Hits. All Mark Individual

Size: px
Start display at page:

Download "Hits. All Mark Individual"

Transcription

1 Search in the BME Scientific Bibliography (BME PA) Browser Quit Modify search New search Help Mail (/) Title of the publication list : Sándor Imre Sándor Imre's Publications Homepage Summary of the list [Scientometric data] Data are up-to-date until 12/02/2012. Impact factor: State and identifier: URL: Type: Remark: Language: Abstract: Settings done Citations: Format with details List type: Selected records (html) Sorting (o): Independent citations only Year (grouped) Descending Hits All Mark Individual Context of citation: S Szabo, L Gyongyosi, S Imre Performance Evaluation of Anycast-based Micro-mobility Management. INTERNATIONAL JOURNAL OF MOBILE NETWORK DESIGN AND INNOVATION 4:(1) pp Paper 10. (2012) Vol. 4. No. 1. pp , Peter Andras Kara, Laszlo Bokor, Sandor Imre Distortions in QoE measurements of ubiquitous mobile video services caused by the preconceptions of test subjects. In: IEEE/IPSJ International Symposium on Applications and the Internet SAINT2012. Izmir, Turkey, 16/07/ /07/2012. pp L Hanzo, H Haas, S Imre, D O Brien, M Rupp, L Gyongyosi Wireless Myths, Realities and Futures: From 3G/4G to Optical and Quantum Wireless. PROCEEDINGS OF THE IEEE 100:(13) pp (2012) IF: 5.096**, 4. L Gyongyosi, S Imre The Pilot Quantum Error-Correction Protocol. In: Proceedings of the The 26th Quantum Information Technology Symposium (QIT26). Fukui, Japan, 21/05/ /05/2012. pp Paper 6. Kötet m egjegyzések: The 26th Quantum Inform ation Technology Sym posium (QIT26), (Quantum Inform ation Technology Com m ittee, The Institute of Electronics, Inform ation and Com m unication Engineers), May. 2012, Fukui University, Fukui, Japan., Full document The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre Superactivation of Zero-Capacity Quantum Channels is Limited by the Quantum Relative Entropy Function. In: Proceedings of the The 26th Quantum Information Technology Symposium (QIT26). Fukui, Japan, 21/05/ /05/2012. pp Paper 7. Kötet m egjegyzések: The 26th Quantum Inform ation Technology Sym posium (QIT26), (Quantum Inform ation Technology Com m ittee, The Institute of Electronics, Inform ation and Com m unication Engineers), May. 2012, Fukui University, Fukui, Japan., Full document The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre Superactivation of Quantum Channels is Limited by the Quantum Relative Entropy Function. Quantum Information Processing 10: pp (2012) IF: 2.085**,, Full document Accepted, In Press (2012) Quantum Information Processing, Springer, ISSN: (print version), ISSN: (electronic version) The results discussed above are supported by the grant TAMOP B-10/ and COST Action MP L Gyongyosi, S Imre Secure Long-Distance Quantum Communication over Noisy Optical Fiber Quantum Channels. In: Yasin Moh (ed.) Optical Fibers. Bécs: InTech Open Access Publisher, pp (ISBN: ) Kötet megjegyzések: Optical Fibers / Book 2 Accepted, In preparation, date expected: Chapter in Book/Part of Monography/Scientific 8. L Gyongyosi, S Imre Secure Communication over Zero Private-Capacity Quantum Channels. In: Proceedings of the Alan Turing Centenary Conference (Turing-100). Manchester, England, 22/06/ /06/2012. pp Paper 11. The Alan Turing Centenary Conference (Turing-100), June 22-25, 2012, University of Manchester, Manchester, United Kingdom. The results discussed above are supported by the grant TAMOP B-10/ and COST Action MP L Gyongyosi, S Imre Quasi-Superactivation of Classical Capacity of Zero-Capacity Quantum Channels. JOURNAL OF MODERN OPTICS 10: pp Paper 10. (2012) IF: 0.988**,, Full document Accepted, In Press (2012)

2 The results discussed above are supported by the grant TAMOP B-10/ and COST Action MP L Gyongyosi, S Imre Quantum Polar Coding for Noisy Optical Quantum Channels, APS DAMOP 2012 Meeting. In: Proceedings of the The 43rd Annual Meeting of the APS Division of Atomic, Molecular, and Optical Physics (DAMOP12). Anaheim, United States of America, 04/06/ /06/2012. pp Paper 8., Full document PHD GRANT AWARD OF APS DAMOP12, AMERICAN PHYSICAL SOCIETY, CALIFORNIA, USA. The 43rd Annual Meeting of the APS Division of Atomic, Molecular, and Optical Physics, (American Physical Society), Jun. 2012, Anaheim, California, USA. The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre Quantum Mechanics based Communications. Budapest: Terc Kiadó, p. (Budapest University of Technology and Economics, Faculty of Electrical Engineering and Informatics) (ISBN: ) Book/Monography/Scientific The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre Quantum Cryptographic Protocols and Quantum Security. In: Kamol Lek, Naruemol Rajapakse (ed.) Cryptography: Protocols, Design and Applications. New York: Nova Science Publishers Inc., pp Cryptography, Steganography and Data Security, Privacy and Identity Protection (ISBN: ), Full document Chapter in Book/Part of Monography/Scientific st quarter 13. L Gyongyosi, S Imre Private Classical Communication over Zero-Capacity Quantum Channels Using Quantum Polar Codes. In: Proceedings of the The 7th Conference on Theory of Quantum Computation, Communication, and Cryptography (TQC 2012). Tokyo, Japan, 17/05/ /05/2012. pp Paper 2. Kötet m egjegyzések: The 7th Conference on Theory of Quantum Com putation, Com m unication, and Cryptography (TQC 2012), May. 2012, The University of Tokyo, Tokyo, Japan., Full document The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre Polaractivation of Zero-Capacity Quantum Channels. In: Proceedings of the Quantum Theory: Reconsideration of Foundations - 6 (QTRF6) Conference. Vaxjö, Sweden, 11/06/ /06/2012. pp Paper 33., Full document Quantum Theory: Reconsideration of Foundations - 6 (QTRF6) Conference, International Centre for Mathematical Modelling in physics, engineering and cognitive sciences (ICMM), Linnaeus University, Växjö, Sweden. The results discussed above are supported by the grant TAMOP B-10/ and COST Action MP L Gyongyosi, S Imre On-the-Fly Quantum Error-Correction for Space-Earth Quantum Communication Channels. In: Proceedings of the First NASA Quantum Future Technologies Conference (QFT 2012). Ames, United States of America, 17/01/ /01/2012. pp Paper 5. Kötet m egjegyzések: Quantum Laboratory, Center for Applied Physics, NASA Am es Research Center, Moffett Field, California, USA., Full document The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre On the Mathematical Boundaries of Communication with Zero-Capacity Quantum Channels. In: Proceedings of the Alan Turing Centenary Conference (Turing-100). Manchester, England, 22/06/ /06/2012. pp Paper 10. The Alan Turing Centenary Conference (Turing-100), June 22-25, 2012, University of Manchester, Manchester, United Kingdom. The results discussed above are supported by the grant TAMOP B-10/ and COST Action MP L Gyongyosi, S Imre Mathematical Limit in the Superactivation of Zero-Capacity Quantum Channels. In: Proceedings of the Quantum Theory: Reconsideration of Foundations - 6 (QTRF6) Conference. Vaxjö, Sweden, 11/06/ /06/2012. pp Paper 34., Full document Quantum Theory: Reconsideration of Foundations - 6 (QTRF6) Conference, International Centre for Mathematical Modelling in physics, engineering and cognitive sciences (ICMM), Linnaeus University, Växjö, Sweden. The results discussed above are supported by the grant TAMOP B-10/ and COST Action MP L Gyongyosi, S Imre Long-Distance Quantum Communications with Superactivated Gaussian Optical Quantum Channels. OPTICAL ENGINEERING 51:(1) pp Paper 10. (2012) IF: 0.815**,, Full document

3 TAMOP B-10/ L Gyongyosi, S Imre Information Geometric Security Analysis of Differential Phase Shift Quantum Key Distribution Protocol. SECURITY AND COMMUNICATION NETWORKS 10: pp Paper 10. (2012) IF: 0.356**,, Full document Accepted, In Press. The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre Classical Communication with Zero-Capacity Quantum Channels. In: Proceedings of the The 7th Conference on Theory of Quantum Computation, Communication, and Cryptography (TQC 2012). Tokyo, Japan, 17/05/ /05/2012. pp Paper 3. Kötet m egjegyzések: The 7th Conference on Theory of Quantum Com putation, Com m unication, and Cryptography (TQC 2012), May. 2012, The University of Tokyo, Tokyo, Japan., Full document The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre Classical Communication with Stimulated Emission over Zero-Capacity Optical Quantum Channels. In: Proceedings of the The 43rd Annual Meeting of the APS Division of Atomic, Molecular, and Optical Physics (DAMOP12). Anaheim, United States of America, 04/06/ /06/2012. pp Paper 83., Full document PHD GRANT AWARD OF APS DAMOP12, AMERICAN PHYSICAL SOCIETY, CALIFORNIA, USA. APS DAMOP 2012 Meeting, The 43rd Annual Meeting of the APS Division of Atomic, Molecular, and Optical Physics, (American Physical Society), Jun. 2012, Anaheim, California, USA. The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre Classical and Quantum Communication with Superactivated Quantum Channels. In: Proceedings of the TAMOP PhD Workshop: TAMOP-4.2.2/B-10/ Budapest, Hungary, 09/03/2012. pp Paper 3. Kötet megjegyzések: TAMOP-4.2.2/B-10/ , Full document TAMOP-4.2.2/B-10/ L Gyongyosi, S Imre Achieving Classical Communication with Quantum Entanglement and Stimulated Emission over Zero-Capacity Quantum Channels. In: Proceedings of the Quantum Theory: Reconsideration of Foundations - 6 (QTRF6) Conference. Vaxjö, Sweden, 11/06/ /06/2012. pp Paper 35., Full document Quantum Theory: Reconsideration of Foundations - 6 (QTRF6) Conference, International Centre for Mathematical Modelling in physics, engineering and cognitive sciences (ICMM), Linnaeus University, Växjö, Sweden. The results discussed above are supported by the grant TAMOP B-10/ and COST Action MP L Bacsardi, S Imre Supporting Space Communications with Quantum Communications Links. In: Global Space Exploration Conference. Washington, United States of America, 22/05/ /05/2012. pp Paper L Bacsardi, S Imre Pilot Qubit Based Quantum Satellite Communications. In: Proc. QuantumMalta Valletta, Málta, 24/04/ /04/2012. p. 1. Paper &. 26. Hanzo L, Haas H, Imre S, O'Brien D, Rupp M, Gyongyosi L Prolog to the Section on Wireless Communications Technology. PROCEEDINGS OF THE IEEE 100: pp (2012) IF: 5.096**, Journal Paper/Survey paper/scientific 27. Győző Gódor, Sándor Imre Security Aspects in Radio Frequency Identification Systems. In: Debashis Saha, Varadharajan Sridhar Hannah Abelbeck (ed.) Next Generation Data Communication Technologies: Emerging Trends. Hershey: IGI Global, Information Science Reference, pp (ISBN: ), Full document at the publisher, DOI: / ch009 Chapter in Book/Part of Monography/Scientific 28. Boda Károly, Földes Ádám Máté, Gulyás Gábor György, Imre Sándor User Tracking on the Web via Cross-Browser Fingerprinting. LECTURE NOTES IN COMPUTER SCIENCE Vol. 7161: pp Paper 4. (2012) Journal Paper/Proceedings paper/scientific Independent citations: 2 All citations: 2 1. & Coping Mechanisms: Fingerprinting, CDI and How to Deal with it Full document 2. Keaton Mowery, Hovav Shacham Pixel Perfect: Fingerprinting Canvas in HTML5 In: Web 2.0 Security and Privacy, IEEE Symposium on Security and Privacy. San Francisco, Amerikai Egyesült Államok: 24/05/ /05/2012. (2012), pp. &-&.

