Abstract is missing.
- A multipattern matching algorithm using sampling and bit indexJinhui Chen, Zhongfu Ye, Min Tang. 1-8 [doi]
- Solving MEC model of haplotype reconstruction using information fusion, single greedy and parallel clustering approachesEhsan Asgarian, M-Hossein Moeinzadeh, Sara Sharifian-R, Amir Najafi-A, Amin Ramezani, Jafar Habibi, Javad Mohammadzadeh. 15-19 [doi]
- Methodology for evaluating string matching algorithms on multiprocessorBenfano Soewito, Ning Weng. 20-27 [doi]
- RBT-I: A novel approach for solving the Multiple Sequence Alignment problemJavid Taheri, Albert Y. Zomaya, Bing Bing Zhou. 28-36 [doi]
- A framework for predicting proteins 3D structuresRehab Duwairi, Amal Kassawneh. 37-44 [doi]
- Comparison of population based metaheuristics for feature selection: Application to microarray data classificationEl-Ghazali Talbi, Laetitia Jourdan, José García-Nieto, Enrique Alba. 45-52 [doi]
- Transistor-level based defect tolerance for reliable nanoelectronicsAiman H. El-Maleh, Bashir M. Al-Hashimi, Aissa Melouki. 53-60 [doi]
- Proposing an efficient method to estimate and reduce crosstalk after placement in VLSI circuitsArash Mehdizadeh, Morteza Saheb Zamani. 61-68 [doi]
- A low power crosstalk-free bus encoding using genetic algorithmTruong Quang Vinh, Young-Chul Kim. 69-73 [doi]
- A variable step-size FxLMS algorithm for feedforward active noise control systems based on a new online secondary path modelling techniquePooya Davari, Hamid Hassanpour. 74-81 [doi]
- High performance elliptic curve point operations with pipelined GF(2:::m:::) field multiplierTurki F. Al-Somani, Alaaeldin Amin. 82-88 [doi]
- Hardware based algorithm for conflict diagnosis in SAT solverMona Safar, Mohamed Shalan, M. Watheq El-Kharashi, Ashraf Salem. 89-93 [doi]
- Performance modeling of partially reconfigurable computing systemsFoad Lotfifar, Hadi Shahriar Shahhoseini. 94-99 [doi]
- A flash translation layer for huge-capacity flash memory storage systemsChin-Hsien Wu. 100-107 [doi]
- Intelligent heart disease prediction system using data mining techniquesSellappan Palaniappan, Rafiah Awang. 108-115 [doi]
- DMPML Data Mining Preparation Markup LanguagePaulo M. Goncalves, Adrian L. Arnaud, Roberto Souto Maior de Barros. 116-125 [doi]
- Enumeration of maximal clique for mining spatial co-location patternsGhazi Al-Naymat. 126-133 [doi]
- A methodology for discovering spatial co-location patternsFadi K. Deeb, Ludovit Niepel. 134-141 [doi]
- A cellular automata approach to detecting concept drift and dealing with noiseMajid Pourkashani, Mohammad Reza Kangavari. 142-148 [doi]
- Rapid and robust ranking of text documents in a dynamically changing corpusByung-Hoon Park, Nagiza F. Samatova, Rajesh Munavalli, Ramya Krishnamurthy, Houssain Kettani, Al Geist. 149-155 [doi]
- Concept-based clustering of textual documents using SOMAmine Abdelmalek, Zakaria Elberrichi, Ladjel Bellatreche, Michel Simonet, Mimoun Malki. 156-163 [doi]
- When serializability comes without costMohammad Alomari, Michael J. Cahill, Alan Fekete, Uwe Röhm. 164-171 [doi]
- Mining fault tolerant frequent patterns using pattern growth approachShariq Bashir, Zahid Halim, Abdul Rauf Baig. 172-179 [doi]
- Practical inter-stock dependency indicators using time series and derivativesAbhi Dattasharma, Praveen Kumar Tripathi. 180-187 [doi]
- Effects of dimensionality reduction techniques on time series similarity measurementsGhazi Al-Naymat, Javid Taheri. 188-195 [doi]
