Abstract is missing.
- Enabling Secure E-Business Based Telecommunications Management - A new Paradigm beyond TMNMasayoshi Ejiri, Frank Birch. 3-9
- Biometric Recognition - Security and Privacy ConcernsLuminita Vasiu. 3
- GSM and GPRS Performance of IPSEC Data CommunicationGianluigi Me, Giuseppe F. Italiano, Paolo Spagnoletti. 3-11
- Employing the C2C Principle for Making the Use of Data Services on Mobile Phones More AttractiveHans Weghorn. 3-7
- E-Business Security and Information AssuranceManu Malek. 5
- Fundamental Challenges of Next Generation Information RetrievalHenry Tirri. 7
- SPUR: A Secured Protocol for UMTS RegistrationManel Abdelkader, Noureddine Boudriga. 8-16
- Toward Identifying the Attack Source by Deterministic Packet MarkingNirwan Ansari. 9
- B2B Transactions Enhanced with Ontology-Based ServicesAndreia Malucelli, Ana Paula Rocha, Eugenio Oliveira. 10-17
- Integrating Wireless Technology into the Financial Market ModelDeepak Pareek. 11-13
- Performance Measurement of Transaction-Based Internet Applications through SNMPLuciano Paschoal Gaspary, Ederson Canterle. 12-19
- TraSH: A Transport Layer Handoff Protocol for Mobile Terrestrial and Space NetworksMohammed Atiquzzaman. 15
- A Dynamic System-Level Simulation Tool for UMTS FDDNuno Cota, António Rodrigues. 17-23
- An Efficient Negotiation Strategy in E-Commerce Context Based on Simple Ranking MechanismMalamati D. Louta, Ioanna Roussaki, Lambros Pechlivanos. 18-25
- E-Business SecurityManu Malek. 19
- Fast and Strong Control of Congestion-Making TrafficGaeil Ahn, Kiyoung Kim, Jongsoo Jang. 20-29
- Wireless Carrier Grade Platforms: Characteristics and Ongoing Open Source DevelopmentIbrahim Haddad. 21
- Fundamentals of Wireless Network SystemsMohammad S. Obaidat. 23-24
- A Bandwidth Determined Mobile Multimodal SystemAnthony Solon, Paul McKevitt, Kevin Curran. 24-31
- Rethinking Manageability - Advances in the Management of IP NetworksAlexander Clemm, Geng Lin. 25-26
- Experimental Based Tool Calibration Used for Assessing the Quality of E-Commerce SystemsAntonia Stefani, Dimitris Stavrinoudis, Michalis Nik Xenos. 26-32
- Reliability Assessment of E-Commerce ApplicationsVangalur S. Alagar, Olga Ormandjieva. 30-37
- A Distributed System for the Integrated Management of Heterogeneous Wireless NetworksNikolaos Koutsouris, George Koundourakis, Louisa Papadopoulou, Dimitris Kouis, Vera Stavroulaki, Nikolas Mitrou, Panagiotis Demestichas. 32-39
- Development of Open Code Application for Remote MeasurementsSimone Müller Vidal, Haroldo Stark Filho, Keiko Ono Fonseca, Alexandre de Almeida Prado Pohl. 33-38
- Secure Application Updates on Point of Sale DevicesManuel Mendonça, Nuno Ferreira Neves. 38-45
- A Decentralized Location Service - Applying P2P Technology for Picking Replicas on Replicated ServicesLuis Bernardo, Paulo Pinto. 39-47
- Web Traffic Acceleration over Cellular Networks by Using a Compressing Proxy ServerYair Toaff, Ariel J. Frank. 40-45
- A New Reduction Method of Intrusion Detection False Alerts Using SNORTBen Soh, Daniel Bonello. 46-53
- Performance of Enhanced-UMTS HSDPA Using Transmit Diversity and Power Control SchemesJoão Carlos Silva, Nuno Souto, António Rodrigues, Américo Correia, Francisco Cercas, Nuno Cota. 46-51
- When Business Models Go Bad: The Music Industry s FutureErik Wilde, Jacqueline Schwerzmann. 48-54
