Abstract is missing.
- Resource Management Middleware Using Mobile Agents for Mobile Ad Hoc NetworksAkihiro Yamanouchi, Takeshi Hashimoto, Tomoyuki Ohta, Hideharu Kojima, Yoshiaki Kakuda. 1-6 [doi]
- A Hierarchical Formal Framework for Adaptive N-variant Programs in Multi-core SystemsLi Tan, Axel Krings. 7-12 [doi]
- Temporal Reasoning about Resources for Deadline Assurance in Distributed SystemsXinghui Zhao, Nadeem Jamali. 13-20 [doi]
- Security and Architectural Issues for National Security Cloud ComputingAnya Kim, John McDermott, Myong H. Kang. 21-25 [doi]
- Cyber Crime Scene Investigations (C²SI) through Cloud ComputingXinwen Fu, Zhen Ling, Wei Yu, Junzhou Luo. 26-31 [doi]
- Securing a Community CloudFabrizio Baiardi, Daniele Sgandurra. 32-41 [doi]
- Encryption-Based Policy Enforcement for Cloud StorageSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. 42-51 [doi]
- SecCloud: Bridging Secure Storage and Computation in CloudLifei Wei, Haojin Zhu, Zhenfu Cao, Weiwei Jia, Athanasios V. Vasilakos. 52-61 [doi]
- Architecture and Protocol for User-Controlled Access Management in Web 2.0 ApplicationsMaciej P. Machulak, Aad P. A. van Moorsel. 62-71 [doi]
- IRRES: Intrusion-Resilient Remote Email StorageDi Ma, Gene Tsudik. 72-76 [doi]
- Physical Layer Network Isolation in Multi-tenant CloudsJack Brassil. 77-81 [doi]
- On Trustworthiness of CPU Usage Metering and AccountingMei Liu, Xuhua Ding. 82-91 [doi]
- Efficient Counting of Network MotifsDror Marcus, Yuval Shavitt. 92-98 [doi]
- Structural Graph Indexing for Mining Complex NetworksHakan Kardes, Mehmet Hadi Günes. 99-104 [doi]
- On Nonstationarity of Human Contact NetworksSalvatore Scellato, Mirco Musolesi, Cecilia Mascolo, Vito Latora. 105-111 [doi]
- Selective Routing Protocol for Cognitive Wireless Networks Based on User s PolicyNoriki Uchida, Goshi Sato, Kazuo Takahata, Yoshitaka Shibata. 112-117 [doi]
- Improvement and Performance Evaluation of CAVENET: A Network Simulation Tool for Vehicular NetworksLeonard Barolli, Gjergji Mino, Fatos Xhafa, Arjan Durresi, Akio Koyama. 118-125 [doi]
- GRAT: Group Reputation Aggregation Trust for Unstructured Peer-to-Peer NetworksMasanori Yasutomi, Yo Mashimo, Hiroshi Shigeno. 126-133 [doi]
- Energy-Efficient Agreement Protocols in P2P Overlay NetworksAilixier Aikebaier, Tomoya Enokido, Makoto Takizawa, S. Misbah Deen. 134-141 [doi]
- Multiple Micro Virtual Disks Based on NaryRAID for Large Scale StorageYuji Nakamura, Minoru Uehara. 142-147 [doi]
- Utilizing Active Visual Labels for Product and Service InformationMarkus Aleksy, Roberto Damm, Nicolaie Fantana, Bernd Stieger. 148-151 [doi]
- Towards an Efficient QoS Based Selection of Neighbors in QOLSRFadila Khadar, Nathalie Mitton, David Simplot-Ryl. 152-160 [doi]
- A Few Bytes are Worth a Thousand Words: Run-Time Compilation of High Level Scripts in Sensor NetworksJoshua Ellul, Kirk Martinez. 161-170 [doi]
- Z-Cast: A Multicast Routing Mechanism in ZigBee Cluster-Tree Wireless Sensor NetworksOlfa Gaddour, Anis Koubaa, Omar Cheikhrouhou, Mohamed Abid. 171-179 [doi]
- A Reliable Energy Efficient Algorithm for Target Coverage in Wireless Sensor NetworksJing He, Naixue Xiong, Yang Xiao, Yi Pan. 180-188 [doi]
