Abstract is missing.
- Proving secure properties of cryptographic protocols with knowledge based approachX. Cheng, X. Ma, M. Cheng, S. C.-H. Huang. 3-9 [doi]
- An efficient network intrusion detection method based on information theory and genetic algorithmT. Xia, Guangzhi Qu, Salim Hariri, Mazin S. Yousif. 11-17 [doi]
- A key distribution scheme for double authentication in link state routing protocolD. Huang, A. Sinha, D. Medhi. 19-24 [doi]
- Improving effective bandwidth of networks on clusters using load balancing for communication-intensive applicationsX. Qin, H. Jiang. 27-34 [doi]
- Improving network performance through task duplication for parallel applications on clustersX. Qin. 35-42 [doi]
- Parallelized scheduling algorithm for input queued switches using local search techniqueYanfeng Zheng, Simin He, Shutao Sun, Wen Gao. 43-48 [doi]
- Designing efficient routing protocol for heterogeneous sensor networksX. Du, F. Lin. 51-58 [doi]
- Performance evaluation of range-free localization methods for wireless sensor networksC. Liu, K. Wu. 59-66 [doi]
- Improving sensor network performance by deploying mobile sensorsX. Du, F. Lin. 67-71 [doi]
- Connectionless probabilistic (CoP) routing: an efficient protocol for mobile wireless ad-hoc sensor networksAris A. Papadopoulos, Julie A. McCann, Alfredo Navarra. 73-77 [doi]
- On sampling unit size in sampled microprocessor simulationY. Luo, L. K. John. 81-90 [doi]
- Cluster-based input/output trace synthesisBo Hong, Tara M. Madhyastha, B. Zhang. 91-98 [doi]
- Performance characterization of iSCSI processing in a server platformH. M. Khosravi, Abhijeet Joglekar, Ravi Iyer. 99-107 [doi]
- Performance evaluations for hybrid IEEE 802.11b and 802.11g wireless networksShao-Cheng Wang, Y. M. Chen, Tsern-Huei Lee, Ahmed Helmy. 111-118 [doi]
- Further reduced search for optimal diagonal space-time constellations from groupsJun Li, Gang Wei. 119-122 [doi]
- A power management scheme for the IEEE 802.11 based WLANsHongyan Lei, Arne A. Nilsson. 123-127 [doi]
- DualRTT: detecting spurious timeouts in wireless mobile environmentsShaojian Fu, Mohammed Atiquzzaman. 129-133 [doi]
- On the construction of energy-efficient broadcast tree with Hitch-hiking in wireless networksMy T. Thai, Yingshu Li, Ding-Zhu Du, Chunyu Ai. 135-139 [doi]
- Targeted search: reducing the time and cost for searching for objects in multiple-server networksG. Perera, Kenneth J. Christensen, Allen Roginsky. 143-149 [doi]
- Efficient file sharing strategy in DHT based P2P systemsZ. Xu, X. He, Laxmi N. Bhuyan. 151-158 [doi]
- On transport daemons for small collaborative applications over wide-area networksQishi Wu, Nageswara S. V. Rao, S. Sitharama Iyengar. 159-166 [doi]
- A simple but efficient broadcasting protocol for video-on-demandJehan-François Pâris. 167-174 [doi]
- Source routing based pairwise key establishment protocol for sensor networksD. Huang, M. Mehta, D. Medhi. 177-183 [doi]
- Totally distributed key management for dynamic groups in MANETsAnindo Mukherjee, Anurag Gupta, Dharma P. Agrawal. 185-192 [doi]
- RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networksManish Mehta 0003, Dijiang Huang, Lein Harn. 193-197 [doi]
- Key management in wireless ad hoc networks: collusion analysis and preventionMohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy. 199-203 [doi]
- Utilizing characteristics of last link to improve TCP performanceXiuchao Wu, I. Biswas, Mun Choon Chan, Akkihebbal L. Ananda. 207-214 [doi]
- Multimedia streaming using multiple TCP connectionsThinh Nguyen, Sen-Ching S. Cheung. 215-223 [doi]
- On large scale deployment of parallelized file transfer protocolShaleeza Sohail, Chun Tung Chou, Salil S. Kanhere, Sanjay Jha. 225-232 [doi]
- Virtual machine effects on network traffic dynamicsJames J. Martin, V. Rajasekaran, James Westall. 233-238 [doi]
- DINloop based inter-domain multicast with MPLSH. Q. Guo, L. H. Ngoh, W. C. Wong. 241-248 [doi]
- OMFVS: overlay multicast for file distribution using virtual sourcesSoojeon Lee, Kyungran Kang, Dongman Lee. 249-256 [doi]
