Abstract is missing.
- Trends and challenges in wireless networksMohammad S. Obaidat.
- The evolution of security: Network intrusion preventionRohit Dhamankar.
- Mobile and wireless communicationsPaulo T. de Sousa.
- Usability, perceived credibility and trust: Users perspectives to security and privacyYin Leng Theng.
- Real world threats and opportunities with smartphonesDavid Wood.
- Agents, emergence and modelling: What value for communication networks?Mark d Inverno.
- Biometrics and cryptographySusanne Wetzel.
- Fundamentals of wireless networks systemsMohammad S. Obaidat.
- Mobility management for beyond 3G reconfigurable systemsNancy Alonistioti, Alexandros Kaloxylos, Andreas Maras. 5-12
- A Hierarchical distributed communication architecture for real-time auctionsIlhem Abdelhedi Abdelmoula, Hella Kaffel Ben Ayed, Farouk Kamoun. 5-15
- An automatic blind modulation recognition algorithm for m-psk signals based on mse criterionM. Vastram Naik, A. Mahanta, R. Bhattacharjee, H. B. Nemade. 13-19
- Strategies for service composition in P2P networksJan Gerke, Peter Reichl, Burkhard Stiller. 16-24
- Performance of voip over IEEE 802.11G DSSS-OFDM mode with IEEE 802.11E qos supportGráinne Hanley, Seán Murphy, Liam Murphy. 20-27
- Securing XML web services Â- a plug & play approachCristian Donciulescu, Luminita Vasiu. 25-32
- A comparative study of IEEE 802.11 MAC access mechanisms for different traffic typesMohammad Saraireh, Reza Saatchi, Samir Al-Khayatt, Rebecca Strachan. 28-35
- Transformation of traditional business to electronic business a transformation cum maturity model and transformation matrixAsif Ali Munshi, Fareed Hussain. 33-40
- Flooding attack on the binding cache in mobile IPv6Christian Veigner, Chunming Rong. 36-43
- Secure transparent mobility secure mobility infrastructure using mobile ipMark W. Andrews, Ronan J. Skehill, Michael Barry, Sean McGrath. 41-48
- Advance duplicate address detection (DAD) and buffering-based provision of seamless handover in mobile IPV6Shobhan Adhikari, Teerapat Sanguankotchakorn. 44-54
- Advertising via mobile terminals delivering context sensitive and personalized advertising while guaranteeing privacyRebecca Bulander, Michael Decker, Gunther Schiefer. 49-56
- Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in frequency selective fading channels achieving high performance in fully loaded systemsJoão Carlos Silva, Nuno Souto, Francisco Cercas, Rui Dinis. 55-60
- A secure framework for managing transactional properties of business objectsCharles A. Shoniregun, Ziyang Duan, Subhra Bose, Alex Logvynovskiy. 57-65
- The robustness of blocking probability in a loss system with repeated customersAkira Takahashi, Yoshitaka Takahashi, Shigeru Kaneda, Yoshikazu Akinaga, Noriteru Shinagawa. 61-66
- On digital cash-like payment systemsDaniel A. Nagy. 66-73
- Efficient call admission control for 3G networks chernoff-bound based CACAlbert Mráz, Mihály Katona, Sándor Imre. 67-73
- On the evaluation of a secure solution to access 802.11 networksFernando da Costa Jr., Luciano Paschoal Gaspary, Jorge L. V. Barbosa, Gerson G. H. Cavalheiro, Luciano Pfitscher, José Dirceu G. Ramos. 74-79
- A general model of authorisation for complex computing applicationsJim J. Longstaff, Mike A. Lockyer, Tony Howitt, Ian Elcoate, Paul Massey. 74-79
- A pricing model of GPRS networks with WI-FI integration for heavy data usersSaravut Yaipairoj, Fotios C. Harmantzis, Vinoth Gunasekaran. 80-85
- An organization-based cache mechanism for supporting pcs number portability serviceC. W. Cheng, C. G. Chung. 80-87
- Analytical study of broadcasting in 802.11 ad hoc networksAndrey Lyakhov, Vladimir Vishnevsky, Pavel Poupyrev. 86-91
- Transmission of a message during limited time with the help of transport codingEvgenii Krouk, Sergei Semenov. 88-93
- Quorums based mobiles location schemeNadia Chetta, Nadjib Badache. 92-97
- A Novel real-time self-similar traffic detector/filter to improve the reliability of a TCP based end-to-end client/server interaction path for shorter roundtrip timeWilfred W. K. Lin, Allan K. Y. Wong, Richard S. L. Wu, Tharam S. Dillon. 94-101
