The Community for Technology Leaders
Information Technology and Applications, International Conference on (2005)
Sydney, Australia
July 4, 2005 to July 7, 2005
ISBN: 0-7695-2316-1
TABLE OF CONTENTS
Introduction

Program Committee (PDF)

pp. xxii-xxiii
Session: Advanced Robotics

"RoboPress" — An Automated Mobile Press for Manufacturing Concrete Products (Abstract)

Edward Grant , North Carolina State University
Gordon Lee , California State University at San Diego
George Adam , Higher Technology Educational Institute of Larissa
pp. 3-8

Local Path Planning Based on New Repulsive Potential Functions with Angle Distributions (Abstract)

Tomoharu Suzuki , University of Tokyo
Seiichi Shin , University of Tokyo
Hyun-Woo Lee , Kyungnam University
Dong Hun Kim , Kyungnam University
pp. 9-14

Virtual Repulsive Force in Competitive Multi-Robot Teleoperation (Abstract)

Lei Sun , Nankai University
Chunying Zhao , Nankai University
Jingtai Liu , Nankai University
Yujuan Li , Nankai University
Tao Chen , Nankai University
pp. 15-20

Algorithm for Robot Writing Using Character Segmentation (Abstract)

Adzly Anuar , Universiti Tenaga Nasional
Salman Yussof , Universiti Tenaga Nasional
Karina Fernandez , Universiti Tenaga Nasional
pp. 21-24

The Ant Algorithm for Solving Robot Path Planning Problem (Abstract)

Gengqian Liu , Hebei University of Technology
Tiejun Li , Hebei University of Technology
Yuqing Peng , Hebei University of Technology
Xiangdan Hou , Hebei University of Technology
pp. 25-27

Application of Two Synaptic Weight Neural Networks for Nonlinear Control (Abstract)

Shoujue Wang , Chinese Academy of Science
Wenmin Cao , Zhejiang University of Technology and Chinese Academy of Science
pp. 28-31
Session: Distributed and Parallel Computing

Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval (Abstract)

Richard S. L. Wu , Hong Kong Polytechnic University
Allan K. Y. Wong , Hong Kong Polytechnic University
Tharam S. Dillon , University of Technology - Sydney
pp. 35-40

The Research and Design of Business Component Reuse in Enterprise Information System Integration (Abstract)

Yubin Xu , Taiyuan University of Science and Technology
Guoyou Zhang , Taiyuan University of Science and Technology
Yinzhang Guo , Taiyuan University of Science and Technology
Lipin Xie , Taiyuan University of Science and Technology
pp. 41-44

Flexible Concurrency Control for Collaborative Office Systems (Abstract)

Suiping Zhou , Nanyang Technological University
Chengzheng Sun , Griffith University
Haifeng Shen , Nanyang Technological University
pp. 45-50

A Cost Effective Spacial Redundancy with Data-Path Partitioning (Abstract)

Koji Inoue , Kyushu University and PRESTO, Japan Science and Technology Agency
Shigeharu Matsusaka , Fukuoka University
pp. 51-56

Partition-Based Parallel PageRank Algorithm (Abstract)

Arnon Rungsawang , Kasetsart University
Bundit Manaskasemsak , Kasetsart University
pp. 57-62

Extending Metadata with Scenarios in Adaptive Distributed System (Abstract)

Kuo Zhang , Tsinghua University
Jinlan Tian , Tsinghua University
Yanni Wu , Tsinghua University
Xiaoge Wang , Tsinghua University
pp. 63-68

Virtual Disk Reconfiguration with Performance Guarantees in Shared Storage Environment (Abstract)

Yong Feng , Northwestern Polytechnical University
Yan-yuan Zhang , Northwestern Polytechnical University
pp. 69-74

A Wallet-Size Cluster for H.264 Encoding (Abstract)

Liang-Teh Lee , Tatung University
Kang-Yuan Liu , Tatung University
Kuan-Ching Li , Providence University
Chia-Ying Tseng , Tatung University
pp. 75-80

E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage Environment (Abstract)

Yong Feng , Northwestern Polytechnical University
Yan-yuan Zhang , Northwestern Polytechnical University
pp. 81-84

An Internet-Enabled Setup Planning System (Abstract)

Gaoliang Peng , Harbin Institute of Technology
Wenjian Liu , Harbin Institute of Technology
pp. 89-92

