Abstract is missing.
- Maintaining an energy-efficient Bluetooth scatternetMuralidhar Medidi, Yuanyuan Zhou. [doi]
- A TCP-aware call admission control scheme for packet-switched wireless networksXinbing Wang, Do Young Eun, Wenye Wang. [doi]
- Coding schemes for integrated transport and storage reliabilitySai B. Narasimhamurthy, Joseph Y. Hui. [doi]
- Discovery-based role activations in role-based access controlRaman Adaikkalavan, Sharma Chakravarthy. [doi]
- Maille authorization - a distributed, redundant authorization protocolAndrew Fritz, Jehan-François Pâris. [doi]
- BGP with an adaptive minimal route advertisement intervalNenad Laskovic, Ljiljana Trajkovic. [doi]
- Wireless intrusion protection system using distributed collaborative intelligenceAmit Sinha, I. Haddad, T. Nightingale, R. Rushing, D. Thomas. [doi]
- An analytical study on routing overhead of two-level cluster-based routing protocols for mobile ad hoc networksZhihua Tao, Gongyi Wu. [doi]
- Performance modeling of fully adaptive wormhole routing in n-dimensional mesh-connected multicomputersPedram Rajabzadeh, Hashem Hashemi Sarbazi-azad, Hamid Hashemi Najaf-abadi, Mohamed Ould-Khaoua. [doi]
- The delay distribution of IEEE 802.11e EDCA and 802.11 DCFPaal E. Engelstad, Olav N. Østerbø. [doi]
- High performance and alleviated hot-spot problem in processor frontend with enhanced instruction fetch bandwidth utilizationPrabhu Rajamani, Jatan P. Shah, Vadhiraj Sankaranarayanan, Rama Sangireddy. [doi]
- SHARP: a new real-time scheduling algorithm to improve security of parallel applications on heterogeneous clustersTao Xie 0004, Xiao Qin, Mais Nijim. [doi]
- Routing and wavelength assignment in optical mesh networks with wavelength conversionArunita Jaekel, Tahmina Khan. [doi]
- Performance evaluation of DS-BPSK UWB multiple-access systems in standard UWB channelsHaiyang Ding, Yanhua Zhang, Xuemei Wu. [doi]
- A modularized QoS multicasting approach on common homogeneous trees for heterogeneous members in DiffServSuogang Li, Jianping Wu, Ke Xu, Ying Liu. [doi]
- Connectionless port scan detection on the backboneAvinash Sridharan, Tao Ye, Supratik Bhattacharyya. [doi]
- An energy-efficient sensing coverage protocol for surveillance and monitoring applications using wireless sensorsAzzedine Boukerche, Xin Fei, Regina Borges de Araujo. [doi]
- Channel distribution fairness in multi-channel wireless ad-hoc networks using a channel distribution indexUnghee Lee, Scott F. Midkiff. [doi]
- An improved Wu-Manber multiple patterns matching algorithmDonghong Yang, Ke Xu, Yong Cui. [doi]
- Performance modeling of TCP/AQM with generalized AIMD under intermediate buffer sizesDo Young Eun, Xinbing Wang. [doi]
- And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructureFernando C. Colón Osorio, Zachi Klopman. [doi]
- TMS: a trust management system for access control in dynamic collaborative environmentsWilliam Joseph Adams, Nathaniel J. Davis IV. [doi]
- Reliability enhancements for a Jini and JavaSpaces based network management systemJing Wu, Michel Savoie, Hanxi Zhang, Scott Campbell. [doi]
- Evaluating the impact of reactivity on the performance of Web applicationsAdriano M. Pereira, Leonardo Silva, Wagner Meira Jr.. [doi]
- Safe base-station repositioning in wireless sensor networksMohamed F. Younis, Aseem Lalani, Mohamed Eltoweissy. [doi]
- A new secure group key management scheme for multicast over wireless cellular networksHwa Young Um, Edward J. Delp. [doi]
- Energy efficient model for data gathering in structured multiclustered wireless sensor networkJinran Chen, Shubha Kher, Arun K. Somani. [doi]
- Secure data aggregation without persistent cryptographic operations in wireless sensor networksKui Wu, Dennis Dreef, Bo Sun, Yang Xiao. [doi]
