Abstract is missing.
- Improving QoS through Network Real-Time Measurement and Self-AdaptionErol Gelenbe. 1 [doi]
- Wormholes of Communication: Interfacing Virtual Worlds and the Real WorldAlessandro Campi, Georg Gottlob, Ben Hoye. 2-9 [doi]
- Location-Aware Authentication and Access ControlElisa Bertino, Michael S. Kirkpatrick. 10-15 [doi]
- Evaluating the Performance of Network Protocol Processing on Multi-core SystemsMatthew Faulkner, Andrew Brampton, Stephen Pink. 16-23 [doi]
- Modeling Web Request and Session Level ArrivalsXuan Wang, Katerina Goseva-Popstojanova. 24-32 [doi]
- Predictive Simulation of HPC ApplicationsSimon D. Hammond, J. A. Smith, Gihan R. Mudalige, Stephen A. Jarvis. 33-40 [doi]
- Modelling Network Performance with a Spatial Stochastic Process AlgebraVashti Galpin. 41-49 [doi]
- An Evaluation of Routing Reliability in Non-collaborative Opportunistic NetworksLing-Jyh Chen, Che-Liang Chiou, Yi-Chao Chen. 50-57 [doi]
- Parameterised Gradient Based Routing (PGBR) for Future InternetSasitharan Balasubramaniam, Dmitri Botvich, Julien Mineraud, William Donnelly. 58-65 [doi]
- A New Counting Scheme for Multicast Broadcast Service with WiBroNak Beom Sung, Kyung Tae Kim, Sun Sik Park, Hee Yong Youn. 66-73 [doi]
- Analyzing the Hold Time Schemes to Limit the Routing Table Calculations in OSPF ProtocolMukul Goyal, Mohd Soperi, Hossein Hosseini, Kishor S. Trivedi, A. Shaikh, G. Choudhury. 74-81 [doi]
- Real-Time Task Assignment in Heterogeneous Distributed Systems with Rechargeable BatteriesJian (Denny) Lin, Albert M. K. Cheng, Rashmi Kumar. 82-89 [doi]
- Distributed Secure Virtual File System Using Hysteresis SignaturesShin Tezuka, Hiroko Tomori, Ryuya Uda, Ken-ichi Okada. 90-97 [doi]
- Quarc: A High-Efficiency Network on-Chip ArchitectureMahmoud Moadeli, Partha P. Maji, Wim Vanderbauwhede. 98-105 [doi]
- Fair Scheduling with Multiple Gateways in Wireless Mesh NetworksJason B. Ernst, Mieso K. Denko. 106-112 [doi]
- Business Compliance Governance in Service-Oriented ArchitecturesFlorian Daniel, Fabio Casati, Vincenzo D Andrea, Emmanuel Mulo, Uwe Zdun, Schahram Dustdar, Steve Strauch, David Schumm, Frank Leymann, Samir Sebahi, Fabien De Marchi, Mohand-Said Hacid. 113-120 [doi]
- DAVO: A Domain-Adaptable, Visual BPEL4WS OrchestratorTim Dörnemann, Markus Mathes, Roland Schwarzkopf, Ernst Juhnke, Bernd Freisleben. 121-128 [doi]
- A Generic Database Web Service for the Venice Service GridMichael Koch, Markus Hillenbrand, Paul Müller. 129-136 [doi]
- Trust Requirements in Identity Federation TopologiesUwe Kylau, Ivonne Thomas, Michael Menzel, Christoph Meinel. 137-145 [doi]
- Combined On-line and Off-line Trust Mechanism for Agent ComputingBabak Khosravifar, Jamal Bentahar, Maziar Gomrokchi, Philippe Thiran. 146-153 [doi]
- A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection SystemsVarsha Sainani, Mei-Ling Shyu. 154-161 [doi]
- An Ontology-Based Architecture for Federated Identity ManagementFarah Layouni, Yann Pollet. 162-166 [doi]
- Trust Management in Emergency NetworksArjan Durresi, Mimoza Durresi, Vamsi Paruchuri, Leonard Barolli. 167-174 [doi]
- An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video TransmissionYoong Choon Chang, Sze-Wei Lee, Ryoichi Komiya. 175-181 [doi]
- Adaptive FEC Algorithm Based on Prediction of Video Quality and Bandwidth Utilization RatioJiao Feng, Xuefen Chi, Peng Li, Wang Yining, Lin Guan. 182-188 [doi]
- Content-Adaptive Robust H.264/SVC Video Communications over 802.11e NetworksDario Gallucci, Attilio Fiandrotti, Enrico Masala, Juan Carlos De Martin. 189-196 [doi]