- Using sensitivity of a bayesian network to discover interesting patternsRana Malhas, Zaher Al Aghbari. 196-205 [doi]
- Detecting high-value individuals in covert networks: 7/7 London bombing case studyNasrullah Memon, Nicholas Harkiolakis, David L. Hicks. 206-215 [doi]
- Providing QoS guarantees to multiple classes of traffic in wireless sensor networksM. Y. Aalsalem, Javid Taheri, Mohsin Iftikhar, Albert Y. Zomaya. 216-222 [doi]
- An energy efficient data reporting scheme for wireless sensor networksFarzad Tashtarian, Mohsen Tolou Honary, Majid Mazinani, A. T. Haghighat, Jalil Chitizadeh. 223-228 [doi]
- Enhancing AODV routing protocol using mobility parameters in VANETOmid Abedi, Mahmood Fathy, Jamshid Taghiloo. 229-235 [doi]
- Measured delay distribution in a Wireless Mesh Network test-bedNajah A. Abu Ali, Essa Ekram, Ali Eljasmy, Khaled Shuaib. 236-240 [doi]
- An evolutionary node architecture and performance optimizationTao Liu, Depei Qian, Yongxiang Huang, Ying He 0002, Rui Wang. 241-246 [doi]
- TCPBridge: A software approach to establish direct communications for NAT hostsSanmin Liu, Hai Jin, Xiaofei Liao, Hong Yao, Deze Zeng. 247-252 [doi]
- Towards scalable and reliable Grid NetworksOsama Abu-Rahmeh, P. Johnson. 253-259 [doi]
- Aspect-oriented formal specification for multimedia systemsLichen Zhang, Lihua Wang. 260-267 [doi]
- Workflow scheduling in computational grids: Opportunistic vs. plannedAbdul Aziz, Hesham El-Rewini. 268-275 [doi]
- Energy aware routing in high capacity overlays in wireless sensor networksShariful Hasan Shaikot, Venkatesh Sarangan. 276-283 [doi]
- A new level based clustering scheme for wireless sensor networksFarzad Tashtarian, Mohsen Tolou Honary, Majid Mazinani, A. T. Haghighat, Jalil Chitizadeh. 284-290 [doi]
- EEMR: An energy-efficient multi-hop routing protocol for wireless sensor networksJiguo Yu, Wenjun Liu, Jingjing Song, Baoxiang Cao. 291-298 [doi]
- Energy assignment in wireless sensor networks with hierarchical cluster-based routingS. Ali, A. Fakoorian, Mohsen Tolou Honary, Hassan Taheri. 299-303 [doi]
- Using input/output queues to increase LDPC decoder performanceEsa Alghonaim, Aiman El-Maleh, Mohamed Adnan Landolsi. 304-308 [doi]
- Capacity analysis of MIMO system over Nakagami-m fading channels using Finite Mixture with Expectation Maximization algorithmIbrahim Y. Abualhaol, Mustafa M. Matalgah. 309-316 [doi]
- Impact of fading wireless channel on the performance of game theoretic power control algorithms for CDMA wireless dataMohammad Hayajneh, Chaouki Abdallah, Walid Ibrahim. 317-324 [doi]
- Slow antenna selection and fast link adaptation MIMO systemsKyu-Sung Hwang, Young-Chai Ko, Mohamed-Slim Alouini, Wooyong Lee. 325-332 [doi]
- SLA-based dynamic resource management in wireless environmentsBadis Tebbani, Issam Aib, Guy Pujolle. 333-340 [doi]
- Enhanced mobile node s reachability through anycasting for MIPv6 regional registrationsAyman Abdel-Hamid, Lobna Eslim, Yasser Y. Hanafy. 341-348 [doi]
- Self-localization based on improved subspace approach in wireless sensor networkLiu Hongbo, Zhang Wei. 349-354 [doi]
- Avoiding virtual link attacks in wireless ad hoc networksSoufiene Djahel, Farid Naït-Abdesselam. 355-360 [doi]
- Network provisioning over IP networks with call admission control schemesSanaa Sharafeddine, Zaher Dawy, Amjad Beainy. 361-365 [doi]
- Performance evaluation of TCP handoffs over mobile IP connectionsJalel Ben-Othman, Farid Naït-Abdesselam, Lynda Mokdad, Octavio Ramirez Rojas. 366-372 [doi]
- Handover and class-based Call Admission Control policy for 4G-heterogeneous mobile networksTarek Bejaoui, Nidal Nasser. 373-380 [doi]
