Abstract is missing.
- Fuzzy Communication Leading to Equilibrium through Possibility MessagesTakashi Matsuhisa. 1-6 [doi]
- An Integrated Information Sharing Structure for Resuscitation DataKari Anne Haaland Thorsen, Trygve Eftestøl, Chunming Rong, Petter Andreas Steen. 7-12 [doi]
- Real-time Minute Change Detection on GPU for Cellular and Remote Sensor ImagingSinan Kockara, Tansel Halic, Coskun Bayrak. 13-18 [doi]
- Preference Ordering in Agenda Based Multi-issue Negotiation for Service Level AgreementFahmida Abedin, Kuo-Ming Chao, Nick Godwin, Hisbel Arochena. 19-24 [doi]
- A Semantic Approach for Trust Information Exchange in Federation SystemsZhengping Wu. 25-30 [doi]
- Combating Typo-Squatting for Safer BrowsingGuanchen Chen, Matthew F. Johnson, Pavan Roy Marupally, Naveen K. Singireddy, Xin Yin, Vamsi Paruchuri. 31-36 [doi]
- Web Site Management System through Private Information ExtractionMyung Sil Choi, Yong Soo Park, Kwang Seon Ahn. 37-42 [doi]
- A New Approach to Model Web Services Behaviors Based on SynchronizationZakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Jamal Bentahar, Khouloud Boukadi. 43-49 [doi]
- Matching Model for Semantic Web Services DiscoveryKamran Zamanifar, Alireza Zohali, Naser Nematbakhsh. 50-54 [doi]
- The Network Service Platform for Real-World DataYuka Kato, Masahiko Narita, Chuzo Akiguchi. 55-60 [doi]
- Efficient Heuristic for Multicasting in Arbitrary NetworksHovhannes A. Harutyunyan, Rahul Katragadda, Calin D. Morosan. 61-66 [doi]
- An Adaptation System for P2P Multimedia ApplicationsDerdour Makhlouf, Nacira Ghoualmi-zine, Philippe Roose, Marc Dalmau. 67-72 [doi]
- Requirements and Strategy for Presentation Stage Synchronization of Multi-object Multimedia ApplicationsTing Peng, Kai Du. 73-77 [doi]
- Pico Cellular MAC Protocol for Multimedia CommunicationBilal R. Qazi, Ãngela A. de Grado Vivero, Omar Y. K. Alani, Jaafar M. H. Elmirghani. 78-83 [doi]
- A Model for the Transmission of Multimedia Data Flow Based on the Use of Shared Memory MechanismAndre Gustavo P. da Silva, Adilson B. Lopes, Felipe A. P. Pinto, Carlos Eduardo da Silva. 84-89 [doi]
- TCP/IP Model and Intrusion Detection SystemsSafaa Zaman, Fakhri Karray. 90-96 [doi]
- A Multi-agent-based Approach to Improve Intrusion Detection Systems False Alarm Ratio by Using HoneypotBabak Khosravifar, Maziar Gomrokchi, Jamal Bentahar. 97-102 [doi]
- Handling Context in a Semantic-Based Access Control FrameworkMoussa Amir Ehsan, Morteza Amini, Rasool Jalili. 103-108 [doi]
- Privacy Protection in Passive Network Monitoring: An Access Control ApproachGeorgios V. Lioudakis, Fotios Gogoulos, Anna Antonakopoulou, Dimitra I. Kaklamani, Iakovos S. Venieris. 109-116 [doi]
- Performance Evaluation of Secure Call Admission Control for Multiclass Internet ServicesA. Al-Haj, John Mellor, Irfan-Ullah Awan. 117-121 [doi]
- SIP Robustness Testing Based on TTCN-3Yang Xiang, Zhiliang Wang, Xia Yin. 122-128 [doi]
- Improved Channel Estimation Using Wavelet Denoising for OFDM and OFDMA SystemsXue Wang, Lin-jing Zhao, Jian-dong Li. 129-133 [doi]
- Security of Two Recent Constant-Round Password Authenticated Group Key Exchange SchemesRaphael C.-W. Phan. 134-139 [doi]
- Cipher Suite Setting Problem of SSL Protocol and it s SolutionsYoonyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim. 140-146 [doi]
- Security of Group Key Exchange Protocols with Different PasswordsRaphael C.-W. Phan. 147-152 [doi]