- QoS reliability of hierarchical clustered wireless sensor networksLiudong Xing, Akhilesh Shrestha. [doi]
- Truthful application-layer multicast in mesh-based selfish overlaysWei Zhou, Ke Xu, J. Liu, Chi-Hung Chi. [doi]
- A control-theoretic approach to improving fairness in DCF based WLANsXiaolin Chang, Xiaoyang Lin, Jogesh K. Muppala. [doi]
- Towards a framework for worm-defense evaluationSenthilkumar G. Cheetancheri, Denys L. Ma, Karl N. Levitt, Todd L. Heberlein. [doi]
- A survey of PKI components and scalability issuesAdam J. Slagell, Rafael Bonilla, William Yurcik. [doi]
- A stratified model for security in peer networks: a case for fine grain granularityFernando C. Colón Osorio, Justin Whitney. [doi]
- A grouped and proportional-fair subcarrier allocation scheme for multiuser OFDM systemsQian Wang, Dan Xu, Jing Xu, Zhiyong Bu. [doi]
- Extending sensor network lifetime via first hop data aggregationShoudong Zou, Ioanis Nikolaidis, Janelle J. Harms. [doi]
- SeMAC: robust broadcast MAC protocol for multi-hop wireless ad hoc networksTiantong You, Hossam S. Hassanein, Chi-Hsiang Yeh. [doi]
- Performance problem analysis method for Web systems using multiple decision treesShinji Kikuchi, Ken Yokoyama, Akira Takeyama. [doi]
- Incorruptible system self-cleansing for intrusion toleranceYih Huang, David Arsenault, Arun Sood. [doi]
- Monitor placement for stepping stone analysisYongping Tang, Yema Liverpool, Thomas E. Daniels. [doi]
- Polar LEO satellite constellation measurement by delay probingJunfeng Wang, Hongxia Zhou, Fanjiang Xu, Mingtian Zhou. [doi]
- Cluster based approaches for end-to-end complete feedback collection in multicastMehmet Baysan, Kamil Saraç. [doi]
- Risk reduction based survivable WDM network designK. Vajanapoom, David Tipper. [doi]
- Analysis of power control for indoor wireless infrared CDMA communicationAmir Aminzadeh-Gohari, Mohammad Reza Pakravan. [doi]
- Minimum-energy route configuration for wireless ad hoc networksLe Yang, Hong-Chuan Yang, Kui Wu. [doi]
- Detection of stepping stone attack under delay and chaff perturbationsLinfeng Zhang, Anthony G. Persaud, Alan Johnson, Yong Guan. [doi]
- Energy-efficient cooperative routing in multi-hop wireless ad hoc networksFulu Li, Kui Wu, Andrew Lippman. [doi]
- Overcoming the challenge of security in a mobile environmentIoannis Broustis, Michalis Faloutsos, Srikanth V. Krishnamurthy. [doi]
- Avoiding store misses to fully modified cache blocksShiwen Hu, Lizy Kurian John. [doi]
- Optimising malwareJosé M. Fernández, Pierre-Marc Bureau. [doi]
- Caching of interactive multiple choice MPEG-4 presentationsCarsten Griwodz, Frank T. Johnsen, Simen Rekkedal, Pål Halvorsen. [doi]
- Data replication in collaborative sensor network systemsDenis Gracanin, Kevin P. Adams, Mohamed Eltoweissy. [doi]
- Excess bandwidth distribution in DiffServ networksSanjeewa Athuraliya, Harsha Sirisena. [doi]
- Total information efficiency in multihop wireless networksAndré G. Mignaco, Paulo Cardieri. [doi]
- AVARE: aggregated vulnerability assessment and response against zero-day exploitsMadhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya. [doi]
- Enabling mobility in enterprise security managementWilliam Claycomb, Dongwan Shin. [doi]
- A group signature scheme with signature claiming and variable linkabilityHe Ge, Stephen R. Tate. [doi]
- Topological dynamics characterization for layered satellite networksJunfeng Wang, Yuemei Hu, Hongxia Zhou, Mingtian Zhou. [doi]
- A traffic-classified technique for filtering spam from bulk delivery E-mailsNi Zhang, Yu Jiang, Binxing Fang, Li Guo, Xueqi Cheng. [doi]
- Transmit power reduction by adapting rate or power for single carrier wireless systemsMohammad Mohammadnia-Avval, M. R. Pakravan, Babak Hossein Khalaj. [doi]
