The Community for Technology Leaders
2008 IEEE International Performance Computing and Communications Conference (IPCCC) (2008)
Austin, Texas
Dec. 7, 2008 to Dec. 9, 2008
ISSN: 1097-2641
ISBN: 978-1-4244-3368-1
TABLE OF CONTENTS

Exploring Load Balancing in Heterogeneous Networks by Rate Distribution (PDF)

Kuheli Louha , Center for Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, Cincinnati, OH 45221-0030, USA, Email: louhaki@cs.uc.edu
Jung Hyun Jun , Center for Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, Cincinnati, OH 45221-0030, USA, Email: junjn@uc.edu
Dharma P. Agrawal , Center for Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, Cincinnati, OH 45221-0030, USA, Email: dpa@cs.uc.edu
pp. 427-432

Asynchronous Detection and Avoidance (DAA) Protocol for Interference Mitigation in Dynamic Spectrum Access (PDF)

Yu-Sheng Wang , Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan, Email: r96942108@cc.ee.ntu.edu.tw
Chun-Ting Chou , Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan, Email: chuntingchou@cc.ee.ntu.edu.tw
pp. 349-353

Universal Classifier Synchronizer Demodulator (PDF)

Qinqin Chen , Center For Wireless Telecommunications at Virginia Tech, Blacksburg, VA 24061 USA phone: 540-231-2558; fax: 540-231-3004; e-mail: chenq06@vt.edu
Ying Wang , Center For Wireless Telecommunications at Virginia Tech, Blacksburg, VA 24061 USA phone: 540-231-2558; fax: 540-231-3004; e-mail: ywang06@vt.edu
Charles W. Bostian , Center For Wireless Telecommunications at Virginia Tech, Blacksburg, VA 24061 USA phone: 540-231-5096; fax: 540-231-3004; e-mail: bostian@vt.edu
pp. 366-371

Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks (PDF)

Sameer Swami , Laboratory for Networks and Applied Graph Theory, Department of Computer Science, University of Cincinnati, Cincinnati, OH., Email: swamisr@email.uc.edu
Chittabrata Ghosh , Center of Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, Cincinnati, OH., Email: ghoshc@cs.uc.edu
Rucha P. Dhekne , Center of Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, Cincinnati, OH., Email: dheknerp@cs.uc.edu
Dharma P. Agrawal , Center of Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, Cincinnati, OH., Email: dpa@cs.uc.edu
Kenneth A. Berman , Laboratory for Networks and Applied Graph Theory, Department of Computer Science, University of Cincinnati, Cincinnati, OH., Email: ken.berman@uc.edu
pp. 354-359

Enhanced Scanning Scheme for Delay-Constrained Fast Handoff in IEEE 802.11 WLANs (PDF)

Yazan M. Allawi , Optical Internet Research Center (OIRC), Information and Communications University (ICU), Daejeon, Korea, yazan@icu.ac.kr
Min-Gon Kim , Optical Internet Research Center (OIRC), Information and Communications University (ICU), Daejeon, Korea, kmg0803@gmail.com
Minho Kang , Optical Internet Research Center (OIRC), Information and Communications University (ICU), Daejeon, Korea, mhkang@icu.ac.kr
pp. 422-426

Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary (PDF)

Douglas Kelly , Air Force Institute of Technology, Wright Patterson AFB OH 45433, USA, phone: 502-542-1646; fax: 937-656-7342; e-mail: douglas.kelly@afit.edu
Richard Raines , Air Force Institute of Technology, Wright Patterson AFB OH 45433, USA, e-mail: richard.raines@afit.edu
Rusty Baldwin , Air Force Institute of Technology, Wright Patterson AFB OH 45433, USA, e-mail: rusty.baldwin@afit.edu
Barry Mullins , Air Force Institute of Technology, Wright Patterson AFB OH 45433, USA, e-mail: barry.mullins@afit.edu
Michael Grimaila , Air Force Institute of Technology, Wright Patterson AFB OH 45433, USA, e-mail: michael.grimaila@afit.edu
pp. 524-531

Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems (PDF)

Sun-il Kim , Department of Computer Science, Information Technology and Systems Center, University of Alabama in Huntsville, Email: sunilkim@cs.uah.edu
Nnamdi Nwanze , Department of Electrical and Computer Engineering, State University of New York at Binghamton, Email: nnamdi.nwanze@binghamton.edu
pp. 517-523

Mitigating Evil Twin Attacks in 802.11 (PDF)

Kevin Bauer , Department of Computer Science, University of Colorado, bauerk@colorado.edu
Harold Gonzales , Department of Computer Science, University of Colorado, gonzaleh@colorado.edu
Damon McCoy , Department of Computer Science, University of Colorado, mccoyd@colorado.edu
pp. 513-516

Assessment Strategy with Markov Chain Utilized in Wireless Sensor Networks (PDF)

