Abstract is missing.
- Simulation Based Performance Analysis of Ethernet MPI ClusterBoleslaw Tokarski, Leszek Koszalka. 1-5 [doi]
- A Program Suite for Distributed Simulation of Networks in Multi-core EnvironmentsLukasz Chrost, Agnieszka Brachman, Andrzej Chydzinski. 6-11 [doi]
- The Impact of AP Placement in WLAN-Based Indoor Positioning SystemOumaya Baala, You Zheng, Alexandre Caminada. 12-17 [doi]
- Designing and Implementing an Embedded Linux for Limited Resource DevicesHannu Lyytinen, Keijo Haataja, Pekka Toivanen. 18-23 [doi]
- Measuring Route Diversity in the Internet from Remote Vantage PointsAndrea Di Menna, Tiziana Refice, Luca Cittadini, Giuseppe Di Battista. 24-29 [doi]
- Does the Internet Still Demonstrate Fractal Nature?György Terdik, Tibor Gyires. 30-34 [doi]
- Capacity Theorem for Finite Duration SymbolsSubhendu Das, Nirode Mohanty, Avtar Singh. 35-39 [doi]
- Filter Design for Image Preprocessing in Image CommunicationPavel Zahradnik, Boris Simák, Miroslav Vlcek. 40-45 [doi]
- Application of Game Theory in Ad-Hoc Opportunistic RadiosShahid Mumtaz, Paulo Marques, AtÃlio Gameiro, Jonathan Rodriguez. 46-51 [doi]
- A Node s Number of Neighbors in Wireless Mobile Ad Hoc Networks: A Statistical ViewHoai-Nam Nguyen, Yoichi Shinoda. 52-60 [doi]
- Simulation Platform for Wireless Sensor Networks Based on Impulse Radio Ultra Wide BandAbdoulaye Berthe, Aubin Lecointre, Daniela Dragomirescu, Robert Plana. 61-66 [doi]
- Self-Configuration Channel in the Wireless NetworksEric Douglas Teixeira, Carlos Becker Westphall, Carla Merkle Westphall. 67-70 [doi]
- A TDMA-Based MAC Protocol for Mobile Sensor NetworksMojgan Ordouei, M. T. Manzuri-Shalmani. 71-75 [doi]
- A Hybrid Approach to Actor-Actor Connectivity Restoration in Wireless Sensor and Actor NetworksAzadeh Zamanifar, Mohsen Sharifi, Omid Kashefi. 76-81 [doi]
- Proposal of Data Intensive Sensor Networks with Forwarder NodesKatsuhiro Naito, Kazuo Mori, Hideo Kobayashi. 82-87 [doi]
- QoS in IEEE 802.16e for VoIP and Video with Mechanism of Soft Handover Nabil Tabbane, Sami Tabbane, Tarek Bchini, Emmanuel Chaput, André-Luc Beylot. 88-93 [doi]
- On the Path Processing under Energy ConstraintsBirger Lantow. 94-98 [doi]
- LS2RP: Link-State RAID Routing ProtocolNabil Tabbane. 99-105 [doi]
- A Heuristic for Minimum Connected Dominating Set with Local Repair for Wireless Sensor NetworksMritunjay Rai, S. Verma, S. Tapaswi. 106-111 [doi]
- Performance Tests of the Dynamics of the Wireless NetworksJaroslav Kadlec, Radek Kuchta, Radimir Vrba. 112-115 [doi]
- Power Analysis of Communication of RFID Transponders with Password-Protected MemoryLukas Vojtech, Jan Kahl. 116-120 [doi]
- Degree-Based Power Control Method for Increasing Spatial Reuse in TDMA-Based Wireless Mesh NetworksToshiaki Hidekuma, Go Hasegawa, Masahiro Sasabe, Hirotaka Nakano. 121-126 [doi]
- Routing Method for Gateway Load Balancing in Wireless Mesh NetworksHiroshi Tokito, Masahiro Sasabe, Go Hasegawa, Hirotaka Nakano. 127-132 [doi]
- Group Key Agreement Scheme for Single Link Failure in Ad-Hoc NetworkJin-Ok Hwang, Young-Il Choi, Joo Sang Youn, YoungJun Lee, Sung-Gi Min. 133-137 [doi]
- Energy Aware Database Updating Protocols for Autoconfigurable Sensor NetworksCherif Diallo, Ashish Gupta, Monique Becker, Michel Marot. 138-143 [doi]
