocation in Ad Hoc Networks A Primitive Capacity Analysis of a Cognitive Network with Single and Double Threshold ICN 14: Mobile Networking and Systems I Loss Differentiation and Recovery in TCP over Wireless Wide-Area Networks By Use of Frequency Diversity and High Priority in Wireless Packet Retransmissions Kernel Monitor of Transport Layer Developed for Android Working on Mobile Phone Terminals Path Selection in WiMAX Networks with Mobile Relay Stations ICN 15: Mobile Networking and Systems II Planning with Joint Clustering in Multi-hop Wireless Mesh and Sensor Networks Anomaly Detection Framework for Tracing Problems in Radio Networks A New Path Failure Detection Method for Multi-homed Transport Layer Protocol A Mechanism for Semantic Web Services Discovery in Mobile Environments ICN 16: On-demand Networks, Utility Computing Architectures Towards Efficient Energy Management: Defining HEMS, AMI and Smart Grid Objectives Experimental Assessment of Routing for Grid and Cloud Scalability of Distributed Dynamic Load Balancing Mechanisms Moving to the Cloud: New Vision towards Collaborative Delivery for Open-IPTV ICN 17: Signal Processing in Communications Half-Band FIR Filters for Signal Compression Comb Filters for Communication Technology Outage Performance Analysis of Alamouti STBC in Backward Link for Wireless Cooperative Networks Exact Error Probabilities Analysis of Arbitrary 2-D Modulation-OFDM Systems with I/Q Imbalances in Frequency-Flat Rayleigh Fading Channel ICN 18: Peer-to-Peer and Overlay Networking Performance Issues in the Design of a VPN Resistant to Traffic Analysis Layer Optimization for DHT-based Peer-to-Peer Network Performance Evaluation of Split Connection Methods for Session-based Group-oriented Communications Efficient Location-aware Replication Scheme for Reliable Group Communication Applications ICN 19: Multimedia and Multicast Communications I2P Data Communication System Experimental IPTV and IPv6 Extended Provisioning in a Virtual Testbed Analysis of the Implementation of Utility Functions to Define an Optimal Partition of a Multicast Group A Survey on Robust Wireless JPEG 2000 Images and Video Transmission Systems ICN 20: Reliability, Availability, Serviceability Analysis of Reliable and Scalable Video-On-Demand Networks Usability Evaluation and Study of a Video-Conferencing Service Provided via the Virtual Conference Centre Multi-Episodic Dependability Assessments for Large-Scale Networks Soft Errors Mask Analysis on Program Level
ICONS 2011, The Sixth International Conference on Systems ICONS 1: Embedded Systems and Systems-on-the-chip I Implementation of MCU Invariant I2C Slave Driver Using Bit Banging A Programmable Interconnection Network for Multiple Communication Patterns A Cyber-Physical System Design Approach Event Driven Programming for Embedded Systems - A Finite State Machine Based Approach ICONS 2: Embedded Systems and Systems-on-the-chip II Optimizing Collective Communications on the K-port Spidergon Network A Hardware-in-the-Loop Testing Platform Based on a Common Off-The-Shelf Non-Real-Time Simulation PC Novel Modulo 2n+1 Subtractor and Multiplier Real-time Component Labelling with Centre of Gravity Calculation on FPGA ICONS 3: Systems Engineering Improved Performance of a Microstrip Antenna Array Using a tree structure patch fed by electromagnetic coupling Access Control for Coordinated Multi-antenna Cellular Architecture with Scheduling Using Grounded Theory as a Supportive Technique for System Requirements Analysis Mobile agent for orchestrating web services ICONS 4: Security and Protection Systems I Architecture Patterns for a Ubiquitous Identity Management System Instantaneous Autonomous Aerial Reconnaissance for Civil Applications Multifactor Authentication Device ICONS 5: Security and Protection Systems II Protect Critical Information Infrastructure Systems in Financial and Healthcare Sectors: Actor Network Theory Mobile RFID Mutual Authentication and Ownership Transfer Intrusion Detection System for wide Automation Network Based on the Ethernet Compatible Communication Protocols ICONS 6: Systems' Theory and Practice End-User Development Success Factors and their Application to Composite Web Development Environments Towards building health systems Comparative Analysis of the Practice of Telecom Operators in the Realization of IPTV Systems Based on ITIL V3 Recommendations for the Supplier Management Process An Approach to Service Deployment to the Service Cloud ICONS 7: Application-oriented Systems Qualitative Assessment Dynamics For Trust Management in e-Business Environments An Experimentation System for Bus Route Planning and Testing Metaheuristics Algorithms Reconstruction Quality of Congested Freeway Traffic Patterns from Probe Vehicles Based on Kerner's Three-Phase Traffic Theory ICONS 8: Advanced Systems Innovation Process - Managing Complexity through Financial Aspects A Service-Oriented Monitoring System of Pressurized Air in Industrial Systems for Energy Awareness
DBKDA 2011, The Third International Conference on Advances in Databases, Knowledge, and Data Applications DBKDA 1: Data Quality and Uncertainty Trusted Data in IBM's Master Data Management A Field Analysis of Relational Database Schemas in Open-source Software The Use of Data Cleansing in Mobile Devices DBKDA 2: Data Query, Access, Mining, and Correlation Remote Comparison of Database Tables An Approach for Distributed Streams Mining Using Combination of Naïve Bayes and Decision Trees Systems Biology Warehousing: Challenges and Strategies toward Effective Data Integration Studying the Impact of Partition on Data Reduction for Very Large Spatio-temporal Datasets DBKDA 3: Data Privacy Hybrid DCT-CT Digital Image Adaptive Watermarking A Secure Database System using Homomorphic Encryption Schemes SQRM: An Effective Solution to Suspicious Users in Database DBKDA 4: Databases and Other Domains Exploring the Essence of an Object-Relational Impedance Mismatch - A novel technique based on Equivalence in the context of a Framework Symbolic Representation and Reasoning for Rectangles with Superposition New fuzzy multi-class methode to train SVM classifier MAXCLIQUE Problem Solved Using SQL DBKDA 5: XML-driven Data, Knowledge, Databases I Managing and Processing Office Documents in Oracle XML Database An Algorithm for Clustering XML Data Stream Using Sliding Window Societal View on Knowledge Representation and Management: A Case Study of an ICT Consulting Company DBKDA 6: XML-driven Data, Knowledge, Databases II Exploring Statistical Information for Applications-Specific Design and Evaluation of Hybrid XML storage. Transforming XPath Expressions into Relational Algebra Expressions With Kleene Closure Large Software Component Repositories into Small Index Files DBKDA 7: Data Management Intelligent Database Flexible Querying System by Approximate Query Processing IMA: Identification of Multi-author Student Assignment Submissions Using a Data A Representation of Certain Answers for Views and Queries with Negation Formation of Triads in Mobile Telecom Network DBKDA 8: Databases Technologies Ambients of Persistent Concurrent Objects Modeling Temporal Databases and Temporal Constraints Optimal Query Operator Materialization Strategy for Hybrid Databases From Synchronous Corpus to Monitoring Corpus, LIVAC: The Chinese Case DBKDA 9: Advances in Fundamentals on Databases Efficient Access to Non-Sequential Elements of a Search Tree An Optimistic Transaction Model for a Disconnected Integration Architecture A Concept for a Compression Scheme of Medium-Sparse Bitmaps Merging Differential Updates in In-Memory Column Store |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright (c) 2006-2011, IARIA