Abstract is missing.
- A route discovery method based on received power of repeater nodes for sensor networksMakoto Sugita, Yoshihiro Kainuma, Kenko Ota, Hideaki Matsue. 1-6 [doi]
- Timing control for protecting from internal attacks in wireless sensor networksXu Huang, Muhammad Ahmed, Dharmendra Sharma. 7-12 [doi]
- Performance improvement of TOA localization using IMR-based NLOS detection in sensor networksKazutaka Fukuda, Eiji Okamoto. 13-18 [doi]
- DC-MAC: Directional cooperative MAC for ad-hoc networksJung-Hyok Kwon, Eui Jik Kim, Hyunhee Park, Sang-Hong Lee, Chul-Hee Kang. 19-24 [doi]
- Development and evaluation of walking path estimation system using sensors of Android device and vector map matchingHikaru Ookura, Hiroshi Yamamoto, Katsuyuki Yamazaki. 25-29 [doi]
- The evaluation of communication characteristic of cellular network and development of Retransmission-Controlled TCPShuta Yokoyama, Hiroshi Yamamoto, Katsuyuki Yamazaki. 30-35 [doi]
- An iterative partial path protection-based approach for routing static D-connections in WDM transparent networks with SRLG constraintsMaroua Bakri, Mohamed Koubaa, Ammar Bouallegue. 36-41 [doi]
- Lightpath-level active rerouting algorithms in all-optical WDM networks with alternate routing and traffic groomingSheng-Wei Wang, Chin-Yen Wen. 42-46 [doi]
- Candidate-cycle-based heuristic algorithm for node-and-link protection of dynamic multicast traffic in optical DWDM networksAhmed Frikha, Samer Lahoud, Bernard Cousin. 47-52 [doi]
- Secure web referral serviceVijayakrishnan Nagarajan, Dijiang Huang. 53-58 [doi]
- Promoting Mashup creation through unstructured data extractionNassim Laga, Emmanuel Bertin, Noël Crespi. 59-64 [doi]
- Throughput maximization for the secondary user over multi-channel cognitive radio networksCuong T. Do, Nguyen H. Tran, Choong Seon Hong. 65-69 [doi]
- A queuing analysis of an energy-saving mechanism in data centersChristian Schwartz, Rastin Pries, Phuoc Tran-Gia. 70-75 [doi]
- Adaptive rate control scheme to improve QoS of multimedia streaming applicationSunghee Lee, Seoungjun Oh, Jinpyo Hong, Kwangsue Chung. 76-80 [doi]
- A MAC protocol for cognitive radio networks with reliable control channels assignmentZaw Htike, Jun Lee, Choong Seon Hong. 81-85 [doi]
- A scheduling algorithm for connected target coverage under probabilistic coverage modelChan-Myung Kim, Yong Hwan Kim, In-Seok Kang, Kang-whan Lee, Youn-Hee Han. 86-91 [doi]
- Coordinated TCP Westwood congestion control for multiple paths over wireless networksTuan Anh Le, Choong Seon Hong, Eui-nam Huh. 92-96 [doi]
- A Non-Parametric Kernel method for CDMA2000 network indoor localization using multiple observationsYongping Kong, Zhimin Zhong, Guanglong Yang, Xin Luo, Albert Kai-Sun Wong, Haibin Zhai. 97-101 [doi]
- Effective packet buffering for FMIPv6 Protocol over Diffserv domainKwang-Myung Kim, Sukjung Yong, Back Sun Sim, Hee Yong Youn, Ohyoung Song. 102-107 [doi]
- Broadcast packet collision and avoidance method in Wi-Fi based broadcasting systemDong-hyun Kim, Jong-Deok Kim. 108-113 [doi]
- Service composition using new DSON platform architecture for M2M serviceYoung-Jun Kim, Eung Kyu Kim, Byoung Woo Nam, Ilyoung Chong. 114-119 [doi]
- An approach for short message resilience in disaster-stricken areasNurul Md. Huda, Farzana Yasmeen, Shigeki Yamada, Noboru Sonehara. 120-125 [doi]
- A bit collision detection based Query Tree protocol for sensor tags in logistics managementHaosong Gou, Sungryul Kim, Younghwan Yoo. 126-131 [doi]
- Field investigation of the radio transmission performance and distance in a environmental wireless sensor networkKohta Ohshima, Hiroshi Hara, Yoichi Hagiwara, Matsuaki Terada. 132-137 [doi]