- Heterogeneous Error Protection of H.264/AVC Video Using Hierarchical 16-QAMAhmed B. Abdurrhman, Michael E. Woodward. 197-200 [doi]
- Design of q-ary Irregular Repeat-Accumulate CodesWei Lin, Baoming Bai, Ying Li, Xiao Ma. 201-206 [doi]
- Design of Quasi-Cyclic LDPC Codes Based on Euclidean GeometriesYuan-Hua Liu, Xin-mei Wang, Jian-Hua Ma. 207-211 [doi]
- Multi-user MIMO Broadcast System Grouping Strategy Based on Particle Swarm OptimizationYong-qiang Hei, Xiao-hui Li, Ke-Chu Yi, Wen-tao Li. 212-216 [doi]
- ANFIS Based AQM Controller for Congestion ControlRafe Khalaf Alasem, M. Alamgir Hossain, Irfan Awan, Hussein Mansour. 217-224 [doi]
- Probabilistic Network Fault-Diagnosis Using Cross-Layer ObservationsAnders Nickelsen, Jesper Grønbæk, Thibault Renier, Hans-Peter Schwefel. 225-232 [doi]
- An Overlay Application-Layer Multicast InfrastructureDaniel C. Uchôa, Samuel Kopp, Helcio M. Pimentel, Reinaldo Matushima, Regina Melo Silveira. 233-240 [doi]
- A Measurement Study on Peer Behaviors for a Pure P2P NetworkSatoshi Ohzahata, Konosuke Kawashima. 241-248 [doi]
- N-nary RAID: 3-resilient RAID Based on an N-nary NumberKatsuyoshi Matsumoto, Minoru Uehara. 249-255 [doi]
- Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling SystemsXing Zhou, Thomas Dreibholz, Fu Fa, Wencai Du, Erwin P. Rathgeb. 256-262 [doi]
- A Pipelined IP Forwarding Engine with Fast UpdateYeim-Kuan Chang, Yen-Cheng Liu, Fang-Chen Kuo. 263-269 [doi]
- DINCast: Optimizing Application-Level Shared-Tree MulticastHuaqun Guo, Lek Heng Ngoh, W. C. Wong, Ping Yang, Nazreen Beevi. 270-277 [doi]
- A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-TreeYeim-Kuan Chang, Yung-Chieh Lin. 278-284 [doi]
- Optimized Broadcast in a Geographical Area of Wireless Ad Hoc and Sensor NetworksIbrahim Amadou, Pascale Minet. 285-292 [doi]
- A Resource Discovery Scheme for Large Scale Ad Hoc Networks Using a Hypercube-Based BackboneLyes Dekar, Hamamache Kheddouci. 293-300 [doi]
- Energy Efficiency: Optimal Transmission Range with Topology Management in Rectangular Ad-hoc Wireless NetworksWei Feng, Hamada Alshaer, Jaafar M. H. Elmirghani. 301-306 [doi]
- Performance Analysis of OLSR and BATMAN Protocols Considering Link Quality ParameterLeonard Barolli, Makoto Ikeda, Giuseppe De Marco, Arjan Durresi, Fatos Xhafa. 307-314 [doi]
- A Communication Model of Broadcast in Wormhole-Routed Networks on-ChipMahmoud Moadeli, Wim Vanderbauwhede. 315-322 [doi]
- An Experimental Evaluation of Sender-Side TCP Enhancements for Wired-to-Wireless Paths: A Real-World Home WLAN Case StudyRitesh Taank, Xiaohong Peng. 323-330 [doi]
- QoS Enhancements and Performance Analysis for Delay Sensitive ApplicationsJ. Wang, Lin Guan, Xin Gang Wang, A. Grigg, Irfan Awan, Iain C. C. Phillips, Xuefen Chi. 331-338 [doi]
- An Efficient Admission Control Methodology for Satisfying QoS Requirements in NGN NetworksCherif Ghazel, Leila Saidane. 339-346 [doi]
- A Secure Revised Simplex Algorithm for Privacy-Preserving Linear ProgrammingJaideep Vaidya. 347-354 [doi]
- Trustworthiness Assessment of Wireless Sensor Data for Business ApplicationsLaurent Gomez, Annett Laube, Alessandro Sorniotti. 355-362 [doi]
- Key Management in Web of Trust for Mobile Ad Hoc NetworksHisham Dahshan, James Irvine. 363-370 [doi]
- Enabling Fast Bootstrap of Reputation in P2P Mobile NetworksRoberto G. Cascella. 371-378 [doi]
- A Survey and Analysis on Semantics in QoS for Web ServicesVuong Xuan Tran, Hidekazu Tsuji. 379-385 [doi]
- Exploiting Request Characteristics to Improve Performance of Web Services Based Business ApplicationsYizhu Tong, Hao Wang, Taoying Liu. 386-393 [doi]
