Abstract is missing.
- Decoding Consideration for Space Time Coded MIMO Channel with Constant Amplitude Multi-code SystemJia Hou, Moon Ho Lee, Ju Yong Park, Jeong-Su Kim. 1-7 [doi]
- MIMO Frequency Hopping OFDM-CDMA: A Novel Uplink System for B3G Cellular NetworksLaurent Cariou, Jean-François Hélard. 8-17 [doi]
- Transient Capacity Evaluation of UWB Ad Hoc Network with MIMOCheol Yong Jeon, Yeong Min Jang. 18-25 [doi]
- Chip-by-Chip Iterative Multiuser Detection for VBLAST Coded Multiple-Input Multiple-Output SystemsKe Deng, Qinye Yin, Yiwen Zhang, Ming Luo. 26-33 [doi]
- The Performance Analysis of Two-Class Priority Queueing in MPLS-Enabled IP NetworkYun-Lung Chen, Chienhua Chen. 34-41 [doi]
- Constraint Based LSP Handover (CBLH) in MPLS NetworksPraveen Kumar, Niranjan Dhanakoti, Srividya Gopalan, V. Sridhar. 42-49 [doi]
- Optimizing Inter-domain Multicast Through DINloop with GMPLSHuaqun Guo, Lek Heng Ngoh, Wai-Choong Wong. 50-57 [doi]
- A Fast Path Recovery Mechanism for MPLS NetworksJenhui Chen, Chung-Ching Chiou, Shih-Lin Wu. 58-65 [doi]
- A Study of Billing Schemes in an Experimental Next Generation NetworkPriscila Solís Barreto, Georges Amvame-Nze, C. V. Silva, Juliana Santos Sombra Oliveira, Paulo Henrique Portela de Carvalho, Humberto Abdalla Jr., Antonio José Martins Soares, Ricardo Staciarini Puttini. 66-74 [doi]
- Overlay Logging: An IP Traceback Scheme in MPLS NetworkLuo Wen, Jianping Wu, Ke Xu. 75-82 [doi]
- Monitoring End-to-End Connectivity in Mobile Ad-Hoc NetworksRemi Badonnel, Radu State, Olivier Festor. 83-90 [doi]
- Multi-path Routing Using Local Virtual Infrastructure for Large-Scale Mobile Ad-Hoc Networks: Stochastic Optimization ApproachWonjong Noh, Sunshin An. 91-98 [doi]
- Candidate Discovery for Connected Mobile Ad Hoc NetworksSebastian Speicher, Clemens H. Cap. 99-106 [doi]
- A Fault-Tolerant Permutation Routing Algorithm in Mobile Ad-Hoc NetworksDjibo Karimou, Jean Frédéric Myoupo. 107-115 [doi]
- Policy-Based Dynamic Reconfiguration of Mobile Ad Hoc NetworksMarcos A. de Siqueira, Fabricio L. Figueiredo, Flavia M. F. Rocha, Jose A. Martins, Marcel C. de Castro. 116-124 [doi]
- V-TCP: A Novel TCP Enhancement TechniqueDhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Byoung-Sun Choi, Jae Kwang Lee. 125-132 [doi]
- Optimizing TCP Retransmission TimeoutAlexander Kesselman, Yishay Mansour. 133-140 [doi]
- Stable Accurate Rapid Bandwidth Estimate for Improving TCP over Wireless NetworksLe Tuan Anh, Choong Seon Hong. 141-148 [doi]
- Performance Analysis of TCP Variants over Time-Space-Labeled Optical Burst Switched NetworksZiyu Shao, Ting Tong, Jia Jia Liao, Zhengbin Li, Ziyu Wang, Anshi Xu. 149-155 [doi]
- IPv4 Auto-Configuration of Multi-router Zeroconf Networks with Unique SubnetsCuneyt Akinlar, A. Udaya Shankar. 156-163 [doi]
- K-Shortest Paths Q-Routing: A New QoS Routing Algorithm in Telecommunication NetworksSaid Hoceini, Abdelhamid Mellouk, Yacine Amirat. 164-172 [doi]
- Applicability of Resilient Routing Layers for k-Fault Network RecoveryTarik Cicic, Audun Fosselie Hansen, Stein Gjessing, Olav Lysne. 173-183 [doi]
- Network-Tree Routing Model for Large Scale Networks: Theories and AlgorithmsGuozhen Tan, Dong Li, Xiaohui Ping, Ningning Han, Yi Liu. 184-191 [doi]
- Failover for Mobile Routers: A Vision of Resilient AmbienceEranga Perera, Aruna Seneviratne, Roksana Boreli, Michael Eyrich, Michael Wolf, Tim Leinmüller. 192-201 [doi]
- Quality of Service Routing Network and Performance EvaluationShen Lin 0004, Yong Cui, Mingwei Xu, Ke Xu. 202-209 [doi]
