The Community for Technology Leaders
Systems and Networks Communication, International Conference on (2006)
Tahiti, French Polynesia
Oct. 29, 2006 to Nov. 3, 2006
ISBN: 0-7695-2699-3
TABLE OF CONTENTS

A neuro-forecastwater-filling scheme of server scheduling (Abstract)

Homayoun Yousefi'zadeh , University of California, Irvine, CA, USA
pp. 9
Introduction

Preface (PDF)

pp. xviii

ICSNS Committees (PDF)

pp. xix
ICSNC 1: Mobility and Ad Hoc

Energy Aware Topology Management in Ad Hoc Wireless Networks (Abstract)

T. Shiv Prakash , University Visvesvaraya College of Engineering, India
K. R. Venugopal , University Visvesvaraya College of Engineering, Bangalore, India
G. S. Badrinath , University Visvesvaraya College of Engineering, Bangalore, India
L. M. Patnaik , Indian Institute of Science, Bangalore, India
pp. 1

Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc Networks (Abstract)

T. Srinivasan , Sri Venkateswara College of Engineering, Pennalur, Sriperumbudur, India
A. Manikandan , Sri Venkateswara College of Engineering, Pennalur, Sriperumbudur, India
V. Mahadevan , Sri Venkateswara College of Engineering, Pennalur, Sriperumbudur, India
A. Meyyappan , Sri Venkateswara College of Engineering, Pennalur, Sriperumbudur, India
N. Pavithra , Sri Venkateswara College of Engineering, Pennalur, Sriperumbudur, India
M. Nivedita , Sri Venkateswara College of Engineering, Pennalur, Sriperumbudur, India
pp. 2

An Enhanced Gnutella for Ad-Hoc Networks (Abstract)

Hyun-Duk Choi , MMC Technology, Seoul, Korea
Miae Woo , Sejong University, Korea
Ho-Hyun Park , Sejong University, Korea
pp. 3

A New EAAODV Routing Protocol based on Mobile Agent (Abstract)

YANG Zhen , Nanjing University of Posts & Telecommunications, China
ZHAO Chenchen , Nanjing University of Posts & Telecommunications, China
pp. 4

The Case of Multi-hop Peer-to-Peer Implementation of Mobile Social Applications (Abstract)

Panayotis Antoniadis , Athens University of Economics and Business, Greece
Costas Courcoubetis , Athens University of Economics and Business, Greece
pp. 5

Mobile agent communication scheme (Abstract)

Fabrice Mourlin , Paris 12 University LACL (CRNS FRE 2673), France
M?amoun Bernich , Paris 12 University LACL (CRNS FRE 2673), France
pp. 6
ICSNC 2: High Speed

Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering (Abstract)

Chun-Ying Huang , National Taiwan University Taipei, Taiwan
Pan-Lung Tsai , National Taiwan University Taipei, Taiwan
Chien-Hua Chiu , National Taiwan University Taipei, Taiwan
Chin-Laung Lei , National Taiwan University Taipei, Taiwan
Chin-Yen Lee , National Taiwan University Taipei, Taiwan
pp. 7

A Two - Phase Distributed Reconfiguration Algorithm for Node Failures in IP-Over-WDM Networks (Abstract)

N. Sreenath , Pondicherry Engineering College, Pondicherry-605104, India.
Balaji Palanisamy , Pondicherry Engineering College, Pondicherry-605104, India.
pp. 10

Grooming of Multicast Sessions in Sparse Splitting WDM Mesh Networks using Virtual Source Based Trees (Abstract)

N. Sreenath , Pondicherry Engineering College, Pondicherry-605104, India.
Balaji Palanisamy , Pondicherry Engineering College, Pondicherry-605104, India.
S.R. Nadarajan , Pondicherry Engineering College, Pondicherry-605104, India.
pp. 11

Cost Benefit Study of Sparse-PartialWavelength Conversion Architectures (Abstract)

William Giozza , Salvador University
Jose Maranhao , Salvador University
Paulo Cunha , Federal University of Pernambuco
Andre Soares , Salvador University
pp. 12
ICSNC 3: Multimedia

A new approach of data hiding within speech based on Hash and Hilbert Transform (Abstract)

Deng Lixin , Nanjing University of Posts & Telecommunications
pp. 13

Active Service Quality Management in ASEMA system (Abstract)