GCSLight: A Light-Weight Group Communication Service for Metadata Server Cluster (Abstract)

Yong Feng , Northwestern Polytechnical University
Ruiyong Jia , Northwestern Polytechnical University
Yanyuan Zhang , Northwestern Polytechnical University
pp. 93-96

Research on Load Balance of Multi Clusters Architecture Based on Business Components Partition (Abstract)

Wei Gao , South China University of Technology
Botong Xu , South China University of Technology
Yiqiang Zheng , South China University of Technology
Heqing Guo , South China University of Technology
pp. 101-104
Session: IT in Education and Health

Computing Tumour Coverage as a Result of Respiratory Motion during Radiotherapy Treatment (Abstract)

D. Nussbaum , Carleton University
M. MacPherson , Ottawa Regional Cancer Centre
J. Chen , Carleton University
M. Lanthier , Carleton University
pp. 107-112

Bush Babies Broadband: On-Demand Virtual Neonatal Intensive Care Unit Support for Regional Australia (Abstract)

Bruce Kneale , University of Western Sydney
Mark Tracy , Nepean Hospital and Sydney University
Carolyn McGregor , University of Western Sydney
pp. 113-118

Intelligent User-Support in Learning Environments for Remote Experimentation (Abstract)

M. J. Callaghan , University of Ulster
J. Harkin , University of Ulster
L. P. Maguire , University of Ulster
T. M. McGinnity , University of Ulster
pp. 119-124

Client-Server Architecture for Collaborative Remote Experimentation (Abstract)

J. Harkin , University of Ulster
L. P. Maguire , University of Ulster
M. J. Callaghan , University of Ulster
T. M. McGinnity , University of Ulster
M. El Gueddari , University of Ulster
pp. 125-129

Certified Assessment Artifacts for ePortfolios (Abstract)

Nicholas L. Carroll , University of Sydney
Rafael A. Calvo , University of Sydney
pp. 130-135

Lightweight Desktop-Sharing System for Web Browsers (Abstract)

Yutaka Matsushita , Tokyo University of Technology
Satoshi Ichimura , Tokyo University of Technology
pp. 136-141

Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study (Abstract)

Wanlei Zhou , Deakin University
Naomi Augar , Deakin University
Ruth Raitman , Deakin University
pp. 142-146

Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student Perspectives (Abstract)

Lara Frumkin , Middlesex University
Alan Murphy , Middlesex University
Vladlena Benson , Kingston University
pp. 159-164

Framework for an IT-Supported Balanced Scorecard in Health Care (Abstract)

Holger Kunz , Charit? - University Medicine
J? Braun , Charit? - University Medicine
Thorsten Schaaf , Charit? - University Medicine
Thomas Tolxdorff , Charit? - University Medicine
pp. 165-168

Evaluation of Students? Performance in Online Seminars via Email with Mobile Phones (Abstract)

Kazunori Hino , Kinki University
Nobuyuki Hino , Osaka University
Takashi Yamanoue , Kagoshima University
Teruyuki Bunno , Kinki University
Kazuo Terashima , Ryukoku University
pp. 173-176
Session: IT in National Security

Classify of Underwater Target Utilizing Audio Fingerprint (Abstract)

Chang-Jian Fu , National University of Defense Technology
Guo-Hui Li , National University of Defense Technology
Jian Yuan , National University of Defense Technology
Xin-Wen Xu , National University of Defense Technology
pp. 179-184

Self-Organizing Gaussian Fuzzy CMAC with Truth Value Restriction (Abstract)

M. N. Nguyen , Nanyang Technological University
D. Shi , Nanyang Technological University
C. Quek , Nanyang Technological University
pp. 185-190

The Network Monitoring Tool — PickPacket (Abstract)

Deepak Gupta , Indian Institute of Technology - Kanpur
Brajesh Pande , Indian Institute of Technology - Kanpur
Sanjay Kumar Jain , Indian Institute of Technology - Kanpur
Dheeraj Sanghi , Indian Institute of Technology - Kanpur
pp. 191-196

SAFE Model Approach to Construction of Intelligent Security Systems (Abstract)

Zenon Chaczko , University of Technology - Sydney
Sourendra Nath Sinha , University of Technology - Sydney
pp. 197-202

Wireless Sensor Network Based System for Fire Endangered Areas (Abstract)

Zenon Chaczko , University of Technology - Sydney
Fady Ahmad , University of Technology - Sydney
pp. 203-207

