783 | -- | 786 | Jia-Lun Tsai. Convertible multi-authenticated encryption scheme with one-way hash function |
787 | -- | 799 | Ali A. Kanso. Modified clock-controlled alternating step generators |
800 | -- | 805 | Lei Ye, Zhijun Wang, Hao Che, Henry C. B. Chan, Constantino M. Lagoa. Utility function of TCP |
806 | -- | 813 | Rashid A. Saeed, Hafizal Mohamad, Borhanuddin Mohd Ali. Dynamic hybrid automatic repeat request (DHARQ) for WiMAX - Mobile multihop relay using adaptive power control |
814 | -- | 827 | Nikolaos D. Doulamis, Pantelis N. Karamolegkos, Anastasios D. Doulamis, Ioannis G. Nikolakopoulos. Exploiting semantic proximities for content search over p2p networks |
828 | -- | 833 | Bazil Taha Ahmed, Miguel Calvo-Ramón. UMTS-HSDPA in High Altitude Platforms (HAPs) communications with finite transmitted power and unequal cell s load |
834 | -- | 846 | Kevin F. Chen, Edwin Hsing-Mean Sha, Si-Qing Zheng. Fast and noniterative scheduling in input-queued switches: Supporting QoS |
847 | -- | 857 | Byungseung Kim, Hyogon Kim, Saewoong Bahk. FDF: Frequency detection-based filtering of scanning worms |
858 | -- | 866 | Rachid Hadid, Mehmet Hakan Karaata. An adaptive stabilizing algorithm for finding all disjoint paths in anonymous mesh networks |
867 | -- | 879 | Jacob Engel, Taskin Koçak. Off-chip communication architectures for high throughput network processors |
880 | -- | 887 | Yuhong Zhang, Ezzatollah Salari. A hybrid channel allocation algorithm with priority to handoff calls in mobile cellular networks |
888 | -- | 895 | Ioannis Psaras, Vassilis Tsaoussidis. On the properties of an adaptive TCP Minimum RTO |
896 | -- | 906 | Giuseppe Amato, Antonio Caruso, Stefano Chessa. Application-driven, energy-efficient communication in wireless sensor networks |
907 | -- | 912 | Bazil Taha Ahmed, Miguel Calvo-Ramón. Uplink multiservice capacity and interference statistics of WCDMA macrocells with antenna diversity reception in a multipath fading environment |
913 | -- | 926 | Li Tang, Jun Li, Yanda Li, Scott Shenker. An investigation of the Internet s IP-layer connectivity |
927 | -- | 934 | Zhi-Ting Lin, Yugui Qu, Xiao-Fang Zhou, Baohua Zhao. Analysis and design of mobile Wireless Social Model |
935 | -- | 942 | Shih-Wei Pan, Jung-Shyr Wu. Throughput analysis of IEEE 802.11e EDCA under heterogeneous traffic |
943 | -- | 953 | Shenghai Liu, Suili Feng, Wu Ye, Hongcheng Zhuang. Slot allocation algorithms in centralized scheduling scheme for IEEE 802.16 based wireless mesh networks |
954 | -- | 960 | Zhong Fan. Bandwidth allocation in UWB WPANs with ECMA-368 MAC |
961 | -- | 973 | Dheeraj K. Klair, Kwan-Wu Chin, Raad Raad. On the energy consumption of Pure and Slotted Aloha based RFID anti-collision protocols |
974 | -- | 984 | Xiaowen Zhang, Hao Zhu, Jinsong Zhang. RANC: Relay-aided network coding in multi-hop wireless networks |
985 | -- | 991 | Marzieh Varposhti, Naser Movahhedinia. Supporting QoS in IEEE 802.11e wireless LANs over fading channel |
992 | -- | 999 | Seokhee Lee, JongWon Kim. Transparency analysis and delay compensation scheme for haptic-based networked virtual environments |
1000 | -- | 1005 | Xingwei Wang, Lei Guo, Cunqian Yu, Dong Wang, Weigang Hou, Ying Li, Chongshan Wang, Xin Liu. A new heuristic protection algorithm based on survivable integrated auxiliary graph in waveband switching optical networks |
1006 | -- | 1013 | Sascha Rehbock, Ray Hunt. Trustworthy clients: Extending TNC to web-based environments |