Abstract is missing.
- Comparison of computation methods for the steady-state markov modulated fluid queuesWassim Abbessi, Hédi Nabli. 1-6 [doi]
- Self-Selecting Reliable Path Routing in diverse Wireless Sensor Network environmentsThomas A. Babbitt, Christopher Morrell, Boleslaw K. Szymanski. 1-7 [doi]
- Allocation of IPTV streams over broadband wireless through fuzzy logic controlRouzbeh Razavi, Martin Fleury, Mohammed Ghanbari, Hanadi Sammak. 1-6 [doi]
- Stochastic bounds for performance evaluation of web servicesJean-Michel Fourneau, Lynda Mokdad, Nihal Pekergin. 7-12 [doi]
- Media aware FEC for Ccalable Video Coding transmissionLukasz Kondrad, Imed Bouazizi, Moncef Gabbouj. 7-12 [doi]
- Energy consumption analysis and optimization techniques for Wireless Sensor NetworksAlexandros Karagiannis, Stafanos Kokkorikos, Philip Constantinou. 8-14 [doi]
- Rate adaptation in 3GPP video streaming using track switching over a multihop WLANEliseo Catalan, Jordi Casademont, Xavier Sanchez-Loro, Josep Lluis Ferrer. 13-18 [doi]
- Transcient states analysis - diffusion approximation as an alternative to Markov models, fluid-flow approximation and simulationTadeusz Czachórski, Tomasz Nycz, Ferhan Pekergin. 13-18 [doi]
- An adaptive mobility aware and energy efficient MAC protocol for wireless sensor networksBashir Yahya, Jalel Ben-Othman. 15-21 [doi]
- Perceptual based voice multi-hop transmission over wireless sensor networksM. Petracca, G. Litovsky, A. Rinotti, Marco Tacca, J. C. De Martin, Andrea Fumagalli. 19-24 [doi]
- Experiments and performance evaluation of Event Driven MashupsMarc Drewniok, Massimo Maresca, Sancho Rego, Jürgen Sienel, Michele Stecca. 19-22 [doi]
- Distributed Erasure Coding in Data Centric Storage for wireless sensor networksMichele Albano, Stefano Chessa. 22-27 [doi]
- Opportunistic MAC layer design with Stochastic Petri Nets for multimedia Ad Hoc NetworksMohamed Escheikh, Kamel Barkaoui. 23-29 [doi]
- ClubADSL: When your neighbors are your friendsDomenico Giustiniano, Eduard Goma Llairo, Julián David Morillo-Pozo, Alberto Lopez Toledo, Pablo Rodriguez. 25-29 [doi]
- A multi-sink swarm-based routing protocol for Wireless Sensor NetworksMaurizio Paone, Luca Paladina, Marco Scarpa, Antonio Puliafito. 28-33 [doi]
- Scalability in a Dynamic Discovery Service-based Jini for the Next Generation vehicle networkRami Baroody, Nizar Al-Holou, Utayba Mohammad. 30-35 [doi]
- Reliable broadcast streaming over 802.11 WLANs with minimum channel usageDaniele Munaretto, Luca Scalia, Tushar Soni, Jörg Widmer. 30-35 [doi]
- Adaptive nodes scheduling approach for clustered sensor networksXu Xu, Yu Hen Hu, Jingping Bi, Wei Liu. 34-39 [doi]
- SSVF: an open-source experimental evaluation framework for H.264 scalable video streamingAndrea Detti, Giuseppe Bianchi, Claudio Pisa, Francesco Saverio Proto, Pierpaolo Loreti, Wolfgang Kellerer, Srisakul Thakolsri, Jörg Widmer. 36-41 [doi]
- An overview of results on ad hoc network performances using spatial modelAnthony Busson. 36-40 [doi]
- Optimising handover for real-time flows in Mobile wimax networkRami Ellouze, Mourad Gueroui, Mohamed Adel Alimi. 40-45 [doi]
- Message optimisation in wireless sensors networks for distributed diagnosisN. Dessart, Hacène Fouchal, Philippe Hunel, Harry Gros-Desormeaux, Nicolas Vidot. 42-47 [doi]
- VoIP over WiMAX: Quality of experience evaluationVitor Bernardo, Bruno Sousa, MarÃlia Curado. 42-47 [doi]