- Wireless sensors and neural networks for intruders detection and classificationEmad Aboelela, Altaf H. Khan. 138-143 [doi]
- ViTAMin: A Virtual Backbone Tree Algorithm for Minimal energy consumption in wireless sensor network routingJaekwang Kim, Jee-Hyong Lee. 144-149 [doi]
- An improved routing mechanism using bio-inspired for energy balancing in wireless sensor networksAhmed M. Shamsan Almshreqi, Borhanuddin Mohd Ali, Mohd Fadlee A. Rasid, Alyani Ismail, Pooria Varahram. 150-153 [doi]
- A structured TDMA-based V2I MAC protocol for automated guided vehicle control systemsGunwoo Kim, Songnan Bai, Pyungsun Park, Joonghyun Moon, Jaeil Jung. 154-158 [doi]
- An integrated vehicular and urban sensing system: Framework and modelingAdnan Nasir, Hock-Beng Lim, Boon-Hee Soong. 159-164 [doi]
- A practical group based key management scheme for Ubiquitous Sensor NetworksSanghwan Lee, Min Sun Jeong, HyunCheol Jeong, Hyang Jin Lee, Eun Young Choi. 165-170 [doi]
- Mobility tracking using GPS, Wi-Fi and Cell IDXiaoli Wang, Albert Kai-Sun Wong, Yongpmg Kong. 171-176 [doi]
- A low-complexity delay injection algorithm for improving TCP performance during LTE intra handoverWoojin Ahn, Yongsu Gwak, Young Yong Kim. 177-181 [doi]
- Group synchronization method with fast response time for VoD servicesShin Moriyasu, Koji Tajima, Kohta Ohshima, Matsuaki Terada. 182-187 [doi]
- Distributed hierarchical service network for automotive embedded systemKabsu Han, Yongseop Kwon, Wooyeon Kim, Jeonghun Cho. 188-192 [doi]
- Centralized and distributed heuristic algorithms for application-level traffic routingKazuhito Matsuda, Go Hasegawa, Satoshi Kamei, Masayuki Murata. 193-198 [doi]
- An efficient hybrid P2P MMOG cloud architecture for dynamic load managementGinhung Wang, Kuochen Wang. 199-204 [doi]
- A new bit rate estimation scheme for unsupervised segmentation of video content in IPTV servicesHye-Jeong Cho, Kwang-sue Chung, Seoung-Jun Oh. 205-209 [doi]
- An exact optimum paths-finding algorithm for α+1 path protectionSoung-Yue Liew, Ming-Lee Gan. 210-215 [doi]
- Greedy virtual network embedding under an exponential cost functionHyungjin Kim, Sanghwan Lee. 216-221 [doi]
- Multipath interdomain routing via deviation from primary pathDonghong Qin, Jiahai Yang, Jessie Hui Wang, Bin Zhang 0016, Lei Gao, Zhuolin Liu. 222-227 [doi]
- Toward efficient multi-link failure diagnosis by using monitoring cycle for all-optical mesh networksChi-Shih Chao, Szu-Pei Lu. 228-233 [doi]
- Implementation of MapReduce-based image conversion module in cloud computing environmentHyeokju Lee, Myoungjin Kim, Joon Her, Hanku Lee. 234-238 [doi]
- Fast enlarging a BitTorrent Swarm via social networkingShu-Ming Chang, Ren-Song Ko. 239-244 [doi]
- Iterative method for correction of messages protected by symmetric cryptographic check valuesNatasa Zivic. 245-250 [doi]
- Quantum cryptography based key distribution in WiFi networksXu Huang, Shirantha Wijesekera, Dharmendra Sharma. 251-256 [doi]
- Stopping time condition for practical IPv6 Cryptographically Generated AddressesAhmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel. 257-262 [doi]
- Detecting and defending against malicious attacks in the iTrust information retrieval networkYung-Ting Chuang, Isai Michel Lombera, P. M. Melliar-Smith, Louise E. Moser. 263-268 [doi]
- Multicore-based auto-scaling SEcure Neighbor Discovery for Windows operating systemsHosnieh Rafiee, Ahmad AlSa'deh, Christoph Meinel. 269-274 [doi]
- Efficient nonlinear equalization scheme for MIMO constant envelope modulation receivers affected by quantization errorKohei Kotera, Osamu Muta, Hiroshi Furukawa. 275-279 [doi]
- Doppler spread and its compensation by FDE and turbo codeHaeseong Jeong, Do-Hoon Kim, Heung-Gyoon Ryu. 280-284 [doi]