QoS Functions and Theorems for Moving Wireless Networks (Abstract)

Johnson I Agbinya , University of Technology - Sydney
pp. 208-213

Real-Time Representation of Network Traffic Behavior for Enhanced Security (Abstract)

John M. Zachary , Innovative Emergency Management, Inc.
John C. McEachen , Naval Postgraduate School
pp. 214-219

Dynamic Topic Mapping Using Latent Semantic Indexing (Abstract)

Frederic Andres , National Institute of Informatics - Japan
Motomu Naito , Knowledge Synergy Inc.
pp. 220-225

A Method of Remote Sensing Image Retrieval Based on ROI (Abstract)

Miao Yuan , Victoria University
Wei Lu , University of Science and Technology of China
Lei Niu , University of Science and Technology of China
Lin Ni , University of Science and Technology of China
pp. 226-229

The Research of Data Mining Based on Extension Sets (Abstract)

Qing Lu , Guangdong University of Technology
Yongquan Yu , Guangdong University of Technology
pp. 234-237

Satellite Interference Detection Using Real-Time Watermarking Technique for SMS (Abstract)

Shu-Chung Yi , National Changhua University of Education
Yih-Chuan Lin , National Formosa University
Chuen-Ching Wang , National Changhua University of Education
pp. 238-241

Experimental Findings on Collaborative Interactions in a Co-Located Environment (Abstract)

Oscar deBruijn , University of Manchester
Zainuddin Hassan , College of Information Technology
Norlaila Hussain , University of Manchester
pp. 242-245
Session: Mobile Computing and Communications

A Novel OFDM Synchronization Algorithm (Abstract)

Guang qing Xi , ZTE Corporation R&D Centre
Hu Liu , Shanghai Jiaotong University
Li yun Luo , Tongji University
Yu hong Duan , ZTE Corporation R&D Centre
pp. 249-254

Performance Analysis of Multiple Packets Combining Decoding in HARQ (Abstract)

Yanping Lu , Beijing University of Post and Telecommunication
Weiling Wu , Beijing University of Post and Telecommunication
pp. 255-258

Design of Binary Multi-code CDMA System with Constant Amplitude (Abstract)

Heung-Gyoon Ryu , Chungbuk National University
Kee-Hoo Yoon , Juseong College
Jin Kwan Kim , Chungbuk National University
Sang-Woo Kim , Chungbuk National University
pp. 259-264

A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would It Say? (Abstract)

Wayne Piekarski , University of South Australia
Peter Hutterer , University of South Australia
Mark T. Smith , Hewlett Packard Corporation
Bruce H. Thomas , University of South Australia
John Ankcorn , Hewlett Packard Corporation
pp. 265-270

p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc Networks (Abstract)

Guan Nan Chen , National Chung-Cheng University
Ren-Hung Hwang , National Chung-Cheng University
Chi-Jen Wu , National Chung-Cheng University
Chiung-Ying Wang , National Chung-Cheng University
pp. 271-276

The MTCR Scheme for the Integrated Multiple Rate Mobile Data Networks (Abstract)

Shang Weng Wang , Yuan-Ze University
Jeich Mar , Yuan-Ze University
pp. 277-282

Constructing Long-Lived Scatternets in Bluetooth Networks (Abstract)

Hong-Yi Chang , Chung Hua University
Chang Wu Yu , Chung Hua University
pp. 283-288

A Mobility Model with Group Partitioning for Wireless Ad Hoc Networks (Abstract)

Jim M. Ng , Nanyang Technological University
Yan Zhang , Nanyang Technological University
pp. 289-294

Multipath Channel Models for Wireless Local and Metropolitan Area Networks (Abstract)

S. H. Kim , SK Telecom
K. M. Chung , SK Telecom
S. H. Seo , HFR Inc.
Kyungsoo Jeong , SK Telecom
J. H. Yu , SK Telecom
J. C. Kim , SK Telecom
J. S. Lee , SK Telecom
pp. 295-298

A Transparent Cache-Based Mechanism for Mobile Ad Hoc Networks (Abstract)

Ying-Hong Wang , Tamkang University
Chien-Min Lee , Tamkang University
Chih-Feng Chao , Tamkang University
Jenhui Chen , Chang Gung University
pp. 305-310

A Novel Time and Frequency Synchronization Approach for OFDM Systems (Abstract)