- An Architectural Approach for Self-Managing Security ServicesGiovanni Russello, Naranker Dulay. 153-158 [doi]
- A Public Keys Based Architecture for P2P Identification, Content Authenticity and ReputationNeander Larsen Brisola, Altair Olivo Santin, Lau Cheuk Lung, Heverson Borba Ribeiro, Marcelo H. Vithoft. 159-164 [doi]
- An Alternative Approach for Header Compression Over Wireless Mesh NetworksAndrea Giordanna Oliveira do Nascimento, Edjair de Sousa Mota, Saulo Jorge Beltrao de Queiroz, Edson do Nascimento Jr.. 165-169 [doi]
- A Static Benchmarking for Grid Scheduling ProblemsFatos Xhafa, Leonard Barolli, Juan Antonio Gonzalez, Pawel Jura. 170-175 [doi]
- Lightweight Secure IP Address Auto-Configuration Based on VASMMajid Tajamolian, Majid Taghiloo, Mahnaz Tajamolian. 176-180 [doi]
- Empowered Certification Authority in VANETsMonis Akhlaq, Baber Aslam, Faeiz Alserhani, Irfan-Ullah Awan, John Mellor. 181-186 [doi]
- Performance Analysis in AODV Based Protocols for MANETsMohamed S. El-Azhari, Othman A. Al-Amoudi, Mike Woodward, Irfan-Ullah Awan. 187-192 [doi]
- Centralized Dynamic Clustering for Wireless Sensor NetworkFuad Bajaber, Irfan-Ullah Awan. 193-198 [doi]
- An Efficient Routing Mechanism Based on Heading AngleOthman A. Al-Amoudi, Mohamed S. El-Azhari, Mike Woodward, Irfan-Ullah Awan. 199-204 [doi]
- Network Anomaly Detection Based on Statistical Approach and Time Series AnalysisHuang Kai, Qi Zhengwei, Liu Bo. 205-211 [doi]
- Modelling an Integrated Scheduling Scheme under Bursty MMPP TrafficLei Liu, Xiaolong Jin, Geyong Min. 212-217 [doi]
- Analysis of the Weighted Fair Queuing System with Two Classes of Customers with Finite BufferAmina Al-Sawaai, Irfan-Ullah Awan, Rod J. Fretwell. 218-223 [doi]
- Evaluating Wavelength Routing Power of Dynamic ROADM Networks(cat-I) for Various Traffic TypesT. S. Indumathi, T. Srinivas, K. Rachaiah, B. Sivakumar, V. Rajappa. 224-229 [doi]
- A Cost Analysis of Solving the Amnesia ProblemsRubén de Juan-MarÃn, Luis Irún-Briz, Francesc D. Muñoz-EscoÃ. 230-237 [doi]
- A Hybrid Service Metadata Clustering Methodology in the Digital Ecosystem EnvironmentHai Dong, Farookh Khadeer Hussain, Elizabeth Chang. 238-243 [doi]
- Workload Characterization of Autonomic DBMSs Using Statistical and Data Mining TechniquesZerihun Zewdu, Mieso K. Denko, Mulugeta Libsie. 244-249 [doi]
- Multidimensional Data Stream Summarization Using Extended Tilted-Time WindowsYoann Pitarch, Anne Laurent, Marc Plantevit, Pascal Poncelet. 250-254 [doi]
- Enabling Mobility between Context-Aware Smart SpacesGearoid Hynes, Vinny Reynolds, Manfred Hauswirth. 255-260 [doi]
- Context-Aware SmartSpace: Reference ModelAlexander V. Smirnov, Alexey Kashevnik, Nikolay Shilov, Sergey Boldyrev, Sergey Balandin, Ian Oliver. 261-265 [doi]
- Quality Aware Context Information Aggregation System for Pervasive EnvironmentsAtif Manzoor, Hong Linh Truong, Schahram Dustdar. 266-271 [doi]
- Hybrid Context Matchmaking for Fast Context-Aware ComputingEun Sang Noh, Hyun Ko, Chang Hoon Lyu, Hee Yong Youn. 272-277 [doi]
- Trust-Based Cooperative Action Control in Multi-agent Systems for Network ManagementAtsushi Terauchi, Osamu Akashi. 278-283 [doi]
- Risk-Aware SLA Brokering Using WS-AgreementJames Padgett, Karim Djemame, Iain Gourlay, Django Armstrong. 284-291 [doi]
- Discovering Grid Resources and Deploying Grid Services Using Peer-to-Peer TechnologiesKay Dörnemann, Bernd Freisleben. 292-297 [doi]
