Abstract is missing.
- Intelligent handoff management with interference control for next generation wireless systemsShilpa Yogesh Tisgaonkar, Chih-Cheng Hung, Benny Bing. 1-6 [doi]
- An evolving power saving model for monitoring sensor networks using cellular automataRyan Barnard. 7-8 [doi]
- Cross-layer path computation for dynamic traffic grooming: in mesh WDM optical networksChunsheng Xin, Feng He. 9-13 [doi]
- Improving quality of service for streaming multimedia applications in ubiquitous mobile environmentRadhika Jain. 14-19 [doi]
- A packet processor for a learning-based routing protocolTaskin Koçak, Hakan Terzioglu. 20-25 [doi]
- A birth-death dynamic model of scale-free networksNarsingh Deo, Aurel Cami. 26-27 [doi]
- Multi-criteria approach in configuration of energy efficient sensor networksAlexander B. Bordetsky, Boris Peltsverger, Svetlana Peltsverger, Roman B. Statnikov. 28-29 [doi]
- Multi-level secure video streaming over SRTPLei Chen, Chung-wei Lee. 30-35 [doi]
- IFTP-W: a TCP-friendly protocol for multimedia applications over wireless networksHala ElAarag, Andrew Moedinger. 36-40 [doi]
- Bibliometric approach to community discoveryNarsingh Deo, Hemant Balakrishnan. 41-42 [doi]
- DOCSIS performance evaluation: piggybacking versus concatenationStefen Howard, Jim Martin. 43-48 [doi]
- An implementation of hierarchical signal processing on wireless sensor in TinyOS environmentChris Otto, John P. Gober, Reggie W. McMurtrey, Aleksandar Milenkovic, Emil Jovanov. 49-53 [doi]
- Simulating application level self-similar network traffic using hybrid heavy-tailed distributionsSong Luo, Gerald A. Marin. 54-58 [doi]
- The role of social structures in mobile ad-hoc networksParesh Dhakan, Ronaldo Menezes. 59-64 [doi]
- Setting up a Web100-Dummynet testbed for research in transport layer protocolsSteven Bassi, Miguel A. Labrador. 65-69 [doi]
- UbiquitousSurvey: a framework supporting mobile field survey data collection and analysisLei Zhu, Justin French, Christopher Oglesby. 70-74 [doi]
- Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs)H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li. 75-80 [doi]
- Power sensitive power control in ad networksNatarajan Meghanathan, András Faragó. 81-86 [doi]
- Relying on time synchronization for security in ad hoc networksDonald J. Scott. 87-91 [doi]
- A quantum no-key protocol for secure data communicationYoshito Kanamori, Seong-Moo Yoo, Mohammad Al-Shurman. 92-93 [doi]
- Next generation wireless systems using Markov decision process modelShilpa Yogesh Tisgaonkar, Chih-Cheng Hung, Benny Bing. 94-95 [doi]
- An architecture for high-speed execution of upper layer (4-7) network protocolsTaskin Koçak. 96-97 [doi]
- An efficient approximation to wait time in M/M/c queues with application to staffing planningSpyros Kontogiorgis, Richard W. Tibbs. 98-102 [doi]
- Decreasing broadcast in route discovery using vectors in mobile ad hoc networksMohammad Al-Shurman, Seong-Moo Yoo, Yoshito Kanamori. 103-104 [doi]
- The SONET ring transport planning problemVictor A. Clincy. 105-106 [doi]
- A variation of reporting center schemeYuanyuan Ding, Guangbin Fan. 107-111 [doi]
- RTP and TCP based MIDI over IP protocolsSaad Biaz, Richard O. Chapman, James Pate Williams. 112-117 [doi]
- Wireless course management systemVladimir Zanev, Rodney Clark. 118-123 [doi]
- Using genetic algorithm to minimize the effect of interference for broadband wireless access networkAisha Kigongo, Yenumula B. Reddy. 124-125 [doi]
- Sync-TCP in high-speed environmentsAyoob Khan, Dhaval M. Shah, Zhenyu Xu. 126-127 [doi]
- AQM performance in multiple congested link networksDeepak Vembar, Zhidian Du. 128-129 [doi]
