Journal: J. Network and Computer Applications

Volume 34, Issue 6

1771 -- 1772Jiming Chen, David K. Y. Yau. Control and optimization over wireless networks
1773 -- 1783Ning Weng, I.-Hung Li, Lucas Vespa. Information quality model and optimization for 802.15.4-based wireless sensor networks
1784 -- 1793Rabun Kosar, Ilir Bojaxhiu, Ertan Onur, Cem Ersoy. Lifetime extension for surveillance wireless sensor networks with intelligent redeployment
1794 -- 1804Wahabou Abdou, Adrien Henriet, Christelle Bloch, Dominique Dhoutaut, Damien Charlet, François Spies. Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc networks
1805 -- 1817Dang Tu Nguyen, Wook Choi, Minh Thiep Ha, Hyunseung Choo. Design and analysis of a multi-candidate selection scheme for greedy routing in wireless sensor networks
1818 -- 1826Wenjia Liu, Bo Chen. Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks
1827 -- 1835Qing Chen, Zubair Md. Fadlullah, Xiaodong Lin, Nei Kato. A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
1836 -- 1847Bader Al-Manthari, Nidal Nasser, Najah A. Abu Ali, Hossam S. Hassanein. Congestion prevention in broadband wireless access systems: An economic approach
1848 -- 1860Jihoon Ryoo, Hwangnam Kim. Multi-sector multi-range control for self-organizing wireless networks
1861 -- 1868Zhaoming Lu, Yan Yang, Xiangming Wen, Ying Ju, Wei Zheng. A cross-layer resource allocation scheme for ICIC in LTE-Advanced
1869 -- 1882Mohsen Jahanshahi, Mehdi Dehghan, Mohammad Reza Meybodi. A mathematical formulation for joint channel assignment and multicast routing in multi-channel multi-radio wireless mesh networks
1883 -- 1893Juan Rodríguez-Covili, Sergio F. Ochoa, José A. Pino, Roc Messeguer, Esunly Medina, Dolors Royo. A communication infrastructure to ease the development of mobile collaborative applications
1894 -- 1902Bin Li, Zheng Zhou, Dejian Li, Weixia Zou. A novel Parzen probabilistic neural network based noncoherent detection algorithm for distributed ultra-wideband sensors
1903 -- 1907Kyusuk Han, Youngjoon Seo, Sungjune Yoon, James J. Park, Taeshik Shon. Providing security vertical handoff in SARAH for heterogeneous networks
1908 -- 1927Muhammad Ayaz, Imran Baig, Azween Abdullah, Ibrahima Faye. A survey on routing techniques in underwater wireless sensor networks
1928 -- 1941Sarogini Grace Pease, Lin Guan, Iain W. Phillips, Alan Grigg. Cross-layer signalling and middleware: A survey for inelastic soft real-time applications in MANETs
1942 -- 1955David Antolino Rivas, José M. Barceló-Ordinas, Manel Guerrero Zapata, Julián David Morillo-Pozo. Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation
1956 -- 1970Muhammad Azhar Iqbal, Bin Dai, Benxiong Huang, A. Hassan, Shui Yu. Survey of network coding-aware routing protocols in wireless networks
1971 -- 1978Mohamed Bakhouya, Jaafar Gaber, Pascal Lorenz. An adaptive approach for information dissemination in Vehicular Ad hoc Networks
1979 -- 1989Lu Leng, Jiashu Zhang. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
1990 -- 1996Jeremiah D. Deng, Martin K. Purvis. Multi-core application performance optimization using a constrained tandem queueing model
1997 -- 2010Pedro M. Wightman, Miguel A. Labrador. A family of simple distributed minimum connected dominating set-based topology construction algorithms
2011 -- 2026Sanjay Kumar Biswash, Chiranjeev Kumar. An efficient metric-based (EM-B) location management scheme for wireless cellular networks
2027 -- 2041Tzu-Chi Huang, Kuo-Chih Chu. Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network
