Abstract is missing.
- Success and failures of de-randomized congestion losses losses lossesSaad Biaz. [doi]
- The state-of-the-art in acquiring and processing satellite remotely sensed data worldwideSiamak Khorram. [doi]
- Message from the technical program chairsSaad Biaz, Abdelghani Bellaachia. [doi]
- The next generation wireless network challenges for an emergency preparedness and response class of applications: A necessary public safety and securityAzzedine Boukerche. [doi]
- Message from the general chairAdel Said Elmaghraby. [doi]
- Ten years of experimentation in Information Mining & Software Research with applications in telecommunications industryMahmoud Daneshmand. [doi]
- 2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systemsGuangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang. [doi]
- Distributed pattern matching: Concept and applications in internet-scale networksRaouf Boutaba. [doi]
- Block-based rateless coding for energy-efficient video streaming over bluetoothRouzbeh Razavi, Martin Fleury, Mohammed Ghanbari. 1-6 [doi]
- Streaming video timing analysis in wireless ad-hoc networksAnastasios Politis, Isabella Kotini, Athanasios Manitsaris. 7-12 [doi]
- Analysis of compressed depth and image streaming on unreliable networksPietro Zanuttigh, Andrea Zanella, Guido M. Cortelazzo. 13-18 [doi]
- A measurement study of Speex VoIP and H.264/AVC video over IEEE 802.16d and IEEE 802.11gKostas Pentikousis, Jarno Pinola, Esa Piri, Frerk Fitzek. 19-24 [doi]
- Efficient collision detection for auto rate fallback algorithmFederico Maguolo, Mathieu Lacage, Thierry Turletti. 25-30 [doi]
- Improving audio streaming over multi-hop ZigBee networksDavide Brunelli, Loris Teodorani. 31-36 [doi]
- Caller identity privacy in SIP heterogeneous realms: A practical solutionGiorgos Karopoulos, Georgios Kambourakis, Stefanos Gritzalis. 37-43 [doi]
- A complete content production and delivery system in a controlled multimedia networkChrisa Papagianni, Nikolaos D. Tselikas, Evagelos Kosmatos, Andreas E. Papadakis, Thierry Keutgen, Dimitra I. Kaklamani, Iakovos S. Venieris. 44-49 [doi]
- Efficient delivery of MBMS multicast traffic over HSDPAAntonios G. Alexiou, Christos Bouras, Evangelos Rekkas. 50-55 [doi]
- On controlling burst loss ratio inside an OBS networkWael Hosny Fouad Ali, Mohamed Faten Zhani, Halima Elbiaze. 56-61 [doi]
- Performance evaluation of routing and wavelength assignment algorithms for optical networksEun Sung Jung, Yan Li, Sanjay Ranka, Sartaj Sahni. 62-67 [doi]
- Arranging shareability dynamically for the availability-constrained design of optical transport networksBurak Kantarci, Hussein T. Mouftah, Sema F. Oktug. 68-73 [doi]
- A novel distributed destination routing-based Availability-Aware provisioning framework for differentiated protection services in optical mesh networksEmad M. Al Sukhni, Hussein T. Mouftah. 74-79 [doi]
- On the application of long soas in linear operating and saturation regimes: Exploitation in high bit rate optical networksYoussef Said, Houria Rezig, Ammar Bouallegue. 80-83 [doi]
- Using adapted visibility graphs for network planningBranka Lakic, Marek Hajduczenia, Henrique J. A. da Silva, Paulo P. Monteiro. 84-90 [doi]
- Autonomous preference-aware multi-service integration and allocationXiaodong Lu, Kinji Mori. 91-96 [doi]
- Automating media processes in a service oriented architectureDietrich Van der Weken, Stein Desmet, Bjorn Muylaert, Steven Van Assche, Bruno Volckaert. 97-102 [doi]