- A Partition Prediction Algorithm for Group Mobility in Ad-Hoc NetworksNam-koo Ha, Byeong-Jik Lee, Kyung-jun Kim, Ki Jun Han. 210-217 [doi]
- Routing Cost Versus Network Stability in MANETHuda Md. Nurul, Shigeki Yamada, Eiji Kamioka. 218-225 [doi]
- Multipath Energy Efficient Routing in Mobile Ad Hoc NetworkShouyi Yin, Xiaokang Lin. 226-233 [doi]
- Performance of Service Location Protocols in MANET Based on Reactive Routing ProtocolsHyun-Gon Seo, Ki-Hyung Kim, Won-Do Jung, Jun-Sung Park, Seung-Hwan Jo, Chang-Min Shin, Seung-Min Park, Heung-Nam Kim. 234-241 [doi]
- A New Scheme for Key Management in Ad Hoc NetworksGuangsong Li, Wenbao Han. 242-249 [doi]
- Robust TCP (TCP-R) with Explicit Packet Drop Notification (EPDN) for Satellite NetworksArjuna Sathiaseelan, Tomasz Radzik. 250-257 [doi]
- Adapting TCP Segment Size in Cellular NetworksJin-Hee Choi, Jin-Ghoo Choi, Chuck Yoo. 258-265 [doi]
- AcTMs (Active ATM Switches) with TAP (Trusted and Active PDU Transfers) in a Multiagent Architecture to Better the Chaotic Nature of TCP Congestion ControlJosé Luis González Sánchez, Jordi Domingo-Pascual, João Chambel Vieira. 266-274 [doi]
- AIMD Penalty Shaper to Enforce Assured Service for TCP FlowsEmmanuel Lochin, Pascal Anelli, Serge Fdida. 275-283 [doi]
- Name-Level Approach for Egress Network Access ControlShinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato, Kozo Itano. 284-296 [doi]
- Efficient Prioritized Service Recovery Using Content-Aware Routing Mechanism in Web Server ClusterEuisuk Kang, Sook-Heon Lee, Myong-Soon Park. 297-306 [doi]
- Queue Management Scheme Stabilizing Buffer Utilization in the IP RouterYusuke Shinohara, Norio Yamagaki, Hideki Tode, Koso Murakami. 307-317 [doi]
- Two Mathematically Equivalent Models of the Unique-Path OSPF Weight Setting ProblemChangyong Zhang, Robert Rodosek. 318-326 [doi]
- Fault Free Shortest Path Routing on the de Bruijn NetworksNgoc Chi Nguyen, Vo Dinh Minh Nhat, Sungyoung Lee. 327-334 [doi]
- Traffic Control in IP Networks with Multiple Topology RoutingLjiljana Adamovic, Karol Kowalik, Martin Collier. 335-342 [doi]
- Dynamic Path Control Scheme in Mobile Ad Hoc Networks Using On-Demand Routing ProtocolJihoon Lee, Wonjong Noh. 343-352 [doi]
- On the Capacity of Wireless Ad-Hoc Network Basing on Graph TheoryQin-yun Dai, Xiu-lin Hu, Hong-Yi Yu, Jun Zhao. 353-360 [doi]
- Mobile Gateways for Mobile Ad-Hoc Networks with Network Mobility SupportRyuji Wakikawa, Hiroki Matsutani, Rajeev Koodli, Anders Nilsson, Jun Murai. 361-368 [doi]
- Energy Consumption in Multicast Protocols for Static Ad Hoc NetworksSangman Moh. 369-376 [doi]
- Weighted Flow Contention Graph and Its Applications in Wireless Ad Hoc NetworksGuo-Kai Zeng, Yinlong Xu, Ya-feng Wu, Xi Wang. 377-383 [doi]
- Automatic Adjustment of Time-Variant Thresholds When Filtering Signals in MR TomographyEva Gescheidtova, Radek Kubasek, Zdenek Smékal, Karel Bartusek. 384-391 [doi]
- Analytical Design of Maximally Flat Notch FIR Filters for Communication PurposesPavel Zahradnik, Miroslav Vlcek, Boris Simák. 392-400 [doi]
- Iterative Decoding and Carrier Frequency Offset Estimation for a Space-Time Block Code SystemMing Luo, Qinye Yin, Le Ding, Yiwen Zhang. 401-409 [doi]
- Signal Processing for High-Speed Data Communication Using Pure Current Mode FiltersIvo Lattenberg, Kamil Vrba, David Kubanek. 410-416 [doi]
- Current-Mode VHF High-Quality Analog Filters Suitable for Spectral Network AnalysisKamil Vrba, Radek Sponar, David Kubanek. 417-424 [doi]