- Using Wireless Technology to Develop a Virtual Reality Command and Control CentreDamian Green, Neville A. Stanton, Guy H. Walker, Paul M. Salmon. 52-59
- Network-Based Intrusion Detection Systems Evaluation Through a Short Term Experimental ScriptLeonardo Lemes Fagundes, Luciano Paschoal Gaspary. 54-60
- Efficient Information Retrieval from Handheld Terminals with Wireless Digital Phone Interface - Personalized Information Access on Mobile Phones and PDAsHans Weghorn. 55-61
- Wireless Networks Efficiency Study Based on Meteorological Data MeasurementsPerfecto Mariño, Fernando Machado, Santiago Otero, Fernando Pérez-Fontán, Cristina Enjamio. 60-66
- Data Mining Techniques for Security of Web ServicesManu Malek, Fotios C. Harmantzis. 61-67
- Design and Evaluation of the Home Network Systems Using the Service Oriented ArchitectureHiroshi Igaki, Masahide Nakamura, Ken-ichi Matsumoto. 62-69
- Simulation Analysis of Packet Scheduling Algorithm for Voice, WWW and Video Streaming ServicesMarko Porjazoski, Borislav Popovski. 67-73
- Towards an Alternative Way of Verifying Proxy Objects in JININikolaos Papamichail, Luminita Vasiu. 68-75
- Wireless Telemedicine and Service Level Management Architecture SpecificationCristina Miyata, Tereza Cristina M. B. Carvalho, Stewart Russell, Akira Kawaguchi. 70-78
- Adjacent Channel Interference - Impact on the Capacity of WCDMA/FDD NetworksDaniel Figueiredo, Pedro Matos, Nuno Cota, António Rodrigues. 74-80
- STACKFENCES: A Run-Time Approach for Detecting Stack OverflowsAndre Zuquete. 76-84
- Modeling Hybrid Multimedia N/W-Web Services Using Rapide ADLAhmed Sameh. 79-87
- Planning Tool for LMDS Coverage Using 3D Geographic Information System DataLandaabalo Agba, Laure Freytag, Bernard Jecko. 81-86
- Source Code Authorship Analysis for Supporting the Cybercrime Investigation ProcessGeorgia Frantzeskou, Stefanos Gritzalis. 85-92
- Indoor Propagation Models and Radio Planning for WLANSRui Lopes, Paulo Freixo, António Serrador. 87-92
- Accessing Location and Proximity Information in a Decentralized EnvironmentThomas Hadig, Jörg Roth. 88-95
- Effects of Variable Bit Rate Vocoder on VoIP QoSYael Dux-Rosenberg, Ariel J. Frank. 93-101
- Internet Security: Public-Key Infrastractures and Certification SystemsBen Soh, Luke Sledziona. 93-106
- Evaluation of the Quality of the Interaction between Users and Custommade Software ProductsSimone Vasconçelos Silva, Daniel I. De Souza Jr.. 96-102
- Certificate-Based Access Control and Authentication for DHCPJacques Demerjian, Ahmed Serhrouchni, Mohammed Achemlal. 99-106
- Fast Mobile IPv6 Approach for Wireless LAN Based Networks - Link-Layer Triggering Support for IEEE 802.11Norbert Jordan, Alexander Poropatich. 102-108
- Customer Relationship Management in an Electronic EconomyAnthony W. Marsh, Anthony Atkins. 103-110
- A Policy-Based Architecture for Protecting 802.11 WLANS Against DDOS AttacksAlan Marshall, Wenzhe Zhou. 107-112
- CDMA2000 1X Capacity Decrease by Power Control Error in High Speed Train EnvironmentSimon Shin, Tae-Kyun Park, Byeung-Cheol Kim, Yong-Ha Jeon, Dongwoo Kim. 109-113
- Policy-Based Service Level Agreement Management SystemNoh-sam Park, Shin-Kyung Lee, Gil-Haeng Lee. 111-117
- A Heuristic State Space Search Model for Security Protocol VerificationZeeshan Furqan, Ratan K. Guha, Shahabuddin Muhammad. 113-118