- Social Network-Based Trust for Agent-Based ServicesJamal Bentahar, Babak Khosravifar, Maziar Gomrokchi. 298-303 [doi]
- A Cost Model for Efficient Business Object ReplicationMichael Ameling, Bernhard Wolf, José Enrique Armendáriz-Iñigo, Alexander Schill. 304-309 [doi]
- Investigating Interactions between Clients and Server in the Performance Analysis of eCommerce SystemsD. R. W. Holton, Irfan-Ullah Awan, Muhammad Younas. 310-315 [doi]
- Schema Mediation for Heterogeneous XML Schema SourcesHong-Quang Nguyen, J. Wenny Rahayu, Kinh Nguyen, David Taniar. 316-321 [doi]
- XML Language-Oriented Processing with XLOPAntonio Sarasa-Cabezuelo, Bryan Temprado-Battad, José Luis Sierra, Alfredo Fernández-Valmayor. 322-327 [doi]
- Impact of IEEE 802.11n Operation on IEEE 802.15.4 OperationBalaji Polepalli, Weigao Xie, Dhanashree Thangaraja, Mukul Goyal, Hossein Hosseini, Yusuf Bashir. 328-333 [doi]
- Performance Evaluation of SSTPAndrea de Fatima Ferreira Canhoto, Alessandro Anzaloni. 334-337 [doi]
- A Seamless Handover Scheme with Pre-registration in NEMOYing-Hong Wang, Kuo-Feng Huang, Hsin-Yi Ho. 338-344 [doi]
- Cooperative Packet Relaying in Wireless Multi-hop NetworksLu Yan. 345-350 [doi]
- Context-Aware Computing Support for Network-Assisted Seamless Vertical Handover in Remote Patient MonitoringPravin Pawar, Bert-Jan van Beijnum, Hermie Hermens, Katarzyna Wac, Dimitri Konstantas. 351-358 [doi]
- A Fuzzy Decision Maker for Wireless Sensor Network in Ubiquitous Network EnvironmentHuma Qayyum, Shaleeza Sohail, Ghalib A. Shah, Aasia Khanum. 359-364 [doi]
- Identity-Based Cryptography for Securing Mobile Phone CallsMatthew Smith, Christian Schridde, Björn Agel, Bernd Freisleben. 365-370 [doi]
- Scalable Energy-Aware Dynamic Task AllocationAli Bokar, Muslim Bozyigit, Cevat Sener. 371-376 [doi]
- An Efficient Shared-tree-Based Multi-source Multicast Routing Protocol in Mobile NetworksFumiaki Sato. 377-382 [doi]
- An Energy Efficient Chain-Based Clustering Routing Protocol for Wireless Sensor NetworksJae Duck Yu, Kyung Tae Kim, Bo Yle Jung, Hee Yong Youn. 383-388 [doi]
- Voice over Wireless Mesh Networks: A Case Study in the Brazilian Amazon Region during the Rainy SeasonJoao Luis Gomes Moreira, Edjair de Souza Mota, Edson Nascimento Silva Jr., Leandro S. G. de Carvalho, Saulo Queiroz, Christian Hoene. 389-394 [doi]
- A Service Oriented Model for Semantics-Based Data Management in Wireless Sensor NetworksMudasser Iqbal, Hock-Beng Lim, Wenqiang Wang, Yuxia Yao. 395-400 [doi]
- Design and Implementation of a Prototype Smart PARKing (SPARK) System Using Wireless Sensor NetworksS. V. Srikanth, P. J. Pramod, K. P. Dileep, S. Tapas, Mahesh U. Patil, N. Sarat Chandra Babu. 401-406 [doi]
- Street CORNERS: Real-Time Contextual Representation of Sensor Network Data for Environmental Trend IdentificationPatricia Morreale, Feng Qi, Paul Croft, George Chang, Justin Czarnik, Nick Doell, Jhon Espin, Ryan Suleski. 407-412 [doi]
- QoS-Aware Router Combining Features of Conventional Routing and Flow-Aware Routing Based on Resource Management over NGNBoyoung Rhee, Sungchol Cho, Jin Xianshu, Sunyoung Han. 413-418 [doi]
- Using Multi-valued Decision Diagrams to Solve the Expected Hop Count ProblemJohannes Ulrich Herrmann, Sieteng Soh, Geoff West, Suresh Rai. 419-424 [doi]
- Fair and Latency Aware Uplink Scheduler In IEEE 802.16 Using Customized Deficit Round RobinElmabruk Laias, Irfan-Ullah Awan, Pauline M. L. Chan. 425-432 [doi]
