Networking and Mobile Computing: Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Welcome to Zhangjiajie for the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC 2005). We are currently witnessing a proliferation in mobile/wireless technologies and applications. However, these new technologies have ushered in unprecedented challenges for the research community across the range of networking, mobile computing, network security and wireless web applications, and optical network topics. ICCNMC 2005 was sponsored by the China Computer Federation, in cooperation with the Institute for Electrical and Electronics Engineers (IEEE) Computer Society. The objective of this conference was to address and capture highly innovative and stateof-the-art research and work in the networks and mobile computing industries. ICCNMC 2005 allowed sharing of the underlying theories and applications, and the establishment of new and long-term collaborative channels aimed at developing innovative concepts and solutions geared to future markets. The highly positive response to ICCNMC 2001 and ICCNMC 2003, held in Beijing and Shanghai, respectively, encouraged us to continue this international event. In its third year, ICCNMC 2005 continued to provide a forum for researchers, professionals, and industrial practitioners from around the world to report on new advances in computer network and mobile computing, as well as to identify issues and directions for research and development in the new era of evolving technologies.

Author(s): John A. Stankovic (auth.), Xicheng Lu, Wei Zhao (eds.)
Series: Lecture Notes in Computer Science 3619 : Computer Communication Networks and Telecommunications
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 1299
Tags: Computer Communication Networks; Information Storage and Retrieval; Information Systems Applications (incl.Internet); Multimedia Information Systems; Computers and Society; Communications Engineering, Networks

Front Matter....Pages -
Self-organizing Wireless Sensor Networks in Action....Pages 1-1
The Internet Control Architecture: Successes and Challenges....Pages 2-2
Distributed Localization Refinements for Mobile Sensor Networks....Pages 3-12
Cooperative Target Localization Method for Heterogeneous Sensor Networks....Pages 13-22
Sensor Network Configuration Under Physical Attacks....Pages 23-32
TPSS: A Time-Based Positioning Scheme for Sensor Networks with Short Range Beacons....Pages 33-42
Energy-Efficient Connected Coverage of Discrete Targets in Wireless Sensor Networks....Pages 43-52
Coverage Algorithm and Protocol in Heterogeneous Sensor Networks....Pages 53-63
Simplified Message Transformation for Optimization of Message Processing in 3G-324M Control Protocol....Pages 64-73
Dynamic Packet Scheduling Based on Utility Optimization in OFDM Networks....Pages 74-83
Comb-Pattern Optimal Pilot in MIMO-OFDM System....Pages 84-92
Channel-Adaptive GPS Scheduling for Heterogeneous Multimedia in CDMA Networks....Pages 93-101
An Adaptive Scheduled Transmission Strategy for Multimedia Services in WCDMA Systems....Pages 102-112
Semantic Web Enabled VHE for 3 rd Generation Telecommunications....Pages 113-122
An Adaptive Replication Algorithm in Overlay Networking....Pages 123-132
Performance Modeling of Mobile Peer-to-Peer Systems....Pages 133-142
A Random Walk Based Anonymous Peer-to-Peer Protocol Design....Pages 143-152
A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks....Pages 153-162
BSMON: Bandwidth-Satisfied Multicast in Overlay Network for Large-Scale Live Media Applications....Pages 163-172
A Routing and Wavelength Assignment Algorithms Based on the State Level of Links....Pages 173-177
Cooperative Determination on Cache Replacement Candidates for Transcoding Proxy Caching....Pages 178-187
High Performance Embedded Route Lookup Coprocessor for Network Processors....Pages 188-197
An Efficient Distributed Dynamic Multicast Routing with Delay and Delay Variation Constraints....Pages 198-207
Data Caching in Selfish MANETs....Pages 208-217
Optimal Scheduling for Link Assignment in Traffic-Sensitive STDMA Wireless Ad-Hoc Networks....Pages 218-228
Modeling and Performance Evaluation of Handover Service in Wireless Networks....Pages 229-238
The Optimum Parameter Design for WCDMA Intra-frequency Handover Initiation....Pages 239-248
A New Location Management Scheme for the Next-Generation Mobile Cellular Networks....Pages 249-258
Rapid Mobility of Mobile IP over WLAN....Pages 259-267
Least Cost Multicast Spanning Tree Algorithm for Local Computer Network....Pages 268-275