- Care-of-Prefix Routing for Moving Networks in Mobile IP NetworkToshihiro Suzuki, Ken Igarashi, Hiroshi Kawakami, Akira Miura. 114-120
- A Model Driven Architecture for Telecommunications Systems Using DEN-NGJohn Strassner. 118-128
- Towards an Adaptive Packet Marking Scheme for IP TracebackPing Yan, Moon-Chuen Lee. 119-126
- Mobility Support and Soft Handover Protocol for IP-NetworksJukka Mäkelä, Timo Hämäläinen, Gábor Fekete, Jorma Narikka, Anna-Maija Virkki. 121-126
- Packet Scheduling Algorithm with Weight OptimizationAri Viinikainen, Jyrki Joutsensalo, Mikko Pääkkönen, Timo Hämäläinen. 127-133
- Service Integration Between Wireless Systems: A Core-Level Approach to InternetworkingPaulo Pinto, Luis Bernardo, Pedro Sobral. 127-134
- Improving the Performance of Equalization and a Fast Start-Up Technique for Communication SystemsHua Ye, Wanlei Zhou. 129-135
- Packet Scheduling for Maximizing Revenue in a Network NodeJian Zhang, Timo Hämäläinen, Jyrki Joutsensalo. 134-139
- Providing QoS in 3G-WLAN Environment with RSVP and DiffservEero Wallenius, Timo Hämäläinen, Timo Nihtilä, Jyrki Joutsensalo. 135-141
- Integrating Requirements & Specifications in the Telecommunications Service Creation ProcessDionisis X. Adamopoulos. 136-143
- A Cost-Effective Iris Recognition System Using Linear Discriminant Analysis and Cross-Correlation TechniquesAshwani K. Ramani, Sanjay Silakari, Pinaki A. Ghosh. 140-145
- A Secure Crediting Protocol for Hybrid Cellular and Ad-Hoc NetworksBogdan Carbunar, Ioannis Ioannidis, Ananth Grama, Jan Vitek. 142-149
- Protecting Legacy Applications from UnicodeErik Wilde. 144-151
- A Method of Identifying Transfer Function for Network by Use of Msequence CorrelationEiji Nishiyama, Kenshi Kuwanami. 146-151
- The Effects of Interelement Spacing in Linear Arrays on Throughput Performance in Ad Hoc NetworksSonia Furman, David E. Hammers, Mario Gerla. 150-159
- E-MACSC: A Novel Dynamic Cache Tuning Technique to Maintain the Hit Ratio Prescribed by the User in Internet ApplicationsRichard S. L. Wu, Allan K. Y. Wong, Tharam S. Dillon. 152-159
- Baseline to Help with Network ManagementMario Lemes Proença Jr., Camiel Coppelmans, Mauricio Luis Bottoli, Leonardo de Souza Mendes. 152-160
- Quality of Service Performances in Ad Hoc IEEE 802.11 Wireless LANsMaria Stella Iacobucci, Fabio Graziosia, Panfilo Ventresca. 160-165
- Secure Web Browsing over Long-Delay Broadband Networks - Recommendations for Web BrowsersDoug Dillon, Gurjit Singh Butalia, Pawan Kumar Joshi. 160-168
- New Non-Adaptive Distributed System-Level Diagnosis Methods for Computer NetworksHiroshi Masuyama, Koji Watanabe. 161-168
- BER Performance Simulation in LOS Environment for Fixed Broadband Wireless Access SystemTang Min Keen, Tharek Abdul Rahman. 166-171
- Practical Auditability in Trusted Messaging SystemsMiguel Reis, Artur Romão, A. Eduardo Dias. 169-174
- Scheduling Decision-Making Using Web ServiceLeonilde Rocha Varela, Sílvio do Carmo Silva, Joaquim Nunes Aparício. 169-176
- A Smart Handoff Procedure in 4G NetworksYuseung Jeong, Namgi Kim, Hyunsoo Yoon. 172-180
- Measurements of TCPW ABSE Fairness and FriendlinessIlhem Lengliz, Haifa Touati, Fehmi Sanàa, Farouk Kamoun, Medy Sanadidi. 175-182
- Efficient Proxy Server Caching Using Web Usage Mining Technique on Web Logs - for Improving Hit Rate and Response TimeAshwani K. Ramani, Sanjay Silakari, Parul Saxena. 177-182
- Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding SchemeNaveen K. Chilamkurti, Ben Soh, Sri Vijaya Gutala. 181-186
- Gender Differences in Online Shoppers Decision-Making StylesChyan Yang, Chia Chun Wu. 183-190
- MPLS Architecture for Service ProviderN. Rajendran, K. Yugandhar, Ved Prakash Gulati, S. Albert Rabara. 183-190
- An Analysis of the Flow-Based Fast Handover Method for Mobile IPv6 NetworkJani Puttonen, Ari Viinikainen, Miska Sulander, Timo Hämäläinen. 187-190
- FESORIA - An Integrated Tool for Performance and Content Analysis, SLA Evaluation, Management and Smart Presentation for Video-Ondemand ServicesXabiel G. Pañeda, David Melendi, Ricardo Bonis, Manuel Vilas, Isabel Rodríguez, Roberto García. 191-203
- UGSP: Authentication Based Secure Protocol for Ad-Hoc NetworksNeelima Arora, R. K. Shyamasundar. 191-196
- A Single Sign-On Protocol for Distributed Web Applications Based on standard Internet MechanismsJulian Gantner, Andreas Geyer-Schulz, Anke Thede. 191-198
- A Mobile Service Gateway for Mobile Access to Enterprise Data and ServicesXueshan Shan. 197-202
- Robust QoS Control for IP-Based Cellular NetworksAkihito Okura, Hiroshi Kawakami, Takeshi Ihara, Akira Miura. 199-208
- New Fair Payment ProtocolsHao Wang, Heqing Guo, Manshan Lin. 199-203
- A Distributed Monitoring System Utilizing Cellular Phone as GUIYoshiro Imai, Daisuke Yamane, Shin ichi Masuda, Takaaki Izumo, Hitoshi Inomo, Wataru Shiraki, Osamu Sadayuki. 203-208
- Further Analysis on the Application of Mobile Agents in Network RoutingWenyu Qu, Hong Shen, John Sum. 204-212
- Mobile Videophones for Signed Language CommunicationsKazuo Kamata, Takeaki Shionome, Hideo Yamamoto. 209-216
- A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP InfrastructureValentina Casola, Raffaele Chianese, Nicola Mazzocca, Massimiliano Rak, Antonino Mazzeo. 209-215
- Internet, Wireless and Legacy Integration - Architectural Framework for TestingNenad Stankovic. 213-220
- On Vulnerability Testing of VoIP Software - The MEGACO/H.248 System as an ExampleSon T. Vuong, Xiaojuan Cai, Ling Yun, Wing-Keong Woo. 216-222
- MPEG-21 in Broadcasting Role in the Digital Transition of BroadcastingItaru Kaneko, Artur Lugmayr, Seppo Kalli, Abdellatif Benjelloun Touimi, Jong-Nam Kim, Claudio Alberti, Sadigurschi Yona, Jaejoon Kim, Maria Teresa Andrade. 217-222
- Modelling Procedure to Increase the Efficiency in Fiber Broadband Access Networks - Aggregating Traffic Streams in a Cable NetworkRoberto García, Víctor G. García, Xabiel G. Pañeda, David Melendi, Jesús Pérez. 221-230
- SIP Vulnerabilities Testing in Session Establishment & User RegistrationPeter Qi Qiu, Ostap Monkewich, Robert L. Probert. 223-229
- Application Level Session Hand-Off Management in a Ubiquitous Multimedia EnvironmentLetian Rong, Ian S. Burnett. 223-229
- Remove Multimedia Server Bottleneck by Network Attached Disk Array with Heterogeneous Dual ChannelsDan Feng, Fang Wang, Yuhui Deng, Jiangling Zhang. 230-235
- Denial of Service Issues in Voice Over IP NetworksJason Reid, Andrew Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan. 230-237
- Special Session on Web Applications in the Industry and Effects on the Business Performance Web Services in Hotel IndustryY. Xiang, M. Lan, W. Zhou. 231-240
- Interworking Between the RSW Control Criteria and SIP StandardOmar Abouabdalla, R. Sureswaran. 236-242
- BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection SystemsKapil Singh, Son T. Vuong. 238-245
- A New Word-Intersection Clustering Method for Information FilteringJun Lai, Ben Soh, Mao Lin Huang. 241-244
- Performance Analysis Study of Multicast Traffic in Star-Based Local WDM Lightwave NetworksRabi W. Habash, Mohd Dani Baba, Mat Ikram Yusof, Muhammad Ibrahim, Borhanuddin Mohd Ali. 243-249
- A Novel Peer-to-Peer Payment SystemDespoina Palaka, Petros Daras, Kosmas Petridis, Michael G. Strintzis. 245-250
- Implementing Multiple Channels over SSLYong Song, Victor C. M. Leung, Konstantin Beznosov. 246-256
- Loss Control Through the Combination of Buffer Management and Packet SchedulingYan Bai, Mabo Robert Ito. 250-255
- A Run Time Environment Extension for Personalized Web ServicesJulia Gross, Joachim Zeiss, Sandford Bessler. 251-256
- Deployment of Live-Video Services Based on Streaming Technology over an HFC NetworkDavid Melendi, Xabiel G. Pañeda, Roberto García, Ricardo Bonis, Víctor G. García. 256-263
- Structured Documents Represented by Conceptual Graphs - A Simple Formalism for Presenting Structured DocumentsVanyo G. Peychev, Jimmy C. Dubuisson, Vladimir T. Dimitrov, Zhechka A. Toteva. 257-262
- An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003Aashish Sharma, William Yurcik. 257-262
- Design of Intrusion Detection System at User Level with System-Call InterposingToshihiro Tabata, Kouichi Sakurai. 263-268
- Web Mapping of Real-World Things and its Applications - Product WEBID as a Driving Force for new Supply ChainsDmitry Ponomarev, Vladimir Krylov. 263-267
- Fast Event Detection in MPEG VideoRui Marcelino, Vítor Manuel Mendes da Silva, Sérgio M. M. de Faria. 264-268
- TM.AN: Commanding the Power of Collaborative Task ManagementBader Maktari, Naoufel Werghi, Zoheir Ezziane. 268-274
- Moving Objects Segmentation Using BoundaryJunKi Kim, Ho Suk Lee. 269-277
- Training Network Managers to Recognise Intrusion AttacksColin Pattinson, Kemal Hajdarevic. 269-274
- A Method for the Performance Analysis of Integrated Application Services - Simulating the Execution of Integrated Application ServicesHiroshi Yamada, Akira Kawaguchi. 275-280
- A Real-Time Intrusion Prevention System for Commercial Enterprise DatabasesUlf T. Mattsson. 275-280
- A Video Transcoding Scheme for E-Learning Multimedia ApplicationsNuno Santos, Pedro A. Amado Assunção. 278-283
- Predictive Querying in Spatio-Temporal EnvironmentSam Makki, Ho Ling Hsing, Demetrios Kazakos. 281-286
- Optimal Analysis of a Hybrid Authentication System: Web Security versus System PerformanceBen Soh, Aaron Joy. 281-286
- Image Authentication Using Hierarchical Semi-Fragile WatermarksYuan-Liang Tang, Chun-Hung Chen. 284-289
- Detour Path Resource Management Methods for IP Service OperationYu Miyoshi, Tatsuyuki Kimura. 287-292
- Local vs Remote Information for Location Based ServicesJesús E. Villadangos, José Javier Astrain, Alberto Córdoba, Manuel Prieto. 287-293
- Audio Watermarking Quality EvaluationAndrés Garay Acevedo. 290-300
- Face Recognition in Biometric Vending MachinesJosé Javier Astrain, Jesús E. Villadangos, Alberto Córdoba, Manuel Prieto. 293-298
- Service Creation Technologies in Open Programmable NetworksDionisis X. Adamopoulos, Constantine A. Papandreou. 294-299
- Towards Run-Time Protocol Anomaly Detection and VerificationInSeon Yoo, Ulrich Ultes-Nitsche. 299-304