Lun Zhang , Institute for Transport Planning and Systems, Swiss Federal Institute of Technology, Zurich, Switzerland. Tongji University, Shanghai, China. E-mail: lun.zhang@ivt.baug.ethz.ch
Dongxiu Ou , School of Transportation Engineering, Tongji University, Shanghai, China. E-mail: ou.dongxiu@tongji.edu.cn
pp. 418-421

Support for Security and Privacy in SenSearch (PDF)

Jyh-How Huang , Department of Computer Science, University of Colorado, Campus Box 0430, Boulder, CO 80309-0430, USA
John Black , Department of Computer Science, University of Colorado, Campus Box 0430, Boulder, CO 80309-0430, USA
Shivakant Mishra , Department of Computer Science, University of Colorado, Campus Box 0430, Boulder, CO 80309-0430, USA
pp. 456-461

Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks (PDF)

T.P. Sharma , Department of Electronics and Computer Engineering, Indian Institute of Technology, Roorkee, India, teek_parval@rediffmail.com
R.C. Joshi , Department of Electronics and Computer Engineering, Indian Institute of Technology, Roorkee, India, joshifcc@iitr.ernet.in
Manoj Misra , Department of Electronics and Computer Engineering, Indian Institute of Technology, Roorkee, India, manojfec@iitr.ernet.in
pp. 412-417

Practical Covert Channel Implementation through a Timed Mix-Firewall (PDF)

Richard Newman , Department of Computer & Information Science & Engineering, University of Florida, Gainesville, FL 32611-6120, nemo@cise.ufl.edu
Ira S. Moskowitz , Center for High Assurance Computer Systems¿Code 5540, Naval Research Laboratory, Washington, DC 20375, ira.moskowitz@nrl.navy.mil
pp. 433-438

The Scalability of Secure Lock (PDF)

Cory J. Antosh , Center for Cyberspace Research, Dept of Electrical and Computer Engineering, Air Force Institute of Technology, Wright Patterson AFB, Ohio, USA, cory.antosh@afit.edu
Barry E. Mullins , Center for Cyberspace Research, Dept of Electrical and Computer Engineering, Air Force Institute of Technology, Wright Patterson AFB, Ohio, USA, barry.mullins@afit.edu
pp. 507-512

Fuzzy Evaluation for Wireless Sensor Networks Based on Rough Set Theory (PDF)

Lun Zhang , Institute for Transport Planning and Systems, Swiss Federal Institute of Technology in Zurich, Switzerland. Tongji University, Shanghai, China. E-mail: lun.zhang@ivt.baug.ethz.ch
Yan Lu , School of Transportation Engineering, Tongji University, Shanghai, China
Lan Chen , School of Transportation Engineering, Tongji University, Shanghai, China
pp. 406-411

On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks (PDF)

Reiner Dojen , Data Communications Security Laboratory, Department of Electronic & Computer Engineering, University of Limerick, Ireland, reiner.dojen@ul.ie
Fan Zhang , Data Communications Security Laboratory, Department of Electronic & Computer Engineering, University of Limerick, Ireland, fan.zhang@ul.ie
Tom Coffey , Data Communications Security Laboratory, Department of Electronic & Computer Engineering, University of Limerick, Ireland, tom.coffey@ul.ie
pp. 499-506

Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments (PDF)

Jung Hwan Choi , School of Information and Communication Engineering, Sungkyunkwan University, Korea, themars@ece.skku.ac.kr
Dong Hyun Kang , School of Information and Communication Engineering, Sungkyunkwan University, Korea, kkangsu@ece.skku.ac.kr
Hyunsu Jang , School of Information and Communication Engineering, Sungkyunkwan University, Korea, jhs4071@ece.skku.ac.kr
Young Ik Eom , School of Information and Communication Engineering, Sungkyunkwan University, Korea, yieom@ece.skku.ac.kr
pp. 491-498

Masquerading a Wired Covert Channel into a Wireless-like Channel (PDF)

Mina Guirguis , Computer Science Department, Texas State University, San Marcos, TX 78666, USA, msg@txstate.edu
Jason Valdez , Computer Science Department, Texas State University, San Marcos, TX 78666, USA, jv1150@txstate.edu
pp. 439-444

A Model to Use Denied Internet Traffic to Indirectly Discover Internal Network Security Problems (PDF)

Chet Langin , Information Technology, Southern Illinois University, Carbondale, Illinois USA
Hongbo Zhou , Dept. of Computer Science, Southern Illinois University, Carbondale, Illinois USA
Shahram Rahimi , Dept. of Computer Science, Southern Illinois University, Carbondale, Illinois USA
pp. 486-490

A Proxy Agent for Small Network-Enabled Devices (PDF)

H. Karen Lu , Gemalto, Inc., Arboretum Plaza II, 9442 Capital of Texas Highway, North, Suite 400, Austin, TX, email: karen.lu@gemalto.com
Asad M. Ali , Gemalto, Inc., Arboretum Plaza II, 9442 Capital of Texas Highway, North, Suite 400, Austin, TX, email: asad.ali@gemalto.com
pp. 445-449

Minimizing Energy Consumption Using Cognitive Radio (PDF)