A New Multicast Group Management Scheme for IP Mobility Support....Pages 276-285
On the Minimization of the Number of Forwarding Nodes for Multicast in Wireless Ad Hoc Networks....Pages 286-294
The Impact of Mobility Modeling in Mobile IP Multicast Research....Pages 295-304
Broadcast in the Locally k-Subcube-Connected Hypercube Networks with Faulty Tolerance....Pages 305-313
Performance Analysis of Route Discovery in Wireless Ad Hoc Networks: A Unified Model....Pages 314-323
A Load-Balancing Control Method Considering Energy Consumption Rate in Ad-Hoc Networks....Pages 324-333
Efficient Node Forwarding Strategies via Non-cooperative Game for Wireless Ad Hoc Networks....Pages 334-343
A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks....Pages 344-353
Enhanced Positioning Probability System for Wireless Ad Hoc Networks....Pages 354-363
A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs....Pages 364-374
Mobility-Aware On-demand Global Hosts for Ad-Hoc Multicast....Pages 375-384
Bottom Up Algorithm to Identify Link-Level Transition Probability....Pages 385-394
An Extended GI X /M/1/N Queueing Model for Evaluating the Performance of AQM Algorithms with Aggregate Traffic....Pages 395-404
Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput....Pages 405-413
Detour Path Optimization Algorithm Based on Traffic Duration Time in MPLS Network....Pages 414-422
HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks....Pages 423-432
Improved Thumbprint and Its Application for Intrusion Detection....Pages 433-442
Performance Enhancement of Wireless Cipher Communication....Pages 443-451
SAS: A Scalar Anonymous Communication System....Pages 452-461
Two New Fast Methods for Simultaneous Scalar Multiplication in Elliptic Curve Cryptosystems....Pages 462-470
Network-Based Anomaly Detection Using an Elman Network....Pages 471-480
On Mitigating Network Partitioning in Peer-to-Peer Massively Multiplayer Games....Pages 481-490
P2P-Based Software Engineering Management....Pages 491-500
A Computational Reputation Model in P2P Networks Based on Trust and Distrust....Pages 501-508
Web Services Peer-to-Peer Discovery Service for Automated Web Service Composition....Pages 509-518
Efficient Mining of Cross-Transaction Web Usage Patterns in Large Database....Pages 519-528
Delay-Constrained Multicasting with Power-Control in Wireless Networks....Pages 529-538
Distributed Hierarchical Access Control for Secure Group Communications....Pages 539-548
Hierarchical Multicast Tree Algorithms for Application Layer Mesh Networks....Pages 549-559
A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet....Pages 560-569
Interdomain Traffic Control over Multiple Links Based on Genetic Algorithm....Pages 570-579
Congestion Management of IP Traffic Using Adaptive Exponential RED....Pages 580-589
An Analysis and Evaluation of Policy-Based Network Management Approaches....Pages 590-599
An End-to-End QoS Provisioning Architecture in IPv6 Networks....Pages 600-609
Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam....Pages 610-619
A Protection Tree Scheme for First-Failure Protection and Second-Failure Restoration in Optical Networks....Pages 620-631
Distributed Dynamic Resource Management for the AF Traffic of the Differentiated Services Networks....Pages 632-641
Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder....Pages 642-651
An Enhanced Packet Scheduling Algorithm for QoS Support in IEEE 802.16 Wireless Network....Pages 652-661
A Novel Core Stateless Virtual Clock Scheduling Algorithm....Pages 662-671
Proportional Differentiated Services for End-to-End Traffic Control....Pages 672-681
Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks....Pages 682-691
A Prediction-Based Location Update Algorithm in Wireless Mobile Ad-Hoc Networks....Pages 692-701
Combining Power Management and Power Control in Multihop IEEE 802.11 Ad Hoc Networks....Pages 702-711
Minimum Disc Cover Set Construction in Mobile Ad Hoc Networks....Pages 712-721
A Study on Dynamic Load Balanced Routing Techniques in Time-Slotted Optical Burst Switched Networks....Pages 722-731
A Novel Multi-path Routing Protocol....Pages 732-741
A Simplified Routing and Simulating Scheme for the LEO/MEO Two-Layered Satellite Network....Pages 742-751
ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes’ Forwarding Tables of Clustered Router....Pages 752-761
Design and Implementation of Control-Extensible Router....Pages 762-771
Dependable Propagating Routing Information in MANET....Pages 772-780
Data Structure Optimization of AS_PATH in BGP....Pages 781-788