- Performance evaluation of 3G core network nodesAndrey Krendzel, Jarmo Harju, Sergey Lopatin. 98-104
- Virtual characteristics measurement using factor analysisGhazal Afroozi Milani, Koorush Ziarati, Alireza Tamaddoni-Nezhad. 102-108
- Searching for resources in manets: A cluster based flooding approachRodolfo Oliveira, Luis Bernardo, Paulo Pinto. 105-111
- Sharing service resource infromation for application integrtation in a virtual enterprise modeling the communication protocol for exchanging service resource informationHiroshi Yamada, Akira Kawaguchi. 109-116
- Optimisation of handoff performance in wireless networks using evolutionary algorithmsSuresh Venkatachalaiah, Richard J. Harris. 112-118
- The engine to support building cpc solutionsJinmi Jung, Hyun Kim, Hyung-Sun Kim, Joo-Haeng Lee. 117-121
- SMSFormKit: A System for presentation, validation and update of forms for mobile devicesCarlos Fernández, Juan P. Pece, Daniel I. Iglesi. 119-124
- In-depth analysis of selected topics related to the quality assessment of e-commerce systemsAntonia Stefani, Dimitris Stavrinoudis, Michalis Nik Xenos. 122-128
- A wireless voice/data communication system in a large hospitalEisuke Hanada, Takato Kudou. 125-132
- End to end adaptation for the web matching content to client connectionsKristoffer Getchell, Martin Bateman, Colin Allison, Alan Miller. 131-136
- Multilateral security considerations for adaptive mobile applicationsAdrian Spalka, Armin B. Cremers, Marcel Winandy. 133-137
- A PBX-based approach for telecommunication number portability serviceC. W. Cheng, C. G. Chung. 137-142
- Evaluating the usage of wireless broadband hotspotsZiad Hunaiti, Ammar Rahman, Wamadeva Balachandran, Zayed Huneiti. 138-141
- One-to-all and all-to-all broadcasting algorithms in cellular networksHiroshi Masuyama, Yuuta Fukudome, Tetsuo Ichimori. 142-145
- An improved genetic algorithm for solving the vehicle routing problem with time windowsTao-Shen Li, Jing-Li Wu. 143-149
- Moviltooth: context-aware system for mobile phones based on bluetooth technologyJuan P. Pece, Carlos Fernández, Carlos J. Escudero. 146-149
- E-business for the electricity retail market a business to client perspectiveVictor Santos, Edmundo Monteiro, Antonio Gomes Martins. 150-156
- Mobile locality-aware multimedia on mobile computing devices a bluetooth wireless network infrastructure for a multimedia guidebookMatthew D Souza, Adam Postula, Neil Bergmann, Montserrat Ros. 150-153
- A bluetooth based protocol for multimedia guidebooks on mobile computing devices experiencing mobile locality-aware multimedia in the palm of your handMatthew D Souza, Adam Postula, Neil Bergmann, Montserrat Ros. 154-157
- Energy-conserving on-demand routing for multi-rate multi-hop networksTsung-Han Lee, Alan Marshall, Bosheng Zhou. 158-161
- New trends of e-commerce in spainIsrael Gonzàles-Carrasco, Jose Luis Cuadrado, Belén Ruíz-Mezcua, Ángel García-Crespo. 159-163
- A novel transfer policy model to enhance the serviceability of an e-businessJason C. T. Lo, Allan K. Y. Wong, Wilfred W. K. Lin. 162-170
- Cost-effective service task assignment in multidomain distributed computing environmentsMalamati D. Louta, Angelos Michalas, Ioannis Psoroulas, Evangelos Loutas. 164-168
- Nedine: An intelligent global news publishing and distribution service based on web services and peer-to-peer technologiesMarkus W. Schranz. 169-172
- Properties of dominant color temperature descriptorKarol Wnukowicz, Wladyslaw Skarbek. 171-176
- A framework for policy-based sla management over wireless lanNoh-sam Park, Gil-Haeng Lee. 173-176
- Self-organizing and self-repairing mass memories for autosophy multimedia archiving systems replacing the data processing computer with self-learning machines based on the autosophy information theoryKlaus Holtz, Eric Holtz, Diana Kalienky. 177-182
- Web personalized intelligent user interfaces and processes an enabler of multi-channel ebusiness services sustainabilityPanagiotis Germanakos, Constantinos Mourlas, Chara Isaia. 177-180
- E-commerce ticketing tool for multifunctional enclosures low cost solutions for tradicional venues best adventajeRicardo Colomo Palacios, Edmundo Tovar. 181-184