4 29. B Ary, S Imre Partial CDR database dimensioning. TELECOMMUNICATION SYSTEMS 50:(&) pp (2012) IF: 0.670**, Springer online first T Jursonovics, S Imre Analysis of a New Markov-model for Packet Loss Characterization in IPTV Solutions. INFOCOMMUNICATIONS JOURNAL 3:(2) pp (2011), Full document at the publisher Links to data bases: Matarka link, Scopus link, Google scholar link 31. Sandor Imre Quantum and Classical Methods to Improve Infocom Systems. Berlin: LAP Lambert Academic Publishing Gmbh & Co. KG, p. (ISBN: ) Book/Monography/Scientific 32. S Szabo, L Gyongyosi, K Lendvai, S Imre Overview of IP Multimedia Subsystem Protocols and Communication Services. In: Katalin Tarnay, Gusztáv Adamis, Tibor Dulai (ed.) Advanced Communication Protocol Technologies: Solutions, Methods, and Applications. Hershey ; New York: IGI Global, Information Science Reference, pp (ISBN: ISBN ) Chapter in Book/Part of Monography/Scientific 33. R Szabó, Hua Zhu, S Imre, R Chaparadza (ed.) Access Networks: 5th International ICST Conference on Access Networks. Budapest, Magyarország, 03/10/ /11/2010. Springer, p. (LNICST; 63.) Proceedings/no subtype/scientific 34. Mate Galambos, Sandor Imre New Method for Representation of Multi-qbit Systems Using Fractals. In: ICQNM2011 The Fifth International Conference on Quantum, Nano and Micro Technologies. Nice, France, 21/08/ /08/2011. pp Paper (ISBN: ) 35. M Galambos, L Bacsardi, A Kiss, S Imre Analyzing Quantum Based Protocols in LEO and GEO Satellite Communication. In: Sias Mostert, Antonio Moccia (ed.) 62th Intl. Astronautical Congress (IAC). Cape Town, South Africa, 03/10/ /10/2011. Cape Town: International Astronautical Federation, pp Paper B Kötet megjegyzések: 36. László Bokor, Szabolcs Nováczki, Sándor Imre Host Identity Protocol: The Enabler of Advanced Mobility Management Schemes. In: Katalin Tarnay, Gusztáv Adamis, Tibor Dulai (ed.) Advanced Communication Protocol Technologies: Solutions, Methods, and Applications. Hershey ; New York: IGI Global, Information Science Reference, pp (ISBN: ISBN ), Full document at the publisher, DOI: / ch012 Chapter in Book/Part of Monography/Scientific This chapter is committed to give a comprehensive overview of the Host Identity Protocol (HIP), to introduce the basic ideas and the main paradigms behind it, and to show how HIP emerges from the list of potential alternatives with its wild range of possible usability in next generation mobile architectures. The broad scale of feasible advanced mobility management proposals and scenarios, together with the promising mobility management capabilities of HIP and its cryptographic identifier/locator separation technique, will be introduced based on an exhaustive survey of existing mobility solutions designed for the Host Identity Protocol. This broad and up-to-date outline of advanced HIP-based mobility supporting schemes will guide the readers from the basics of HIP through the protocol s main functions to its complex feature set and power to create a novel Internet architecture for future mobility-centric communications. 37. László Bokor, Zoltán Faigl, Sándor Imre Flat Architectures: Towards Scalable Future Internet Mobility. LECTURE NOTES IN COMPUTER SCIENCE 6656: pp (2011), WoS link, Scopus link, Full document at the publisher, DOI: / _3 Links to data bases: Scopus link, WoS link This chapter is committed to give a comprehensive overview of the scalability problems of mobile Internet nowadays and to show how the concept of flat and ultra flat architectures emerges due to its suitability and applicability for the future Internet. It also aims to introduce the basic ideas and the main paradigms behind the different flat networking approaches trying to cope with the continuously growing traffic demands. The discussion of the above areas will guide the readers from the basics of flat mobile Internet architectures to the paradigm s complex feature set and power creating a novel Internet architecture for future mobile communications. Independent citations: 4 All citations: 4 1. R Franklin, et all Cloud Based Collaboration Platform for Transport. & Logistics Business Networks In: 6th International Scientific Symposium on Logistics. Bécs, Ausztria: 13/06/ /06/2012. (2012), pp Najah Abu Ali, Abd-Elhamid M Taha, Hossam S Hassanein LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks John Wiley & Sons, p. ISBN Könyv 3. Pentikousis K, Qing Zhou, Wang H Design considerations for mobility management in future infrastructure networks In: Telecom World (ITU WT 2011). Geneva, Olaszország: 24/10/ /10/2011. (2011), pp Scopus link

5 4 Samdanis K, Taleb T, Schmid S Traffic Offload Enhancements for eutran IEEE COMMUN SURV TUTOR PP: (99) (2011) 38. László Bokor, Vilmos Simon, Sándor Imre Evaluation of the Location Privacy Aware Micromobility Domain Planning Scheme. INFOCOMMUNICATIONS JOURNAL III:(3) pp (2011), Scopus link, Full document Links to data bases: Scopus link Next generation telecommunication systems are converging into a synergistic union of wired and wireless technologies, where integrated services are provided on a universal IP-based infrastructure. The concept of global reachability fuelled with the advanced mobility schemes and the anytime, anywhere paradigm caused that the requirements for security and privacy in the global Internet era differs a lot from the ones of a decade ago. We focus on a subset of this complex problem space and consider location privacy issues defined by the information leakage of IP addresses during the movement of users. In our previous work we proposed a special domain planning algorithm to optimize location privacy supporting potential of certain mobility management mechanisms by increasing the level of concealment of address changes in the network. In this paper we extensively evaluate the scheme by applying well-known location privacy metrics from the literature and using them as objective measures for our original algorithm and its variants first introduced here. The conducted series of simulations verified the efficiency of the scheme and also confirmed the performance enhancements commenced by our improvements and modifications to the original algorithm. 39. Laszlo Bacsardi, Sandor Imre Analyzing the Quantum Based Satellite Communications. In: Proceedings of the 2nd European Future Technologies Conference and Exhibition 2011 (FET 11). Budapest, Hungary, 04/05/ /05/2011. Elsevier, pp Paper /j.procs (Procedia Computer Science; 7.), WoS link, Scopus link, Full document at the publisher, DOI: /j.procs E!Teljes kötet a kiadónál 40. L. Gyongyosi, S. Imre Perfect Quantum Communication with Very Noisy Gaussian Optical Fiber Channels. In: Proceedings of the OSA's 95th Annual Meeting, Frontiers in Optics (FiO) 2011 Conference. San Jose, United States of America, 16/10/ /10/2011. San Jose: Optical Society of America (OSA), pp Paper FWY4. (ISBN: ) Kötet m egjegyzések: Frontiers in Optics (FiO) 2011, OSA's 95th Annual Meeting, Section on Quantum Computation and Communication 41. L Gyongyosi, S Imre Zero-Error Transmission of Classical Information over Superactivated Optical Quantum Channels. In: Proceedings of International Conference on Quantum, Atomic, Molecular and Plasma Physics, Section on Quantum Information and Computing (QuAMP 2011). Oxford, United Kingdom, 18/09/ /09/2011. Oxford: pp Paper 15. Kötet megjegyzések: Clarendon Laboratory, University of Oxford, Oxford, United Kingdom Conference Paper/Abstract/Scientific International Conference on Quantum, Atomic, Molecular and Plasma Physics, Section on Quantum Information and Computing, Sept , Clarendon Laboratory, University of Oxford, Oxford, United Kingdom 42. L Gyongyosi, S Imre Superactivated Quantum Repeaters. In: Proceedings of Quantum Information Processing 2012 (QIP2012). Montreal, Canada, 12/12/ /12/2011. pp Paper 71. Kötet m egjegyzések: PhD Student Grant Award of Quantum Inform ation Processing 2012 (QIP2012), University of Montreal, Canada. Quantum Inform ation Processing 2012 (QIP2012), Dec. 2011, University of Montreal, Quebec, Canada., Full document PhD Student Grant Award of Quantum Information Processing 2012 (QIP2012), University of Montreal, Canada. Quantum Information Processing 2012 (QIP2012), Dec. 2011, University of Montreal, Quebec, Canada. The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Gyongyosi, S Imre Quantum Informational Divergence in Quantum Channel Security Analysis. INTERNATIONAL JOURNAL OF NETWORK SECURITY 3: pp Paper 12. (2011), Scopus link Paper accepted. International Journal of Network Security Vol.12, No.3, PP , May ISSN X, ISSN ; 44. L Gyongyosi, S Imre Quantum Cellular Automata Controlled Self-Organizing Networks. In: Alejandro Salcido (ed.) Cellular Automata - Innovative Modelling for Science and Engineering. Bécs: InTech Open Access Publisher, pp (ISBN: X-X) Kötet megjegyzések: ISBN Publisher: InTech, Publishing date: April 2011, Full document at the publisher Chapter in Book/Part of Monography/Scientific Cellular Automata - Innovative Modelling for Science and Engineering, ISBN Szilárd Jaskó Analysis of formal model-based design processes for distributed systems 135 p University of Pannonia, Veszprém, Hungary 45. L Gyongyosi, S Imre Pilot Quantum Error-Correction for Noisy Quantum Channels. In: Proceedings of the Second International Conference on Quantum Error Correction (QEC11). Los Angeles, United States of America, 05/12/ /12/2011. pp Paper 22.

6 Kötet m egjegyzések: PhD Student Grant Award of The Second International Conference on Quantum Error Correction (QEC2011), University of Southern California (USC), 2011, USA. University of Southern California, Los Angeles, USA., Full document PhD Student Grant Award of The Second International Conference on Quantum Error Correction (QEC2011), University of Southern California (USC), 2011, USA. TAMOP B-10/ Second International Conference on Quantum Error Correction (QEC11), University of Southern California, Los Angeles, USA. 46. L Gyongyosi, S Imre Novel Quantum Information Solution to Copy-Protection and Secured Authentication. INTERNATIONAL JOURNAL OF INTERNET TECHNOLOGY AND SECURED TRANSACTIONS 3:(11) pp Paper 04. (2011) accepted 47. L Gyongyosi, S Imre Noisy Gaussian Quantum Channels with Superactivated Zero-Error Lloyd-Shor-Devetak Capacity. In: Proceedings of Frontiers in Quantum Information, Computing & Communication (QICC)-2011 Meeting. Cambridge, MA, USA, United States of America, 27/09/ /09/2011. Cambridge, MA, USA: pp Paper 1. Kötet m egjegyzések: Massachusetts Institute of Technology (MIT), Cam bridge, Massachusetts, USA., Full document Frontiers in Quantum Information, Computing & Communication (QICC)-2011 Meeting, Quantum Systems to Qubits, Optics & Semiconductors, Sept. 2011, Massachusetts Institute of Technology (MIT), Cambridge, Massachusetts, USA. TAMOP B-10/ L Gyongyosi, S Imre Informational geometric analysis of superactivation of zero-capacity optical quantum channels. In: UlHasan Z, Hemmer PR, Lee H, Santori CM (ed.) Advances in Photonics of Quantum Computing, Memory, and Communication IV. San Francisco, United States of America, 25/01/ /01/2011. SPIE, 10 p. Paper 79480Q. (Proceedings of SPIE; 7948.)(ISBN: ), WoS link, Scopus link, DOI: / L Gyongyosi, S Imre Information Geometrical Analysis of Additivity of Optical Quantum Channels. JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING 3:(1) pp Paper (2011) IF: 1.128*,, WoS link, Scopus link, DOI: /JOCN Indexed in IEEE Xplore 50. L Gyongyosi, S Imre Information Geometric Superactivation of Classical Zero-Error Capacity of Quantum Channels. PROGRESS IN INFORMATICS 8: pp Paper 9. (2011), Scopus link, DOI: DOI: /NiiPi Progress in Informatics No.8, Quantum Information Technology, National Institute of Informatics (NII), Tokyo, Japan, Print ISSN : , Online ISSN : ; accepted. (2011.) 51. L Gyongyosi, S Imre Information Geometric Solution to Additivity of Amplitude-Damping Quantum Channel. In: American Institute of Physics Conference Proceedings of QCMC Brisbane, Australia, 19/07/ /07/2010. pp Paper 34. Kötet m egjegyzések: AIP Conference Proceedings of QCMC 2010, Am erican Institute of Physics, AIP Conference Proceedings Series (Library of Congress), (Conference Proceedings Appeared in 2011.), Scopus link Conference Proceedings Appeared in L Gyongyosi, S Imre High Performance Quantum Repeaters with Superactivated Gaussian Quantum Channels. In: Proceedings of the IONS-NA-3 Conference (Stanford Optical Society, Stanford Photonics Research Center). Stanford, United States of America, 13/10/ /10/2011. Stanford: Stanford University, pp Paper 9. Kötet m egjegyzések: PhD Student Grant Award of Stanford University, Stanford Optical Society, 2011, USA. IONS North Am erica, IONS-NA-3, (Stanford Optical Society, Stanford Photonics Research Center), Oct. 2011, Stanford University, Stanford, California, USA., Full document PhD Student Grant Award of Stanford University, Stanford Optical Society, 2011, USA. IONS North America, IONS-NA-3, (Stanford Optical Society, Stanford Photonics Research Center), Oct. 2011, Stanford University, Stanford, California, USA. TAMOP B-10/ L Gyongyosi, S Imre Efficient Quantum Repeaters without Entanglement Purification. In: Proceedings of International Conference on Quantum Information (Optical Society of America, Washington, DC, 2011). Ottawa, Canada, 06/06/ /06/2011. pp Paper 14. Kötet m egjegyzések: International Conference on Quantum Inform ation (Optical Society of Am erica, Washington, DC, 2011), 14, ISBN: Indexed in Optics InfoBase International Conference on Quantum Information (ICQI) 2011 ISBN: Indexed in Optics InfoBase (The Optical Society of America (OSA)) 54. L Gyongyosi, S Imre Channel Capacity Restoration of Noisy Optical Quantum Channels. In: Recent Researches in Communications, Automation, Signal Processing, Nanotechnology, Astronomy and Nuclear Physics. Cambridge, United Kingdom, 20/02/ /02/2011. pp Paper 6. (ISBN: ) Kötet m egjegyzések: ICOAA '11 Conference, Section on Optical Quantum Com m unications, University of Cambridge, Cambridge, United Kingdom.

