Abstract is missing.
- Survey of Energy Efficient Strategies in Wireless Ad Hoc and Sensor NetworksSaoucene Mahfoudh, Pascale Minet. 1-7 [doi]
- Comparing AMRIS and ODMRP in Ad-Hoc Networks by QualNetElham Mazinan, Zahra Arabshahi, Javad Adim. 8-13 [doi]
- Practical MANETs for Pervasive Cattle MonitoringBartosz Wietrzyk, Milena Radenkovic, Ivaylo Kostadinov. 14-23 [doi]
- QOS Multicast Routing Based on Bandwidth and Resource Availability in Mobile Adhoc NetworksG. Narsimha, A. Venugopal Reddy, B. Sateesh Kumar. 24-29 [doi]
- Using Network Density as a New Parameter to Estimate DistanceFreddy López Villafuerte, Kirsten Terfloth, Jochen H. Schiller. 30-35 [doi]
- Resource Allocation for Coexisting ZigBee-Based Personal Area NetworksNiwat Thepvilojanapong, Shinji Motegi, Akira Idoue, Hiroki Horiuchi. 36-45 [doi]
- Gateway Placement with QoS Constraints in Wireless Mesh NetworksY. Drabu, H. Peyravi. 46-51 [doi]
- Applying Distributed Classification Algorithms to Wireless Sensor Networks – A Brief View into the Application of the SPRINT Algorithm FamilyBirger Lantow. 52-59 [doi]
- Network Sender Multicast Routing ProtocolKhalid A. Farhan. 60-65 [doi]
- QoS as Means of Providing WSNs SecurityTamara Pazynyuk, Jianzhong Li, George S. Oreku, Liqiang Pan. 66-71 [doi]
- Liberating TCP: The Free and the StuntsJason Valdez, Mina Guirguis. 72-77 [doi]
- Comparison of Schemes for Provision of Differentiated Availability-Guaranteed Services Using Dedicated ProtectionAnders Mykkeltveit, Bjarne E. Helvik. 78-86 [doi]
- NGN Charging in Enhanced IMSNoëmie Simoni, Yijun Wu, Jean Atme, Antoine Boutignon. 87-92 [doi]
- Hybrid Admission Control Algorithm for IEEE 802.11e EDCA: AnalysisMohamad El Masri, Guy Juanole, Slim Abdellatif. 93-98 [doi]
- An Application Layer Multicast for Collaborative Scenarios: The OMCAST ProtocolGerard París, Marcel Arrufat, Pedro García López, Marc Sánchez Artigas. 99-104 [doi]
- On the Performance of Power and Rate Control in STDMA Multihop Networks with Advanced AntennasMarvin Sánchez G., Jens Zander, Bo Hagerman. 105-110 [doi]
- Reduce Time Synchronization Cost for High Latency and Resource-Constrained Sensor NetworksYi Wang, Benxiong Huang, Furong Wang, Fan Zhang. 111-116 [doi]
- Smart Platform for Wireless Communication - Case StudyRadek Kuchta, Radimir Vrba, Vladimir Sulc. 117-120 [doi]
- SLACP: A Novel Link-Layer Protocol for Wireless WANsDavide Astuti, Aki Nyrhinen, Ilpo Järvinen, Markku Kojo. 121-130 [doi]
- Stable and Fair MANETs: A Scalable Multi-Measure Clustering FrameworkAhmed M. Mahdy, Jitender S. Deogun. 131-136 [doi]
- Seamless Mobility Architecture Supporting Ad-Hoc EnvironmentsSusana Sargento, Rafael Sarrô, Ricardo Duarte, Patrick Stupar. 137-144 [doi]
- Robust Packet Detection Algorithm for DBO-CSSSeong-Hyun Jang, Sang-Hun Yoon, Jong-Wha Chong. 145-149 [doi]
- Optimising the Use of Robust Header Compression Profiles in NEMO NetworksPriyanka Rawat, Jean-Marie Bonnin, Ana Carolina Minaburo. 150-155 [doi]
- Communication Performance of Mesh- and Ring-Based NoCsVaclav Dvorak. 156-161 [doi]
- A Formal and Practical Framework for Constraint-Based RoutingStefano Bistarelli, Francesco Santini. 162-167 [doi]