- Towards business model and technical platform for the service oriented context-aware mobile virtual communitiesPravin Pawar, Julien Subercaze, Pierre Maret, Bert-Jan van Beijnum, Dimitri Konstantas. 103-110 [doi]
- A user-centric composition model for the Internet of ServicesAntonio Corradi, Enrico Lodolo, Stefano Monti, Samuele Pasini. 110-117 [doi]
- An efficient adaptive Cross-Layer interaction mechanism for TCP traffic over heterogeneous networksU. Baroudi, B. Abu Qadous. 118-123 [doi]
- An efficient rate adaptation scheme for multihop wireless networks using Kalman FilterBasel Alawieh, Yongning Zhang, Chadi Assi, Hussein T. Mouftah. 124-129 [doi]
- Rate adaptation algorithms for IEEE 802.11 networks: A survey and comparisonSaad Biaz, Shaoen Wu. 130-136 [doi]
- A robust controller for the TCP congestion windowCire Sall, E. El Alaoui, S. Doubabi, E. Warraki. 137-142 [doi]
- A dynamic rate adaptation with fragmentation MAC protocol against channel variation for wireless LANsKuei-Ping Shih, San-Yuan Wang, Chien-Min Chou, Li-Jie Cheng. 143-148 [doi]
- Adaptive window size to reduce the influence of heterogeneous mobility on TCP performanceNiklas Kirschnick, Frank Steuer, Pablo Vidales, Sahin Albayrak. 149-156 [doi]
- F:::2:::-TCP: A fairer and TCP-friendlier congestion control protocol for high-speed networksShan Chen, Junhua Zhu, Brahim Bensaou, Farid Naït-Abdesselam. 157-162 [doi]
- Evaluating and improving the TCP/UDP performances of IEEE 802.11(p)/1609 networksShie-Yuan Wang, Hsi-Lu Chao, Kuang-Che Liu, Ting-Wei He, Chih-Che Lin, Chih-Liang Chou. 163-168 [doi]
- A Double K-Clustering Approach for restructuring Distributed Object-Oriented softwareSafwat H. Hamad, Tahany A. Fergany, Reda A. Ammar, Amal A. Abd El-Raouf. 169-174 [doi]
- Mining drug targets based on microarray experimentsH. El-Shishiny, T. H. Soliman, M. El-Asmar. 175-181 [doi]
- Mining software aging: A neural network approachH. El-Shishiny, S. Sobhy Deraz, O. B. Badreddin. 182-187 [doi]
- Investigation of feature dimension reduction based DCT/SVM for face recognitionAouatif Amine, Sanaa Ghouzali, Mohammed Rziza, Driss Aboutajdine. 188-193 [doi]
- Power-Controlled Rate and Coverage Adaptation for WCDMA cellular networksKhaled A. Ali, Hossam S. Hassanein, Hussein T. Mouftah. 194-200 [doi]
- Call admission control for H.264 traffic transmission over wireless cellular networksP. Koutsakis. 201-207 [doi]
- Uplink call admission control in multi-services W-CDMA networkK. Ibrahimi, Rachid El Azouzi, E. H. Bouyakhf. 208-213 [doi]
- Efficient traffic policing for videoconference traffic over wireless cellular networksP. Koutsakis. 214-221 [doi]
- A resource allocation algorithm and system architecture to extend the cell coverage and alleviate the inter-cell interferenceWoonsik Lee, Minh-Viet Nguyen, Hwang Soo Lee. 222-227 [doi]
- A study on optimal termination target of synchronous H-ARQ for the next generation cellular systemToshihiko Komine, Satoshi Konishi, Hiroyuki Shinbo. 228-233 [doi]
- CPK-based fast authentication method in Mobile IPv6 networksJiao Zhang, Yujun Zhang, Ye Tian, Zhongcheng Li. 234-239 [doi]
- Analyzing a human-based trust model for mobile ad hoc networksPedro B. Velloso, Rafael P. Laufer, Otto Carlos Muniz Bandeira Duarte, Guy Pujolle. 240-245 [doi]
- A sybilproof distributed identity management for P2P networksFrançois Lesueur, Ludovic Mé, Valérie Viet Triem Tong. 246-253 [doi]