Johannes oikarinen , Technical Research Centre of Finland, VTT Oulu, Finland
Tomi Raty , Technical Research Centre of Finland, VTT Oulu, Finland
Mikko Nieminen , Technical Research Centre of Finland, VTT Oulu, Finland
Markus Sihvonen , Technical Research Centre of Finland, VTT Oulu, Finland
pp. 14

End-to-End Differentiation of Congestion and Wireless Losses using a Fuzzy Arithmetic based on Relative Entropy (Abstract)

Fang Su , Beijing University of Posts and Telecommunications, Beijing ,China
Yong Li , Beijing University of Posts and Telecommunications, Beijing ,China
Yinglei Fan , Beijing University of Posts and Telecommunications, Beijing ,China
Huimin Xu , Beijing University of Posts and Telecommunications, Beijing ,China
pp. 15

On the Applicability of Remote Rendering of Networked Virtual Environments on Mobile Devices (Abstract)

Tom Jehaes , Hasselt University, Expertise Centre for Digital Media, Wetenschapspark 2, BE-3590 Diepenbeek, Belgium
Gert Vansichem , Androme NV, Wetenschapspark 4, BE-3590 Diepenbeek, Belgium
Bjorn Geuns , Hasselt University, Expertise Centre for Digital Media, Wetenschapspark 2, BE-3590 Diepenbeek, Belgium
Peter Quax , Hasselt University, Expertise Centre for Digital Media, Wetenschapspark 2, BE-3590 Diepenbeek, Belgium
Wim Lamotte , Hasselt University, Expertise Centre for Digital Media, Wetenschapspark 2, BE-3590 Diepenbeek, Belgium
pp. 16

Fast Block Center Weighted Hadamard Transform (Abstract)

Xiao-Dong Zhang , Shanghai Jiao Tong University
Moon Ho Lee , Chonbuk National University
pp. 17
ICSNS 4: Security I

Autonomically Improving the Security and Robustness of Structured P2P Overlays (Abstract)

Andreas Binzenhofer , University of Wurzburg
Gerald Kunzmann , Munich University of Technology (TUM)
pp. 18

ASASI: An Environment for Addressing Software Application Security Issues (Abstract)

Mehrez Essafi , University of Manouba, Tunis - Tunisia
Lamia Labed , University of Manouba, Tunis - Tunisia
Henda Ben Ghezala , University of Manouba, Tunis - Tunisia
pp. 19

Towards Requirement and Modeling Driven Security Evaluation (Abstract)

Reijo Savola , VTT Technical Research Centre of Finland
pp. 20

Privacy-Invasive Software and Preventive Mechanisms (Abstract)

Bengt Carlsson , Blekinge Institute of Technology, School of Engineering SE-372 25 Ronneby, Sweden
Martin Boldt , Blekinge Institute of Technology, School of Engineering SE-372 25 Ronneby, Sweden
pp. 21

A Real-time Secure Voice Communication System Based on Speech Recognition (Abstract)

Lixin Deng , Nanjing University of Posts and Telecommunications, China
Zhen Yang , Nanjing University of Posts and Telecommunications, China
Zongyuan Deng , Nanjing University of Posts and Telecommunications, China
pp. 22
ICSNC 5: Security II

Verification of Strict Integrity Policy via Petri Nets (Abstract)

Hai-Jun Xiao , Huazhong University of Science and Technology, China
Zhao-Li Zhang , Huazhong University of Science and Technology, China
Fan Hong , Huazhong University of Science and Technology, China
pp. 23

Security Architecture for Web-based Health Insurance Systems (Abstract)

Ibrahim Sogukpinar , Gebze Institute of Technology 41400 Gebze, Kocaeli, Turkey
Mucahit Mutlugun , National Research Institute of Electronics & Cryptology
pp. 24

Confessible Threshold Ring Signatures (Abstract)

Yu-Shian Chen , National Taiwan University Taipei, Taiwan
Yun-Peng Chiu , National Taiwan University Taipei, Taiwan
Chin-Laung Lei , National Taiwan University Taipei, Taiwan
Chun-Ying Huang , National Taiwan University Taipei, Taiwan
pp. 25

Kleptographic Weaknesses in Benaloh-Tuinstra Protocol (Abstract)

Piotr Borzecki , University of Wroclaw, Poland
Przemyslaw Kubiak , Wroclaw University of Technology,Poland
Jedrzej Kabarowski , Wroclaw University of Technology,Poland
Filip Zag?rski , Wroclaw University of Technology,Poland
Miroslaw Kutylowski , Wroclaw University of Technology,Poland
pp. 26