7 , Scopus link ICOAA '11 Conference, Section on Optical Quantum Communications, University of Cambridge, Cambridge, United Kingdom. 55. L Gyongyosi, S Imre Capacity Recovery of Very Noisy Optical Quantum Channels. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND INFORMATICS 3:(5) pp Paper (2011) Issue 3, Volume 5, L Gyongyosi, S Imre Algorithmic Superactivation of Quantum Capacity of Zero-Capacity Quantum Channels. INFORMATION SCIENCES 10: pp Paper 10. (2011) IF: 2.833*,, Full document Accepted, In Press Information Sciences, Informatics and Computer Science Intelligent Systems Applications, ELSEVIER, ISSN: The results discussed above are supported by the grant TAMOP /B-09/1/KMR , B-10/ and COST Action MP L Bacsardi, L Gyongyosi, S Imre Redundancy-free Quantum Coding Methods in Space Communications. In: Sias Mostert, Antonio Moccia (ed.) 62th Intl. Astronautical Congress (IAC). Cape Town, South Africa, 03/10/ /10/2011. Cape Town: International Astronautical Federation, pp Paper IACB Kötet megjegyzések: 58. Kara Péter András, Bokor László, Imre Sándor A mérőalanyok prekoncepciói által okozott torzítások hatása 3G videotelefonálás QoE kiértékelési eredményeire. HÍRADÁSTECHNIKA LXVI.:(2011/4) pp (2011) Napjainkban a telekommunikációs szolgáltatások terén az objektív szolgáltatásparaméterek (Quality of Service) mellett egyre nagyobb szerepet tölt be a szubjektív minősítés (Quality of Experience). Ebből kifolyólag elengedhetetlen követelmény, hogy a szolgáltatás minősítésére használt mérés eredménye minél inkább tükrözze a valóságot. Ennek elérése koránt sem tekinthető egyszerű feladatnak, hisz a tényleges minőségérzethez képest a minősítés torzításokat szenved. Cikkünk a szakmai előismeretekből (Level of Comprehension) adódó prekoncepciók okozta torzításokkal foglalkozik. A mérőalanyok a mérés idején ismerték a mérési esetekre jellemző szolgáltatásparamétereket, melyek szakmai ismereteiktől függően olykor jelentős kihatással voltak véleményezésükre. Az így kialakult mérési eredményeket a mérőalanyok LoC szintjének függvényében vizsgáltuk. 59. Imre Sándor, Lendvai Károly, Szabó Sándor Ring Based Call Admission Control Scheme For Future Mobile Networks. In: IEEE 73rd Vehicular Technology Conference: VTC2011-Spring. Budapest, Hungary, 15/05/ /05/2011. (IEEE, IEEE VTS)pp Paper Ill Gergely, Milánkovich Ákos, Lendvai Károly, Imre Sándor, Szabó Sándor DASH7 alapú smart metering. HÍRADÁSTECHNIKA LXVI.:(2011/4.) pp (2011) 61. Győző Gódor, Sándor Imre Elliptic Curve Cryptography Based Authentication Protocol for Low-Cost RFID Tags. In: 2011 IEEE International Conference on RFID-Technologies and Applications. Sitges, Spain, 14/09/ /09/2011. IEEE, pp (ISBN: /11), Scopus link, DOI: /RFID-TA Gulyás Gábor György, Schulcz Róbert, Imre Sándor Separating Private and Business Identities. In: Dr Raj Sharman, Dr. Sanjukta Das Smith, Manish Gupta (ed.) Digital Identity and Access Management: Technologies and Frameworks. Hershey: IGI Global, Information Science Reference, pp (ISBN: ) Chapter in Book/Part of Monography/Scientific 63. Gulyás Gábor György, Imre Sándor Analysis of Identity Separation Against a Passive Clique-Based De-anonymization Attack. INFOCOMMUNICATIONS JOURNAL 3:(4) pp Paper IJ (2011), Scopus link 64. Gergely Ill, Károly Lendvai, Ákos Milánkovich, Sándor Imre, Sándor Szabó Analysis of Wireless Smart Metering Solutions. In: Proceedings of the IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom). Split-Dubrovnik, Croatia, 15/09/2011. pp Paper G. Ill, K. Lendvai, Á. Milánkovich, S. Imre, S. Szabó Energy and Frequency Analysis of Wireless Smart Metering Solutions. INFOCOMMUNICATIONS JOURNAL III:(3) pp (2011), Scopus link 66. Besenyei Tamás, Földes Ádám Máté, Gulyás Gábor György, Imre Sándor StegoWeb: Towards the Ideal Private Web Content Publishing Tool. In: Proceedings of The Fifth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2011). Nice, France, 21/08/ /08/2011. pp (ISBN: ) 67. Bálint Ary, Sándor Imre Sizing of xdr Processing Systems. In: 5th International ICST Conference on Access Networks Budapest, Hungary, 03/11/ /11/2010. Springer, pp (ISBN: ) Kötet megjegyzések: Revised, selected papers 68. Árpád Huszák, Sándor Imre

8 SCTP: Solution for Transport Layer Mobility and Multihoming: Chapter XVIII. In: Katalin Tarnay, Gusztáv Adamis, Tibor Dulai (ed.) Advanced Communication Protocol Technologies: Solutions, Methods, and Applications. Hershey ; New York: IGI Global, Information Science Reference, pp (ISBN: ISBN ), Full document, DOI: / Chapter in Book/Part of Monography/Scientific Sz Novaczki, L Bokor, G Jeney, S Imre Emerging Mobility Applications of Host Identity Protocol. In: Samuel Pierre (ed.) Next Generation Mobile Networks and Ubiquitous Computing. Hershey: IGI Global, Information Science Reference, pp (ISBN: ), Full document at the publisher, DOI: / ch019 E!Teljes kötet Chapter in Book/Part of Monography/Scientific This chapter is devoted to give an overview of the Host Identity Protocol (HIP) and to discuss two different mobility management extensions built on it. We introduce the basic ideas and the main paradigms behind the HIP-scheme, and show its wild range usability in next generation mobile and ubiquitous networks. The broad scale of possible advanced mobility applications of HIP will be introduced based on two extensions of the protocol, both developed by the authors. The first one is a micromobility solution based on HIP (µhip), while the second one provides a scalable and secure network mobility solution (HIP-NEMO). 70. Mate Galambos, Laszlo Bacsardi, Sandor Imre Modeling the superdense coding in satellite-satellite and ground-satellite communications. In: 10th Asian Conference on Quantum Information Science. Tokyo, Japan, 27/08/ /08/2010. pp Paper Mate Galambos, Laszlo Bacsardi, Sandor Imre Modeling and Analyzing the Quantum Based Earth-Satellite and Satellite-Satellite Communications. In: International Astronautical Congress Prague, Czech Republic, 27/09/ /10/2010. pp Paper 10.B Since the current implementation of quantum cryptography protocols is based on photons, we have to know the exact description of the atmosphere s optical properties. In this paper we examined the models based on classical beam weakening. We created a model which describes the behaviour of weak laser pulses to simulate the communication process over a satellite quantum channel. In the model we examined the properties and performance of recently-used single-photon sources and the loss caused by the gases of the atmosphere. We studied the effects of aerosols and the optical turbulence of the atmosphere on quantum communication. We dealt with the finite size of the detectors and the beam spreading induced by diffraction. 72. László Bokor, Vilmos Simon, Sándor Imre A Location Privacy Aware Network Planning Algorithm for Micromobility Protocols. In: Rui Chibante Rui Chibante (ed.) Simulated Annealing, Theory with Applications. Rijeka: Sciyo, pp (ISBN: ), Full document Chapter in Book/Part of Monography/Scientific 73. László Bokor, Zoltán Faigl, Sándor Imre A Delegation-based HIP Signaling Scheme for the Ultra Flat Architecture. In: Proceedings of the 2nd International Workshop on Security and Communication Networks. Karlstad, Sweden, 26/05/ /05/2010. pp Paper , Scopus link, Full document at the publisher, DOI: /IWSCN Links to data bases: Scopus link, IEEE Xplore link The Ultra Flat Architecture is a new concept of fixed-mobile convergent networks that aims to scale well with the mobile Internet traffic explosion prognosticated for the next 5 10 years. This paper presents a new delegation-based UFA signaling framework using HIP, IEEE and the context transfer protocol. The main procedures contributed by this signaling framework are terminal attachment, session establishment, proactive handover preparation and handover execution services. The paper introduces several novel Host Identity Protocol extensions, i.e., two different HIP delegation service types for optimized message exchange in HIP-based UFA mobility and multihoming operations, a context transfer scheme for HIP and IPsec associations supporting and extending the mechanisms of the delegation-based UFA functions, and a fast operator-centric method for HIP-level access authorization. The proposed UFA signaling framework is compared with the existing SIP-based UFA signaling solution. The comparison shows that our scheme is able to support legacy Internet applications in an operator based environment, it is stronger in security, but its deployment requires more additional modules in the architecture. For IMS applications, the SIP-based alternative is a better choice. 74. Laszlo Bacsardi, Laszlo Gyongyosi, Sandor Imre Using Redundancy-Free Quantum Channels for Improving the Satellite Communication. LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES SOCIAL-INFORMATICS AND TELECOMMUNICATIONS ENGINEERING 43: pp Paper 24. (2010), DOI: / _24 Journal Paper/Proceedings paper/scientific 75. Laszlo Bacsardi, Laszlo Gyongyosi, Sandor Imre Solutions for Redundancy-Free Error Correction in Quantum Channel. LECTURE NOTES OF THE INSTITUTE FOR COMPUTER SCIENCES SOCIAL-INFORMATICS AND TELECOMMUNICATIONS ENGINEERING 36: pp (2010), DOI: / _15 Journal Paper/Proceedings paper/scientific 76. Laszlo Bacsardi, Laszlo Gyongyosi, Marton Berces, Sandor Imre Quantum Solutions for Future Space Communication. In: Jaclyn E Morris (ed.) Computer Science Research and the Internet. New York: Nova Science Publishers Inc., pp (ISBN: ) Chapter in Book/Part of Monography/Scientific

9 77. Laszlo Bacsardi, Sandor Imre Quantum Based Information Transfer in Satellite Communication. In: Nazzareno Diodato (ed.) Satellite Communications. Rijeka: Sciyo, pp (ISBN: ), Full document at the publisher Chapter in Book/Part of Monography/Scientific 1. T Haidegger Theory and Method to Enhance Computer-Integrated Surgical Systems 148 p L. Bacsardi, L. Gyongyosi, S. Imre Using Redundancy-free Quantum Channels for Improving the Satellite Communication. In: Proceedings CD of 2nd International ICST Conference on Personal Satellite Services. Rome, Italy, 04/02/ /02/2010. pp Paper Kötet megjegyzések: ISBN: , Full document 79. L. Gyöngyösi, S. Imre Quantum information theoretical based geometrical representation of eaves dropping activity on the quantum channel. INFOCOMMUNICATIONS JOURNAL 65:(1) pp (2010) 80. L Gyongyosi, S Imre Quantum Singular Value Decomposition Based Approximation Algorithm. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 19:(6) pp (2010) IF: 0.215,, WoS link, Scopus link, DOI: / /S L Gyongyosi, S Imre Novel Geometrical Solution to Additivity Problem of Classical Quantum Channel Capacity. In: Conference Proceedings of 2010 IEEE Sarnoff Symposium. Princeton, United States of America, 12/04/ /04/2010. pp Paper 51. Kötet megjegyzések: 2010 IEEE Sarnoff Symposium April , Princeton, NJ, USA IEEE Catalog Number: CFP10PSS-CDR ISBN: Library of Congress: Indexed in IEEE Xplore 82. L Gyongyosi, S Imre Method for Discovering of Superactive Zero-Capacity Optical Quantum Channels. In: IONS-NA Conference Proceedings. Tucson, United States of America, 01/10/ /10/2010. pp Paper 10. Kötet m egjegyzések: PhD Student Grant Award of University of Arizona, Optical Society of America (OSA), 2010, USA. PhD Student Grant Award of University of Arizona, Optical Society of America (OSA), 2010, USA. IONS-NA Conference, (Optical Society of America (OSA), American Physical Society (APS), SPIE The International Society for Optical Engineering, Rochester Institute of Optics, University of Maryland), 2010, University of Arizona, Tucson (Arizona), USA 83. L Gyongyosi, S Imre Information Geometrical Solution to Additivity of Non-Unital Quantum Channels. In: Proceedings of the 10th Quantum Communication, Measurement & Computing Conference (QCMC), Brisbane, Australia, 19/07/ /07/2010. p Paper P-36. Kötet megjegyzések: QCMC 2010, 10th Quantum Communication, Measurement & Computing Conference, Section on Quantum Computing and Quantum Information Theory (Centre for Quantum Computer Technology) July 2010, University of Queensland, Brisbane, Queensland, Australia 84. L Gyongyosi, S Imre Information Geometrical Approximation of Quantum Channel Security. INTERNATIONAL JOURNAL ON ADVANCES IN SECURITY 3:(1&2) pp Paper 5. (2010) 85. L Gyongyosi, S Imre Information Geometric Superactivation of Zero-Capacity Quantum Channels. In: Proceedings CD of The Second International Conference on Quantum Information and Technology. Tokyo, Japan, 21/10/ /10/2010. pp Paper 3. The Second International Conference on Quantum Information and Technology - New Trends in Quantum Information Technology (ICQIT2010), Quantum Information Science Theory Group (QIST), National Institute of Informatics (NII), National Institute of Information and Communications Technology (NICT), 2010, Tokyo, Japan. 86. L Gyongyosi, S Imre Efficient Computational Information Geometric Analysis of Physically Allowed Quantum Cloning Attacks for Quantum Key Distribution Protocols. WSEAS TRANSACTIONS ON COMMUNICATIONS 9:(3) pp Paper 9. (2010), Scopus link Independent citations: 5 All citations: 5 1. K Lemr1, K Bartkiewicz, A Cernoch, J Soubusta, A Miranowicz Experimental aspects of a multifunctional optimal quantum cloner In: Advances in Foundations of Quantum Mechanics and Quantum Information with atoms and photons. Turin, Olaszország: 20/05/ /05/2012. (2012), pp Karel Lemr, Karol Bartkiewicz, Antonin Cernoch, Jan Soubusta, Adam Miranowicz Experimental linear-optical implementation of a multifunctional optimal cloner pp Full document