Jinkang Zhu , University of Science & Technology of China
Jibin Wang , Huawei Technologies Co., LTD.
pp. 311-315

Using the LAS Space-Time Spreading Codes to Achieve High Spectral Efficiency (Abstract)

Hao Jiang , Beijing University of Posts and Telecommunications
pp. 322-325

PAPR Reduction in MC/DS CDMA System by DFT Spreading Codes (Abstract)

Jong-Won Son , Chungbuk National University
Ju-Hyun Kyung , Chungbuk National University
Heung-Gyoon Ryu , Chungbuk National University
Yingshan Li , Chungbuk National University
pp. 326-329

A PAPR Reduction Method Using the Correlation of Information in OFDM Communication System (Abstract)

Sang-Woo Kim , Chungbuk National University
Heung-Gyoon Ryu , Chungbuk National University
Rag Gyu Jung , Chungbuk National University
Chan-Ho Park , Chungbuk National University
Hun-Hee Lee , Chungbuk National University
pp. 330-333

Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour (Abstract)

Peter Bertok , Royal Melbourne Institute of Technology
Gennadi Oumanski , Royal Melbourne Institute of Technology
pp. 334-337

Over-Saturated Wavelet Packet Multiple Access Communication and Its Multi-User Detection (Abstract)

Chuan-gang Zhao , Beijing University of Posts and Telecommunications
Peng Liang , Beijing University of Posts and Telecommunications
Weiling Wu , Beijing University of Posts and Telecommunications
pp. 338-341

Using Look-Ahead Protocol for Mobile Data Broadcast (Abstract)

C. S. Wong , Hong Kong College of Technology
Kwok-wa Lam , City University of Hong Kong
William Leung , Hong Kong College of Technology
pp. 342-345

WiPS: Location and Motion Sensing Technique of IEEE 802.11 Devices (Abstract)

Tsuneo Nakanishi , Kyushu University
Teruaki Kitasuka , Kyushu University
Kenji Hisazumi , Japan Science and Technology Agency
Akira Fukuda , Kyushu University
pp. 346-349

Performance of a Multiple Access Orthogonal Wavelet Division Multiplexing System (Abstract)

Stevan M. Berber , University of Auckland
Gobindar S. Sandhu , University of Auckland
Benjamin A. Liew , University of Auckland
pp. 350-353
Session: Multimedia

Use Symmetrical Color-Spatial Feature for Image Comparison (Abstract)

Shou-zhi Wei , Northeastern University at Qin Huang-dao
Bing Zhou , Northeastern University at Qin Huang-dao
pp. 357-360

Robust Image Watermarking Scheme Based on Subsampling (Abstract)

Ruimin Shen , Shanghai Jiao Tong University
Yonggang Fu , Shanghai Jiao Tong University and Xiamen University,
Liping Shen , Shanghai Jiao Tong University
pp. 361-365

Error Detection and Copyrights Protection Scheme for MPEG-2 Based on Channel Coded Watermark Signal (Abstract)

Xiao Ming Chen , University of Sydney
Peng Hao Wang , University of Sydney
Yuk Ying Chung , University of Sydney
Changseok Bae , University of Sydney
pp. 366-370

Stream-Based Interactive Video Language Authoring Using Correlated Audiovisual Watermarking (Abstract)

Jesse S. Jin , University of Newcastle
Richard Y. D. Xu , University of Technology - Sydney
John G. Allen , University of Technology - Sydney
pp. 377-380

Performance Analysis of Caching Strategies for Proxy-Assisted VOD Services (Abstract)

Jia-Shung Wang , National Tsing Hua University
Nien-Chen Lin , National Tsing Hua University
Shih-Yu Huang , Ming Chuan University
Chen-Lung Chan , National Tsing Hua University
pp. 387-392

Multimedia Multicast Using SPLIT and Layered FEC (Abstract)

Naveen K. Chilamkurti , La Trobe University
Ben Soh , La Trobe University
pp. 393-396

Fuzzy-Based Mass Media Content Management Platform: Architecture and Application Model (Abstract)

Sanxing Cao , Communication University of China
Rui Lu , Communication University of China
Xianglin Huang , Communication University of China
Zhanxin Yang , Communication University of China
pp. 397-400

Image Indexing in DCT Domain (Abstract)

Yung-Gi Wu , Leader University
Je-Hung Liu , Leader University
pp. 401-406

Dynamic Markov Compression Using a Crossbar-Like Tree Initial Structure for Chinese Texts (Abstract)