- An analysis of ASMA performances against packet dropping attacks in dense networksVincent Toubiana, Houda Labiod, Laurent Reynaud, Yvon Gourhant. 254-259 [doi]
- The impact of wireless LAN security on performance of different Windows operating systemsSamad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani. 260-264 [doi]
- Efficient routing in WiMax/802.16 based mesh networks with centralized schedulingJad El-Najjar, Brigitte Jaumard, Chadi Assi. 265-271 [doi]
- Distributed channel assignment for multi-radio wireless mesh networksSadeq Ali Makram, Mesut Günes. 272-277 [doi]
- Managing community aware Wireless Mesh NetworksJoão Paulo Barraca, Rui L. Aguiar. 278-285 [doi]
- Header compression for VoIP over multi-hop wireless mesh networksArlen Nascimento, Edjair de Souza Mota, Saulo Queiroz, Edson Nascimento. 286-291 [doi]
- Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization toolRafael De T. Valle, Diego G. Passos, Célio Vinicius N. de Albuquerque, Débora C. Muchaluat-Saade. 292-297 [doi]
- Highly compressed Aho-Corasick automata for efficient intrusion detectionXinyan Zha, Sartaj Sahni. 298-303 [doi]
- Efficient disk encryption and verification through trusted nonceFangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai. 304-309 [doi]
- Global abnormal correlation analysis for DDoS attack detectionZong-lin Li, Guang-min Hu, Dan Yang. 310-315 [doi]
- Fast multiplication techniques for public key cryptographyVinodh Gopal, Satyajit Grover, Michael E. Kounavis. 316-325 [doi]
- A phishing vulnerability analysis of web based systemsW. D. Yu, S. Nargundkar, N. Tiruthani. 326-331 [doi]
- UBSF: A novel online URL-Based Spam FilterYang Li, Bin-Xing Fang, Li Guo, Zhi-Hong Tian, Yong-Zheng Zhang, Zhi-Gang Wu. 332-339 [doi]
- Evaluation of resilience for Data Center systemsYehia H. Khalil, Adel Said Elmaghraby, Anup Kumar. 340-345 [doi]
- Building a secure medical research organizationAdil Alaoui, N. Subbiah, Jeffery Collmann, Kevin Cleary, Seong K. Mun, J. Coleman. 346-355 [doi]
- A new approach for efficient MBMS service provision in UTRANChristophoros Christophorou, Andreas Pitsillides. 356-361 [doi]
- An enhanced approach for efficient MBMS handovers in 3G networksChristophoros Christophorou, Andreas Pitsillides. 362-367 [doi]
- Power counting for optimized capacity in MBMS enabled UTRANAndreas Panayides, Christophoros Christophorou, Josephine Antoniou, Andreas Pitsillides, Vasos Vassiliou. 368-373 [doi]
- Power saving methods for MBMS transmissions in UTRANAntonios G. Alexiou, Christos Bouras, Vasileios Kokkinos. 374-379 [doi]
- Access control in Group Communication SystemsQi Li, Mingwei Xu, Xinwen Zhang. 380-385 [doi]
- FlexBox: Sandboxing internet servers based on layer-7 contextsA. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono. 386-391 [doi]
- A two-level source address spoofing prevention based on automatic signature and verification mechanismYan Shen, Jun Bi, Jianping Wu, Qiang Liu. 392-397 [doi]
- An unsupervised network anomaly detection approach by k-Means clustering & ID3 algorithmsYasser Yasami, S. Khorsandi, S. P. Mozaffari, A. Jalalian. 398-403 [doi]
- Optimal number and class selection of nodes in Wireless Mesh NetworksM. Saoud, S. Mahmoud. 404-410 [doi]
- End-to-end shared restoration algorithms in multi-domain mesh networksZhiying Gao, Hassan Naser. 411-416 [doi]
- High throughput path selection for multi-path video streaming in Ad-hoc networksAhmed Abd El Al, Tarek N. Saadawi. 417-422 [doi]