- On Destination Set in IP-Level Topology MeasurementYu Zhang, Binxing Fang, Hongli Zhang. 168-173 [doi]
- Bayes Optimal DDoS Mitigation by Adaptive History-Based IP FilteringMarkus Goldstein, Christoph H. Lampert, Matthias Reif, Armin Stahl, Thomas M. Breuel. 174-179 [doi]
- Effect of Packet Shuffler on Parallel TCP Stream NetworkYutaka Sugawara, Takeshi Yoshino, Hiroshi Tezuka, Mary Inaba, Kei Hiraki. 180-185 [doi]
- A Transport-layer Approach for Achieving Predictable Throughput for Internet ApplicationsGo Hasegawa, Kana Yamanegi, Masayuki Murata. 186-191 [doi]
- A Limited-Client-Capability Broadcasting Scheme for VoD ApplicationsHsiang-Fu Yu, Hung-Chang Yang, Chu-Yi Chien, Yao-Tien Wang. 192-196 [doi]
- New Approach to Converged NetworksVladislav Skorpil. 197-201 [doi]
- Efficient Method for Content Extraction Applied in Multimedia CommunicationIonut Pirnog, Mihnea Udrea, Constantin Paleologu. 202-206 [doi]
- Protocol Family for Optimal and Deterministic Symmetric Key AssignmentYi-Hua E. Yang, Joseph D. Touch. 207-212 [doi]
- An Access Control Model for Web-Services That Supports Delegation and Creation of AuthorityMitsuhiro Mabuchi, Yasushi Shinjo, Akira Sato, Kazuhiko Kato. 213-222 [doi]
- Fault-Tolerant Extension of Hypercube for Secure and Reliable Group CommunicationsMaria Striki, John S. Baras, Kyriakos Manousakis. 223-231 [doi]
- Further Classification of Bluetooth-Enabled Ad-Hoc Networks Depending on a Risk Analysis within Each Classified GroupKeijo Haataja. 232-237 [doi]
- Mitigation of TCP-SYN Attacks with Microsoft’s Windows XP Service Pack2 (SP2) SoftwareSanjeev Kumar, Einar Petana. 238-242 [doi]
- Application Level Proxies on BridgesTobias Eggendorfer. 243-248 [doi]
- Home Network SecurityHans Scholten, Hylke W. van Dijk. 249-255 [doi]
- MRSI: A Fast Pattern Matching Algorithm for Anti-virus ApplicationsXin Zhou, Bo Xu, Yaxuan Qi, Jun Li. 256-261 [doi]
- An Application of the (max, +) Algebra to Information Flow SecurityMatthias Werner, Michael A. Jaeger, Helge Parzyjegla. 262-266 [doi]
- Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS AttacksXiangbin Cheng, Jun Bi, Xing Li. 267-272 [doi]
- Some Connection Problems with BitTorrentDongliang Guan, Jiangtao Wang, Hui Chen, Jun Dong. 273-278 [doi]
- Enhance Retrieval Efficiency on the InternetWenyu Qu, Keqiu Li, Masaru Kitsuregawa. 279-284 [doi]
- A Peer-to-Peer Service Platform Architecture for Extended Home ServicesIl-Woo Lee, Moon-Ok Choi, Ho-Jin Park. 285-289 [doi]
- A Distributed and Adaptive Revocation Mechanism for P2P NetworksThibault Cholez, Isabelle Chrisment, Olivier Festor. 290-295 [doi]
- Mobile IPTV Expanding the Value of IPTVSoohong Park, Seong-Ho Jeong, Cheolju Hwang. 296-301 [doi]
- Interactive and Personalized Services for an Open IMS-Based IPTV InfrastructureOliver Friedrich, Robert Seeliger, Stefan Arbanowski. 302-307 [doi]
- XML Based 3G/LTE Network and Service Management ConceptEero Wallenius, Timo Hämäläinen, Kari Halttunen. 308-317 [doi]
- VPN Creation in IP/MPLS Network in KosovaBesnik Shatri, Agim Abdullahu, Skënder Rugova, Arianit Maraj. 318-323 [doi]
- New Tunneling Capabilities for BGP/MPLS IP VPN in GNU/LinuxJose O. Fajardo, Jon Ander Picó, Alejandro Muñoz. 324-329 [doi]