An He , Wireless @ Virginia Tech, Bradley Department of Electrical & Computer Engineering, Virginia Polytechnic Institute and State University, 432 Durham Hall, MS 0350, Blacksburg, VA 24060, Email: ahe@vt.edu
Srikathyayani Srikanteswara , Intel Corp., 2111 NE 25th Ave., Hillsboro, OR 97124
Jeffrey H. Reed , Wireless @ Virginia Tech, Bradley Department of Electrical & Computer Engineering, Virginia Polytechnic Institute and State University, 432 Durham Hall, MS 0350, Blacksburg, VA 24060
Xuetao Chen , Wireless @ Virginia Tech, Bradley Department of Electrical & Computer Engineering, Virginia Polytechnic Institute and State University, 432 Durham Hall, MS 0350, Blacksburg, VA 24060
William H. Tranter , Wireless @ Virginia Tech, Bradley Department of Electrical & Computer Engineering, Virginia Polytechnic Institute and State University, 432 Durham Hall, MS 0350, Blacksburg, VA 24060
Kyung Kyoon Bae , School of Engineering & Computational Sciences, Liberty University, Lynchburg, VA 24502
Masoud Sajadieh , Intel Corp., 2200 Mission College Blvd., Santa Clara, CA 95052
pp. 372-377

Automatic Generation of User's Profiles for Location-Based Adaptation of Multimedia Documents (PDF)

Faycal M'hamed Bouyakoub , USTHB University, Department of Computer Science, BP 32 El Alia, Bab-Ezzouar 16111, Algiers, Algeria, bouyakoub.f.m@gmail.com
Abdelkader Belkhir , USTHB University, Department of Computer Science, BP 32 El Alia, Bab-Ezzouar 16111, Algiers, Algeria, belkhir@lsi-usthb.dz
pp. 400-405

Threshold Proxy Re-Signature (PDF)

Piyi Yang , Shanghai Jiao Tong University, Department of Computer Science and Engineering, 800 Dongchuan Road, Shanghai 200240, China, yang.piyi@gmail.com
Zhenfu Cao , Shanghai Jiao Tong University, Department of Computer Science and Engineering, 800 Dongchuan Road, Shanghai 200240, China, zfcao@cs.sjtu.edu.cn
Xiaolei Dong , Shanghai Jiao Tong University, Department of Computer Science and Engineering, 800 Dongchuan Road, Shanghai 200240, China
pp. 450-455

Spectral Sensing of Adaptive Frequency Hopping signal for Cognitive Radio (PDF)

Kapil Jaiswal , ECE Dept, Indian Institute of Science, Bangalore, India, Email: kapil_j@ece.iisc.ernet.in
pp. 360-365

Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks (PDF)

Benjamin W. Ramsey , Center for Cyberspace research, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright Patterson AFB, Ohio, USA, benjamin.ramsey@afit.edu
Barry E. Mullins , Center for Cyberspace research, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright Patterson AFB, Ohio, USA, barry.mullins@afit.edu
Ryan W. Thomas , Center for Cyberspace research, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright Patterson AFB, Ohio, USA, ryan.thomas@afit.edu
Todd R. Andel , Center for Cyberspace research, Department of Electrical and Computer Engineering, Air Force Institute of Technology, Wright Patterson AFB, Ohio, USA, todd.andel@afit.edu
pp. 469-474

RFID Reader Anti-collision Algorithm Using a Server and Mobile Readers Based on Conflict-Free Multiple Access (PDF)

Jun-Bong Eom , School of Information and Communication Engineering, Sungkyunkwan University, Jangan-gu, Suwon 440-746, Korea, Email: eomjb@ece.skku.ac.kr
Tae-Jin Lee , School of Information and Communication Engineering, Sungkyunkwan University, Jangan-gu, Suwon 440-746, Korea, Email: tjlee@ece.skku.ac.kr
pp. 395-399

Throughput Enhancement of Macro and Femto Networks By Frequency Reuse and Pilot Sensing (PDF)

Tae-Hwan Kim , School of Information and Communication Engineering Sungkyunkwan University, Suwon, 440-746, South Korea, E-mail: thkim@ece.skku.ac.kr
Tae-Jin Lee , School of Information and Communication Engineering Sungkyunkwan University, Suwon, 440-746, South Korea, E-mail: tjlee@ece.skku.ac.kr
pp. 390-394

Discovering Resources in Tuple-Based Pervasive Systems using Resource-Aware Routing (PDF)

Saman Kolahdooz , Computer Engineering Department, Iran University of Science and Technology, E-mail: saman_kolahdooz@comp.iust.ac.ir
Shahpour Rahmani , Computer Engineering Department, Iran University of Science and Technology, E-mail: shr@iust.ac.ir
Mohsen Sharifi , Computer Engineering Department, Iran University of Science and Technology, E-mail: msharifi@iust.ac.ir
pp. 384-389

Distributed Detection of Replica Cluster Attacks in Sensor Networks Using Sequential Analysis (PDF)