- Control of Digital Audio Signal Processing over Communication NetworksJiri Schimmel, Petr Sysel. 425-432 [doi]
- Fully-Distributed and Highly-Parallelized Implementation Model of BGP4 Based on Clustered RoutersXiaozhe Zhang, Peidong Zhu, Xicheng Lu. 433-441 [doi]
- A Routing Protocol for Wireless Ad Hoc Sensor Networks: Multi-path Source Routing Protocol (MPSR)Mounir Achir, Laurent Ouvry. 442-453 [doi]
- Generalized Secure Routerless RoutingVince Grolmusz, Zoltán Király. 454-462 [doi]
- A Verified Distance Vector Routing Protocol for Protection of Internet InfrastructureLiwen He. 463-470 [doi]
- Replay Attacks in Mobile Wireless Ad Hoc Networks: Protecting the OLSR ProtocolEli Winjum, Anne Marie Hegland, Øivind Kure, Pål Spilling. 471-479 [doi]
- S-Chord: Hybrid Topology Makes Chord EfficientHui-shan Liu, Ke Xu, Mingwei Xu, Yong Cui. 480-487 [doi]
- Hierarchical Multi-hop Handoff Architecture for Wireless Network MobilityYunkuk Kim, Sangwook Kang, Donghyun Chae, Sunshin An. 488-495 [doi]
- Mobility Adaptation Layer Framework for Heterogeneous Wireless Networks Based on Mobile IPv6Norbert Jordan, Alexander Poropatich, Joachim Fabini. 496-503 [doi]
- MiSC: A New Availability Remote Storage System for Mobile ApplianceJoo-Ho Kim, Bo-Seok Moon, Myong-Soon Park. 504-520 [doi]
- A Logical Network Topology Design for Mobile Agent SystemsKazuhiko Kinoshita, Nariyoshi Yamai, Koso Murakami. 521-530 [doi]
- Reduced-State SARSA Featuring Extended Channel Reassignment for Dynamic Channel Allocation in Mobile Cellular NetworksNimrod Lilith, Kutluyil Dogancay. 531-542 [doi]
- Call Admission Control for Next Generation Cellular Networks Using on Demand Round Robin Bandwidth SharingKyungkoo Jun, Seokhoon Kang. 543-550 [doi]
- Performance Evaluation and Improvement of Non-stable Resilient Packet Ring BehaviorFredrik Davik, Amund Kvalbein, Stein Gjessing. 551-563 [doi]
- Load Distribution Performance of the Reliable Server Pooling FrameworkThomas Dreibholz, Erwin P. Rathgeb, Michael Tüxen. 564-574 [doi]
- Performance of a Hub-Based Network-Centric Application over the Iridium Satellite NetworkMargaret M. McMahon, Eric C. Firkin. 575-584 [doi]
- Performance Evaluation of Multichannel Slotted-ALOHA Networks with BufferingSebastià Galmés, Ramón Puigjaner. 585-596 [doi]
- Towards a Scalable and Flexible Architecture for Virtual Private NetworksShashank Khanvilkar, Ashfaq A. Khokhar. 597-605 [doi]
- A Simple, Efficient and Flexible Approach to Measure Multi-protocol Peer-to-Peer TrafficHolger Bleul, Erwin P. Rathgeb. 606-616 [doi]
- Secure Identity and Location Decoupling Using Peer-to-Peer NetworksStephen Herborn, Tim Hsin-Ting Hu, Roksana Boreli, Aruna Seneviratne. 617-624 [doi]
- Live Streaming on a Peer-to-Peer Overlay: Implementation and ValidationJoaquín Caraballo Moreno, Olivier Fourmaux. 625-633 [doi]
- Distributed Object Location with Queue Management Provision in Peer-to-Peer Content Management SystemsVassilios M. Stathopoulos, Nikolaos D. Dragios, Nikolas Mitrou. 634-642 [doi]
- An Approach to Fair Resource Sharing in Peer-to-Peer SystemsYongquan Ma, Dongsheng Wang. 643-652 [doi]
- Discovery and Routing in the HEN Heterogeneous Peer-to-Peer NetworkTim Schattkowsky. 653-661 [doi]
- Scalable Group Key Management with Partially Trusted ControllersHimanshu Khurana, Rafael Bonilla, Adam J. Slagell, Raja Afandi, Hyung-Seok Hahm, Jim Basney. 662-672 [doi]
- H.323 Client-Independent Security ApproachLubomir Cvrk, Vaclav Zeman, Dan Komosny. 673-680 [doi]
