Abstract is missing.
- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless NetworksYoun-Sik Hong, Ki-Young Lee. 1-12 [doi]
- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc NetworksEunyoung Kang, Yongsoon Im, Ung-Mo Kim. 13-23 [doi]
- A Formal Approach to Robustness Testing of Network ProtocolChuanming Jing, Zhiliang Wang, Xia Yin, Jianping Wu. 24-37 [doi]
- Deadline Probing: Towards Timely Cognitive Wireless NetworkPanlong Yang, Guihai Chen, QiHui Wu. 38-49 [doi]
- SRDFA: A Kind of Session Reconstruction DFAJinjing Huang, Lei Zhao, Jiwen Yang. 50-60 [doi]
- Measuring the Normality of Web Proxies Behavior Based on Locality PrinciplesYi Xie, Shun-Zheng Yu. 61-73 [doi]
- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application ServersWenping Pan, Dejun Mu, Hangxing Wu, Xinjia Zhang, Lei Yao. 74-85 [doi]
- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP FlowDongqi Wang, Guiran Chang, Xiaoshuo Feng, Rui Guo. 86-93 [doi]
- Password-Authenticated Key Exchange between Clients in a Cross-Realm SettingShuhua Wu, Yuefei Zhu. 94-104 [doi]
- Forward Secure Password-Based Authenticated Key Distribution in the Three-Party SettingShuhua Wu, Yuefei Zhu. 105-115 [doi]
- Key Management Using Certificateless Public Key Cryptography in Ad Hoc NetworksFagen Li, Masaaki Shirase, Tsuyoshi Takagi. 116-126 [doi]
- A Data Storage Mechanism for P2P VoD Based on Multi-channel OverlayXiaofei Liao, Hao Wang, Song Wu, Hai Jin. 127-137 [doi]
- HTL: A Locality Bounded Flat Hash Location ServiceRuonan Rao, Shuying Liang, Jinyuan You. 138-149 [doi]
- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery TechniquesXiang Fan, Yang Xiang. 150-161 [doi]
- Online Accumulation: Reconstruction of Worm Propagation PathYang Xiang, Qiang Li, Dong Guo. 162-172 [doi]
- HRS: A Hybrid Replication Strategy for Exhaustive P2P SearchHanhua Chen, Hai Jin, Xucheng Luo, Zhiguang Qin. 173-184 [doi]
- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P FrameworkBowei Yang, Guanghua Song, Yao Zheng. 185-195 [doi]
- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network ProxiesQing Li. 196-209 [doi]
- Automatic Transformation for Overlapping Communication and ComputationChangjun Hu, Yewei Shao, Jue Wang, Jianjiang Li. 210-220 [doi]
- Cooperative Communication System for Parallel Computing Agents in Multi-cluster GridChen Qing-Kui, Wei Wang. 221-231 [doi]
- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement ProblemWei Fu, Yingjie Zhao, Nong Xiao, Xicheng Lu. 232-243 [doi]
- Online Balancing Two Independent CriteriaSavio S. H. Tse. 244-254 [doi]
- Procrastination Scheduling for Fixed-Priority Tasks with Preemption ThresholdsXiaoChuan He, Yan Jia. 255-265 [doi]
- Survey on Parallel Programming ModelHenry Kasim, Verdi March, Rita Zhang, Simon See. 266-275 [doi]
- An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue TheoryLuqun Li. 276-285 [doi]
- Grid Computing: A Case Study in Hybrid GMRES MethodYe Zhang, Guy Bergére, Serge G. Petiton. 286-296 [doi]
- Towards Resource Reliability Support for Grid WorkflowsJiong Yu, Guozhong Tian, Yuanda Cao, Xianhe Sun. 297-307 [doi]
- A SyncML Middleware-Based Solution for Pervasive Relational Data SynchronizationHaitao Yang, Peng Yang, Pingjing Lu, Zhenghua Wang. 308-319 [doi]
- An Efficient Authentication and Key Agreement Protocol in RFID SystemEun-Jun Yoon, Kee-Young Yoo. 320-326 [doi]
- Grid Service Discovery Based on Cross-VO Service Domain ModelJingya Zhou, Junzhou Luo, Aibo Song. 327-338 [doi]
- Ontology-Based Semantic Method for Service Modeling in GridBin Cheng, Xingang Wang, Weiqin Tong. 339-348 [doi]
- A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC EnvironmentsXiao Zheng, Junzhou Luo, Aibo Song. 349-360 [doi]