- A Fair Routing Algorithm for Wireless Mesh Networks Based on Game TheoryF. Ahourai, M. Tabandeh, M. Jahed, B. Afsari. 144-149 [doi]
- An Effective Dynamic Spectrum Assignment in WiFi/WiMAX Integrated NetworksYuichi Kanamori, Keita Kawano, Kazuhiko Kinoshita, Koso Murakami. 150-155 [doi]
- An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksMohammad Hammoudeh, Robert M. Newman, Sarah Mount. 156-161 [doi]
- Efficiency Analysis of Evolutionary Algorithm for Congestion Problem Using Computer Experimentation SystemDawid Ohia, Iwona Pozniak-Koszalka, Leszek Koszalka, Andrzej Kasprzak. 162-169 [doi]
- Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX NetworksPavel Mach, Zdenek Becvar, Robert Bestak. 170-175 [doi]
- Metric-Based Topology InvestigationF. Bohdanowicz, H. Dickel, Christoph Steigner. 176-184 [doi]
- All-to-All Personalized Exchange Algorithms in Generalized Shuffle-Exchange NetworksWell Y. Chou, Richard B. Chen, Chiuyuan Chen. 185-190 [doi]
- A Model Based RL Admission Control Algorithm for Next Generation NetworksSilvano Mignanti, Alessandro Di Giorgio, Vincenzo Suraci. 191-196 [doi]
- Theoretical Analysis of EDCA Medium Access-Control Method in Simplified Network EnvironmentPavel Rajmic, Dan Komosny, Karol Molnar. 197-201 [doi]
- PEMS a DiffServ Aware MPLS Traffic Engineering Model for the Networks of ISPA. K. A. Toguyéni. 202-207 [doi]
- jSon: Network of Active Elements with Peer-to-Peer Control PlaneMichal Procházka, Petr Holub, Eva Hladká. 208-213 [doi]
- Managing Data in E-Social ScienceKenneth J. Turner, Koon Leai Larry Tan, Jesse M. Blum, Guy C. Warner, Simon B. Jones, Paul S. Lambert. 214-219 [doi]
- Specifications of Secure and Safe Embedded System NetworksMiroslav Svéda, Radimir Vrba. 220-225 [doi]
- Trainspotting, a WSN-Based Train Integrity SystemHans Scholten, Roel Westenberg, Manfred Schoemaker. 226-231 [doi]
- Implicit Media KnowledgeMuy-Chu Ly, Alexis Germaneau, Olivier Martinot. 232-235 [doi]
- New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc NetworksMaria Striki, Kyriakos Manousakis, John S. Baras. 236-244 [doi]
- Social Networks as an Attack Platform: Facebook Case StudyConstantinos Patsakis, Alexandros Asthenidis, Abraham Chatzidimitriou. 245-247 [doi]
- Secure H.323 Data Transmission between Private NetworksMiroslav BalÃk, Lubomir Cvrk, Martin Sykora. 248-252 [doi]
- Wireless Communication for Mobile Robotics and Industrial Embedded DevicesVilem Srovnal Jr., Zdenek Machacek, Vilem Srovnal. 253-258 [doi]
- CoUniverse: Framework for Building Self-Organizing Collaborative Environments Using Extreme-Bandwidth Media ApplicationsMilos Liska, Petr Holub. 259-265 [doi]
- Effective and Resource-Efficient Multimedia Communication Using the NIProxyMaarten Wijnants, Wim Lamotte. 266-274 [doi]
- A Holistic Approach to Open-Source VoIP Security: Preliminary Results from the EUX2010sec ProjectLothar Fritsch, Arne-Kristian Groven, Lars Strand. 275-280 [doi]
- Impact of Handover on VoIP Speech Quality in WiMAX NetworksZdenek Becvar, Pavel Mach, Robert Bestak. 281-286 [doi]
- A Message-Optimal Sink Mobility Model for Wireless Sensor NetworksAristotelis Giannakos, Gregory Karagiorgos, Ioannis Stavrakakis. 287-291 [doi]
- Parameter Setting of Protocol MAC-hs in HSDPARobert Bestak. 292-296 [doi]