- Architecture of Distributed Network Processors: Specifics of Application in Information Security SystemsVladimir S. Zaborovskii, Y. A. Shemanin, Andrey Rudskoy. 681-688 [doi]
- Active Host Information-Based Abnormal IP Address DetectionGaeil Ahn, Kiyoung Kim. 689-698 [doi]
- Securing Layer 2 in Local Area NetworksHayriye Altunbasak, Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol. 699-706 [doi]
- A Practical and Secure Communication Protocol in the Bounded Storage ModelErkay Savas, Berk Sunar. 707-717 [doi]
- Measuring Quality of Service Parameters over Heterogeneous IP NetworksAntonio Pescapè, Luca Vollero, Giulio Iannello, Giorgio Ventre. 718-727 [doi]
- Performance Improvement of Hardware-Based Packet Classification AlgorithmYaw-Chung Chen, Pi-Chung Wang, Chun-Liang Lee, Chia-Tai Chan. 728-736 [doi]
- Analyzing Performance Data Exchange in Content Delivery NetworksDavide Rossi, Elisa Turrini. 737-745 [doi]
- Passive Calibration of Active Measuring LatencyJianping Yin, Zhiping Cai, Wentao Zhao, Xianghui Liu. 746-753 [doi]
- Application-Level Multicast Using DINPeer in P2P NetworksHuaqun Guo, Lek Heng Ngoh, Wai-Choong Wong. 754-761 [doi]
- Paradis-NetGuido Malpohl, Florin Isaila. 762-771 [doi]
- Reliable Mobile Ad Hoc P2P Data SharingMee Young Sung, Jong Hyuk Lee, Jong Seung Park, Seung Sik Choi, Sungtek Kahng. 772-780 [doi]
- The Hybrid Chord Protocol: A Peer-to-Peer Lookup Service for Context-Aware Mobile ApplicationsStefan Zöls, Rüdiger Schollmeier, Wolfgang Kellerer, Anthony Tarlano. 781-792 [doi]
- LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P NetworkXicheng Lu, Qianbing Zheng, Peidong Zhu, Wei Peng. 793-799 [doi]
- Content Distribution in Heterogenous Video-on-Demand P2P Networks with ARIMA ForecastsChris Loeser, Gunnar Schomaker, André Brinkmann, Mario Vodisek, Michael Heidebuer. 800-809 [doi]
- Critical Analysis and New Perspective for Securing Voice NetworksCarole Bassil, Ahmed Serhrouchni, Nicolas Rouhana. 810-818 [doi]
- Architecture of a Server-Aided Signature Service (SASS) for Mobile NetworksLiang Cai, Xiaohu Yang, Chun Chen. 819-826 [doi]
- Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)Duncan S. Wong, Agnes Hui Chan, Feng Zhu. 827-834 [doi]
- An Efficient Anonymous Scheme for Mutual Anonymous CommunicationsRay-I Chang, Chih-Chun Chu. 835-843 [doi]
- GDS Resource Record: Generalization ofthe Delegation Signer ModelGilles Guette, Bernard Cousin, David Fort. 844-851 [doi]
- Secure Initialization Vector Transmission on IP SecurityYoon-Jung Rhee. 852-858 [doi]
- Multicast Receiver Mobility over Mobile IP Networks based on Forwarding Router DiscoveryTakeshi Takahashi, Koichi Asatani, Hideyoshi Tominaga. 859-867 [doi]
- Secure Multicast in Micro-Mobility EnvironmentsHo Seok Kang, Young-Chul Shim. 868-875 [doi]
- Scalability and Robustness of Virtual Multicast for Synchronous Multimedia DistributionPetr Holub, Eva Hladká, Ludek Matyska. 876-883 [doi]
- Mobile Multicast Routing Protocol Using Prediction of Dwelling Time of a Mobile HostJae Keun Park, Sung Je Hong, Jong Kim. 884-891 [doi]
- A Group Management Protocol for Mobile MulticastHidetoshi Ueno, Hideharu Suzuki, Norihiro Ishikawa. 892-903 [doi]
- Propagation Path Analysis for Location Selection of Base-Station in the Microcell Mobile CommunicationsSun-Kuk Noh, Dong-You Choi, Chang-kyun Park. 904-911 [doi]
- Efficient Radio Resource Management in Integrated WLAN/CDMA Mobile NetworksFei Yu, Vikram Krishnamurthy. 912-919 [doi]
