![]() |
![]() |
![]() |
![]() | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() ![]() ![]() |
![]() |
![]() |
![]() | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note: For updated information on getting to the conference site, check the Hotels and Travel link in the left side menu. Conference rooms: "Le Campus" PRELIMINARY PROGRAM Saturday, August 26
Sunday, August 27
Monday, August 28
Tuesday, August 29
Wednesday, August 30
Thursday, August 31
DETAILED PROGRAM The current program is based on your original submissions, not the camera ready versions. Any changes to the title or authors is reflected on the CD and the IEEE Xplore Digital Library. If any change is needed on the posted program, please send an email request to cosmin@iaria.org ICISP1: MONIT Monitoring of SIP-Based Communication - Using Signalling Information
for Performance Measurements VIP Bridge: Integrating Several Sensor Networks into One Virtual Sensor
Network Measurement Based Approach of Congestion Control for enforcing a robust
QoS in the Internet Monitoring & Forensic Analysis for Wireless Networks ICISP2: IPERF
I Evaluation of a Multi-Queue Web Caching Scheme that Differences the
Content-Type of Documents Complementary Visualization of perfSONAR Network Performance
Measurements Internet Traffic Modeling: Performance Limits Design and Evaluation of an Overload Control System for Crisis-Related
Web Server Systems ICISP3: IPERF
II The Interaction of IGP Weight Optimization with BGP Public Domain P2P File-sharing networks measurements and
modelation Overload Protection in a SIP Signaling Network Evolution of Current Telecommunication Networks and Next Generation
Optical Networks ICISP4: TRASI I
Initial Results from an IPv6 Darknet Traffic Analysis of a Congested Link Flow-Based Identification of P2P Heavy-Hitters ICISP5: TRASI
II Crawler Detection: A Bayesian Approach On the Power-Law of the Internet and the Hierarchy of BGP
Convergence Monitoring Challenges and Approaches for P2P File-Sharing
Systems ICISP6: SYNEV Improving Network Infrastructure Security by Partitioning Networks
Running Spanning Tree Protocol Disaster Recovery Sites as a Tool of Managing Extreme
Attacks Simple provisioning, complex consolidation - pragmatic step towards a
new optical layer A New Planning Methodology for IP Networks with Dynamic Traffic Demand
and Full Survivability Guarantee Against Link Failures ICISP7: USSAF
I Authentication in an Internet Banking Environment; Towards Developing a
Strategy for Fraud Detection A Generic Authentication System based on SIM Using the Discrete Squaring Function in the Delayed Message
Authentication Protocol Cooperative Itinerant Agents (CIA): Security scheme for Intrusion
Detection Systems ICISP8: USSAF
II Technical infrastructure of a CSIRT Home and Small Office Monitoring and Automation over the
Internet SEMAFOR : framework for authentication of adaptive multimedia content
platform ICISP9: RTSEC SeCReT: A Security Framework for Enhancing Chain of Response Trust in
Session Initiation Protocol Towards new security framework for voice over IP TOES: Trustful and Open e-Ordering Service for SMEs ICDT1: SIGNAL I A Data-Flow Platform for Implementing Algorithm-Dependent ASIC Hardware
Using Data-Driven Processors Design of Mobile receiver in Ultrawideband Impulse Radio System Using
Time-Hopping and PPM Modulation Data-aided Equalization Scheme for Filtered Multitone Modulation
System HNN-based Multiuser Receiving for Uplink CDMA Systems ICDT2: SIGNAL II Viterbi Algorithm in Continuous-Phase Frequency Shift
Keying Perceptual acoustic echo suppressor for audio communication over packet
networks Skip Prediction and Early Termination for Fast Mode Decision in
H.264/AVC Spatio-Temporal MIMO Systems for Multiuser Communications under
Frequency Selective Fading ICDT3: SIGNAL
III A novel channel estimator based on polynomial fitting method in PSAM
communication systems An Artificial Immune-based Feature Interaction Detection
Method Addaptive Reduced-Rank Interference Suppression for MIMO-OFDM
Decoding ICDT4: VIDEO I A New Rate Control Scheme for H.264/AVC Collaborative Video Annotation Environments: Implemented Features and a
new Approach for Object Detection and Recognition Adaptive Pruned 4�4 DCT Algorithm for H.264 Fast Motion Estimation using Evolutionary Strategy Search
Algorithm ICDT5: VIDEO II A Fast Coefficients Convertion Method For The Transform Domain MPEG-2
To H.264 Transcoding Fast Frame/Field Coding for H.264/AVC A simplified Scalable Wavelet Video Codec with MCTF Structure ICDT6: VIDEO III Multiple Description Coding versus Transport Layer FEC for Resilient