Usage Control Requirements in Mobile and Ubiquitous Computing Applications (Abstract)

Manuel Hilty , Information Security Group, ETH Zurich, 8092 Zurich, Switzerland
Alexander Pretschner , Information Security Group, ETH Zurich, 8092 Zurich, Switzerland
Thomas Walter , DoCoMo Euro-Labs, 80687 Munich, Germany
Christian Schaefer , DoCoMo Euro-Labs, 80687 Munich, Germany
pp. 27
ICSNC 6: Sensors I

Neural Wireless Sensor Networks (Abstract)

Petri Mahonen , RWTH Aachen University, Department of Wireless Networks
Frank Oldewurtel , RWTH Aachen University, Department of Wireless Networks
pp. 28

A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks (Abstract)

Zheng Yanfei , Shanghai Jiao Tong University
Chen Kefei , Shanghai Jiao Tong University
Li Hui , Shanghai Jiao Tong University
Wen Mi , Shanghai Jiao Tong University
pp. 29

Application Development in Vision-Enabled Wireless Sensor Networks (Abstract)

Hamid Aghajan , Stanford University, Stanford, CA 94305, United States
Stephan Hengstler , Stanford University, Stanford, CA 94305, United States
pp. 30

Topological Hole Detection in Sensor Networks with Cooperative Neighbors (Abstract)

Naijie Gu , University of Science and Technology of China
Wan Lin Dong , University of Science and Technology of China
Xiaohu Liu , University of Science and Technology of China
Kun Bi , University of Science and Technology of China
Kun Tu , University of Science and Technology of China
pp. 31
ICSNC 7: Education + Policies

E-Services for an Electronic Education Market (Abstract)

Freimut Bodendorf , University of Erlangen-Nuremberg, Germany
pp. 33

Components for a pervasive information dissemination architecture (Abstract)

Jan Moons , Universiteit Antwerpen, Belgium
Carlos De Backer , Universiteit Antwerpen, Belgium
Herwig Mannaert , Universiteit Antwerpen, Belgium
pp. 34

Remote Screen Recording and Playback (Abstract)

Shih-Jen Chu , National Taiwan University Taipei, Taiwan
Tzao-Lin Lee , National Taiwan University Taipei, Taiwan
Shann-Chiuen Wu , National Taiwan University Taipei, Taiwan
pp. 35

Jazz Sebastian Bach: A GA System for Music Style Modification (Abstract)

Dimitrios Tzimeas , University College Dublin, Ireland
Eleni Mangina , University College Dublin, Ireland
pp. 36

Forecasting Unstable Policy Enforcement (Abstract)

Javier Baliosian , Network Management Research Centre, Ericsson Ireland Athlone, Ireland
Ann Devitt , Network Management Research Centre, Ericsson Ireland Athlone, Ireland
pp. 37

Beyond the Hype: Policies for Military Network Operations (Abstract)

Ritu Chadha , Telcordia Technologies, One Telcordia Drive, Piscataway NJ 08854, USA.
pp. 38

A Multi-Layer Ubiquitous Middleware for Bijective Adaptation between Context and Activity in a Mobile and Collaborative learning (Abstract)

Alain Derycke , INSAT Centre Urbain Tunis Nord BP 676 CEDEX 1080 Tunis TUNISIA
Jihen Malek , CUEEP - Bat B6 Universite des Sciences et Technologies de Lille, France
Mona Laroussi , CUEEP - Bat B6 Universite des Sciences et Technologies de Lille, France
pp. 39
ICSNC 8: Sensors II

Security Issues in Wireless Sensor Networks (Abstract)

Albert Zomaya , School of Information Technologies University of Sydney
Tanveer Zia , School of Information Technologies University of Sydney
pp. 40

Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game Approach (Abstract)

Kun Bi , University of Science and Technology of China
Naijie Gu , University of Science and Technology of China
Kun Tu , University of Science and Technology of China
Wan Li Dong , University of Science and Technology of China
Xiaohu Liu , University of Science and Technology of China
pp. 41

Maintaining Coverage by Progressive Crystal-Lattice Permutation in Mobile Wireless Sensor Networks (Abstract)

Ting-Wei Hou , National Cheng Kung University Taiwan City, Taiwan
Ruei-Hong Yan , National Cheng Kung University Taiwan City, Taiwan
Pang-Chieh Wang , National Cheng Kung University Taiwan City, Taiwan
pp. 42

Distributed Event Detection in Sensor Networks (Abstract)