Jun-Won Ho , Department of Computer Science and Engineering, University of Texas at Arlington, TX 76019-0015 U.S.A. ho@cse.uta.edu
pp. 482-485

Activity-based Security Scheme for Ubiquitous Environments (PDF)

P.T.H. Truc , Dept. of Computer Engineering, Kyung Hee University, Korea, pthtruc@oslab.khu.ac.kr
Le Xuan Hung , Dept. of Computer Engineering, Kyung Hee University, Korea, lxhung@oslab.khu.ac.kr
A. S Riaz , Dept. of Computer Engineering, Kyung Hee University, Korea, riaz@oslab.khu.ac.kr
S.M.K. Raazi , Dept. of Computer Engineering, Kyung Hee University, Korea, raazi@oslab.khu.ac.kr
Y. Weiwei , Dept. of Computer Engineering, Kyung Hee University, Korea, weiwei@oslab.khu.ac.kr
NT Canh , Dept. of Computer Engineering, Kyung Hee University, Korea, ntcanh@oslab.khu.ac.kr
J Hassan , Dept. of Computer Engineering, Kyung Hee University, Korea, hassan@oslab.khu.ac.kr
Sungyoung Lee , Dept. of Computer Engineering, Kyung Hee University, Korea, sylee@oslab.khu.ac.kr
Heejo Lee , Dept. of Computer Science and Engineering, Korea University, Korea, heejo@korea.ac.kr
Yuseung Son , Dept. of Information Assurance, Institute for Graphic Interfaces, Korea, yssohn@igi.re.kr
Miguel Fernandes , Dept. of Information Assurance, Institute for Graphic Interfaces, Korea, mfernandes@igi.re.kr
Miso Kim , R&D Center at Samsung Electronics., meeso.kim@samsung.com
Yonil Zhung , Dept. of Computer Engineering, Kyung Hee University, Korea, yizhung@oslab.khu.ac.kr
pp. 475-481

Proxy Aided Key Pre-distribution Schemes for Sensor Networks (PDF)

Mahalingam Ramkumar , Department of Computer Science and Engineering, Mississippi State University, Mississippi State, MS 39762, Ph: 662-325-8435, Email: ramkumar@cse.msstate.edu
pp. 462-468

Traffic Differentiating Queue For Enhancing AODV Performance in Real-Time Interactive applications (PDF)

Allaa R. Hilal , German University in Cairo, New Cairo, Cairo, Egypt
Amal El-Nahas , German University in Cairo, New Cairo, Cairo, Egypt
Ahmed Bashandy , Cairo University, Cairo, Egypt
Samir Shahin , Cairo University, Cairo, Egypt
pp. 378-383

UD-GEM: A Multi-Path Routing Algorithm for Wireless Sensor Networks (PDF)

Yuxing Huang , Dept. of Computer Science and Information Technology, UPEI, Charlottetown, PE, Canada, C1A 4P3, yuxhuang@upei.ca
Qiang Ye , Dept. of Computer Science and Information Technology, UPEI, Charlottetown, PE, Canada, C1A 4P3, qye@upei.ca
Yanxia Jia , Dept. of Computer Science and Mathematics, Arcadia University, 450 S. Easton Rd, Glenside, PA, USA 19038, jia@arcadia.edu
pp. 256-263

Performance Models for the Instance Pooling Mechanism of the JBoss Application Server (PDF)

Fabio N. Souza , Universidade Federal de Pernambuco ¿ Centro de Informática, Caixa Postal 7851 ¿ 50740-540 ¿ PE ¿ Brasil, fns@cin.ufpe.br
Roberto D. Arteiro , Universidade Federal de Pernambuco ¿ Centro de Informática, Caixa Postal 7851 ¿ 50740-540 ¿ PE ¿ Brasil, rda@cin.ufpe.br
Nelson S. Rosa , Universidade Federal de Pernambuco ¿ Centro de Informática, Caixa Postal 7851 ¿ 50740-540 ¿ PE ¿ Brasil, nsr@cin.ufpe.br
Paulo R. M. Maciel , Universidade Federal de Pernambuco ¿ Centro de Informática, Caixa Postal 7851 ¿ 50740-540 ¿ PE ¿ Brasil, prmm@cin.ufpe.br
pp. 135-143

Analysis on Probabilistic View Coverage for Image Sensing - A Geometric Approach (PDF)

Fulu Li , The Media Laboratory, MIT, Cambridge, MA USA 02139, Email: fulu@media.mit.edu
Ramesh Raskar , The Media Laboratory, MIT, Cambridge, MA USA 02139, Email: raskar@media.mit.edu
Andrew Lippman , The Media Laboratory, MIT, Cambridge, MA USA 02139, Email: lip@media.mit.edu
pp. 271-280

Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets (PDF)

Arnur G. Tokhtabayev , Center for Advanced Information Technologies, Binghamton University, atokhta1@binghmaton.edu
Victor A. Skormin , Center for Advanced Information Technologies, Binghamton University, vskormin@binghmaton.edu
Andrey M. Dolgikh , Center for Advanced Information Technologies, Binghamton University, adolgik1@binghmaton.edu
pp. 59-68