- Interaction & handover between IEEE 802.16e and DVB-S/RCS using MSCTP protocolTarek Bchini, Nabil Tabbane, Emmanuel Chaput, Sami Tabbane, André-Luc Beylot. 46-53 [doi]
- Effective adaptation decisions based on context-aware proactive handoff for mobile multimedia continuity maintenancePaolo Bellavista, Antonio Corradi, Luca Foschini. 48-53 [doi]
- Benefits of a pure layer 2 security approach in Metro EthernetAref Meddeb, Enis Elgueder, Issam Harrathi, Habib Youssef. 48-49 [doi]
- A Mean Value Analysis approach to transaction performance evaluation on multi-server systemsDirceu Cavendish, Yuji Oie, Hiroshi Koide, Mario Gerla. 50-55 [doi]
- Hard handover vs soft handover in a cityTarek Bchini, Nabil Tabbane, Emmanuel Chaput, Sami Tabbane, André-Luc Beylot. 54-60 [doi]
- A quantitative approach to the use of the WikipediaAntonio J. Reinoso, Jesús M. González-Barahona, Gregorio Robles, Felipe Ortega. 56-61 [doi]
- A high spectral efficiency and load-aware metric for path selection in IEEE 802.16j multi-hop relay networksKuei-Ping Shih, Sheng-Shih Wang, Chan-Ying Lien. 61-66 [doi]
- Communication/synchronisation mechanism for multiprocessor on Chip architecturesSoraya Zertal, Claude Timsit, Majed Chatti. 62-66 [doi]
- Testing robustness of communicating systems using ioco-based approachAntoine Rollet, Sébastien Salva. 67-72 [doi]
- Lifetime aware admission control for infrastructure-less wireless networksAmir Djouama, Marwen Abdennebi, Lynda Mokdad, Samir Tohme. 67-72 [doi]
- Performance modeling for evaluation and planning of Electronic Funds Transfer SystemsErica Sousa, Paulo Romero Martins Maciel, Carlos Araújo, Gabriel Alves, Fábio Chicout. 73-76 [doi]
- Facing crosscutting concerns in a middleware for pervasive Service compositionAntonio Corradi, Fulvio Di Marco, Stefano Monti, Samuele Pasini. 73-79 [doi]
- Automated fault localization based on unified Web service and NGN benchmarkingBogdan Harjoc, Florian Schreiner, Dragos Vingarzan, Thomas Magedanz. 77-82 [doi]
- Design of a message interworking function for converged IP messaging in Next Generation NetworksNiklas Blum, Sebastian Lampe, Thomas Magedanz. 80-85 [doi]
- Experiments results and large scale measurement data for web services performance assessmentRiadh Ben Halima, Emna Fki, Khalil Drira, Mohamed Jmaiel. 83-88 [doi]
- Adaptive partial CDN replicationManos Spanoudakis, Stathes Hadjiefthymiades. 86-91 [doi]
- Performance analysis and evaluation of P2PTV streaming behaviorMajed Alhaisoni, Antonio Liotta, Mohammed Ghanbari. 89-94 [doi]
- Performance analysis of composite web services using Stochastic Automata Networks over IP networkJalel Ben-Othman, Lynda Mokdad, Mohamed Ould Cheikh, Mbaye Sene. 92-97 [doi]
- Performance analysis of Web services architectureYoussou Kasse, Lynda Mokdad, Mbaye Sene. 94-98 [doi]
- Measuring the learners learning style based on tracks analysis in web based learningNabila Bousbia, Amar Balla, Issam Rebaï. 98-103 [doi]
- Optimal VPN design: The ILEC/CLEC dilemmaAref Meddeb, Abdelwahed Berguiga, Habib Youssef. 99-100 [doi]
- Towards a Java bytecodes compiler for Nios II soft-core processorWillian dos Santos Lima, Renata Spolon Lobato, Aleardo Manacero, Roberta Spolon Ulson. 104-109 [doi]
- Exploiting routing unfairness in DHT overlaysSalma Ktari, Artur Hecker, Houda Labiod. 110-115 [doi]
- Design and evaluation of a BitTorrent proxy for energy savingGiuseppe Anastasi, Marco Conti, Ilaria Giannetti, Andrea Passarella. 116-121 [doi]