2042 -- 2050Maziar Ahmad Sharbafi, Mohammad Javad Yazdanpanah. IDFC: A new approach to control bifurcation in TCP/RED

Volume 34, Issue 5

1447 -- 1448Han-Chieh Chao, Jean-Pierre Seifert, Shiguo Lian, Liang Zhou. Dependable multimedia communications: Systems, services, and applications
1449 -- 1458Rongbo Zhu. Intelligent rate control for supporting real-time traffic in WLAN mesh networks
1459 -- 1467Po-Yi Shih, Po-Chuan Lin, Jhing-Fa Wang, Yuan-Ning Lin. Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification
1468 -- 1473Der-Jiunn Deng. PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks
1474 -- 1488Philip Leroux, Steven Latré, Nicolas Staelens, Piet Demeester, Filip De Turck. Mobile TV services through IP Datacast over DVB-H: Dependability of the quality of experience on the IP-based distribution network quality of service
1489 -- 1497Wen Ji, Min Chen, Xiaohu Ge, Peng Li, Yiqiang Chen. A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle
1498 -- 1508Sanjay Kumar Dhurandher, Sudip Misra, Puneet Pruthi, Shubham Singhal, Saurabh Aggarwal, Isaac Woungang. Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks
1509 -- 1517I-Ju Liao, Tin Yu Wu, Jen-Wen Ding, Wei-Tsong Lee. A novel 3D streaming protocol supported multi-mode display
1518 -- 1529Rashid Mehmood, Raad Alturki, Sherali Zeadally. Multimedia applications over metropolitan area networks (MANs)
1530 -- 1544Sudip Misra, Ankur Jain. Policy controlled self-configuration in unattended wireless sensor networks
1545 -- 1556Chia-Hui Wang, Yu-Shun Liu. A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
1557 -- 1565Guangjie Liu, Junwen Wang, Shiguo Lian, Zhiquan Wang. A passive image authentication scheme for detecting region-duplication forgery with rotation
1566 -- 1571Yeong-Sheng Chen, Yuan-Wei Lee, Jong Hyuk Park. Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks
1572 -- 1586Kevin J. Ma, Radim Bartos, Swapnil Bhatia. A survey of schemes for Internet-based video delivery
1587 -- 1614Neyre Tekbiyik, Elif Uysal-Biyikoglu. Energy efficient wireless unicast routing alternatives for machine-to-machine networks
1615 -- 1622Ching-Hao Mao, Hahn-Ming Lee, Che-Fu Yeh. Adaptive e-mails intention finding system based on words social networks
1623 -- 1633Jun Yang, Bin Dai, Benxiong Huang, Shui Yu. Orthogonal feedback scheme for network coding
1634 -- 1647Jordán Pascual Espada, Oscar Sanjuán Martínez, Juan Manuel Cueva Lovelle, B. Cristina Pelayo García-Bustelo, Manuel Álvarez Álvarez, Alejandro González García. Modeling architecture for collaborative virtual objects based on services
1648 -- 1659Ting Chen, Xiaosong Zhang, Hua Li, Xiong-da Li, Yue Wu. Fast quarantining of proactive worms in unstructured P2P networks
1660 -- 1670Anindya Tahsin Prodhan, Rajkumar Das, Humayun Kabir, Gholamali C. Shoja. TTL based routing in opportunistic networks
1671 -- 1682Imad Jawhar, Nader Mohamed, Dharma P. Agrawal. Linear wireless sensor networks: Classification and applications
1683 -- 1694Stenio F. L. Fernandes, Judith Kelner, Djamel Sadok. An adaptive-predictive architecture for video streaming servers
1695 -- 1706Liqiang Zhang, Yu-Jen Cheng, Xiaobo Zhou. Enhanced statistics-based rate adaptation for 802.11 wireless networks
1707 -- 1716Martin Kuehnhausen, Victor S. Frost. Application of the Java Message Service in mobile monitoring environments
1717 -- 1723Zac Sadan, David G. Schwartz. Social network analysis of web links to eliminate false positives in collaborative anti-spam systems
1724 -- 1731Chien-Lung Hsu, Han-Yu Lin. New identity-based key-insulated convertible multi-authenticated encryption scheme