- Power analysis and modeling based on field measurements using 3.5 GHz WiMAX networkYazan A. Alqudah. 285-289 [doi]
- Regular sensor deployment patterns for p-coverage and q-connectivity in wireless sensor networksYong Hwan Kim, Chan-Myung Kim, Dong-Sun Yang, Young-jun Oh, Youn-Hee Han. 290-295 [doi]
- Performance evaluation of crosspoint queued switch supporting multicast trafficTing Zhou, Youjian Zhao, Yunmei Xiao. 296-301 [doi]
- Design and implementation of scalable distributed wireless network emulator for high-speed mobilityMinoru Koizumi, Tomoichi Ebata, Tomoaki Tsutsumi, Kohta Ohshima, Matsuaki Terada. 302-307 [doi]
- A performance comparision study of k-shortest disjoint forwarding paths in ship backbone networksSungwoo Tak, Hyejin Kim, Taehoon Kim, Heekyum Kim. 308-311 [doi]
- Fuzzy controlling window for elliptic curve cryptography in wireless sensor networksXu Huang, Dharmendra Sharma, Hongyan Cui. 312-317 [doi]
- Performance evaluation of energy saving in core router architecture with Low Power Idle for OBS networksWon-Hyuk Yang, Jin-Hyo Jung, Young-Chon Kim. 318-323 [doi]
- A bandwidth allocation algorithm for improving QoS in EPON with sleep modeJin-Hyo Jung, Won-Hyuk Yang, Young-Chon Kim. 324-328 [doi]
- Time series anomaly detection using recessive subsequenceYonchanok Khaokaew, Sirikarn Pukkawanna. 329-333 [doi]
- An efficient AP channel scanning scheme for mobility over WiMAXHee-seong Kim, Jun Yeol Choi, Kyu Sung Ahn, Hee Yong Youn, Ohyoung Song. 334-339 [doi]
- Dynamic probabilistic flooding algorithm based-on neighbor information in wireless sensor networksHyo-Cheol Jeong, Hyeonjun Jeong, Younghwan Yoo. 340-345 [doi]
- A QoS/QoE control architecture for multimedia communicationsAnbin Kim, Seong-Ho Jeong. 346-349 [doi]
- A deployable upload acceleration service for mobile devicesYan Pu, Akihiro Nakao. 350-353 [doi]
- Modeling and analysis of the wireless channel formed by LED angle in visible light communicationDo Tronghop, Junho Hwang, Souhwan Jung, Yoan Shin, Myungsik Yoo. 354-357 [doi]
- Capacity-optimal relay and base station placement in wireless networksMd Habibul Islam, Zbigniew Dziong, Kazem Sohraby, Mahmoud Daneshmand, Rittwik Jana. 358-363 [doi]
- Sensing and transmission parameter determination for cognitive radio networksGunhee Lee, Jae Hoon Ko, Seoungyoul Oh, Cheeha Kim. 364-367 [doi]
- SISO polarized flat fading channel modeling for dual-polarized antenna systemsKwangHyun Jeon, Bing Hui, KyungHi Chang, Hyeong-Sook Park, Youn-Ok Park. 368-373 [doi]
- Experimental link channel characteristics in wireless body sensor systemsWoo-Sik Lee, Min Choi, Namgi Kim. 374-378 [doi]
- Adaptive EDCA mechanism for vehicular ad-hoc networkSang-woo Chang, Jin Cha, Sang Sun Lee. 379-383 [doi]
- Surveying Wikipedia activity: Collaboration, commercialism, and cultureOssi Karkulahti, Jussi Kangasharju. 384-389 [doi]
- Inter-pMIPv6 mobility management using core-edge separation networkWhoi Jin Jung, Jae-Yong Lee, Byung-Chul Kim. 390-393 [doi]
- A secure information flow architecture for public web serviceSangdo Lee, Aran Kim, Hyeopgeon Lee, Yongtae Shin. 394-398 [doi]
- An enhanced key management using ZigBee Pro for wireless sensor networksKyung Choi, Minjung Yun, Kijoon Chae, Mihui Kim. 399-403 [doi]
- Transparent caching scheme on advanced relay nodes for streaming servicesSho Nishimura, Masayoshi Shimamura, Hiroyuki Koga, Takeshi Ikenaga. 404-409 [doi]
- Mobility Aware Hybrid Routing protocol for mobile ad hoc networkMi-Seon Kang, Dong-Won Kum, Jae-Seung Bae, You Ze Cho, Anh-Ngoc Le. 410-414 [doi]
- Mobile device-controlled live streaming traffic transfer for multi-screen servicesJiwon Jang, Hyunwoo Nam, Younghan Kim. 415-420 [doi]