A Framework for Designing Adaptive AQM Schemes....Pages 789-799
Designing Adaptive PI Algorithm Based on Single Neuron....Pages 800-807
An Optimal Component Distribution Algorithm Based on MINLP....Pages 808-816
An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems....Pages 817-825
Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls....Pages 826-835
A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents....Pages 836-844
Identity Based Conference Key Distribution Scheme from Parings....Pages 845-852
Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel....Pages 853-862
An Integrated Information Retrieval Support System for Multiple Distributed Heterogeneous Cross-Lingual Information Sources....Pages 863-872
DHAI: Dynamic Hierarchical Agent-Based Infrastructure for Supporting Large-Scale Distributed Information Processing....Pages 873-882
Server-Assisted Bandwidth Negotiation Mechanism for Parallel Segment Retrieval of Web Objects....Pages 883-890
Multiple Schema Based XML Indexing....Pages 891-900
A Linked-List Data Structure for Advance Reservation Admission Control....Pages 901-910
An Adaptive Gateway Discovery Algorithm for the Integrated Network of Internet and MANET....Pages 911-920
A Sender-Oriented Back-Track Enabled Resource Reservation Scheme....Pages 921-930
Available Bandwidth Measurement Schemes over Networks....Pages 931-940
Chaotic Dynamic Analysis of MPEG-4 Video Traffic and Its Influence on Packet Loss Ratio....Pages 941-950
A Simple Streaming Media Transport Protocols Based on IPv6 QoS Mechanism....Pages 951-960
An Aided Congestion Avoidance Mechanism for TCP Vegas....Pages 961-971
On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access....Pages 972-981
Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability....Pages 982-991
PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks....Pages 992-1001
Secure Group Instant Messaging Using Cryptographic Primitives....Pages 1002-1011
A Privacy Enhanced Role-Based Access Control Model for Enterprises....Pages 1012-1021
Text Categorization Using SVMs with Rocchio Ensemble for Internet Information Classification....Pages 1022-1031
OpenRouter: A TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication....Pages 1032-1041
Efficient Approach to Merge and Segment IP Packets....Pages 1042-1051
Measuring Internet Bottlenecks: Location, Capacity, and Available Bandwidth....Pages 1052-1062
Experiment and Analysis of Active Measurement for Packet Delay Dynamics....Pages 1063-1072
A New Steganalytic Algorithm for Detecting Jsteg....Pages 1073-1082
Packet Classification Algorithm Using Multiple Subspace Intersecting....Pages 1083-1093
RSA Extended Modulus Attacks and Their Solutions in a Kind of Fair Exchange Protocols....Pages 1094-1104
Using Ambient in Computational Reflection Semantics Description....Pages 1105-1114
Energy Aware Routing Based on Adaptive Clustering Mechanism for Wireless Sensor Networks....Pages 1115-1124
Curve-Based Greedy Routing Algorithm for Sensor Networks....Pages 1125-1133
Traffic Adaptive MAC Protocol for Wireless Sensor Network....Pages 1134-1143
Semantic Sensor Net: An Extensible Framework....Pages 1144-1153
Loop-Based Topology Maintenance in Wireless Sensor Networks....Pages 1154-1162
Generating Minimal Synchronizable Test Sequence That Detects Output-Shifting Faults....Pages 1163-1170
Considering Network Context for Efficient Simulation of Highly Parallel Network Processors....Pages 1171-1180
On the Placement of Active Monitor in IP Network....Pages 1181-1187
An Adaptive Edge Marking Based Hierarchical IP Traceback System....Pages 1188-1197
FAOM: A Novel Active Queue Management with Fuzzy Logic for TCP-Based Interactive Communications....Pages 1198-1207
A CORBA-Based Dynamic Reconfigurable Middleware....Pages 1208-1217
An Integrated Architecture for QoS-Enable Router and Grid-Oriented Supercomputer....Pages 1218-1226
APA: An Interior-Oriented Intrusion Detection System Based on Multi-agents....Pages 1227-1233
Implementation of Ant Colony Algorithm Based-On Multi-agent System....Pages 1234-1242
Load Balancing Using Mobile Agent and a Novel Algorithm for Updating Load Information Partially....Pages 1243-1252
Online Internet Traffic Prediction Models Based on MMSE....Pages 1253-1262
Mobile Code Security on Destination Platform....Pages 1263-1270
A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages....Pages 1271-1276
Provable Security of ID-Based Proxy Signature Schemes....Pages 1277-1286
A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce....Pages 1287-1294
Back Matter....Pages -