Abstract is missing.
- Sensor Deployment as an Optimal Control ProblemAhmad Ababnah, Balasubramaniam Natarajan. 1-5 [doi]
- Swarming Overlay Construction StrategiesAnwar Al Hamra, Nikitas Liogkas, Arnaud Legout, Chadi Barakat. 1-6 [doi]
- Modeling the Effects of Variable Bandwidth on TCP ThroughputJia Zhou, Fengyuan Ren, Chuang Lin. 1-7 [doi]
- Quantum Transmission Integrity Mechanism for Indirect CommunicationTien-Sheng Lin, I-Ming Tsai, Sy-Yen Kuo. 1-6 [doi]
- A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANsKaigui Bian, Jung-Min Park 0001. 1-6 [doi]
- PTS: A Probability-Based Tag Selection Algorithm for RFID Systems with Recurring ReadingsLei Pan, Hongyi Wu. 1-6 [doi]
- HVR: History-Based Vector Routing for Delay Tolerant NetworksHyunwoo Kang, Dongkyun Kim. 1-6 [doi]
- Criticisms of Modelling Packet Traffic Using Long-Range DependenceRichard G. Clegg, Raul Landa, Miguel Rio. 1-5 [doi]
- Validation of a Traffic-Based CAC Method under General Channel Holding TimeNatalia Vassileva, Francisco Barceló-Arroyo. 1-7 [doi]
- Automatic Temporal Formatting of Multimedia Presentations Using Dynamic Petri NetsSusan Elias, Lisa Mathew, K. S. Easwarakumar, Richard Chbeir. 1-6 [doi]
- A Power-Efficient Scheme for Securing Multicast in Hierarchical Sensor NetworksJie Tian, Guiling Wang, Tan Yan, Wensheng Zhang 0001. 1-6 [doi]
- Location-Release Signature for Vehicular CommunicationsXiaodong Lin, Rongxing Lu, Xuemin Shen. 1-7 [doi]
- Fine Two-Phase Routing with Traffic MatrixEiji Oki, Ayako Iwaki. 1-5 [doi]
- Mass Purging of Stale TCP Flows in Per-Flow Monitoring SystemsGunwoo Nam, Pushkar Patankar, George Kesidis, Chita R. Das, Cetin Seren. 1-6 [doi]
- SC-FDE with OQPSK-Type Schemes: An Efficient Transmission Technique for Broadband Wireless SystemsRui Dinis, Paulo Montezuma, Tiago Marques. 1-6 [doi]
- Pervasive Internet Access by Vehicles through Satellite Receive-Only TerminalsBaber Aslam, Ping Wang, Cliff Changchun Zou. 1-6 [doi]
- Proxy-Based Security Audit System for Remote Desktop AccessShi-hai Huang, Chuang Lin, An an Luo, Zhen Chen, Xin Jiang, Kai Wang, Hui Zhang, Xuehai Peng. 1-5 [doi]
- Path-Centric On-Demand Rate Adaptation for Mobile Ad Hoc NetworksSaehoon Kang, Chansu Yu, Chita R. Das, Guohong Cao. 1-6 [doi]
- Hop-Count Based Techniques for Passive Target Localization in Sensor NetworksDuc A. Tran, Thinh P. Nguyen. 1-8 [doi]
- An Interoperable Internet Scale Solution for RFID Network SecurityTingting Mao, John R. Williams, Abel Sanchez. 1-6 [doi]
- Challenges for High-Speed Protocol-Independent Redundancy Eliminating SystemsMaxim Martynov. 1-6 [doi]
- Optimal Wireless Network Restoration under Jamming AttackShanshan Jiang, Yuan Xue. 1-6 [doi]
- Cross-Layer Scheduling for Multiuser Downlink Transmissions with Opportunistic RelayingHui Zhou, Pingyi Fan, Hong-Chuan Yang. 1-6 [doi]
- A New Hierarchical Waveband Assignment Algorithm for Multi-Granular Optical NetworksYang Wang, Xiaojun Cao. 1-6 [doi]