10 3 Karel Lemr, Karol Bartkiewicz, Antonín Černoch, Jan Soubusta, Adam Miranowicz Experimental linear-optical implementation of a multifunctional optimal qubit cloner PHYS REV A 85: (5) 1-4. (2012) 4. Karol Bartkiewicz, Adam Miranowicz Cloning of arbitrary mirror-symmetric distributions on Bloch sphere: Optimality proof and proposal for practical photonic realization pp Full document 5 Bartkiewicz K, Miranowicz A Optimal cloning of qubits given by an arbitrary axisymmetric distribution on the Bloch sphere Physical Review A - Atomic, Molecular, and Optical Physics 82: (4). Paper (2010) Scopus link, DO I : /PhysRevA L Gyongyosi, S Imre Computational Information Geometric Analysis of Quantum Channel Additivity. In: Photon10 Conference Proceedings, Southampton, United Kingdom, 23/08/ /08/2010. pp Paper P2-34. Photon10 Conference, Quantum Electronics Group (QEP-19), Section on Quantum information, University of Southampton, Institute of Physics (IOP) Optics and Photonics Division, L Gyongyosi, S Imre Computational Geometric Analysis of Physically Allowed Quantum Cloning Transformations for Quantum Cryptography. In: Proceedings of the 4th WSEAS International Conference on COMPUTER ENGINEERING and APPLICATIONS (CEA '10). Cambridge, United States of America, 27/01/ /01/2010. (Harvard University)pp Paper 18. (ISBN: ) Kötet megjegyzések: Section on Quantum Computing, WoS link BEST PAPER AWARD, Harvard University 89. L Gyongyosi, S Imre Capacity Recovery of Useless Photonic Quantum Communication Channels. In: Berkeley Lab ALS Conference 2010 Proceedings CD. Berkeley, United States of America, 13/10/ /10/2010. pp Paper 10. Kötet megjegyzések: ALS Conference, Lawrence Berkeley National Laboratory (Berkeley Lab), University of California, Berkeley (California) 90. L Gyongyosi, S Imre Algorithmical analysis of information-theoretic aspects of secure communication over optical-fiber quantum channels. JOURNAL OF OPTICAL AND FIBER COMMUNICATIONS RESEARCH 1:(7) pp Paper 7. (2010), Scopus link, DOI: /s L Gyongyosi, S Imre Algorithmic Solution to Superactivation of Zero-Capacity Optical Quantum Channels. In: Proceedings CD of Photonics Global Conference (PGC) Sun City, Singapore, 14/12/ /12/2010. pp Paper 10a355. Vol. IEEE Catalog number: CFP1027F-ART(ISBN: ) Kötet m egjegyzések: Photonics Global Conference (PGC) 2010, Nanyang Technological University, IEEE Photonics Society, Nature Photonics, 2010, Suntec City, Singapore, accepted. IEEE Catalog number: CFP1027F-ART ISBN: Indexed in IEEE Xplore Photonics Global Conference (PGC) 2010, Nanyang Technological University, IEEE Photonics Society, Nature Photonics, 2010, Suntec City, Singapore 92. Győző Gódor, Sándor Imre Simple Lightweight Authentication Protocol: Security and Performance Considerations. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING 6:(3) pp (2010), Scopus link, Full document at the publisher, DOI: /jbdcn Links to data bases: Scopus link Radio frequency identification technology is becoming ubiquitous and, as a side effect, more authentication solutions come to light, which include numerous security issues. The authors have previously introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks, which performs exceptionally well in very large systems. In this paper, the authors give a detailed examination of small computational capacity systems from the point of view of security. This paper defines the model of attacker and the well-known attacks that can be achieved in these kinds of environments, as well as an illustration of the proposed protocol s performance characteristics with measurements carried out in a simulation environment. This paper shows the effects of numerous attacks and the system s different parameters on the authentication time while examining the performance and security characteristics of two other protocols chosen from the literature to compare the SLAP algorithm and give a proper explanation for the differences between them. 93. Győző Gódor, Sándor Imre Security Analysis of the Simple Lightweight Authentication Protocol. In: Ninth International Conference on Networks: ICN2010. Les Menuires, France, 11/04/ /04/2010. pp (ISBN: /10), Scopus link, DOI: /ICN Independent citations: 2 All citations: 2 1 Ning H, Liu H, Mao J, Zhang Y Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems IET COMMUN 5: (12) (2011) WoS link, Scopus link, DO I : /iet-com Mete Akgün, M Ufuk Çağlayan Server Impersonation Attacks and Revisions to SLAP, RFID Lightweight Mutual Authentication Protocol In: The Fifth International Conference on Systems and Networks Communications, ICSNC Nice, Franciaország: 22/08/ /08/2010. (2010), pp Scopus link, DOI: /ICSNC

11 94. Győző Gódor, Norbert Giczi, Sándor Imre Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Complexity Environment. In: 5th International Symposium on Wireless Pervasive Computing: IEEE ISWPC Modena, Italy, 05/05/ /05/2010. (IEEE) IEEE Press, pp (ISBN: /10), Scopus link, DOI: /ISWPC In the last few years RFID technology widespread. This technology can be found in each field of our daily life, e.g. supply-chain management, libraries, access management etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods could be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based mutual authentication protocol which proofs against the well-known attacks. We give a brief comparison with other EC based protocols in the point of view of security. Moreover, we show that our protocol is better than the others in case of performance, too. 1. Pateriya R K, Vasudevan S Elliptic curve cryptography in constrained environments: A review In: Proceedings International Conference on Communication Systems and Network Technologies, CSNT város?, ország? 03/06/ /06/2011. (2011), pp Scopus link, DOI: /CSNT doi: /CSNT References 95. Győző Gódor, Norbert Giczi, Sándor Imre Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems Performance Analysis by Simulations. In: 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS). Peking, China, 25/06/ /06/2010. (IEEE) Beijing: IEEE Press, pp (ISBN: ), WoS link, Scopus link, DOI: /WCINS RFID technology can be found in the most fields of our daily life, e.g. personal identification, supply-chain management, access control etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods could be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based mutual authentication protocol which proofs against the well-known attacks. We give a brief comparison with other EC based protocols in the point of view of security. Moreover, we show that our protocol is better than the others in case of performance, too. In order to measure the performance characteristics of our proposed ECC based authentication protocol and to make a comparison with others we implemented these algorithms in OMNeT++. Independent citations: 2 All citations: 2 1 Ming Wei Fang, Jun Jun Wu, Xin Fang Zhang, Hong Chen A Novel ECC-Based RFID Authentication Protocol Key Engineering Materials, Advanced Materials and Computer Science : (2011) DO I : /w w w.scientific.net/kem Pateriya R K, Vasudevan S Elliptic Curve Cryptography in Constrained Environments: A Review In: Communication Systems and Network Technologies (CSNT 2011). Kuala Lumpur, Malajzia: 03/06/ /06/2011. (2011), pp Scopus link, DOI: /CSNT Győző Gódor, Péter Szendi, Sándor Imre Elliptic Curve Cryptography Based Authentication Protocol for Small Computational Capacity RFID Systems. In: Proceedings of the Sixth ACM Symposium on QoS and Security for Wireless and Mobile Networks: Q2SWinet 10. Bodrum, Turkey, 17/10/ /10/2010. New York: ACM, pp (ISBN: ), WoS link In the last few years RFID technology widespread. This technology can be found in each field of our daily life, e.g. supply-chain management, libraries, access management etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods can be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based authentication protocol which protects against the well-known attacks. We give a brief comparison with other EC based protocols in the security point of view. 97. Bálint Ary, Sándor Imre xdr Arrival Distribution. In: 33rd International Conference on Telecommunications and Signal Processing. Baden, Austria, 17/08/ /08/2010. pp (ISBN: ) Kötet megjegyzések: ISBN: , WoS link, Full document 98. Bálint Ary, Sándor Imre Sizing of xdr Processing Systems. In: AccessNets 2010: 5th International ICST Conference on Access Networks. Budapest, Hungary, 03/11/ /11/2010. Budapest: pp Paper 9. (ISBN: ) Kötet megjegyzések: icst.org, Full document E!Teljes kötet Postpaid billing systems in most cases are using o ine charging methods to rate the calls. Since latency is an accepted property, the throughput can be lower than the capacity required to process peakhour tra ffic in a real-time manner. In this paper we will give an e fficient mathematical model to calculate the processing power while taking the maximum queue size and maximum record age constraints into consideration. 99. Bálint Ary, Sándor Imre Charging in Mobile Telecommunication Networks. In: Samuel Pierre (ed.) Next Generation Mobile Networks and Ubiquitous Computing. Hershey: IGI Global, Information Science Reference, pp (ISBN: ), DOI: / ch005 E!Teljes kötet Chapter in Book/Part of Monography/Scientific The tariff packages in the mobile telecommunication industry got more and more complex in the last few years. The telecommunication companies have introduced several different services along with different discounts and allowances. The price calculation of the services

12 and the understanding of prices became harder for the subscribers. This chapter describes the basic architecture and the major flows of a billing system in the telecommunication area. It introduces a novel concept for price calculation, which could aid the Advance of Charge and Income Prediction functionalities Bacsárdi László, Galambos Máté, Imre Sándor Kvantumcsatorna a műhold-föld és a műhold-műhold kommunikációban. HÍRADÁSTECHNIKA LXV:(3-4.) pp (2010) 101. Árpád Huszák, Sándor Imre Eliminating Rank Reversal Phenomenon in GRA based Network Selection Method. In: 2010 IEEE International Conference on Communications, ICC Cape Town, South Africa, 23/05/ /05/2010. pp Paper (ISBN: ), Full document Links to data bases: WoS link Independent citations: 2 All citations: 2 1. Faisal Kaleem VHITS: Vertical Handoff Initiation and Target Selection in a Heterogeneous Wireless Network 256 p Florida International University, USA 2. Heng Luo, Laurenson D I QoS Based Performance Evaluation for MANETs In: Wireless Communications, Networking and Mobile Computing (WiCOM 2011). Wuhan, Kína: 23/09/ /09/2011. (2011), pp Árpád Huszák, Sándor Imre Analysing GOP Structure and Packet Loss Effects on Error Propagation in MPEG 4 Video Streams. In: 4th International Symposium on Communications Control & Signal Processing, ISCCSP Limassol, Cyprus, 03/03/ /03/2010. pp Paper 32. (ISBN: ), Full document Independent citations: 7 All citations: 7 1. Riker A, Mu M, Zeadally S, Cerqueira E, Abelem A Real-time QoE prediction for multimedia applications in Wireless Mesh Networks In: IEEE Consumer Communications and Networking Conference (CCNC2 012). Belém, Brazília: 14/01/ /01/2012. (2012), pp Sarwar G, Boreli R, Lochin E In: Multimedia and Expo (ICME 2011). Barcelona, Spanyolország: 10/07/ /07/2011. (2011), pp Lewcio B, Moller S, Vidales P A method for seamless codec changeover during active video calls In: Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2011). Kyoto, Japán: 10/06/ /06/2011. (2011), pp Scopus link, DOI: /CAMAD Lewcio B, Belmudez B, Enghardt T, Moller S On the way to high-quality video calls in future mobile networks In: Quality of Multimedia Experience (QoMEX 2011). Mechelen, Belgium: 07/09/ /09/2011. (2011), pp Scopus link, DOI: /QoMEX Lewcio B, Belmudez B, Mehmood A, Waltermann M, Moller S Video quality in next generation mobile networks Perception of time-varying transmission In: Communications Quality and Reliability (CQR 2011). Naples, Amerikai Egyesült Államok: 10/05/ /05/2011. (2011), pp Zhengyong Feng, Guangjun Wen, Zixuan Zou, Chang Wen Chen Wireless Video Streaming QoS Guarantees Based on Virtual Leaky Bucket In: 2011 Global Telecommunications Conference (GLOBECOM 2011). Houston, Amerikai Egyesült Államok: 05/12/ /12/2011. (2011), pp Samia Sharmin Shimu Performance Analysis of H.264 Encoder for High-definition Video Transmission over Ultra-wideband Communication Link M Sc T hes es, Department of E lec tric al and C omputer E ngineering, U nivers ity of Sas katc hewan, Sas katoon pages A Mraz, S Imre, T Zambo Radio Resource Management for MIMO OFDMA Access in Rayleigh Fading Channel. In: European Wireless Lucca, Italy, 12/04/ /04/2010. pp Paper , Full document Independent citations: 2 All citations: 2 1. Bascedilturk Ilhan, Ozbek Berna Fairness aware resource allocation for downlink MISO-OFDMA systems In: Wireless Communications and Networking Conference (WCNC), 2012 IEEE. Cape Town, Dél-Afrika: 01/04/ /04/2012. (2012), pp Basturk I, Ozbek B Fair resource allocation for multi-user MISO-OFDMA systems In: 19th IEEE Conference on Signal Processing and Communications Applications (SIU2011). Antalya, Törökország: 20/04/ /04/2011. (2011), pp A Mráz, T Zámbó, S Imre Efficient Dynamic Resource Management for OFDMA-MIMO Wireless Transmission.