- Efficient Channel Allocation Scheme with Triangle CommunicationSungbum Hong, Qutaibah M. Malluhi, Tom Jacob. 297-305 [doi]
- Fair Queuing Model for EDCA to Optimize QoS in Ad-Hoc Wireless NetworkHanal Abuzanat, Benoit Trouillet, Armand Toguyéni. 306-311 [doi]
- Solutions and Comparison of Performance to the Key Technologies of PIM-SM under ForCES Architecture s RouterChuanhuang Li, Weiming Wang. 312-317 [doi]
- Achieving a QoS Target in NGN Networks via an Efficient Admission Control StrategyCherif Ghazel, Leila Saidane. 318-323 [doi]
- Multiple Interface Management of Multihomed Mobile Hosts in Heterogeneous Wireless EnvironmentsJani Puttonen, Gábor Fekete, Tapio Väärämäki, Timo Hämäläinen. 324-331 [doi]
- A Novel DHT-Based Network Architecture for the Next Generation InternetOliver Hanka, Christoph Spleiß, Gerald Kunzmann, Jörg Eberspächer. 332-341 [doi]
- Video Quality Protection Strategies for HDTV in the Presence of Buffer OverflowFrederik Vanhaverbeke, Marc Moeneclaey, Koenraad Laevens, Natalie Degrande, Danny De Vleeschauwer. 342-346 [doi]
- HRSQM: Heterogeneous Receivers Supporting QoS MulticastMojtaba Aajami, Hossein Saidi, Masoud Reza Hashemi. 347-353 [doi]
- Managing Home Care NetworksKenneth J. Turner, Liam S. Docherty, Feng Wang, Gavin A. Campbell. 354-359 [doi]
- Distributed Information Object ResolutionKostas Pentikousis. 360-366 [doi]
- Characterization of Static/Dynamic Topological Routing for Grid NetworksJosé M. Gutiérrez López, Rubén Cuevas RumÃn, Tahir M. Riaz, Jens Myrup Pedersen, Ole Brun Madsen. 367-373 [doi]
- A Cloud Computing Based Real Time Financial SystemGianni Fenu, Simone Surcis. 374-379 [doi]
- Using Monte Carlo Simulation in Grid Computing Systems for Reliability EstimationEhsan Gholami, Amir Masoud Rahmani, Ahmad Habibizad Navin. 380-384 [doi]
- Combining Reliability and Economic Incentives in Peer-to-Peer GridsHailong Sun, Jinpeng Huai. 385-390 [doi]
- Self-Configurable Diagnosis Algorithm on an Isolation NetworkKwangjong Cho, Wonhyuk Lee, Dongkyun Kim. 391-396 [doi]
- Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks LimitsAbdelkader Lahmadi, Laurent Andrey, Olivier Festor. 397-402 [doi]
- CESNET Fiber Optics Transport NetworkKarel Slavicek, Václav Novák, Jaroslav Ledvinka. 403-408 [doi]
- FSA - A Flooding Based Survivable RWA Mechanism for Dynamic TrafficChen-Shie Ho, Kuo-Cheng Chiang. 409-414 [doi]
- Using Context Ontologies for Addressing and Routing in Mobile Ad Hoc NetworksRobert Eigner, Christoph Mair. 415-420 [doi]
- An Automotive Security System for Anti-theftHuaqun Guo, H. S. Cheng, Y. D. Wu, J. J. Ang, F. Tao, A. K. Venkatasubramanian, C. H. Kwek, L. H. Liow. 421-426 [doi]
- Proposal of Distribution Scheme for Vehicle Information in ITS NetworksKatsuhiro Naito, Koushiro Sato, Kazuo Mori, Hideo Kobayashi. 427-433 [doi]
- Efficient Virtualization of High-Performance Network InterfacesHolger Fröning, Heiner Litz, Ulrich Brüning. 434-439 [doi]
- Research and Design of the Pseudo-VRRP Based High Availability Mechanism in the ForCES RouterXiaochun Wu, Ligang Dong. 440-444 [doi]
- Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ AttacksMina Guirguis, Joshua Tharp, Azer Bestavros, Ibrahim Matta. 445-450 [doi]
- Understanding Danger to Critical Telecom Infrastructure: A Risky BusinessAndrew P. Snow, John Hoag, Gary R. Weckman. 451-454 [doi]