- A Study on the Cell Sectorization Using the WBTC and NBTC in CDMA Mobile Communication SystemsDong-You Choi, Sun-Kuk Noh. 920-927 [doi]
- DOA-Matrix Decoder for STBC-MC-CDMA SystemsYanxing Zeng, Qinye Yin, Le Ding, Jianguo Zhang. 928-935 [doi]
- Erlang Capacity of Voice/Data CDMA Systems with Service Requirements of Blocking Probability and Delay ConstraintInsoo Koo, Jeongrok Yang, Kiseon Kim. 936-943 [doi]
- A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory SizeSeongHan Shin, Kazukuni Kobara, Hideki Imai. 944-952 [doi]
- The Fuzzy Engine for Random Number Generator in Crypto ModuleJinkeun Hong. 953-963 [doi]
- A Packet Marking Scheme for IP TracebackHaipeng Qu, Purui Su, Dongdai Lin, Dengguo Feng. 964-971 [doi]
- Securing Admission Control in Ubiquitous Computing EnvironmentJong-Phil Yang, Kyung Hyune Rhee. 972-979 [doi]
- Detecting the Deviations of Privileged Process ExecutionPurui Su, Dequan Li, Haipeng Qu, Dengguo Feng. 980-988 [doi]
- Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False AlertsZonghua Zhang, Hong Shen. 989-996 [doi]
- Impact of Distributed Denial of Service (DDoS) Attack Due to ARP StormSanjeev Kumar. 997-1002 [doi]
- Design of Network Management System Employing Secure Multicast SNMPDeuk-Whee Kwak, JongWon Kim. 1003-1011 [doi]
- Multi-rate Congestion Control over IP MulticastYuliang Li, Alistair Munro, Dritan Kaleshi. 1012-1022 [doi]
- A TCP-Friendly Multicast Protocol Suite for Satellite NetworksGiacomo Morabito, Sergio Palazzo, Antonio Pantò. 1023-1030 [doi]
- An Enhanced Multicast Routing Protocol for Mobile Hosts in IP NetworksSeung-Jei Yang, Sung-Han Park. 1031-1038 [doi]
- Analysis of Handover Frequencies for Predictive, Reactive and Proxy Schemes and Their Implications on IPv6 and Multicast MobilityThomas C. Schmidt, Matthias Wählisch. 1039-1046 [doi]
- Design Architectures for 3G and IEEE 802.11 WLAN IntegrationFarhan Siddiqui, Sherali Zeadally, Ece Yaprak. 1047-1054 [doi]
- Eliminating the Performance Anomaly of 802.11bSee-hwan Yoo, Jin-Hee Choi, Jae-Hyun Hwang, Chuck Yoo. 1055-1062 [doi]
- Energy Efficiency Analysis of IEEE 802.11 DCF with Variable Packet LengthBo Gao, Yuhang Yang, Huiye Ma. 1063-1070 [doi]
- Scheduling MPEG-4 Video Streams Through the 802.11e Enhanced Distributed Channel AccessMichael Ditze, Kay Klobedanz, Guido Kämper, Peter Altenbernd. 1071-1079 [doi]
- IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level ThroughputNamgi Kim, Sunwoong Choi, Hyunsoo Yoon. 1080-1087 [doi]
- Some Principles Incorporating Topology Dependencies for Designing Survivable WDM Optical NetworksSungwoo Tak. 1088-1096 [doi]
- Resilient Routing Layers for Network Disaster PlanningAudun Fosselie Hansen, Amund Kvalbein, Tarik Cicic, Stein Gjessing. 1097-1105 [doi]
- Design of a Service Discovery Architecture for Mobility-Supported Wired and Wireless NetworksHyun-Gon Seo, Ki-Hyung Kim. 1106-1113 [doi]
- Research on Fuzzy Group Decision Making in Security Risk AssessmentFang Liu, Kui Dai, Zhiying Wang, Jun Ma. 1114-1121 [doi]
- A Resilient Multipath Routing Protocol for Wireless Sensor NetworksKi-Hyung Kim, Won-Do Jung, Jun-Sung Park, Hyun-Gon Seo, Seung-Hwan Jo, Chang-Min Shin, Seung-Min Park, Heung-Nam Kim. 1122-1129 [doi]
- A Multilaterally Secure, Privacy-Friendly Location-Based Service for Disaster Management and Civil ProtectionLothar Fritsch, Tobias Scherner. 1130-1137 [doi]
- Survivability-Guaranteed Network Resiliency Methods in DWDM NetworksJin-Ho Hwang, Won Kim, Jun Won Lee, Sung Un Kim. 1138-1145 [doi]