Network-Based Information Systems: First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Welcome to the proceedings of the 1st International Conference on Network- Based Information Systems (NBiS-2007), in conjunction with the 18th Inter- tional Conference on Database and Expert Systems Applications DEXA-2007, which was held in Regensburg, Germany, September 3–4, 2007. The main objective of NBiS-2007 was to bring together scientists, engineers, and researchers from both network systems and information systems with the aimofencouragingtheexchangeofideas,opinions,andexperiencebetweenthese two communities. NBiS started as a workshop and for 9 years it was held together with DEXA International Conference and is the oldest among DEXA Workshops. The wo- shop has been very successful in quantity and quality. We received many paper submissions every year, but as a workshop we could accept only a limited n- ber of papers. This was the ?rst year that NBiS was run as an international conference together with DEXA. We received 122 research papers from all over the world. The submitted papers were carefully reviewed by at least two reviewers. Based on the review results, the Program Committee members selected 55 high-quality papers to be presented during the NBiS-2007 conference.

Author(s): Makoto Ikeda, Giuseppe De Marco, Leonard Barolli (auth.), Tomoya Enokido, Leonard Barolli, Makoto Takizawa (eds.)
Series: Lecture Notes in Computer Science 4658 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 546
Tags: Computer Systems Organization and Communication Networks; Computer Communication Networks; Systems and Data Security; Data Storage Representation; Information Systems Applications (incl.Internet); Electronic Commerce/e-business

Front Matter....Pages -
A Simple Statistical Methodology for Testing Ad Hoc Networks....Pages 1-10
Sensor-Actuator Communication Protocols in Wireless Networks....Pages 11-19
The Effect of Routing Protocol Dynamics on TCP Performance in Mobile Ad Hoc Networks....Pages 20-29
Battery and Power Aware Routing in Mobile Ad Hoc Networks....Pages 30-39
Wireless Balloon Network for Disaster Information System....Pages 40-48
Wireless Networks as an Infrastructure for Mission-Critical Business Applications....Pages 49-58
The DecoyPort: Redirecting Hackers to Honeypots....Pages 59-68
Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard....Pages 69-78
Positive and Negative Authorizations to Access Protected Web Resources....Pages 79-87
An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions....Pages 88-97
An Automatic Meta-revised Mechanism for Anti-malicious Injection....Pages 98-107
SKEMON: A Simple Certificate-Less Method for Key Exchange by Using Mobile Network....Pages 108-117
A Secure Authentication Scheme for a Public Terminal Before a Transaction....Pages 118-126
Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study....Pages 127-136
A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World Concept....Pages 137-146
Multigroup Rekeying for a Wireless Network....Pages 147-156
Rich Internet Architectures for Browser-Based Multiplayer Real-Time Games – Design and Implementation Issues of virtual-kicker.com....Pages 157-166
Distribution of Lecture Concepts and Relations in Digital Contents....Pages 167-176
Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart Environment....Pages 177-186
Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM Networks....Pages 187-196
Implementing Range Queries with a Decentralized Balanced Tree over Distributed Hash Tables....Pages 197-206
Byzantine-Tolerant, Information Propagation in Untrustworthy and Unreliable Networks....Pages 207-216
COMICS: A Global Constraint Manager for Interactive Component Database Systems....Pages 217-226
Guidelines for Network Service Pricing: An Extended Model Considering Increase of Network Users....Pages 227-237
Role-Based Scheduling and Synchronization Algorithms to Prevent Illegal Information Flow....Pages 238-247
A Probabilistic Multi-agent Scheduler Implemented in JXTA....Pages 248-257
Scheduling Real-Time Requests in On-Demand Broadcast Environments....Pages 258-267
A Fair Replica Placement for Parallel Download on Cluster Grid....Pages 268-277
Querying Similarity in Metric Social Networks....Pages 278-287
Performance Evaluation of Dynamic Probabilistic Flooding Using Local Density Information in MANETs....Pages 288-297
A Token Bucket Model with Assured Forwarding for Web Traffic....Pages 298-307
An Analytical Approach to the Efficient Real-Time Events/Services Handling in Converged Network Environment....Pages 308-316
Command Transition Probability Analysis on Mobile Internet Command Sequences....Pages 317-324
A Solution for Congestion and Performance Enhancement by Dynamic Packet Bursting in Mobile Ad Hoc Networks....Pages 325-334
Empirical Study of Design Pattern Usage in Peer-to-Peer Systems....Pages 335-344
Improvement of JXTA Protocols for Supporting Reliable Distributed Applications in P2P Systems....Pages 345-354
A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications....Pages 355-364
Semantic Query Routing in SenPeer, a P2P Data Management System....Pages 365-374
Jamjuree Cluster: A Peer-to-Peer Cluster Computing System....Pages 375-384
Evaluations on Classified Selection of Dense Vectors for Vegetable Geographical Origin Identification System Using Trace Elements....Pages 385-396
Integrated Biomedical System for Ubiquitous Health Monitoring....Pages 397-405
Tree Graph Views for a Distributed Pervasive Environment....Pages 406-415
A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive Computing....Pages 416-425
Trust Model for Mobile Devices in Ubiquitous Environment....Pages 426-434
PoQBA: A New Path Admission Control for Diffserv Networks....Pages 435-445
An Adaptive Call Admission Control Approach for Multimedia 3G Network....Pages 446-455
Spatial Correlation Code Based Data Aggregation Scheme for Maximizing Network Lifetime....Pages 456-465
A Mesh-Based QoS Aware Multicast Routing Protocol....Pages 466-475
Virtual Large-Scale Disk System for PC-Room....Pages 476-485
Application of Default Logic in an Intelligent Tutoring System....Pages 486-494
Consolidating with Media Streaming Server and Network Storage Card....Pages 495-504
Design of the Tile-Based Embedded Multimedia Processor –TEMP–....Pages 505-512
A Fuzzy-Based Speed-Aware Handoff System for Wireless Cellular Networks....Pages 513-522
WPS and Voice-XML-Based Multi-Modal Fusion Agent Using SNNR and Fuzzy Value....Pages 523-532
A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational Grids....Pages 533-542
Back Matter....Pages -