- A queue based dynamic approach for the Coordinated distributed scheduler of the IEEE 802.16Valeria Loscrì. 423-428 [doi]
- A load-aware routing metric for wireless mesh networksLan Tien Nguyen, Razvan Beuran, Yoichi Shinoda. 429-435 [doi]
- CLE:::2:::aR:::2:::: A cross-layer energy-efficient and reliable routing protocol for wireless ad hoc networksKuei-Ping Shih, Hung-Chang Chen, Chun-Chih Li, Hsiang-I Chen. 436-441 [doi]
- Pro-active task sharing in a self-organizing server clusterSamah A. Senbel. 442-446 [doi]
- Model for on-demand virtual computing architectures - OVCAAlejandra Rodríguez, Javier Fernández, Jesús Carretero. 447-454 [doi]
- Performance modeling of a grid-based Data Distribution Management protocolAzzedine Boukerche, YunFeng Gu. 455-461 [doi]
- Improving reliability and energy efficiency of disk systems via utilization controlKiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xiao Qin, Yiming Yang. 462-467 [doi]
- Impact of interconnection networks and application granularity to compound cluster environmentsLuiz Carlos Pinto, Rodrigo P. Mendonça, Mario A. R. Dantas. 468-473 [doi]
- Building efficient multi-core clusters for high performance computingLuiz Carlos Pinto, Luiz H. B. Tomazella, Mario A. R. Dantas. 474-479 [doi]
- P-CDN: Extending access control capabilities of P2P systems to provide CDN servicesFatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino. 480-486 [doi]
- Multicast-P2P content distribution in large-scale enterprise networksRaime Bustos, Alberto Aguilar, Kia Makki, Raimund K. Ege. 487-494 [doi]
- VoRaQue: Range queries on Voronoi overlaysMichele Albano, Laura Ricci, Martina Baldanzi, Ranieri Baraglia. 495-500 [doi]
- An empirical approach to a system design methodology for mobile Peer-to-Peer computingW. D. Yu, J. Patel, M. Chitralamuthu, S. S. Parakh. 501-506 [doi]
- TorrentLab: investigating BitTorrent through simulation and live experimentsMarinho P. Barcellos, Rodrigo B. Mansilha, Francisco V. Brasileiro. 507-512 [doi]
- A real-time road traffic information system based on a peer-to-peer approachYa Chu Yang, Chien Ming Cheng, Pei Yun Lin, Shiao Li Tsao. 513-518 [doi]
- Formal automated transformation of SDL specifications to Lotos specificationsHazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath. 519-524 [doi]
- Tile logic as an architectural model for mobilityChafia Bouanaka, Faiza Belala. 525-530 [doi]
- Comparison of four similarity measures based on GO annotations for Gene ClusteringHisham Al-Mubaid, Anurag Nagar. 531-536 [doi]
- Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust ManagementS. D. Roy, S. A. Singh, Subhrabrata Choudhury, Narayan C. Debnath. 537-542 [doi]
- A proactive burst assembly algorithm for optical burst switched networksSubhrabrata Choudhury, K. Paniker, A. Sinha, S. Mukhopadhyay, Narayan C. Debnath. 543-548 [doi]
- Modeling wireless channel for ad-hoc network routing protocolMerlinda Drini, Tarek N. Saadawi. 549-555 [doi]
- A queuing analysis of packet dropping for real-time applications in wireless networksA. Kobbane, Rachid El Azouzi, E. H. Bouyakhf. 556-561 [doi]
- Multicast in wireless erasure networks with feedbackChong Jiang, Brian Smith, Babak Hassibi, Sriram Vishwanath. 562-565 [doi]
- Impact evaluation of radio propagation models on performance parameters of application layer in Wireless Mesh Backbone simulationSaulo Queiroz, Arlen Nascimento, Edjair de Souza Mota, Andrea Oliveira, Leandro Galvao, Edson Silva. 566-571 [doi]
