Abstract is missing.
- Message from the WAMIS 2006 Chairs [doi]
- SOCNE 2006 Committees and Reviewers [doi]
- INVITE 2006 Committees and Reviewers [doi]
- HWISE 2006 Committees and Reviewers [doi]
- Message from the PCAC 2006 General Chairs [doi]
- Message from the SNDS 2006 Chairs [doi]
- Committees [doi]
- Reviewers [doi]
- Message from the SOCNE 2006 Chairs [doi]
- Message from the PAEWN 2006 Chairs [doi]
- PCAC 2006 Committees and Reviewers [doi]
- Message from the HWISE 2006 Chairs [doi]
- PAEWN 2006 Committees and Reviewers [doi]
- WAMIS 2006 Program Committee and Reviewers [doi]
- Message from the Steering Committee Chair [doi]
- Message from the FINA 2006 Chairs [doi]
- TACS 2006 Committees and Reviewers [doi]
- HiPCoMB 2006 Committees and Reviewers [doi]
- SNDS 2006 Committees [doi]
- Message from the TACS 2006 Chairs [doi]
- Message from the General Co-Chairs and Program Committee Chairs [doi]
- FINA 2006 Committees and Reviewers [doi]
- Message from the INVITE 2006 Chairs [doi]
- Message from the HiPCoMB 2006 Chairs [doi]
- Service Oriented Trustworthiness of Acquaintances in Peer-to-Peer Overlay NetworksKenichi Watanabe, Yoshio Nakajima, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen. 3-8 [doi]
- Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc NetworksLijun Liao, Mark Manulis. 5-9 [doi]
- Freelib: Peer-to-peer-based Digital LibrariesAshraf Amrou, Kurt Maly, Mohammad Zubair. 9-14 [doi]
- Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung. 10-14 [doi]
- Certificateless Designated Verifier Signature SchemesXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. 15-19 [doi]
- HyMoNet: a peer-to-peer hybrid multicast overlay network for efficient live media streamingBin Chang, Yuanchun Shi, Nan Zhang. 15-20 [doi]
- Unpuzzling Puzzle (analysis of a video encryption algorithm)Martin Stanek, Lubica Stanekova. 20-24 [doi]
- Resources availability for Peer to Peer systemsGeorges Da Costa, Corine Marchand, Olivier Richard, Jean-Marc Vincent. 21-28 [doi]
- A Distributed-Log-based IP Traceback Scheme to Defeat DDoS AttacksYinan Jing, Jingtao Li, Xueping Wang, Xiaochun Xiao, Gendu Zhang. 25-32 [doi]
- Popularity analysis of a video-on-demand service with a great variety of content types. Influence of the subject and video characteristicsXabiel G. Pañeda, Roberto García, David Melendi, Manuel Vilas, Víctor G. García. 29-34 [doi]
- Distributed Trust Infrastructure and Trust-Security Articulation: Application to Heterogeneous NetworksChristian Tchepnda, Michel Riguidel. 33-38 [doi]
- Internal popularity of streaming video and its implication on cachingJiang Yu, Xu Du, Tai Wang, Chun Tung Chou. 35-40 [doi]
- Analysis of LYSA-calculus with explicit confidentiality annotationsHan Gao, Hanne Riis Nielson. 39-43 [doi]
- An improved multiple description video coding method using GOB alternation and low quality macroblock updateYangli Wang, Chengke Wu. 41-48 [doi]
- Towards Designing Secure Online GamesGeorge Yee, Larry Korba, Ronggong Song, Ying-Chieh Chen. 44-48 [doi]
- EC: an edge-based architecture against DDoS attacks and malware spreadRoger Karrer. 49-56 [doi]
- A Novel Geographic Routing Algorithm for Ad Hoc Networks Based on Localized Delaunay TriangulationPeng He, Jiandong Li, Lei Zhou. 49-54 [doi]
- Ad-Hoc Network Routing Using Co-operative DiversityMichael A. Tope, John C. McEachen, Albert C. Kinney. 55-60 [doi]
- Efficient Authentication for Reactive Routing ProtocolsRaghav Bhaskar, Javier Herranz, Fabien Laguillaumie. 57-61 [doi]
- An Enhanced Zone-Based Routing Protocol for Mobile Ad-Hoc Networks Based on Route ReliabilityAkio Koyama, Yoshitaka Honma, Junpei Arai, Leonard Barolli. 61-68 [doi]
- A Multi-dimension Rule Update in a TCAM-based High-Performance Network Security SystemHae-Jin Jeong, Il-Seop Song, Taeck-Geun Kwon, Yoo-Kyoung Lee. 62-66 [doi]
- Design and Analysis of a Robust and Efficient Block Cipher using Cellular AutomataPallavi Joshi, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury. 67-71 [doi]
- Collaborative Fault Diagnosis in Grids through Automated TestsAlexandre Duarte, Francisco Vilar Brasileiro, Walfredo Cirne, Jose Alencar Filho. 69-74 [doi]
- Host-Based Intrusion Detection for Advanced Mobile DevicesMarkus Miettinen, Perttu Halonen. 72-76 [doi]
- On the Quality of Service of Failure Detectors Based on Control TheoryNaixue Xiong, Yan Yang, Jianxun Chen, Yanxiang He. 75-80 [doi]
- Abuse Freedom in Access Control SchemesAnat Talmy, Oren Dobzinski. 77-86 [doi]
- From Failure Detectors with Limited Scope Accuracy to System-wide LeadershipAchour Mostéfaoui, Michel Raynal, Corentin Travers, Sergio Rajsbaum. 81-86 [doi]
- Exploring GSM Signal Strength Levels in Pervasive EnvironmentsIan Anderson, Henk L. Muller. 87-91 [doi]
- Design of a Notification System for the Accrual Failure DetectorNaohiro Hayashibara, Makoto Takizawa. 87-94 [doi]
- LooM: An Anonymity Quantification Method in Pervasive Computing EnvironmentsMiyuki Imada, Masakatsu Ohta, Masayasu Yamaguchi. 92-96 [doi]
- An Approach to Distributed Intelligent Robot Networking Based on Mental Image Directed Semantic TheoryMasao Yokota, Genci Capi. 95-100 [doi]
- Active Storage Framework for Object-based Storage DeviceLingjun Qin, Dan Feng. 97-101 [doi]
- A QoS Ontology Language for Web-ServicesIoannis V. Papaioannou, Dimitrios T. Tsesmetzis, Ioanna Roussaki, Miltiades E. Anagnostou. 101-106 [doi]
- HoNeY: a MHP-based Platform for HOme NEtwork interoperabilityFabio Forno, Giovanni Malnati, Giuseppe Portelli. 102-110 [doi]