An Evaluation of Java RMI/JavaSpaces and Ruby DRb/Rinda (PDF)

Abhishek Jaiantilal , Department of Computer Science, University of Colorado at Boulder, Abhishek.Jaiantila@colorado.edu
Yifei Jiang , Department of Computer Science, University of Colorado at Boulder, Yifei.Jiang@colorado.edu
Shivakant Mishra , Department of Computer Science, University of Colorado at Boulder, mishras@colorado.edu
pp. 127-134

TSS: An Energy Efficient Communication Scheme for Low Power Wireless Networks (PDF)

Rabindranath Ghosh , St. Thomas¿ College of Engg. and Tech., Kolkata, India, rnghosh@gmail.com
Koushik Sinha , Honeywell Tech. Solutions, Bangalore, India, sinha_kou@yahoo.com
Debasish Datta , Dept. of EECE, IIT Kharagpur, India, ddatta@ece.iitkgp.ernet.in
Bhabani P. Sinha , ACM Unit, Indian Statistical, Institute, Kolkata, India, bhabani@isical.ac.in
pp. 85-92

TIME: Time-based Index Management for Event Query Processing in Wireless Sensor Networks (PDF)

Guilin Li , Department of Computer Science, Harbin Institute of Technology, China, liguilin@hit.edu.cn
Jianzhong Li , Department of Computer Science, Harbin Institute of Technology, China, lijzh@hit.edu.cn
Yingshu Li , Department of Computer Science, Georgia State University, yli@cs.gsu.edu
pp. 1-8

Theoretical and Experimental Evaluation of Communication-Induced Checkpointing Protocols in FE Family (PDF)

Yi Luo , Department of Computer Science, University of Kentucky, Lexington, KY 40506, USA, yiluo@cs.uky.edu
D. Manivannan , Department of Computer Science, University of Kentucky, Lexington, KY 40506, USA, mani@cs.uky.edu
pp. 217-224

Massively Parallel Network Coding on GPUs (PDF)

Xiaowen Chu , Department of Computer Science, Hong Kong Baptist University, Hong Kong, P.R.C, chxw@comp.hkbu.edu.hk
Kaiyong Zhao , Department of Computer Science, Hong Kong Baptist University, Hong Kong, P.R.C, kyzhao@comp.hkbu.edu.hk
Mea Wang , Department of Computer Science, University of Calgary, Alberta, Canada, meawang@ucalgary.ca
pp. 144-151

A Group-aware Service Discovery Scheme in Ubiquitous Environment using Service Assignment (PDF)

Hankyul You , School of Engineering, Information and Communications University, 110 Munji-ro, Yuseong-gu, Daejeon, Republic of Korea, hanky@icu.ac.kr
Dohyun Kim , School of Engineering, Information and Communications University, 110 Munji-ro, Yuseong-gu, Daejeon, Republic of Korea, t12t12t12@icu.ac.kr
X. T. Hoang , School of Engineering, Information and Communications University, 110 Munji-ro, Yuseong-gu, Daejeon, Republic of Korea, tung_hx@icu.ac.kr
Younghee Lee , School of Engineering, Information and Communications University, 110 Munji-ro, Yuseong-gu, Daejeon, Republic of Korea, yhlee@icu.ac.kr
pp. 233-238

An Adaptive Cache Management Using Dual LRU Stacks to Improve Buffer Cache Performance (PDF)

Shenggang Wan , Data Storage Division, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, Hubei, P.R. China, wanshenggang@gmail.com, sanmonk@gmail.com
Qiang Cao , Data Storage Division, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, Hubei, P.R. China
Xubin He , Department of Electrical & Computer Engineering, Tennessee Technological University, Cookeville, TN 38505, USA, hexb@tntech.edu
Changsheng Xie , Data Storage Division, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, Hubei, P.R. China
Chentao Wu , Data Storage Division, Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology, Wuhan, Hubei, P.R. China
pp. 43-50

Towards a Queue Sensitilve Transport Protocol (PDF)

Ritesh Kumar , University of Northi Carolina at Chapel Hill
Jasleen Kaur , University of Northi Carolina at Chapel Hill
pp. 319-326

Progressive Parity-Based Hardening of Data Stores (PDF)

Ahmed Amer , University of Pittsburgh
Jehan-Franccis Paris , University of Houston
Darrell D. E. Long , University of California, Santa Cruz
Thomas Schwarz , Santa Clara University
pp. 34-42

Location Authentication Methods for Wireless Network Access Control (PDF)

Lichun Bao , Computer Science Department, Donald Bren School of ICS, University of California, Irvine CA 92697. U.S.A.
pp. 160-167

QELAR: A Q-learning-based Energy-Efficient and Lifetime-Aware Routing Protocol for Underwater Sensor Networks (PDF)