13 INFOCOMMUNICATIONS JOURNAL LXV:(IV) pp (2010), Full document Vilmos Simon, Sándor Imre Location Area Design Algorithms for Minimizing Signalling Costs in Mobile Networks. In: David Taniar (ed.) Mobile Computing: Concepts, Methodologies, Tools, and Applications. Hershey ; New York: Information Science Reference, pp (ISBN: ), Full document Chapter in Book/Part of Monography/Scientific 1 Hossein Dargahi, Nilufar Mohammad Zadeh, Hamid Reza Rezaian E-Business in Health Care Systems Payavard Salamat ISSN: : (3) (2011) 106. Vilmos Simon, László Bokor, Sándor Imre A Hierarchical Network Design Solution for Mobile IPv6. JOURNAL OF MOBILE MULTIMEDIA (JMM) 5:(4) pp (2009), Full document at the publisher Rinton Press Over the past years a number of IP micro-mobility protocols have been proposed as an extension or complement of Mobile IP. Although the development of these protocols has generated considerable interest in industry and academia, none of them have been widely deployed. The main reason of this lack of real-life usage of micro-mobility proposals is that the RFCs or drafts of these protocols do not address the problems regarding the realization of the micro-mobility structures in detail during the procedures of network design. This shortage is true in case of Hierarchical Mobile IP as well (RFC 4140), which is one of the most significant micro-mobility solutions aiming to reduce the signaling delay and the number of signaling messages of Mobile IP. In order to provide guidelines for network designers we propose a new a hierarchical network design algorithm (HIENDA) based on the structure given by a Location Area planning algorithm, aligned with a MAP allocation algorithm in Hierarchical Mobile IPv6 to optimize the mobility management in Mobil IP networks. HIENDA considers the topology constraints, and takes the available mobility pattern and Access Router handover rate information as input, and finds a near optimal hierarchical structure for which the total signaling cost will be minimal. From the simulation results the conclusion could be drawn that HIENDA outperforms the other existing hierarchy optimizing solutions in the term of Location Update Cost, at the same time keeping the Packet Delivery Cost on a low level. Independent citations: 2 All citations: 2 1 Sandor Szabo The effects of user mobility on the performance of wireless networks LAP Lambert Academic Publishing Gmbh & Co. KG, p. ISBN Könyv 2 Árpád Huszák Improving Multimedia Quality in IP Networks: Algorithm, Methods and Solutions Saarbrücken: LAP Lambert Academic Publishing Gmbh & Co. KG, p. ISBN Könyv 107. P Fülöp, S Imre, S Szabó, T Szálka The Accuracy of Location Prediction Algorithms Based on Markovian Mobility Models. INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS 1:(2) pp Paper ITJ5114. (2009), Scopus link, Full document 108. P Fülöp, B Kovács, S Imre Mobility Management Algorithms for the Client-driven Mobility Frame System - Mobility from a Brand New Point of View. MOBILE INFORMATION SYSTEMS 5:(4) pp (2009) IF: 0.972,, WoS link, Scopus link, DOI: /MIS In this paper a new mobility management is introduced. The main idea in this approach is that the mobil node should manage the mobility for itself not the network. The network nodes provide only basic services for mobile entities: connectivity and administration. We construct a framework called the Client-based Mobility Frame System (CMFS) for this mobility environment. We developed the CMFS protocol as a solution over IPv4 and we show how to use Mobile IPv6 to realize our concept. We propose some basic mobility management solutions that can be implemented into the mobile clients and give details about a working simulation of a complete Mobility Management System. Example mobility management approaches such as the centralized- and hierarchical- or cellular-like ones are also defined and hints are given what kind of algorithms might be implemented upon the Client-based Mobility Frame System over IPv4 and IPv6 as well. We introduce some example algorithms that can work with the CMFS making mobility management efficient by minimizing signalling load on the network. In the present work modeling and detailed discussion on the parameters of the algorithms is given and comparison to existing mobility approaches and protocols is done. We prepared a simulation to test our protocol and to back up the proposals we provide the reader with simulation results. We stress that still one the most important benefit of our findings is that all the MNs can run different management strategies and can optimize mobility for themselves. Independent citations: 3 All citations: 3 1 Sandor Szabo The effects of user mobility on the performance of wireless networks LAP Lambert Academic Publishing Gmbh & Co. KG, p. ISBN Könyv 2 Ciou YF, Leu FY, Huang YL, Yim K A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks MOBILE INFORMATION SYSTEMS 7: (Fukuoka, JAPAN) (2011) WoS link, Scopus link, DO I : /MIS Agustinus Borgy Waluyo, David Taniar, Wenny Rahayu, Bala Srinivasan Mobile broadcast services with MIMO antennae in 4G wireless networks WORLD WIDE WEB 14: (4) (2011) WoS link, Scopus link, DO I : /s

14 109. M Bérces, S Imre A Quantum Theory Based Medium Access Control for Wireless Networks. In: J A Tenreiro Machado, Béla Pátkai, Imre J Rudas (ed.) Intelligent Engineering Systems and Computational Cybernetics. Heidelberg: Springer-Verlag, pp (ISBN: ) E!Teljes kötet Chapter in Book/Part of Monography/Scientific 110. L Gyongyosi, S Imre Unduplicable Quantum Data Medium Based Secret Decryption and Verification. In: ICITST-2009 Proceedings, The 4th International Conference for Internet Technology and Secured Transactions, IEEE UK & RI, London, United Kingdom. London, United Kingdom, 09/11/ /11/2009. pp Paper 242. (ISBN: ) Kötet megjegyzések: Indexed in IEEE Xplore 111. L Gyongyosi, S Imre Quantum Protected Software. INTERNATIONAL REVIEW ON COMPUTERS AND SOFTWARE 4: pp (2009), Scopus link 112. L Gyongyosi, S Imre Quantum Informational Geometry for Secret Quantum Communication. In: FUTURE COMPUTING 2009 Proceedings, The First International Conference on Future Computational Technologies and Applications, International Academy, Research and Industry Association. Athens, Greece, 15/11/ /11/2009. pp Paper 58. (ISBN: ) Kötet megjegyzések: The First International Conference on Future Computational Technologies and Applications, FUTURE COMPUTING 2009, Section on Quantum Computing, WoS link, Scopus link, DOI: /ComputationWorld BEST PAPER AWARD 113. L Gyongyosi, S Imre Quantum Divergence Based Quantum Channel Security Estimation. In: Proceedings CD of the First International Conference on Network and Service Security. Paris, France, 24/06/ /06/2009. pp Paper 15. Kötet megjegyzések: N2S 2009 International Conference on Network and Service Security, Section on Quantum Cryptography and QKD Indexed in IEEE Xplore 114. L Gyongyosi, L Bacsardi, S Imre Novel Approach for Quantum Mechanical Based Autonomic Communication. In: FUTURE COMPUTING 2009 Proceedings, The First International Conference on Future Computational Technologies and Applications, International Academy, Research and Industry Association. Athens, Greece, 15/11/ /11/2009. pp Paper 28. (ISBN: ) Kötet megjegyzések: The First International Conference on Future Computational Technologies and Applications, FUTURE COMPUTING 2009, Section on Quantum Computing, WoS link, Scopus link, DOI: /ComputationWorld L Gyongyosi, S Imre Geometrical Estimation of Information Theoretical Impacts of Incoherent Attacks for Quantum Cryptography. INTERNATIONAL REVIEW OF PHYSICS 3:(12) pp Paper 6. (2009) Published: dec 116. L Gyongyosi, S Imre Fidelity Analysis of Quantum Cloning Based Attacks in Quantum Cryptography. In: Proceedings of the 10th International Conference on Telecommunications - ConTEL Zagreb, Croatia, 08/06/ /06/2009. pp Paper 53. (ISBN: ), WoS link 117. L Bacsardi, L Gyongyosi, S Imre Solutions for Redundancy-Free Error Correction in Quantum Channel. In: Proceedings CD of 1st International ICST Conference on Quantum Communication and Quantum Networking. Vico Equense, Italy, 26/10/ /10/2009. Gent: pp Paper (ISBN: ), Full document All free-space quantum communications require the use of a quantum channel, which transports quantum bits in such a way that the quantum mechanical states of the qubits remain preserved from one end of the channel to the other one. In quantum computing the classical error coding methods could not be used, however we can construct a classical channel with zero redundancy error correction for any unitary channel. In our basically new quantum error correction approach, the classical states are coded into the eigenvectors and unitary transformations. In this paper, we show that with our new algorithm it s possible to create redundancy-free quantum error correction. We also consider the redundancy-free implementation of a unitary error correcting operator. Our protocol achieves the redundancy-free quantum communication using local unitary operations and unitary matrices. These solutions could be useful for the free-space quantum communication Koller István, Imre Sándor UAV - földi állomás kommunikációs csatornafejlesztése: -. In: Kommunikáció 2009: -. Budapest, Hungary, 14/10/2009. Budapest: pp Paper Imre S, Salllai Gy Prológus. HÍRADÁSTECHNIKA 64:(Különszám) p. 1. (2009) Journal Paper/Editorial material/scientific Előszó a BME Híradástechnikai Tanszék és a BME Távközlési és Médiainformatikai Tanszék közös különszámában, amely alapításuk 60 éves évfordulója alkalmából jelent meg 120. Imre S LTE - célkereszben és célegyenesben. In: ELSINCO TESTING Seminar Budapest, Hungary, 09/2009. pp Conference Paper/Paper of lecture or poster/popular science 121. Imre S, Salllai Gy Guest Editorial.

15 INFOCOMMUNICATIONS JOURNAL 64:(IV) p. 1. (2009) Journal Paper/Editorial material/scientific Imre S., Sallai Gy. vendégszerkesztők "60 years of telecommunications at the BME" számban 122. Győző Gódor, Sándor Imre Performance Analysis of the Simple Lightweight Authentication Protocol. In: The 7th International Conference on Advances in Mobile Computing and Multimedia: MoMM2009. Kuala Lumpur, Malaysia, 14/12/ /12/2009. ACM, pp (ISBN: ), Scopus link, DOI: / Radio frequency identification technology is becoming ubiquitous and as an unfortunate side effect, more and more authentication solutions come to light that have plenty of security issues to deal with. In our former contribution we introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks and performs exceptionally well even in very large systems. We gave a theoretical analysis of the SLAP protocol in the point of view of security and performance. In this paper we illustrate the proposed protocol's performance characteristics with measurements carried out in a simulation environment and compare with the theoretical results. We show the effects of numerous attacks and the system's different parameters on the authentication time. Finally, we examine the performance of two other protocols chosen from the literature in order to compare with SLAP algorithm and give proper explanation for the differences between them Gulyás Gábor György, Schulcz Róbert, Imre Sándor Modeling Role-Based Privacy in Social Networking Services. In: Rainer Falk, Wilson Goudalo, Eric Y Chen, Reijo Savola, Manuela Popescu (ed.) SECURWARE 2009, The Third International Conference on Emerging Security Information, Systems and Technologies. Athens, Greece, 18/06/ /06/2009. Athens: IEEE Computer Society Press, pp Paper 31. (ISBN: ), WoS link, Scopus link, DOI: /SECURWARE Independent citations: 2 All citations: 2 1. Renato Iannella, Adam Finden Privacy Awareness: Icons and Expression for Social Networks In: 8th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods. Namur, Belgium: 30/09/ /10/2010. (2010), pp Ridinger Tamás Személyes adatok védelmének gyakorlata mobil közösségi hálókon Full document 124. Fulop P, Imre S, Szabo S, Szalka T Accurate mobility modeling and location prediction based on pattern analysis of handover series in mobile networks. MOBILE INFORMATION SYSTEMS 5:(3) pp (2009) IF: 0.972,, WoS link, Scopus link, DOI: /MIS The efficient dimensioning of cellular wireless access networks depends highly on the accuracy of the underlying mathematical models of user distribution and traffic estimations. Mobility prediction also considered as an effective method contributing to the accuracy of IP multicast based multimedia transmissions, and ad hoe routing algorithms. In this paper we focus on the tradeoff between the accuracy and the complexity of the mathematical models used to describe user movements in the network. We propose mobility model extension, in order to utilize user's movement history thus providing more accurate results than other widely used models in the literature. The new models are applicable in real-life scenarios, because these rely on additional information effectively available in cellular networks (e.g. handover history), too. The complexity of the proposed models is analyzed, and the accuracy is justified by means of simulation. Independent citations: 9 All citations: 9 1 Sazia Parvin, Farookh Khadeer Hussain, Sohrab Ali A methodology to counter DoS attacks in mobile IP communication MOBILE INF SYST 8: (2) (2012) 2 Ciou YF, Leu FY, Huang YL, Yim K A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks MOBILE INFORMATION SYSTEMS 7: (Fukuoka, JAPAN) (2011) WoS link, Scopus link, DO I : /MIS Palmieri F, Fiore U, Castiglione A Automatic security assessment for next generation wireless mobile networks MOBILE INFORMATION SYSTEMS 7: (Fukuoka, JAPAN) (2011) WoS link, Scopus link, DO I : /MIS Chen CL Design of a secure RFID authentication scheme preceding market transactions MOBILE INFORMATION SYSTEMS 7: (Fukuoka, JAPAN) (2011) WoS link, Scopus link, DO I : /MIS Nicopolitidis P, Christidis K, Papadimitriou GI, Sarigiannidis PG, Pomportsis AS Performance evaluation of acoustic underwater data broadcasting exploiting the bandwidth-distance relationship MOBILE INFORMATION SYSTEMS 7: (4) (2011) WoS link, DO I : /MIS Xuan K, Zhao G, Taniar D, Rahayu W, Safar M, Srinivasan B Voronoi-based range and continuous range query processing in mobile databases J COMPUT SYST SCI 77: (4) (2011) Scopus link, DO I : /j.jcss Yang WS, Yang ES, Kim HJ, Kim DK Estimation of spectrum requirements for mobile networks with self-similar traffic, handover, and frequency reuse MOBILE INFORMATION SYSTEMS 6: (4) (2010) WoS link, Scopus link, DO I : /MIS Gaddah A, Kunz T Extending mobility to publish/subscribe systems using a pro-active caching approach MOBILE INFORMATION SYSTEMS 6: (4) (2010) WoS link, Scopus link, DO I : /MIS Kushan Ahmadian, Marina Gavrilova, David Taniar