- Hybrid recommender system with temporal informationFarman Ullah, Ghulam Sarwar, Sung Chang Lee, Yun Kyung Park, Kyeong-Deok Moon, Jin Tae Kim. 421-425 [doi]
- Association information management using MAC subnet addressing in Wireless Mesh NetworksSeung-Chur Yang, Jong-Deok Kim. 426-430 [doi]
- Carbon offsetting through computer network redesignSami J. Habib, Paulvanna Nayaki Marimuthu. 431-436 [doi]
- The design of video streaming proxy in high-speed trainChing-Lung Chang, Xan-Hua Hsieh, Wei-Ming Chen. 437-441 [doi]
- A reliable contents distribution middleware system for peer-to-peer networksYoonhee Kim, Sanghyun Ahn. 442-446 [doi]
- Modeling of flows based on behavior of applicationsHiroomi Isozaki, Shingo Ata, Ikuo Oka. 447-452 [doi]
- QoS support for advanced multimedia systemsAnbin Kim, Seong-Ho Jeong, Pyung-Koo Park, Ho Yong Ryu. 453-456 [doi]
- Multipath AODV extension with CORE-node using path accumulationJin-Sun Kim, Jong-Won Choe, Hyukjoon Lee. 457-461 [doi]
- Differences in bandwidth requirements of various applications due to IPv6 migrationSaowaphak Sasanus, Kamol Kaemarungsi. 462-467 [doi]
- Battery life time extension method using selective data reception on smartphoneMin Woo Kim, Dong Geun Yun, Jong Min Lee 0001, Seong Gon Choi. 468-471 [doi]
- A method for transferring more information between objects on offline networkHyungkun Park, Yillbyung Lee. 472-477 [doi]
- The effect of decentralized resource allocation in network-centric warfareSeung Hyong Rhee, Hwa-sung Kim, Seung Won Sohn. 478-481 [doi]
- Multidimensional assessment and principal component analysis of QoE in interactive Multi-View Video and Audio IP communicationsTakayoshi Ichikawa, Toshiro Nunome, Shuji Tasaka. 482-487 [doi]
- Power analysis and communication capacity of 160GHz wireless communication in multipath environmentJae Hoon Choi, Junyeong Bok, Heung-Gyoon Ryu. 488-491 [doi]
- An adaptive UDT congestion control method with reflecting of the network statusDosik An, Jongseon Park, Gicheol Wang, Gihwan Cho. 492-496 [doi]
- The clusterhead chaining scheme considering scalability of the wireless sensor networksSung-Min Jung, Nam-Uk Kim, Tai-Myoung Chung. 497-500 [doi]
- Implementation of inter-domain path computation elementByeongsik Kim, Seunghyun Yoon, YouHyeon Jeong, Hoyoung Song. 501-505 [doi]
- Similarity attraction effects in mobile advertisement: Interaction between user personality and advertisement personalityHongseok Lee, Kang-Woo Lee, Kwan Min Lee, Hyunseung Choo. 506-511 [doi]
- A case study on oscillating behavior of end-to-end network latencyJunSeong Kim, JongSu Yi, Ho-Hyun Park. 512-516 [doi]
- A trust-based broadcasting algorithm for safe USNJi-Young Choi, Hyo-Jin Kim, Jin-Ki Park, JunSeong Kim, Ho-Hyun Park. 517-522 [doi]
- Research on a mutual authentication scheme for wireless sensor networksMin Wei, Keecheon Kim, Ping Wang. 523-528 [doi]
- Dynamic spectrum allocation in adjacent regions with physical interference based geographic coupling parameterYunseok Kang, Sooyeol Im, Hyuckjae Lee. 529-534 [doi]
- Wireless sensor network using internetworkingKyengheum Na, Heungwoo Nam, Sunshin An. 535-538 [doi]
- FiRST Cloud Aggregate Manager development over FiRST: Future Internet testbedHyunjun Kim, Sungwon Lee. 539-544 [doi]
- Temporal dependence network loss tomography using maximum pseudo likelihood methodGaolei Fei, Guangmin Hu. 545-550 [doi]
- A comprehensive monitoring framework for virtual computing environmentGuofu Xiang, Hai Jin, Deqing Zou. 551-556 [doi]
- Hardware complexity of SHA-1 and SHA-256 based on area and time analysisJun-Cheol Jeon, Kang-Joong Seo, Kee-Won Kim. 557-561 [doi]
- Design and implementation of web crawler based on dynamic web collection cycleK. S. Kim, K. Y. Kim, K. H. Lee, T. K. Kim, W. S. Cho. 562-566 [doi]