- DiVES: A Distributed Support for Networked Virtual EnvironmentsA. Bonotti, Luca Genovali, Laura Ricci. 107-112 [doi]
- Hierarchical, Multi-spanning Architecture for ManagedWireless NetworksBalazs Kovacs, Rolland Vida. 111-115 [doi]
- Practical Group Signatures from RSAShi Cui, Choong Wah Chan, Xiangguo Cheng. 111-115 [doi]
- VRE-NET: A QoS-supported Network Subsystem for Multimedia ApplicationsHui Cheng, Steve Goddard. 113 [doi]
- Distributed IDSs for enhancing Security in Mobile Wireless Sensor NetworksPaola Inverardi, Leonardo Mostarda, Alfredo Navarra. 116-120 [doi]
- DoS Packet Filter Using DNS InformationTsuyoshi Chiba, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata. 116-131 [doi]
- Optimal Tree-based Adaptive Broadcasting for Mobile Web ServicesSheng-Tzong Cheng, Chun-Yen Wang, Chia-Mei Chen. 121-125 [doi]
- Refining WiFi Indoor Positioning Renders Pertinent Deploying Location-Based Multimedia GuideFrederic Lassabe, Philippe Canalda, Pascal Chatonnay, Damien Charlet. 126-132 [doi]
- Distributed Key Management for Secure Role based MessagingGansen Zhao, Sassa Otenko, David W. Chadwick. 132-137 [doi]
- ARM: Anonymous Routing Protocol for Mobile Ad hoc NetworksStefaan Seys, Bart Preneel. 133-137 [doi]
- Service Discovery with Denial-of-Service Attack Resistance using Risk EvaluationTomohiro Nakagawa, Motoharu Miyake, Yu Inamura, Hiroshi Inamura. 138-146 [doi]
- Wireless Ad-hoc Network-Based Tourist Information Delivery SystemKenji Kawasaki, Atsushi Shimizu, Monden Kazuya, Satoh Hiroki, Masato Hayashi, Susumu Matsui. 138-142 [doi]
- A New Multi-channel MAC Protocol with Power Control for Ad hoc NetworksHuimin Chen, Min Jia, Xihao Chen, Yuhua Yuan. 143-146 [doi]
- A Probabilistic Certificate Updating Protocol for MANETDongqing Xie, Han Zhou. 147-154 [doi]
- V6Gene: A Scalable IPv6 Prefix Generator for Route Lookup Algorithm BenchmarkKai Zheng, Bin Liu. 147-152 [doi]
- A Routing Load Balancing Policy for Grid Computing EnvironmentsRodrigo Fernandes de Mello, Luciano José Senger, Laurence Tianruo Yang. 153-158 [doi]
- Analysis of IBS for MANET Security in Emergency and Rescue OperationsAnne Marie Hegland, Eli Winjum, Pål Spilling, Chunming Rong, Øivind Kure. 155-159 [doi]
- Routing Inference Based on Pseudo Traffic Matrix EstimationZiqian Liu, Changjia Chen. 159-164 [doi]
- Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor NetworksZhen Cao, Jian-bin Hu, Zhong Chen, Maoxing Xu, Xia Zhou. 160-164 [doi]
- Hybrid Multipath Routing Algorithm for Load Balancing in MPLS Based IP NetworkKyeongja Lee, Armand Toguyéni, Ahmed Rahmani. 165-172 [doi]
- Using Two Nodes and Neighbors Examining to Improve Positioning Capability in Sensor NetworksPo-Liang Lin, Ren-Song Ko. 165-170 [doi]
- Sequential Localization Algorithm for Active Sensor Network DeploymentYing Zhang, Qingfeng Huang, Juan Liu. 171-178 [doi]
- Target Selection by Similarity Preserve Hash in Distributed System for Geographical Origin Identification of VegetablesNobuyoshi Sato, Jin Tamaoka, Koichiro Shimomura, Hirobumi Yamamoto, Ken ichi Kamijo, Minoru Uehara. 173-178 [doi]
- Evaluation of a Marketable Quality and Profitability Model Considering General DistributionValbona Barolli, Heihachiro Fukuda, Leonard Barolli, Makoto Takizawa. 179-184 [doi]
- A Loop-Free Multi-Path Routing With QoS for Wireless Ad Hoc NetworkCheng-Ying Yang, Yi-Wei Ting, Chou Chen Yang. 179-185 [doi]
- DLB: A Novel Real-time QoS Control Mechanism for Multimedia TransmissionJian Li, Yeqiong Song. 185-190 [doi]
- An intent-oriented approach for Multi-Device User Interface DesignMario Bisignano, Giuseppe Di Modica, Orazio Tomarchio. 186-194 [doi]
- An Integrated Information System for Protein IdentificationHui-Huang Hsu, Chao-Hsun Yang, Cheng-Wei Hsieh, Chien-Chung Cheng. 191-198 [doi]
- Framework For Co-browsing On Heterogeneous DevicesHui-Na Chua, Simon D. Scott, Y. W. Choi. 195-199 [doi]
- FollowMe: On Research of Pluggable Infrastructure for Context-AwarenessJun Li, Yingyi Bu, Shaxun Chen, XianPing Tao, Jian Lu. 199-204 [doi]
- The Web and Complex Adaptive SystemsMaya Rupert, Salima Hassas, Amjad Rattrout. 200-204 [doi]
- XML-Enabled Relational Database for XML Document UpdateEric Pardede, J. Wenny Rahayu, David Taniar. 205-212 [doi]
- A Context-Aware System Based on Service-Oriented ArchitectureDamiao Ribeiro de Almeida, Cláudio de Souza Baptista, Elvis Rodrigues da Silva, Cláudio E. C. Campelo, Hugo Feitosa de Figueirêdo, Yuri Almeida Lacerda. 205-210 [doi]
- Designing a Quality-Aware Discovery Mechanism for Acquiring Context InformationMaria Chantzara, Miltiades E. Anagnostou, Efstathios D. Sykas. 211-216 [doi]
- Analysis Architecture of a Mobile Sports Replay SystemPatrick Riley, Jeff C. Decker. 213-218 [doi]
- An Improved Method of Task Context Switching in OSEK Operating SystemZhaohui Wu, Hong Li, Zhigang Gao, Jie Sun, Jiang Li. 217-222 [doi]
- An Architecture for Adaptive Mobile LearningHyosook Jung, Seongbin Park, Kwang-Sik Chung. 219-223 [doi]
- Efficient Search Mechanisms in a Context Distribution SystemIrene Sygkouna, Miltiades E. Anagnostou, Efstathios D. Sykas. 223-230 [doi]
- Transaction Service Discovery in Mobile EnvironmentsArne Ketil Eidsvik, Randi Karlsen, Paul Grace, Gordon S. Blair. 224-228 [doi]
- Reduction of Handover Latency Using MIH Services in MIPv6Yoon-Young An, Byung Ho Yae, Kang-Won Lee, You Ze Cho, Woo Young Jung. 229-234 [doi]
- A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion DetectionJianhua Yang, Shou-Hsuan Stephen Huang, Ming Dong Wan. 231-236 [doi]
- CCSMOMS: A Composite Communication Scheme for Mobile Object Management SystemXiaobo Fan, Wei Xu, Hong Chen, Lei Liu. 235-239 [doi]