- S-Box: A scalability analysis framework for ad hoc routing protocolsYan He, Dmitri Perkins, Bin Huang. 572-578 [doi]
- Document clustering based on diffusion maps and a comparison of the k-means performances in various spacesFadoua Ataa-Allah, William I. Grosky, Driss Aboutajdine. 579-584 [doi]
- Probability Density Estimation over evolving data streams using Tilted Parzen WindowHong Shen, Xiao-Long Yan. 585-589 [doi]
- Semi-supervised Clustering and Aggregation of Relational DataHichem Frigui, Cheul Hwang. 590-595 [doi]
- Session mobility in the mockets communication middlewareCesare Stefanelli, Mauro Tortonesi, Erika Benvegnu, Niranjan Suri. 596-603 [doi]
- Dynamic load balancing among multiple home agents for MIPv6Hanwen Zhang, Yujun Zhang, Chao Ma, Yi Sun, Zhongcheng Li. 604-609 [doi]
- Release of unnecessary resource reservation in mobility casesHai Lin, Houda Labiod. 610-615 [doi]
- Game theory and an interface selection mechanism for Multi-homed Mobile NodesOmar M. Raoof, H. S. Al-Raweshidy. 616-623 [doi]
- A reference architecture for micro-mobility support in IP networksRodrigo Prado, Eduardo Zagari, Tomás Badan, Eleri Cardozo, Murício Magalhães, José Carrilho, Rossano P. Pinto, André Berenguel, Daniel Barboza, Daniel Moraes, Thienne Johnson, Lars Westberg. 624-630 [doi]
- Pitfalls and tradeoffs on dealing with handoff management in bluetooth-based WPANs for real-time applicationsLoreno Oliveira, Kyller Costa Gorgônio, Angelo Perkusich, Leandro Dias da Silva. 631-636 [doi]
- Using path length measure for gene clustering based on similarity of annotation termsAnurag Nagar, Hisham Al-Mubaid. 637-642 [doi]
- Towards sound development of PIXITP, conformance test suites, and conforming implementations for various Formal Description TechniquesHazem El-Gendy, Nabil El-Kadhi, Narayan C. Debnath. 643-648 [doi]
- Combining multiple segmentation methods for improving the segmentation accuracySultan Aljahdali, Ennumeri A. Zanaty. 649-653 [doi]
- Metrics applied to Aspect Oriented Design using UML profilesNarayan C. Debnath, L. Baigorria, Daniel Riesco, German Montejano. 654-657 [doi]
- An interoperability approach based on asynchronous replication among distributed internet databasesDouglas Dyllon Jeronimo de Macedo, Hilton Ganzo William Perantunes, L. Maia, Eros Comunello, Aldo von Wangenheim, Mario A. R. Dantas. 658-663 [doi]
- Model for polling in noisy multihop systems with application to PLC and AMRJoseph M. Selga, Agustín Zaballos, Jaume Abella, Guiomar Corral. 664-669 [doi]
- A new signal separation technique using double referenced systemAtman Jbari, Abdellah Adib, Driss Aboutajdine. 670-673 [doi]
- A graph theory based scheduling algorithm For MIMO-CDMA systems using zero forcing beamformingElmahdi Driouch, Wessam Ajib. 674-679 [doi]
- An efficient maximum likelihood carrier frequency offset estimation technique for OFDM systemsS. M. Sameer, Ratnam V. Raja Kumar. 680-684 [doi]
- Performance analysis for resource coordination in a high-density wireless environmentLi Zheng, Doan B. Hoang. 685-690 [doi]
- MC-CDMA multiuser detection using a hybrid immune clonal selection algorithm with Hopfield Neural Network in fading channelsBinbin Xu, Jianping An, Zhongxia He. 691-694 [doi]
- Formal specification of a particular banking domain with RAISE specification languageMohammad Reza Nami, Abbas Malekpour. 695-699 [doi]