- Performance analysis of reliable multicast protocol using transparent proxy servers over hybrid networksSung-Kwan Youm, Meejoung Kim, Chul-Hee Kang. 257-264 [doi]
- DIG: an overlay network for Internet multicastingAimin Pan, Xiaodong Li, Jian Yang, Weihua Duan. 265-274 [doi]
- A tree-based reliable multicast scheme exploiting the temporal locality of transmission errorsJinsuk Baek, Jehan-François Pâris. 275-282 [doi]
- Providing efficient certification services against active attacks in ad hoc networksBo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng. 285-292 [doi]
- Measuring energy-security tradeoffs in wireless networksFernando C. Colón Osorio, Emmanuel Agu, K. McKay. 293-302 [doi]
- Calculating a node s reputation in a mobile ad hoc networkWilliam Joseph Adams, George C. Hadjichristofi, Nathaniel J. Davis IV. 303-307 [doi]
- Adaptive object cache pre-fetching scheme based on object flowH. Fareed, M. Bassiouni. 311-319 [doi]
- The effects of AQM on the performance of assured forwarding servicesXiaolin Chang, Jogesh K. Muppala. 321-328 [doi]
- The design and implementation of RAPID-cache for LinuxZhiyong Xu, Yiming Hu. 329-333 [doi]
- An efficient broadcast query forwarding technique for wireless multipath routingPatrick McCarthy, Dan Grigoras. 337-346 [doi]
- Leveraging 1-hop neighborhood knowledge for efficient flooding in wireless ad hoc networksYing Cai, Kien A. Hua, A. Phillips. 347-354 [doi]
- On the construction of stable virtual backbones in mobile ad-hoc networksF. Wang, M. Min, Y. Li, D. Du. 355-362 [doi]
- ISPRP: a message-efficient protocol for initializing structured P2P networksCurt Cramer, Thomas Fuhrmann. 365-370 [doi]
- Wireless sensor network security: a secure sink node architectureShahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha. 371-376 [doi]
- Secure data aggregation and source-channel coding with MIT code for wireless sensor networksH. Cam. 377-382 [doi]
- Piezoelectric materials for powering remote sensorsMoncef B. Tayahi, Bruce Johnson, Melinda Holtzman, G. Cadet. 383-386 [doi]
- Energy-efficient rate adaptation MAC protocol for ad hoc wireless networksMaciej J. Zawodniok, Sarangapani Jagannathan. 389-394 [doi]
- A novel joint routing and power management algorithm for energy-constraint ad-hoc sensor networkY. G. Farrokhfal, Vahid Shah-Mansouri, M. R. Pakravan. 395-400 [doi]
- MMAC: a mobility-adaptive, collision-free MAC protocol for wireless sensor networksMuneeb Ali, T. Suleman, Zartash Afzal Uzmi. 401-407 [doi]
- Energy-efficient task scheduling for wireless sensor nodes with multiple sensing unitsR. Poornachandran, H. Ahmad, H. Cam. 409-414 [doi]
- Performance analysis of a channel allocation scheme with preemptive priority for integrated voice/data mobile networksS. Tang, W. Li. 417-422 [doi]
- CAC and blocking capacity of multi-service smart antenna CDMA systems with and without code re-useC. Hartmann. 423-429 [doi]
- Real time agreement protocol and resource pre-reservation for wireless systemSonia Ben Rejeb, Sami Tabbane, Zièd Choukair. 431-436 [doi]
- A performance comparison of class-based scheduling algorithms in future UMTS accessNidal Nasser, Bader Al-Manthari, Hossam S. Hassanein. 437-441 [doi]
- Towards an automated development methodology for dependable systems with application to sensor networksMichael G. Hinchey, James L. Rash, Christopher A. Rouff. 445-451 [doi]
- SECK: survivable and efficient clustered keying for wireless sensor networksMichael Chorzempa, Jung Min Park, Mohamed Eltoweissy. 453-458 [doi]
- Reliable multicast in wireless ad hoc and sensor networksHossam S. Hassanein, L. Huang. 459-464 [doi]
- Accurate anchor-free node localization in wireless sensor networksAdel M. Youssef, Ashok K. Agrawala, Mohamed F. Younis. 465-470 [doi]
- Performance of IEEE 802.11 based wireless sensor networks in noisy environmentsTamer Nadeem, Ashok K. Agrawala. 471-476 [doi]
- Secure cell relay routing protocol for sensor networksX. Du, F. Lin. 477-482 [doi]
