| 1653 | -- | 1659 | Saleh Yousefi, Eitan Altman, Rachid El Azouzi, Mahmood Fathy. Improving connectivity in vehicular ad hoc networks: An analytical study |
| 1660 | -- | 1671 | Wei Kuang Lai, Zhen Chang Zheng, Chen-Da Tsai. Fast reroute with pre-established bypass tunnel in MPLS |
| 1672 | -- | 1678 | Lei Guo, Xingwei Wang, Juan Du, Tengfei Wu. A new heuristic routing algorithm with Hamiltonian Cycle Protection in survivable networks |
| 1679 | -- | 1686 | Keiichi Endo, Minoru Kawahara, Yutaka Takahashi. Encoding for secure computations in distributed interactive real-time applications |
| 1687 | -- | 1704 | Habib M. Ammari, Sajal K. Das. A trade-off between energy and delay in data dissemination for wireless sensor networks using transmission range slicing |
| 1705 | -- | 1712 | Jui Teng Wang. Centralized and distributed joint dual transmitter receiver diversity and power control for wireless networks |
| 1713 | -- | 1722 | Guillaume Jourjon, Emmanuel Lochin, Patrick Sénac. Design, implementation and evaluation of a QoS-aware transport protocol |
| 1723 | -- | 1726 | Xiaolong Qian, Yuanwei Jing, Jing Tian. Network congestion avoidance strategy with particle filter |
| 1727 | -- | 1738 | Yaning Wang, Linghang Fan, Dan He, Rahim Tafazolli. Performance comparison of scheduling algorithms in network mobility environment |
| 1739 | -- | 1750 | Chung-Pyo Hong, Charles C. Weems, Shin-Dug Kim. An effective vertical handoff scheme based on service management for ubiquitous computing |
| 1751 | -- | 1762 | Sahadeb Jana, Debashis Saha, Amitava Mukherjee, Pranay Chaudhuri. A novel approach for assigning wavelengths in multihop WDM optical networks |
| 1763 | -- | 1776 | Fatma Bouabdallah, Nizar Bouabdallah. The tradeoff between maximizing the sensor network lifetime and the fastest way to report reliably an event using reporting nodes selection |
| 1777 | -- | 1784 | Massoud Hadian Dehkordi, Samaneh Mashhadi. Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves |
| 1785 | -- | 1795 | Maode Ma, Qichao Zhu. Providing delay guaranteed service in CDMA wireless networks |
| 1796 | -- | 1802 | Imran Raza, S. A. Hussain. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes |
| 1803 | -- | 1813 | Agustín Orfila, Javier Carbó, Arturo Ribagorda. Autonomous decision on intrusion detection with trained BDI agents |
| 1814 | -- | 1823 | I-Shyan Hwang, Zen-Der Shyu, Liang-Yu Ke, Chun-Che Chang. A novel early DBA mechanism with prediction-based fair excessive bandwidth allocation scheme in EPON |
| 1824 | -- | 1831 | Juan Echagüe, Jesús E. Villadangos, Vicent Cholvi, Manuel Prieto. Transforming general networks into feed-forward by using turn-prohibition |
| 1832 | -- | 1841 | Chia-Hsin Cheng, Jen-Yung Lin, Jyh-Horng Wen, Chao-Kai Wen. On the performance of O:::3:::BPSK LDD with diversity combining techniques over fading channels |
| 1842 | -- | 1855 | Liansheng Tan, Li Jin, Yi Pan. Efficient placement of proxies for hierarchical reliable multicast |