Loren Schwiebert , Wayne State University
Fernando Martincic , Wayne State University
pp. 43

Tracing and Managing hazardous material in Sensor Networks (Abstract)

Ronny Fehling , Oracle Corporation, Montreal, Canada
pp. 44
ICSNC 9: Wireless I

A Novel Blind SNR Estimator Based on the Modified PASTd Algorithm for IF Signals (Abstract)

GE Lindong , Zhengzhou Science and Technology Institute, China
SUI Dan , Zhengzhou Science and Technology Institute, China
pp. 45

Accelerating VOD Streaming with Adaptive Proxy- Assisted Scheduling, Caching and Patching (Abstract)

Li Zimu , Tsinghua University
Qin Shaohua , Beijing University of Aeronautics and Astronautics
Wu Jianping , Tsinghua University
pp. 46

Localization with Power Control in Wireless Sensor Networks (Abstract)

Wen-Hwa Liao , Tatung University, Taiwan
Yu-Chee Lee , Tatung University, Taiwan
pp. 47

Wireless Broadband Internet Access in Korea (Abstract)

Young Il Kim , MTRD, ETRI, Korea
Song In Choi , MTRD, ETRI, Korea
Sung Cheol Chang , MTRD, ETRI, Korea
Jee Hwan Ahn , MTRD, ETRI, Korea
Yoon Ju Lee , MTRD, ETRI, Korea
pp. 48

Application Programming Interface offering classification services to end-user applications (Abstract)

Martin Kyselak , Brno University of Technology, Czech Republic
Karol Molnar , Brno University of Technology, Czech Republic
pp. 49
ICSNC 10: Wireless II

A Flexible Weight Based Clustering Algorithm in Mobile Ad hoc Networks (Abstract)

Basile L. Agba , Ecole de technologie superieure 1100 Notre Dame O., Montreal, Qc, H3C 1K3 Canada
Fran?ois Gagnon , Ecole de technologie superieure 1100 Notre Dame O., Montreal, Qc, H3C 1K3 Canada
Zouhair El-Bazzal , Ecole de technologie superieure 1100 Notre Dame O., Montreal, Qc, H3C 1K3 Canada
Michel Kadoch , Ecole de technologie superieure 1100 Notre Dame O., Montreal, Qc, H3C 1K3 Canada
Maria Bennani , Ecole de technologie superieure 1100 Notre Dame O., Montreal, Qc, H3C 1K3 Canada
pp. 50

A New Communication Architecture Based on the Spatial Information Field Model (Abstract)

Haibin Liu , China Aerospace Engineering Consultation Center, Beijing, China
pp. 51

XHTML encoding and compression (Abstract)

Sathiamoorthy Manoharan , University of Auckland New Zealand
pp. 52

A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area Networks (Abstract)

V. Zargari , Communication Research & Development Center Tamin Co. Tehran, Iran
A. Azarfar , Communication Research & Development Center Tamin Co. Tehran, Iran
M. Farahmand , Communication Research & Development Center Tamin Co. Tehran, Iran
A. Jafari , Communication Research & Development Center Tamin Co. Tehran, Iran
pp. 53

A Novel Bargaining Based Dynamic Spectrum Management Scheme in Reconfigurable Systems (Abstract)

Haozhi Xiong , Wuhan University, China
Miao Pan , Beijing University of Posts and Telecommunications, China
Jie Chen , Wuhan University, China
Guangyi Li , Wuhan University, China
Shuo Liang , Wuhan University, China
pp. 54
ICSNC 11: Wireless III

Performance Analysis of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in Cellular Networks (Abstract)

Muhammed Salamah , Eastern Mediterranean University, Mersin 10 Turkey
Idil Candan , Eastern Mediterranean University, Mersin 10 Turkey
pp. 55

TCP Based Resource Allocation Method for Base Station Diversity System (Abstract)

Kazuo Mori , Mie University, Japan
Hideo Kobayashi , Mie University, Japan
Katsuhiro Naito , Mie University, Japan
pp. 56

Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN (Abstract)

Tai-Myoung Chung , Sungkyunkwan University, Korea
Jong-Hyouk Lee , Sungkyunkwan University, Korea
pp. 57

Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks (Abstract)

Jong-Hyouk Lee , Sungkyunkwan University, Korea
Tai-Myoung Chung , Sungkyunkwan University, Korea
pp. 58

A ROD based Fuzzy packet loss differentiating algorithm for TCP in the hybrid wired/wireless network (Abstract)