16 Multi-criteria Optimization in GIS: Continuous K-Nearest Neighbor Search in Mobile Navigation LECT NOTES COMPUT SCI 6016: (2010) WoS link, Scopus link, DO I : / Fazekas Péter, Imre Sándor, Jeney Gábor, Pap László, Schulcz Róbert, Szabó Sándor Nagysebességű vezetéknélküli hálózatok a közeljövô technológiái. HÍRADÁSTECHNIKA LXIV: pp (2009) 126. Árpád Huszák, Sándor Imre TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme. In: IEEE Symposium on Computers and Communications, ISCC'09. Sousse, Tunesia, 05/07/ /07/2009. pp (ISBN: ), WoS link, Scopus link, Full document, DOI: /ISCC Árpád Huszák, Sándor Imre Multipath Video Streaming Using GRA Network Ordering Algorithm without Rank Inconsistency. JOURNAL ON INFORMATION TECHNOLOGIES AND COMMUNICATIONS - RESEARCH DEVELOPMENT AND APPLICATION ON ELECTRONICS TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY E-1:(1(5)) pp (2009), Full document 128. Árpád Huszák, Sándor Imre Content-aware Interface Selection Method for Multi-Path Video Streaming in Best-effort Networks. In: 16th International Conference on Telecommunications, ICT Marakesh, Marokkó, 25/05/ /05/2009. pp , WoS link, Full document, DOI: /ICTEL Independent citations: 6 All citations: 6 1 Jongryool Kim, JongWon Kim A Segment-based Mobile Media Distribution Framework with Multiple Heterogeneous Wireless Access Interfaces Journal of Korean Institute of Information Scientists and Engineers, ISSN : (6) (2011) 2. Dragos Niculescu, Mihai Stanciu, Marius Vochin, Eugen Borcoci, Nikolaos Zotos Implementation of a Media Aware Network Element for Content Aware Networks In: The Fourth International Conference on Communication Theory, Reliability and Quality of Service, CTRQ Budapest, Magyarország: 17/04/ /04/2011. (2011), pp H Koumaras et al Media Ecosystems: A Novel Approach for Content-Awareness in Future Networks LECT NOTES COMPUT SCI 6656: (&) (2011) Scopus link, DO I : / _26 4. Eugen Borcoci, Mihai Stanciu, Dragos Niculescu, George Xilouris Quality of Services Assurance for Multimedia Flows based on Content-Aware Networking In: The Fourth International Conference on Communication Theory, Reliability and Quality of Service, CTRQ Budapest, Magyarország: 17/04/ /04/2011. (2011), pp E Borcoci, R Lorga A management Architecture for a Multi-domain Content-Aware Network In: International Conference on Telecommunications and Multimedia (TEMU 2010). Crete, Görögország: 14/07/ /07/2010. (2010), pp Borcoci E, Negru D, Timmerer C A novel architecture for multimedia distribution based on Content-Aware Networking In: 3rd Int. Conf. on Communication Theory, Reliability, and Quality of Service, CTRQ Athens, Görögország: 13/06/ /06/2010. (2010), pp Scopus link, DOI: /CTRQ Имре Ш, Балаж Ф Квантовые вычисления и связь. Инженерный подход. Moszkva: Fizmatlit, p. (ISBN: ) Lang: Russian Book/Monography/Scientific Independent citations: 2 All citations: 2 1. & Общие ресурсы - Монографии и сборники трудов сотрудников института Zavois ky P hys ic al-t ec hnic al I ns titute (ZP ht I ) of the Kazan Sc ientific C enter of the Rus s ian A c ademy of Sc ienc es Lang: Rus s ian 2. F K Aliev, A M Borodin, A V Kluev K Vaprosu o Separavelnosti Sostocsni Trehkuvitnih Kvantovih Sistem In: X All-Russia Symposium on Industrial and Applied Mathematics. Sochi, Oroszország: 01/11/ /11/2009. (2009), pp. & Zsolt Butyka, Tamás Jursonovics, Sándor Imre New fair QoS-based charging solution for mobile multimedia streams. INTERNATIONAL JOURNAL OF VIRTUAL TECHNOLOGY AND MULTIMEDIA 1:(1) pp (2008), Full document at the publisher, DOI: /IJVTM Links to data bases: Google scholar link 131. Vilmos Simon, Sándor Imre Network Planning Algorithms for Optimizing Signalling Load in Mobile Networks: Chapter IX. In: Indranil Bose (ed.) Breakthrough Perspectives in Network and Data Communications Security, Design and Applications. Hershey: IGI Global, Information Science Reference, pp (Advances in Business Data Communications and Networking)

17 (ISBN: ), Full document E!Teljes kötet Chapter in Book/Part of Monography/Scientific 132. Szabolcs Nováczki, László Bokor, Gábor Jeney, Sándor Imre Design and Evaluation of a Novel HIP-Based Network Mobility Protocol. JOURNAL OF NETWORKS (JNW) 3:(1) pp (2008), Scopus link, Full document, Full document at the publisher, DOI: /jnw Links to data bases: Scopus link The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and changes its point of attachment to the Internet. The main goal of any protocol supporting network mobility is to provide continuous, optimal and secure Internet access to all nodes and even recursively nested mobile subnetworks inside a moving network. For this purpose, the IETF (Internet Engineering Task Force) has developed the NEtwork MObility Basic Support (NEMO BS) protocol which extends the operation of Mobile IPv6 (MIPv6). In order to bypass the same problems suffered by MIPv6 and NEMO BS, a novel Host Identity Protocol (HIP) extension called HIP-NEMO is introduced, proposed and evaluated in this paper. Our proposal is based on hierarchical topology of mobile RVSs (mrvs), signaling delegation and inter-mrvs communication to enable secure and efficient network mobility support in the HIP layer. The method provides secure connectivity and reachability for every node and nested subnet in the moving network and supports multihomed scenarios as well. Moreover, HIPNEMO reduces signaling and packet overhead during network mobility management by achieving route optimization inside any moving network even in nested scenarios. To evaluate the proposed scheme we present a simulation model implemented in OMNeT++ and discuss the results of our simulation based analysis to show the efficiency of the approach compared to the NEMO BS protocol formulated by the IETF. Independent citations: 13 All citations: 13 1 Toledo N, Higuero M, Jacob E, Matias J Analytical Evaluation of a HIP Registration Enhancement for NEMO Scenarios IEEE COMMUN LETT 15: (5) (2011) WoS link, Scopus link, DO I : /LCOMM Toledo N, Bonnin J M, Higuero M, Jacob E Fundamentals of NeMHIP: An enhanced HIP based NEMO protocol In: IEEE Consumer Communications and Networking Conference (CCNC2011). Las Vegas, Amerikai Egyesült Államok: 09/01/ /01/2011. (2011), pp Scopus link, DOI: /CCNC Toledo N, Bonnin J M, Higuero M, Jacob E Host identity protocol based NEMO solutions: An evaluation of the signaling overhead In: IEEE Vehicular Technology Conference. Budapest, Magyarország: 15/05/ /05/2011. (2011), pp. Scopus link, DOI: /VETECS References 4 Bruno Miguel Sousa, Kostas Pentikousis, Marilia Curado Multihoming Management for Future Networks MOBILE NETW APPL 16: (4) (2011) WoS link, Scopus link, DO I : /s Abu Zafar, M Shahriar, Shohrab Hossain, Mohammed Atiquzzaman A Cost Analysis Framework for NEMO Prefix Delegation based Schemes Technical Report TR-O U -TNRL , Jan 2010, Telecommunication & Network Research Lab, School of Computer Science, T H E U N I V E RSI T Y O F O KLA H O M A. p Zohra Slimane, Mohamed Feham, Abdelhafid Abdelmalek A Seamless and Transparent MN-Proxy based Mobility Support For (n,n,1) Multihomed NEMO Model INT J COMPUT SCI NETW SECUR 10: (04) (2010) 7 Bauer C, Zitterbart M A Survey of Protocols to Support IP Mobility in Aeronautical Communications IEEE COMMUN SURV TUTOR &: (99) (2010) 8 Abu Zafar, M Shahriar, Mohammed Atiquzzaman, William Ivancic Route Optimization in Network Mobility: Solutions, Classification, Comparison, and Future Research Directions IEEE COMMUN SURV TUTOR 12: (1) (2010) WoS link, Scopus link, DO I : /SURV P Calduwel Newton, L Arockiam Route Optimization Mechanisms for Internet Applications in Mobile Networks, A Survey International Journal of Future Generation Communication and Networking, ISSN x 3: (3) (2010) 1 0 Hye-Young Kim, Hangbae Chang, Young-Sik Jeong Intra domain route optimization for ubiquitous network PERS UBIQUIT COMPUT 13: (7) (2009) WoS link, Scopus link, DO I : /s Jukka Ylitalo, Jan Melén, Patrik Salmela, Henrik Petander An Experimental Evaluation of a HIP Based Network Mobility Scheme LECT NOTES COMPUT SCI 5031: (2008) WoS link, Scopus link, DO I : / _ Pääkkönen P, Salmela P, Aguero R, Choque J Performance analysis of HIP-based mobility and triggering In: 2008 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM2008. Newport Beach/CA, Amerikai Egyesült Államok: 23/06/ /06/2008. (2008), pp. Scopus link, DOI: /WOWMOM References 1 3. J Ylitalo SECURE MOBILITY AT MULTIPLE GRANULARITY LEVELS OVER HETEROGENEOUS DATACOM NETWORKS 202 p

18 PhD Thesis, Helsinki University of Technology, Faculty of Information and Natural Sciences, Department of Computer Science and Engineering, Rudolf Tóth, Zoltán Faigl, Máté Szalay, Sándor Imre An Advanced Timing Attack Scheme on RSA. In: Networks 2008: 13th International Telecommunications Network Strategy and Planning Symposium. Budapest, Hungary, 28/09/ /10/2008. (IEEE)pp Paper (ISBN: ) Kötet megjegyzések: Megjelenési forma: pendrive, Scopus link, Full document, DOI: /NETWKS This paper describes an advanced timing attack scheme on cryptographic algorithms. An attacker can use our method to break a cryptographic algorithm by reconstructing the secret key. The paper contains a detailed explanation of our novel algorithm, furthermore, a practical example for its use. As a proof-of-concept, the method is shown on a specific implementation of the RSA algorithm revealing a 128-bit secret key. Timing attacks assume that the attacker has partial or full knowledge of the internal structure of the attacked algorithm and have gathered time-specific information on a number of known messages, that were encrypted or decrypted with the specific key. In our simplified proof-of-concept example, the attacker knows the total number of extra-reduction steps of the Montgomery multiplication in the RSA for a number of known messages. We demonstrate in practice how this information can be used to achieve complete and fast key recovery with statistical tools, i.e. analysis of variance (ANOVA) and t-test. Similar timing attacks have already been presented by others, however to our knowledge, none of them applied these statistical tools in their methods with such efficiency, and showed the complete recovery in practice by attacking the Montgomery multiplication. However, this is not the main contribution of the paper. The main contribution is, that we have introduced the new concept of key trees and goodness values, which lets the recovery algorithm examine only a very small key space, even if the decision criteria for guessing the key bits are highly biased. This concept can be extended to any other timing attack. Independent citations: 2 All citations: 2 1 CaiSen Chen, Tao Wang, Junjian Tian Improving timing attack on RSA-CRT via error detection and correction strategy INFORM SCIENCES &: (&) (2012) n Press, Corrected Proof.Available online 20 January CHEN Cai-Sen, Wang Tao, Tian Jun-Jian An Improved Timing Attack with Error Detection on RSA-CRT C ryptology ep rint A rc hive, , p Peter Fulop, Benedek Kovacs, Sandor Imre Mobility Management Framework. pp (2008) Further works/manuscript/scientific 1 Md Shohrab Hossain, Mohammed Atiquzzaman Asymptotic scalability analysis of mobility protocols based on signalling overhead INT J COMMUN NETW DIST SYST 7: (1-2) (2011) 135. P Fülöp, B Kovács, S Imre Mobility Management Algorithms for the Client-driven Mobility Frame System - Mobility from a Brand New Point of View. In: 6th Inter. Conf. On Advances in Mobile Multimedia, MOMM2008. Linz, Austria, 24/11/ /10/2008. pp , Scopus link, DOI: / P Fülöp, T Szálka, S Szabó, K Lendvai, S Imre Accurate Mobility Modeling and Location Prediction Based on Pattern Analysis of Handover Series in Mobile Networks. In: 6th Inter. Conf. On Advances in Mobile Multimedia, MOMM2008. Linz, Austria, 24/11/ /11/2004. pp Independent citations: 5 All citations: 5 1. Shaikh Fatema, Mapp Glenford E, Lasebae Aboubaker A Survey of Network Coverage Prediction Mechanisms in 4G Heterogeneous Wireless Networks In: First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). London, Anglia: 25/07/ /07/2011. (2012), pp WS Yang, ES Yang, HJ Kim, DK Kim Estimation of spectrum requirements for mobile networks with self-similar traffic, handover, and frequency reuse MOBILE INF SYST 6: (4) (2010) WoS link, Scopus link, DO I : /MIS Abdulbaset Gaddah, Thomas Kunz Extending mobility to publish/subscribe systems using a pro-active caching approach MOBILE INF SYST 6: (4) (2010) WoS link, Scopus link, DO I : /MIS FS Shaikh Intelligent Proactive Handover and QoS Management using TBVH in Heterogeneous Networks: School of Engineering and Information Sciences, Middlesex University, UK 243 p Alfredo Milani, Eleonora Gentili, Valentina Poggioni Cellular Flow in Mobility Networks IEEE Intelligent Informatics Bulletin, ISSN : (1) (2009) 137. L. Bacsárdi, M. Bérces, S. Imre Redundancy-Free Quantum Theory Based Error Correction Method in Long Distance Aerial Communication. In: 59th International Astronautical Congress, IAC Proceedings Glasgow, Great Britain, 29/09/ /10/2008. pp Paper IAC-08-B2.4.8., Full document 138. L Bokor, Z Németh, I Dudás, S Imre Chapter XXVIII: Novel Results on MBMS Service Provisioning in UTMS/WLAN Heterogeneous Architectures. In: Ismail Khalil Ibrahim (ed.)

