Table of Contents
|
Information and Communication Technologies Róbert Szabó, Attila Vidács (Eds.)
|
Front Matter |
Radio Communications
|
A Testbed Analysis of the Effects of IEEE 802.11s Power Save on Mesh Link Performance Marco Porsch, Thomas Bauschert |
1-11 |
Path Selection and Adaptive Selection of Smart Antenna Transmission Schemes in Multi-hop Wireless Networks Muhammad Rafique, Thomas Bauschert |
12-22 |
Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks Cristina Cano, Boris Bellalta, Miquel Oliver |
23-32 |
White Spaces in UHF Band: Catalonia Case Study and Impact of the Digital Dividend Albert Domingo, Boris Bellalta, Miquel Oliver |
33-40 |
Security
|
A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment Zahra Tavakoli, Sebastian Meier, Alexander Vensmer |
41-51 |
Enhancing Collaborative Intrusion Detection Methods Using a Kademlia Overlay Network Zoltán Czirkos, Gábor Hosszú |
52-63 |
Flow-Based Security Issue Detection in Building Automation and Control Networks Pavel Čeleda, Radek Krejčí, Vojtěch Krmíček |
64-75 |
Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems Győző Gódor, Sándor Imre |
76-87 |
The Impact of IPv6 on Penetration Testing Christiaan Ottow, Frank Vliet, Pieter-Tjerk Boer, Aiko Pras |
88-99 |
Management
|
Linking Telecom Service High-level Abstract Models to Simulators based on Model Transformations: The IMS Case Study Iyas Alloush, Vanea Chiprianov, Yvon Kermarrec, Siegfried Rouvrais |
100-111 |
Network Migration Optimization Using Genetic Algorithms Stefan Türk, Ying Liu, Rico Radeke, Ralf Lehnert |
112-123 |
OWL-Based Node Capability Parameter Configuration Patcharee Thongtra, Finn Aagesen, Kornschnok Dittawit |
124-135 |
Techno-economic comparison of next-generation access networks for the French market Konrad Walczyk, Annie Gravey |
136-147 |
The Design of a Single Funding Point Charging Architecture Christos Tsiaras, Martin Waldburger, Guilherme Machado, Andrei Vancea, Burkhard Stiller |
148-160 |
Protocols and Performance
|
A Two Layer Guaranteed and Sustained Rate Based Scheduler for IEEE 802.16-2009 Based WiMAX Networks Volker Richter, Rico Radeke, Ralf Lehnert |
161-172 |
Implementation and Evaluation of Coupled Congestion Control for Multipath TCP Régel Usach, Mirja Kühlewind |
173-182 |
Improving Fairness for Adaptive HTTP Video Streaming Bjørn Villa, Poul Heegaard, Anders Instefjord |
183-193 |
Prototype of High Performance Scalable Advertising Server with Local Memory Storage and Centralised Processing Jakub Marszałkowski |
194-203 |
Responsible Source Multicasting Mihály Orosz, Gábor Hosszú |
204-214 |
Algorithms, Models and Simulations
|
A Model for System Resources in Flexible Time-Triggered Middleware Architectures Adrian Noguero, Isidro Calvo, Luis Almeida, Unai Gangoiti |
215-226 |
Modeling and Analysis of the Survivability of an Infrastructure-Based Wireless Network Lang Xie, Poul Heegaard, Yuming Jiang |
227-238 |
Private Quantum Coding for Quantum Relay Networks Laszlo Gyongyosi, Sándor Imre |
239-250 |
Target Surrounding Solution for Swarm Robots László Blázovics, Tamás Lukovszki, Bertalan Forstner |
251-262 |
Poster Papers
|
A Split Connection TCP Proxy in LTE Networks Viktor Farkas, Balázs Héder, Szabolcs Nováczki |
263-274 |
Adaptive Routing in Wireless Sensor Networks for Fire Fighting Chunlei An, Yunqi Luo, Andreas Timm-Giel |
275-285 |
Automatic Handover Decision in Content Centric Networking Yunqi Luo, Chunlei An, Jonas Eymann, Andreas Timm-Giel |
286-297 |
Autonomous Sensor Network Architecture Model András Tóth, Ferenc Vajda |
298-308 |
Efficient Multihop Broadcast with Distributed Protocol Evolution Bernát Wiandt, Vilmos Simon, Endre Varga |
309-320 |
Finding Typical Internet User Behaviors Péter Megyesi, Sándor Molnár |
321-327 |
Interoperability Description of Web Services Based Application Servers Paweł Kaczmarek |
328-339 |
Investigation of Quality of Experience for 3D Video in Wireless Network Environment Ivett Kulik, Tuan Trinh |
340-349 |
Investigation of WLAN Access Point Placement for Indoor Positioning Árpád Huszák, Győző Gódor, Károly Farkas |
350-361 |
Improving the Efficiency of HTTP Caching by Hash Based Resource Identifiers Chris Drechsler, Thomas Bauschert |
362-371 |
Nonmonotonicity in Trust Management Wojciech Pikulski |
372-383 |
Radio Propagation Modeling on 433 MHz Ákos Milánkovich, Károly Lendvai, Sándor Imre, Sándor Szabó |
384-395 |
Semantic Intelligent Space for Ambient Assisted Living István Fülöp, Péter Galambos, Péter Baranyi |
396-407 |
Simulating Network Coding for Accelerating Tit-for-Tat in Peer-to-Peer Content Sharing Ákos Ludányi, Tamás Lukovszki, Péter Ekler |
408-411 |
The Costs of Web Advertisements While Mobile Browsing Jeffrey Brande, Aiko Pras |
412-422 |