Jun-Ping Ng , National University of Singapore
Ghim-Hwee Ong , National University of Singapore
pp. 407-410

Perfect KDB-Tree: A Compact KDB-Tree Structure for Indexing Multidimensional Data (Abstract)

Po-Whei Huang , National Chung-Shing University
Hung-Yi Lin , Chaoyang University of Technology
pp. 411-414

Performance Analysis for Construction of a Performance Practice Support System (Abstract)

Kouichi Hirata , Kyushu Institute of Technology
Masateru Harao , Kyushu Institute of Technology
Shogo Ozaki , Kyushu Institute of Technology
pp. 415-418
Session: Data and Network Security

A Model for Secure Knowledge Sharing (Abstract)

Ismail Ahmad , Multimedia University
Hong Tat Ewe , Multimedia University
pp. 421-425

A New Method for Exchanging Secret Keys (Abstract)

Eberhard Stickel , Hochschule der Sparkassen-Finanzgruppe Bonn
pp. 426-430

A Defense System against DDoS Attacks by Large-Scale IP Traceback (Abstract)

Yang Xiang , Deakin University
Wanlei Zhou , Deakin University
pp. 431-436

Iris Feature Extraction Using 2D Phase Congruency (Abstract)

Xiaoyan Yuan , Shanghai Jiao Tong University
Pengfei Shi , Shanghai Jiao Tong University
pp. 437-441

EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme (Abstract)

Gianluigi Me , University of Rome "Tor Vergata"
Maurizio A. Strangio , University of Rome "Tor Vergata"
pp. 442-447

An Efficient Authentication Scheme with Fault Tolerance for Database Systems (Abstract)

Chang N. Zhang , University of Regina
Honglan Zhong , University of Regina
Chunren Lai , University of Regina
pp. 448-453

Study on NTRU Decryption Failures (Abstract)

Dake He , SWJTU
Weichi Yu , SWJTU
Shixiong Zhu , National Laboratory for Modern Communications - Peoples Republic of China
pp. 454-459

Statistical-Based SYN-Flooding Detection Using Programmable Network Processor (Abstract)

Md. Safi Uddin , Multimedia University
BoonPing Lim , Multimedia University
pp. 465-470

Efficient Secret Sharing Schemes from Room Square (Abstract)

Chia-Li Huang , National Chi Nan University
Justie Su-Tzu Juan , National Chi Nan University
pp. 477-481

Privacy Protection in Mobile Agent Based Service Domain (Abstract)

Md. Nurul Huda , National Institute of Informatics - Japan
Shigeki Yamada , National Institute of Informatics - Japan
Eiji Kamioka , National Institute of Informatics - Japan
pp. 482-487

Capability-Based Egress Network Access Control for Transferring Access Rights (Abstract)

Toshio Hirotsu , Toyohashi University of Technology and JST
Kozo Itano , University of Tsukuba and JST
Shinichi Suzuki , University of Tsukuba
Kazuhiko Kato , University of Tsukuba and JST
Yasushi Shinjo , University of Tsukuba and JST
pp. 488-495

A Multimedia Traffic Classification Scheme for Intrusion Detection Systems (Abstract)

Pierre Baillargeon , Florida Atlantic University
Oge Marques , Florida Atlantic University
pp. 496-501

A Fair Item-Item Exchange Protocol Satisfying Newly Introduced Requirements (Abstract)

Heqing Guo , South China University of Technology
Jianfei Yin , South China University of Technology
Hao Wang , South China University of Technology
Manshan Lin , South China University of Technology
pp. 502-507

Security for Authenticated Key Exchange Based on Non-Malleability (Abstract)

Hiroki Hada , Tokyo Institute of Technology
Keisuke Tanaka , Tokyo Institute of Technology
pp. 508-513

Universal Designated-Verifier Signature with Aggregation (Abstract)

Keisuke Tanaka , Tokyo Institute of Technology
Akihiro Mihara , Tokyo Institute of Technology
pp. 514-519

Recognising Individuals Using Their Brain Patterns (Abstract)

K. V. R. Ravi , Multimedia University
Ramaswamy Palaniappan , University of Essex
pp. 520-523

A Description Logic for PKI Trust Domain Modeling (Abstract)

Chunzhao Jin , Jilin University
Haibo Yu , Jilin University
Haiyan Che , Jilin University
pp. 524-528