- A layered architecture for Vehicular Delay-Tolerant NetworksVasco N. G. J. Soares, Farid Farahmand, Joel J. P. C. Rodrigues. 122-127 [doi]
- PeerStar: An attractive alternative to existing peer-to-peer topologiesHosein Shafiei, Z. Aghazadehy, Ahmad Khonsari, Mohamed Ould-Khaoua. 128-134 [doi]
- PPStream characterization: Measurement of P2P live streaming during OlympicsWei Liang, Rong Wu, Jingping Bi, Zhenyu Li. 135-140 [doi]
- Network layer link management using signal strength for ad-hoc networksHusnain Mansoor Ali, Anthony Busson, Véronique Vèque. 141-146 [doi]
- Priority based intra piconet scheduling scheme for QoS guaranties in Bluetooth networksKarima Maâlaoui, Leïla Azouz Saïdane. 147-152 [doi]
- Connectivity and critical point behavior in mobile ad hoc and sensor networksTae Hoon Kim, David Tipper, Prashant Krishnamurthy. 153-158 [doi]
- Towards a Cross Layer Framework for ad hoc wireless networksMurad Khalid, Ravi Sankar, In-Ho Ra. 159-164 [doi]
- BlueHRT: Hybrid Ring Tree Scatternet Formation in Bluetooth NetworksIbrahim Al-Kassem, Sanaa Sharafeddine, Zaher Dawy. 165-169 [doi]
- Towards an efficient header compression scheme to improve VoIP over wireless mesh networksAndrea Giordanna Nascimento, Edjair de Souza Mota, Saulo Queiroz, Leandro Galvao, Edson Nascimento Silva Jr.. 170-175 [doi]
- In-advance path reservation for file transfers In e-Science applicationsYan Li, Sanjay Ranka, Sartaj Sahni. 176-181 [doi]
- Deploying agile photonic networks over reconfigurable optical networksSofia A. Paredes, Gregor von Bochmann, Trevor J. Hall. 182-187 [doi]
- Impact of chromatic and modal dispersion on frequency response of optical multimode fibersHichem Mrabet, Iyad Dayoub, Rabah Attia, Nizar Al-Holou, Charles Tatkeu. 188-194 [doi]
- Adaptive Offset for OBS networks using Feedback Control TechniquesWael Hosny Fouad Ali, Mohamed Faten Zhani, Halima Elbiaze. 195-199 [doi]
- A public key algorithm for optical communication based on lattice cryptographyWalid Abdallah, Mohamed Hamdi, Noureddine Boudriga. 200-205 [doi]
- On Finding maximally redundant trees in strictly linear timeGábor Enyedi, Gábor Rétvári, András Császár. 206-211 [doi]
- Compact N-tree: an indexing structure for distance range queriesFaïza Najjar, Hassenet Slimani. 212-217 [doi]
- Sorting on a Cell Broadband Engine SPUShibdas Bandyopadhyay, Sartaj Sahni. 218-223 [doi]
- PETCAM-A power Efficient TCAM for forwarding tablesTania Mishra, Sartaj Sahni. 224-229 [doi]
- Transforming UML models to colored petri nets models using graph grammarsElhillali Kerkouche, Allaoua Chaoui, Khaled Khalfaoui. 230-236 [doi]
- An Enhanced Slotted Binary Tree Algorithm with Intelligent Separation in RFID systemsSungsoo Kim, YongHwan Kim, KwangSeon Ahn. 237-242 [doi]
- Analyzing the application of inter-cell relay in CDMA cellular networksAyman Radwan, Hossam S. Hassanein. 243-248 [doi]
- Influence of code orthogonality on downlink throughput comparison between MC-CDMA and OFDMA in multi-cellular environmentsAnas F. Alrawi, Bayan S. Sharif, Charalampos Tsimenidis, Konstantinos Ntagkounakis. 249-254 [doi]
- Seamless vertical handoff algorithm for heterogeneous wireless networks-an advanced filtering approachRizwan Khan, Sonia Aïssa, Charles L. Despins. 255-260 [doi]
- Efficient frequency reuse scheme for multi-cell OFDMA systemsAbdelhalim Najjar, Noureddine Hamdi, Ammar Bouallegue. 261-265 [doi]