- Understanding BitTorrent Download PerformanceDongliang Guan, Jiangtao Wang, Yue Zhang, Jun Dong. 330-335 [doi]
- Collision Avoidance in Hierarchical Peer-to-Peer SystemsYong Meng Teo, Marian Mihailescu. 336-341 [doi]
- Peer-to-Peer Streaming Technology SurveyJani Peltotalo, Jarmo Harju, Alex Jantunen, Marko Saukko, Lassi Väätämöinen. 342-350 [doi]
- Time-Related Replication for P2P Storage SystemKyungbaek Kim. 351-356 [doi]
- Effect of Triangular Routing in Mixed IPv4/IPv6 NetworksTeerapat Sanguankotchakorn, Preeda Jaiton. 357-362 [doi]
- A Proposal of Quasi-Static Approach for Analyzing the Stability of IP Telephony SystemsMasaki Aida, Chisa Takano, Masayuki Murata, Makoto Imase. 363-370 [doi]
- Comparison of Heuristic Methods Applied to Optimization of Computer NetworksKrzysztof Lenarski, Andrzej Kasprzak, Iwona Pozniak-Koszalka. 371-376 [doi]
- A Methodology for Evaluating Vertical Handoff Decision MechanismsImed Lassoued, Jean-Marie Bonnin, Zied Ben Hamouda, Abdelfattah Belghith. 377-384 [doi]
- A Simulation Study of the WFQ Scheduler in a DiffServ Node under LRD TrafficKleber Kendy Horikawa Nabas, Walter Godoy Júnior, Emílio C. G. Wille. 385-391 [doi]
- An Entropy Based Algorithm to Find Critical Traffic MatricesHong Wang, Zhenghu Gong, Zexin Lu, Jinshu Su, Sudan Li. 392-397 [doi]
- Java RMI versus .NET Remoting Architectural Comparison and Performance EvaluationRoland Schwarzkopf, Markus Mathes, Steffen Heinzl, Bernd Freisleben, Helmut Dohmann. 398-407 [doi]
- A Comparison of Cluster and Grid Configurations Executing Image Processing Tasks in a Local NetworkGiorgia de Oliveira Mattos, Rafael Dueire Lins, Andrei de Araújo Formiga, Francisco Heron de Carvalho Jr.. 408-414 [doi]
- Performance Evaluation of Deadline Monotonic Policy over 802.11 Throughput and Average Service TimeInès El Korbi, Leïla Azouz Saïdane. 415-420 [doi]
- L-MMIRA: Light Multicast Minimal Interference Routing Module in MPLS NetworkLi Xuan, Liu Ying. 421-426 [doi]
- Game-Theoretical Effectiveness Evaluation of DDoS DefensePan Shi, Yifeng Lian. 427-433 [doi]
- Evaluating Service Scalability of Network ArchitecturesQi Li, Mingwei Xu, Ke Xu, Jianping Wu. 434-438 [doi]
- InFeCT - Network Traffic ClassificationPeter Teufl, Udo Payer, Michael Amling, Martin Godec, Stefan Ruff, Gerhard Scheikl, Gernot Walzl. 439-444 [doi]
- Applying a Macro Model of Ad Hoc Networks to Access ControlCongzhou Zhou, Nicholas F. Maxemchuk. 445-453 [doi]
- A Framework for IMS Interworking Networks with Quality of Service GuaranteeJinho Hwang, Nakpo Kim, Sangyong Kang, Jongseog Koh. 454-459 [doi]
- NLWCA—Node and Link Weighted Clustering Algorithm for Backbone-Assisted Mobile Ad Hoc NetworksAdrian Andronache, Steffen Rothkugel. 460-467 [doi]
- Internet Traffic Modeling with Lévy FlightsGyörgy Terdik, Tibor Gyires. 468-473 [doi]
- Half-Overlap Subchannel Filtered MultiTone Modulation with the Small DelayPavel Silhavy. 474-478 [doi]
- Main Memory Commit Protocols for Multiple BackupsHeine Kolltveit, Svein-Olaf Hvasshovd. 479-484 [doi]
- DiffServ-Based User-Manageable Quality of Service Control SystemKarol Molnar, Vít Vrba. 485-490 [doi]