- The Electricity Retail Market: Requeriments for an E-Business SystemVictor Santos, Edmundo Monteiro, Antonio Gomes Martins. 300-305
- Knowledge and Content-Based Audio Retrieval Using WordnetPedro Cano, Markus Koppenberger, Sylvain Le Groux, Perfecto Herrera, Julien Ricard, Nicolas Wack. 301-308
- Integrating a Signature Module in SSL/TLSIbrahim Hajjeh, Ahmed Serhrouchni. 305-310
- The Role of ASON and GMPLS for the Bandwidth Trading Market - Bandwidth Brokerage Under the Influence of Novel Control Plane TechnologiesAndreas Iselt, Andreas Kirstädter, Rayane Chahine. 306-311
- Hardware-Oriented Analysis of the Arithmetic Coding - Comparative Study of JPEG2000 and H.264/AVC Compression StandardsGrzegorz Pastuszak. 309-316
- An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-ConnectsFrancesco Palmieri. 311-316
- Toward Pervasive Computing in RestaurantYang Xiang, Wanlei Zhou, Morshed U. Chowdhury. 312
- Compression of Hyperspectral ImageryBruno Carpentieri, James A. Storer, Giovanni Motta, Francesco Rizzo. 317-324
- E-Payment Security - Recommendations About the Use of a PKI for E-Payment SecurityHanane El Bakkalis. 317
- Bayer Pattern Compression by Prediction Errors Vector QuantizationAntonio Buemi, Arcangelo Bruna, Filippo Vella, Alessandro Capra. 325-330
- Forward Error Correction for Video CodingJoão Tavares, Antonio Navarro 0002. 331-338
- An Integrated Global and Fuzzy Regional Approach to Content-Based Image RetrievalXiaojun Qi, Yutao Han. 339-350
- Real-Time Audio Capture, Compression & Streaming Service on a PDAConstantino Garcia, Francisco J. Suárez. 345-350
- Improving ICA Algorithms Applied to Predicting Stock ReturnsJuan Manuel Górriz Sáez, Carlos García Puntonet, Rubén Martín-Clemente. 351-355
- Knowledge Based 3D-Modelling by Selforganised Learning AlgorithmsEckhard Buescher. 356-362
- Discrete Speech Recognition Using a Hausdorff Based Metric - An Automatic Word-Based Speech Recognition ApproachTudor Barbu. 363-368
- Online Smoothing of VBR Video Streams in Systems with Variable Available BandwidthPietro Camarda, Antonio De Gioia, Domenico Striccoli. 369-374
- Digital Music Electronic Commerce - Addressing the Super Distribution ModelCarlos Serrão, Joaquim Marques. 375-378
- An Enhanced Smoothing Scheme for MPEG Video Streams TransmissionJoelson Tadeu Vendramin, Keiko Verônica Ono Fonseca. 379-384
- An Approach to the Semantic Modeling of Audio DatabasesMustafa Sert, Buyurman Baykal. 385-392
- A New Distributed Contention Control Protocol for the IEEE 802.11 MAC Layer - Project of ATCRC Application ProgrammsJiankun Hu, Konrad Eriksson. 393-401
- A QoS-Aware Resource Request Mechanism for Delay Sensitive Services Over TDMA/TDD Wireless NetworksFrancisco Delicado, Pedro Cuenca, Luis Orozco-Barbosa. 402-409
- An Experimental Study on the Performance and Fairness of Loss Differentiation for TCPJohan Garcia, Anna Brunstrom. 410-419
- Improving TCP Performance over Wireless WANs Using TCP/IP-Friendly Link LayerMarkku Kojo, Davide Astuti, Laila Daniel, Aki Nyrhinen, Kimmo E. E. Raatikainen. 420-429
- The Impact of Preemptive Priority in GPRS on TCP Performance: A Measurement StudyAnnika Wennström, Anna Brunstrom, Juan Rendón, Jan H. Gustafsson. 430-436
- Using ECN Marks to Improve TCP Performance over Lossy LinksHaowei Bai, Mohammed Atiquzzaman, David J. Lilja. 437-445