- Low complexity scheduling algorithms for the LTE uplinkElias Yaacoub, Hussein Al-Asadi, Zaher Dawy. 266-270 [doi]
- A performance evaluation model for RSS-based vertical handoff algorithmsTong Shu, Min Liu, Zhongcheng Li. 271-276 [doi]
- Inductive as a support of deductive data visualisation in Wireless Sensor NetworksMohammad Hammoudeh, Robert M. Newman, Christopher Dennett, Sarah Mount. 277-280 [doi]
- SimulNet: a wavelength-routed optical network simulation frameworkFrancesco Palmieri, Ugo Fiore, Sergio Ricciardi. 281-286 [doi]
- An efficient stream memory architecture for heterogeneous multicore processorRangyu Deng, Weixia Xu, Qiang Dou, Hongwei Zhou, Zefu Dai, Haiyan Chen. 287-290 [doi]
- Reusing heterogeneous software process modelsFadila Aoussat, Mohamed Ahmed-Nacer. 291-294 [doi]
- A tool to simplify the management of homogeneous and heterogeneous gridsCésar S. Aguiar, Daniel I. Cruz, Marcos Antonio Cavenaghi, Roberta Spolon Ulson, Renata Spolon Lobato. 295-298 [doi]
- Quantization software: application of trellis coded scalar/vector quantizationMerouane Bouzid, Mehdi Ould Hocine. 299-302 [doi]
- A case study of a multi-cluster utilizing enhanced transport protocolsDiogo R. Viegas, Mario Antonio Ribeiro Dantas, Michael A. Bauer. 303-306 [doi]
- Babelchord: a social tower of DHT-based overlay networksLuigi Liquori, Cédric Tedeschi, Francesco Bongiovanni. 307-312 [doi]
- A secure variant of the Hill CipherMohsen Toorani, Abolfazl Falahati. 313-316 [doi]
- Objects detection by expectation-maximisation algorithm application to football imagesMourad Moussa Jlassi, Ali Douik, Hassani Messaoud. 317-320 [doi]
- Characterizing end-to-end packet reordering with UDP trafficSandra P. Tinta, Alexander E. Mohr, Jennifer L. Wong. 321-324 [doi]
- Bloumail: an interactive tool for blocking spam at the originatorGianluca Dini, Isidoro S. La Porta. 325-328 [doi]
- Breaking the barriers between security mechanisms through the composition of Web Services: Towards a solution for the detection of multistage distributed attacksLeonardo Lemes Fagundes, Luciano Paschoal Gaspary. 329-332 [doi]
- Multi-dimensional traffic anomaly detection based on ICALi Zonglin, Hu Guangmin, Yao Xingmiao. 333-336 [doi]
- Online spam filtering using support vector machinesOla Amayri, Nizar Bouguila. 337-340 [doi]
- A new genetic algorithm approach for intrusion response system in computer networksBoutheina A. Fessi, Salah Benabdallah, Mohamed Hamdi, Noureddine Boudriga. 342-347 [doi]
- Deploying FPGA self-configurable cell structure for micro crypto-functionsWael Adi, Noureddine Ouertani, Abdulrahman Hanoun, Bassel Soudan. 348-354 [doi]
- Robust Key Management scheme for certification in mobile ad-hoc networkskhaled hamouid, Kamel Adi. 355-360 [doi]
- SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networksRazvi Doomun, Thaier Hayajneh, Prashant Krishnamurthy, David Tipper. 361-367 [doi]
- SVNM: Secure verification of neighborhood membership in static multi-hop wireless networksIssa Khalil, Mohammad Hayajneh, Mamoun Awad. 368-373 [doi]
- LPBS - Location Privacy Based SystemFilipe N. Ribeiro, Sérgio Donizetti Zorzo. 374-379 [doi]
- Handling dynamics in gossip-based aggregation schemesNicola Bicocchi, Marco Mamei, Franco Zambonelli. 380-385 [doi]
- P2P cache-and-forward mechanisms for mobile ad hoc networksClaudio Casetti, Carla-Fabiana Chiasserini, Marco Fiore, Chi-Anh La, Pietro Michiardi. 386-392 [doi]
