Abstract is missing.
- Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm AnimalsBartosz Wietrzyk, Milena Radenkovic. 1 [doi]
- Anonymous Routing in MANET Using Random IdentifiersReza Shokri, Maysam Yabandeh, Nasser Yazdani. 2 [doi]
- Traffic Engineering in Fourth Generation Wireless NetworksTibor Gyires. 3 [doi]
- A-sLEACH: An Advanced Solar Aware Leach Protocol for Energy Efficient Routing in Wireless Sensor NetworksJunayed Islam, Muhidul Islam, Nazrul Islam. 4 [doi]
- A Transmission Power Control MAC Protocol for Wireless Sensor NetworksZhiwei Zhao, Xinming Zhang, Peng Sun, Pengxi Liu. 5 [doi]
- On the Performance of V-BLAST Detectors in MIMO MT-CDMA Uplink over Multipath Fading ChannelWei Yang, Yang Wei. 6 [doi]
- EDDS: An Efficient Data Delivery Scheme for Address-Free Wireless Sensor NetworksWeiwei Fang, Yi Liu, Depei Qian. 7 [doi]
- A Link Reliability-Aware Route Maintenance Mechanism for Mobile Ad Hoc NetworksDong Shi, Xinming Zhang, Xuemei Gao, Wenbo Zhu, Fengfu Zou. 8 [doi]
- A Novel Virtual Anchor Node-Based Localization Algorithm for Wireless Sensor NetworksPengxi Liu, Xinming Zhang, Shuang Tian, Zhiwei Zhao, Peng Sun. 9 [doi]
- GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc NetworksPaul Barom Jeon, George Kesidis. 10 [doi]
- Simulative Considerations for Future 4G Hierarchical Mobility Management in All-IP NetworksNorbert Jordan, Alexander Poropatich, Peter Reichl. 11 [doi]
- An Adaptive Schedule Medium Access Control for Wireless Sensor NetworksBing Liu 0006, Lin Zhang, Huimin Zhang. 12 [doi]
- Wireless Sensor Network Based Coal Mine Wireless and Integrated Security Monitoring Information SystemWei Yang, Ying Huang. 13 [doi]
- Influence of Release Timer on MAC-hs PerformanceRobert Bestak. 14 [doi]
- The Effective Multicasting Routing Protocol in Wireless Mobile Adhoc NetworkG. Narsimha, A. Venugopal Reddy, S. S. V. N. Sarma. 15 [doi]
- Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET)Sandhya Khurana, Neelima Gupta, Nagender Aneja. 16 [doi]
- WiMAX Performance EvaluationPavel Mach, Robert Bestak. 17 [doi]
- A Dynamic Approach for the Selection of Super Peers in Ad Hoc NetworksAhmed M. Mahdy, Jitender S. Deogun, Jun Wang. 18 [doi]
- Localized Support for Injection Point Election in Hybrid NetworksMatthias R. Brust, Steffen Rothkugel. 19 [doi]
- QoS Support in a MANET Based on OLSR and CBQLeila Boukhalfa, Pascale Minet, Serge Midonnet. 20 [doi]
- Architectural Analysis of Multicast Routing Protocols for Wireless Ad Hoc NetworksDewan Tanvir Ahmed, Shervin Shirmohammadi. 21 [doi]
- Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access NetworksHussein Al-Zubaidy, Jerome Talim, Ioannis Lambadaris. 22 [doi]
- A Practical Low Interference Topology Control for Mobile Ad Hoc NetworksXiang Yu, Xinming Zhang, Can Que, Qiong Liu. 23 [doi]
- Implementation of an Energy Model for JiST/SWANS Wireless Network SimulatorTrishla Sutaria, Imad Mahgoub, Ali Humos, Ahmed Badi. 24 [doi]
- A Taxonomic Approach to Topology Control in Ad Hoc and Wireless NetworksMatthias R. Brust, Steffen Rothkugel. 25 [doi]
- Design Issues of Peer-to-Peer Systems for Wireless Ad Hoc NetworksDewan Tanvir Ahmed, Shervin Shirmohammadi. 26 [doi]