- Optimal Relay Node Placement in Hierarchical Sensor Networks with Mobile Data CollectorAtaul Bari, Da Teng, Arunita Jaekel. 1-6 [doi]
- Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID TagsYanping Zhang, Yang Xiao. 1-5 [doi]
- A Study on the Correlation between QoE of 4K Super High Definition Video Streamings and QoS of NetworkMasahiko Kitamura, Takahiro Murooka, Mitsuhiro Teshima, Hisaya Hadama, Atsushi Takahara, Tetsuro Fujii. 1-6 [doi]
- ODON: An On-Demand Security Overlay for Mission-Critical ApplicationsJinu Kurian, Ajay Kulkarni, Hai Trong Vu, Kamil Saraç. 1-6 [doi]
- Identification of Different TCP Versions Based on Cluster AnalysisJunpei Oshio, Shingo Ata, Ikuo Oka. 1-6 [doi]
- Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation SchemeMooi Choo Chuah, Peng Yang. 1-6 [doi]
- Energy Aware Distributed Clustering in Two-Tiered Sensor NetworksAtaul Bari, Ritu Chaturvedi, Arunita Jaekel, Subir Bandyopadhyay. 1-8 [doi]
- A Case Study of QoS Provisioning in TV-Band Cognitive Radio NetworksAshwini Kumar, Kang G. Shin, Jianfeng Wang, Kiran S. Challapali. 1-6 [doi]
- Design of a Flexible and Reliable Gateway to Collect Sensor Data in Intermittent Power EnvironmentsMarco Zennaro, Antoine B. Bagula. 1-6 [doi]
- VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer NetworksHuanyu Zhao, Xiaolin Li. 1-6 [doi]
- Team Incentives in BitTorrent SystemsRafit Izhak-Ratzin, Nikitas Liogkas, Rupak Majumdar. 1-8 [doi]
- Cognitive Radio with Reinforcement Learning Applied to Multicast Downlink Transmission and Distributed Occupancy DetectionMengfei Yang, David Grace. 1-6 [doi]
- Robust Sybil Detection for MANETsAthichart Tangpong, George Kesidis, Hung-Yuan Hsu, Ali R. Hurson. 1-6 [doi]
- ScoutNode: A Multimodal Sensor Node for Wide Area Sensor NetworksAbhishek Sharma, Kevin Yoon, David Vanhorn, Matheiu Dube, Volus McKenna, Michael S. Bauer. 1-6 [doi]
- Self-Learning Peer-to-Peer Traffic ClassifierRam Keralapura, Antonio Nucci, Chen-Nee Chuah. 1-8 [doi]
- Real-Time Data Allocation Scheme Based on Dynamic Replacement in Burst Photonic NetworksNattapong Kitsuwan, Eiji Oki, Naoto Kishi, Tetsuya Miki. 1-6 [doi]
- Lightweight Deployable Software Monitoring for Sensor NetworksMustafa Hammad, Jonathan Cook. 1-6 [doi]
- Power Aware Differentiated Routing (PADR) in Wireless Sensor NetworksAlunyu Andrew Egwar, Idris A. Rai. 1-6 [doi]
- A Low-Cost Anonymous Routing Protocol in MANETsLianyu Zhao, Haiying Shen. 1-6 [doi]
- Estimation of MIMO Channel Using Suboptimal Particle FilteringHai H. Hoang, Bing W. Kwan. 1-5 [doi]
- Cooperative Spectrum Sensing for IEEE 802.22 WRAN SystemSunmin Lim, Hoiyoon Jung, Myung Sun Song. 1-5 [doi]
- A Systematic Study on Peer-to-Peer BotnetsPing Wang, Lei Wu, Baber Aslam, Cliff Changchun Zou. 1-8 [doi]
- A New Lossless FMO Removal Scheme for H.264 VideosCamille Mazataud, Benny Bing. 1-6 [doi]