- On the performance of adaptive Wireless Push Systems in high bit rate environmentsPetros Nicopolitidis, Georgios I. Papadimitriou, Andreas S. Pomportsis. 393-398 [doi]
- Location-dependent performance of cooperative networks with power allocationTobias Renk, Friedrich Jondral. 399-403 [doi]
- A collaborative cache approach for mobile ad hoc networksMarcos F. Caetano, Jacir Luiz Bordim, Mario Antonio Ribeiro Dantas. 404-410 [doi]
- Self-optimizing cooperative caching in autonomic Wireless Mesh NetworksThabo K. R. Nkwe, Mieso K. Denko. 411-416 [doi]
- Framework for application-level adaptation of media streams transmitted using DCCP ProtocolLukasz Czekierda, Tomasz Grobelny. 417-423 [doi]
- Hardware implementation of session initiation protocol servers and clientsRaymond Peterkin, Mohamed Abou-Gabal, Fadi El-Hassan, Dan Ionescu. 424-430 [doi]
- Image annotation based on constrained clustering and semi-naive bayesian modelM. Maher Ben Ismail, Hichem Frigui. 431-436 [doi]
- Adaptive Smooth Simulcast Protocol for multimedia transmissionChristos Bouras, Apostolos Gkamas, Georgios Kioumourtzis. 437-442 [doi]
- Discrete-time analysis of packet data discarding in high speed multimedia networksAttahiru Sule Alfa, Haitham Abu-Ghazaleh. 443-448 [doi]
- Fingerprints in the spectrum: Spectral analysis and detection of VoIP trafficChen Ling, Zheng Kai, Liu Fang, Lei Zhenming, Yangjie. 449-454 [doi]
- Automatic QoS control in UPnP home networksJukka-Pekka Laulajainen, Matti Hirvonen. 455-460 [doi]
- A Tabu Search heuristic for capacitated network designMohamed Zied Ben Hamouda, Olivier Brun, Jean-Marie Garcia. 461-467 [doi]
- Using trajectory tracking control for expressive-based SLA applications in internet computingLynda Zitoune, Amel Hamdi, Véronique Vèque, Hugues Mounier. 468-473 [doi]
- An efficient hybrid recovery mechanism for MPLS-based networksEl Kamel Ali, Youssef Habib. 474-480 [doi]
- Time-varying network internal loss inference based on unicast end-to-end measurementsFei Gaolei, Hu Guangmin, Qian Feng. 481-486 [doi]
- Joint k-coverage, duty-cycling, and geographic forwarding in wireless sensor networksHabib M. Ammari, Sajal K. Das. 487-492 [doi]
- A GRASP heuristic to Density Control: Solving multi-period coverage and Routing Problems in Wireless Sensor NetworksIuri Bueno Drumond de Andrade, Geraldo Robson Mateus, FabÃola Guerra Nakamura. 493-499 [doi]
- Exploiting signal strength detection and collision cancellation for tag identification in RFID systemsMaurizio A. Bonuccelli, Francesca Lonetti, Francesca Martelli. 500-506 [doi]
- Monitoring connectivity in wireless sensor networksBenahmed Khelifa, Hafid Haffaf, Madjid Merabti, David Llewellyn-Jones. 507-512 [doi]
- An on-line model to design heterogeneous wireless sensor networks based on small world conceptsDaniel L. Guidoni, Raquel A. F. Mini, Antonio Alfredo Ferreira Loureiro, Azzedine Boukerche. 513-519 [doi]
- A platform for integrated data processing from heterogeneous devices in naval fieldMaurizio Giacobbe, Eugenio Guglielmino, Antonio Puliafito. 520-525 [doi]
- Automatic verification of conformance of firewall configurations to security policiesNihel Ben Youssef, Adel Bouhoula, Florent Jacquemard. 526-531 [doi]
- On securing publish-subscribe systems with security groupsGianluca Dini, Angelica Lo Duca. 532-537 [doi]
- Security aware content-based publish/subscribe systemAmina Chaabane, Mohamed Jmaiel. 538-543 [doi]
