| 149 | -- | 150 | Mohamed Eltoweissy, Mohamed F. Younis. Dependable Wireless Sensor Networks |
| 151 | -- | 161 | Karim Seada, Ahmed Helmy. Efficient and robust geocasting protocols for sensor networks |
| 162 | -- | 172 | Yong Yuan, Zongkai Yang, Zhihai He, Jianhua He. An integrated energy aware wireless transmission system for QoS provisioning in wireless sensor network |
| 173 | -- | 182 | Ertan Onur, Cem Ersoy, Hakan DeliƧ. How many sensors for an acceptable breach detection probability? |
| 183 | -- | 199 | Sandeep S. Kulkarni, Mahesh Arumugam. Transformations for write-all-with-collision model:::, ::: |
| 200 | -- | 215 | Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora. Secret instantiation in ad-hoc networks |
| 216 | -- | 230 | Jing Deng, Richard Han, Shivakant Mishra. INSENS: Intrusion-tolerant routing for wireless sensor networks |
| 231 | -- | 245 | Min Chen, Taekyoung Kwon, Yanghee Choi. Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks |
| 246 | -- | 256 | Michael G. Hinchey, James L. Rash, Christopher Rouff, Denis Gracanin. Achieving dependability in sensor networks through automated requirements-based programming |
| 257 | -- | 267 | Yu-Wei Chen, Yi-Ta Lee. A broadcasting scheme with supporting VCR functions for near video-on-demand systems |
| 268 | -- | 278 | Lotfi Benachenhou, Samuel Pierre. Protection of a mobile agent with a reference clone |