- A New Contention Access Method for Collision Avoidance in Wireless Sensor NetworksHung-Cuong Le, Hervé Guyennet, Noureddine Zerhouni. 27 [doi]
- A Trust Model Based Cooperation Enforcement Mechanism in Mesh NetworksZhiming Zhang, Weirong Jiang, Yibo Xue. 28 [doi]
- Optimal Leader Election Scheme for Peer-to-Peer ApplicationsSeung Chul Han, Ye Xia. 29 [doi]
- Tourist: Self-Adaptive Structured OverlayHuanan Zhang, Jinfeng Hu, Chunhui Hong, Dongsheng Wang. 30 [doi]
- Active Peer to PeerXuelian Lin, Jinpeng Huai, Xudong Liu, Jun Han. 31 [doi]
- WebMiner--Anatomy of Super Peer Based Incremental Topic-Specific Web CrawlerOm Vikas, Nitin J. Chiluka, Purushottam K. Ray, Girraj Meena, Akhil K. Meshram, Amit Gupta, Abhishek Sisodia. 32 [doi]
- Ring-Based Virtual Private Network Supporting a Large Number of VPNsOsamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhiro Matsuda. 33 [doi]
- Hierarchical System-Level Diagnosis Based on a Voting Scheme for Identical-Unit-Interconnection SystemsTomoyoshi Fukuta, Hiroshi Masuyama, Toshihiko Sasama. 34 [doi]
- What Are the Chances an Availability SLA will be Violated?Andrew P. Snow, Gary R. Weckman. 35 [doi]
- VWQGRR: A Novel Packet SchedulerLinhua Zhong, Jin Xu, Xianlei Wang. 36 [doi]
- Performance of a Policy-Based Management System in IPv6 Networks Using COPS-PRAlex Vallejo, Agustín Zaballos, Jaume Abella, Joseph M. Selga, Carles Duz. 37 [doi]
- Analysis of IEEE 802.11e for Delay Sensitive Traffic in Wireless LANsAnna Shklyaeva, David Kubanek, Vit Novotny. 38 [doi]
- Considering Security and Quality of Service in SLS to Improve Policy-Based Management of Multimedia ServicesSandrine Duflos, Brigitte Kervella, Valérie Gay. 39 [doi]
- Improving Network s Performability Using Parallel ProcessingMostafa Shaad Zolpirani, Mohammad-Mahdi Bidmeshki, Seyed Ghassem Miremadi. 40 [doi]
- Traffic Characteristics-Based Flow Assignment Method for Reducing Queuing DelayYoshinori Kitatsuji, Satoshi Katsuno, Masato Tsuru, Tetsuya Takine, Yuji Oie. 41 [doi]
- Proxy-Based Visual Content Repurposing Using Selection AlgorithmM. Shamim Hossain, Abdulmotaleb El-Saddik. 42 [doi]
- Interactions between a Mobile Virtual Network Operator and External Networks with Regard to Service TriggeringMarc Cheboldaeff. 43 [doi]
- Integrated Management of Distributed Packet Filter Configurations in Carrier-Grade IP NetworksBirger Tödtmann, Erwin P. Rathgeb. 44 [doi]
- Personalized Home-NetworksJosé Soler, Michael Gandy. 45 [doi]
- An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed LinkGaogang Xie, Jianhua Yang, Valérie Issarny, Alberto Conte. 46 [doi]
- Bandwidth Scheduling and Path Computation Algorithms for Connection-Oriented NetworksSartaj Sahni, Nageshwara Rao, Sanjay Ranka, Yan Li, Eun Sung Jung, Nara Kamath. 47 [doi]
- Inefficiency from Provisioning the Internet SelfishlyAlexandre Mateus, Pedro Ferreira. 48 [doi]
- ABW - Short-Timescale Passive Bandwidth MonitoringSven Ubik, Demetres Antoniades, Arne Øslebø. 49 [doi]
- Toward Broad-Spectrum Autonomic ManagementEdmund Smith, Paul Anderson. 50 [doi]
