


default search action
2. NBiS 2008: Turin, Italy
- Makoto Takizawa, Leonard Barolli, Tomoya Enokido:

Network-Based Information Systems, 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings. Lecture Notes in Computer Science 5186, Springer 2008, ISBN 978-3-540-85692-4
Keynote Talk
- Arjan Durresi:

Patterns in Internet Architecture. 1
Wireless Networks
- Giuseppe De Marco:

GAMesh: Automatic Placement of Wireless Mesh Nodes Via Genetic Algorithms. 2-11 - Markus Aleksy

, Thomas Butter, Martin Schader:
Context-Aware Loading for Mobile Applications. 12-20 - Othman A. Al-Amoudi, Mohamed S. El-Azhari, Michael E. Woodward, Irfan Awan:

Performance Analysis of Angle Routing in MANETs. 21-29 - Yoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba, Kazuo Takahata:

Dynamic Network Reconfiguration by Combination of Different Wireless LANs. 30-37
Heterogeneous Networks
- Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa

:
Making an Agreement in an Order-Heterogeneous Group. 38-48 - Leonard Barolli, Makoto Ikeda, Arjan Durresi, Fatos Xhafa

, Akio Koyama:
Performance Evaluation of Two Search Space Reduction Methods for a Distributed Network Architecture. 49-59 - Nobuyoshi Sato, Shouichi Odashima, Jun Suzuki, Taiji Ishikawa, Yoshitoshi Murata:

Prototype of a Workers' Motion Trace System Using Terrestrial Magnetism and Acceleration Sensors. 60-70 - Christos P. Antonopoulos, Evangelos Topalis, Aggeliki S. Prayati, Spilios Giannoulis, Antonis Athanasopoulos, Stavros A. Koubias

:
Framework Design Supporting QoS-Power Trade-Offs for Heterogeneous Networked Systems. 71-80
Ad-Hoc Networks
- Young-Duk Kim, Jin-Wook Kim, Won-Seok Kang

, Dong-Ha Lee:
Route Cache Based Load Balancing Scheme for Mobile Ad-Hoc Networks. 81-90 - Zomahoun Jean-Eudes, Akio Koyama, Tomoyuki Tanno, Junpei Arai, Leonard Barolli:

Performance Evaluation of Load-Balancing Multi-path Routing Protocol for Mobile Ad-Hoc Networks. 91-100 - Consolee Mbarushimana, Alireza Shahrabi

:
A TCP Enhancement for QoS-Aware Mobile Ad-Hoc Networks. 101-110 - Makoto Ikeda, Leonard Barolli, Giuseppe De Marco, Tao Yang, Arjan Durresi:

Experimental and Simulation Evaluation of OLSR Protocol for Mobile Ad-Hoc Networks. 111-121
P2P, Grid and Internet Computing
- Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa

:
A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks. 122-131 - Kenichi Tanaka, Minoru Uehara, Hideki Mori:

Building a Linux Grid on a Virtual Machine Using a Windows Grid. 132-141 - Qinglin Guo:

The Similarity Computing of Documents Based on VSM. 142-148 - Erianto Chai, Minoru Uehara, Hideki Mori:

Case Study on the Recovery of a Virtual Large-Scale Disk. 149-158
Ad-Hoc and Sensor Networks
- Dimitrios Liarokapis, Ali Shahrabi

, Colin Raeburn:
Constant-Width Zones Broadcast Algorithm in Mobile Ad-Hoc Networks. 159-168 - Marc Lihan, Takeshi Tsuchiya

, Kei'ichi Koyanagi:
Orientation-Aware Indoor Localization Path Loss Prediction Model for Wireless Sensor Networks. 169-178 - Hanh Le, Doan B. Hoang, Ravi Poliah:

S-Web: An Efficient and Self-organizing Wireless Sensor Network Model. 179-188 - Haroon Malik, Elhadi M. Shakshuki

, Tarek R. Sheltami
:
Agent Based Analytical Model for Energy Consumption among Border Nodes in Wireless Sensor Networks. 189-201
Intelligent Algorithms and Systems
- John K. Debenham, Ante Prodan

:
A Self-organising Network Based on Lightweight Agents. 202-211 - Leonard Barolli, Arjan Durresi, Fatos Xhafa

, Akio Koyama:
A Fuzzy-Based Handover System for Wireless Cellular Networks: A Case Study for Handover Enforcement. 212-222 - Katsuyoshi Matsumoto, Minoru Uehara, Hideki Mori:

Fault Tolerance for Small-World Cellular Neural Networks. 223-231 - Toshihiko Yamakami:

A 4+1 Bit Month-Scale Regularity Mining Algorithm with One-Path and Distributed Server Constraints for Mobile Internet. 232-241
Secure Systems and Applications
- Tomoya Enokido, Makoto Takizawa

:
Preventing Illegal Information Flow Based on Role-Based Access Control Model. 242-251 - Takamichi Saito, Kiyomi Sekiguchi, Ryosuke Hatsugai:

Authentication Binding between TLS and HTTP. 252-262 - Tetsuo Kamina

, Noboru Koshizuka, Ken Sakamura:
Embedding Legacy Keyword Search into Queries for the Ubiquitous ID Database. 263-272 - Arjan Durresi, Mimoza Durresi, Leonard Barolli:

Secure Ubiquitous Health Monitoring System. 273-282
Network Tools and Architectures
- Sara Grilli, Andrea Villa, Christoforos D. Kavadias:

COMANCHE: An Architecture for Software Configuration Management in the Home Environment. 283-292 - Shingo Nomoto, Kensuke Fukuda, Minoru Uehara, Hideki Mori:

Graphic Drawing Tools for Network Traffic Simulation. 293-302 - Natalia Kryvinska

, Lukas Auer, Christine Strauss
, Peter Zinterhof:
A Methodology for the Enterprise Information and Communication Infrastructure Design Process. 303-312 - Yosuke Sato, Koji Hashimoto, Yoshitaka Shibata:

A New Networked Surveillance Video System by Combination of Omni-Directional and Network Controlled Cameras. 313-322

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