- Processing-delay reduction during the vertical handoff decision in heterogeneous wireless systemsRami Tawil, Jacques Demerjian, Guy Pujolle, Oscar Salazar. 381-385 [doi]
- Wireless Fair Queuing algorithm for window-based Link Level RetransmissionAbdul-Rahman Elshafei, Uthman Baroudi. 386-391 [doi]
- On the performance of a simple packet rate estimatorKhaled Salah, F. Haidari. 392-395 [doi]
- A critical assessment for RINEX data from OS NET for GPS accuracy improvementMohammad Al Nabhan, Suleiman Al Masri, Wamadeva Balachandran, Ziad Hunaiti. 396-402 [doi]
- Voronoi path planning technique for recovering communication in UAVsOmar M. Hammouri, Mustafa M. Matalgah. 403-406 [doi]
- A scalable P2P model for optimizing application layer multicastMourad Amad, Ahmed Meddahi. 407-413 [doi]
- A dynamic weighted data replication strategy in data gridsRuay Shiung Chang, Hui-Ping Chang, Yun-Ting Wang. 414-421 [doi]
- Commodity resource pricing in dynamic computational gridsKhalid Abdelkader, Jan Broeckhove, Kurt Vanmechelen. 422-429 [doi]
- OTSX: An extended transaction service in support of FT-CORBA standardHadi Salimi, Mohsen Sharifi. 430-435 [doi]
- Performance enhancement through hybrid replication and Genetic Algorithm co-scheduling in data gridsAli Elghirani, Riky Subrata, Albert Y. Zomaya, Ali Al Mazari. 436-443 [doi]
- A new, efficient coordinated checkpointing protocol combined with selective sender-based message loggingCh. D. V. Subba Rao, M. M. Naidu. 444-447 [doi]
- Comparative performance evaluation of software-based fault-tolerant routing algorithms in adaptively-routed toriFarshad Safaei, Ahmad Khonsari, A. H. Shantia. 448-455 [doi]
- Dynamic scheduling of periodic skippable tasks in an overloaded real-time systemAudrey Marchand, Maryline Silly-Chetto. 456-464 [doi]
- Slack-based global multiprocessor scheduling of aperiodic tasks in parallel embedded real-time systemsLars Lundberg, Håkan Lennerstad. 465-472 [doi]
- Electing a leader in the local computation model using mobile agentsMed Amine Haddar, Ahmed Hadj Kacem, Yves Métivier, Mohamed Mosbah, Mohamed Jmaiel. 473-480 [doi]
- Mapping task graphs onto Network Processors using genetic algorithmNing Weng, Nandeesh Kumar, Satish Dechu, Benfano Soewito. 481-488 [doi]
- Real-time implementation of an efficient RLS algorithm based on IIR filter for acoustic echo cancellationJafar Ramadhan Mohammed. 489-494 [doi]
- Far-field continuous speech recognition system based on speaker Localization and sub-band BeamformingAfsaneh Asaei, Mohammad Javad Taghizadeh, Hossein Sameti. 495-500 [doi]
- A model order based sinusoid representation for audio signalsPejman Mowlaee Begzade Mahale, Mahsa Rashidi, Abolghasem Sayadiyan. 501-507 [doi]
- A new robust adaptive beamformer for enhancing speech corrupted with colored noiseJafar Ramadhan Mohammed. 508-515 [doi]
- A new approach for iris localization in iris recognition systemsNakissa Barzegar, Mohammad Shahram Moin. 516-523 [doi]
- Cooperative criminal face recognition in distributed web environmentHamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad R. Akbarzadeh-Totonchi. 524-529 [doi]
- Fingerprint verification based on core point neighbourhoods minutiaeFarid Benhammadi, Kadda Bey-Beghdad, Hamid Hentous. 530-536 [doi]
- Personal authentication based on iris texture analysisFarid Benhammadi, Nassima Kihal. 537-543 [doi]
- A fuzzy similarity approach for automated spam filteringEl-Sayed M. El-Alfy, Fares S. Al-Qunaieer. 544-550 [doi]