- Utilizing Automatic Underwater Vehicles to Prolong the Lifetime of Underwater Sensor NetworksAndong Zhan, Guihai Chen, Wei Wang. 1-6 [doi]
- Why Anti-Virus Products Slow Down Your Machine?Wei Yan, Nirwan Ansari. 1-6 [doi]
- Energy Balanced Model for Data Gathering in Wireless Sensor Networks with Fixed and Mobile SinksGeorge F. Zaki, Hany M. Elsayed, Hassanein H. Amer, Magdy S. El-Soudani. 1-6 [doi]
- Optimizing Deadline-Driven Bulk Data Transfers in Overlay NetworksAndrei Agapi, Sebastien Soudan, Marcelo Pasin, Pascale Vicat-Blanc Primet, Thilo Kielmann. 1-8 [doi]
- Peak-to-Average Power Ratio Reduction in MIMO-OFDM with Trellis Exploration AlgorithmDalin Zhu, Balasubramaniam Natarajan, Justin S. Dyer. 1-6 [doi]
- Connectivity Aware Protected Working Lightpath EnvelopeRong He, Kee Chaing Chua, Gurusamy Mohan. 1-6 [doi]
- Some Traffic Management Practices Are UnreasonableScott Jordan. 1-6 [doi]
- Improving TCP Goodput over Wireless Networks Using Kernel-Level Data CompressionMoo-Yeol Lee, Hyun-Wook Jin, Ikhwan Kim, Taehyoun Kim. 1-6 [doi]
- Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor NetworksYiwei Wu, Yingshu Li. 1-6 [doi]
- Assessing the Handover Approaches for Heterogeneous Wireless NetworksLucian Suciu, Mounir Benzaid, Servane Bonjour, Pierrick Louin. 1-6 [doi]
- A Localization Algorithm for Nonuniform Propagation Environments in Sensor NetworksNoriaki Kitakoga, Tomoaki Ohtsuki. 1-5 [doi]
- Stochastic Timing Analysis of the AES Cipher Algorithm over a Correlated Fading ChannelKyungtae Kang, Dong Kun Noh. 1-6 [doi]
- Measurements and Analysis of M/M/1 and M/M/c Queuing Models of the SIP Proxy ServerSureshkumar V. Subramanian, Rudra Dutta. 1-7 [doi]
- Exploring Gate-Limited Analytical Models for High Performance Network Storage ServersGlenford E. Mapp, Dhawal N. Thakker, Orhan Gemikonakli. 1-5 [doi]
- Efficient Multicast Routing in MANETs Using Prefix LabelsJ. J. Garcia-Luna-Aceves, Dhananjay Sampath. 1-8 [doi]
- A Framework to Study the Molecular Communication SystemSachin Kadloor, Raviraj Adve. 1-6 [doi]
- Re-Configurable Parallel Match Evaluators Applied to Scheduling Schemes for Input-Queued Packet SwitchesSpiridon F. Beldianu, Roberto Rojas-Cessa, Eiji Oki, Sotirios G. Ziavras. 1-6 [doi]
- Evaluation of the Performance of Spontaneously Deployed, Independent NetworksIvan Gudymenko, Waltenegus Dargie, Alexander Schill. 1-6 [doi]
- On the Benefits of Early Filtering of Botnet Unwanted TrafficPrasanth Kalakota, Chin-Tser Huang. 1-6 [doi]
- Is Light-Tree Structure Optimal for Multicast Routing in Sparse Light Splitting WDM Networks?Fen Zhou, Miklós Molnár, Bernard Cousin. 1-7 [doi]
- A Novel Routing Algorithm Based on Ant Colony System for Wireless Sensor NetworksXin Guan, Lin Guan, Xin Gang Wang, Tomoaki Ohtsuki. 1-5 [doi]
