Abstract is missing.
- Performance Analysis of Reinforcement Learning for Achieving Context Awareness and Intelligence in Mobile Cognitive Radio NetworksKok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal. 1-8 [doi]
- Power Adaptive Cognitive Pilot Channel for Spectrum Co-existence in Wireless NetworksMd. Akbar Hossain, Roberto Passerone. 9-16 [doi]
- Zone-Based Distributed Sensing Scheme in Decentralized Cognitive Radio NetworksJae-Kark Choi, Sang-Jo Yoo. 17-22 [doi]
- Optimal Route Selection Method with Satellite System for Cognitive Wireless Network in Disaster Information NetworkNoriki Uchida, Goshi Sato, Kazuo Takahata, Yoshitaka Shibata. 23-29 [doi]
- A Dynamic Route Construction Method Based on Measured Characteristics of Radio Propagation in Wireless Sensor NetworksAkimitsu Kanzaki, Takahiro Hara, Shojiro Nishio, Yasuhiro Nose. 30-37 [doi]
- A Network Conditions Aware Geographical Forwarding Protocol for Real-Time Applications in Mobile Wireless Sensor NetworksGustavo Medeiros de Araújo, Leandro Buss Becker. 38-45 [doi]
- Variant Path Multiplicity Routing Algorithm Adapted to Importance of DataHiroki Tamura, Hikaru Kobayashi, Hiromitsu Tomozawa, Hiroshi Shigeno. 46-53 [doi]
- An Enhanced TCP Mechanism for Detecting and Differentiating the Loss of Retransmisssions over Wireless NetworksPrasanthi Sreekumari, Sang-Hwa Chung, Chang-Woo Ahn. 54-61 [doi]
- Mobile Service Business PatternsMarkus Aleksy, Bernd Stieger. 62-68 [doi]
- Impact of Mobility Patterns on the Performance of a Disruption Tolerant Network with Multi-radio Energy ConservationIyad Tumar, Anuj Sehgal, Jürgen Schönwälder. 69-76 [doi]
- Chordal Distance-Based User Selection Algorithm for the Multiuser MIMO Downlink with Perfect or Partial CSITBo Zhou, Baoming Bai, Ying Li, Daqing Gu, Yajuan Luo. 77-82 [doi]
- Design, Implementation and Evaluation of Virtual Resource Description and Clustering FrameworkHoussem Medhioub, Ines Houidi, Wajdi Louati, Djamal Zeghlache. 83-89 [doi]
- Experimantal Analysis of Cheon s Algorithm Against Pairing-Friendly CurvesTetsuya Izu, Masahiko Takenaka, Masaya Yasuda. 90-96 [doi]
- Anomaly Detection Using Chi-square Values Based on the Typical Features and the Time DeviationShunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi. 97-104 [doi]
- A Survey on Trust Management for VANETsJie Zhang. 105-112 [doi]
- Two-Stage Classification Model to Detect Malicious Web PagesVan Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk. 113-120 [doi]
- Detecting Intruders Using a Long Connection Chain to Connect to a HostWei Ding, Shou-Hsuan Stephen Huang. 121-128 [doi]
- Perfect Privacy Preserving in Automated Trust NegotiationHiroaki Kikuchi, Tangtisanon Pikulkaew. 129-134 [doi]
- Data Caching for Enhancing AnonymityRajiv Bagai, Bin Tang. 135-142 [doi]
- Trustworthiness-Based Broadcast Algorithm in Scalable P2P GroupAilixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 143-150 [doi]
- Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic ProgrammingJianhua Yang, Lydia Ray, Guoqing Zhao. 151-158 [doi]
- A Proposal of Four-Panel Cartoon CAPTCHATakumi Yamamoto, Tokuichiro Suzuki, Masakatsu Nishigaki. 159-166 [doi]
- Objective Trustworthiness of Acquaintances in Peer-to-Peer (P2P) Overlay NetworksSoichi Sawamura, Admir Barolli, Ailixier Aikebaier, Makoto Ikeda, Makoto Takizawa. 167-174 [doi]
- Event-Based Alert Correlation System to Detect SQLI ActivitiesFaeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, Andrea J. Cullen. 175-182 [doi]
- An Empirical Analysis of the Impact of Online Reviews on Product Sales in the Chinese ContextHui Fang, Qinghua Zhu, Jie Zhang. 183-190 [doi]
- Event Access Expressions: A Business User Language for Analyzing Event StreamsSzabolcs Rozsnyai, Hannes Obweger, Josef Schiefer. 191-199 [doi]
- PPMLT: A Pipeline Based Processing Model of Long TransactionsYin Zhu, Feilong Tang, Ilsun You, Lin Lou, Minyi Guo, Yao Shen. 200-207 [doi]
- An Adaptive Fast Paxos for Making Quick Everlasting DecisionsMichel Hurfin, Izabela Moise, Jean-Pierre Le Narzul. 208-215 [doi]
- Solving the PMC-Based System-Level Fault Diagnosis Problem Using Hopfield Neural NetworksMourad Elhadef. 216-223 [doi]
- Ideal StabilizationMikhail Nesterenko, Sébastien Tixeuil. 224-231 [doi]
- Simple, Weakly-coupled, Invisible Middleware (SWIM)Martin Bateman, Saleem Bhatti. 232-239 [doi]
- Towards Verifying Global Properties of Adaptive Software Based on Linear Temporal LogicYongwang Zhao, Jing Li, Dou Sun, Dianfu Ma. 240-247 [doi]
- A Frequent Pattern Mining Approach for ADLs Recognition in Smart EnvironmentsBelkacem Chikhaoui, Shengrui Wang, Hélène Pigot. 248-255 [doi]
- Proposal of the Disaster-Relief Training System Using the Electronic Triage TagHiroaki Kojima, Kentaro Nagahashi, Ken-ichi Okada. 256-263 [doi]
- An RFID-Based Reminder System for Smart HomeHui-Huang Hsu, Cheng-Ning Lee, Yu-Fan Chen. 264-269 [doi]
- Determining Writing Genre: Towards a Rubric-based Approach to Automated Essay GradingHon Wai Lam, Tharam S. Dillon, Elizabeth Chang. 270-274 [doi]
- A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous SystemsLaiping Zhao, Yizhi Ren, Kouichi Sakurai. 275-282 [doi]
- Time Series Analysis of P2P Networks to Improve Data AvailabilitySanaullah Nazir, Manfred Hauswirth. 283-290 [doi]
- QoS-Aware Distributed Replica Placement in Hierarchical Data GridsMohammad Shorfuzzaman, Peter Graham, M. Rasit Eskicioglu. 291-299 [doi]
- A Content-Based Publish/Subscribe over Two-Tier DHT Utilizing Domain OntologyMayank Pandey, Banshi Dhar Chaudhary. 300-306 [doi]
- Object-Based Methodology for XML Data Partitioning (OXDP)Norah Saleh Alghamdi, J. Wenny Rahayu, Eric Pardede. 307-315 [doi]
- Evaluation of the Structured Bloom Filters Based on SimilarityHiroshi Sakuma, Fumiaki Sato. 316-323 [doi]
- A Multi-layered Model for Scalable Group Communication in P2P Overlay NetworksIsamu Tsuneizumi, Ailixier Aikebaier, Makoto Ikeda, Tomoya Enokido, Makoto Takizawa. 324-331 [doi]
- Scanning Environments with Swarms of Learning Birds: A Computational Intelligence Approach for Managing DisastersMehmet Emin Aydin, Nik Bessis, Eleana Asimakopoulou, Fatos Xhafa, Joyce Y. Wu. 332-339 [doi]
- VM Co-scheduling: Approximation of Optimal Co-scheduling in Data CenterWei Yan, Li Zhou, Chuang Lin. 340-347 [doi]
- Evolutionary Optimal Virtual Machine Placement and Demand Forecaster for Cloud ComputingChing Chuen Teck Mark, Dusit Niyato, Chen-Khong Tham. 348-355 [doi]
- A Theory-Oriented Introduction to Wait-Free Synchronization Based on the Adaptive Renaming ProblemSergio Rajsbaum, Michel Raynal. 356-363 [doi]
- Improving Connectivity of Nodes in Mobile WSNSamar Sajadian, Alia Ibrahim, Edison Pignaton de Freitas, Tony Larsson. 364-371 [doi]
- Group Mobility Support Protocol for Mobile Sinks Based on Grid Clusters in Wireless Sensor NetworksSoochang Park, Euisin Lee, Hosung Park, Jeongcheol Lee, Sang-Ha Kim. 372-378 [doi]
- Data Dissemination Scheme for Mobile Sink Group Based on Movement Behavior in Wireless Sensor NetworksJeongcheol Lee, Hosung Park, Seungmin Oh, Yongbin Yim, Sang-Ha Kim. 379-384 [doi]
- An Instantaneous Data Dissemination Mechanism with Mobile Sinks in Wireless Sensor NetworkYing-Hong Wang, Kuo-Feng Huang, Yang-Ming Huang, Shao-Wei Tsao. 385-390 [doi]
- Impact of MAC on Localization in Large-Scale Seabed Sensor NetworksJong-Pil Kim, Hwee Pink Tan, Ho-Shin Cho. 391-396 [doi]