- An agent-based clustering algorithm using potential fields551-558 [doi]
- A fuzzy clustering algorithm for finding arbitrary shaped clustersM. Soleymani Baghshah, Saeed Bagheri Shouraki. 559-566 [doi]
- Supervised texture classification using several features extraction techniques based on ANN and SVMMohammed W. Ashour, Mahmoud F. Hussin, Khaled M. Mahar. 567-574 [doi]
- Semantic-based image retrieval: A fuzzy modeling approachAbolfazl Lakdashti, Mohammad Shahram Moin, Kambiz Badie. 575-581 [doi]
- Writer identification using edge-based directional probability distribution features for arabic wordsSomaya Al-Máadeed, Eman Mohammed, Dori Al Kassis. 582-590 [doi]
- Redundant watermarking using wavelet packetsMohammad Reza Soheili. 591-598 [doi]
- A video-based image processing system for the automatic implementation of the eye involuntary reflexes measurements involved in the Drug Recognition Expert (DRE)Francois Meunier, David Laperrière. 599-605 [doi]
- Numeral recognition using curvelet transformFarhad Mohamad Kazemi, Jalaleddin Izadian, Reihaneh Moravejian, Ehsan Mohamad Kazemi. 606-612 [doi]
- ALSD: An algorithm for noise erasure and structural information recovery for surfaces with structural discontinuitiesAbheek Saha, Seema Garg. 613-622 [doi]
- A similarity-window based background estimation approachEhsan Shahrian, Hossein Karshenas, Mahmood Fathy. 623-628 [doi]
- Active contours initialization for ultrasound carotid artery imagesSherif G. Moursi, Mahmoud R. El-Sakka. 629-636 [doi]
- Core point detection using improved segmentation and orientationM. Usman Akram, Anam Tariq, Sarwat Nasir, Assia Khanam. 637-644 [doi]
- Privacy preserving ID3 using Gini Index over horizontally partitioned dataSaeed Samet, Ali Miri. 645-651 [doi]
- Formal digital license language with OTS/CafeOBJ methodJianwen Xiang, Dines Bjørner, Kokichi Futatsugi. 652-660 [doi]
- A novel flow-sensitive type and effect analysis for securing C codeSyrine Tlili, Mourad Debbabi. 661-668 [doi]
- Privacy and the market for private data: A negotiation model to capitalize on private dataAbdulsalam Yassine, Shervin Shirmohammadi. 669-678 [doi]
- Extracting Kerberos passwords through RC4-HMAC encryption type analysisAhmed Alazzawe, Anis Nawaz, Duminda Wijesekera. 679-685 [doi]
- Optimizing Fuzzy K-means for network anomaly detection using PSORoya Ensafi, Soheila Dehghanzadeh, Mohammad R. Akbarzadeh-Totonchi. 686-693 [doi]
- A new RSA vulnerability using continued fractionsDieaa I. Nassr, Hatem M. Bahig, Ashraf Bhery, Sameh S. Daoud. 694-701 [doi]
- Managing access and flow control requirements in distributed workflowsSamiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens. 702-710 [doi]
- Performance analysis of identity management in the Session Initiation Protocol (SIP)Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguyen, Sven Ehlert, Gergely Kovacs, Dorgham Sisalem. 711-717 [doi]
- PerformTrust: Trust model integrated past and current performance in P2P file sharing systemsJianming Fu, Huijun Xiong, Zhou Li, Huanguo Zhang. 718-725 [doi]
- Efficient computation of state space over approximation of preemptive real time systemsAbdelkrim Abdelli, Dahbia Yahiatene. 726-733 [doi]
- Test of preemptive real-time systemsNoureddine Adjir, Pierre de Saqui-Sannes, K. Mustapha Rahmouni. 734-742 [doi]
- Towards a mobile architecture description languageChafia Bouanaka, Faiza Belala. 743-748 [doi]
- Integrating software development security activities with agile methodologiesHossein Keramati, Seyed-Hassan Mirian-Hosseinabadi. 749-754 [doi]
