1447 | -- | 1448 | Han-Chieh Chao, Jean-Pierre Seifert, Shiguo Lian, Liang Zhou. Dependable multimedia communications: Systems, services, and applications |
1449 | -- | 1458 | Rongbo Zhu. Intelligent rate control for supporting real-time traffic in WLAN mesh networks |
1459 | -- | 1467 | Po-Yi Shih, Po-Chuan Lin, Jhing-Fa Wang, Yuan-Ning Lin. Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification |
1468 | -- | 1473 | Der-Jiunn Deng. PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks |
1474 | -- | 1488 | Philip Leroux, Steven Latré, Nicolas Staelens, Piet Demeester, Filip De Turck. Mobile TV services through IP Datacast over DVB-H: Dependability of the quality of experience on the IP-based distribution network quality of service |
1489 | -- | 1497 | Wen Ji, Min Chen, Xiaohu Ge, Peng Li, Yiqiang Chen. A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle |
1498 | -- | 1508 | Sanjay Kumar Dhurandher, Sudip Misra, Puneet Pruthi, Shubham Singhal, Saurabh Aggarwal, Isaac Woungang. Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks |
1509 | -- | 1517 | I-Ju Liao, Tin Yu Wu, Jen-Wen Ding, Wei-Tsong Lee. A novel 3D streaming protocol supported multi-mode display |
1518 | -- | 1529 | Rashid Mehmood, Raad Alturki, Sherali Zeadally. Multimedia applications over metropolitan area networks (MANs) |
1530 | -- | 1544 | Sudip Misra, Ankur Jain. Policy controlled self-configuration in unattended wireless sensor networks |
1545 | -- | 1556 | Chia-Hui Wang, Yu-Shun Liu. A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes |
1557 | -- | 1565 | Guangjie Liu, Junwen Wang, Shiguo Lian, Zhiquan Wang. A passive image authentication scheme for detecting region-duplication forgery with rotation |
1566 | -- | 1571 | Yeong-Sheng Chen, Yuan-Wei Lee, Jong Hyuk Park. Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks |
1572 | -- | 1586 | Kevin J. Ma, Radim Bartos, Swapnil Bhatia. A survey of schemes for Internet-based video delivery |
1587 | -- | 1614 | Neyre Tekbiyik, Elif Uysal-Biyikoglu. Energy efficient wireless unicast routing alternatives for machine-to-machine networks |
1615 | -- | 1622 | Ching-Hao Mao, Hahn-Ming Lee, Che-Fu Yeh. Adaptive e-mails intention finding system based on words social networks |
1623 | -- | 1633 | Jun Yang, Bin Dai, Benxiong Huang, Shui Yu. Orthogonal feedback scheme for network coding |
1634 | -- | 1647 | Jordán Pascual Espada, Oscar Sanjuán Martínez, Juan Manuel Cueva Lovelle, B. Cristina Pelayo García-Bustelo, Manuel Álvarez Álvarez, Alejandro González García. Modeling architecture for collaborative virtual objects based on services |
1648 | -- | 1659 | Ting Chen, Xiaosong Zhang, Hua Li, Xiong-da Li, Yue Wu. Fast quarantining of proactive worms in unstructured P2P networks |
1660 | -- | 1670 | Anindya Tahsin Prodhan, Rajkumar Das, Humayun Kabir, Gholamali C. Shoja. TTL based routing in opportunistic networks |
1671 | -- | 1682 | Imad Jawhar, Nader Mohamed, Dharma P. Agrawal. Linear wireless sensor networks: Classification and applications |
1683 | -- | 1694 | Stenio F. L. Fernandes, Judith Kelner, Djamel Sadok. An adaptive-predictive architecture for video streaming servers |
1695 | -- | 1706 | Liqiang Zhang, Yu-Jen Cheng, Xiaobo Zhou. Enhanced statistics-based rate adaptation for 802.11 wireless networks |
1707 | -- | 1716 | Martin Kuehnhausen, Victor S. Frost. Application of the Java Message Service in mobile monitoring environments |
1717 | -- | 1723 | Zac Sadan, David G. Schwartz. Social network analysis of web links to eliminate false positives in collaborative anti-spam systems |
1724 | -- | 1731 | Chien-Lung Hsu, Han-Yu Lin. New identity-based key-insulated convertible multi-authenticated encryption scheme |
1732 | -- | 1742 | Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang, Qiuzhen Huang. Monitoring abnormal network traffic based on blind source separation approach |
1743 | -- | 1756 | Hwa-Chun Ma, Prasan Kumar Sahoo, Yen-Wen Chen. Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks |
1757 | -- | 1770 | Wenjia Niu, Gang Li, Hui Tang, Xu Zhou, Zhongzhi Shi. CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition |