In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
Eighth International Network Conference (INC 2010)Udo Bleimann, Paul Dowland, Steven Furnell, Oliver Schneider (Ed.) |
Network Architectures and Management
- Some Notes and Results on Bandwidth-based Routing and Implicit Load Balancing
Vic Grout, Nigel Houlden
pp19-30
- Scalable Distributed-FDPS Algorithm for QoS Provisioning
Chee Kheong Siew, Shuai Peng, Wuqiong Luo, Peng Tang, Yanting Mo
pp31-40
- Intelligent IP Traffic / Flow Classification System
Isara Anantavrasilp
pp41-50
- Improving Fairness in Ad Hoc Networks Through Collision Rate Control
Mohamed Arabi, Bogdan Ghita, Xingang Wang
pp51-59
- A Bootstrap Mechanism for NGN QoS Profiling
Frank Weber, Woldemar Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan Ghita
pp61-70
- Possible Future Revenue Creation Through IMS Service Enablers
Johannes Häußler, Anett Schülke, Marcus Q Kuhnen, Jochen Bauknecht
pp71-74
- Enhanced Concept of the TeamCom SCE for Automated Generated Services Based on JSLEE
Thomas Eichelmann, Woldemar Fuhrmann, Ulrich Trick, Bogdan Ghita
pp75-84
- Improving the Performance of IP Filtering using a Hybrid Approach to ACLs
John N Davies, Vic Grout, Rich Picking
pp85-95
Mobile and Wireless Networking
- Signalling Effort Evaluation of Mobility Protocols within Evolved Packet Core Network
Sandra Frei, Woldemar Fuhrmann, Andreas Rinkel, Bogdan Ghita
pp99-108
- Enabling Push-based Mobile Web Services for Today’s Cell Phone Provider Networks
Sascha Roth
pp109-120
- A Cross-Layer Media-Independent Handover Mechanism in Heterogeneous WiMAX/WiFi Networks
Yue-Huei Huang, Yaw-Chung Chen
pp121-130
Security and Privacy
- Fast Implementation of AES on Mobile Devices
Ashar Javed
pp133-142
- Conceptual Trusted Incident Reaction Architecture
Christophe Feltus
pp143-152
- Information Security Culture: A Survey
Oleksiy Mazhelis, Hannakaisa Isomäki
pp153-157
- Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal
Carlos Javier Hernandez-Castro, Jonathan D Stainton-Ellis, Arturo Ribagorda, Julio Cesar Hernandez-Castro
pp159-168
- The Effect of Pre-written Scripts on the Use of Simple Software Security Analysis Tools
Matti Mantere, Kaarina Karppinen, Mika Rautila
pp169-177
- Password Visualization beyond Password Masking
Nils Gruschka, Luigi Lo Iacono
pp179-188
- Survey on Legal Data Protection Norms Relevant to Automated Network Infrastructure Analysis
Ingo Ritter, Martin Kappes, Peter Wedde, Rüdiger Gad, Andreas Renner
pp189-197
- Strong Remote User Authentication Scheme using Smart Cards
Rafael Martínez-Peláez, Francisco Rico-Novella, Cristina Satizábal, Jacek Pomykala
pp199-208
- Usable Survivability
Michael Atighetchi, Andrew Gronosky, Partha Pal, Joseph Loyall
pp209-212
- Using the Generation One EPC RFID LockID Command as a Method of Directed Attack
Christopher Mark Bolan
pp213-221
- Manipulating Mobile Devices with a Private GSM Base
Station – A Case Study
Christoph Kemetmüller, Mark Seeger, Harald Baier, Christoph Busch
pp223-234
Learning Technologies
- Application and Impacts of Mobile Learning: A Case Study in Technology for Sustainable Distance Learning
Subramaniam Chandran
pp237-240
- Didactic Networks and Exemplification
Francisco Javier del Álamo, Raquel Martínez, José Alberto Jaén
pp241-252
- An Architecture of eLearning Enterprise Authoring Studio
Ivo Hristov
pp253-262
- Linking Web 2.0 and 3D Virtual Reality for Language Learning: Design and Implementation
Ya-Chun Shih, Mau-Tsuen Yang
pp263-267
- Service Quality Assessment in Distance Learning
Hanna V Shauchenka, Udo Bleimann, Matthias Knoll, Nathan L Clarke
pp269-277
- Exploration of Learner Preferences and their Impact Within a Media Module
Ingo Stengel, Oliver Schneider, Udo Bleimann
pp279-288
Applications and Impacts
- Semantic Integration in Telecommunications
Vilho Räisänen
pp291-300
- Case Study on DiaHDL: A Web-based Electronic Design Automation Tool for Education Purpose
Muhammad Shoaib Iqbal Ansari, Thomas Schumann
pp301-305
- One Way to Detecting of Link Spam
Ruslan Vladimirovich Sharapov, Ekaterina Viktorovna Sharapova
pp307-314
- Updates of Compressed Dynamic XML Documents
Tomasz Müldner, Christopher Fry, Jan Krzysztof MizioĊek, Tyler Corbin
pp315-324
- Commoditization as a Criterion for Semantic Service Provisioning
Normen Haas, Bernhard Humm, Ingo Stengel, Paul Walsh
pp325-334
- Quantitative and Qualitative Description of the Consumer to Provider Relation in the Context of Utility Computing
Benjamin Heckmann, Andy Phippen
pp335-344
- Psycho-Analytical Considerations in Internet Marketing - Focusing on Human Needs And Personal Trust
Felix Rimbach, Udo Bleimann, Steven Furnell
pp345-354
- ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) Success
Karin Kronawitter, Christoph Wentzel, Maria Papadaki
pp355-359
- High Level Semantic Networking – Using K-Infinity to Build
a Multiontological Learning Enviroment
Roland Böving, Udo Bleimann, Christoph Wentzel, Paul Walsh
pp361-370
- Towards a New Role Model in Virtual Teams: the Effects of “Elective Leadership”
Ralf Friedrich, Udo Bleimann, Ingo Stengel, Paul Walsh
pp371-374
Software Development
- Finding Reusable Units of Modelling - an Ontology Approach
Marcus Zinn, Klaus Peter Fischer-Hellmann, Andy D Phippen, Alois Schütte
pp377-386
- Towards a Complete and Minimal Basis for the Definition of Software Architecture Languages
Hüseyin Yüksel, Johannes Reichardt, Chris Johnson
pp387-397
- An Organizational Approach for Industrialized Systems Integration
Matthias Minich, Bettina Harriehausen-Mühlbauer, Christoph Wentzel
pp399-407