403 | -- | 404 | Isaac Woungang. Special Issue On: Telecommunications Software Engineering: Emerging Methods, Models and Tools |
405 | -- | 420 | Majid Veyseh, Alagan Anpalagan, Bobby Ma. Adaptive channel and superframe allocation (ACSA) for 60 GHz wireless networks |
421 | -- | 442 | Zhiwei Yan, Huachun Zhou, Hwang-Cheng Wang, Hongke Zhang, Sidong Zhang. Design and implementation of a hybrid MIPv6/PMIPv6-based mobility management architecture |
443 | -- | 457 | Hao-Ming Liang, Ce-Kuen Shieh, Tzu-Chi Huang, Wen-Shyang Hwang, Chih-Heng Ke. The density based access method: A novel approach to optimizing run-time throughput for IEEE 802.11 DCF access control |
458 | -- | 470 | Yajun Li, Liang Zhou, Yuhang Yang, Han-Chieh Chao. Optimization architecture for joint multi-path routing and scheduling in wireless mesh networks |
471 | -- | 484 | Stéphane Lecomte, Samuel Guillouard, Christophe Moy, Pierre Leray, Philippe Soulard. A co-design methodology based on model driven architecture for real time embedded systems |
485 | -- | 503 | José-Fernán Martínez, Miguel S. Familiar, Iván Corredor, Ana Belén García, Sury Bravo, Lourdes López. Composition and deployment of e-Health services over Wireless Sensor Networks |
504 | -- | 521 | Subhas Chandra Misra, Arka Mondal. Identification of a company s suitability for the adoption of cloud computing and modelling its corresponding Return on Investment |
522 | -- | 537 | Alexander M. Hoole, Issa Traoré, Isabelle Simplot-Ryl. Application of contract-based security assertion monitoring framework for telecommunications software engineering |
538 | -- | 551 | Qiang Ye, Mike H. MacGregor. Using simulation to test formally verified protocols in complex environments |