The Second International Conference on Digital Telecommunications

ICDT 2007

July 1-6, 2007 - Silicon Valley, USA


Preliminary Program

ICIMP 2007 - ICDT 2007 - ICGD&BC 2007 PROGRAM

Saturday, June 30

16:00

Registration Starts

 

18:00 - 20:00

Welcome Cocktail

Sunday, July 1

09:00 - 09:15

Opening Address

09:15 - 10:15

 Invited Speaker

IP Networking over Satellite for Business Continuity and Disaster Recovery
Dr. Klaus-Peter Doerpelkus, Cisco Systems Inc.

10:15 - 10:30

Coffee Break

10:30 - 12:15

ICDT1

 

12:15 - 13:45

Lunch on your own

13:45 - 15:30

ICDT2

ICGD-BC1

15:30 - 15:45

Coffee Break

15:45 - 17:30

ICIMP1/CYBER

 

17:30 - 18:30

IARIA Work Group Meeting: Internet Protection

Details on WG Activity

Invited Speaker

Eyal Adar - the CEO of WCK (White Cyber Knight Inc.) and the Chairman of the European Security Risk Management Initiative

topic:
The IT Risk Management Era - Research Challenges and Best Practices

Monday, July 2

08:30 - 10:15

ICIMP2

 

10:15 - 10:30

Coffee Break

10:30 - 12:15

ICIMP3

SARP1

12:15 - 13:45

Lunch on your own

13:45 - 15:30

ICIMP4

ICGD-BC3

15:30 - 15:45

Coffee Break

15:45 - 17:30

ICDT3

 

17:30 - 18:30

IARIA Work Group Meeting: Digital Telecommunications

   

19:00 - 23:00

ICIMP 2007 - ICDT 2007 - ICGD&BC 2007

GALA DINNER

Tuesday, July 3

08:30 - 10:15

ICIMP5/MONIT

STREAM1

10:15 - 10:30

Coffee Break

10:30 - 12:15

ICIMP6

ICGD-BC2/TRACK

12:15 - 13:00

Invited Speaker

Inspirations from Multiple Race Track Athletics for Multimedia Communications Traffic Engineering: Opportunities and Challenges
Dr. Sudip Misra

13:00 - 13:15

Closing Session

Wednesday, July 4

09:00 - 12:00

Tutorial:

Is the IMS Service Platform a Solution for Next Generation Network Providers to Be More Than Bit Carriers?

by
Antonio Cuevas

Note: coffee break at 10:30

Tutorial

Call-level Multi-Rate Teletraffic Loss Models

by
Michael D. Logothetis and
Ioannis D. Moscholios

Note: coffee break at 10:30

12:00 - 13:30

Lunch on your own

13:30 - 16:30

Tutorial

Assessing and Hacking Network Security

by
Radu State

 

Note: coffee break at 15:00

Tutorial

Architectures On-Demand for Any Domain Using Stable Software Patterns

by
Mohamed Fayad

 

Note: coffee break at 15:00

 

Afternoon
and
Night

Enjoy a free participation to the Independence Day Celebrations
in Silicon Valley Area including Fireworks right next to the conference hotel (Great America Park).

Thursday, July 5

8:00 - 18:00

Trip in Silicon Valley area [San Francisco and Napa Valley]

Only for those participants who registered via the registration form.
On site registration subject to availability.

One day trip including lunch.

 

DETAILED PROGRAM

 ICDT 1
Session chair: Patrick Osterberg

Multi-scale, Perceptual and Vector Quantization Based Video Codec
P. Bagheri Zadeh, T. Buggy, and A. Sheikh Akbari

Migrating SIP-Based Conversational Services to IPv6: Complications and Interworking with IPv4
Mohamed Boucadair and Yoann Noisette

Protecting Small Flows from Large Ones for Quality of Service
R. G. Addie, Oleksiy Yevdokimov, Stephen Braithwaite, and David Millsom

Performance Evaluation of DS-CDMA Based OFDM Multiuser System for Ultra Wideband (UWB) Communication
Himanshu B. Soni, U. B. Desai, and S. N. Merchant

Fair Cost Sharing among Multicast Receivers
Patrik Österberg and Tingting Zhang

Multimedia-Aware Congestion Control for Video Streaming over the Internet
Thomas K. Yan and H. Peter Dommel

Enhanced MAC Protocol for Voice Communication in IEEE 802.11 WLAN
Yang Lu, Shengqing Zhu, and Xiaokang Lin

ICDT 2
Session chair: Andres Arjona

Fast Vocabulary-Independent Audio Search Based on Syllable Confusion Network Indexing in Madarin Spontaneous Speech
Jian Shao, Pengyuan Zhang, Zhaojie Liu, Qingwei Zhao, and Yonghong Yan

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Andres Arjona and Hannu Verkasalo

High Quality Voice Conversion through Combining Modified GMM and Formant Mapping for Mandarin
Kun Liu, Jianping Zhang, and Yonghong Yan

Call Admission Control and Traffic Engineering of VoIP
James Yu and Imad Al-Ajarmeh