- Verification and Performance Evaluation of S-MAC Protocol Based on Process CalculiRobert Abo, Kamel Barkaoui, Karim Djouani. 189-198 [doi]
- Field Deployment of Low Power High Performance NodesKirk Martinez, Philip Basford, Joshua Ellul, Richard Clarke. 199-205 [doi]
- REnvDB, a RESTful Database for Pervasive Environmental Wireless Sensor NetworksFilippo de Stefani, Paolo Gamba, Emanuele Goldoni, Alberto Savioli, Davide Silvestri, Flavio Toffalini. 206-212 [doi]
- Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop NetworksNils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini. 213-220 [doi]
- W-Coolstreaming a Protocol for Collaborative Data Streaming for Wireless NetworksRoberto Beraldi, Marco Galiffa, Hussein M. Alnuweiri. 221-226 [doi]
- The Insecurity of Time-of-Arrival Distance-Ranging in IEEE 802.11 Wireless NetworksSteve Glass, Vallipuram Muthukkumarasamy, Marius Portmann. 227-233 [doi]
- Carrier-Based Coverage Augmentation in Wireless Sensor and Robot NetworksRafael Falcón, Xu Li, Amiya Nayak. 234-239 [doi]
- Mobile Software Agents for Wireless Network Mapping and Dynamic RoutingHamzeh Khazaei, Jelena V. Misic, Vojislav B. Misic. 240-246 [doi]
- A Bio-inspired Distributed Routing Protocol for Wireless Sensor Networks: Performance EvaluationMaurizio Paone, Angelo Cucinotta, Antonino Longo Minnolo, Luca Paladina, Antonio Puliafito, Angelo Zaia. 247-255 [doi]
- A Cooperative Framework for Reliable Multicast Forwarding in Mobile Ad Hoc NETworksGiuseppe Araniti, Massimo Condoluci, Antonella Molinaro, Antonio Iera. 256-262 [doi]
- Reliable Routing in Vehicular Ad Hoc NetworksGongjun Yan, Nathalie Mitton, Xu Li. 263-269 [doi]
- Improved Scheme for Adaptive Gateway Discovery in Hybrid MANETAntonio J. Yuste, Alicia Triviño-Cabrera, Francisco David Trujillo, Eduardo Casilari. 270-275 [doi]
- Identification of Stable Links in MANETsAlicia Triviño-Cabrera, Jorge García de la Nava, Eduardo Casilari. 276-281 [doi]
- AMBER Roadmap: Ongoing Research DirectionsAndrea Bondavalli, Paolo Lollini, Michele Vadursi. 282-283 [doi]
- Shared Data from a Study of Measurement Uncertainty in Fault InjectionRaul Barbosa, Daniel Skarin, Johan Karlsson. 284-285 [doi]
- From Performance to Resilience BenchmarkingRaquel Almeida, Henrique Madeira, Marco Vieira. 286-287 [doi]
- Innovations and Advances in Adaptive Secure Message Oriented MiddlewareReijo Savola, Habtamu Abie, John Bigham, Domenico Rotondi. 288-289 [doi]
- GEMOM Platform Prototype Validation through Case Studies - Main Results and Viewpoints to ExploitationPetra Ristau, Shaun Topham, Federica Paganelli, Lorenzo Blasi. 290-291 [doi]
- Adding Resilience to Message Oriented Middleware: The GEMOM ApproachJohn Bigham, Milan Novkovic. 292-293 [doi]
- Field Data Based Modeling of Sender Based Message Logging Protocols for Supercomputers CheckpointingDomenico Cotroneo, Catello Di Martino. 294-301 [doi]
- Robustness Testing of Standard Specifications-Based HA MiddlewareAndrás Kövi, Zoltán Micskei. 302-306 [doi]
- Testing the Fidelity of an Emulab TestbedAndres Perez-Garcia, Christos Siaterlis, Marcelo Masera. 307-312 [doi]
- Sharing Experimental and Field Data: The AMBER Raw Data Repository ExperienceRaquel Almeida, Naaliel Mendes, Henrique Madeira. 313-320 [doi]