- TCP Flows in Stochastic Network Environment: Models and CharacteristicsVladimir S. Zaborovsky, Sergey Ygorov, Nikolay Fedorov. 491-496 [doi]
- Detection Network Anomalies Based on Packet and Flow AnalysisHong Wang, Zhenghu Gong, Qing Guan, Baosheng Wang. 497-502 [doi]
- Analysis of Priority Queues with Session-Based Arrival StreamsJoris Walraevens, Sabine Wittevrongel, Herwig Bruneel. 503-510 [doi]
- Experimental Evaluation and Characterization of Long-Distance 802.11g LinksHesham El-Sayed, Sherali Zeadally, Mohammed Boulmalf. 511-516 [doi]
- Comparative Study of Wireless Network SimulatorsJohannes Lessmann, Peter Janacik, Lazar Lachev, Dalimir Orfanus. 517-523 [doi]
- Packet Loss Process in a Queue with Markovian ArrivalsAndrzej Chydzinski. 524-529 [doi]
- Marine Wireless Sensor Networks: Challenges and ApplicationsAhmed M. Mahdy. 530-535 [doi]
- Embedded System with Speech Recognition for Wireless Actuator ControlOndrej Sajdl, Radimir Vrba. 536-538 [doi]
- Dynamic Channel Assignment for Wireless Mesh Networks Using ClusteringSadeq Ali Makram, Mesut Günes, Amine Kchiche, Martin Krebs. 539-544 [doi]
- Simulation of Blind Flooding over Wireless Sensor Networks Based on a Realistic Battery ModelMarco Aurélio Spohn, Paulo Sérgio Sausen, Fabiano Salvadori, Mauricio Campos. 545-550 [doi]
- A Hierarchical Game for Uplink CDMA Transmissions with Random Active UsersYezekael Hayel, Víctor M. Ramos R., Bruno Tuffin. 551-555 [doi]
- Surveillance and Quality Evaluation System for Real-Time Audio Signal StreamingJiri Schimmel, Jiri Prinosil, Jiri Misurec. 556-561 [doi]
- LISS Algorithm with Modified Length Bias Term in Turbo EqualizationAdrian Florin Paun, Silviu Ciochina, Constantin Paleologu. 562-566 [doi]
- Filters Eliminating Input Impedance of Input Current Terminal for High-Speed Analog Signal ProcessingIvo Lattenberg, Kamil Vrba. 567-571 [doi]
- Square-Root-Free QRD-LSL Adaptive Algorithm with Improved Numerical RobustnessConstantin Paleologu, Felix Albu, Andrei Alexandru Enescu, Silviu Ciochina. 572-577 [doi]
- Spectral Characteristics of Nonlinear Systems Approximated by Piecewise Linear FunctionJiri Schimmel, Ivan Koula, Jiri Misurec, Zdenek Smékal. 578-583 [doi]
- Adapting Constant Modulus Algorithm for Phase Modulation SignalsXin Wang, Guangzeng Feng. 584-587 [doi]
- Fast and Robust Analytical Design of Equiripple Comb FIR Filters for Communication PurposesPavel Zahradnik, Boris Simák, Miroslav Vlcek. 588-593 [doi]
- Managing Real-World System Configurations with ConstraintsThomas Delaet, Paul Anderson, Wouter Joosen. 594-601 [doi]
- Improving Availability of Mobile Code Systems by Decoupling Interaction from MobilityKyriakos Koukoumpetsos, Nick Antonopoulos, K. Zhang, Georgios Exarchakos. 602-607 [doi]
- Scheduling on Networks of Workstations with Task Runtime RestrictionsMarcin Bazyluk, Leszek Koszalka, Keith J. Burnham. 608-613 [doi]
- Large Scale Deployment a Mobile Agent Approach to Network ManagementGuillaume Autran, Xining Li. 614-619 [doi]
- Restoration Mechanism for the N2R Topological Routing AlgorithmJosé M. Gutiérrez López, Jens Myrup Pedersen, Rubén Cuevas Rumín, Ole Brun Madsen. 620-625 [doi]
