Abstract is missing.
- TIME: Time-based Index Management for Event Query Processing in Wireless Sensor NetworksGuilin Li, Jianzhong Li, Yingshu Li. 1-8 [doi]
- Divisible Load Scheduling inWireless Sensor Networks with Information UtilityKijeung Choi, Thomas G. Robertazzi. 9-17 [doi]
- Design and Evaluation of Localization Protocols and Algorithms in Wireless Sensor Networks Using UWBDi Wu, Lichun Bao, Min Du, Renfa Li. 18-25 [doi]
- Distributed Energy-Efficient Scheduling for Data-Intensive Applications with Deadline Constraints on Data GridsCong Liu, Xiao Qin, S. Kulkarni, Chengjun Wang, Shuang Li, Adam Manzanares, Sanjeev Baskiyar. 26-33 [doi]
- Progressive Parity-Based Hardening of Data StoresAhmed Amer, Jehan-François Pâris, Darrell D. E. Long, Thomas J. E. Schwarz. 34-42 [doi]
- An Adaptive Cache Management Using Dual LRU Stacks to Improve Buffer Cache PerformanceShenggang Wan, Qiang Cao, Xubin He, Changsheng Xie, Chentao Wu. 43-50 [doi]
- Understanding Divide-Conquer-Scanning WormsYubin Li, Zesheng Chen, Chao Chen. 51-58 [doi]
- Detection of Worm Propagation Engines in the System Call Domain using Colored Petri NetsArnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh. 59-68 [doi]
- A Highly Available Transparent Linux Cluster Security ModelVisham Ramsurrun, K. M. Sunjiv Soyjaudah. 69-76 [doi]
- Increasing Lifetime of Wireless Sensor Networks Using Controllable Mobile Cluster HeadsTorsha Banerjee, Dharma P. Agrawal. 77-84 [doi]
- TSS: An Energy Efficient Communication Scheme for Low Power Wireless NetworksRabindranath Ghosh, Koushik Sinha, Debasish Datta, Bhabani P. Sinha. 85-92 [doi]
- Coding-Aware Multi-path Routing in Multi-Hop Wireless NetworksSong Han, Zifei Zhong, Hongxing Li, Guihai Chen, Edward Chan, Aloysius K. Mok. 93-100 [doi]
- A Network Connection Proxy to Enable Hosts to Sleep and Save EnergyMiguel Jimeno, Ken Christensen, Bruce Nordman. 101-110 [doi]
- Cooperative Monitoring for Internet Data CentersKuai Xu, Feng Wang. 111-118 [doi]
- A Transient Overload Generator forWeb ServersPaulo R. Farah, Cristina D. Murta. 119-126 [doi]
- An Evaluation of Java RMI/JavaSpaces and Ruby DRb/RindaAbhishek Jaiantilal, Yifei Jiang, Shivakant Mishra. 127-134 [doi]
- Performance Models for the Instance Pooling Mechanism of the JBoss Application ServerFábio N. Souza, Roberto D. Arteiro, Nelson S. Rosa, Paulo Romero Martins Maciel. 135-143 [doi]
- Massively Parallel Network Coding on GPUsXiaowen Chu, Kaiyong Zhao, Mea Wang. 144-151 [doi]
- Delay and Capacity Optimization in Multi-radio Multi-channel Wireless Mesh NetworksWeihuang Fu, Yun Wang, Dharma P. Agrawal. 152-159 [doi]
- Location Authentication Methods for Wireless Network Access ControlLichun Bao. 160-167 [doi]
- Neighborhood Route Diffusion for Packet Salvaging in Networks with High MobilityMuhannad Quwaider, Jayanthi Rao, Subir Biswas. 168-175 [doi]
- Simple and Effective Adaptive Routing Algorithms in Multi-Layer Wormhole NetworksKyung Min Su, Ki Hwan Yum. 176-184 [doi]
- Towards Green Routers: Depth-Bounded Multi-Pipeline Architecture for Power-Efficient IP LookupWeirong Jiang, Viktor K. Prasanna. 185-192 [doi]
- KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor NetworksTing Yuan, Shiyong Zhang, YiPing Zhong, Jianqing Ma. 193-200 [doi]
- Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on EntropyJoão V. P. Gomes, Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro. 201-208 [doi]
- A New Trust Framework Based on Reputation for Unstructured P2P NetworksChunqi Tian, Shihong Zou, LingWei Chu, Shiduan Cheng. 209-216 [doi]
- Theoretical and Experimental Evaluation of Communication-Induced Checkpointing Protocols in FE FamilyYi Luo, D. Manivannan. 217-224 [doi]
- Laborator Measuremeots and Verification of PSI/SI Transmission iIn DVBH SystemsJani Väre, Jyrki Alamaunu, Harri Pekonen. 225-232 [doi]
- A Group-aware Service Discovery Scheme in Ubiquitous Environment using Service AssignmentHankyul You, Dohyun Kim, XuanTung Hoang, Younghee Lee. 233-238 [doi]
- Fairness Analysis in Competitive FIFO Buffer ManagementFei Li. 239-246 [doi]
- QELAR: A Q-learning-based Energy-Efficient and Lifetime-Aware Routing Protocol for Underwater Sensor NetworksTiansi Hu, Yunsi Fei. 247-255 [doi]
- UD-GEM: A Multi-Path Routing Algorithm for Wireless Sensor NetworksYuxing Huang, Qiang Ye, Yanxia Jia. 256-263 [doi]
- An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor NetworksAmar Rasheed, Rabi N. Mahapatra. 264-270 [doi]
- Analysis on Probabilistic View Coverage for Image Sensing - A Geometric ApproachFulu Li, Ramesh Raskar, Andrew Lippman. 271-280 [doi]
- Stability Analysis for Communication of Voice and Data Terminals with Packet Reservation Multiple Access ProtocolAmirali Sharifi, Eyad H. Abed. 281-288 [doi]
- A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) SystemsMuhammad Ikram, Aminul Haque Chowdhury, Hassen Redwan, Jong-bin Koh, Ki-Hyung Kim, Dong Kyoo Kim. 289-296 [doi]
- Directional Double Metric Routing in Wireless Mesh NetworkDapeng Wang, Shoubao Yang, Yun Hu, Peng Zhang. 297-302 [doi]
- Joint Adaptive Redundancy and Partial Retransmission for Reliable Transmission in Wireless Sensor NetworksHao Wen, Chuang Lin, Fengyuan Ren, Hongkun Yang, Tao He, Eryk Dutkiewicz. 303-310 [doi]
- A High Scalability P2P Simulation Framework with Measured Realistic Network Layer SupportGuangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang. 311-318 [doi]
- Towards a Queue Sensitilve Transport ProtocolRitesh Kumar, Jasleen Kaur. 319-326 [doi]
- Modeling and Performance Evaluation of Optical Burst Switched Ring Networks with Efficient Adaptive RoutingXingbo Gao, Mostafa A. Bassiouni. 327-334 [doi]
- QoS Behavior of Optical Burst Switching under Multimedia Traffic: an Analytical ApproachAresh Dadlani, Ahmad Khonsari, Mohammad R. Aghajani, Ali Rajabi. 335-342 [doi]
- Spectrum Handoff for Cognitive Radio Networks: Reactive-Sensing or Proactive-Sensins?Li-Chun Wang, Chung-Wei Wang. 343-348 [doi]
- Asynchronous Detection and Avoidance (DAA) Protocol for Interference Mitigation in Dynamic Spectrum AccessYu-Sheng Wang, Chun-Ting Chou. 349-353 [doi]
- Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio NetworksSameer Swami, Chittabrata Ghosh, Rucha P. Dhekne, Dharma P. Agrawal, Ken A. Berman. 354-359 [doi]
- Spectral Sensing of Adaptive Frequency Hopping signal for Cognitive RadioKapil Jaiswal. 360-365 [doi]
- Universal Classifier Synchronizer DemodulatorQinqin Chen, Ying Wang, Charles W. Bostian. 366-371 [doi]
- Minimizing Energy Consumption Using Cognitive RadioAn He, Srikathyayani Srikanteswara, Jeffrey H. Reed, Xuetao Chen, William H. Tranter, Kyung Kyoon Bae, Masoud Sajadieh. 372-377 [doi]