- Dual RSA Accumulators and Its Application for Private Revocation CheckHiroaki Kikuchi. 237-242 [doi]
- Optimal Multiple QoS Resource Scheduling In Grid ComputingLi Chunlin, Li Layuan. 240-246 [doi]
- An Intrusion Detection System using Alteration of DataFumiaki Nagano, Kohei Tatara, Kouichi Sakurai, Toshihiro Tabata. 243-248 [doi]
- Distributed Process Integration: Experiences and Opportunities for Future ResearchJungmin Shin, Joachim Hammer, William J. O Brien. 247-251 [doi]
- Efficient Packet Matching for Gigabit Network Intrusion Detection using TCAMsMing Gao, Kenong Zhang, Jiahua Lu. 249-254 [doi]
- Software Agents for Meeting SchedulerElhadi Shakshuki, Hsiang-Hwa Koo. 252-256 [doi]
- Finding the Longest Similar Subsequence of Thumbprints for Intrusion DetectionMing Dong Wan, Shou-Hsuan Stephen Huang, Jianhua Yang. 255-262 [doi]
- Performance Analysis of Network Topologies in Agent-based Open Connectivity Architecture for DSSHao Lan Zhang, Clement H. C. Leung, Gitesh K. Raikundalia. 257-261 [doi]
- Toward Role-based Agent Coordination for Mobile and Ubiquitous ServicesAkio Sashima, Noriaki Izumi, Koichi Kurumatani, Yoshiyuki Kotani. 262-266 [doi]
- A Component Interconnection Model for Interactive Digital Television SystemsCarlos Silva, Adilson B. Lopes, Glêdson Elias da Silveira, Guido Lemos, Maurício F. Magalhães. 263-268 [doi]
- A Distributed Scheme for Secure Data AccessRachid Anane, Sukhvir Dhillon, Behzad Bordbar. 267-271 [doi]
- Extension of BGP to Support Multi-domain FICC-Diffserv ArchitectureHa Trung Phan, Doan B. Hoang. 269-274 [doi]
- Detecting Junk Mails by Implementing Statistical TheoryRedwan Zakariah, Samina Ehsan. 272-280 [doi]
- A Behavioral Characteristics Model for Flexible Distributed SystemAkiko Takahashi, Toru Abe, Takuo Suganuma, Yukio Iwaya, Tetsuo Kinoshita. 275-280 [doi]
- Performance Modeling of IEEE 802.11 DCF using Equilibrium Point AnalysisXin Gang Wang, Geyong Min, John E. Mellor. 281-288 [doi]
- Approximate Query Answering in Sensor Networks with Hierarchically Distributed CachingYing Li, M. V. Ramakrishna, Seng Wai Loke. 281-285 [doi]
- On Bridge Residence Times in Master-Slave Connected 802.15.4 ClustersJelena V. Misic, Carol J. Fung, Vojislav B. Misic. 286-290 [doi]
- Accelerating the HMMER Sequence Analysis Suite Using Conventional ProcessorsJohn Paul Walters, Bashar Qudah, Vipin Chaudhary. 289-294 [doi]
- MEMOSEN: Multi-radio Enabled MObile Wireless SEnsor NetworkCanfeng Chen, Jian Ma. 291-295 [doi]
- Mobile Location Estimation by Density-Based Clustering for NLoS EnvironmentsCha-Hwa Lin, Juin-Yi Cheng, Chien-Nan Wu. 295-300 [doi]
- Agent-based System Architecture forWireless Sensor NetworksSajid Hussain, Elhadi Shakshuki, Abdul Wasey Matin. 296-302 [doi]
- Sharing Checkpoints to Improve Turnaround Time in Desktop GridPatrício Domingues, João Gabriel Silva, Luís Moura Silva. 301-306 [doi]
- A Fault-Tolerant Model forWireless Sensor-Actor SystemKeiji Ozaki, Kenichi Watanabe, Satoshi Itaya, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa. 303-307 [doi]
- Online Multi-Criterion Optimization for Dynamic Power-Aware Camera Configuration in Distributed Embedded Surveillance ClustersArnold Maier, Bernhard Rinner, W. Schriebl, Helmut Schwabach. 307-312 [doi]
- An Energy Efficient Routing Mechanism for Wireless Sensor NetworksRuay Shiung Chang, Chia-Jou Kuo. 308-312 [doi]
- D^3G: Novel Approaches to Data Statistics, Understanding and Preprocessing on the GridAlexander Wöhrer, Peter Brezany, Lenka Novakov, A. Min Tjoa. 313-320 [doi]
- Clustering Protocol for Sensor NetworksArjan Durresi, Vamsi Paruchuri, Leonard Barolli. 313-317 [doi]
- Cluster-based Hierarchical Time Synchronization for Multi-hop Wireless Sensor NetworksHyunhak Kim, Daeyoung Kim, Seongeun Yoo. 318-322 [doi]
- An O(logp) Algorithm for the Discrete Feedback Guided Dynamic LoopTatiana Tabirca, Sabin Tabirca, Laurence Tianruo Yang. 321-326 [doi]
- QoS Routing in a Multi-Robot Network System for Urban Search and RescueHisayoshi Sugiyama, Tetsuo Tsujioka, Masashi Murata. 323-330 [doi]
- A Token-based Distributed Scheduling for Mesh Networks with Chain TopologiesTing-Chao Hou, Chien-Yi Wang, Ming-Chieh Chan. 327-332 [doi]
- Application Programming Interface for Configuration of Multi-Robot Sensor NetworksJunya Yamashita, Ryohei Suzuki, Kei Sawai, Hiroki Saito, Tsuyoshi Suzuki, Yoshito Tobe, Niwat Thepvilojanapong, Kaoru Sezaki. 331-335 [doi]
- Discrete LQ Rate Control Schedule System for Multimedia TransmissionXiaofei Zhou, Kenneth Ong. 333-338 [doi]
- Critical Nodes Detection in Mobile Ad Hoc NetworkMin Sheng, Jiandong Li, Yan Shi. 336-340 [doi]
- Adaptive Algorithm for Revenue Maximization in WFQ SchedulerLari Kannisto, Ari Viinikainen, Jyrki Joutsensalo, Timo Hämäläinen. 339-346 [doi]
- A Proposal on a Learner s Context-aware Personalized Education Support Method based on Principles of Behavior ScienceZixue Cheng, Qiu Han, Shengguo Sun, Mizuo Kansen, Tomohiro Hosokawa, Tongjun Huang, Aiguo He. 341-345 [doi]
- Home Appliance Translator for Remote Control of Conventional Home ApplianceHiroshi Kuriyama, Hiroshi Mineno, Tadanori Mizuno, Yasuhiro Seno, Takashi Furumura. 346-350 [doi]
- HAMS: Heterogeneous Asynchronous Multi-source Streaming Protocol to Realize Scalable Multimedia CommunicationsSatoshi Itaya, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido. 347-352 [doi]
- Mobility Pattern Learning and Route Prediction Based Location Management in PCS NetworkDaisuke Senzaki, Hiroshi Mabuchi, Goutam Chakraborty, Masafumi Matsuhara. 351-360 [doi]