- RIP-MTI: A New Way to Cope with Routing LoopsChristoph Steigner, H. Dickel, T. Keupen. 626-632 [doi]
- Optimum Routing and Forwarding Arrangement in Bufferless Data Vortex Switch NetworkQimin Yang. 633-638 [doi]
- Large Scale Topology Discovery for Public IPv6 NetworksZhenshan Liu, Junyong Luo, QingXian Wang. 639-644 [doi]
- Post-Disaster Communications: A Cognitive Agent ApproachSonia Majid, Kazi Ahmed. 645-650 [doi]
- A Distributed Routing Algorithm Based on Architecture of ForCESBin Zhuge, Ligang Dong, Weiming Wang. 651-655 [doi]
- Fast Reservation Protocols for Latency Reduction in Optical Burst-Switched Networks Based on PredictionsKyriaki Seklou, Emmanouel A. Varvarigos. 656-662 [doi]
- Improving the Sustainability of Autonomous SystemsMasafumi Watari, Yuichiro Hei, Shigehiro Ano, Katsuyuki Yamazaki. 663-668 [doi]
- Routing Performance in Air Traffic Services NetworksThomas Rausch, Heimo Zeilinger, Andreas Kaindl. 669-674 [doi]
- Highly Efficient Call Admission Control for Wireless Multimedia TrafficStylianos Chatziperis, Polychronis Koutsakis, Michael Paterakis. 675-680 [doi]
- Module and Distortion Analysis for Video Decoding on Mobile DevicesWen Ji, Yiqiang Chen, Chen Lei, Huiguo Zhang, Hui Wang, Yunbing Xing, Bo Tang. 681-685 [doi]
- MobileAERO: Using Tag Clouds for Mobile Knowledge ManagementOlaf Thiele, Hartwig Knapp, Martin Schader, Nicolas Prat. 686-691 [doi]
- A Novel Route Guidance Algorithm with Maximum Coverage and Minimum Handover for Vehicular NetworksMohamed Chedly Ghedira, Walid Ben-Ameur, Hossam Afifi. 692-697 [doi]
- NSIS-Based Firewall Detection in Mobile IPv6Xin Li. 698-702 [doi]
- Flexible Host-Based Handoff Selection for Next Generation NetworksMichael Mackay, Jose Moura, Christopher Edwards. 703-712 [doi]
- Privacy Improvement through Pseudonymity in Parlay X for Location Based ServicesNabil Ajam, Ahmed Bouabdallah. 713-718 [doi]
- Proactive Handover in Heterogeneous Networks Using SIPsElin Sundby Boysen, Hkon Eyde Kjuus, Torleiv Maseng. 719-724 [doi]
- Comparison of Two Forward Error Correction Approaches for Packet Protection in HDTV with Variable Bit Rate TransmissionFrederik Vanhaverbeke, Marc Moeneclaey, Koenraad Laevens, Natalie Degrande, Danny De Vleeschauwer. 725-729 [doi]
- Best Video Stream Variation Selection in Wireless NetworksA. Kamoun, F. Zarai, L. Kamoun. 730-733 [doi]
- A Performance Evaluation of H.264 FGS Sequences over Hybrid NetworksAnand Pulicat Gopalakrishnan, Homayoun Yousefi zadeh, Hamid Jafarkhani. 734-739 [doi]
- Integration of Host Position Prediction into Hierarchical AggregationRadim Bürget, Dan Komosny, Vit Novotny. 740-745 [doi]
- Multicast Voice Transmission over Vehicular Ad Hoc Networks: Issues and ChallengesPaolo Bucciol, Federico Ridolfo, Juan Carlos De Martin. 746-751 [doi]
- Demand Pricing & Resource Allocation in Market-Based Compute Grids: A Model and Initial ResultsVladimir Marbukh, Kevin Mills. 752-757 [doi]
- User Maturity Based Trust Management for Grid ComputingGabriel Queiroz Lana, Carlos Becker Westphall. 758-761 [doi]
- A Price-Based Task Scheduling for Grid ComputingMarcelo Massocco Cendron, Carlos Becker Westphall. 762-766 [doi]