- Test environment for performance evaluation of an internet radioDavid Melendi, Manuel Vilas, Xabiel G. Pañeda, Roberto García, Víctor G. García. 183-190
- GMPLS impact on network provider s opex when compared to traditional approachesSandrine Pasqualini, Sofie Verbrugge, A. Kirstäter, Andreas Iselt, Didier Colle, Mario Pickavet, Piet Demeester. 185-192
- An efficient proxy signature scheme in home network DRMXiaoyun Wang, Kefei Chen. 191-196
- Enhanced discovery of web services using semantic context descriptionsSimone A. Ludwig, S. M. S. Reyhani. 193-196
- Method for audio/video streaming testbed definition and model developmentXabiel G. Pañeda, Roberto García, David Melendi, Manuel Vilas, Víctor G. García. 197-200
- Adaptive real-time network monitoring system detecting anomalous activity with evolving connectionist systemMuhammad Fermi Pasha, Rahmat Budiarto, Masashi Yamada. 201-209
- Reliability evaluation of wdm networks with link capacity and hop constraintsHehong Fan, Mingde Zhang, Xiaohan Sun. 210-215
- A signaling architecture against dos attacksAhmad Fadlallah, Ahmed Serhrouchni. 216-221
- Host identity protocol proxyPatrik Salmela, Jan Melén. 222-230
- Survey on SNMP in next genaration networkLiu Yan, Yin Xia, Jianping Wu. 231-239
- Biometric based smart card for securityChunlei Yang, Gui Yun Tian, Steve Ward. 240-246
- Enhancing the security of mobile e-commerce with a hybrid biometric authentication systemRachid Bencheikh, Luminita Vasiu. 247-253
- Secret locking: Exploring new approaches to biometric key encapsulationSeny Kamara, Breno de Medeiros, Susanne Wetzel. 254-261
- Cellular automata based key agreementDebdeep Mukhopadhyay, Dipanwita Roy Chowdhury. 262-267
- Guaranteerring security of financial transaction by using quantum cryptography in banking environmentSolange Ghernaouti-Helie, Mohamed Ali Sfaxi. 268-274
- Optimal trade-off for merkle tree traversalMarek Karpinski, Yakov Nekrich. 275-282
- Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level informationGeorgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis. 283-290
- The web-based sla monitoring and reporting (WSMR) systemEunjin Ko, Junwoo Lee, Gilhaeng Lee, Youngsun Kim. 293-297
- A reusable intelligent authorization design for web services software securityWeider D. Yu, Archana Mansukhani. 298-303
- Automated configuration distribution in verinecDavid Buchmann, Dominik Jungo, Ulrich Ultes-Nitsche. 304-309
- Reliable multicast protocol a modified retransmission-based loss-recovery scheme based on the selective repeated ARQ protocolsChih-Shing Tau, Tzone-I Wang. 310-317
- Cluster and network management integration an SNMP-based SolutionRodrigo Sanger Alves, Clarissa Cassales Marquezan, Philippe Olivier Alexandre Navaux, Lisandro Zambenedetti Granville. 318-323
- Estimation of the distributions of the QOS parameters using sampled passive measurements techniquesYazeed A. Al-Sbou, Reza Saatchi, Samir Al-Khayatt, Rebecca Strachan. 324-329
- Voice biometrics within the family: Trust, privacy and personalisationDelphine Charlet, Victor Peral Lecha. 330-334
- Remote handwritten signature authenticationJarrod Trevathan, Alan McCabe. 335-339
- Design issues for electronic auctionsJarrod Trevathan, Wayne Read, Hossein Ghodosi. 340-347
- Monitoring and alarm management for system and network security a web-based comprehensive approachJoão Afonso, Edmundo Monteiro, Carlos Ferreira. 348-355
- Scheduling and QOs for leak rate in policing mechanisms over telecommunications networkSomchai Lekcharoen, Chanintorn Jittawiriyanukoon. 359-363
- A preliminary exploration of striped hashing a probabilistic scheme to speed up existing hash algorithmsGeorge I. Davida, Jeremy A. Hansen. 364-367
- Hardening windows systemsGeorge I. Davida, Jon Peccarelli. 368-371
- Design and implementation aspects of management systems for application service providingMichael Höding. 372-375
- Generating security event correlation rules through k-means clusteringNelson Uto, Helen Teixeira, Andre Blazko, Marcos Ferreira de Paula, Renata Cicilini Teixeira, Mamede Lima-Marques. 376-381