- Distance-Dependent RED Policy (DDRED)Sebastien Linck, Eugen Dedu, François Spies. 51 [doi]
- The New Detection Algorithms for Network Traffic AnomaliesJun Lv, Xing Li, Tong Li. 52 [doi]
- Open Home Networks: The TEAHA ApproachHylke W. van Dijk, Hans J. Scholten, Alvaro Tobalina, Victor Garcia Munoz, Stephane Milanini, Antonio Kung. 53 [doi]
- Service Broker for Managing Feature Interactions in IP Multimedia SubsystemAnahita Gouya, Noël Crespi. 54 [doi]
- Network Traffic Invariant Characteristics: Metering AspectsVladimir S. Zaborovsky, Andrey Rudskoy, Alex Sigalov. 55 [doi]
- A New Network Topology Evolution Generator Based on Traffic Increase and Distribution ModelXiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou. 56 [doi]
- CoLoRaDe: A Novel Algorithm for Controlling Long-Range Dependent Network TrafficKarim Mohammed Rezaul, Vic Grout. 57 [doi]
- The Choice of Mesh Structure in Computer NetworksLeszek Koszalka. 58 [doi]
- Dependability-Driven Embedded Systems NetworkingMiroslav Svéda, Radimir Vrba. 59 [doi]
- Towards a Self Organizing Protocol for a Multi Agents System (MASSOP)H. Mellah, Salima Hassas, I. Halilali, Z. Mesneb, H. Drias. 60 [doi]
- Optimum Topology-Aware Scheduling of Many-to-Many Collective CommunicationsVaclav Dvorak, Jirí Jaros, Milos Ohlídal. 61 [doi]
- System Capacity of Filtered Multitone ModulationBingfeng Zhang, Weihong Zhu, Zhenming Gao. 62 [doi]
- Performance Comparison of Iterative Decoding Algorithm Using the Extrinsic Information Transfer ChartXuelan Zou, Guangzeng Feng. 63 [doi]
- Empirical Study on the Evolution of PlanetLabLi Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li. 64 [doi]
- Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of WormsHanxun Zhou, Yingyou Wen, Hong Zhao. 65 [doi]
- Optimizing Free Space Optics for City-Wide Wireless NetworksAhmed M. Mahdy, Jitender S. Deogun. 66 [doi]
- The Structure of a Control Network Integrated with the S-bus of an ISDN NetworkDariusz Koscielnik. 67 [doi]
- DC-Notch FIR Filters for Zero-IF ReceiversPavel Zahradnik, Miroslav Vlcek, Boris Simák. 68 [doi]
- Time Domain Equalization in Modern Communication Systems Based on Discrete Multitone ModulationPavel Silhavy. 69 [doi]
- Image Processing Method Based on Subpixel Analysis for Accurate Measurement of DimensionsMichal Kohoutek, Kamil Vrba. 70 [doi]
- Shortening the Switching Times of Gradients for MR Tomography and SpectroscopyEva Gescheidtova, Radek Kubasek, Karel Bartusek, Zdenek Smékal. 71 [doi]
- Low Input-Impedance Current-Mirror for High-Speed Data CommunicationIvo Lattenberg, Kamil Vrba. 72 [doi]
- Continuous-Time Multifunctional Filters with Wide Bandwidth Using Universal Voltage ConveyorsMartin Minarcik, Kamil Vrba. 73 [doi]
- Access Authentication to IMS Systems in Next Generation NetworksSilke Holtmanns, Son Phan-Anh. 74 [doi]
- A Novel Early DBA Mechanism with Prediction-Based Fair Excessive Bandwidth Reallocation Scheme in EPONI-Shyan Hwang, Zen-Der Shyu, Liang-Yu Ke, Chun-Che Chang. 75 [doi]
- NGN Standards Activities in ETSITatiana Kovacikova, Pavol Segec. 76 [doi]
- Opportunities of Today s ICT Technologies for Support of Education and Training in RadiologyPetr Krupa, Michal Javornik, Otto Dostal. 77 [doi]