- Enhanced Anonymous Auction Protocols with Freewheeling BidsYa-Fen Chang, Chin-Chen Chang. 353-358 [doi]
- A New MAC Protocol for Wi-Fi Mesh NetworksTzu-Jane Tsai, Hsueh-Wen Tseng, Ai-Chun Pang. 359-366 [doi]
- Distributed Mobility Prediction in a Hierarchical Infostation SystemsMazen Tlais, Frédéric Weis, Carole Bonan. 361-365 [doi]
- A Mobility Management Scheme for Hybrid Wired and Wireless NetworksMieso K. Denko. 366-372 [doi]
- Learning Observer AgentsElhadi Shakshuki, Abdur Rafey Matin, Abdul Wasey Matin. 367-372 [doi]
- Effect of Redundancy on Mean Time to Failure of Wireless Sensor NetworksAnh Phan Speer, Ing-Ray Chen. 373-382 [doi]
- Dynamic Ontology Integration in a Multi-agent EnvironmentS. Misbah Deen, K. Ponnamperuma. 373-378 [doi]
- DS/CDMA Throughput of Multi-hop Sensor Network in a Rayleigh Fading Underwater Acoustic ChannelChoong Hock Mar, Winston Khoon Guan Seah. 378-382 [doi]
- An Empirical Evaluation of a Sentinel Based Approach to Exception Diagnosis in Multi-Agent SystemsNazaraf Shah, Kuo-Ming Chao, Nick Godwin, Anne E. James, Chen-Fang Tsai. 379-386 [doi]
- Simulation Architecture for Data Processing Algorithms in Wireless Sensor NetworksYann-Aël Le Borgne, Mehdi Moussaid, Gianluca Bontempi. 383-387 [doi]
- Constrained Flooding: A Robust and Efficient Routing Framework for Wireless Sensor NetworksYing Zhang, Markus P. J. Fromherz. 387-392 [doi]
- Optimized Sink node Path using Particle Swarm OptimizationChampake Mendis, Siddeswara Mayura Guru, Saman K. Halgamuge, Saman Fernando. 388-394 [doi]
- SecRout: A Secure Routing Protocol for Sensor NetworksJian Yin, Sanjay Kumar Madria. 393-398 [doi]
- Measuring SCTP Throughput and Jitter over Heterogeneous NetworksDonato Emma, Salvatore Loreto, Antonio Pescapè, Giorgio Ventre. 395-399 [doi]
- A Simple Probabilistic Analysis of Sensor Data Fluctuations in the Real WorldKaoru Hiramatsu, Takashi Hattori, Tatsumi Yamada, Takeshi Okadome. 399-406 [doi]
- UMTS Coverage and Capacity Enhancement Using Repeaters and Remote RF HeadsPathma Rathinavelu, Gottfried Schapeler, Andreas Weber 0003. 400-404 [doi]
- Towards Building a Fault Tolerant and Conflict-Free Distributed File System for Mobile ClientsAzzedine Boukerche, Raed Al-Shaikh. 405-412 [doi]
- Role-Based Concurrency Control for Distributed SystemsTomoya Enokido, Makoto Takizawa. 407-412 [doi]
- Performance Evaluation of MPLS and IP on an IXP1200 Network ProcessorRajendra Persaud, Dirk Sabath, Gerald Berghoff, Ralf Schanko. 413-417 [doi]
- A Simple, Safe Reconfigurable Object Model with Loosely-Coupled CommunicationKentaro Oda, Hiroki Najima, Yoshihiro Yasutake, Takaichi Yoshida. 413-418 [doi]
- Improving MAC-layer Error Recovery for 3G Cellular BroadcastsYongwoo Cho, Kyungtae Kang, Yongjin Cho, Heonshik Shin. 418-422 [doi]
- PARM: a Physically-Aware Reference Model for Overlay InternetworkingHanh Le, Doan B. Hoang, Andrew James Simmonds. 419-424 [doi]
- Location Sensing in Enhanced IEEE802.11e WLANsHai-Feng Yuan, Wen-Bing Yao, Yonghua Song. 423-428 [doi]
- Coordination DesignHilda Tellioglu. 425-432 [doi]
- Security Authentication of 3G-WLAN InterworkingYao Zhao, Chuang Lin, Hao Yin. 429-436 [doi]
- A Distributed Virtual Reality Framework for Korea-Japan High-Speed Network TestbedHiroaki Nishino, Shinji Yamabiraki, Kouichi Utsumiya, Yong-Moo Kwon, Yoshihiro Okada. 433-438 [doi]
- Using Buffer Management in 3G Radio Bearers to Enhance End-to-End TCP PerformanceJuan J. Alcaraz, Fernando Cerdán. 437-441 [doi]
- Large-Scale Media Delivery using a Semi-Reliable Multicast ProtocolChristiane M. Bortoleto, Lau Cheuk Lung, Frank Siqueira. 439-444 [doi]
- Modelling Active Queue Management with Different Traffic ClassesLan Wang, Geyong Min, Irfan Awan. 442-446 [doi]
- Equation Based Congestion Control for Video Transmission over WCDMA NetworksAntonios G. Alexiou, Dimitrios Antonellis, Christos Bouras. 445-450 [doi]
- QoS Provisioning with Fast Call Admission and Bandwidth Reallocation SchemeKhong Neng Choong, Andy Lock Yen Low, See Leng Ng, Yoke Chek Yee, Su Fong Chien. 447-451 [doi]
- Remote Trust with Aspect-Oriented ProgrammingPaolo Falcarin, Riccardo Scandariato, Mario Baldi. 451-458 [doi]
- ELRS: An Energy-Efficient Layered Routing Scheme for Wireless Sensor and Actor NetworksPeng Han, Huafeng Wu, Dilin Mao, Chuanshan Gao. 452-460 [doi]
- Scaling Multicast Communications by Tracking Feedback SendersAchmad Husni Thamrin, Hiroyuki Kusumoto, Jun Murai. 459-464 [doi]
- Identity-based PKI Scheme for Machine Readable Travel DocumentFan Zhang, Dengguo Feng. 461-465 [doi]
- A Near-optimal Multicast Scheme for Mobile Ad Hoc Networks Using a Hybrid Genetic AlgorithmChien-Hung Liu, Yueh-Min Huang, Tzu-Chiang Chiang. 465-470 [doi]
- Component Integrity Check and Recovery Against Malicious CodesJoon S. Park, Gautam Jayaprakash, Joseph Giordano. 466-470 [doi]
- Video Transcoding Using Network Processors to Support Dynamically Adaptive Video MulticastMohammad Shorfuzzaman, M. Rasit Eskicioglu, Peter C. J. Graham. 471-476 [doi]
- CA-SPA: Balancing the Crosscutting Concerns of Governance and Autonomy in Trusted SoftwarePhilip Miseldine, A. Taleb-Bendiab. 471-475 [doi]
- Property-Based Taming of Lying Mobile NodesMark Manulis, Ahmad-Reza Sadeghi. 476-480 [doi]
- Multicast Routing Using Genetic Algorithm Seen as a Permutation ProblemAluizio F. R. Araújo, Cícero Garrozi, Andre R. G. A. Leitao, Maury M. Gouvea Jr.. 477-484 [doi]
- Autonomic Trust Prediction for Pervasive SystemsLicia Capra, Mirco Musolesi. 481-488 [doi]