19 Handbook of Research on Mobile Multimedia (Second Edition). Hershey: Information Science Reference, pp (ISBN: ), Full document at the publisher, DOI: / ch028 Chapter in Book/Scientific 139. Imre Sándor Kvantum és klasszikus módszerek alkalmazása infokommunikációs hálózatok teljesítőképességének növelésére. 24 p (Dr. Habil.) Thesis/Dr. Habil./Scientific 140. Imre Sándor, Mráz Albert Fair radio resource allocation in multiuser OFDMA networks. In: Fair radio resource allocation in multiuser OFDMA networks. Ajaccio, France, 05/05/ /05/2008. IEEE, pp (ISBN: ), WoS link, Scopus link, Full document, DOI: /MELCON Pradip Paudyal Next Generation Mobile Communication Technology (MIMO OFDMA System and RRM technique) 5 1 pages Full document 141. Győző Gódor, Mátyás Antal, Sándor Imre Mutual Authentication Protocol for Low Computational Capacity RFID Systems. In: IEEE Globecom 2008 Computer and Communications Network Security Symposium. New Orleans, United States of America, 30/10/ /11/2008. pp Paper (ISBN: ), WoS link, Scopus link, DOI: /GLOCOM.2008.ECP.371 Since tags have very limited memory and very low computational capacity a so-called lightweight authentication is needed. The earlier suggested algorithms do not satisfy all of the security requirements. In this paper we introduce our SLAP protocol which meets all the security requirements. Our solution provides an efficient mutual authentication method by which a given tag and the back-end can authenticate each other easily, quickly and securely even if large amount of tags are stored in the database. The protocol can defy the well-known attacks and does not demand high computational capacity. 1. Mete Akgün, M Ufuk Çağlayan Server Impersonation Attacks and Revisions to SLAP, RFID Lightweight Mutual Authentication Protocol In: The Fifth International Conference on Systems and Networks Communications, ICSNC Nice, Franciaország: 22/08/ /08/2010. (2010), pp. &-& Győző Gódor, Zoltán Faigl, Máté Szalay, Sándor Imre Mobile Payment. In: Mehdi Khosrow-Pour (ed.) Encyclopedia of Information Science and Technology, 2nd Ed.. Hershey: Information Science Reference, pp (Encyclopedia of Information Science and Technology, Second Edition; 8.) (ISBN: ), Full document E!Teljes kötet Chapter in Book/Scientific 1. Yuli Eni ANALISIS DAN PERANCANGAN MODEL SISTEM DINAMIS Binus U nivers ity, Jakarta, DKI Jakarta, I ndones ia. p Lang: I ndones ian Gyöngyösi L, Imre S A kvantumkriptográfia infokommunikációs alkalmazásai. HÍRADÁSTECHNIKA 11:(6) pp (2008) Pollák-Virág díj, Hírközlési és Informatikai Tudományos Egyesület, Fülöp Árpád, Virág Péter A hagyományos és kvantumkriptográfia felhasználási lehetőségei a gazdasági életben T DK dolgozat, BC E, I nformác iómenedzs ment s zekc ió Lang: H ungarian 144. Gulyás Gábor György, Schulcz Róbert, Imre Sándor Comprehensive Analysis of Web Privacy and Anonymous Web Browsers: Are Next Generation Services Based on Collaborative Filtering? In: Joint SPACE and TIME Workshops, held by The Joint itrust and PST Conferences on Privacy, Trust Management and Security. Trondheim, Norvay, 16/06/ /06/2008. pp Paper 2. Independent citations: 3 All citations: 3 1 Antonio Ruiz-Martínez Review: A survey on solutions and main free tools for privacy enhancing Web communications J NETW COMPUT APPL 35: (5) Paper &. (2012) Full document 2. Varadarajan Sridhar, Gopalan Srividya System and Method for Supporting Peer Interactions : patent Full document 3. Michel Ponka, Christian Schlehuber, Martin Kluge, Jannik Kappes, Kai Rathmann, Jens Trinh

20 Online Social Networks p.tu-darms tadt.de/fileadmin/us er_upload/group_p 2 P /s eminarband.pdf. Fac hgebiet P eer-to-p eer-n etzwerke, Fac hbereic h I nformatik, T U Darms tadt Lang: German 145. Fülöp Péter, Benedek Kovács, Imre Sándor A Client-driven Mobility Frame System - Mobility Management From a New Point of View. In: Networks 2008: 13th International Telecommunications Network Strategy and Planning Symposium. Budapest, Hungary, 28/09/ /10/2008. pp Bokor László, Kanizsai Zoltán, Imre Sándor Simple QoS Provisioning Framework for MBMS in all-ip UMTS Networks. In: Bokor László, Kanizsai Zoltán, Imre Sándor (ed.) Proceedings of the Mediterranean Electrotechnical Conference - MELECON2008. Ajaccio, France, 05/05/ /05/2008. pp (ISBN: ), WoS link, Scopus link, Full document at the publisher, DOI: /MELCON Links to data bases: Scopus link, WoS link, IEEE Xplore link The rapid development of high bit-rate mobile and wireless networking architectures offers a wide range of novel multimedia-based applications and services. The efficient delivery of these services requires mechanisms of broadcasting and multicasting, while the increasing user expectations require Quality of Service (QoS) support. When IP datacasting has been seriously considered in mobile and wireless networks, soon has appeared the idea of Multimedia Broadcast-Multicast Service (MBMS) for Universal Mobile Telecommunications System (UMTS) environments. In order to extend the QoS capabilities of MBMS in all-ip 3G networks and beyond, we introduce a simple QoS provisioning framework feasible for any policy-based architecture. In this paper we also evaluate our proposal using a lightweight UMTS/MBMS simulation model implemented in OMNeT Benedek Kovács, Péter Fülöp, Sándor Imre Kliens vezérelt mobilitás, - mobilitás menedzsment új nézőpontból. HÍRADÁSTECHNIKA 63:(10) p. 1. Paper 1. (2008) 148. Árpád Huszák, Sándor Imre Source Controlled Semi reliable Multimedia Streaming Using Selective Retransmission in DCCP/IP Networks. COMPUTER COMMUNICATIONS 31:(11) pp (2008) IF: 0.884,, WoS link, Scopus link, DOI: /j.comcom In the past few years we have witnessed an explosive growth in the usage of media streaming applications. The newly appeared audio/video applications are becoming increasingly popular in IP networks, while in mobile environment the limited bandwidth and the higher error rate arise in spite of its popularity. Retransmission-based error recovery is considered inappropriate for multimedia applications, because of its latency. This solution can be attractive because it requires minimal network bandwidth, processing cost and efficiently improves the stream quality. Despite its latency, retransmission can be used successfully in many cases, especially if playout buffering is employed. Only the successfully retransmitted packets will improve the quality parameters of the multimedia stream, therefore it is worth to examine which packets should be retransmitted. In this paper a source controlled selective retransmission algorithm is presented with a decision algorithm based on the actual RTT and sending rate determined. by the TFRC. In our scheme the transmitter determines the playout delay caused by the playout buffer using the proposed Flood method. The needed information about the network congestion state and the network delay are provided by the TFRC (TCP Friendly Rate Control) algorithm. Our proposal does not need additional administration messages because the decision procedure and its inputs are at the transmitter. The obtained results show that significant quality improvement is possible with the proposed selective retransmission scheme. (c) 2008 Elsevier B.V. All rights reserved. Independent citations: 6 All citations: 6 1. Oh B -H, Lee J One-way delay estimation using packet intervals for efficient retransmission In: Proceedings - 1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, CNSI Jeju Island, ország? 23/05/ /05/2011. (2011), pp Scopus link, DOI: /CNSI References 2 Schier M, Welzl M Optimizing Selective ARQ for H.264 Live Streaming: A Novel Method for Predicting Loss-Impact in Realtime IEEE T MULTIMEDIA PP: (99) 1-1. (2011) 3 Chung TY, Chen YM, Huang LY A Cross Layer Perceptual Speech Quality Based Wireless VoIP Service IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E93A: (11) (2010) WoS link, Scopus link, DO I : /transfun.E93.A Schier M, Welzl M Content-aware selective reliability for DCCP video streaming In: Multimedia Computing and Information Technology (MCIT2010). Sharjah, Egyesült Arab Emírségek: 02/03/ /03/2010. (2010), pp Scopus link, DOI: /MCIT Bong-Hwan Oh Receiver based Packet Loss Detection and Retransmission Method for Enhancing QoS of Multimedia Application M as ter thes is, T he Graduate Sc hool Y ons ei U nivers ity Department of E lec tric al and E lec tronic E ngineering. Seoul, Korea. p Lang: Korean 6 Song B, Li Z, Qin H Selective retransmission technology in video communications Journal of Xi'an Jiaotong University 43: (6) (2009) Scopus link 149. Árpád Huszák, Sándor Imre DCCP based Multiple Retransmission Technique for Multimedia Streaming. In: MoMM2008:: 6th International Conference on Advances in Mobile Computing & Multimedia. Linz, Austria, 24/11/ /11/2008. ACM Press, pp (ISBN: ), Full document Independent citations: 5 All citations: 5

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Mobile Multimedia Meet Cloud: Challenges and Future Directions Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud

More information

Phone: E-mail: Ph.D. in Communications and Information Systems, Peking University, China (2007).

Phone: E-mail: Ph.D. in Communications and Information Systems, Peking University, China (2007). Room 421, EEE Department Meliksah University Talas/Kayseri 38280, Turkey Phone: E-mail: + 90 352 207 7300 ext.7417 yyang@meliksah.edu.tr Yuli Yang Ph.D. in Communications and Information Systems, Peking

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance

Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Tamal Chakraborty 1, Atri Mukhopadhyay 2 1 Dept. of Electronics and Telecommunication Engineering 2 School of Mobile

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department

More information

Studies on Market and Technologies for IMT in the Next Decade CJK-IMT Working Group

Studies on Market and Technologies for IMT in the Next Decade CJK-IMT Working Group Studies on Market and Technologies for IMT in the Next Decade CJK-IMT Working Group Dr. LEE, HyeonWoo (woojaa@keit.re.kr) ITU-R Working Party 5D Workshop IMT for the Next Decade March 21 st 2011, Bangkok

More information

4. G. Jeney, Multi-user detektálás hibatűrésének vizsgálata, (in Hungarian), Magyar Távközlés, Vol. X, Issue 1, Jan. 1999, pp.

