233 | -- | 246 | Jong-Hyouk Lee, Tai-Myoung Chung. How much do we gain by introducing route optimization in Proxy Mobile IPv6 networks? |
247 | -- | 262 | Md. Shariful Islam, Muhammad Mahbub Alam, Md. Abdul Hamid, Choong Seon Hong, Sungwon Lee. EFT: a high throughput routing metric for IEEE 802.11s wireless mesh networks |
263 | -- | 269 | Aswir Premadi, Boonchuan Ng, Mohammad Syuhaimi Ab-Rahman, Kasmiran Jumari. Access network survivability: an architecture approach for monitoring, protection and restoration in FTTH application |
271 | -- | 284 | Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abdallah, Maher Ben Jemaa. An EAP-EHash authentication method adapted to resource constrained terminals |
285 | -- | 292 | Richard Demo Souza, Marcelo Eduardo Pellenz, Zaqueu Cabral Pereira. On unequal error protection for LZSS compressed data |
293 | -- | 300 | Fathi E. Abd El-Samie, Faisal S. Al-kamali, Moawad I. Dessouky, Bassiuny M. Sallam, Farid Shawki. Performance enhancement of SC-FDMA systems using a companding technique |
301 | -- | 311 | Jasurbek Khodjaev, Yongwan Park, Aamir Saeed Malik. Survey of NLOS identification and error mitigation problems in UWB-based positioning algorithms for dense environments |
313 | -- | 323 | Patrick Tortelier, Abdoulaye Bagayoko. On the achievable rate region of the Gaussian interference channel: the two- and three-user cases |
325 | -- | 340 | Mohammad Rakibul Islam, Jinsang Kim. On the cooperative MIMO communication for energy-efficient cluster-to-cluster transmission at wireless sensor network |