F0 Control Model for Mandarin Singing Voice Synthesis
Wen-Hsing Lai

Exploring Adaptive Power Saving Schemes for Mobile VoIP Devices in IEEE 802.11 Networks
Shuvo Chatterjee, Dietrich Falkenthal, and Tormod Ree

ICDT 3
Session chair: Petre Dini

Mobile Social TV: Extending DVB-H Services with P2P-Interaction
Raimund Schatz, Siegfried Wagner, and Norbert Jordan

One Improved IPSec Protocol Supporting Multicast Communication
Mei Song and Zhitang Li

Towards a Video QoE Definition in Converged Networks
Mukundan Venkataraman, Shamik Sengupta, Mainak Chatterjee,and Raja Neogi

A Correlated Kalman Filtering Model for Subband Coding over Noisy Channels
Fabrice Labeau

Exploring the Conceptual Model of Digital Ecosystem
Hai Dong, Farookh Khadeer Hussain, and Elizabeth Chang

Implementation and Performance of a M-ary PSK and QAM-OFDM System in a TMS320VC5416 Digital Signal Processor
Hen-Geul Yeh and Victor R. Ramirez

Green’s Function Estimation in Homogeneous and Scattering Medium for Time Reversal Signal Processing (TRSP) Communication
Quy Nguyen Dinh and Woon-Seng Gan

SARP 1
Session chair: Donald Craig

Pattern-Driven Architectural Partitioning: Balancing Functional and Non-functional Requirements
Neil Harrison and Paris Avgeriou

A Multi-Agent-Based Service-Oriented Architecture for Inter-Enterprise Cooperation System
Xiang Liu

Designing a Self-Healing Approach to Radio Link Failures in Mobile Handsets
Dibakar Das

Crucial Patterns in Service-Oriented Architecture
Jaroslav Král and Michal Žemlička

A Classification of Architectural Reliability Models
Roshanak Roshandel and Nenad Medvidovic

Component Compatibility and Its Verification
Donald C. Craig and Wlodek M. Zuberek

STREAM 1
Session chair: Amit Ahuja

Why Not Semijoins for Streams, When Distributed?
Tri Tran, Byung Suk Lee, and Matthew W. Bovee

Fast Archiving and Querying of Heterogeneous Sensor Data Streams
Ken Q. Pu and Ying Zhu

MavEStream: Synergistic Integration of Stream and Event Processing
Qingchun Jiang, Raman Adaikkalavan, and Sharma Chakravarthy

A Dynamic Attribute-Based Load Shedding Scheme for Data Stream Management Systems
Amit Ahuja and Yiu-Kai Ng

QDM: A Generic QoS-Aware Data Model for Real-Time Data Stream Processing
Sven Schmidt, Benjamin Schlegel, and Wolfgang Lehner

ICIMP 1
Session chair: Ka Ying Lai 

Enriched Diagnosis and Investigation Models for Security Event Correlation
Véronique Legrand and Stéphane Ubéda

BTM—An Automated Rule-Based BT Monitoring System for Piracy Detection
K. P. Chow, K. Y. Cheng, L. Y. Man, Pierre K. Y. Lai, Lucas C. K. Hui, C. F. Chong, K. H. Pun, W. W. Tsang, H. W. Chan, and S. M. Yiu

Phishing Phishers—Observing and Tracing Organized Cybercrime
Dominik Birk, Sebastian Gajek, Felix Gröbert, and Ahmad-Reza Sadeghi

An Investigation of Cybercrime-Related Online Search Behaviors vs General Search Behavior
Jingguo Wang, Nan Xiao, and H. Raghav Rao

Monitoring Architecture for Lawful Interception in VoIP Networks
Balamurugan Karpagavinayagam, Radu State, and Olivier Festor

ICIMP 2
Session chair: Matthew Beaumont-Gay

Large Scale Activity Monitoring for Distributed Honeynets
Jerome François, Radu State, and Olivier Festor

Visualisation of Network Traffic using Dynamic Co-occurrence Matrices
Thorsten Kisner, Alex Essoh, and Firoz Kaderali

Improving Routing Security Using a Decentralized Public Key Distribution Algorithm
Jeremy Goold and Mark Clement

A Comparison of SYN Flood Detection Algorithms
Matt Beaumont-Gay

IPv6 Anomaly Traffic Monitoring with IPFIX
Youngseok Lee, Seongho Shin, Soonbyoung Choi, and Hyeon-gu Son

ICIMP 3
Session chair: Remi Badonnel

A Management Platform for Tracking Cyber Predators in Peer-to-Peer Networks
Remi Badonnel, Radu State, Isabelle Chrisment, and Olivier Festor

Fraud/Privacy Protection in Anonymous Auction
Hassan Kazem, Qadeer Hasan, and Rafiqul Zaman Khan

Emergency Alerts as RSS Feeds with Interdomain Authorization
Filippo Gioachin, Ravinder Shankesi, Michael J. May, Carl A. Gunter, and Wook Shin