- Anomaly Detection with Sensor Data for Distributed SecurityBrian Quanz, Hongliang Fei, Jun Huan, Joseph B. Evans, Victor Frost, Gary J. Minden, Daniel D. Deavours, Leon Searl, Daniel DePardo, Martin Kuehnhausen, Daniel Fokum, Matt Zeets, Angela Oguna. 1-6 [doi]
- Search Co-Ordination by Semantic Routed NetworkAmitava Biswas, Suneil Mohan, Rabi N. Mahapatra. 1-7 [doi]
- Optimizing Authentication in Media Independent Handovers Using IEEE 802.21Antonio Izquierdo, Nada Golmie, Richard Rouil. 1-6 [doi]
- Dynamic Multicast Routing and Wavelength Assignment with Minimal Conversions in Delay-Constrained WDM NetworksKeen-Mun Yong, Tee Hiang Cheng, Gee-Swee Poo. 1-6 [doi]
- DAL: A Distributed Localization in Sensor Networks Using Local Angle MeasurementBin Tang, Xianjin Zhu, Anand Prabhu Subramanian, Jie Gao. 1-6 [doi]
- Multi-Engine Packet Classification Hardware AcceleratorAlan Kennedy, Zhen Liu, Xiaojun Wang, Bin Liu 0001. 1-6 [doi]
- Underwater Sensor Barriers with Auction AlgorithmsStanley J. Barr, Benyuan Liu, Jie Wang. 1-6 [doi]
- CoSAC: Coordinated Session-Based Admission Control for Multi-Tier Internet ApplicationsSireesha Muppala, Xiaobo Zhou. 1-6 [doi]
- Interconnecting WSNs with Fast Moving Nodes: Experiments in Real-World ScenariosPedro Melo, Luís D. Pedrosa, Rui M. Rocha. 1-6 [doi]
- A Trade-Off Analysis of Energy Detectors and Partitioned Search for Primary DetectionBirsen Sirkeci Mergen, Vishal Sawant, Robert Morelos-Zaragoza. 1-4 [doi]
- A Parsimonious Statistical Protocol for Generating Power-Law NetworksShilpa Ghadge, Timothy Killingback, Bala Sundaram, Duc A. Tran. 1-6 [doi]
- Practical Identity-Based Key Agreement For Secure Communication in Sensor NetworksPiotr Szczechowiak, Martin Collier. 1-6 [doi]
- Intercarrier Compensation in Unilateral and Bilateral ArrangementsRuzana Davoyan, Jörn Altmann, Wolfgang Effelsberg. 1-6 [doi]
- How s My Network? A Java Approach to Home Network MeasurementAlan Ritacco, Craig E. Wills, Mark Claypool. 1-7 [doi]
- Providing Grid Schedulers with Passive Network MeasurementsYehia El-khatib, Christopher Edwards, Michael Mackay, Gareth Tyson. 1-6 [doi]
- On Reducing the Inter-AS Traffic of Box-Powered CDNYiping Chen, Jimmy Leblet, Gwendal Simon. 1-6 [doi]
- Error Resilience Using Leaky Source Channel Prediction SchemeRamdas Satyan, Sunday Nyamweno, Fabrice Labeau. 1-5 [doi]
- A Simulation Framework for Energy-Aware Wireless Sensor Network ProtocolsAdrian F. Kacso, Roland Wismüller. 1-7 [doi]
- Assignment of Roles and Channels for a Multichannel MAC in Wireless Mesh NetworksFabrice Theoleyre, Benoît Darties, Andrzej Duda. 1-6 [doi]
- On Transport Protocol Performance Measurement over 10Gbps High Speed Optical NetworksYixin Wu, Suman Kumar, Seung-Jong Park. 1-6 [doi]
- A Comparison of Geo-Location and Spectrum Sensing in Cognitive RadioStephen J. Shellhammer. 1-6 [doi]
- Statistical Geolocation of Internet HostsInja Youn, Brian L. Mark, Dana Richards. 1-6 [doi]