- SSMS - A secure SMS messaging protocol for the m-payment systemsMohsen Toorani, Ali Asghar Beheshti Shirazi. 700-705 [doi]
- Operational semantics of probabilistic Kleene algebra with testsRui Qiao, Yuan Wang, Xinyan Gao, Jinzhao Wu. 706-713 [doi]
- Theory framework for event structure slicingXinyan Gao, Jinzhao Wu, Rui Qiao, Jianfeng Chen. 714-721 [doi]
- Primal-dual algorithm for linear optimization problems based on a new class of kernel functionsMohamed El Ghami, Ivan Ivanov, Hans Melissen, Cornelis Roos, Trond Steihaug. 722-729 [doi]
- Variability modeling for Business Component customizationRajaa Saidi, Mounia Fredj, Salma Mouline, Agnès Front, Dominique Rieu. 730-735 [doi]
- Efficient sorting algorithms for the cell broadband engineD. Sharma, Vishal Thapar, Reda A. Ammar, Sanguthevar Rajasekaran, M. Ahmed. 736-741 [doi]
- The operation mode selection in FMIPv6Bin Liu, Philippe Martins, Philippe Bertin. 742-749 [doi]
- How node mobility affects k-hop cluster quality in Mobile Ad Hoc NETworks: A quantitative evaluationPaolo Bellavista, Eugenio Magistretti. 750-756 [doi]
- Implementation and experimental evaluation of a fast local mobility protocolN. G. Ferreira, Susana Sargento, Rui L. Aguiar. 757-763 [doi]
- An IMS vertical handoff solution to dynamically adapt mobile multimedia servicesPaolo Bellavista, Antonio Corradi, Luca Foschini. 764-771 [doi]
- Performance testing of Mobile IPv6 protocolHuiming Wang, Xingang Shi, Zhiliang Wang, Xia Yin, Jianping Wu. 772-779 [doi]
- Measuring and visualizing interdomain routing dynamics with BGPATHLuca Cittadini, Tiziana Refice, Alessio Campisano, Giuseppe Di Battista, Claudio Sasso. 780-787 [doi]
- Distributed fault localization for multi-domain all-optical networks with partial power monitoringMazen Khair, Jun Zheng, Hussein T. Mouftah. 788-793 [doi]
- Design and evaluation of a P2MP MPLS-based hierarchical service management systemKenji Kumaki, Ikuo Nakagawa, Kenichi Nagami, Tomohiko Ogishi, Shigehiro Ano. 794-799 [doi]
- A flexible network monitoring tool based on a data stream management systemNatascha Petry Ligocki, Carmem S. Hara, Christiano Lyra. 800-805 [doi]
- Using visualization techniques for SNMP traffic analysesEwerton Monteiro Salvador, Lisandro Zambenedetti Granville. 806-811 [doi]
- Adaptive RAKE combining schemes in the soft handover regionA. B. A. Doua, Seyeong Choi, Mohamed-Slim Alouini, Khalid A. Qaraqe. 812-817 [doi]
- Blind MIMO deconvolution of any source distributions via high-order spectraManal Taoufiki, Abdellah Adib, Driss Aboutajdine, Saad Biaz. 818-823 [doi]
- Investigation on folded patch antenna for cellular applicationsAdnane Latif, Rachid Hilal, Abdellah Ait Ouahman. 824-830 [doi]
- On the space-time correlation of MIMO fading channels in 3D scattering modelsA. A. Al-Kheir, Khalid A. Qaraqe, Mohamed-Slim Alouini. 831-837 [doi]
- Capacity improvement by employing femto cells in a macro cell HSDPA networkT. Nihtila. 838-843 [doi]
- Comparison of CDMA tele-traffic modelsSamad S. Kolahi. 844-848 [doi]
- Proper nouns in English-Arabic Cross Language Information RetrievalAbdelghani Bellaachia, Ghita Amor-Tijani. 849-857 [doi]
- An Efficient XML query processing based on combining T-Bitmap and index techniquesYin-Fu Huang, Shing-Hang Wang. 858-863 [doi]
- Pseudo-space Persian/Arabic text steganographyMohammad Shirali-Shahreza. 864-868 [doi]
- Multi-word term indexing for Arabic document retrievalSiham Boulaknadel, Béatrice Daille, Driss Aboutajdine. 869-873 [doi]