- Common criteria requirements modeling and its uses for quality of information assurance (QoIA)Deepak S. Yavagal, Seok-Won Lee, Gail-Joon Ahn, Robin A. Gandhi. 130-135 [doi]
- Decision tree classifier for network intrusion detection with GA-based feature selectionGary Stein, Bing Chen, Annie S. Wu, Kien A. Hua. 136-141 [doi]
- Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theoryDong Yu, Deborah A. Frincke. 142-147 [doi]
- A dynamic data mining technique for intrusion detection systemsBruce D. Caulkins, Joohan Lee, Morgan C. Wang. 148-153 [doi]
- Preventing the capture of sensitive informationKhaled Hussain, Naveen Addulla, Sharon Rajan, Ghada S. Moussa. 154-159 [doi]
- State based authenticationSaeed Rajput, Jihong Chen, Sam Hsu. 160-165 [doi]
- A stochastic estimator/detector for mitigating denial of service attacksWilliam McLeod Rivera. 166-171 [doi]
- A simulation model of IS securityNorman Pendegraft, Mark Rounds, Deborah A. Frincke. 172-177 [doi]
- Information security models and metricsAndy Ju An Wang. 178-184 [doi]
- Simple certified e-check with a partial PKI solutionWen-Jung Hsin, Lein Harn. 185-190 [doi]
- A GUI for intrusion detection and related experiencesLarry Lee Reynolds Jr., Richard W. Tibbs, E. Joseph Derrick. 191-192 [doi]
- Early detection and propagation mitigation of worm programsXin Xu, Weihua Song, Vir V. Phoha. 193-194 [doi]
- Resource-constrained loop scheduling in high-level synthesisRehab F. Abdel-Kader. 195-200 [doi]
- A genetic programming formulation to evade proportional navigationDaniel Howard. 201-206 [doi]
- Categorization of common coupling in kernel based softwareLiguo Yu, Srini Ramaswamy. 207-210 [doi]
- Template extraction from candidate template set generation: a structure and content approachHang Su, Qiaozhu Mei. 211-216 [doi]
- Token-based dynamic trust establishment for web servicesZhengping Wu, Alfred C. Weaver. 217-222 [doi]
- Toward software requirements modularization using hierarchical clustering techniquesTurky N. Al-Otaiby, Mohsen AlSherif, Walter P. Bond. 223-228 [doi]
- Software-based dynamic thermal management for Linux systemsMark Bidewell. 229-234 [doi]
- The print scraping systemBrian Ray, JingJiang He, Chia-Chu Chiang, Jim Melescue. 235-236 [doi]
- Generative approaches for application tailoring of mobile devicesVictoria Davis, Jeffrey G. Gray, Joel Jones. 237-241 [doi]
- Application development for desktop and PDA-style devices: issues and lessons learnedTheodore (Ted) Roberts, Hisham M. Haddad. 242-247 [doi]
- Certified memory management for proof-carrying code: a region-based type system and runtime libraryNadeem Abdul Hamid. 248-249 [doi]
- Real-time intelligent program stock tradingKam Fui Lau. 250-255 [doi]
- Local and global analysis: complementary activities for increasing the effectiveness of requirements verification and validationLester O. Lobo, James D. Arthur. 256-261 [doi]
- Programming in the MPL-RM programming languageKevin Marth. 262-268 [doi]
- Open source license alternatives for software applications: is it a solution to stop software piracy?Luis E. Cuéllar. 269-274 [doi]
- Maintainability and reusability issues in CORBA-based systemsChia-Chu Chiang, Charles Wesley Ford. 275-280 [doi]
- Reducing application code complexity with vocabulary-specific XML language bindingsJules White, Boris Kolpackov, Balachandran Natarajan, Douglas C. Schmidt. 281-287 [doi]
- Supporting access control policies across multiple operating systemsLawrence Teo, Gail-Joon Ahn. 288-293 [doi]
- An experimental evaluation of a distributed Java compilerAndrew R. Dalton, Cindy Norris. 294-299 [doi]