- Bounding Queuing Delay in a Router Based on Superposition of N MMBP Arrival ProcessLee Booi Lim, Lin Guan, Alan Grigg, Iain W. Phillips, Xin Gang Wang, Irfan-Ullah Awan. 1-6 [doi]
- SDS: Distributed Spatial-Temporal Similarity Data Storage in Wireless Sensor NetworksHaiying Shen, Ting Li, Lianyu Zhao, Ze Li. 1-6 [doi]
- Reducing Buffer Requirements in Core Routers Using Dynamic BufferingGirish B. C., Ramaswamy Govindarajan. 1-6 [doi]
- Routing and Scheduling for Time-Shift Advance ReservationAnkitkumar N. Patel, Yi Zhu, Qingya She, Jason P. Jue. 1-6 [doi]
- MAC Protocol Adaptation in Cognitive Radio Networks: An Experimental StudyKuo-Chun Huang, Xiangpeng Jing, Dipankar Raychaudhuri. 1-6 [doi]
- BPAB: Binary Partition Assisted Emergency Broadcast Protocol For Vehicular Ad Hoc NetworksJagruti Sahoo, Eric Hsiao-Kuang Wu, Pratap Kumar Sahu, Mario Gerla. 1-6 [doi]
- Defect Mapping and Adaptive Configuration of Nanoelectronic Circuits Based on a CNT Crossbar Nano-ArchitectureBao Liu. 1-6 [doi]
- Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical GraphsAshish Tapdiya, Errin W. Fulp. 1-6 [doi]
- Adaptive Update Propagation for Low-Latency Massively Multi-User Virtual EnvironmentsRichard Süselbeck, Gregor Schiele, Sebastian Seitz, Christian Becker. 1-6 [doi]
- On Achievable Throughput Region of Prioritized Transmissions Via Network CodingTuan Tran, Thinh Nguyen, Raviv Raich. 1-6 [doi]
- Link Scheduling for Scalable Data AggregationJamie Macbeth, Majid Sarrafzadeh. 1-6 [doi]
- A Scheduling Strategy to Avoid Playout Interruptions in Video Streaming SystemsGennaro Boggia, Pietro Camarda, Rossella Fortuna, Luigi Alfredo Grieco. 1-6 [doi]
- A Comparison of Channel Assignment Techniques with Power Control in Ad Hoc NetworksS. Amaar Ahmad, Juan Deaton, Umesh Shukla, Ryan Irwin, Luiz A. DaSilva, Allen B. MacKenzie. 1-6 [doi]
- Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID TagsYang Xiao, Yanping Zhang. 1-6 [doi]
- On the Optimality of Layered Video Streaming Rate in a P2P Mesh NetworkTareq Hossain, Yi Cui, Yuan Xue. 1-6 [doi]
- Handover Latency of Predictive FMIPv6 in IEEE 802.11 WLANs: A Cross Layer PerspectiveYilin Song, Min Liu, Zhongcheng Li, Qi Li. 1-6 [doi]
- Balanced Peer Lists: Towards a Collusion-Resistant BGPYan Li, Mohamed G. Gouda. 1-6 [doi]
- Design and Analysis of Cross-Layer Contention Resolution Algorithms for Multi-Packet Reception Slotted ALOHA SystemsJun-Bae Seo, Victor C. M. Leung. 1-6 [doi]
- Using Cognitive Interference Routing to Avoid Congested Areas in Wireless Ad Hoc NetworksBo Han, David Grace. 1-6 [doi]
- Partitioning-Based SOR for Minimum Energy Multicast Tree Problem in Wireless Ad Hoc NetworksManki Min, Austin F. O Brien, Sung Y. Shin. 1-6 [doi]
- Energy Efficiency of Cooperative SIMO Schemes -Amplify Forward and Decode ForwardNarayanan Krishnan, Balasubramaniam Natarajan. 1-5 [doi]
- On Selfishness, Local Information, and Network Optimality: A Topology Control ExampleRamakant S. Komali, Allen B. MacKenzie, Petri Mähönen. 1-7 [doi]