Tiansi Hu , Department of Electrical & Computer Engineering, University of Connecticut, Storrs, CT 06269, E-mail: tiansi@engr.uconn.edu
Yunsi Fei , Department of Electrical & Computer Engineering, University of Connecticut, Storrs, CT 06269, E-mail: yfei@engr.uconn.edu
pp. 247-255

A New Trust Framework Based on Reputation for Unstructured P2P Networks (PDF)

Chunqi Tian , Department of Computer Science, Tongji University, Shanghai, China, tianchunqi@163.com
Shihong Zou , State Key Laboratory of Networking and Switching, Beijing University of Posts and Telecommunications, Beijing, China, zoush@buptedu.cn
Lingwei Chu , State Key Laboratory of Networking and Switching, Beijing University of Posts and Telecommunications, Beijing, China, rue2004cn@sohu.com
Shiduan Cheng , State Key Laboratory of Networking and Switching, Beijing University of Posts and Telecommunications, Beijing, China, chsd@buptedu.cn
pp. 209-216

Laborator Measuremeots and Verification of PSI/SI Transmission iIn DVBH Systems (PDF)

Jani Vare , Nokia Corporation, Jani.vare@nokia.com
Jyrki Alamaunu , Nokia Corporation
Harri Pekonen , Nokia Corporation
pp. 225-232

Joint Adaptive Redundancy and Partial Retransmission for Reliable Transmission in Wireless Sensor Networks (PDF)

Hao Wen , Tsinghua University, Beijing China, wenhao@csnet1.cs.tsinghua.edu.cn
Chuang Lin , Tsinghua University, Beijing China, clin@csnet1.cs.tsinghua.edu.cn
Fengyuan Ren , Tsinghua University, Beijing China, renfy@csnet1.cs.tsinghua.edu.cn
Hongkun Yang , Tsinghua University, Beijing China, yanghk07@csnet1.cs.tsinghua.edu.cn
Tao He , Tsinghua University, Beijing China, hetao@csnet1.cs.tsinghua.edu.cn
Eryk Dutkiewicz , Macquarie University, Sydney, Australia, eryk@ics.mq.edu.au
pp. 303-310

Distributed Energy-Efficient Scheduling for Data-Intensive Applications with Deadline Constraints on Data Grids (PDF)

Cong Liu , University of North Carolina at Chapel Hill
Xiao Qin , Auburn University
Santosh Kulkarni , Auburn University
Chengjun Wang , Auburn University
Shuang Li , Auburn University
Adam Manzanares , Auburn University
Sanjeev Baskiyar , Auburn University
pp. 26-33

QoS Behavior of Optical Burst Switching under Multimedia Traffic: an Analytical Approach (PDF)

Aresh Dadlani , a.dadlani@ipm.ir
Ahmad Khonsari , University of Tehran, ECE Department, North Karegar Ave., Tehran, Iran; IPM School of Computer Science, Niavaran Sq., Tehran, Iran, ak@ipm.ir
Mohammadreza Aghajani , IPM School of Computer Science, Niavaran Sq., Tehran, Iran, aghajani@ipm.ir
Ali Rajabi , IPM School of Computer Science, Niavaran Sq., Tehran, Iran, alirajabi@ipm.ir
pp. 335-342

A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems (PDF)

Muhammad Ikram , Department of Information and Communication Engineering, AJOU University Suwon 443-749, Republic of Korea, Email: ikram@ajou.ac.kr
Md. Aminul Haque Chowdhury , Department of Information and Communication Engineering, AJOU University Suwon 443-749, Republic of Korea, Email: aminul@ajou.ac.kr
Hassen Redwan , Department of Information and Communication Engineering, AJOU University Suwon 443-749, Republic of Korea, Email: hassenred1@ajou.ac.kr
Jong-Bin Koh , Department of Information and Communication Engineering, AJOU University Suwon 443-749, Republic of Korea, Email: nitefly@ajou.ac.kr
Ki-Hyung Kim , Department of Information and Communication Engineering, AJOU University Suwon 443-749, Republic of Korea, Email: kkim86@ajou.ac.kr
Dong-Kyoo Kim , Department of Information and Communication Engineering, AJOU University Suwon 443-749, Republic of Korea, Email: dkkim@ajou.ac.kr
pp. 289-296

Divisible Load Scheduling inWireless Sensor Networks with Information Utility (PDF)

Kijeung Choi , Department of Electrical and Computer Engineering, Stony Brook University, Stony Brook, New York, kchoi@ece.sunysb.edu
Thomas G. Robertazzi , Department of Electrical and Computer Engineering, Stony Brook University, Stony Brook, New York, tom@ece.sunysb.edu
pp. 9-17

Design and Evaluation of Localization Protocols and Algorithms in Wireless Sensor Networks Using UWB (PDF)

Di Wui , Donald Bren School of ICS, University of California. Irvine. USA; School of Computer and Communication, Human University, Changsha. China
Lichun Bao , Donald Bren School of ICS, University of California. Irvine. USA
Min Du , School of Computer and Communication, Human University, Changsha. China
Renfa Li , School of Computer and Communication, Human University, Changsha. China
pp. 18-25