- OOV words in an English-Arabic CLIR systemAbdelghani Bellaachia, Ghita Amor-Tijani. 874-882 [doi]
- A stateless architectural approach to inter-domain QoSVitor Jesus, Rui L. Aguiar, Peter Steenkiste. 883-890 [doi]
- Analysis of the EDCA access mechanism for an IEEE 802.11e-compatible wireless LANJosé R. Gallardo, Sarai C. Cruz, Dimitrios Makrakis, Abdallah Shami. 891-898 [doi]
- A vendor-independent resource control framework for WiMAXPedro Neves, Tuomas Nissilä, Telmo Pereira, Ilkka Harjula, João Monteiro, Kostas Pentikousis, Susana Sargento, Francisco Fontes. 899-906 [doi]
- Fast-reroute procedures for multi-point to multi-point MPLS tunnelsMohamad Chaitou, Jean-Louis Le Roux. 907-914 [doi]
- Distributed Quality-of-Service routing of best constrained shortest pathsAbdelhamid Mellouk, Said Hoceini, Farid Baguenine, Mustapha Cheurfa. 915-919 [doi]
- Relaxed min-augmented range trees for the representation of dynamic IP router tablesChristine Maindorfer, Bettina Bär, Thomas Ottmann. 920-927 [doi]
- Searching nearest neighbor in overlay networkTan Chen, Xin Xiong. 928-933 [doi]
- Bypass: Providing secure DHT routing through bypassing malicious peersMarc Sánchez Artigas, Pedro García López, Antonio F. Gómez-Skarmeta. 934-941 [doi]
- A Partially Buffered Crossbar packet switching architecture and its schedulingLotfi Mhamdi. 942-948 [doi]
- Scheduling high-rate sessions in Fractional Lambda Switching networks: Algorithm and analysisThu-Huong Truong, Mario Baldi, Yoram Ofek. 949-956 [doi]
- MOTE: Efficient monitoring of top-k set in sensor networksAli Abbasi, Ahmad Khonsari, N. Farri. 957-962 [doi]
- Exploiting the cloning capability of Mobile Agents for cost-effective data fusion in wireless sensor networksAristides Mpitziopoulos, Damianos Gavalas, Charalampos Konstantopoulos, Grammati E. Pantziou. 963-968 [doi]
- On the self-healing properties of an extremely low power indoor metering networkNicola Altan, Erwin P. Rathgeb. 969-974 [doi]
- A hybrid energy aware routing algorithm for wireless sensor networksA. Bilami, D. E. Boubiche. 975-980 [doi]
- EATA: Effectiveness based Aggregation Time Allocation algorithm for Wireless Sensor NetworksWei Huangfu, Yan Liu, Bin Duan, Limin Sun, Jian Ma, Canfeng Chen. 981-987 [doi]
- Topology control for minimal path interference in wireless sensor networksHongli Xu, Liusheng Huang, Wang Liu, Ben Xu, Mingjun Xiao. 988-993 [doi]
- A new approach of 3D watermarking based on image segmentationSaoussen Ben Jabra, Ezzeddine Zagrouba. 994-999 [doi]
- A robust digital image watermarking method using Dual Tree Complex Wavelet TransformSamira Mabtoul, El Hassane Ibn Elhaj, Driss Aboutajdine. 1000-1004 [doi]
- Using the maximum Mutual Information criterion to textural Feature Selection for satellite image classificationMounir Ait Kerroum, Ahmed Hammouch, Driss Aboutajdine, Abdelghani Bellaachia. 1005-1009 [doi]
- Automatic color face tracking using gray informationLeila Essannouni, El Hassane Ibn Elhaj, Driss Aboutajdine. 1010-1014 [doi]
- Deterministic service on IEEE 802.11-like networksMario Baldi, Marco Papa Manzillo. 1015-1022 [doi]
- Applying a self-configuring admission control algorithm in a new QoS architecture for IEEE 802.16 networksSahar Ghazal, Y. H. Aoul, Jalel Ben-Othman, Farid Naït-Abdesselam. 1023-1028 [doi]
- QoS-aware Application Layer MulticastBin Rong, Ibrahim Khalil, Zahir Tari. 1029-1033 [doi]