- A Link Layer Assisted Fast Handoff Scheme Using the Alternative Path ApproachChung-Ming Huang, Meng-Shu Chiang, Jin-Wei Lin. 485-490 [doi]
- May I borrow Your Filter? Exchanging Filters to Combat Spam in a CommunityAnurag Garg, Roberto Battiti, Roberto G. Cascella. 489-493 [doi]
- smartAR: A Proposal of IP Micro-mobility Protocol for Single and Simultaneous Movements ScenarioGiuseppe De Marco, Leonard Barolli. 491-496 [doi]
- Autonomic Network-layer Multicast Service Towards Consistent Service QualityBjörn Brynjúlfsson, Gísli Hjálmtýsson, Kostas Katrinis, Bernhard Plattner. 494-498 [doi]
- Adaptive Timeout Policies for Wireless LinksGeorge Xylomenos, Christos Tsilopoulos. 497-502 [doi]
- Using Managed Communication Channels in Software ComponentsEmil A. Stoyanov, Dieter Roller, Markus Alexander Wischy. 499-503 [doi]
- An Adaptive Multipath Protocol for Efficient IP Handoff in Mobile Wireless NetworksKen C. K. Tsang, Roy S. C. Ho, Mark C. M. Tsang, Cho-Li Wang, Francis C. M. Lau. 503-510 [doi]
- Autonomic Web Service Development with MAWeSEmilio Mancini, Umberto Villano, Massimiliano Rak. 504-508 [doi]
- Automatic Performance Diagnosis for Changing Workloads in DBMSsDarcy G. Benoit. 509-518 [doi]
- Secure and Continuous Management of Heterogeneous Ad Hoc NetworksArjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Leonard Barolli. 511-516 [doi]
- An Efficient Coverage-based Flooding Scheme for Geocasting in Mobile Ad hoc NetworksLarry Hughes, Atekeh Maghsoudlou. 517-522 [doi]
- Model-based Management of Embedded Service Systems - An Applied ApproachStefan Illner, Heiko Krumm, Ingo Lück, Andre Pohl, Andreas Bobek, Hendrik Bohn, Frank Golatowski. 519-523 [doi]
- Efficient Packet Scheduler For Wireless Ad Hoc Networks With Switched Beam AntennasGilles Grimaud, Antoine Honore, Hervé Meunier, David Simplot-Ryl. 523-527 [doi]
- A Service Creation Environment for interactive, menu-driven Mobile ServicesJürgen Tacken, Thorben Janssen, Stephan Flake, Dirk Fischer. 524-528 [doi]
- MUDSOM: Mobile User Database Static Object MiningJohn Goh, David Taniar. 528-532 [doi]
- Telecom Services Delivery in a SOAThierry Pollet, Gerard Maas, Johan Marien, Albert Wambecq. 529-533 [doi]
- MIS Protocol for Secure Connection and Fast Handover on Wireless LANHitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, Masataka Ohta. 533-540 [doi]
- Service Discovery Mechanism Over OLSR for Mobile Ad-hoc NetworksJose Luis Jodra, Maribel Vara, Jose Ma Cabero, Josu Bagazgoitia. 534-542 [doi]
- Time Scaling Analysis of Jitter Propagation PropertyTakuo Nakashima. 541-546 [doi]
- Resource Adaptation for Audio-Visual Devices in the UPnP QoS ArchitectureMichael Ditze, Torsten Bresser, Frank Berger. 543-547 [doi]
- BPB: A method for transparently obtaining network path characteristics close to the senderSven Hessler, Jean-Alexander Müller, Michael Welzl. 547-552 [doi]
- A Broker Concept for the Adaptation of Nomadic Access to Multimedia Content Delivery ServicesFrank Berger, Heinz-Josef Eikerling. 548-554 [doi]
- A Fast Adaptive Statistical Genetic Motion Search Algorithm for H.264/AVC^1Tianbing Xu, Weidong Chen. 553-558 [doi]
- Towards an Unified Experimentation Framework for Protocol EngineeringLaurent Dairaine, Ernesto Exposito, Herve Thalmensy. 555-559 [doi]
- Performance Analysis of Buffer Allocation Schemes under Heterogeneous Traffic with Individual ThresholdsLan Wang, Geyong Min, Irfan Awan. 559-564 [doi]
- EQ-BGP: an efficient inter-domain QoS routing protocolAndrzej Beben. 560-564 [doi]
- The Packet Loss Effect on MPEG Video Transmission in Wireless NetworksCheng-Han Lin, Chih-Heng Ke, Ce-Kuen Shieh, Naveen K. Chilamkurti. 565-572 [doi]
- A user-based approach for the choice of the IP services in the multi domains DiffServ InternetChristophe Chassot, André Lozes, Florin Racaru, Guillaume Auriol. 565-572 [doi]
- Self-Orchestration and Choreography: Towards Architecture-Agnostic Manufacturing SystemsIvan M. Delamer, Jose L. Martinez Lastra. 573-582 [doi]
- Bandwidth allocation and pricing in multimode networkJyrki Joutsensalo, Ari Viinikainen, Mika Wikström, Timo Hämäläinen. 573-578 [doi]
- Traffic Distribution over Equal-Cost-Multi-Paths using LRU-based Caching with Counting SchemeWei Lin, Bin Liu, Yi Tang. 579-584 [doi]
- A Preliminary Work on Evolutionary Identification of Protein Variants and New Proteins on GridsJean-Charles Boisson, Laetitia Jourdan, El-Ghazali Talbi, Christian Rolando. 583-587 [doi]
- Context and Time Dependent Risk Based Decision MakingOmar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh. 585-590 [doi]
- A Parallel Classification Method for Genomic and Proteomic ProblemsMario R. Guarracino, Claudio Cifarelli, Onur Seref, Panos M. Pardalos. 588-592 [doi]
- An Efficient Transaction Commit Protocol for Composite Web ServicesMuhammad Younas, Chi-Chun Lo, Yinsheng Li. 591-596 [doi]
- Parameters Estimation by Differential Evolutionary Algorithms for Simulation of metabolic pathways in Escherichia coliChristophe Chassagnole, Andrei Doncescu, Laurent Manyri, Laurence Tianruo Yang. 593-598 [doi]
- A Real Trading Model based Price Negotiation AgentsYoshizo Ishihara, Runhe Huang, Jianhua Ma. 597-604 [doi]
- Parallel Numerical Solution to Large-Scale Eigenvalue Problem in Master Equation of Protein Folding KineticsYiming Li, Shao-Ming Yu. 599-606 [doi]
- A Mini-Slot Router Architecture for TDM Optical WDM NetworksYoong Cheah Huei, Pung Hung Keng. 605-610 [doi]
- A web architecture for data mining in biologyAndrei Doncescu, Muhammad Farmer, Katsumi Inoue, Gilles Richard. 607-612 [doi]