4. G. Jeney, Multi-user detektálás hibatűrésének vizsgálata, (in Hungarian), Magyar Távközlés, Vol. X, Issue 1, Jan. 1999, pp. University notes 1. S. Imre, F. Balázs, G. Jeney, Korszerű mobil vevőalgoritmusok, (in Hungarian) (for the lectures Up-to-date Mobile Detection Algorithms ) http://www.mcl.hu/wcdma/pubs/jegyzet.pdf, 87

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Increasing QoS in SaaS for low Internet speed connections in cloud

Increasing QoS in SaaS for low Internet speed connections in cloud Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 195 200 doi: 10.14794/ICAI.9.2014.1.195 Increasing QoS in SaaS for low Internet

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

Load balancing as a strategy learning task

Load balancing as a strategy learning task Scholarly Journal of Scientific Research and Essay (SJSRE) Vol. 1(2), pp. 30-34, April 2012 Available online at http:// www.scholarly-journals.com/sjsre ISSN 2315-6163 2012 Scholarly-Journals Review Load

More information

BE Degree with Distinction From Lebanese American University Honor Society at the Lebanese American University (2004-2008)

BE Degree with Distinction From Lebanese American University Honor Society at the Lebanese American University (2004-2008) Georges EL-HOWAYEK Valparaiso University Electrical and Computer Engineering Building, Room 223 Valparaiso, IN 46383, USA georges.el-howayek@valpo.edu http://www.unm.edu/~ghowayek/ RESEARCH INTERESTS Communication

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Continued improvement in semiconductor and computing. technologies brought exponential growth to wireless industry. The

Continued improvement in semiconductor and computing. technologies brought exponential growth to wireless industry. The 23 Chapter-1 INTRODUCTION Continued improvement in semiconductor and computing technologies brought exponential growth to wireless industry. The huge number of advance mobile devices and integrated applications

More information

Experiments in Collaborative Cloud-based Distance Learning

Experiments in Collaborative Cloud-based Distance Learning Experiments in Collaborative Cloud-based Distance Learning Aleksandar Karadimce, Danco Davcev Faculty of Computer Science and Engineering, University Ss Cyril and Methodius Skopje, R. Macedonia akaradimce@ieee.org,

More information

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System

More information

Vertical Handoff in. Heterogeneous Wireless Networks

Vertical Handoff in. Heterogeneous Wireless Networks Vertical Handoff in Heterogeneous Wireless Networks Enrique Stevens Navarro March 10th, 2006 UBC-IEEE Workshop on Future Wireless Systems Presentation Outline Heterogeneous Wireless Networks Always Best

More information

AGENT BASED INTERACTIVE TELEVISION SERVICE FOR AN EXPERIMENTAL MULTIMEDIA SYSTEM

AGENT BASED INTERACTIVE TELEVISION SERVICE FOR AN EXPERIMENTAL MULTIMEDIA SYSTEM AGENT BASED INTERACTIVE TELEVISION SERVICE FOR AN EXRIMENTAL MULTIMEDIA SYSTEM Markosz Maliosz 1, Károly Farkas 1, István Cselényi 2 1 High Speed Networks Laboratory, Dept. of Telecom. and Telematics,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Access Control And Intrusion Detection For Security In Wireless Sensor Network Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.

More information

NKTH A*STAR (Singapore) Program

NKTH A*STAR (Singapore) Program NKTH A*STAR (Singapore) Program Code and name of subprogram / dedicated call NKTH_A*STAR (Szingapur) 2011 Project identifier TET_10_SG_STAR_KOMR-InCell10 Intelligent cellular network: A Two-Tier Cellular

More information

Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach

Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 109 Implementing Conditional Conference Call Use Case over IMS and Non

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

IoT Prospects of Worldwide Development and Current Global Circumstances

IoT Prospects of Worldwide Development and Current Global Circumstances IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in

More information

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

King Fahd University of Petroleum & Minerals Computer Engineering g Dept King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 543 Mobile and Wireless Networks Term 111 Dr. Ashraf S. Hasan Mahmoud Rm 22-148-3 Ext. 1724 Email: ashraf@kfupm.edu.sa 12/24/2011

More information

Energy-efficient Machine-To-Machine Communications: State of the art, challenges and directions

Energy-efficient Machine-To-Machine Communications: State of the art, challenges and directions Energy-efficient Machine-To-Machine Communications: State of the art, challenges and directions Burak Kantarci and Hussein T. Mouftah School of Electrical Engineering and Computer Science, University of

More information

230612 - AMC - Advanced Mobile Communications

230612 - AMC - Advanced Mobile Communications Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications

More information

NETCONF-based Integrated Management for Internet of Things using RESTful Web Services

NETCONF-based Integrated Management for Internet of Things using RESTful Web Services NETCONF-based Integrated Management for Internet of Things using RESTful Web Services Hui Xu, Chunzhi Wang, Wei Liu and Hongwei Chen School of Computer Science, Hubei University of Technology, Wuhan, China

More information

A Contribution to Expert Decision-based Virtual Product Development

A Contribution to Expert Decision-based Virtual Product Development A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,

More information

Framework model on enterprise information system based on Internet of things

Framework model on enterprise information system based on Internet of things International Journal of Intelligent Information Systems 2014; 3(6): 55-59 Published online December 22, 2014 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20140306.11 ISSN: 2328-7675

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

CURRICULUM VITAE. Taha Abdelshafy Abdelhakim Khalaf. Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt.

CURRICULUM VITAE. Taha Abdelshafy Abdelhakim Khalaf. Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt. CURRICULUM VITAE Taha Abdelshafy Abdelhakim Khalaf Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt. Contact Addresses: 116 Electrical Engineering Dept. Faculty of Engineering

More information

Quality Expectations of Mobile Subscribers

Quality Expectations of Mobile Subscribers Paper Quality Expectations of Mobile Subscribers Przemysław Gilski and Jacek Stefański Department of Radio Communication Systems and Networks, Gdańsk University of Technology, Gdańsk, Poland Abstract Mobile

More information

QUALITY OF SERVICE IN TELECOMMUNICATION NETWORKS

QUALITY OF SERVICE IN TELECOMMUNICATION NETWORKS QUALITY OF SERVICE IN TELECOMMUNICATION NETWORKS Technical University of Berlin, Franklinstr., Berlin, Germany Keywords: Quality of Service, Telecommunications, Convergence, Congestion Control, Service

More information

Distributed Configuration and Load Balancing in Wireless Networks

Distributed Configuration and Load Balancing in Wireless Networks Distributed Configuration and Load Balancing in Wireless Networks Giorgio Nunzi, Simon Schütz, Marcus Brunner, Sandra Tartarelli { nunzi, schuetz, brunner, tartarelli } @ netlab.nec.de Outline Motivations

More information

SICSA SDN Workshop Event Report

SICSA SDN Workshop Event Report SICSA SDN Workshop Event Report Summary: 1. The workshop was held successfully on 19 September 2013 at the Informatics Forum within the School of Informatics, University of Edinburgh. 2. The event has

More information

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004 Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905

More information

Implementation of Video Voice over IP in Local Area Network Campus Environment

Implementation of Video Voice over IP in Local Area Network Campus Environment Implementation of Video Voice over IP in Local Area Network Campus Environment Mohd Nazri Ismail Abstract--In this research, we propose an architectural solution to integrate the video voice over IP (V2oIP)

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Grid Computing: Telco Perspective

Grid Computing: Telco Perspective International Telecommunication Union ITU-T Grid Computing: Telco Perspective Rick Schlichting Director, Software Systems Research AT&T Labs Research, USA ITU-T/OGF Workshop on Next Generation Networks

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

Demo 1. Network Path and Quality Validation in the Evolved Packet Core Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer

More information

Ming-Hsing Chiu. Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 EDUCATION

Ming-Hsing Chiu. Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 EDUCATION Ming-Hsing Chiu Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 Mandeville, LA 70471 e-mail: mchiu@selu.edu EDUCATION Ph.D. in Computer Science, University of Central Florida, May 99. Dissertation

More information

Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot. 2015. március 12.

Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot. 2015. március 12. Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz Mérés, NCT, kvantumállapot 2015. március 12. Tegnap még összefonódtam, mára megmértek 2015.03.18. 2 Slides for Quantum Computing and

More information

Information Systems and Electronic Communications in Logistics Management

Information Systems and Electronic Communications in Logistics Management Information Systems and Electronic Communications in Logistics Management Ephrem Eyob, Virginia State University, Petersburg, VA 23806 eeyob@vsu.edu ABSTRACT Telecommunications and Networking Technologies

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure

TCP/IP Jumbo Frames Network Performance Evaluation on A Testbed Infrastructure I.J. Wireless and Microwave Technologies, 2012, 6, 29-36 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.05 Available online at http://www.mecs-press.net/ijwmt

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

Next-Generation Mobile Network

Next-Generation Mobile Network Next-Generation Mobile Network Tsuguo Kato The number of people using mobile phones in the world has exceeded 4.5 billion and this figure is continuing to grow. For the past several years, mobile data

More information

119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, kangsw}@icu.ac.kr 2 InfraLab, Korea Telecom

119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, kangsw}@icu.ac.kr 2 InfraLab, Korea Telecom A Mobility Management Scheme using - for Realtime Services across Heterogeneous Networks Hyelim Park 1 Myungchul Kim 1 Sooyong Lee 1 Sungwon Kang 1 Yongho Kim 2 1 School of Engineering, Information and

More information

Performance Monitoring on Networked Virtual Environments

Performance Monitoring on Networked Virtual Environments ICC2129 1 Performance Monitoring on Networked Virtual Environments Christos Bouras, Eri Giannaka Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet

More information

An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems

An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming

A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,

More information

Views on Wireless Network Convergence

Views on Wireless Network Convergence Views on Wireless Network Convergence Yan PENG, Bin XIA, Meng LIANG Version 1.0 Agenda Motivations for Wireless Network Convergence Convergence Categories Issues on IP based Convergence A Possible Evolution

More information

The Internet of the future: What could it be and what are the challenges

The Internet of the future: What could it be and what are the challenges The Internet of the future: What could it be and what are the challenges Daniel Kofman Prof. at Telecom ParisTech CTO RAD Data Communications 1st Japan EU Symposium on the "New Generation Network" and

More information

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks A Multiple Access Protocol for Multimedia Transmission over Wireless Networks Hong Yu and Mohammed Arozullah Department of Electrical Engineering and Computer Science Capitol College, Maryland, USA yhong@capitol-college.edu

More information

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network Ms.Hetal Surti PG Student, Electronics & Communication PIT, Vadodara E-mail Id:surtihetal99@gmail.com Mr.Ketan

More information

Continuous network discovery using Opportunistic Scanning

Continuous network discovery using Opportunistic Scanning Continuous network discovery using Opportunistic Scanning Authors: Date: 2009-11-17 Slide 1 Abstract This presentation is in response to WNG requesting more information on the capability of 802.11 to support

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

Qosmet A solution for measuring Quality of Service

Qosmet A solution for measuring Quality of Service Qosmet A solution for measuring Quality of Service Contact: Dr. Jarmo Prokkola jarmo.prokkola@vtt.fi Tel: +358 20 722 2346 VTT (Technical Research Centre of Finland) P.O. Box 1100 (Street: Kaitoväylä 1,

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

An Enhanced SIP Proxy Server for Wireless VoIP in Wireless Mesh Networks

An Enhanced SIP Proxy Server for Wireless VoIP in Wireless Mesh Networks ADVANCES IN WIRELESS VOIP An Enhanced SIP Proxy Server for Wireless VoIP in Wireless Mesh Networks Bo Rong, International Institute of Telecommunications Yi Qian, National Institute of Standards and Technology

More information

Third Party Data Session Control in the Evolved Packet System

Third Party Data Session Control in the Evolved Packet System Third Party Data Session Control in the Evolved Packet System EVELINA PENCHEVA Faculty of Telecommunications Technical University of Sofia 8 Kliment Ohridski blvd., 1000 Sofia BULGARIA enp@tu-sofia.bg

More information

9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin

9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin Fu Lin Contact information Education Work experience Research interests Mathematics and Computer Science Division Phone: (630) 252-0973 Argonne National Laboratory E-mail: fulin@mcs.anl.gov 9700 South

More information

Next Generation Networks Convergence, evolution and roadmaps

Next Generation Networks Convergence, evolution and roadmaps Next Generation Networks Convergence, evolution and roadmaps Dr. Sathya Rao,Telscom Consulting, Berne Rao@telscom.ch NGN Applications Requirement IP Everywhere The Internet Protocol is becoming pervasive

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network Shin-ichi Kuribayashi 1 and Yasunori Osana 1 1 Department of Computer and Information Science, Seikei University,

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

Analysis of an Artificial Hormone System (Extended abstract)

Analysis of an Artificial Hormone System (Extended abstract) c 2013. This is the author s version of the work. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purpose or for creating

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

Title ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval

Title ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval Title ISSN SJR H index Country Foundations and Trends in Information 1554 1 Retrieval 0677 Q1 6,536 12 United States 2 Swarm and Evolutionary Computation 2210 6502 Q1 3,364 8 Netherlands 3 IEEE Transactions

More information

Monitoring Performances of Quality of Service in Cloud with System of Systems

Monitoring Performances of Quality of Service in Cloud with System of Systems Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department

More information

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

More information

MOBILE VIDEO WITH MOBILE IPv6

MOBILE VIDEO WITH MOBILE IPv6 MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),

More information

Realising the Virtual Home Environment (VHE) concept in ALL-IP UMTS networks

Realising the Virtual Home Environment (VHE) concept in ALL-IP UMTS networks December 2000 European Institute for Research and Strategic Studies in Telecommunications GmbH AT THE THEATRE: Remove the Theatre Bookmark from her homepage PDA ONLINE THEATRE-TICKETS BOOKING Project P920

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

A Scenario of Machine-to-Machine (M2M) Health Care Service

A Scenario of Machine-to-Machine (M2M) Health Care Service A Scenario of Machine-to-Machine (M2M) Health Care Service Jung-Ho Kim*, Ya-Ting Wei*, Jae-Oh Lee* * Dept. of Electrical, Electronics &, Korea University of Technology and Education, Korea {jungho32, weiyating,

More information