- Reliability Support Protocol for Continuous Object Detection in Large-Scale Wireless Sensor NetworksEuisin Lee, Soochang Park, Sang-Ha Kim, Ki-dong Nam, SungKee Noh. 397-403 [doi]
- A Multi-hop Dynamic Connectivity and Maintenance Algorithm for Wireless Sensor NetworksBo-Ruei Kao, K. Robert Lai. 404-410 [doi]
- A Simulation System for Multi Mobile Events in Wireless Sensor NetworksTao Yang, Gjergji Mino, Evjola Spaho, Leonard Barolli, Arjan Durresi, Fatos Xhafa. 411-418 [doi]
- EPC: Energy-Aware Probability-Based Clustering Algorithm for Correlated Data Gathering in Wireless Sensor NetworksXinxin Liu, Han Zhao, Xiaolin Li. 419-426 [doi]
- Human Mobility Based Stable Clustering for Data Aggregation in Singlehop Cell Phone Based Wireless Sensor NetworkMehul B. Shah, Prashant P. Verma, S. N. Merchant, Uday B. Desai. 427-434 [doi]
- Distributed Data Gathering with Graded Node Distribution in Sensor Networks to Maximize LifetimePunyasha Chatterjee, Nabanita Das. 435-442 [doi]
- Holistic Optimization of Real-Time IEEE 802.15.4/ZigBee NetworksMyung-Gon Park, Kang-Wook Kim, Chang-Gun Lee. 443-450 [doi]
- IEEE 802.15.4 Network Emulation TestbedRazvan Beuran, Junya Nakata, Yasuo Tan, Yoichi Shinoda. 451-458 [doi]
- Managing Data Access on Clouds: A Generic Framework for Enforcing Security PoliciesCristina Basescu, Alexandra Carpen-Amarie, Catalin Leordeanu, Alexandru Costan, Gabriel Antoniu. 459-466 [doi]
- Privacy-Preserving Data MashupMahmoud Barhamgi, Djamal Benslimane, Chirine Ghedira, Alda Lopes Gançarski. 467-474 [doi]
- Design and Analysis of a Secure Routing Protocol Algorithm for Wireless Sensor NetworksHongbing Cheng, Chunming Rong, Geng Yang. 475-480 [doi]
- Privacy Protected Query Processing with Road Network EmbeddingFuyu Liu, Yao Hua Ho, Kien A. Hua. 481-487 [doi]
- Detecting Forged Acknowledgements in MANETsNan Kang, Elhadi Shakshuki, Tarek R. Sheltami. 488-494 [doi]
- Cooperative Security in Vehicular Communication SystemsM hamed Chammem, Mohamed Hamdi, Noureddine Boudriga. 495-500 [doi]
- Route Manipulation Attack in Wireless Mesh NetworksAnderson Nunes Paiva Morais, Ana R. Cavalli. 501-508 [doi]
- A Signal Strength Based Location Estimation Algorithm within a Wireless NetworkKevin Chin Yiu Shum, Quan Jia Cheng, Joseph Kee-Yin Ng, Donna Ng. 509-516 [doi]
- Approximation and Heuristic Algorithms for End-System Based Application-Layer Multicast for Voice ConferencesHwa-Chun Lin, Hsiu-Ming Yang. 517-525 [doi]
- Social Influence on Being a Pay User in Freemium-based Social NetworksHao Wang, Alvin Chin. 526-533 [doi]
- Need for Symmetry: Addressing Privacy Risks in Online Social NetworksCong Tang, Yonggang Wang, Hu Xiong, Tao Yang, Jian-bin Hu, Qingni Shen, Zhong Chen. 534-541 [doi]
- Development of Community Space for Multilingual Informal Communication Support Using Augmented Reality and Second LifeTakashi Yoshino, Katsuya Ikenobu. 542-547 [doi]
- MooM - A Prototype Framework for Management of Ontology MappingsHendrik Thomas, Rob Brennan, Declan O Sullivan. 548-555 [doi]
- Extraction and Grounding of Protein Mutations via Semantic Integration of Text and Sequence InformationChristopher J. O. Baker, Rajaraman Kanagasabai. 556-563 [doi]
- Reallocation Criteria on Multi-server Web-based MORPG SystemMasaki Kohana, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura. 564-570 [doi]
- The ALSWEB Framework: A Web-based Framework for the Linguistic Atlas of Sicily ProjectDario Pirrone, Giuseppe Russo, Antonio Gentile, Roberto Pirrone, Salvatore Gaglio. 571-577 [doi]
- Towards Defining and Assessing the Non-functional Properties of Communities of Web ServicesErbin Lim, Philippe Thiran, Zakaria Maamar. 578-585 [doi]
- A Qualitative Approach to Effort Judgment for Web Service Composition Based SOA ImplementationsZheng Li, Liam O Brien. 586-593 [doi]