- Succinct Representation of Static Packet Forwarding TablesWencheng Lu, Sartaj Sahni. 78 [doi]
- Dynamic Tree Bitmap for IP Lookup and UpdateSartaj Sahni, Haibin Lu. 79 [doi]
- A Novel Dynamic Multiple Rings-Based Local Restoration for One-to-Multipoint Multicast Traffic in WDM Mesh NetworksI-Shyan Hwang, Ren-Yuan Cheng, Zen-Der Shyu. 80 [doi]
- A High Performance Multicast Scheme Based on Virtual 2D Torus TopologyI-Shyan Hwang, San-Nan Lee, Kuo-Chang Chien. 81 [doi]
- Design and Implementation of an Open Programmable Router Compliant to IETF ForCES SpecificationsWeiming Wang, Ligang Dong, Bin Zhuge, Ming Gao, Fenggen Jia, Rong Jin, Jin Yu, Xiaochun Wu. 82 [doi]
- Iterative Algorithms for Nash Equilibrium of an Extended OSNR GameYan Pan, Lacra Pavel. 83 [doi]
- End-to-End Congestion Control for H.264/SVCXiaogang Yang, Lei Lei. 84 [doi]
- Tree Structure for Specific-Source Multicast with Feedback AggregationDan Komosny, Vit Novotny. 85 [doi]
- Performance Enhancement of Multimedia Broadcast Multicast Service (MBMS) with Receive DiversityKari Aho, Tapani Ristaniemi, Janne Kurjenniemi, Ville Haikola. 86 [doi]
- Beyond Broadcast--A Hybrid Testbed for Mobile TV 2.0 ServicesRaimund Schatz, Norbert Jordan, Siegfried Wagner. 87 [doi]
- Scalability of the OLSR Protocol with the Fish Eye ExtensionDang Nguyen, Pascale Minet. 88 [doi]
- Scalability of TCP Servers, Handling Persistent ConnectionsKonstantin Shemyak, Kai Vehmanen. 89 [doi]
- Performance Analysis on Utilizing Directional Antenna in High-Density WLANGuoqing Li, Jing Zhu. 90 [doi]
- Weighted IS Method of Estimating FER of LDPC Codes in High SNR RegionGuangwen Li, Guangzeng Feng. 91 [doi]
- Planning of IP Networks with Quality of Service GuaranteeThi-Thanh-Mai Hoang. 92 [doi]
- Interference Measurements on Performance Degradation between Colocated IEEE 802.11g/n and IEEE 802.15.4 NetworksMarina Petrova, Lili Wu, Petri Mähönen, Janne Riihijärvi. 93 [doi]
- On the Correlation of Geographic and Network Proximity at Internet Edges and Its Implications for Mobile Unicast and Multicast RoutingThomas C. Schmidt, Matthias Wählisch, Ying Zhang. 94 [doi]
- Algorithms of Unicast, Multicast and Broadcast Transmission for Optical SwitchesIwona Pozniak-Koszalka, Dawid Zydek. 95 [doi]
- The Honeynet Quarantine: Reducing Collateral Damage Caused by Early Intrusion ResponseBirger Tödtmann, Stephan Riebach, Erwin P. Rathgeb. 96 [doi]
- Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown EventsTutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira. 97 [doi]
- Automated Detection of Emerging Network Security ThreatsM. Shirantha de Silva, David J. Parish, P. Sandford, J. M. Sandford. 98 [doi]
- Algorithm Design and Side Channel Vulnerability on the Example of DPA AttackJens Rudinger, Adolf Finger. 99 [doi]
- Traffic Summary Analysis for Network Abuse Detection in High Date-Rate ISP NetworksP. Sandford, David J. Parish, J. M. Sandford. 100 [doi]
- A Robust Single Sign-On Model Based on Multi-Agent System and PKISomchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt. 101 [doi]