Video Transmission A Novel Temporal Error Concealment Base on Statistical Pixel Estimation
Model Performance Comparison of Emerging Dirac Video Codec with
H.264/AVC 802.11g WLANs Design for Rural Environments
Video-surveillance ICDT7: CONTENT Web Content Management Systems: using Plone open software to built a
website for a research institute needs Per-Subscriber On-Demand QoS Assurance in Distributed Web Cache
System Data popularity and shortest-job-first scheduling of network
transfers ICDT8: IMAGE Content based Frame Sampling for Efficient Video Delivery over
Low/Varying Bandwidth Networks A Novel Palmprint Recognition Algorithm Based on
PCA&FLD Chaotic Watermarking System for Colour images Based on Texture
segmentation in WaveleTransform Domaint ICDT9: AUDIO Perceptually Controlled Error Protection for Audio Streaming over IP
Networks A Comparative Analysis and Experimental Study on Wireless Aerial and
Underwater Acoustic Communications Two-stage Classification of Emotional Speech ICDT10: MULTE
I Synchronized chaotic Lu system in CDMA satellite communication using
genetic algorithm Sliding Header Schemes for Simplifying Hunting-Free Framer Design for
Digital Transmission and Multiplexing Novel PAPR Reduction Technique based on Circular Data
Allocation Novel Channel Estimation and Interference Suppression for Uplink
Multiuser CDMA Systems ICDT11: MULTE
II Impact of Bit Errors on the DCF Throughput in Wireless LAN over Ricean
Fading Channels Jitter Ratio Based TFRC Scheme In Wireless-Wired Hybrid
Network Video Applications Quality Improvement in Wireless Systems: QoS
Negotiation and Rate Control Audio Signal Watermarking in MCLT Domain with the Aid of 2D
Pattern ICDT12: MULTE
III A Novel Multiresolution Perceptual And Statistically Based Image Coding
Scheme Multiple Description Video Coding over Multiple Path Routing
Networks Power Estimation for an Application on the Xscale Platform Using PMU
events A Software Simulation Study of a MD DS/SSMA Communication System with
Adaptive Channel Coding ICDT13: MULTE
IV Towards an Interactive IPTV for Mobile Subscribers Architectures For Person to Person Communications in Disaggregated
Networks Quality of Service Support for ODMRP Unicast Routing in Ad hoc
Networks Design and Implementation of The High Speed VP (Variable
Parameter)-Cubic Interpolator for The System of MB-OFDM
UWB. ICDT14: MULTE
V Mobile Multimedia End-User Quality of Experience Modeling Merging Prioritized Security Policies Performance Analysis of Weighted Fair Queues with Variable Service
Rates Distributed Connection Admission Control and Dynamic Channel Allocation
in Ad Hoc Cellular Networks ICDT15: MULTE
VI Media Privacy in SIP Conferencing Systems Triple Play Service Simulation and Packet Scheduling Performance
Evaluation Broadcast Television Services Suited for Mobile Handheld
Devices Design and Testing of two Secure Video Conferencing Applications Based
on JMF and VIC ICDT16: DATA I Providing the QoS with the Help of Transport Coding Contention MAC Protocols Efficiency Testing in a Small Wireless
Network Fair Allocation of Link Capacity through Feedback of Bottleneck
Information Latency of Energy Efficient MAC Protocols for Wireless Sensor
Networks ICDT17: DATA
II Using Voice Servers For Speech Analytics Multimedia content authentication for proxy-side
Adaptation Using of Clustering and Ant-Colony Algorithms CWSP-PAM-ANT for Network
Planning Quantum information authentication using entangled states ICDT18: VOICE
I Reliable Multi-Path Routing Schemes for Voice over Packet
Networks Clock Skew Compensation by Speech Interpolation An overview of some techniques to exploit VoIP over
WLAN ICDT19: VOICE
II SIP Spam Detection Satellite VoIP Access Gateway Aggregate Traffic Models for VoIP Applications ICDT20: MEDMAN Optical Channel Assignment for Hierarchical Cellular
Networks A Practical Multipurpose Color Image Watermarking Algorithm for
Copyright Protection and Image Authentication Development of Applications for Real-Time Video Signal
Processing Prediction Strategies for Proactive Management in Dynamic Distributed
Systems Call Admission Control for a Wireless Mobile Multimedia Network Serving
Narrowband and Wideband Customers |
![]() | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
![]() | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
![]() | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() |
![]() |
Copyright (c) 2006, IARIA