- Massively Scalable Web Service DiscoveryGeorge Anadiotis, Spyros Kotoulas, Holger Lausen, Ronny Siebes. 394-402 [doi]
- Towards an Approach to Defining Capacity-Driven Web ServiceZakaria Maamar, Samir Tata, Djamel Belaïd, Khouloud Boukadi. 403-410 [doi]
- Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GAXiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su. 411-418 [doi]
- A Highly Available Grid Metadata CatalogHenrik Thostrup Jensen, Josva Kleist. 419-426 [doi]
- Transaction Management for Reliable Grid ApplicationsFeilong Tang, Minyi Guo, Minglu Li, Li Li. 427-434 [doi]
- Brain Image Registration Analysis Workflow for fMRI Studies on Global GridsSuraj Pandey, William Voorsluys, Mustafizur Rahman 0003, Rajkumar Buyya, James E. Dobson, Kenneth Chiu. 435-442 [doi]
- Name Resolution Middleware Using Relative Positional Relationship to Support Wireless Visible Area CommunicationAtsushi Noda, Teruaki Kitasuka, Shigeaki Tagashira, Tsuneo Nakanishi, Akira Fukuda. 443-450 [doi]
- Data Dissemination with Drop BoxesMun J. Lok, Bilal R. Qazi, Jaafar M. H. Elmirghani. 451-455 [doi]
- A Proposal to Enhance and Control Continuous Communications in Proxy Mobile IPv6Joon-Suk Kang, Motoyuki Ohmori, Koji Okamura. 456-462 [doi]
- Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless NetworksOkan Yilmaz, Ing-Ray Chen. 463-470 [doi]
- JPEG Steganography: A Performance Evaluation of Quantization TablesAdel Almohammad, Gheorghita Ghinea, Robert M. Hierons. 471-478 [doi]
- Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia ObjectsAlireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa. 479-486 [doi]
- PHDMarcos Antonio Simplicio Jr., Vlad Coroama, Yeda R. Venturini, Tereza Cristina M. B. Carvalho, Mats Näslund, Makan Pourzandi. 487-494 [doi]
- The Efficiency Method of Sanitizable Signature Scheme for SMFHirokazu Miyata, Ryuya Uda, Ken-ichi Okada. 495-502 [doi]
- Situation-Aware Adaptive Recommendation to Assist Mobile Users in a Campus EnvironmentAmel Bouzeghoub, Kien Ngoc Do, Leandro Krug Wives. 503-509 [doi]
- Tracking Anonymous Sinks in Wireless Sensor NetworksElhadi Shakshuki, Tarek R. Sheltami, Nan Kang, Xinyu Xing. 510-516 [doi]
- Sensor Data Fusion Using DSm Theory for Activity Recognition under Uncertainty in Home-Based CareHyun Lee, Jae Sung Choi, Ramez Elmasri. 517-524 [doi]
- A Distributed Dynamic Adaptation Model for Component-Based ApplicationsMaria-Teresa Segarra, Françoise André. 525-529 [doi]
- Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh NetworksStephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann. 530-538 [doi]
- Fuzzy ESVDF Approach for Intrusion Detection SystemsSafaa Zaman, Fakhri Karray. 539-545 [doi]
- Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone IntrusionGuoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long Ni, Shou-Hsuan Stephen Huang. 546-551 [doi]
- Masquerade Detection Using Command Prediction and Association Rules MiningHan-Ching Wu, Shou-Hsuan Stephen Huang. 552-559 [doi]
- Route Construction Based on Measured Characteristics of Radio Propagation in Wireless Sensor NetworksYasuhiro Nose, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 560-567 [doi]
- An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford ProtocolMohammad Baharloo, Reza Hajisheykhi, Mohammad Arjomand, Amir-Hossein Jahangir. 568-571 [doi]
- Information Communication Mechanism for Loosely Coupled Mobile User Groups in Wireless Sensor FieldsSoochang Park, Euisin Lee, Fucai Yu, Min-Sook Jin, Sang-Ha Kim. 572-579 [doi]
- Lessons Learned: Simulation Vs WSN DeploymentElhadi Shakshuki, Haroon Malik, Tarek R. Sheltami. 580-587 [doi]