- Comprehensive support for management of enterprise applicationsJens Bruhn, Christian Niklaus, Thomas Vogel, Guido Wirtz. 755-762 [doi]
- Assessing quality of web based systemsKhaled M. Khan. 763-769 [doi]
- Exceptions in a Web services environmentZakaria Maamar, Djamal Benslimane. 770-777 [doi]
- Design metrics for web application maintainability measurementEmad Ghosheh, Sue Black, Jihad Qaddour. 778-784 [doi]
- A Recursive Colored Petri Nets semantics for AUML as base of test case generationYacine Kissoum, Zaïdi Sahnoun. 785-792 [doi]
- A modular state exploration and compatibility checking of UML dynamic diagramsYoucef Hammal. 793-800 [doi]
- Modeling variability in the component and connector view of architecture using UMLMaryam Razavian, Ramtin Khosravi. 801-809 [doi]
- A context model based on UML and XML schema representationsSoraya Kouadri Mostéfaoui. 810-814 [doi]
- Efficient Hierarchical Diff-EDF schedulability for QoS packet networksMoutaz Saleh, Zulaiha Ali Othman. 815-819 [doi]
- Modelling information generation in event-driven sensor networksG. Balasubramanian, Saswat Chakrabarti. 820-823 [doi]
- Error rate performance for coherent modulation techniques with switched and examine diversity combining over Weibull fading channelsAmer M. Magableh, Mustafa M. Matalgah. 824-829 [doi]
- A Recursive Load Balancing technique for VoIP-dedicated WLANsGilbert Sawma, Issam Aib, Kablan Barbar, Guy Pujolle. 830-833 [doi]
- Text classification: A preferred tool for audio file classificationLouis Rompre, Ismaïl Biskri, Francois Meunier. 834-839 [doi]
- A phishing sites blacklist generatorMohsen Sharifi, Seyed Hossein Siadati. 840-843 [doi]
- Steganography in SMS by Sudoku puzzleMohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza. 844-847 [doi]
- Detecting flooding attacks against IP Multimedia Subsystem (IMS) networksYacine Rebahi, Muhammad Sher, Thomas Magedanz. 848-851 [doi]
- A connectionist system approach for learning logic programsM. Hadi Mashinchi, Siti Mariyam Hj. Shamsuddin. 852-855 [doi]
- SPVA: A novel digital signal processor architecture for Software Defined RadioXing Fang, Dong Wang, Shuming Chen. 856-859 [doi]
- An efficient high performance scalar multiplication method with resistance against timing attacksTurki F. Al-Somani, Alaaeldin Amin. 860-865 [doi]
- Committee machines and quadratic B-spline wavelet for the P300 speller paradigmZohreh Seyyedsalehi, Ali Motie Nasrabadi, Vahid Abootalebi. 866-869 [doi]
- Enhanced document clustering using fusion of multiscale wavelet decompositionMahmoud F. Hussin, Ibrahim El Rube, Mohamed S. Kamel. 870-874 [doi]
- Wavelets: An efficient tool for lung sounds analysisFatma Ayari, Ali T. Alouani, Mekki Ksouri. 875-878 [doi]
- Compression of the images of ancient Arab manuscript documents based on segmentationWalid Elloumi, Mohamed Chakroun, Moncef Charfi, Mohamed Adel Alimi. 879-883 [doi]
- On hybrid-fuzzy classifier design: An empirical modeling scenario for corrosion detection in gas pipelinesUvais Qidwai, Mohammed Maqbool. 884-890 [doi]
- Time-frequency analysis of the Arabian flute (Nay) tone applied to automatic music transcriptionMajid A. Al-Taee, Mohammad S. Al-Rawi, F. M. Al-Ghawanmeh. 891-894 [doi]
- DEVS-WSN : A discrete event approach for Wireless Sensor Network simulationThierry Antoine-Santoni, Jean François Santucci, Emmanuelle de Gentili, Bernadette Costa. 895-898 [doi]
- Delegation model for object-oriented systemsHamid Mcheick, Hafedh Mili, Eric Dallaire, Rakan Mcheik. 899-902 [doi]