- Design and implementation of a secure XML-based grid file storage system with reliability featuresFrancesco Tusa, Massimo Villari, Antonio Puliafito. 544-549 [doi]
- Malware analysis system using process-level virtualizationYu Adachi, Yoshihiro Oyama. 550-556 [doi]
- DoubleCheck: Multi-path verification against man-in-the-middle attacksMansoor Alicherry, Angelos D. Keromytis. 557-563 [doi]
- Enhancements to IEEE 802.11 DCF collision avoidance based on MIMO Adaptive Spatial Channels SharingAbduladhim Ashtaiwi, Hossam S. Hassanein. 564-569 [doi]
- Novel micro-threading techniques on the Cell Broadband EngineMohamed F. Ahmed, Reda A. Ammar, Sanguthevar Rajasekaran. 570-575 [doi]
- Transmit Beamforming multi-user MISO systems based on switched sub-codebookImen Sfaihi, Noureddine Hamdi, Ammar Bouallegue. 576-580 [doi]
- On the statistics of dual-hop semi-blind relaying systems with partial relay selectionDaniel Benevides da Costa, Sonia Aïssa. 581-586 [doi]
- Non-cooperative uplink power control game for CDMA wireless communications systemsMohammad Hayajneh, Issa Khalil, Mamoun Awad. 587-592 [doi]
- Stability and performance analysis of the Open Box Transport ProtocolPaulo Loureiro, Edmundo Monteiro. 593-599 [doi]
- Promoting self-imposed end-to-end congestion control via a Sword of Damocles approachShan Chen, Brahim Bensaou, Ka-Lok Hung. 600-605 [doi]
- Congestion prevention in broadband wireless access systems: An economic approachBader Al-Manthari, Nidal Nasser, Najah A. Abu Ali, Hossam S. Hassanein. 606-611 [doi]
- Adapting TCP exponential backoff to multihop ad hoc networksHaifa Touati, Ilhem Lengliz, Farouk Kamoun. 612-617 [doi]
- TFRC and RTT thresholds interdependence in a selective retransmission schemeÃrpád Huszák, Sándor Imre. 618-623 [doi]
- A QoS-aware congestion control mechanism for DCCPLei Ye, Zhijun Wang. 624-629 [doi]
- Increasing performances of TCP data transfers through multiple parallel connectionsAndrea Baldini, Lorenzo De Carli, Fulvio Risso. 630-636 [doi]
- An analysis of the heterogeneity and IP packet reordering over multiple wireless networksDominik Kaspar, Kristian Evensen, Audun Fosselie Hansen, Paal Engelstad, PÃ¥l Halvorsen, Carsten Griwodz. 637-642 [doi]
- Improving end-to-end multicast rate control in wireless networksWafa Kammoun, Habib Youssef. 643-648 [doi]
- Integrated many-to-many multicast addressing and access control methodImed Romdhani, Ahmed Yassin Al-Dubai. 649-654 [doi]
- Service level negotiation in ubiquitous environmentsMohamed Aymen Chalouf, Francine Krief. 655-660 [doi]
- Practical and efficient open-loop rate/link adaptation algorithm for high-speed IEEE 802.11n WLANsQiuyan Xia, Jian Pu, Mounir Hamdi, Khaled Ben Letaief. 661-666 [doi]
- Bandwidth allocation in IEEE 802.11 WLANs in presence of inter-BSSs hidden terminalsKa-Lok Hung, Brahim Bensaou. 667-672 [doi]
- Enhancing VoWLAN service through adaptive voice coderAdlen Ksentini. 673-678 [doi]
- MAC layer handoff algorithm for IEEE 802.11 wireless networksRizwan Khan, Sonia Aïssa, Charles L. Despins. 687-692 [doi]
- A clustering Group Mutual Exclusion algorithm for mobile ad hoc networksJean Frédéric Myoupo, Mohamed Naimi, Ousmane Thiare. 693-696 [doi]
- A tree-based group key agreement scheme for secure multicast increasing efficiency of rekeying in leave operationHamida Seba, Fouad Tigrine, Hamamache Kheddouci. 697-700 [doi]
- Energy efficient cluster-based routing in wireless sensor networksHouda Zeghilet, Nadjib Badache, Moufida Maimour. 701-704 [doi]