Spectrum Handoff for Cognitive Radio Networks: Reactive-Sensing or Proactive-Sensins? (PDF)

Li-Chun Wang , National Chiao Tung University, Taiwan, Email: lichun@cc.nctu.edu.tw
Chung-Wei Wang , National Chiao Tung University, Taiwan, Email: hyper.cm91g@nctu.edu.tw
pp. 343-348

Cooperative Monitoring for Internet Data Centers (PDF)

Kuai Xu , Arizona State University, Division of Mathematical and Natural Sciences, New College of Interdisciplinary Arts & Sciences, P.O. Box 37100, Phoenix, AZ 85069, kxu01@asu.edu
Feng Wang , Arizona State University, Division of Mathematical and Natural Sciences, New College of Interdisciplinary Arts & Sciences, P.O. Box 37100, Phoenix, AZ 85069, fwang25@asu.edu
pp. 111-118

A High Scalability P2P Simulation Framework with Measured Realistic Network Layer Support (PDF)

Guangyu Shi , Huawei Technologies Co., Ltd, Shenzhen, 518129, China, shiguangyu@huawei.com
Youshui Long , Huawei Technologies Co., Ltd, Shenzhen, 518129, China, longyoushui@huawei.com
Hao Gong , Huawei Technologies Co., Ltd, Shenzhen, 518129, China, haogong@huawei.com
Changqing Wan , Huawei Technologies Co., Ltd, Shenzhen, 518129, China
Chuanliang Yu , Harbin Institute of Technology, Harbin, 150001, China
Xianqing Yang , Harbin Institute of Technology, Harbin, 150001, China
Hongli Zhang , Harbin Institute of Technology, Harbin, 150001, China, zhl@pact518.hit.edu.cn
pp. 311-318

Stability Analysis for Communication of Voice and Data Terminals with Packet Reservation Multiple Access Protocol (PDF)

Amirali Sharifi , Sterne Kessler Goldstein Fox P.L.L.C. and Department of ECE and ISR, University of Maryland College Park, MD, amirali@umd.edu
Eyad H. Abed , Department of ECE and ISR, University of Maryland College Park, MD, abed@umd.edu
pp. 281-288

Delay and Capacity Optimization in Multi-radio Multi-channel Wireless Mesh Networks (PDF)

Weihuang Fu , OBR Center for Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, Cincinnati, OH 45221-0030, Email: fuwg@cs.uc.edu
Yun Wang , OBR Center for Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, Cincinnati, OH 45221-0030; Department of Computer Science, Southern Illinois University Edwardsville, IL 62026-1656, Email: wany6@cs.uc.edu
Dharma P. Agrawal , OBR Center for Distributed and Mobile Computing, Department of Computer Science, University of Cincinnati, Cincinnati, OH 45221-0030 Email: dpa@cs.uc.edu
pp. 152-159

A Network Connection Proxy to Enable Hosts to Sleep and Save Energy (PDF)

Miguel Jimeno , Dept. of Computer Science and Engineering, University of South Florida, Tampa, FL 33620, mjimeno@cse.usf.edu
Ken Christensen , Dept. of Computer Science and Engineering, University of South Florida, Tampa, FL 33620, christen@cse.usf.edu
Bruce Nordman , Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, bnordman@lbl.gov
pp. 101-110

Neighborhood Route Diffusion for Packet Salvaging in Networks with High Mobility (PDF)

Muhannad Quwaider , Electrical and Computer Engineering Department, Michigan State University, quwaider@egr.msu.edu
Jayanthi Rao , Electrical and Computer Engineering Department, Michigan State University, jayanthi@egr.msu.edu
Subir Biswas , Electrical and Computer Engineering Department, Michigan State University, sbiswas@egr.msu.edu
pp. 168-175

An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks (PDF)

Amar Rasheed , Department of Computer Science, Texas A&M University, amar_rasheed@tamu.edu
Rabi Mahapatra , Department of Computer Science, Texas A&M University, rabi@cs.tamu.edu
pp. 264-270

A Highly Available Transparent Linux Cluster Security Model (PDF)

V. Ramsurrun , Electrical & Electronic Engineering Department, University of Mauritius, Réduit, Mauritius, vishamr2000@gmail.com
K. M. S. Soyjaudah , Electrical & Electronic Engineering Department, University of Mauritius, Réduit, Mauritius, ssoyjaudah@uom.ac.mu
pp. 69-76

Fairness Analysis in Competitive FIFO Buffer Management (Abstract)

Fei Li , Department of Computer Science, George Mason University, Fairfax, VA 22030, lifei@cs.gmu.edu
pp. 239-246

Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy (PDF)