- An evaluation method for aspectual modeling of distributed software architecturesHamid Bagheri, Vajih Montaghami, Gholamreza Safi, Seyed-Hassan Mirian-Hosseinabadi. 903-908 [doi]
- Intelligent virtual archiving for accessing news article repositoriesWadha K. Lebda, Noura Fetais, Suad Al Hussaini, Sahar smail, Qutaibah M. Malluhi. 909-912 [doi]
- Intelligent Diabetes Assistant: Using machine learning to help manage diabetesDavid L. Duke, Charles E. Thorpe, Mazahir Mahmoud, Mahmoud Zirie. 913-914 [doi]
- New technique in the use of tangent vectors for a robust handwritten digit recognitionHassiba Nemmour, Youcef Chibani. 915-916 [doi]
- Networks of evolutionary processors with a self-organizing learningNuria Gomez Bias, Luis F. Mingo, Juan Castellanos. 917-918 [doi]
- SIGMA - A Malaysian signatures databaseSharifah Mumtazah Syed Ahmad, Asma Shakil, Abdul Rahim Ahmad, Mustafa Agil Muhamad Balbed, Rina Bt. Md. Anwar. 919-920 [doi]
- Improved image segmentation method based on optimized threshold using Genetic AlgorithmXin Zhao, Myung-Eun Lee, Soo-Hyung Kim. 921-922 [doi]
- Writer identification of Arabic handwriting documents using grapheme featuresSomaya Al-Máadeed, Amat-AlAleem Al-Kurbi, Amal Al-Muslih, Reem Al-Qahtani, Haend Al Kubisi. 923-924 [doi]
- MASCE: A Multi-Agent System for Collaborative E-LearningHani Mahdi, Sally S. Attia. 925-926 [doi]
- Arabic spotted words recognition system based on HMM approach to control a didactic manipulatorMohamed Fezari, Attoui Hamza, Mouldi Bedda. 927-928 [doi]
- Forensic handwritten document management systemSomaya Al-Máadeed, Fatima Amire, Sara Khalily Hamza, Wadha Al-lebda. 929-930 [doi]
- Estimation of clock parameters and performance benchmarks for synchronization in Wireless Sensor NetworksQasim M. Chaudhari, Erchin Serpedin. 931-932 [doi]
- Suitability of context models for service-oriented environmentsSoraya Kouadri Mostéfaoui. 933-934 [doi]
- A system for automatic gathering and intelligent analyses of Doha traffic dataNoora Alnaimi, Nuha Barhoum, Abeer Nasser, Alia Swidan, Qutaibah M. Malluhi. 935-936 [doi]
- Segmentation of medical image based on mean shift and deterministic annealing EM algorithmMyung-Eun Lee, Soo-Hyung Kim, Wan Hyun Cho, Xin Zhao. 937-938 [doi]
- Hierarchical replication techniques to ensure checkpoint storage reliability in grid environmentFatiha Bouabache, Thomas Hérault, Gilles Fedak, Franck Cappello. 939-940 [doi]
- A fair scheduling algorithm for video transmission over wireless packet networksMohamed Hassan, Taha Landolsi, Mohamed El-Tarhuni. 941-942 [doi]
- How can path diversity help transmission protocols in the achievement of a better connection QOS?Foued Melakessou, Ulrich Sorger, Zdzislaw Suchanecki. 943-944 [doi]
- Tutorials-based system to assist Qatari children with special needsJihad M. Alja am, Haya Alsuwaidi, Noor Alkuwari, Hamda Aldosari. 945-946 [doi]
- An MPLS-DiffServ experimental core network infrastructure for E2E QoS content deliveryNikos Zotos, Georgios Xilouris, Evangelos Pallis, Anastasios Kourtis. 947-951 [doi]
- Differentiated services provision in a converged DVB/IP networking environmentEvangelos Markakis, Anargyros Sideris, Evangelos Pallis, Vassilios Zacharopoulos. 952-957 [doi]
- SLNP usage for QoS negotiation in heterogeneous environmentsNader Mbarek, Francine Krief, Daniel Negru. 958-963 [doi]
- QoS monitoring framework for end-to-end service management in wired and wireless networksMamadou Sidibé, Ahmed Mehaoua. 964-968 [doi]