- Radio Access Network traffic generation for Mobile Switching CenterSuliman Albasheir, Sofiène Tahar, Claude Gauthier, Jean Roussel Personna. 705-710 [doi]
- An optimization of UWB antenna locationYen-Fu Chen, Chien-Ching Chiu, Chin-Han Lin. 711-712 [doi]
- A directly public verifiable signcryption scheme based on elliptic curvesMohsen Toorani, Ali Asghar Beheshti Shirazi. 713-716 [doi]
- Topology control protocol for conserving energy in wireless sensor networksBahia Zebbane, Manel Chenait, Nadjib Badache, Houda Zeghilet. 717-720 [doi]
- OS service update for an online adaptive embedded multimedia systemKais Loukil, Nader Ben Amor, Mouna Ben Said, Mohamed Abid. 721-725 [doi]
- Multivariate reduction in wireless sensor networksOrlando Silva Junior, André L. L. de Aquino, Raquel A. F. Mini, Carlos Mauricio S. Figueiredo. 726-729 [doi]
- Distributed Holding-Time-Aware shared-path-protection provisioning framework for optical networksEmad M. Al Sukhni, Hussein T. Mouftah. 730-735 [doi]
- An all-optical synchronizer for switching node using single-sideband modulator and fiber Bragg gratingsSelma Batti, Mourad Zghal, Noureddine Boudriga, Trevor Hall. 736-741 [doi]
- Extended adaptive search for routing multi-granular path allocation in optical networksAbdelhamid E. Eshoul, Hussein T. Mouftah, Nabil Naas. 742-747 [doi]
- Distributed algorithm for dynamic logical topology reconfiguration in IP over WDM networksPhuong Nga Tran, Ulrich Killat. 748-756 [doi]
- The significance of label conversion in GMPLS-based optical transport networksNabil Naas, Hussein T. Mouftah. 757-762 [doi]
- Neighborhood Nodes Collaboration to support QoS routing in Wireless Mesh NetworksSadeq Ali Makram, Fahad Samad, Mesut Günes. 763-769 [doi]
- Assessing the impact of Link Layer Feedback mechanisms on MANET routing protocolsA. Alfonso-Ariza, Alicia Triviño-Cabrera, Eduardo Casilari-Pérez, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni. 770-775 [doi]
- Address-Identifier Mapping System for scalable routingLotfi Benmohamed, Robert Cole, Bharat T. Doshi. 776-781 [doi]
- Use of load prediction mechanism for dynamic routing optimizationAbutaleb Abdelmohdi Turky, Andreas Mitschele-Thiel. 782-786 [doi]
- Performance evaluation of MANETs virtual backbone formation algorithmsKhalid Almahorg, Otman Basir. 787-792 [doi]
- Design of a Grid workflow for a climate applicationJoerg Schneider, Julius Gehr, Hans-Ulrich Heiss, Tiago C. Ferreto, César A. F. De Rose, Rodrigo Da Rosa Righi, Eduardo Rocha Rodrigues, Nicolas Maillard, Philippe Olivier Alexandre Navaux. 793-799 [doi]
- The upper bound and lower bound of the genus of pancake graphsQuan T. Nguyen, Saïd Bettayeb. 800-804 [doi]
- AGRADC: An architecture for autonomous deployment and configuration of grid computing applicationsLuciano Paschoal Gaspary, Weverton Luis da Costa Cordeiro, Sidnei Roberto Selzler Franco, Marinho P. Barcellos, Gerson Geraldo Homrich Cavalheiro. 805-810 [doi]
- Multi-core aware process mapping and its impact on communication overhead of parallel applicationsEduardo Rocha Rodrigues, Felipe L. Madruga, Philippe Olivier Alexandre Navaux, Jairo Panetta. 811-817 [doi]
- Towards self-managed adaptive emulation of grid environmentsRodrigo N. Calheiros, Everton Alexandre, Andriele B. do Carmo, César A. F. De Rose, Rajkumar Buyya. 818-823 [doi]
