| 783 | -- | 786 | Jia-Lun Tsai. Convertible multi-authenticated encryption scheme with one-way hash function |
| 787 | -- | 799 | Ali A. Kanso. Modified clock-controlled alternating step generators |
| 800 | -- | 805 | Lei Ye, Zhijun Wang, Hao Che, Henry C. B. Chan, Constantino M. Lagoa. Utility function of TCP |
| 806 | -- | 813 | Rashid A. Saeed, Hafizal Mohamad, Borhanuddin Mohd Ali. Dynamic hybrid automatic repeat request (DHARQ) for WiMAX - Mobile multihop relay using adaptive power control |
| 814 | -- | 827 | Nikolaos D. Doulamis, Pantelis N. Karamolegkos, Anastasios D. Doulamis, Ioannis G. Nikolakopoulos. Exploiting semantic proximities for content search over p2p networks |
| 828 | -- | 833 | Bazil Taha Ahmed, Miguel Calvo-Ramón. UMTS-HSDPA in High Altitude Platforms (HAPs) communications with finite transmitted power and unequal cell s load |
| 834 | -- | 846 | Kevin F. Chen, Edwin Hsing-Mean Sha, Si-Qing Zheng. Fast and noniterative scheduling in input-queued switches: Supporting QoS |
| 847 | -- | 857 | Byungseung Kim, Hyogon Kim, Saewoong Bahk. FDF: Frequency detection-based filtering of scanning worms |
| 858 | -- | 866 | Rachid Hadid, Mehmet Hakan Karaata. An adaptive stabilizing algorithm for finding all disjoint paths in anonymous mesh networks |
| 867 | -- | 879 | Jacob Engel, Taskin Koçak. Off-chip communication architectures for high throughput network processors |
| 880 | -- | 887 | Yuhong Zhang, Ezzatollah Salari. A hybrid channel allocation algorithm with priority to handoff calls in mobile cellular networks |
| 888 | -- | 895 | Ioannis Psaras, Vassilis Tsaoussidis. On the properties of an adaptive TCP Minimum RTO |
| 896 | -- | 906 | Giuseppe Amato, Antonio Caruso, Stefano Chessa. Application-driven, energy-efficient communication in wireless sensor networks |
| 907 | -- | 912 | Bazil Taha Ahmed, Miguel Calvo-Ramón. Uplink multiservice capacity and interference statistics of WCDMA macrocells with antenna diversity reception in a multipath fading environment |
| 913 | -- | 926 | Li Tang, Jun Li, Yanda Li, Scott Shenker. An investigation of the Internet s IP-layer connectivity |
| 927 | -- | 934 | Zhi-Ting Lin, Yugui Qu, Xiao-Fang Zhou, Baohua Zhao. Analysis and design of mobile Wireless Social Model |
| 935 | -- | 942 | Shih-Wei Pan, Jung-Shyr Wu. Throughput analysis of IEEE 802.11e EDCA under heterogeneous traffic |
| 943 | -- | 953 | Shenghai Liu, Suili Feng, Wu Ye, Hongcheng Zhuang. Slot allocation algorithms in centralized scheduling scheme for IEEE 802.16 based wireless mesh networks |
| 954 | -- | 960 | Zhong Fan. Bandwidth allocation in UWB WPANs with ECMA-368 MAC |
| 961 | -- | 973 | Dheeraj K. Klair, Kwan-Wu Chin, Raad Raad. On the energy consumption of Pure and Slotted Aloha based RFID anti-collision protocols |
| 974 | -- | 984 | Xiaowen Zhang, Hao Zhu, Jinsong Zhang. RANC: Relay-aided network coding in multi-hop wireless networks |
| 985 | -- | 991 | Marzieh Varposhti, Naser Movahhedinia. Supporting QoS in IEEE 802.11e wireless LANs over fading channel |
| 992 | -- | 999 | Seokhee Lee, JongWon Kim. Transparency analysis and delay compensation scheme for haptic-based networked virtual environments |
| 1000 | -- | 1005 | Xingwei Wang, Lei Guo, Cunqian Yu, Dong Wang, Weigang Hou, Ying Li, Chongshan Wang, Xin Liu. A new heuristic protection algorithm based on survivable integrated auxiliary graph in waveband switching optical networks |
| 1006 | -- | 1013 | Sascha Rehbock, Ray Hunt. Trustworthy clients: Extending TNC to web-based environments |