- Measuring quality of experience for MPEG-21-based cross-layer multimedia content adaptationChristian Timmerer, Víctor H. Ortega, Jose María Gonzalez Calabozo, Alberto León. 969-974 [doi]
- P2P-based mobile IPTV: Challenges and opportunitiesMubashar Mushtaq, Toufik Ahmed. 975-980 [doi]
- Multimedia terminal architecture: An inter-operable approachBeilu Shao, Marco Mattavelli, Maria Teresa Andrade, Samuel Keller, Giorgiana Ciobanu, Pedro Carvalho. 981-986 [doi]
- Optimizing resources utilization in heterogeneous wireless networksAmir Djouama, Marwen Abdennebi, Samir Tohme. 987-992 [doi]
- Adaptive cross-layer fragmentation for QoS-based wireless IPTV servicesIsmail Djama, Toufik Ahmed, Daniel Negru. 993-998 [doi]
- Frame-level dynamic bandwidth provisioning for QoS-enabled broadband wireless networksBader Al-Manthari, Najah A. Abu Ali, Nidal Nasser, Hossam S. Hassanein. 999-1004 [doi]
- Ant colony-based many-to-one sensory data routing in Wireless Sensor NetworksReza GhasemAghaei, Abu Saleh Md. Mahfujur Rahman, Md. Abdur Rahman, Wail Gueaieb. 1005-1010 [doi]
- Multimedia caching integration for efficient content delivery over heterogeneous networksMubashar Mushtaq, Toufik Ahmed. 1011-1012 [doi]
- The ENTHRONE 2 metadata management tool (MATool) (WISE 2008 MATool demonstration)Artur Lugmayr. 1013-1018 [doi]
- End-to-End QoS through integrated management of content, networks and terminals: The ENTHRONE projectOlimpiu Negru. 1019-1020 [doi]
- Improve industrial process plant safety & availability via reliability engineeringMichel Houtermans, Mufeed Al-Ghumgham, Tino Vande Capelle. 1021-1026 [doi]
- Functional safety IEC 61508 / IEC 61511 the impact to certification and the userHeinz Gall. 1027-1031 [doi]
- Development guidelines for dependable real-time embedded systemsMichael Short. 1032-1039 [doi]
- Redundant optical data transmission using semiconductor lasersHans-Dieter Wacker, Josef Börcsök, Hartmut Hillmer. 1040-1045 [doi]
- Implementation of a 1oo2-RISC-architecture on FPGA for safety systemsJosef Börcsök, Ali Hayek, Muhammad Umar. 1046-1051 [doi]
- Different approaches for probability of common cause failure on demand calculations for safety integrity systemsJosef Börcsök, Peter Holub. 1052-1057 [doi]
- Matlab® / Simulink® generated source code for safety related systemsMichael H. Schwarz, Huiyun Sheng, Oleksandr Sheleh, Josef Börcsök. 1058-1063 [doi]
- A heterogeneous network architecture based Gnutella for mobile emergency preparedness applicationsAzzedine Boukerche, Anis Zarrad, Regina Borges de Araujo. 1064-1069 [doi]
- WiMAX Mesh networks for underserved areasEliamani Sedoyeka, Ziad Hunaiti, Mohammad Al Nabhan, Wamadeva Balachandran. 1070-1075 [doi]
- Analysis of the latency-lifetime tradeoff in wireless sensor networksFatma Bouabdallah, Nizar Bouabdallah, Raouf Boutaba. 1076-1081 [doi]
- Enhancement of IEEE 802.11 DCF backoff algorithm under heavy trafficIssam Elarbaoui, Hazem H. Refai. 1082-1087 [doi]
- Cumulative intelligence gathering for smart vehiclesSamuel Cheng, Lina Stankovic, Vladimir Stankovic, Hazem H. Refai. 1088-1093 [doi]
- Preventing admission failures of bandwidth reservation in wireless mesh networksAndré Herms, Georg Lukas. 1094-1099 [doi]
- Performance study of wireless mesh networks routing metricsSonia Waharte, Brent Ishibashi, Raouf Boutaba, Djamal-Eddine Meddour. 1100-1106 [doi]
- A UML rule-based approach for describing and checking dynamic software architecturesMohammed Nadhmi Miladi, Mohamed Hadj Kacem, Achraf Boukhris, Mohamed Jmaiel, Khalil Drira. 1107-1114 [doi]