- A Novel Bayesian Impulse Radio Ultra-WideBand Ranging Algorithm Based on Importance SamplingHai Zhan, Jean-Yves Le Boudec, Jaouhar Ayadi, John R. Farserotu. 1-5 [doi]
- A Social Network Based File Sharing System in Mobile Peer-to-Peer NetworksHaibo Zhang, Haiying Shen. 1-6 [doi]
- Cooperative Cache Invalidation Strategies for Internet-Based Vehicular Ad Hoc NetworksSunho Lim, Chansu Yu, Chita R. Das. 1-6 [doi]
- On Secure Spectrum Sensing in Cognitive Radio Networks Using Emitters Electromagnetic SignatureRichard O. Afolabi, Kiseon Kim, Aftab Ahmad. 1-5 [doi]
- Power Management Extensions for Tagus-SensorNetJorge M. Soares, Bruno J. Goncalves, Rui M. Rocha. 1-6 [doi]
- Cluster-Based Spectrum Management Using Cognitive Radios in Wireless Mesh NetworkAyoub Alsarhan, Anjali Agarwal. 1-6 [doi]
- A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor NetworksH. T. Kung, Dario Vlah. 1-7 [doi]
- Privacy-Preserving Querying in Sensor NetworksEmiliano De Cristofaro, Xuhua Ding, Gene Tsudik. 1-6 [doi]
- Nano-Scale On-Chip Irregular Network AnalysisYang Liu, Alvin R. Lebeck. 1-5 [doi]
- On Maximizing IP Multicast Throughput in Multi-Source ApplicationsMohammadreza Rahimi, Nima Sarshar. 1-8 [doi]
- Service Provisioning Framework for a Self-Organized GridAmos Brocco, Béat Hirsbrunner. 1-6 [doi]
- A Novel Hardware-Software Codesign of Network Protocol Stacks on a SoC PlatformYoungmann Kim, Taehoon Kim, E. K. Park, Sungwoo Tak. 1-6 [doi]
- Analyzing Response Time of Batch SigningTurgay Korkmaz. 1-6 [doi]
- Reducing Source Load in BitTorrentBrian Sanderson, Daniel Zappala. 1-6 [doi]
- Principles of IEEE 802.15.3c: Multi-Gigabit Millimeter-Wave Wireless PANHarkirat Singh, Su Khiong Yong, Jisung Oh, Chiu Ngo. 1-6 [doi]
- A Practical Flow Control Scheme Considering Optimal Energy Allocation in Solar-Powered WSNsDong Kun Noh, Kyungtae Kang. 1-6 [doi]
- Energy Balancing Hopping Sensor Network Model to Maximize CoverageFernando J. Cintron, Kanthakumar Pongaliur, Matt W. Mutka, Li Xiao. 1-6 [doi]
- Delay-Tolerant BotnetsZesheng Chen, Chao Chen, Qian Wang. 1-6 [doi]
- Performance Bound for Generalized M-QAM Constellations in Time-Discrete Multipath Rayleigh Fading Channels with Channel Estimation ErrorsNuno Souto, Rui Dinis, João Carlos Silva. 1-6 [doi]
- Pastry Based Sensor Data SharingWang-Cheol Song, Sung-Su Kim, Seung-Joon Seok, Deokjai Choi. 1-6 [doi]
- A P2P Video Delivery Network (P2P-VDN)Kien Nguyen, Thinh Nguyen, Yevgeniy Kovchegov. 1-7 [doi]
- Analysis of Space-Space-Space Clos-Network Packet SwitchEiji Oki, Nattapong Kitsuwan, Roberto Rojas-Cessa. 1-6 [doi]
- Certified Internet CoordinatesMohamed Ali Kåafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous. 1-8 [doi]
- Analysis of Time and Frequency Domain Features of Accelerometer MeasurementsWaltenegus Dargie. 1-6 [doi]