1732 -- 1742Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang, Qiuzhen Huang. Monitoring abnormal network traffic based on blind source separation approach
1743 -- 1756Hwa-Chun Ma, Prasan Kumar Sahoo, Yen-Wen Chen. Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks
1757 -- 1770Wenjia Niu, Gang Li, Hui Tang, Xu Zhou, Zhongzhi Shi. CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition

Volume 34, Issue 4

1033 -- 1034Keqiu Li, Laurence Tianruo Yang, Xuemin Lin. Advanced topics in cloud computing
1035 -- 1042Gang Chen, Yongwei Wu, Jia Liu, Guangwen Yang, Weimin Zheng. Optimization of sub-query processing in distributed data integration systems
1043 -- 1053ZhangBing Zhou, Laurence Tianruo Yang, Sami Bhiri, Lei Shu, Naixue Xiong, Manfred Hauswirth. Verifying mediated service interactions considering expected behaviours
1054 -- 1067Yuqing Zhu, Jianmin Wang 0001, Chaokun Wang. Ripple: A publish/subscribe service for multidata item updates propagation in the cloud
1068 -- 1077Xiangzhen Kong, Chuang Lin, Yixin Jiang, Wei Yan, Xiaowen Chu. Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction
1078 -- 1087Weidong Shi, Yang Lu, Zhu Li, Jonathan Engelsma. SHARC: A scalable 3D graphics virtual appliance delivery framework in cloud
1088 -- 1096Hai Jin, Wei Gao, Song Wu, Xuanhua Shi, Xiaoxin Wu, Fan Zhou. Optimizing the live migration of virtual machine by CPU scheduling
1097 -- 1107Ashley Chonka, Yang Xiang, Wanlei Zhou, Alessio Bonti. Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
1108 -- 1112Yanming Shen, Keqiu Li, Junfeng Xu, Lu Li. Layered video multicast with a P2P cooperation approach
1113 -- 1122Flavio Lombardi, Roberto Di Pietro. Secure virtualization for cloud computing
1123 -- 1130Fouzi Semchedine, Louiza Bouallouche-Medjkoune, Djamil Aïssani. Task assignment policies in distributed server systems: A survey
1131 -- 1137Tien-Ho Chen, Yen-Chiu Chen, Wei Kuan Shih, Hsin-Wen Wei. An efficient anonymous authentication protocol for mobile pay-TV
1138 -- 1149Jian Wang, Yanheng Liu, Yu Jiao. Building a trusted route in a mobile ad hoc network considering communication reliability and path length
1150 -- 1159Jiankun Hu, Ibrahim Khalil, S. Han, A. Mahmood. Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy
1168 -- 1183David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piattini. Systematic design of secure Mobile Grid systems
1184 -- 1199Fatemeh Amiri, Mohammad Mahdi Rezaei Yousefi, Caro Lucas, Azadeh Shakery, Nasser Yazdani. Mutual information-based feature selection for intrusion detection systems
1200 -- 1209Rafael Duque, Crescencio Bravo, Manuel Ortega. A model-based framework to automate the analysis of users activity in collaborative systems
1210 -- 1224Meirong Liu, Timo Koskela, Zhonghong Ou, Jiehan Zhou, Jukka Riekki, Mika Ylianttila. Super-peer-based coordinated service provision
1225 -- 1239Jaime Chen, Manuel Díaz, Luis Llopis, Bartolomé Rubio, José M. Troya. A survey on quality of service support in wireless sensor and actor networks: Requirements and challenges in the context of critical infrastructure protection
1252 -- 1262Sheikh Tahir Bakhsh, Halabi Hasbullah, Sabeen Tahir. Dynamic Congestion Control through backup relay in Bluetooth scatternet
1263 -- 1271Xingwei Liu, Xuming Fang, Xu Chen, Xuesong Peng. A bidding model and cooperative game-based vertical handoff decision algorithm
1272 -- 1282Qi Lu, Maode Ma. Group mobility support in mobile WiMAX networks
1283 -- 1291Jesús Ibáñez. Minimalist approach to show emotions via a flock of smileys
1292 -- 1301Chun-Ying Huang, Shang-Pin Ma, Kuan-Ta Chen. Using one-time passwords to prevent password phishing attacks