Inferring Available Bandwidth of Overlay Network Paths Based on Inline Network Measurement
Cao Le Thanh Man, Go Hasegawa, and Masayuki Murata

ICIMP 4
Session chair: James  Bouhana

Performance Analysis in IP over WDM Networks
Cebrail Taşkin

On the End-to-End Delay Analysis of the IEEE 802.11 Distributed
Coordination Function
J. S. Vardakas, I. Papapanagiotou, M. D. Logothetis, and S. A. Kotsopoulos

Automated Discovery of Performance Envelopes
James Bouhana and Mike Tsykin

Toward the Use of Automated Static Analysis Alerts for Early Identification of Vulnerability- and Attack-Prone Components
Michael Gegick and Laurie Williams

ICIMP 5
Session chair: Kevin Lee

Protocol to Support Multi-domain Auditing of Internet-Based Transport Services
Frank Eyermann and Burkhard Stiller

Efficient Probing Techniques for Fault Diagnosis
Maitreya Natu and Adarshpal S. Sethi

Modeling End-to-End Delay Using Pareto Distribution
Wei Zhang and Jingsha He

An Experimental Approach to Integrating NetFlow Flow-Level Records and NLANR Packet-Level Traces
Chi Zhang, Bin Liu, Xun Su, Heidi Alvarez, and Julio Ibarra

On the Penetration of Business Networks by P2P File Sharing
Kevin Lee, Danny Hughes, and James Walkerdine

ICIMP 6
Session chair: Seppo Heikkinen

Non-repudiable Service Usage with Host Identities
Seppo Heikkinen

Smurf-Based Distributed Denial of Service (DDoS) Attack Amplification in Internet
Sanjeev Kumar

State of the Art Review of the Existing Bayesian-Network Based Approaches to Trust and Reputation Computation
Farookh Khadeer Hussain, Elizabeth Chang, and Omar Khadeer Hussain

ICGD&BC  1
Session chair: Wolfgang Haidegger

Business Continuity Plan Design: 8 Steps for Getting Started Designing a Plan
Richard J. Kepenach

Active Biometric Cryptography (ABC): Key Generation Using Feature and Parametric Aggregation
Christopher R. Costanzo

X.500 Type Databases for Flexible and Highly Available Common and Logically Centralized User Data Storage in Telecommunication
W. Haidegger

Project ENSAYO: A Virtual Emergency Operations Center for Disaster Management Research, Training, and Discovery
Irma Becerra-Fernandez and Greg Madey

Fingerprint Recognition
Gualberto Aguilar, Gabriel Sánchez, Karina Toscano, Moisés Salinas,Mariko Nakano, and Hector Perez

A Model Supporting Business Continuity Auditing and Planning in Information Systems
Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, and Marco Salvato

ICGD&BC  2 / TRACK
Session chair: Raul Oscar Gonzalez Garcia

GPSDTN: Predictive Velocity-Enabled Delay-Tolerant Networks for Arctic Research and Sustainability
R. Beck, K. Hinkel, W. Eisner, L. Liu, Jacob Norda, Ngoc Hoang,Kevin Fall, Jian Li, Moses Garuba, Richard Machinda, Steve Smith,S. Burleigh, L. Torgerson, A. Hooke, Robert Bulger, Glenn Sheehan, Ben Ellis, Robert Durst, Avri Doria, Maria Uden, James Ferl,D. Pleva, W. Ivancic, P. Paulsen, Ward Bathrick, G. Parr, C. Peoples,B. Scotney, A. Moore, Charles Lambert, Steven Groves, Christopher Small,Lawrence Freudinger, Jason LeBrun, Marc Seibert, and Andrew Maffei

Service Supplier Infrastructure for Location-Based Services in M-Commerce
P. D. Mzila, M. O. Adigun, and S. S. Xulu

Ex-RBAC: An Extended Role Based Access Control Model for Location-Aware Mobile Collaboration System
Xiutao Cui, Yuliang Chen, and Junzhong Gu

Mobile Location Using Super-Resolution Algorithms
Raúl O. González-Pacheco and Felipe Cátedra

Path Planning and Following Algorithms in an Indoor Navigation Model for Visually Impaired
Hua Wu, Alan Marshall, and Wai Yu

Creating a Dynamic Picture of Network Participant Geospatial Information in Complex Terrains
Paul Labbé, Louise Lamont, Ying Ge, and Li Li

ICGD&BC 3
Session chair: Jean-Henry Morin

Quantifying the Possible Financial Consequences of Failure for Making a Risk Based Decision
Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, and Tharam S. Dillon

A Model for Credential Based Exception Management in Digital Rights Management Systems
Jean-Henry Morin and Michel Pawlak

State of the Art Review of the Existing Soft Computing Based Approaches to Trust and Reputation Computation
Farookh Khadeer Hussain, Elizabeth Chang, and Omar Khadeer Hussain

State of the Art Review of the Existing PageRank™ Based Algorithms for Trust and Reputation Computation
Farookh Khadeer Hussain,Elizabeth Chang, and Omar Khadeer Hussain

 
 

Copyright (c) 2006, IARIA