- Is High Definition a natural DRM?Andrew Blaich, Aaron Striegel. 1-4 [doi]
- Dual-Purpose Spectrum Sensor Using IEEE802.15.4a UWB PHY and Energy DetectionYohannes D. Alemseged, Ha Nguyen Tran, Chen Sun, Hiroshi Harada. 1-5 [doi]
- An Efficient Algorithm for Overlay Multicast Routing in Videoconferencing ApplicationsSaeed Nari, Hamid R. Rabiee, Ali Abedi, Mohammed Ghanbari. 1-6 [doi]
- Performance Analysis of OBS Edge Nodes for Video StreamingFelix Espina, Mikel Izal, Daniel Morató, Eduardo Magaña. 1-6 [doi]
- Scalable Packet Classification: Cutting or Merging?Weirong Jiang, Viktor K. Prasanna. 1-6 [doi]
- Game Theoretic Modeling of Jamming Attacks in Ad hoc NetworksGeethapriya Thamilarasu, Ramalingam Sridhar. 1-6 [doi]
- MNEMONIC: A Network Environment for Automatic Optimization and Tuning of Data Movement over Advanced NetworksPatrick McClory, Ezra Kissel, D. Martin Swany, Michela Taufer. 1-7 [doi]
- A Generalized Scheme for the Creation of Shared Secret Keys through Uncorrelated Reciprocal Channels in Multiple DomainsMichael A. Forman, Derek Young. 1-8 [doi]
- Mixing Ring-Based Source-Location Privacy in Wireless Sensor NetworksYun Li, Jian Ren. 1-6 [doi]
- Fine Tuning of a Distributed VoD SystemYacine Boufkhad, Fabien Mathieu, Fabien de Montgolfier, Diego Perino, Laurent Viennot. 1-7 [doi]
- A Design of Generalized Peer-to-Peer Based IPTV System Using Multiple Chain ArchitectureJihoon Kim, Younghan Kim. 1-5 [doi]
- NATCracker: NAT Combinations MatterRoberto Roverso, Sameh El-Ansary, Seif Haridi. 1-7 [doi]
- Data Protection on RFID-Based Distributed StorageRakesh Saini, Bo Zhu, Amin Hammad. 1-6 [doi]
- The Case for Service OverlaysJack Brassil, Rick McGeer, Puneet Sharma, Praveen Yalagandula, Brian L. Mark, S. Zhang, Stephen Schwab. 1-6 [doi]
- Efficient Clustering of Cognitive Radio Networks Using Affinity PropagationKareem E. Baddour, Oktay Ureten, Tricia J. Willink. 1-6 [doi]
- Source Routing Made Practical in Embedded NetworksArijit Ghosh, Tony Givargis. 1-6 [doi]
- Enhanced Feature Selection and Generation for 802.11 User IdentificationDingbang Xu, Yu Wang, Xinghua Shi. 1-6 [doi]
- Bayesian Wideband Spectrum Segmentation for Cognitive RadiosSelçuk Tascioglu, Oktay Ureten. 1-6 [doi]
- SAS: Self-Adaptive Spectrum Management for Wireless Sensor NetworksGang Zhou, Lei Lu, Sudha Krishnamurthy, Matthew Keally, Zhen Ren. 1-6 [doi]
- GICR: Global Information Based Clustering Routing Mechanism for Wireless Sensor NetworkGeng Yang, Jin-Song Xu, Shengshou Chen, Yingzhou Zhang. 1-6 [doi]
- Target Tracking with Monitor and Backup Sensors in Wireless Sensor NetworksMd. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu. 1-6 [doi]
- High Coverage Search in Multi-Tree Based P2P Overlay NetworkCuihua Zuo, Ruixuan Li, Haiying Shen, Zhengding Lu. 1-6 [doi]
- An Adaptive End-to-End Delay Assurance Algorithm with DiffServ Architecture in IEEE 802.11e/IEEE 802.16 Hybrid Mesh/Relay NetworksMyounghwan Lee, John A. Copeland. 1-6 [doi]