1302 -- 1325Miao Xie, Song Han, Biming Tian, Sazia Parvin. Anomaly detection in wireless sensor networks: A survey
1326 -- 1341Sinan Senol, Kemal Leblebicioglu, Ece G. Schmidt. INtERCEDE: An algorithmic approach to networked control system design
1342 -- 1352Rafael Teigao, Carlos Maziero, Altair Olivo Santin. Applying a usage control model in an operating system kernel
1353 -- 1365Songtao Guo, Chuangyin Dang, Xiaofeng Liao. Joint opportunistic power and rate allocation for wireless ad hoc networks: An adaptive particle swarm optimization approach
1366 -- 1379Justin Dean, Andrew Harrison, Robert N. Lass, Joseph Macker, David Millar, Ian Taylor. Client/server messaging protocols in serverless environments
1380 -- 1397Yacine Challal, Abdelraouf Ouadjaout, Noureddine Lasla, Miloud Bagaa, Abdelkrim Hadjidj. Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks
1398 -- 1407Wenfeng Li, Weiming Shen. Swarm behavior control of mobile multi-robots with wireless sensor networks
1408 -- 1415R. O. Ocaya. A framework for collaborative remote experimentation for a physical laboratory using a low cost embedded web server
1416 -- 1428Wenjun Xu, Zude Zhou, D. T. Pham, C. Ji, Ming Yang, Quan Liu. Hybrid congestion control for high-speed networks
1429 -- 1440Javad Akbari Torkestani, Mohammad Reza Meybodi. A link stability-based multicast routing protocol for wireless mobile ad hoc networks
1441 -- 1446André Vicente Calvinho, Rui Gustavo Crespo. Email FI identification and resolution with model checking

Volume 34, Issue 3

797 -- 798Quan Z. Sheng, Sherali Zeadally, Aikaterini Mitrokotsa, Zakaria Maamar. RFID technology, systems, and applications
799 -- 810Wen Yao, Chao-Hsien Chu, Zang Li. Leveraging complex event processing for smart hospitals using RFID
811 -- 820Yi-Wei Ma, Han-Chieh Chao, Jiann-Liang Chen, Cheng-Yen Wu. Load-balancing mechanism for the RFID middleware applications over grid networking
821 -- 832Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo. Probabilistic DCS: An RFID reader-to-reader anti-collision protocol
833 -- 845Pedro Peris-Lopez, Agustín Orfila, Julio C. Hernandez-Castro, Jan C. A. van der Lubbe. Flaws on RFID grouping-proofs. Guidelines for future sound protocols
846 -- 852Francesco Rizzo, Marcello Barboni, Lorenzo Faggion, Graziano Azzalin, Marco Sironi. Improved security for commercial container transports using an innovative active RFID system
853 -- 863Roberto Di Pietro, Refik Molva. An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
864 -- 876M. Victoria Bueno-Delgado, Javier Vales-Alonso. On the optimal frame-length configuration on real passive RFID systems
877 -- 887Gerhard P. Hancke. Design of a secure distance-bounding channel for RFID
888 -- 901Hanning Chen, Yunlong Zhu, Kunyuan Hu, Tao Ku. RFID network planning using a multi-swarm optimizer
902 -- 913Apostolia Papapostolou, Hakima Chaouchi. RFID-assisted indoor localization and the impact of interference on its performance
914 -- 924Wei-Shinn Ku, Kazuya Sakai, Min-Te Sun. The optimal k-covering tag deployment for RFID-based localization
925 -- 937Pilar Manzanares-Lopez, Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Juan Carlos Sanchez-Aarnoutse. An efficient distributed discovery service for EPCglobal network in nested package scenarios
938 -- 948Huanjia Yang, Lili Yang, Shuang-Hua Yang. Hybrid Zigbee RFID sensor network for humanitarian logistics centre management
949 -- 957Worapot Jakkhupan, Somjit Arch-int, Yuefeng Li. Business process analysis and simulation for the RFID and EPCglobal Network enabled supply chain: A proof-of-concept approach