- Wavelet-based geometry coding for 3D mesh using space frequency quantizationS. T. EL-Leithy, Walaa M. Sheta. 1034-1039 [doi]
- Robustness study of MBAC algorithmsAnne Nevin, Yuming Jiang, Peder J. Emstad. 1040-1046 [doi]
- Multi-point to multi-point traffic engineeringMohamad Chaitou, Jean-Louis Le Roux. 1047-1055 [doi]
- Flooding Zone Initialization Protocol (FZIP): Enabling efficient multimedia diffusion for multi-hop wireless networksTarik Elamsy, Randa El-Marakby. 1056-1061 [doi]
- Measuring network performance of swarm power aware routing protocol for MANETsAhmed S. Nagy, A. A. El-Kadi, Mikhail N. Mikhail. 1062-1069 [doi]
- A Reliability Aware Flooding Algorithm (RAFA) in wireless multi-hop networksYoundo Lee, Yoonbo Shim, Yanghee Choi, Taekyoung Kwon. 1070-1075 [doi]
- A spatial extension of TinyDB for wireless sensor networksPaolino Di Felice, Massimo Ianni, Luigi Pomante. 1076-1082 [doi]
- A reliable synchronous transport protocol for wireless image sensor networksAzzedine Boukerche, Yan Du, Jing Feng, Richard Werner Nelem Pazzi. 1083-1089 [doi]
- Broadcast routing in Wireless Sensor Networks with Dynamic Power ManagementPaulo Sérgio Sausen, Marco Aurélio Spohn, Angelo Perkusich. 1090-1095 [doi]
- Data collection in sensor networks with data mules: An integrated simulation analysisGiuseppe Anastasi, Marco Conti, Mario Di Francesco. 1096-1102 [doi]
- A new approach to content-based file type detectionMehdi Chehel Amirani, Mohsen Toorani, Ali Asghar Beheshti Shirazi. 1103-1108 [doi]
- JaDE: A JXTA support for distributed virtual environmentsLaura Ricci, Luca Genovali. 1109-1114 [doi]
- Reducing null message traffic in large parallel and distributed systemsSyed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat. 1115-1121 [doi]
- Transactional Agents for Pervasive ComputingMachigar Ongtang, Ali R. Hurson, Yu Jiao. 1122-1127 [doi]
- Improving the performance of End-to-End single rate Multicast Congestion ControlW. Kammoun, H. Youssef. 1128-1132 [doi]
- Cooperative load balancing in IEEE 802.11 networks with cell breathingEduard Garcia Villegas, Rafael Vidal, Josep Paradells Aspas. 1133-1140 [doi]
- ROHC and aggregated VoIP over fixed WiMAX: An empirical evaluationEsa Piri, Jarno Pinola, Frerk Fitzek, Kostas Pentikousis. 1141-1146 [doi]
- LDCOM: a Layered degree-constrained overlay multicast for interactive mediaWeizhan Zhang, Qinghua Zheng, Yang Li, Yi Che. 1147-1152 [doi]
- Efficient failover and Load Balancing for dependable SIP proxy serversYun-Jung Cheng, Kuochen Wang, Rong-Hong Jan, Chien Chen, Chia-Yuan Huang. 1153-1158 [doi]
- Enhancing campus VoIP service for ubiquitous communication on dual-mode mobile handsetsHung-Yun Hsieh, Hsiao-Pu Lin, You-En Lin. 1159-1165 [doi]
- Underwater Wireless Hybrid Sensor NetworksKashif Ali, Hossam S. Hassanein. 1166-1171 [doi]
- A Time-based Cluster-Head Selection Algorithm for LEACHHu Junping, Jin Yuhui, Dou Liang. 1172-1176 [doi]
- Efficient surface gateway deployment for underwater sensor networksSaleh Ibrahim, Jun-Hong Cui, Reda A. Ammar. 1177-1182 [doi]
- Enlightness: An enhanced and lightweight algorithm for time-space localization in Wireless Sensor NetworksAzzedine Boukerche, Horacio A. B. F. de Oliveira, Eduardo Freire Nakamura, Antonio Alfredo Ferreira Loureiro. 1183-1189 [doi]
- AT-Angle: A distributed method for localization using angles in sensor networksClément Saad, Abderrahim Benslimane, Jean-Claude König. 1190-1195 [doi]