- Geospatial Web Service for Remote Sensing Data VisualizationChunyang Hu, Yongwang Zhao, Jing Li, Dianfu Ma, Xuan Li. 594-601 [doi]
- A Web Service Recommender System Using Vector Space Model and Latent Semantic IndexingNguyen Ngoc Chan, Walid Gaaloul, Samir Tata. 602-609 [doi]
- Services Between Video Producers and Broadcasters: Do We Need a Standard?Jesus M. Barbero, Eugenio Santos, Abraham Gutierrez. 610-616 [doi]
- COBS: Realizing Decentralized Infrastructure for Collaborative Browsing and SearchChristian von der Weth, Anwitaman Datta. 617-624 [doi]
- Enhanced Healthcare Environment by Means of Proactive Context Aware Service DiscoveryGiuseppe Fenza, Domenico Furno, Vincenzo Loia. 625-632 [doi]
- Improving the Performance of N-ary RAID by Writing with XOR OperationYuji Nakamura, Minoru Uehara. 633-638 [doi]
- Semi-random Kite Codes over Fading ChannelsBo Bai, Baoming Bai, Xiao Ma. 639-645 [doi]
- A Systematic Evaluation of Interference Characteristics in 802.11-Based Wireless NetworksWee Lum Tan, Marius Portmann, Peizhao Hu. 646-652 [doi]
- The Design of Network Low Density Parity Check Codes for Wireless Multiple-Access Relay NetworksYing Li, Lili Wang, Yue Sun. 653-658 [doi]
- Inferring Loss Causes to Improve Link Rate Adaptation in Wireless NetworksParag Kulkarni, Benjamin Motz, Tim Lewis, Sadia Quadri. 659-666 [doi]
- Efficient Packet Sequencing for Dynamic Multicast LayersVincent Lucas, Jean-Jacques Pansiot, Dominique Grad, Benoît Hilt. 667-674 [doi]
- Layered Cutting Scheme for Packet ClassificationYeim-Kuan Chang, Han-Chen Chen. 675-681 [doi]
- Performance and Optical Cost Analysis of Shared Fiber Delay Line Based Two-Stage Optical Packet SwitchAhmed Galib Reza, Hyotaek Lim. 682-687 [doi]
- Set Pruning Segment Trees for Packet ClassificationYeim-Kuan Chang, Hsin-Mao Chen. 688-694 [doi]
- An Integrated Power Consumption Model for Communication and Transaction Based ApplicationsTomoya Enokido, Ailixier Aikebaier, Makoto Takizawa. 695-702 [doi]
- Reducing Total ICT Power Consumption with Collaboration Among End Systems, Communication Network and Power NetworkShin-ichi Kuribayashi, Yasunori Osana. 703-707 [doi]
- Impact of Delay Variability on LEDBAT PerformanceAmuda James Abu, Steven Gordon. 708-715 [doi]
- Can DCCP Replace UDP in Changing Network Conditions?Yao-Nan Lien, Yu-Chi Ding. 716-723 [doi]
- A Network Resource Management Framework for Multimedia Applications Distributed in Heterogeneous Home NetworksMaxime Louvel, Pierre Bonhomme, Jean-Philippe Babau, Alain Plantec. 724-731 [doi]
- A User Dependent System for Multi-view Video TransmissionZiyuan Pan, Yoshihisa Ikuta, Masaki Bandai, Takashi Watanabe. 732-739 [doi]
- CAMEL-SIF: A Gateway for Service Invocation from Circuit Switched Domain to IP Multimedia SubsystemWei-Kuo Chiang, Zih-Hao Luo. 740-747 [doi]
- Video-Popularity-Based Caching Scheme for P2P Video-on-Demand StreamingTakaya Fujimoto, Rei Endo, Kei Matsumoto, Hiroshi Shigeno. 748-755 [doi]
- A Study on the Performance of Search Methods for Mesh Router Nodes Placement ProblemAdmir Barolli, Fatos Xhafa, Christian Sánchez, Makoto Takizawa. 756-763 [doi]
- On Placement of Passive Stationary Relay Points in Delay Tolerant NetworkingSaeed Shahbazi, Aaron Harwood, Shanika Karunasekera. 764-771 [doi]
- Multi-hop Auction-Based Bandwidth Allocation in Wireless Ad Hoc NetworksBo-Ruei Kao, Liang-Ku Lee, K. Robert Lai. 772-778 [doi]
- Experimental Results of a MANET Testbed in Indoor Stairs EnvironmentMakoto Ikeda, Elis Kulla, Masahiro Hiyama, Leonard Barolli, Makoto Takizawa. 779-786 [doi]
- Ad Hoc Communications for Emergency ConditionsArjan Durresi, Mimoza Durresi, Vamsi Paruchuri, Leonard Barolli. 787-794 [doi]