- Automatically deducing propagation sequences that circumvent a collaborative worm defenseLinda Briesemeister, Phillip A. Porras. [doi]
- Path cost metrics for multi-hop network routingLijuan Cao, Teresa A. Dahlberg. [doi]
- Unstructured peer-to-peer session over IP using SIPKhashayar Khavari, Chuen Liang, Ali Tizghadam, Farid Fadaie, Nadeem Abji, Ramy Farha, Alberto Leon-Garcia. [doi]
- Source traffic regulation in reserved delivery subnetworksRuibiao Qiu, Jonathan S. Turner. [doi]
- An analytical model of TCP performanceDebessay Fesehaye Kassa, Sabine Wittevrongel. [doi]
- The impacts of timing constraints on virtual channels multiplexing in interconnect networksAhmad Khonsari, Mohamed Ould-Khaoua, Abbas Nayebi, Hamid Sarbazi-Azad. [doi]
- PaScal - a new parallel and scalable server IO networking infrastructure for supporting global storage/file systems in large-size Linux clustersGary Grider, Hsing-bung Chen, J. Núñez, S. Poole, R. Wacha, Parks Fields, R. Martínez, P. Martinez, S. Khalsa, A. Matthews, G. Gibson. [doi]
- On capturing and containing E-mail wormsChin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu. [doi]
- Voice over application-level multicastNick Blundell, Norbert Egi, Laurent Mathy. [doi]
- A novel channel assignment algorithm based on topology simplification in multi-radio wirelesss mesh networksLeiming Xu, Yong Xiang, Meilin Shi. [doi]
- Role-based profile analysis for scalable and accurate insider-anomaly detectionJoon S. Park, Joseph Giordano. [doi]
- Multiple design patterns for voice over IP (VoIP) securityZahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell. [doi]
- Wireless sensor network based model for secure railway operationsEmad Aboelela, William Edberg, Christos Papakonstantinou, Vinod Vokkarane. [doi]
- Enhanced blocking probability in adaptive multimedia wireless networksNidal Nasser. [doi]
- Key establishment with source coding and reconciliation for wireless sensor networksSuat Özdemir, Hasan Çam. [doi]
- Wavelength retuning in a WDM mesh network with survivable traffic groomingWeiwe Hu, Rose Qingyang Hu, Yi Qian. [doi]
- AWARDS: an adaptive write strategy for secure local disk systemsMais Nijim, Xiao Qin, Tao Xie 0004, Mohammed I. Alghamdi. [doi]
- OS-aware tuning: improving instruction cache energy efficiency on system workloadsTao Li, L. K. John. [doi]
- Adapting connected d-hop dominating sets to topology changes in wireless ad hoc networksJason A. Bolla, Dung T. Huynh. [doi]
- An efficient load balancing algorithm for heterogeneous grid systems considering desirability of grid sitesKai Lu, Riky Subrata, Albert Y. Zomaya. [doi]
- dRamDisk: efficient RAM sharing on a commodity clusterVassil Roussev, Golden G. Richard III, Daniel Tingstrom. [doi]
- Efficient server cooperation mechanism in content delivery networkZhiyong Xu, Yiming Hu, Laxmi N. Bhuyan. [doi]
- A framework for distributed key management schemes in heterogeneous wireless sensor networksKejie Lu, Yi Qian, Jiankun Hu. [doi]
- PROFITIS: architecture for location-based vertical handovers supporting real-time applicationsStavros Tsiakkouris, Ian J. Wassell. [doi]
- Portal monitoring based anti-malware framework: design and implementationYanjun Wu, Wenchang Shi. [doi]
- A distributed fairness algorithm for bus-based metropolitan optical networkDaniel Popa, Tülin Atmaca. [doi]
- A novel queue management mechanism for improving performance of multihop flows in IEEE 802.11s based mesh networksNagesh Nandiraju, Deepti S. Nandiraju, Dave Cavalcanti, Dharma P. Agrawal. [doi]
- From Network Planning to Traffic Engineering for Optical VPN and Multi-Granular Random DemandsElias A. Doumith, Maurice Gagnaire, Olivier Audouin, Richard Douville. 127-134 [doi]