Li Yong , Beijing University of Posts and Telecommunications, China
Su Fang , Beijing University of Posts and Telecommunications, China
Xu Huimin , Beijing University of Posts and Telecommunications, China
Fan Yinglei , Beijing University of Posts and Telecommunications, China
pp. 59
ICSNC 12: Wireless IV

Dynamic Cell Coverage Control for Power Saving in IEEE802.16 Mobile MultihopRelay Systems (Abstract)

Yong Woo Chung , Samsung Telecommunication America
Changhoi Koo , Samsung Telecommunication America
pp. 60

Middleware - An Effort towards Making Mobile Applications Platform Independent (Abstract)

Vishal Srivastav , University of Delhi, Delhi, India
Neeraj Gupta , University of Delhi, Delhi, India
M.P.S. Bhatia , University of Delhi, Delhi, India
pp. 62

An Energy-Efficient Redundant Nodes Tree Mechanism for Wireless Sensor Networks (Abstract)

Liu yun , Beijing Jiaotong University, Beijing, 100044, P. R. China
Zhang zhenjiang , Beijing Jiaotong University, Beijing, 100044, P. R. China
pp. 63
ICNSC 13: Wireless V

A Novel Way of Determining the Optimal Location of a Fragment in a DDBS: BGBR (Abstract)

Reza Basseda , University of Tehran
Maseud Rahgozar , University of Tehran
Pedram Ghodsnia , University of Tehran
Ashkan Bayati , University of Tehran
pp. 64

Error Correcting Codes from Modified Butson-Hadamard Matrices (Abstract)

Subash Shree Pokhrel , Chonbuk National UniversityJeonju, Korea
Moonho Lee , Chonbuk National UniversityJeonju, Korea
Xueqin Jiang , Chonbuk National UniversityJeonju, Korea
GiYeon Hwang , Chonbuk National UniversityJeonju, Korea
pp. 65

Ternary Codes From Modified Hadamard Matrices (Abstract)

KwangJe Lee , Chonbuk National University Jeonju, Korea
MoonHo Lee , Chonbuk National University Jeonju, Korea
KimSung Hun , Chonbuk National University Jeonju, Korea
Xueqin Jiang , Chonbuk National University Jeonju, Korea
Sergey A. Stepanov , Chonbuk National University Jeonju, Korea
pp. 66

Codes From Generalized Hadamard Matrices (Abstract)

TaeChol Shin , Chonbuk National University Jeonju, Korea
Xueqin Jiang , Chonbuk National University Jeonju, Korea
MoonHo Lee , Chonbuk National University Jeonju, Korea
Ram Prasad Paudel , Chonbuk National University Jeonju, Korea
pp. 67
ICSNC 14: Wireless VI

A Cluster Based Topology Control Algorithm for Wireless Ad-Hoc Networks (Abstract)

Mohammad Hamed Firooz , University of Tehran Tehran, Iran
Hassan Barjini , Imam Khomeini International University Ghazvin, Iran
Ali Sarrafi , University of Tehran Tehran, Iran
pp. 68

A Real-Time Study of 802.11b and 802.11g (Abstract)

David Odaibo , Kennesaw State University, Kennesaw, Georgia
Victor Clincy , Kennesaw State University, Kennesaw, Georgia
Ajay Sitaram , Kennesaw State University, Kennesaw, Georgia
Garima Sogarwal , Kennesaw State University, Kennesaw, Georgia
pp. 69

System capacity in OFDMA-based WiMAX (Abstract)

Chadi Tarhini , UMR CNRS 5157, Evry CEDEX - France
Tijani Chahed , UMR CNRS 5157, Evry CEDEX - France
pp. 70

GPSenseCar -A Collision Avoidance Support System Using Real-Time GPS Data in a Mobile Vehicular Network (Abstract)

Han-En Lin , National Chia-Yi University, Chia-Yi City, 600, TAIWAN
Roy C. Hsu , National Chia-Yi University, Chia-Yi City, 600, TAIWAN
Shou-Nian Wang , National Chia-Yi University, Chia-Yi City, 600, TAIWAN
Ching-Chung Chen , National Chia-Yi University, Chia-Yi City, 600, TAIWAN
Yin-Jun Chen , National Chia-Yi University, Chia-Yi City, 600, TAIWAN
pp. 71

Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks (Abstract)

Abderrezak Rachedi , LIA/CERI, University of Avignon, France
Abderrahim Benslimane , LIA/CERI, University of Avignon, France
pp. 72
91 ms
(Ver )