958 -- 971Taewoo Nam, Keunhyuk Yeom. Business-aware framework for supporting RFID-enabled applications in EPC Network
972 -- 979Leonardo A. Amaral, Fabiano Hessel, Eduardo Bezerra, Jerônimo C. Corrêa, Oliver B. Longhi, Thiago F. O. Dias. eCloudRFID - A mobile software framework architecture for pervasive RFID-based applications
980 -- 989Pablo Najera, Javier Lopez, Rodrigo Roman. Real-time location and inpatient care systems based on passive RFID
990 -- 997Chuong Cong Vo, Naveen Chilamkurti, Seng Wai Loke, Torab Torabi. Radio-Mama: An RFID based business process framework for asset management
998 -- 1014Maria Chaudhry, Ali Hammad Akbar, Qanita Ahmad, Imran Sarwar. SOARware: Treading through the crossroads of RFID middleware and SOA paradigm
1015 -- 1031Damith Chinthana Ranasinghe, Mark Harrison, Kary Främling, Duncan C. McFarlane. Enabling through life product-instance management: Solutions and challenges

Volume 34, Issue 2

429 -- 431Jonathan Loo. Special issue on: Efficient and robust security and services of wireless mesh networks
432 -- 442Frank A. Zdarsky, Sebastian Robitzsch, Albert Banchs. Security analysis of wireless mesh backhauls for mobile networks
443 -- 454Shanshan Jiang, Yuan Xue. Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks
455 -- 463Zorana Bankovic, David Fraga, José Manuel Moya, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, Juan-Mariano de Goyeneche, Elena Romero, Javier Blesa, Daniel Villanueva, Octavio Nieto-Taladriz. Improving security in WMNs with reputation systems and self-organizing maps
464 -- 468Ching-Fang Hsu, Guohua Cui, Qi Cheng, Jing Chen. A novel linear multi-secret sharing scheme for group communication in wireless mesh networks
469 -- 477Yiliang Han, Xiaolin Gui, Xuguang Wu, Xiaoyuan Yang. Proxy encryption based secure multicast in wireless mesh networks
478 -- 491Okechukwu E. Muogilim, Kok-Keong Loo, Richard Comley. Wireless mesh network security: A traffic engineering management approach
492 -- 505Raquel Lacuesta Gilaberte, Jaime Lloret, Miguel Garcia, Lourdes Peñalver Herrero. Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
506 -- 516Rafael Lopes Gomes, Waldir Moreira Junior, Eduardo Cerqueira, Antonio Jorge Gomes Abelém. Using fuzzy link cost and dynamic choice of link quality metrics to achieve QoS and QoE in wireless mesh networks
523 -- 534Lucas D. P. Mendes, Joel J. P. C. Rodrigues. A survey on cross-layer solutions for wireless sensor networks
535 -- 541Tingting Chen, Ankur Bansal, Sheng Zhong. A reputation system for wireless mesh networks using network coding
542 -- 550Pere Montolio-Aranda, Joaquín García-Alfaro, David Megías. Improved flooding of broadcast messages using extended multipoint relaying
551 -- 561Ta Nguyen Binh Duong, Suiping Zhou, Wentong Cai, Xueyan Tang, Rassul Ayani. Multi-objective zone mapping in large-scale distributed virtual environments
562 -- 574Niels Sluijs, Frédéric Iterbeke, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester. Cooperative caching versus proactive replication for location dependent request patterns
575 -- 580Mohammad Bsoul, Ahmad Al-Khasawneh, Emad Eddien Abdallah, Yousef Kilani. Enhanced Fast Spread Replication strategy for Data Grid
581 -- 588Xiaohong Huang, Maode Ma. A heuristic adaptive QoS prediction scheme in single-hop passive star coupled WDM optical networks
589 -- 602Cynthia Villalba, Franco Zambonelli. Towards nature-inspired pervasive service ecosystems: Concepts and simulation experiences
603 -- 608Jianyong Chen, Huawang Zeng, Cunying Hu, Zhen Ji. Optimization between security and delay of quality-of-service