- Adaptive Object Placement in Object-Based Storage Systems with Minimal Blocking ProbabilityDan Feng, Lingjun Qin. 611-616 [doi]
- A Novel Computational Framework for Fast Distributed Computing and Knowledge Integration for Microarray Gene Expression Data AnalysisPrerna Sethi, Chokchai Leangsuksun. 613-617 [doi]
- Semi-blind Joint Data Equalization and Channel Estimation for Meteor Burst CommunicationZan Li, Jian Shen, Jueting Cai, Jueping Cai. 617-622 [doi]
- Partitioned optimization algorithms for multiple sequence alignmentYixin Chen, Yi Pan, Juan Chen, Wei Liu, Ling Chen. 618-622 [doi]
- Bounding Delay through a Buffer using Dynamic Queue ThresholdsLin Guan, Michael E. Woodward, Irfan-Ullah Awan. 623-628 [doi]
- On Optimization and Parallelization of Fuzzy Connected Segmentation for Medical ImagingChristopher Gammage, Vipin Chaudhary. 623-627 [doi]
- Accelerating HMMer searches on Opteron processors with minimally invasive recodingJoseph I. Landman, Joydeep Ray, John Paul Walters. 628-636 [doi]
- On Performance of Parallel iSCSI Protocol for Networked Storage SystemsQing (Ken) Yang. 629-636 [doi]
- Communication between Outdoor Field and Immersive Virtual EnvironmentTetsuro Ogi, Tetsuro Fujise. 637-641 [doi]
- Statistically Delay-Guaranteed, Energy-Optimal Data Delivery Scheme inWireless Sensor NetworksSeungkyu Bac, Cheeha Kim. 637-642 [doi]
- Constructing Virtual Air Hockey Game through the NetworkHiroaki Matsuura, Norihiro Abe, Kazuaki Tanaka, Hirokazu Taki. 642-646 [doi]
- Distributed Tuning Attempt Probability for Data Gathering in Random Access Wireless Sensor NetworksHaibo Zhang, Hong Shen. 643-648 [doi]
- Study on Eye-to-Eye Contact by Multi-Viewpoint Videos Merging System for Tele-immersive EnvironmentYasuo Ebara, Tetsuya Nabuchi, Naohisa Sakamoto, Koji Koyamada. 647-654 [doi]
- Virtual Grid Spatial Reusing Algorithm for MAC Address Assignment in Wireless Sensor NetetworkYe Tian, Min Sheng, Jiandong Li. 649-656 [doi]
- Design and Implementation for A Bimanual Input System on Virtual EnvironmentsTomoki Yoshihisa, Koji Koyamada, Yukio Yasuhara, Masahiko Tsukamoto. 655-659 [doi]
- A Dangerous Location Aware System for Assisting Kids Safety CareKatsuhiro Takata, Jianhua Ma, Bernady O. Apduhan. 657-662 [doi]
- Scalable Collaborative Virtual Environment Considering User s Interest InformationYushi Nakai, Naoki Kamon, Yoshitaka Shibata. 660-664 [doi]
- A Ubiquitous Education Support Method based on Analysis of Learning Patterns Using Rule-Based ReasoningShengguo Sun, Mizuo Kansen, Qiu Han, Tongjun Huang, Aiguo He, Zixue Cheng. 663-668 [doi]
- Method of Sharing Virtual Traditional Crafting System Based on High-Speed NetworkTomoyuki Ishida, Yoshitaka Shibata, Akihiro Miyakawa, Yuji Ohhashi. 665-672 [doi]
- Enhancing Ontology-based Context Modeling with Temporal Vector Space for Ubiquitous IntelligenceShermann S.-M. Chan, Qun Jin. 669-674 [doi]
- Voice and gesture recognition system facilitating Communication between man and virtual agentTatsuya Yoshikawa, Norihiro Abe, Hirokazu Taki, Shoujie He, Shunji Uchino, Kazuaki Tanaka, Tetsuya Yagi. 673-677 [doi]
- Performance-related Ontologies for Ubiquitous Intelligence based on Semantic Web ApplicationsIsaac Lera, Carlos Juiz, Ramón Puigjaner. 675-682 [doi]
- Simplification of Texture in 3D MapsMasahiro Okuda, Ishtiaq Rasool Khan. 678-682 [doi]
- VR Object Composition Method Using Stereo VisionKaoru Sugita. 683-687 [doi]
- Efficient Error Recovery for Multimedia Data Transmission over 3G Cellular Broadcast NetworksJoonho Lee, Kyungtae Kang, Yongwoo Cho, Junu Kim, Heonshik Shin. 683-688 [doi]
- Towards Artificial Communication Partners with Kansei Eri Tauchi, Kaoru Sugita, Genci Capi, Masao Yokota. 688-696 [doi]
- Network and System Performance Management for Next Generation NetworksOlli Alanen, Timo Hämäläinen, Eero Wallenius. 689-692 [doi]
- Parallel GroupBy-Before-Join Query Processing for High Performance Parallel/Distributed Database SystemsDavid Taniar, J. Wenny Rahayu. 693-700 [doi]
- Anti-loop Probing: Achieving Fast BGP ConvergenceLei Li, Changjia Chen. 697-701 [doi]
- The Design and Implementation of a P2P-Based Composite Event Notification SystemSimon Courtenage, Steven Williams. 701-706 [doi]
- A Multilayer Topic-Group based P2P NetworkSyuYang Chen, Wen-Hsien Tseng, Hsing Mei. 702-706 [doi]
- An Interested-based Architecture for Peer-to-Peer Network SystemsWen-Tsuen Chen, Chi-Hong Chao, Jeng-Long Chiang. 707-712 [doi]
- Scalable Information Sharing Utilizing Decentralized P2P Networking Integrated with Centralized Personal and Group Media ToolsGuozhen Zhang, Qun Jin. 707-711 [doi]
- BGP oscillations when peering with loopback addressesMalin Carlzon. 712-718 [doi]
- Multi-Node Global Directory Construction in Peer-to-Peer SystemsInSung Kang, HongSoo Kim, SungJin Choi, MaengSoon Baik, Chong-Sun Hwang. 713-720 [doi]
- A Reputation-Chain Trust Model for the Semantic WebYu Zhang, Huajun Chen, Zhaohui Wu, Xiaoqing Zheng. 719-723 [doi]
- Supporting Runtime Reconfiguration on Network ProcessorsKevin Lee, Geoffrey Coulson. 721-726 [doi]
- Query Optimization Method Based on Automaton for Content-based FilteringTong Wang, Da-xin Liu, Xuan-Zuo Lin. 724-728 [doi]
- IN-managed SIP network: A Case Study in Network ConvergenceNatalia Kryvinska, Do Van Thanh. 727-732 [doi]
- An Ontological Approach for Personalized ServicesCláudia M. F. A. Ribeiro, Nelson S. Rosa, Paulo Roberto Freire Cunha. 729-733 [doi]
- Emergent Topology Control Based on Division of Labour in AntsPeter Janacik, Tales Heimfarth, Franz J. Rammig. 733-740 [doi]
- A Hybrid Rule-Based/Case-Based Reasoning Approach for Service Fault DiagnosisAndreas Hanemann. 734-740 [doi]