Building Scale-Free Overlay Mix Networks with Small-World Properties (Abstract)

Li Guo , Chinese Academy of Sciences
Xueqi Cheng , Chinese Academy of Sciences
Binxing Fang , Chinese Academy of Sciences
Yuzhong Sun , Chinese Academy of Sciences
Tianbo Lu , Chinese Academy of Sciences
pp. 529-534

FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded System (Abstract)

Jin Park , Chonnam National University
Jeong-Tae Hwang , Chonnam National University
Young-Chul Kim , Chonnam National University
pp. 547-551

A Framework for Quantifying Information System Survivability (Abstract)

Rongsheng Xu , Chinese Academy of Sciences
Xuegang Lin , Zhejiang University
Miaoliang Zhu , Zhejiang University
pp. 552-555

Application of Rough Set Theory in Network Fault Diagnosis (Abstract)

Tao Lin , Hebei University of Technology
Gengqian Liu , Hebei University of Technology
Hengshan Geng , Hebei University of Technology
Yuqing Peng , Hebei University of Technology
pp. 556-559

Some Remarks on Security of Receipt-Free E-auction (Abstract)

Yong-Sork Her , Kyushu University
Kouichi Sakurai , Kyushu University
Kenji Imamoto , Kyushu University
pp. 560-563

The Authorization Service in Dynamic Trust Domains (Abstract)

Wu Liu , Tsinghua University
Jian-Ping Wu , Tsinghua University
Hai-Xin Duan , Tsinghua University
Xing Li , Tsinghua University
pp. 564-567

Secure Embedded Error Detection Arithmetic Coding (Abstract)

Somphop Chokchaitam , Chulalongkorn University
Prasit Teekaput , Chulalongkorn University
pp. 568-571

Uncovering Attacks on Security Protocols (Abstract)

Wuu Yang , National Chiao-Tung University
pp. 572-575

A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem (Abstract)

Wen-Chung Kuo , National Formosa University
Ming-Yang Chen , National Cheng-Kung University
pp. 576-579

Protecting Customer?s Privacy in Querying Valuable Information Combined with E-Payment Scheme (Abstract)

Gwoboa Horng , National ChungHsing University
Chun-Hua Chen , National ChungHsing University and Chienkuo Technology Unversity
Chi-Min Lan , National ChungHsing University
pp. 580-583
Session: Signal Processing

A Robust Watermarking Scheme Combined with the FSVQ for Images (Abstract)

Yih-Chuan Lin , National Formosa University
Chuen-Ching Wang , National Changhua University of Education
Zni-Kang Huang , National Formosa University
Ri-Ting Pong , National Formosa University
pp. 597-602

New Approach for Detection Using Wavelet Coefficients (Abstract)

Marwa Chendeb , University of Technology of Troyes and Lebanese University
Mohamad Khalil , Lebanese University
Jacques Duch?ne , University of Technology of Troyes
pp. 603-607

A Nonlinear Detection Scheme for Sinusoid in Additive Unknown Colored Gaussian Noise (Abstract)

Jianfeng Weng , Zhejiang University of Science and Technology
pp. 618-621

Capsule Endoscopy Image Coding Using Wavelet-Based Adaptive Vector Quantization without Codebook Training (Abstract)

Shih-Tse Chen , Chung Yuan Christian University
Fu-Sheng Ke , Chung Yuan Christian University
Shaou-Gang Miaou , Chung Yuan Christian University
pp. 634-637
Session: Telecommunication and Networking

A Novel Traffic Independent NNC for Dynamic Buffer Tuning to Shorten the RTT of a TCP Channel (Abstract)

Tharam S. Dillon , University of Technology - Sydney
Wilfred W. K. Lin , Hong Kong Polytechnic University
Allan K. Y. Wong , Hong Kong Polytechnic University
pp. 647-652

Evaluation of IPv6 and Comparative Study with Different Operating Systems (Abstract)

Sulaiman Syed Mohamed , Multimedia University
Asaad Y Malik Abusin , Multimedia University
David Chieng , Multimedia University
pp. 665-670

A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate Paths (Abstract)

Thierry Rakotoarivelo , University of New South Wales, ENSICA and LAAS-CNRS
Michel Diaz , LAAS-CNRS
Aruna Seneviratne , National ICT Australia
Patrick Senac , ENSICA and LAAS-CNRS
pp. 671-676