Joao V. P. Gomes , Nokia Siemens Networks Portugal S. A., Department of Computer Science, University of Beira Interior, Covilhã, Portugal, jgomes@penhas.di.ubi.pt
Pedro R. M. Inacio , Nokia Siemens Networks Portugal S. A., Department of Computer Science, University of Beira Interior, Covilhã, Portugal, pedro.inacio@penhas.di.ubi.pt
Mario M. Freire , IT - Networks and Multimedia Group, Department of Computer Science, University of Beira Interior, Covilhã, Portugal, mario@di.ubi.pt
Manuela Pereira , IT - Networks and Multimedia Group, Department of Computer Science, University of Beira Interior, Covilhã, Portugal, mpereira@di.ubi.pt
Paulo P. Monteiro , Nokia Siemens Networks Portugal S. A., Institute of Telecommunications, University of Aveiro, Aveiro, Portugal, paulo.1.monteiro@nsn.com
pp. 201-208

Understanding Divide-Conquer-Scanning Worms (PDF)

Yubin Li , Department of Electrical & Computer Engineering, Florida International University, Miami, FL 33174, E-mail: yli004@fiu.edu
Zesheng Chen , Department of Electrical & Computer Engineering, Florida International University, Miami, FL 33174, E-mail: zchen@fiu.edu
Chao Chen , Department of Engineering, Indiana University - Purdue University Fort Wayne, Fort Wayne, IN 46805, E-mail: chen@engr.ipfw.edu
pp. 51-58

A Transient Overload Generator forWeb Servers (PDF)

Paulo R. Farah , Faculdade Atual da Amazônia, Y Street, 308, 69313-792, Boa Vista, RR, Brazil, farah@faculdadeatual.edu.br
Cristina D. Murta , Department of Computing, CEFET-MG, 30510-000, Belo Horizonte, MG, Brazil, cristina@decom.cefetmg.br
pp. 119-126

Increasing Lifetime of Wireless Sensor Networks Using Controllable Mobile Cluster Heads (PDF)

Torsha Banerjee , Department of Computer Science, University of Cincinnati, Cincinnati, Ohio 45221, Email: banerjta@cs.uc.edu
Dharma P. Agrawal , Department of Computer Science, University of Cincinnati, Cincinnati, Ohio 45221, Email: dpa@cs.uc.edu
pp. 77-84

Directional Double Metric Routing in Wireless Mesh Network (PDF)

Dapeng Wang , Department of Computer Science, University of Science and Technology of China, Anhui Hefei, China
Shoubao Yang , Department of Computer Science, University of Science and Technology of China, Anhui Hefei, China
Yun Hu , Department of Computer Science, University of Science and Technology of China, Anhui Hefei, China
Peng Zhang , Department of Computer Science, University of Science and Technology of China, Anhui Hefei, China
pp. 297-302

Simple and Effective Adaptive Routing Algorithms in Multi-Layer Wormhole Networks (PDF)

Kyung Min Su , Department of Computer Science, The University of Texas at San Antonio, San Antonio, TX 78249, ksu@cs.utsa.edu
Ki Hwan Yum , Department of Computer Science, The University of Texas at San Antonio, San Antonio, TX 78249, yum@cs.utsa.edu
pp. 176-184

KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks (PDF)

Ting Yuan , School of Computer Science, Fudan University, Shanghai, 200433, P. R. China, 061021081@fudan.edu.cn
Shiyong Zhang , School of Computer Science, Fudan University, Shanghai, 200433, P. R. China, szhang@fudan.edu.cn
Yiping Zhong , School of Computer Science, Fudan University, Shanghai, 200433, P. R. China, ypzhong@fudan.edu.cn
Jianqing Ma , School of Computer Science, Fudan University, Shanghai, 200433, P. R. China, jqma@fudan.edu.cn
pp. 193-200

Modeling and Performance Evaluation of Optical Burst Switched Ring Networks with Efficient Adaptive Routing (PDF)

Xingbo Gao , School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida 32816, xbgao@cs.ucf.edu
Mostafa A. Bassiouni , School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Florida 32816, bassi@cs.ucf.edu
pp. 327-334

Coding-Aware Multi-path Routing in Multi-Hop Wireless Networks (PDF)

Song Han , Department of Computer Sciences, The University of Texas at Austin, shan@cs.utexas.edu
Zifei Zhong , Department of Computer Sciences, The University of Texas at Austin, zfz@cs.utexas.edu
Hongxing Li , State Key Laboratory of Novel Software Technology, Nanjing University, hxli@dislab.nju.edu.cn
Guihai Chen , State Key Laboratory of Novel Software Technology, Nanjing University, gchen@dislab.nju.edu.cn
Edward Chan , Department of Computer Science, City University of Hong Kong, csedchan@cityu.edu.hk
Aloysius K. Mok , Department of Computer Sciences, The University of Texas at Austin, mok@cs.utexas.edu
pp. 93-100

Towards Green Routers: Depth-Bounded Multi-Pipeline Architecture for Power-Efficient IP Lookup (PDF)

Weirong Jiang , Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, CA 90089, USA, weirongj@usc.edu
Viktor K. Prasanna , Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, CA 90089, USA, prasanna@usc.edu
pp. 185-192
91 ms
(Ver 3.3 (11022016))