| 1661 | -- | 1672 | Yi-Mao Hsiao, Jeng Farn Lee, Jai-Shiarng Chen, Yuan-Sun Chu. H.264 video transmissions over wireless networks: Challenges and solutions |
| 1673 | -- | 1684 | Kazushi Ikeda, Thilmee M. Baduge, Takaaki Umedu, Hirozumi Yamaguchi, Teruo Higashino. ALMware: A middleware for application layer multicast protocols |
| 1685 | -- | 1695 | Sébastien Barré, J. Ronan, Olivier Bonaventure. Implementation and evaluation of the Shim6 protocol in the Linux kernel |
| 1696 | -- | 1707 | Y. Peng Hu, R. Li, S. Wang Zhou, Y. Ping Lin. CCS-MAC: Exploiting the overheard data for compression in wireless sensor networks |
| 1708 | -- | 1721 | António Pinto, Manuel Ricardo. On performance of group key distribution techniques when applied to IPTV services |
| 1722 | -- | 1737 | Bahador Bakhshi, Siavash Khorsandi. Complexity and design of QoS routing algorithms in wireless mesh networks |
| 1738 | -- | 1749 | Abdulghani Ali Ahmed, Aman Jantan, Tat Chee Wan. SLA-based complementary approach for network intrusion detection |
| 1750 | -- | 1763 | Yoon Ho Choi, Moon-Young Jung, Seung-Woo Seo. A fast pattern matching algorithm with multi-byte search unit for high-speed network security |
| 1764 | -- | 1776 | Zhenhai Duan, Kartik Gopalan, Xin Yuan. An empirical study of behavioral characteristics of spammers: Findings and implications |