Abstract is missing.
- A Timer-based Protocol for Connected Dominating Set Construction in IEEE 802.11 Multihop Mobile Ad Hoc NetworksDong Zhou, Min-Te Sun, Ten-Hwang Lai. 2-8 [doi]
- DNS Meets DHT: Treating Massive ID Resolution Using DNS Over DHTYusuke Doi. 9-15 [doi]
- A DNS-Based Host Portability Solution With Localized Location UpdatingWang-Cho Cheng, Chee-Wei Ang, Kim-Sing Wong. 16-22 [doi]
- An Automatic Web Wrapper for Extracting Information from Web Sources, Using Clustering TechniquesNikolaos Papadakis, Dimitrios Skoutas, Konstantinos Raftopoulos, Theodora A. Varvarigou. 24-30 [doi]
- Turning Web Applications into Portlets: Raising the IssuesOscar Díaz, Iñaki Paz. 31-37 [doi]
- Semantic Web Link Analysis to Discover Social Relationships in Academic CommunitiesTakeru Miki, Saeko Nomura, Toru Ishida. 38-45 [doi]
- SOFAnet: Middleware for Software Distribution over InternetLadislav Sobr, Petr Tuma. 48-53 [doi]
- The Fluid Computing Middleware: Bringing Application Fluidity to the Mobile InternetDaniela Bourges-Waldegg, Yann Duponchel, Marcel Graf, Michael Moser. 54-63 [doi]
- Edge Server Software Architecture For Sensor ApplicationsSean Rooney, Daniel Bauer, Paolo Scotton. 64-71 [doi]
- FACE: A Firewall Analysis and Configuration EnginePavan Verma, Atul Prakash. 74-81 [doi]
- Adaptive Access Policy for the Linux KernelTakashi Horie, Toshiharu Harada, Kazuo Tanaka. 82-88 [doi]
- ELA: A Fully Distributed VPN System over Peer-to-Peer NetworkSadanori Aoyagi, Makoto Takizawa, Masato Saito, Hiroto Aida, Hideyuki Tokuda. 89-92 [doi]
- Infrastructures for Collaborative Networks - An Application in Elderly CareLuis M. Camarinha-Matos, Hamideh Afsarmanesh. 94-101 [doi]
- Scalable Overlay Network Deployment for Dynamic Collaborative GroupsNorihito Fujita, Yuichi Ishikawa, Toshio Koide, Akira Tsukamoto. 102-109 [doi]
- On Architecting Business Performance Management Grid for Adaptive EnterprisesJun-Jang Jeng, Henry Chang, Kumar Bhaskaran. 110-116 [doi]
- A Multicast Routing Algorithm for Overlay Network Built on Leased LinesXiaoyu Zhang, Guangzhao Zhang. 118-124 [doi]
- Design and Analysis of an e-Transaction Protocol Tailored for OCCPaolo Romano, Francesco Quaglia, Bruno Ciciani. 125-131 [doi]
- A Two-Level Distributed Architecture for Efficient Web Content Adaptation and DeliveryClaudia Canali, Valeria Cardellini, Michele Colajanni, Riccardo Lancellotti, Philip S. Yu. 132-139 [doi]
- Performance Evaluations of DCCP for Bursty Traffic in Real-Time ApplicationsShigeki Takeuchi, Hiroyuki Koga, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi. 142-149 [doi]
- Dual Metrics Fair Queueing: Improving Fairness and File Transfer TimeNorio Yamagaki, Hideki Tode, Koso Murakami. 150-156 [doi]
- A Lightweight Approach to Authenticated Web CachingCarlo Blundo, Stelvio Cimato, Roberto De Prisco. 157-163 [doi]
- A Case Study in Running a Parallel Branch and Bound Application on the GridKento Aida, Tomotaka Osumi. 164-173 [doi]
- On Coordinating Personalized Web Services Using CooPSZakaria Maamar, Emad Bataineh, Ghazi AlKhatib. 176-182 [doi]
- A Graph-Based Approach to Web Services CompositionSeyyed Vahid Hashemian, Farhad Mavaddat. 183-189 [doi]
- Goal Description Language for Semantic Web Service Automatic CompositionManshan Lin, Heqing Guo, Jianfei Yin. 190-196 [doi]
- Metrics for Detection of QoS Degradation over Wireless LANTatsuya Matsukawa, Takashi Satake, Jiro Yamada. 198-203 [doi]
- HAR: Hierarchy-Based Anycast Routing Protocol for Wireless Sensor NetworksNiwat Thepvilojanapong, Yoshito Tobe, Kaoru Sezaki. 204-212 [doi]
- Channel-Based Connectivity Management Middleware for Seamless Integration of Heterogeneous Wireless NetworksJun-Zhao Sun, Jukka Riekki, Marko Jurmu, Jaakko J. Sauvola. 213-219 [doi]
- Design and Evaluation of a Location-Based Virtual City System for Mobile PhonesHiroyuki Tarumi, Seiko Tokuda, Tomohiro Yasui, Kazuya Matsubara, Fusako Kusunoki. 222-228 [doi]