- A secure improvement on the user-friendly remote authentication scheme with no time concurrency mechYa-Fen Chang, Chin-Chen Chang, Yu-Wei Su. 741-745 [doi]
- A cross-layer feature for an efficient forwarding strategy in wireless ad hoc networksLamia Romdhani, Christian Bonnet. 741-746 [doi]
- A MAS Security Framework Implementing Reputation Based Policies and Owners Access ControlSalvatore Vitabile, Giovanni Milici, S. Scolaro, Filippo Sorbello, Giovanni Pilato. 746-752 [doi]
- On Avoiding RTS Collisions for IEEE 802.11-BasedWireless Ad Hoc NetworksKuei-Ping Shih, Chih-Yung Chang, Hung-Chang Chen, Chien-Wen Chang. 747-752 [doi]
- Location Management of Replicas Considering Data Update in Ad Hoc NetworksTakahiro Hara. 753-758 [doi]
- A Macro-level Distributed Method for the Efficient Allocation of Zones in the InternetAshraf Uddin Ahmed, Satoshi Itaya, Keiji Ozaki, Naohiro Hayashibara, Makoto Takizawa. 753-757 [doi]
- On-Demand Multipath Routing Protocol with Preferential Path Selection Probabilities for MANETFang Jing, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi. 758-762 [doi]
- Tuning Rules in TCP Congestion Control on the Mobile Ad Hoc NetworksShin-Jer Yang, Yung-Chieh Lin. 759-766 [doi]
- Performance Comparison of Partially Adaptive Routing AlgorithmsAhmad Patooghy, Hamid Sarbazi-Azad. 763-767 [doi]
- Querying Registry-Published Mathematical Web ServicesRebhi Baraka, Wolfgang Schreiner. 767-772 [doi]
- Implementing Priority Scheduling in a Combined Input-Crosspoint-Output Queued SwitchPeng Yi, Han Qiu, Binqiang Wang. 768-774 [doi]
- An Analysis of Internet Data Update BehaviorsJohn P. Sustersic, Ali R. Hurson, Robert M. Nickel. 773-778 [doi]
- A Context Ontology for Pervasive Service ProvisionMaria Strimpakou, Ioanna Roussaki, Miltiades E. Anagnostou. 775-779 [doi]
- Word Sense Determination using WordNet and Sense Co-occurrenceChe-Yu Yang, Jason C. Hung. 779-784 [doi]
- Bridging the E-Gaps: Towards Post-Ubiquitous ComputingTakuo Suganuma, Takahiro Uchiya, Norio Shiratori, Susumu Konno, Gen Kitagata, Tetsuo Kinoshita, Hideki Hara, Shigeru Fujita, Kenji Sugawara. 780-784 [doi]
- On Promoting Ad-Hoc Collaboration Among MessengersZakaria Maamar, Qusay H. Mahmoud, Abdelouahid Derhab. 785-790 [doi]
- Distributing Users with Profile and Buffer Constraint in Enterprise SystemsPing-Ho Ting, Kuan-Ching Li, Ping-Yu Hsu, Chun-Chung Wei, Hsiang-Kai Liao. 785-792 [doi]
- Fuzzy Consensus on QoS in Web Services DiscoveryWei-Li Lin, Chi-Chun Lo, Kuo-Ming Chao, Muhammad Younas. 791-798 [doi]
- Modeling, Predicting and Optimizing Redistribution between Clusters on Low Latency NetworksEmmanuel Jeannot, Frédéric Wagner. 793-797 [doi]
- A Method for PAPR Reduction in MSE-OFDM SystemsEnchang Sun, Kechu Yi, Bin Tian, Xianbin Wang. 798-801 [doi]
- A Study for Providing Better Quality of Service to VoIP UsersYan Bai, Mabo Robert Ito. 799-804 [doi]
- Iterative Parameter Estimation in MIMO Flat-fading Channels with Frequency OffsetsZhuo Lu, Jiandong Li, Linjing Zhao, Jiyong Pang. 802-805 [doi]
- Experiments with QoS-Aware Gaming-on-Demand ServiceJukka-Pekka Laulajainen, Tiia Sutinen, Sari Jarvinen. 805-810 [doi]
- Power Allocation and Modulation in MIMO System With Channel Mean FeedbackLiu Yi, Hailin Zhang. 806-808 [doi]
- Carrier-Frequency Offsets Estimation Based on ML and ESPRIT Method for OFDMA UplinkLinjing Zhao, Jiandong Li, Zhuo Lu, Jiyong Pang. 809-816 [doi]
- Probabilistic QoS Routing inWiFi P2P NetworksSathish Rajasekhar, Ibrahim Khalil, Zahir Tari. 811-816 [doi]
- ABF-TDMA: an Adaptive Beamforming TDMA Protocol for Mobile Ad Hoc NetworksGuanghui Zhang, Jiandong Li, Changle Li, Lei Zhou. 817-821 [doi]
- Providing Quality of Service in IEEE 802.11 WLANChunming Liu, Chi Zhou. 817-824 [doi]
- A Novel Power Control Multiple Access Protocol for Ad Hoc Networks with Directional AntennasXiaodong Zhou, Jiandong Li, Dongfang Zhao. 822-826 [doi]
- The Impact of End-to-end vs. Link-layer Mechanisms on Real-Time Performance over Wireless LinksPanagiotis Papadimitriou, Vassilis Tsaoussidis, Ageliki Tsioliaridou. 825-830 [doi]
- Asynchronous Leader Election in Mobile Ad Hoc NetworksSalahuddin Mohammad Masum, Amin Ahsan Ali, Mohammad Touhid-youl Islam Bhuiyan. 827-831 [doi]
- Combinatorial Fusion Criteria for Real-Time TrackingD. Frank Hsu, Damian M. Lyons, Jizhou Ai. 831-838 [doi]
- Asynchronous /ell-Exclusives in Mobile Ad Hoc NetworksSalahuddin Mohammad Masum, Amin Ahsan Ali. 832-838 [doi]
- Multiple access protocol for WLAN based on adaptive token passing with fairness guaranteeChen Dong, Jiandong Li, Jing Ma. 839-843 [doi]
- Call Admission Control Scheme with Bandwidth Borrowing in Integrated Services NetworkTae-Chul Hong, Kun Seok Kang, Do-Seob Ahn, Hojin Lee. 839-844 [doi]
- Reliable Transmission of H.264 Video over Wireless NetworkSong Xiao, Chengke Wu, Jianchao Du, Yadong Yang. 844-848 [doi]
- An Enhanced Congestion Control Mechanism in InfiniBand Networks for High Performance Computing SystemsShihang Yan, Geyong Min, Irfan Awan. 845-850 [doi]
- Security Analysis of Flow-based Fast Handover Method for Mobile IPv6 NetworksTewolde Ghebregziabher, Jani Puttonen, Timo Hämäläinen, Ari Viinikainen. 849-853 [doi]
- Vulnerabilities of Internet Access Mechanisms from Mobile Ad Hoc NetworksGautam Das, Maria Fazio, Massimo Villari, Antonio Puliafito. 851-858 [doi]
- An Alternative Approach to Multi-Path Forwarding on IPv6 NetworksHideaki Imaizumi, Hiroyuki Morikawa, Osamu Nakamura, Jun Murai, Tomonori Aoyama. 854-860 [doi]