- Multi-rate congestion control using packet-pair bandwidth detection with session and layer changing managerYuliang Li, Alistair Munro, Dritan Kaleshi. 485-490 [doi]
- Examining the benefits of a hybrid distributed architecture for bandwidth brokersChristos Bouras, Kostas Stamos. 491-498 [doi]
- Multihoming media streamingA. Habib, J. Chuang. 499-504 [doi]
- Performance comparison of multiplexing techniques for MPEG-4 object-based contentSeán Murphy, Stefan Goor, Liam Murphy. 505-510 [doi]
- Source descriptor selection schemes for multiple description coded services in 4G wireless communication systemsFrank H. P. Fitzek, Hiroyuki Yomo, Petar Popovski, Ramjee Prasad, Marcos D. Katz. 511-518 [doi]
- Adapting spatial constraints of composite multimedia objects to achieve universal accessAhmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri. 519-525 [doi]
- A novel addressing architecture for wireless sensor networksTrong Thua Huynh, Choong Seon Hong. 529-533 [doi]
- EECS: an energy efficient clustering scheme in wireless sensor networksMao Ye, Chengfa Li, Guihai Chen, Jie Wu. 535-540 [doi]
- Power control based topology construction for the distributed wireless sensor networksPrasan Kumar Sahoo, Jang-Ping Sheu, Chi-Hao Huang. 541-546 [doi]
- Energy efficiency of two virtual infrastructures for MANETsZ. Wang, J. Zhang. 547-552 [doi]
- Multi-class adaptive radio resource management policy for multimedia cellular networksTarek Bejaoui, Véronique Vèque, Sami Tabbane. 555-560 [doi]
- Optimal resource allocation and leaky bucket based power control for CBR MIMO systemsWenjun Luo, Arulsaravana Jeyaraj, Magda El Zarki. 561-566 [doi]
- Modeling and performance analysis of public safety wireless networksJ. Song, L. Trajkovic. 567-572 [doi]
- Simplifying the power allocation for OFDM-MIMO: a partial curve fitting approachW. Zhao. 573-578 [doi]
- Energy efficient sensor, relay and base station placements for coverage, connectivity and routingMaulin Patel, R. Chandrasekaran, S. Venkatesan. 581-586 [doi]
- Dynamic localization control for mobile sensor networksSameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, Kyoung-Don Kang. 587-592 [doi]
- Optimal common transmit power in ad hoc wireless networksSooksan Panichpapiboon, GianLuigi Ferrari, Ozan K. Tonguz. 593-597 [doi]
- Minimum cost guaranteed lifetime design for heterogeneous wireless sensor networks (WSNs)Quanhong Wang, Kenan Xu, Hossam S. Hassanein, Glen Takahara. 599-604 [doi]
- A feasible approach for QoS management in coordinated heterogeneous radio access networksRamon Ferrús, Antoni Gelonch, Oriol Sallent, Jordi Pérez-Romero, Nima Nafisi, Mischa Dohler. 607-614 [doi]
- Resource management for handoff traffic in hierarchical cellular networksXiao Liu, Abraham O. Fapojuwo. 615-620 [doi]
- A novel joint radio resource management approach with reinforcement learning mechanismsLorenza Giupponi, Ramón Agustí, Jordi Pérez-Romero, Oriol Sallent. 621-626 [doi]
- Enhancement of IEEE 802.15.3 high rate WPAN via MAC header compressionEui Hyeok Kwon, Kang Yong Lee, Jae-Sung Lim. 629-630 [doi]
- A centralized server based signaling and resource reservation protocol design for fast protection and restoration in optical ring networksDipnarayan Guha, Doan Huy Cuong, Yang Ok Sik, Seng Kyoun Jo. 631-632 [doi]
- A high-performance WDM photonic switch architecture for future super networks infrastructuresHaitham S. Hamza, Jitender S. Deogun. 633-634 [doi]
- Energy aware adaptive scheduler for a sensor nodeR. Poornachandran, Michael Loiacono. 635-636 [doi]
- Using /spl beta/-skeletons for localized topology control in wireless ad hoc networksM. Bhardwaj, B. Misra, G. Xue. 637-638 [doi]
- Design and stochastic modeling of distributed, dynamic, randomized clustering protocols in wireless sensor networksQuanhong Wang, Kenan Xu, Hossam S. Hassanein, Glen Takahara. 639-640 [doi]
- Energy savings for data caches: ELRU-SEQ replacement policySaibhushan Musalappa, Shivakumar Sundaram, Yul Chu. 641-642 [doi]