- General Virtual Hosting via Lightweight User-Level VirtualizationPéter Surányi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, Kazuhiko Kato. 229-236 [doi]
- Roles of an Intelligent Tutor Agent in a Virtual SocietyBogdan-Florin Marin, Axel Hunger, Stefan Werner, Sorin Meila, Christian Schuetz. 237-244 [doi]
- A Self-Organizing Overlay Network to Exploit the Locality of Interests for Effective Resource Discovery in P2P SystemsHiroaki Kobayashi, Hiroyuki Takizawa, Tsutomu Inaba, Yasuaki Takizawa. 246-255 [doi]
- Fault-Tolerant Routing for P2P Systems with Unstructured TopologyLeonardo Mariani. 256-263 [doi]
- Replication Methods for Load Balancing on Distributed Storages in P2P NetworksHiroshi Yamamoto, Daisuke Maruta, Yuji Oie. 264-271 [doi]
- Mobile Agent Communication Using SIPHsiao-Hong Tsai, Fang-Yie Leu, Wen-Kui Chang. 274-279 [doi]
- An Efficient Agent Control Method for Time Constraint ApplicationsHideo Kamada, Kazuhiko Kinoshita, Nariyoshi Yamai, Hideki Tode, Koso Murakami. 280-286 [doi]
- Fault-Management for Multi-Agent SystemsPeng Xu, Ralph Deters. 287-293 [doi]
- SOBA Framework: An Application Framework for Broadband Network EnvironmentNobuaki Yoshida, Yoshio Hayashi, Yutaka Tamagaki, Shoji Urashita, Makoto Kakuta, Masahiro Watanabe, Jacques Garrigue, Reiji Nakajima. 296-303 [doi]
- Enhanced Flooding Control Methods based on Biotic GrowthHideki Tode, Makoto Wada, Kazuhiko Kinoshita, Toshihiro Masaki, Koso Murakami. 304-310 [doi]
- Multi-Rate Control Method Using Layered ContentHiroyuki Oouchi, Ken Takahashi, Hiromichi Nagata, Kouichi Kamasawa. 311-317 [doi]
- Distributed Resource Discovery in Large Scale Computing SystemsAbhishek Gupta, Divyakant Agrawal, Amr El Abbadi. 320-326 [doi]
- Using Documents Assessments to Build Communities of InterestsPascal Francq, Alain Delchambre. 327-333 [doi]
- Annotating TV Drama based on Viewer Dialogue - Analysis of Viewers Attention Generated on an Internet Bulletin Board -Hiroshi Uehara, Kenichi Yoshida. 334-340 [doi]
- Empirical Study on Locating Congested Segments over the Internet Based on Multiple End-to-End Path MeasurementsAtsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Masato Tsuru, Yuji Oie. 342-351 [doi]
- Implementation and Evaluation of On-demand Address Allocation for Event-Driven Sensor NetworkShinji Motegi, Kiyohito Yoshihara, Hiroki Horiuchi. 352-360 [doi]
- On Scalable Modeling of TCP Congestion Control Mechanism for Large-Scale IP NetworksHiroyuki Ohsaki, Juñya Ujiie, Makoto Imase. 361-368 [doi]
- Memory Management of Density-Based Spam DetectorKenichi Yoshida, Fuminori Adachi, Takashi Washio, Hiroshi Motoda, Teruaki Homma, Akihiro Nakashima, Hiromitsu Fujikawa, Katsuyuki Yamazaki. 370-376 [doi]
- Spam Filtering using Spam Mail CommunitiesP. Deepak, Sandeep Parameswaran. 377-383 [doi]
- A Protection Method Against Massive Error Mails Caused by Sender Spoofed Spam MailsNariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita, Shin Maruyama, Motonori Nakamura. 384-390 [doi]
- Trace System of iSCSI Storage AccessSaneyasu Yamaguchi, Masato Oguchi, Masaru Kitsuregawa. 392-398 [doi]
- Latency-Driven Replica PlacementMichal Szymaniak, Guillaume Pierre, Maarten van Steen. 399-405 [doi]
- On Derived Data Services in CyberspaceShi-Cho Cha, Yuh-Jzer Joung. 406-412 [doi]
- Security Architecture for Control Networks using IPsec and KINKNobuo Okabe, Shoichi Sakane, Kazunori Miyazawa, Kenichi Kamada, Atsushi Inoue, Masahiro Ishiyama. 414-420 [doi]
- A Context-centric Security Middleware for Service Provisioning in Pervasive ComputingAntonio Corradi, Rebecca Montanari, Daniela Tibaldi, Alessandra Toninelli. 421-429 [doi]
- D-SAT: Detecting SYN Flooding Attack by Two-Stage Statistical ApproachSeung-Won Shin, Ki-Young Kim, Jong-Soo Jang. 430-436 [doi]