- Similarity Search over DNS Query Streams for Email Worm DetectionNikolaos Chatzis, Nevil Brownlee. 588-595 [doi]
- ReAlSec: A Relational Language for Advanced Security EngineeringMohamed Hamdi, Nejla Essaddi, Noureddine Boudriga. 596-601 [doi]
- A New Video Surveillance Video Tracking System Based on Omni-directional and Network Controlled CamerasYosuke Sato, Koji Hashimoto, Yoshitaka Shibata. 602-607 [doi]
- Exclusion of Forged Files from Multi-source Downloadable P2P SystemsYuna Kim, Jong Kim, Junghei You, Heejae Park. 608-615 [doi]
- Packet Scheduling Algorithm with QoS Provision in HSDPAYing-Hong Wang, Kuo-Feng Huang, Cheng-Yi Le. 616-623 [doi]
- A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc NetworksKi-seok Lee, Cheeha Kim. 624-631 [doi]
- Privacy-Aware Routing Approach for Mobile ApplicationsMarkus Aleksy, Thomas Butter. 632-637 [doi]
- A New Space Time Cooperative Diversity Scheme Based on Simple FeedbackDe-chun Sun, Ke-Chu Yi, Xiao-hui Li. 638-643 [doi]
- On the Synchronization of Web Services InteractionsZakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Khouloud Boukadi, Xitong Li. 644-651 [doi]
- Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of AdaptersYehia Taher, Ali Aït-Bachir, Marie-Christine Fauvet, Djamal Benslimane. 652-659 [doi]
- Building Distributed Index for Semantic Web DataJuan Li. 660-667 [doi]
- Advantages of User Authentication Using Unclear ImagesTakumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki. 668-674 [doi]
- An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular NetworksJoseph Chee Ming Teo, Lek Heng Ngoh, Huaqun Guo. 675-682 [doi]
- IGMPx: Port Based Service Access Control for IP MulticastPrashant Pillai, Yim-Fun Hu. 683-690 [doi]
- A Hierarchical Model for Firewall Policy ExtractionEduardo Horowitz, LuÃs C. Lamb. 691-698 [doi]
- Improved 4-ary Query Tree Algorithm for Anti-Collision in RFID SystemYongHwan Kim, Sungsoo Kim, SeongJoon Lee, KwangSeon Ahn. 699-704 [doi]
- Mitigation of Intercarrier Interference Based on General Precoder Design in OFDM SystemsXia Wang, Shihua Zhu. 705-710 [doi]
- An Analytical Model for MAC Protocol Configuration in WLANSuhaimi Bin Abd Latif, M. A. Rashid, F. Alam. 711-718 [doi]
- Survivability in Existing ATM-Based Mesh NetworksIsaac Woungang, Guangyan Ma, Mieso K. Denko, Alireza Sadeghian, Sudip Misra, Alexander Ferworn. 719-724 [doi]
- Effects of On-path Buffering on TCP FairnessSaleem N. Bhatti, Martin Bateman. 725-732 [doi]
- Scalability Analysis to Optimize a Network on ChipMarta Beltrán, Antonio Guzmán, Fernando Sevillano. 733-740 [doi]
- Network Voronoi Diagram Based Range SearchKefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan, Maytham Safar, Marina L. Gavrilova. 741-748 [doi]
- Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic SensorsNobutoshi Abe, Norihiko Shinomiya, Yoshimi Teshigawara. 749-757 [doi]
- Sink Location Service via Inner Rectangular in Wireless Sensor NetworksHosung Park, Taehee Kim, Jeongcheol Lee, Min-Sook Jin, Sang-Ha Kim. 758-762 [doi]
- How Long is the Lifetime of a Wireless Sensor Network?Nok Hang Mak, Winston Khoon Guan Seah. 763-770 [doi]
- Medium Access Control in Large Scale Clusters for Wireless Sensor NetworksPedro N. E. S. Barbosa, Neil M. White, Nick R. Harris. 771-777 [doi]
- Finding Influential eBay Buyers for Viral MarketingHon Wai Lam, Chen Wu. 778-785 [doi]
- Priority Scheduling of Requests to Web PortalsD. R. W. Holton, Irfan-Ullah Awan, Muhammad Younas. 786-791 [doi]
