159 | -- | 179 | Saurabh K. Pandey, Mukesh A. Zaveri. Quasi Random Deployment and Localization in Layered Framework for the Internet of Things |
180 | -- | 198 | Xiaolin Chang, Tianju Wang, Ricardo J. RodrÃguez, Zhenjiang Zhang. Modeling and Analysis of High Availability Techniques in a Virtualized System |
199 | -- | 222 | Natarajan Meghanathan. Complex Network Analysis-Based Graph Theoretic Metrics to Determine Stable Data Gathering Trees for Mobile Sensor Networks |
223 | -- | 232 | I Karthiga, Sharmila Sankar. Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN |
233 | -- | 247 | Tahani Hussain, Paulvanna Nayaki Marimuthu, Sami J. Habib. Exploration of Storage Architectures for Enterprise Network |
248 | -- | 263 | Subramaniam Sarathambekai, Kandaswamy Umamaheswari. Multi-Objective Optimization Techniques for Task Scheduling Problem in Distributed Systems |
264 | -- | 272 | Bang Chul Jung, Jae Sook Yoo, Woongsup Lee. A Practical Physical-Layer Network Coding with Spatial Modulation in Two-Way Relay Networks |
273 | -- | 287 | Jigang Wu, Long Chen 0006, Xu Wang, Guiyuan Jiang, Siew Kei Lam, Thambipillai Srikanthan. Algorithms for Replica Placement and Update in Tree Network |
288 | -- | 318 | Lin Lyu, Shengli Liu, Shuai Han. Public-Key Encryption with Tight Simulation-Based Selective-Opening Security |