- Performance Analysis of EAP Methods Used as GDOI Phase 1 for IP Multicast on AirplanesPrashant Pillai, Yim-Fun Hu. 433-438 [doi]
- Wireless Measurement Framework to Survey an Area with Required Communication QualityYuzo Taenaka, Shigeru Kashihara, Youki Kadobayashi, Suguru Yamaguchi. 439-446 [doi]
- Analytical Modeling of Active Queue Management under Dynamic Channel ConditionsLan Wang, Geyong Min, Irfan-Ullah Awan. 447-451 [doi]
- Queue Length Behavior on Restricted Link Under Bursty Self-similar TCP TrafficTakuo Nakashima. 452-457 [doi]
- Performance Evaluation Based on Simulation of Improving Dynamic Probabilistic Flooding in MANETsAbdalla M. Hanashi, Irfan-Ullah Awan, Mike Woodward. 458-463 [doi]
- Location-Transparent Integration of Distributed OSGi Frameworks and Web ServicesChristoph Fiehe, Anna Litvina, Ingo Lück, Oliver Dohndorf, Jens Kattwinkel, Franz-Josef Stewing, Jan Krüger, Heiko Krumm. 464-469 [doi]
- A Service-Oriented Platform for Pervasive Awareness SystemsChristos Goumopoulos, Achilles Kameas, E. Berg, I. Calemis. 470-475 [doi]
- Services to the Field: An Approach for Resource Constrained Sensor/Actor NetworksChristian Buckl, Stephan Sommer, Andreas Scholz, Alois Knoll, Alfons Kemper, Jörg Heuer, Anton Schmitt. 476-481 [doi]
- Differences and Commonalities of Service-Oriented Device Architectures, Wireless Sensor Networks and Networks-on-ChipGuido Moritz, Claas Cornelius, Frank Golatowski, Dirk Timmermann, Regina Stoll. 482-487 [doi]
- Mapping OWL-S Processes to Multi Agent Systems: A Verification Oriented ApproachAlessio Lomuscio, Monika Solanki. 488-493 [doi]
- Time-Predictable Reconfiguration with Contract-Based Resource ManagementMarisol GarcÃa-Valls, Alejandro Alonso-Munoz, Juan Antonio de la Puente. 494-499 [doi]
- A Specification and Tool for the Configuration ofGuilherme Gustavo Ramos Gomes, Paulo Nazareno Maia Sampaio. 500-505 [doi]
- Towards Distributed Composition of Real-Time Service-Based ApplicationsIria Estévez-Ayres, Marisol GarcÃa-Valls, Pablo Basanta-Val. 506-511 [doi]
- Service Creation Environment for Business-to-Business ServicesRolf Lasch, Björn Ricks, Ralf Tönjes. 512-517 [doi]
- A SOA-Based Collaborative Environment for Clinical Trials on Neglected DiseasesMaria Beatriz Felgar de Toledo, Olga Nabuco, Marcos Antônio Rodrigues, Diego Garcia, Miriam A. M. Capretz, Marcelo Fantinato, Itana Maria de Souza Gimenes, Rodrigo Bonacin, Ana Guerra, Tarcisio da Rocha, Laura Viana. 518-523 [doi]
- Towards a Policy and Charging Control Architecture for Online ChargingFrank Bormann, Andre Braun, Stephan Flake, Jürgen Tacken. 524-530 [doi]
- A Service Oriented Platform for Health Services and Ambient Assisted LivingAndreas Hein, Marco Eichelberg, Oliver Nee, Arne Schulz, Axel Helmer, Myriam Lipprandt. 531-537 [doi]
- Concurrency Programming Models in Mobile Real-Time PlatformsMarisol GarcÃa-Valls, Pablo Basanta-Val, Iria Estévez-Ayres. 538-543 [doi]
- Layer-Based Dome Contents Creation Using Scenario Description LanguageTetsuro Ogi, Daisuke Furuyama, Tetsuro Fujise. 544-549 [doi]
- Development of Immersive Virtual Driving Environment Using OpenCABIN LibraryYoshisuke Tateyama, Tetsuro Ogi, Hidekazu Nishimura, Noriyasu Kitamura, Harumi Yashiro. 550-553 [doi]
- An Experiment on Tele-immersive Communication with Tiled Displays Wall over JGN2plus NetworkYasuo Ebara, Yoshitaka Shibata. 554-559 [doi]