- Methods to Forge ElGamal Signatures and Determine Secret KeyJingmei Liu, Xiangguo Cheng, Xinmei Wang. 859-862 [doi]
- Design of a MidO2PL Database Replication Protocol in the MADIS Middleware ArchitectureJosé Enrique Armendáriz-Iñigo, José Ramón Garitagoitia, José Ramón González de Mendívil, Francesc D. Muñoz-Escoí. 861-865 [doi]
- Authenticating Video StreamsShintaro Ueda, Shin-ichiro Kaneko, Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada. 863-868 [doi]
- Distributed Model-Based Diagnosis using Object-Relational Constraint DatabasesMaría Teresa Gómez López, Rafael M. Gasca, Carmelo Del Valle, Sergio Pozo. 866-870 [doi]
- On Compromising Password-Based Authentication over HTTPSTakamichi Saito, Ryosuke Hatsugai, Toshiyuki Kito. 869-874 [doi]
- Lysa, a Distributed Collaborative Multiple Users Interface for Exploring Genomics DatabasesPierre-Emmanuel Gros, Nicolas Férey, Joan Hérisson, Rachid Gherbi. 871-875 [doi]
- Improvement of a Convertible Undeniable Partially Blind Signature SchemeSong Han, Tharam S. Dillon, Elizabeth Chang, Jie Wang. 875-882 [doi]
- A New Index Structure for Querying Association RulesShaimaa Y. Lazem, Noha Adly, Magdy Nagi. 876-880 [doi]
- iVISA: A Framework for Flexible Layout Block-level Storage SystemJianxi Chen, Dan Feng, Zhan Shi. 881-888 [doi]
- Feedback-basedWorm ContainmentSanjeev Dwivedi. 883-888 [doi]
- A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-intervalPing Wang, Kuo-Ming Chao, Chun-Lung Huang, Chi-Chun Lo, Chia-Ling Hu. 889-893 [doi]
- A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile EnvironmentGlenn Mansfield Keeni, Kazuhide Koide, Takeo Saitoh, Norio Shiratori. 889-894 [doi]
- On a Watermarking Scheme for MusicXMLAtsumu Watanabe, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata. 894-898 [doi]
- SENS: A Scalable and Expressive Naming System using CAN Routing AlgorithmHoaison Nguyen, Toshio Oka, Hiroyuki Morikawa, Tomonori Aoyama. 895-900 [doi]
- SCORM Sequencing Testing for Sequencing Control ModeHsuan-Pu Chang, Kuen Han Jan, Timothy K. Shih, Chun-Chia Wang. 899-906 [doi]
- ACTM: Anomaly Connection Tree Method to detect Silent WormsNobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada. 901-908 [doi]
- A Fault-Tolerant Transactional Agent Model on Distributed Object SystemsYouhei Tanaka, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido. 907-911 [doi]
- Novel WPDM System Based on Channel Equalization for Multipath Fading ChannelsLei Zhou, Jiandong Li, Peng He. 909-914 [doi]
- Plan Specification of Multi-agent based on Coloured Petri NetsZhuomin Du, Yanxiang He. 912-916 [doi]
- Adaptive Power Control using Channel State Information Gradient for Mobile Radio SystemsL. Wang, C. C. Tsimenidis, A. E. Adams. 915-919 [doi]
- Service Invocation Triggers: A Lightweight Routing Infrastructure for Decentralized Workflow OrchestrationWalter Binder, Ion Constantinescu, Boi Faltings. 917-921 [doi]
- Multi-hop Mesh Networking for UWB-based 802.15.3 Coverage ExtensionZhong Fan. 920-925 [doi]
- Automatic Forecasting Agent for e-Commerce ApplicationsWen-ying Guo, De-ren Chen, Timothy K. Shih. 923 [doi]
- An On-demand Key Establishment Protocol for MANETsMounis Khatib, Khaled Masmoudi, Hossam Afifi. 924 [doi]
- Efficient Packet Matching for Gigabit Network Intrusion Detection using TCAMsMing Gao, Kenong Zhang, Jiahua Lu. 925 [doi]
- Optimized Integrated Registration Procedure of Mobile IP and SIP with AAA OperationsPeng Xu, Jianxin Liao, Xiao-Ping Wen, Xiaomin Zhu. 926-931 [doi]
- A Framework for Measurement of End-To-End Qos Requirements in Loosely Coupled SystemsK. Kalapriya, S. K. Nandy, Nanjangud C. Narendra. 926 [doi]
- Supporting IP End-to-End QoS Architectures at Vertical HandoversPekka Ruuska, Jarmo Prokkola. 927 [doi]
- A New Approach for Locating Mobile Stations under the Statistical Directional Propagation ModelKenneth Man-Kin Chu, Joseph Kee-Yin Ng, Karl R. P. H. Leung. 932-940 [doi]
- Using Temporary Properties to Provide Leasing Functionality in CORBAMarkus Aleksy, Axel Korthaus. 941-946 [doi]
- Performance Analysis of iSCSI Middleware Optimized for Encryption Processing in a Long-Latency EnvironmentKikuko Kamisaka, Saneyasu Yamaguchi, Masato Oguchi. 947-952 [doi]
- An Integrated Middleware Architecture For Digital Data BroadcastingHa Yoon Song, Hyun-Cheol Hwang. 953-958 [doi]
- QoS Specification and Management in a Middleware for Distributed Multimedia SystemsAdilson B. Lopes, Frederico Amaro, Glêdson Elias da Silveira, Guido Lemos, Maurício F. Magalhães. 959-964 [doi]
- A Flexible Middleware System for High Definition Omni-directional Video Transmission over IP NetworkYuya Maita, Koji Hashimoto, Yoshitaka Shibata. 965-972 [doi]
- A Scalable Anonymous Server Overlay NetworkHenry Tsai, Aaron Harwood. 973-978 [doi]
- Secrecy Analysis of Purchase Transaction in Electronic PursesIl-Gon Kim, Hyun Seok Kim, Ji Yeon Lee, Jin-Young Choi, Inhye Kang. 979-984 [doi]
- Towards an Ontology-based Security ManagementBill Tsoumas, Dimitris Gritzalis. 985-992 [doi]
- Peer-to-Peer Usage Analysis: a Distributed Mining ApproachFlorent Masseglia, Pascal Poncelet, Maguelonne Teisseire. 993-998 [doi]
- Peer-Tree: A Hybrid Peer-to-Peer Overlay for Service DiscoveryJing Tie, Hai Jin, Shengli Li, Xuanhua Shi, Hanhua Chen, Xiaoming Ning. 999-1004 [doi]
- A Demand and Contribution Based Bandwidth Allocation Mechanism in P2P Networks: A Game-Theoretic AnalysisHuiye Ma, Ho-Fung Leung. 1005-1010 [doi]
- Load Sharing in Peer-to-Peer Networks using Dynamic ReplicationSathish Rajasekhar, Bin Rong, Kwong Yuen Lai, Ibrahim Khalil, Zahir Tari. 1011-1016 [doi]