- Traffic Differentiating Queue For Enhancing AODV Performance in Real-Time Interactive applicationsAllaa R. Hilal, Amal El-Nahas, Ahmed R. Bashandy, Samir Shahin. 378-383 [doi]
- Discovering Resources in Tuple-Based Pervasive Systems using Resource-Aware RoutingSaman Kolahdooz, Shahpour Rahmani, Mohsen Sharifi. 384-389 [doi]
- Throughput Enhancement of Macro and Femto Networks By Frequency Reuse and Pilot SensingTae-Hwan Kim, Tae-Jin Lee. 390-394 [doi]
- RFID Reader Anti-collision Algorithm Using a Server and Mobile Readers Based on Conflict-Free Multiple AccessJun-Bong Eom, Tae-Jin Lee. 395-399 [doi]
- Automatic Generation of User's Profiles for Location-Based Adaptation of Multimedia DocumentsFayçal M'hamed Bouyakoub, Abdelkader Belkhir. 400-405 [doi]
- Fuzzy Evaluation for Wireless Sensor Networks Based on Rough Set TheoryLun Zhang, Yan Lu, Lan Chen. 406-411 [doi]
- Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor NetworksT. P. Sharma, Ramesh C. Joshi, Manoj Misra. 412-417 [doi]
- Assessment Strategy with Markov Chain Utilized in Wireless Sensor NetworksLun Zhang, Dongxiu Ou. 418-421 [doi]
- Enhanced Scanning Scheme for Delay-Constrained Fast Handoff in IEEE 802.11 WLANsYazan M. Allawi, Mingon Kim, Minho Kang. 422-426 [doi]
- Exploring Load Balancing in Heterogeneous Networks by Rate DistributionKuheli Louha, Jung-Hyun Jun, Dharma P. Agrawal. 427-432 [doi]
- Practical Covert Channel Implementation through a Timed Mix-FirewallRichard E. Newman, Ira S. Moskowitz. 433-438 [doi]
- Masquerading a Wired Covert Channel into a Wireless-like ChannelMina Guirguis, Jason Valdez. 439-444 [doi]
- A Proxy Agent for Small Network-Enabled DevicesHong Qian, Karen Lu, Asad M. Ali. 445-449 [doi]
- Threshold Proxy Re-SignaturePiyi Yang, Zhenfu Cao, Xiaolei Dong. 450-455 [doi]
- Support for Security and Privacy in SenSearchJyh-How Huang, John Black, Shivakant Mishra. 456-461 [doi]
- Proxy Aided Key Pre-distribution Schemes for Sensor NetworksMahalingam Ramkumar. 462-468 [doi]
- Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area NetworksBenjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel. 469-474 [doi]
- Activity-based Security Scheme for Ubiquitous EnvironmentsLe Xuan Hung, Hassan Jameel, Riaz Ahmed Shaikh, Syed Muhammad Khaliq-ur-Rahman Raazi, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung. 475-481 [doi]
- Distributed Detection of Replica Cluster Attacks in Sensor Networks Using Sequential AnalysisJun-Won Ho. 482-485 [doi]
- A Model to Use Denied Internet Traffic to Indirectly Discover Internal Network Security ProblemsChet Langin, Hongbo Zhou, Shahram Rahimi. 486-490 [doi]
- Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing EnvironmentsJunghwan Choi, Donghyun Kang, Hyun-Su Jang, Young Ik Eom. 491-498 [doi]
- On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor NetworksReiner Dojen, Fan Zhang, Tom Coffey. 499-506 [doi]
- The Scalability of Secure LockCory J. Antosh, Barry E. Mullins. 507-512 [doi]
- Mitigating Evil Twin Attacks in 802.11Kevin S. Bauer, Harold Gonzales, Damon McCoy. 513-516 [doi]
- Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection SystemsSun-il Kim, Nnamdi Nwanze. 517-523 [doi]
- Towards Mathematically Modeling the Anonymity Reasoning Ability of an AdversaryDouglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila. 524-531 [doi]