A Comparison of Ultra Wideband Signal Functions for Wireless Ad Hoc Networks (Abstract)

Ha Dang Truong , University of Technology - Sydney
Johnson I Agbinya , University of Technology - Sydney
pp. 677-682

A Critical Analysis of Multilayer IP Security Protocol (Abstract)

Ben Soh , La Trobe University
Joel Sing , La Trobe University
pp. 683-688

On the Use of Snoop with Geostationary Satellite Links (Abstract)

Joel Sing , La Trobe University
Ben Soh , La Trobe University
pp. 689-694

Limited Range Wavelength Converter Sharing in WDM Networks (Abstract)

Mohammad Mamunur Rashid , Waseda University
Yoshiaki Tanaka , Waseda University
Sugang Xu , Waseda University and NICT- Japan
pp. 695-700

The Algorithm of Repeat TPC Decoding (Abstract)

Yuhuang Ye , Fuzhou University
Jun Chen , Fuzhou University
pp. 701-703

An Enhanced Exact Procedure for the CMST Problem (Abstract)

Jinpeng Huai , Beihang University
Jun Han , Beihang University
pp. 704-709

FICC-DiffServ: A New QoS Architecture Supporting Resources Discovery, Admission and Congestion Controls (Abstract)

Ha Trung Phan , University of Technology - Sydney
Doan B. Hoang , University of Technology - Sydney
pp. 710-715

Performance Study for Streaming Layered Encoded Videos in Broadcast Environment (Abstract)

Wing-Fai Poon , Hong Kong Polytechnic University
Kwok-Tung Lo , Hong Kong Polytechnic University
Jian Feng , City University of Hong Kong
pp. 722-727

Specknets: New Challenges for Wireless Communication Protocols (Abstract)

K. J. Wong , University of Edinburgh
D. K. Arvind , University of Edinburgh
pp. 728-733

Grid Architecture Storage — Utilising Grid Computing for Dynamic Data Storage (Abstract)

P. Koszek , University of Technology - Sydney
K. Sandrasegaran , University of Technology - Sydney
pp. 739-742

An Efficient EWS for Non-PC Device (Abstract)

Wenbo Zhang , Northeastern University
Zhenyu Yin , Northeastern University
Xiaoying Wang , Northeastern University
Ming Zhao , Northeastern University
Hai Zhao , Northeastern University
pp. 743-746

A Control Theoretic Analysis of Mixed TCP and UDP Traffic under RED Based on Nonlinear Dynamic Model (Abstract)

Yan-ping Chen , Xian Jiaotong University
Li Wang , Xian Jiaotong University
Zeng-zhi Li , Xian Jiaotong University
pp. 747-750

Extendable Media Stream Mechanisms for Heterogeneous Communication Environments (Abstract)

Koji Hashimoto , Iwate Prefectural University
Yoshitaka Shibata , Iwate Prefectural University
pp. 751-754

Automatic Address Assignment for IPv6 End-to-End Multihoming Sites (Abstract)

Kenji Fujikawa , Kyoto University
Yasuo Okabe , Kyoto University
Kenji Ohira , Kyoto University
Youichi Koyama , Trans New Technology, Inc.
pp. 755-758

Improved Marking Model ERPPM Tracing Back to DDoS Attacker (Abstract)

Xing Li , Tsinghua University
Hai-Xin Duan , Tsinghua University
Jian-Ping Wu , Tsinghua University
Wu Liu , Tsinghua University
pp. 759-762
Session: Internet and WWW

Managing the Co-Existing Network of IPv6 and IPv4 under Various Transition Mechanisms (Abstract)

I-Ping Hsieh , National Chung-Hsing University
Shang-Juh Kao , National Chung-Hsing University
pp. 765-771

An Overview of Research on Reverse Engineering XML Schemas into UML Diagrams (Abstract)

Augustin Yu , University of Technology - Sydney
Robert Steele , University of Technology - Sydney
pp. 772-777

UDDI Access Control (Abstract)

Robert Steele , University of Technology - Sydney
Juan Dai , University of Technology - Sydney
pp. 778-783

Adaptation of the Balanced Scorecard Model to the IT Functions (Abstract)

Justus I. Ekeigwe , University of East London
Hamid Jahankhani , University of East London
pp. 784-787
Author Index

Author Index (PDF)

pp. 789-792
83 ms
(Ver 3.3 (11022016))