- Analysis of a Hybrid Reputation Management System for Mobile Ad hoc NetworksZe Li, Haiying Shen. 1-6 [doi]
- The Case for End-to-End Solutions to Secure Routing in MANETsStephen Dabideen, Bradley R. Smith, J. J. Garcia-Luna-Aceves. 1-6 [doi]
- Adaptive Downsampling in Oversampled Filter Banks in the Presence of Quantization NoiseMohsen Akbari, Fabrice Labeau. 1-6 [doi]
- A Game Theoretic Investigation of Deception in Network SecurityThomas E. Carroll, Daniel Grosu. 1-6 [doi]
- Refining Elusive User Registration Patterns for Empirical Mobility ModelsJinpyo Hong, Hwangnam Kim. 1-6 [doi]
- Admission Control in Networks with Prioritized Advance ReservationChongyang Xie, Nasir Ghani. 1-6 [doi]
- Covert Channel for One-Way Delay MeasurementsMario Cola, Giorgio De Lucia, Daria Mazza, Maurizio Patrignani, Massimo Rimondini. 1-6 [doi]
- Probability Delegation Forwarding in Delay Tolerant NetworksXiao Chen, Jian Shen, Taylor Groves, Jie Wu. 1-6 [doi]
- Class-Based Data Reporting Scheme in Heterogeneous Wireless Sensor NetworksHyun Jung Choe, Preetam Ghosh, Kalyan Basu, Sajal K. Das. 1-6 [doi]
- Efficient and Scalable Network Emulation Using Adaptive Virtual TimeAndreas Grau, Klaus Herrmann, Kurt Rothermel. 1-6 [doi]
- ETX Could Result in Lower ThroughputZainab Zaidi, Tien Y. Tan, Yunlei Cheng. 1-6 [doi]
- Iterative Detection of Multicode DS-CDMA Signals with Strongly Nonlinear TransmittersRui Dinis, Paulo Silva. 1-6 [doi]
- More Accurate and Fast SYN Flood DetectionChanghua Sun, Chengchen Hu, Yi Tang, Bin Liu 0001. 1-6 [doi]
- Establishing Trust for Computation OffloadingKarthik Kumar, Yamini Nimmagadda, Yung-Hsiang Lu. 1-6 [doi]
- A Clustering Method for Wireless Sensor Networks with Heterogeneous Node TypesSampath Priyankara, Kazuhiko Kinoshita, Hideki Tode, Koso Murakami. 1-6 [doi]
- Complexity-Rate-Distortion Optimization for Real-Time H.264/AVC EncodingYih Han Tan, Wei Siong Lee, Jo Yew Tham, Susanto Rahardja. 1-6 [doi]
- Smart Peer-to-Peer Video Streaming: Comparing Adaptation Under Heterogeneous ConditionsSachin Agarwal. 1-6 [doi]
- Fast Optimal Discrete Bit-Loading Algorithms for OFDM-Based SystemsHyeonmok Ko, Ki-seok Lee, Seoungyoul Oh, Cheeha Kim. 1-6 [doi]
- HYBUD: An Energy-Efficient Architecture for Hybrid Parallel Disk SystemsMais Nijim, Adam Manzanares, Xiaojun Ruan, Xiao Qin. 1-6 [doi]
- On the Impact of Filters on Analyzing Prefix Reachability in the InternetRavish Khosla, Sonia Fahmy, Y. Charlie Hu. 1-8 [doi]
- SHALON: Lightweight Anonymization Based on Open StandardsAndriy Panchenko, Benedikt Westermann, Lexi Pimenidis, Christer Andersson. 1-7 [doi]
- Efficient Controlled Routeless Routing Protocol With Fixed Channel s Width for Mobile Ad Hoc Sensor NetworksMohammad Al-Otaibi, Hamdy S. Soliman. 1-7 [doi]
- Insight into the P2P-VoD System: Performance Modeling and AnalysisKai Wang, Chuang Lin. 1-6 [doi]