609 -- 618Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh. A secure dynamic identity based authentication protocol for multi-server architecture
619 -- 631Hai Dong, Farookh Khadeer Hussain, Elizabeth Chang. A service concept recommendation system for enhancing the dependability of semantic service matchmakers in the service ecosystem environment
632 -- 643Fang-Yie Leu, Ilsun You, Yao-Tian Huang. A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks
644 -- 652Mohamed Saad. Joint admission and power control for quality-of-service in the wireless downlink
653 -- 667Qi Shi, N. Zhang, Madjid Merabti, Robert Askwith. Achieving autonomous fair exchange in ubiquitous network settings
668 -- 685Anabela Moreira Bernardino, Eugénia Moreira Bernardino, Juan Manuel Sánchez-Pérez, Juan Antonio Gómez Pulido, Miguel Ángel Vega Rodríguez. Solving ring loading problems using bio-inspired algorithms
686 -- 691Zoran Milicevic, Zoran Bojkovic. H.264/AVC standard: A proposal for selective intra- and optimized inter-prediction
692 -- 696Yebin Chen, Ying Li, Jiankun Wang. On the wide diameter of directed double-loop networks
697 -- 707Fatna Belqasmi, Roch H. Glitho, Rachida Dssouli. An overlay network for autonomous information discovery in the post-composition registries of ambient networks
708 -- 714Huo Zhihong, Zheng Yuan, Xu Chang. A robust fault-tolerant control strategy for networked control systems
715 -- 721Yusuf Sani, Mohamed Othman. A provision-aware fair bandwidth distribution marker algorithm for DiffServ networks
722 -- 730Ming-Yang Su. Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification
731 -- 738Naser Movahhedinia, Behrouz Shahgholi Ghahfarokhi. Performance analysis of Bluetooth asynchronous connection-less service
739 -- 749ChunLin Li, Layuan Li. Two-level market solution for services composition optimization in mobile grid
750 -- 764Li Yu, Maode Ma, Weidong Hu, Zibo Shi, Yantai Shu. Design of parameter tunable robust controller for active queue management based on H::∞:: control theory
765 -- 773Jinchang Lu, Maode Ma. Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system
774 -- 782Li Chunlin, Li Layuan. Context aware service provisioning in mobile grid
783 -- 795CongDuc Pham, Abdallah Makhoul, Rachid Saadi. Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications

Volume 34, Issue 1

1 -- 11S. Subashini, V. Kavitha. A survey on security issues in service delivery models of cloud computing
12 -- 19Dai-Rui Lin, Chih-I Wang, D. J. Guan. Efficient vehicle ownership identification scheme based on triple-trapdoor chameleon hash function
20 -- 29Sireesha Muppala, Xiaobo Zhou. Coordinated session-based admission control with statistical learning for multi-tier internet applications
30 -- 38Neeraj Kumar, Manoj Kumar, R. B. Patel. Capacity and interference aware link scheduling with channel assignment in wireless mesh networks
39 -- 51Marcela M. Mejia, Néstor M. Peña, Jose L. Muñoz, Oscar Esparza, Marco A. Alzate. A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
52 -- 61Sanaa Sharafeddine, Rakan Maddah. A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
62 -- 72Sanaa Sharafeddine. Capacity assignment in multiservice packet networks with soft maximum waiting time guarantees
73 -- 79Xiong Li, Jianwei Niu, Jian Ma, Wendong Wang, Cheng-Lian Liu. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
80 -- 88Biming Tian, Song Han, Jiankun Hu, Tharam S. Dillon. A mutual-healing key distribution scheme in wireless sensor networks
89 -- 101Christos Bouras, Eri Giannaka, Thrasyvoulos Tsiatsos. A dynamic management scheme for DVEs