- Resource selection for fast large-scale Virtual Appliances PropagationAlejandra RodrÃguez, Jesús Carretero, Borja Bergua, Félix GarcÃa Carballeira. 824-829 [doi]
- Integrating user Identity Management systems with the Host Identity ProtocolMarc Barisch, Alfredo Matos. 830-836 [doi]
- Mobility between infrastructure and Ad-Hoc environments: Experimental validationRui Costa, Susana Sargento. 837-843 [doi]
- An opportunistic indoors positioning scheme based on estimated positionsGuoDong Kang, Tanguy Pérennou, Michel Diaz. 844-850 [doi]
- The impacts of network configuration and node mobility on path dynamics in mobile ad hoc networksLifang Guo, Khaled Harfoush, Huimin Xu. 851-856 [doi]
- A WiFi-based wireless mesh network with inter-domain mobility managementAzzedine Boukerche, Zhenxia Zhang, Samer Samarah. 857-862 [doi]
- Multiple router management for SIP-based Network MobilityChung-Ming Huang, Chao-Hsien Lee, Po-Han Tseng. 863-868 [doi]
- Implementing a scalable context-aware middlewareAntonio Corradi, Mario Fanelli, Luca Foschini. 868-874 [doi]
- Context-aware publish-subscribe: Model, implementation, and evaluationGianpaolo Cugola, Alessandro Margara, Matteo Migliavacca. 875-881 [doi]
- Bridging Context Management Systems in the ad hoc and mobile environmentsPravin Pawar, Hanga Boros, Fei Liu 0002, Geert J. Heijenk, Bert-Jan van Beijnum. 882-888 [doi]
- Solving collective conflicts in a disaster emergency attendance applicationThais R. M. Braga Silva, Linnyer Beatrys Ruiz, Antonio Alfredo Ferreira Loureiro. 889-894 [doi]
- HCI-enriched approach for DSS development: the UP/U approachHela Ltifi, Mounir Ben Ayed, Christophe Kolski, Adel M. Alimi. 895-900 [doi]
- Device pairing based on adaptive channel fluctuation control for large-scale organizationsTakashi Oshiba, Hideaki Nebayashi. 901-906 [doi]
- Synchronous ultra-wide band wireless sensors networks for oil and gas explorationStefano Savazzi, Umberto Spagnolini. 907-912 [doi]
- LWESP: Light-Weight Exterior Sensornet ProtocolÃngel Cuevas, Manuel Urueña, Annett Laube, Laurent Gomez. 913-919 [doi]
- Specification and synthesis of sensory datasets in pervasive spacesAbdelsalam Helal, Andres Mendez-Vazquez, Shantonu Hossain. 920-925 [doi]
- Service admission control in multi-service sensor networksYoussef Iraqi, Nafaâ Jabeur. 926-931 [doi]
- Geometry-assisted gateway deployment for underwater sensor networksSaleh Ibrahim, Reda A. Ammar, Jun-Hong Cui. 932-937 [doi]
- Target-based Association Rules for point-of-coverage wireless sensor networksSamer Samarah, Alexandre Shema Habyalimana, Azzedine Boukerche. 938-943 [doi]
- Distributed parallel scheduling algorithms for high-speed virtual output queuing switchesLotfi Mhamdi, Mounir Hamdi. 944-949 [doi]
- A Selectivity Function Scheduler for IEEE 802.11eAshraf Ali Bourawy, Najah A. Abu Ali, Hossam S. Hassanein. 950-955 [doi]
- On the performance of multi-level time sharing policy under heavy-tailed workloadsMalith Jayasinghe, Zahir Tari, Panlop Zeephongsekul, James Broberg. 956-962 [doi]
- A coordination mechanism based on a combined technique applied to dynamic Packet scheduling in routersMalika Bourenane, Abdelhamid Mellouk, Djilali Benhamamouch. 963-969 [doi]
- A Hybrid method for effective multiple sequence alignmentAbdessalem Layeb, Souham Meshoul, Mohamed Batouche. 970-975 [doi]
- An efficient scheduling scheme for MIMO wireless mesh networks with fairness constraintsAbdelhalim Driouech, Wessam Ajib, Elmahdi Driouch. 976-981 [doi]