- GBLT: Load Distribution Method for High Density by User Behavior in MMO Virtual EnvironmentRei Endo, Kenji Takagi, Hiroshi Shigeno. 792-799 [doi]
- Implementation of an E-learning System Using P2P, Web and Sensor TechnologiesKeita Matsuo, Leonard Barolli, Fatos Xhafa, Vladi Kolici, Akio Koyama, Arjan Durresi, Rozeta Miho. 800-807 [doi]
- Recoverable Cuts to Make Agreement among PeersAilixier Aikebaier, Valbona Barolli, Tomoya Enokido, Makoto Takizawa. 808-815 [doi]
- A New Ballooned Wireless Mesh Network System for Disaster UseYoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba, Kazuo Takahata. 816-821 [doi]
- Determining the Net Financial Risk for Decision Making in Business InteractionsOmar Khadeer Hussain, Tharam S. Dillon, Elizabeth Chang, Farookh Khadeer Hussain. 822-829 [doi]
- Fault-Tolerant Flocking of Mobile Robots with Whole Formation RotationYan Yang, Samia Souissi, Xavier Défago, Makoto Takizawa. 830-837 [doi]
- Testing the Symbian OS Platform Security ArchitectureThomas Badura, Michael Becher. 838-844 [doi]
- A Protocol for Releasing Purpose Marks to Prevent Illegal Information FlowTomoya Enokido, S. Misbah Deen, Makoto Takizawa. 845-852 [doi]
- Anomaly Detection for DNS Servers Using Frequent Host SelectionAkira Yamada, Yutaka Miyake, Masahiro Terabe, Kazuo Hashimoto, Nei Kato. 853-860 [doi]
- A Novel Cookie-Based DDoS Protection Scheme and its Performance AnalysisRongfei Zeng, Chuang Lin, Hongkun Yang, Yuanzhuo Wang, Yang Wang, Peter D. Ungsunan. 861-867 [doi]
- Introducing Group Participation Support into P2P Web Caching SystemsAkihiro Iwamaru, Tsuyoshi Itokawa, Teruaki Kitasuka, Masayoshi Aritsugi. 868-875 [doi]
- VirtCloud: Virtualising Network for Grid EnvironmentsDavid Antos, Ludek Matyska, Petr Holub, Jirà Sitera. 876-883 [doi]
- Spigot: Fragment-Level File Sharing and Consistency on GridsPo-Cheng Chen, Jyh-Biau Chang, Jia-Hao Yang, Yi-Chang Zhuang, Ce-Kuen Shieh. 884-891 [doi]
- DACA: Dynamic Anti-Cheating Architecture for MMOGsHuey-Ing Liu, Bing-Rong Tang. 892-897 [doi]
- DCM-Arch: An Architecture for Data, Control, and Management in Wireless Sensor NetworksQuan Le Trung, Amirhosein Taherkordi, Frank Eliassen, Hai Ngoc Pham, Tor Skeie, Paal E. Engelstad. 898-905 [doi]
- Effective Sensing Function Allocation Using a Distributed Graph Coloring and a Slot Allocation Algorithm in Wireless Sensor NetworksRyouhei Kawano, Toshiaki Miyazaki. 906-913 [doi]
- A Method for Determining Weight Reset Timing in a Wirelessly Networked Array with Independently Mobile ElementsWilliam A. Lintz, John C. McEachen, Murali Tummala. 914-920 [doi]
- Configuring Beaconless IEEE 802.15.4 Networks Under Different Traffic LoadsDawn Rohm, Mukul Goyal, Hossein Hosseini, August Divjak, Yusuf Bashir. 921-928 [doi]
- Classification of Bloggers Using Social AnnotationsShigeaki Sakurai, Hideki Tsutsui, Ryohei Orihara. 929-936 [doi]
- Supporting Complex Scientific Database Schemas in a Grid MiddlewareHelen X. Xiang. 937-944 [doi]
- Utilising Multimodal Interaction Metaphors in E-learning Applications: An Experimental StudyMarwan Alseid, Dimitrios Rigas. 945-950 [doi]
- A New Method of Proactive Recovery Mechanism for Large-Scale Network FailuresTakuro Horie, Go Hasegawa, Satoshi Kamei, Masayuki Murata. 951-958 [doi]
- An Approach to Find Maximal Disjoint Paths with Reliability and Delay ConstraintsRuen Chze Loh, Sieteng Soh, Mihai Lazarescu. 959-964 [doi]
- Implementation of Lightweight TCP/IP for Small, Wireless Embedded SystemsIn-Su Yoon, Sang-Hwa Chung, Jeong-Soo Kim. 965-970 [doi]
- On the False-Positive and False-Negative Behavior of a Soft-State Signaling ProtocolMelissa Tjiong, Johan Lukkien. 971-979 [doi]