102 -- 115Hyuck Han, Hyungsoo Jung, Hyeonsang Eom, Heon Young Yeom. An efficient skyline framework for matchmaking applications
116 -- 120Song Wang, Jinli Cao, Jiankun Hu. A frequency domain subspace blind channel estimation method for trailing zero OFDM systems
121 -- 136Chih-Lin Hu, Chien-An Cho. User-provided multimedia content distribution architecture in mobile and ubiquitous communication networks
137 -- 150Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar. Peer-to-peer multipoint video conferencing with layered video
151 -- 158Joel J. P. C. Rodrigues, Orlando R. E. Pereira, Paulo A. C. S. Neves. Biofeedback data visualization for body sensor networks
159 -- 171Atif Bin Mansoor, Hassan Masood, Mustafa Mumtaz, Shoab A. Khan. A feature level multimodal approach for palmprint identification using directional subband energies
172 -- 182Mingyu Lim, Bart Kevelham, Niels A. Nijdam, Nadia Magnenat-Thalmann. Rapid development of distributed applications using high-level communication support
183 -- 193Xiaohong Huang, Maode Ma. A performance model for differentiated service over single-hop passive star coupled WDM optical networks
194 -- 206Aristides Mpitziopoulos, Charalampos Konstantopoulos, Damianos Gavalas, Grammati E. Pantziou. A pervasive assistive environment for visually impaired people using wireless sensor network infrastructure
207 -- 222Ameneh Daeinabi, Akbar Ghaffar Pour Rahbar, Ahmad Khademzadeh. VWCA: An efficient clustering algorithm in vehicular ad hoc networks
223 -- 231Pejman Goudarzi. Improving rate allocation for ephemeral traffic using a second-order algorithm
232 -- 251Tzu-Chi Huang. Universal connection architecture for interactive applications to achieve distributed computing
252 -- 261Song Fu, Cheng-Zhong Xu, Haiying Shen. Randomized load balancing strategies with churn resilience in peer-to-peer networks
262 -- 267Bo Zhang, Fangguo Zhang. An efficient public key encryption with conjunctive-subset keywords search
268 -- 281Jesús Ibáñez, Carlos Delgado-Mata. Lessons from research on interaction with virtual environments
282 -- 293Fahim Sufi, Ibrahim Khalil. Faster person identification using compressed ECG in time critical wireless telecardiology applications
294 -- 311Antonio Ruiz-Martínez, Juan Sánchez-Montesinos, Daniel Sánchez-Martínez. A mobile network operator-independent mobile signature service
312 -- 326Wenjia Niu, Gang Li, Zhijun Zhao, Hui Tang, Zhongzhi Shi. Multi-granularity context model for dynamic Web service composition
327 -- 340Hadi Goudarzi, Amir Hesam Salavati, Mohammad Reza Pakravan. An ant-based rate allocation algorithm for media streaming in peer to peer networks: Extension to multiple sessions and dynamic networks
341 -- 350Marc Liberatore, Bikas Gurung, Brian Neil Levine, Matthew K. Wright. Empirical tests of anonymous voice over IP
351 -- 367Patrik Moravek, Dan Komosny, Radim Bürget, Jaroslav Sveda, Tomas Handl, Lucie Jarosova. Study and performance of localization methods in IP based networks: Vivaldi algorithm
368 -- 383Enrique Costa-Montenegro, Juan C. Burguillo-Rial, Felipe J. Gil-Castiñeira, Francisco J. González-Castaño. Implementation and analysis of the BitTorrent protocol with a multi-agent model
384 -- 393Elisavet Konstantinou. Efficient cluster-based group key agreement protocols for wireless ad hoc networks
402 -- 417Prajakta Kulkarni, Yusuf Öztürk. mPHASiS: Mobile patient healthcare and sensor information system
418 -- 428William Claycomb, Dongwan Shin. A novel node level security policy framework for wireless sensor networks