| 3553 | -- | 3563 | Hojin Ha, Changhoon Yim, Young Yong Kim. Cross-layer multiuser resource allocation for video communication over OFDM networks |
| 3564 | -- | 3578 | Naouel Ben Ali, Abdelfattah Belghith, Joanna Moulierac, Miklós Molnár. QoS multicast aggregation under multiple additive constraints |
| 3579 | -- | 3585 | Huifang Chen, Hiroshi Mineno, Tadanori Mizuno. Adaptive data aggregation scheme in clustered wireless sensor networks |
| 3586 | -- | 3593 | Nadeem Jamali, Hongxing Geng. A mailbox ownership based mechanism for curbing spam |
| 3594 | -- | 3603 | Nguyen Van Hanh, Soonghwan Ro, Jungkwan Ryu. Simplified fast handover in mobile IPv6 networks |
| 3604 | -- | 3612 | Vicent Cholvi, Juan Segarra. Analysis and placement of storage capacity in large distributed video servers |
| 3613 | -- | 3624 | Yu-Fen Kao, Jen-Hung Huang. Price-based resource allocation for wireless ad hoc networks with multi-rate capability and energy constraints |
| 3625 | -- | 3637 | Paulo Sérgio Sausen, José Renato de Brito Sousa, Marco Aurélio Spohn, Angelo Perkusich, Antonio Marcus Nogueira de Lima. Dynamic Power Management with Scheduled Switching Modes |
| 3638 | -- | 3642 | Xu Zhang, Qiang Gao, Jun Zhang, Gang Wang. Impact of transmit power on throughput performance in wireless ad hoc networks with variable rate control |
| 3643 | -- | 3653 | Bo Zhou, Qi Shi, Madjid Merabti. Balancing intrusion detection resources in ubiquitous computing networks |
| 3654 | -- | 3661 | Xuguang Shao, Liren Zhang, Ping Shum. Modeling and performance analysis of realizable optical queue with service differentiation capability |
| 3662 | -- | 3671 | Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai. Protocols for purpose-restricted anonymous communications in IP-based wireless networks |
| 3672 | -- | 3682 | Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Park. CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast |
| 3683 | -- | 3690 | Ke Zhang, Cheng Peng Fu. An enhancement of TCP Veno with forward acknowledgement |
| 3691 | -- | 3699 | Marco Benini, Sabrina Sicari. Risk assessment in practice: A real case study |
| 3700 | -- | 3706 | Hichem Ayed Harhira, Samuel Pierre. Joint routing and admission control problem under statistical delay and jitter constraints in MPLS networks |
| 3707 | -- | 3718 | Ramanarayana Kandikattu, Lillykutty Jacob. A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6) |
| 3719 | -- | 3724 | Jung Yeon Hwang, Kyu Young Choi, Dong-Hoon Lee. Security weakness in an authenticated group key agreement protocol in two rounds |
| 3725 | -- | 3738 | Ching-Wen Chen, Chuan-Chi Weng, Chang-Jung Ku. Design of a low power and low latency MAC protocol with node grouping and transmission pipelining in wireless sensor networks |