- Project management for the 21:::st::: century: supporting collaborative design through risk analysisJamie L. Smith, Shawn A. Bohner, D. Scott McCrickard. 300-305 [doi]
- Object-oriented behavioral testing through trace generationAnastasia Tircuit, B. Belkhouche. 306-310 [doi]
- The use of dynamic tracing for troubleshootingHassan Pournaghshband, Chris S. Bullock. 311-314 [doi]
- The movable point problem and its resolution in object type graphsCong-Cong Xing, Boumediene Belkhouche. 315-320 [doi]
- An excel based Semantic email systemGuangming Xing, Rajesekhar Dandolu, Andrew Ernest. 321-326 [doi]
- JCPNet tool and automated analysis of distributed systemsXiaochuan Yi, Krys Kochut. 327-332 [doi]
- Exploring communication overheads and locking policies in a peer-to-peer synchronous collaborative editing systemJon A. Preston, Sushil K. Prasad. 333-334 [doi]
- Making digital tickets possible via the microsoft smartphoneWinard Britt. 335-336 [doi]
- Population dynamics visualization system for management of airborne biochemical agents attacksUfuoma Akoroda. 337-338 [doi]
- An online bookstore using JSP technologyJose Hughes. 339-340 [doi]
- Exploring the portability and extensibility of XML schema generated web applicationsAndrei Erdoss. 341-342 [doi]
- Customizing model-view-controller design pattern for Web controlled household appliances and devicesStefan Dimov, Vikas Vyas, Mike Schardt, Abdullah Faruque, Susrutha Narla, Haihua Fu. 343-344 [doi]
- A compression scheme for video conferencingSanmati Kamath. 345-346 [doi]
- Ontology-supported sharing and reuse of knowledge in diverse environmentsStanislav Ustymenko. 347-348 [doi]
- A web-based programming environment for LEGO mindstorms robotsAaron Garrett, David Thornton. 349-350 [doi]
- Visualization of an intelligent integrated health management system for rocket propulsionThomas Tickle. 351-352 [doi]
- Pure object-based domain model for enterprise systemsHang Wu. 353-354 [doi]
- Development of techniques for visualization of scalar and vector fields in an immersive environment (CAVE)Hari B. Bidasaria. 355-356 [doi]
- Population dynamics visualization system for management of airborne biochemical agents attacksUfuoma Akoroda. 357-358 [doi]
- NotiFly: enhancing design through claims-based personas and knowledge reuseJustin Belcher, Raheel Aidrus, Ben Congleton, Doug Hall, Shahzad Hussain, Matthew Jablonski, Theresa Klunk, D. Scott McCrickard. 359-364 [doi]
- Evolution of artificial agents in a realistic virtual environmentJonathan R. Hicks, Joseph A. Driscoll. 365-369 [doi]
- Acquiring and delivering lessons learned for NASA scientists and engineers: a dynamic approachSwapna Gupta, J. Scott Hawker, Randy K. Smith. 370-375 [doi]
- Image is everything: advancing HCI knowledge and interface design using the system imageJason Chong Lee, Christa M. Chewar, D. Scott McCrickard. 376-381 [doi]
- On the convergence of image compression and object recognitionMark S. Schmalz. 382-387 [doi]
- Using nonlinear dimensionality reduction in 3D figure animationA. Elizabeth Seward, Bobby Bodenheimer. 388-392 [doi]
- Interactive 3D terrain exploration and visualizationStephanie A. Smullen, Clinton W. Smullen III, Carlos M. Santa. 393-396 [doi]
- Relative localization from image sequencesBrian L. Stuart. 397-401 [doi]
- Visual aids to create a knowledge base with reusable objects across disciplinesLakshmi Prayaga. 402-403 [doi]
- A new framework for recovery of shape of the right ventricle from GBP SPECT imagesChunguang Ken Cao, Timothy S. Newman. 404-405 [doi]
- Monitor color and repetition as factors in human-computer interactionKatja A. Rodgers. 406-407 [doi]