- A Middleware System to Realize Virtual Reality on Tele-immersion EnvironmentKeisuke Yatsu, Yoshitaka Shibata. 560-563 [doi]
- Asynchronous Collaborative Support System by Revision Tree MethodHiroki Ogasawara, Yoshitaka Shibata. 564-569 [doi]
- A Hierarchically Structured Worldwide Sensor Web ArchitectureIan Rhead, Madjid Merabti, Hala M. Mokhtar, Paul Fergus. 570-575 [doi]
- A Trial of a Worker s Motion Trace System Using Terrestrial Magnetism and Acceleration SensorsNobuyoshi Sato, Shouichi Odashima, Jun Suzuki, Taiji Ishikawa, Yoshitoshi Murata. 576-581 [doi]
- A Topology Control Protocol for 2D Poisson Distributed Wireless Sensor NetworksWaltenegus Dargie, Alexander Schill, Rami Mochaourab, Lin Guan. 582-587 [doi]
- Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets)Abdullahi Arabo, Qi Shi, Madjid Merabti. 588-594 [doi]
- Fault Tolerance Small-World Cellular Neural Networks for Inttermitted FaultsKatsuyoshi Matsumoto, Minoru Uehara, Hideki Mori. 595-600 [doi]
- A Comparison Between the Tunneling Process and Mapping Schemes for IPv4/IPv6 TransitionRa ed AlJa afreh, John Mellor, Irfan-Ullah Awan. 601-606 [doi]
- Design of Alarm Management System in Hybrid IP/Optical NetworksTe-Lung Liu, Hui-Min Tseng, Hui-Min Chen, Jen-Wei Hu, Chu-Sing Yang, C. Eugene Yeh. 607-611 [doi]
- Optimization of iSCSI Remote Storage Access through Multiple LayersReika Higa, Kosuke Matsubara, Takao Okamawari, Saneyasu Yamaguchi, Masato Oguchi. 612-617 [doi]
- Software Management of Heterogeneous Execution PlatformsAndré Bottaro, Levent Gürgen, Maxime Vincent, François-Gaël Ottogalli, Stéphane Seyvoz. 618-623 [doi]
- An RFID-Based System for Emergency Health Care ServicesCristina Elena Turcu, Cornel Turcu, Valentin Popa. 624-629 [doi]
- Enhancing the Flexibility of Manufacturing Systems Using the RFID TechnologyValentin Vlad, Adrian Graur, Cristina Elena Turcu, Cezar Popa. 630-635 [doi]
- Wireless Sensor Networks: A SurveyVidyasagar Potdar, Atif Sharif, Elizabeth Chang. 636-641 [doi]
- Applications of Wireless Sensor Networks in Pharmaceutical IndustryManohar Potdar, Atif Sharif, Vidyasagar Potdar, Elizabeth Chang. 642-647 [doi]
- Do Metrics Make Recommender Algorithms?Elica Campochiaro, Riccardo Casatta, Paolo Cremonesi, Roberto Turrin. 648-653 [doi]
- An Adaptive Personalized Recommender Based on Web-Browsing Behavior LearningKosuke Takano, Kin Fun Li. 654-660 [doi]
- Hybrid Recommender System Using Latent FeaturesSaranya Maneeroj, Atsuhiro Takasu. 661-666 [doi]
- Including Context in a Transactional Recommender System Using a Pre-filtering Approach: Two Real E-commerce ApplicationsMichele Gorgoglione, Umberto Panniello. 667-672 [doi]
- An Enhanced Clustering Method Based on Grid-ShakingJinbeom Kang, Joongmin Choi, Jaeyoung Yang. 673-678 [doi]
- A Robust Algorithm for Fuzzy Document ClusteringLifei Chen, Shengrui Wang, Qingshan Jiang. 679-684 [doi]
- SVM Fuzzy Hierarchical Classification Method for Multi-class ProblemsTaoufik Guernine, Kacem Zeroual. 691-696 [doi]
- Document-Oriented Pruning of the Inverted Index in Information Retrieval SystemsLei Zheng, Ingemar J. Cox. 697-702 [doi]
- CUTER: An Efficient Useful Text Extraction MechanismGeorge Adam, Christos Bouras, Vassilis Poulopoulos. 703-708 [doi]
- Learning to Extract Content from News WebpagesAlex Spengler, Patrick Gallinari. 709-714 [doi]
- Load Balancing Using Consistent Hashing: A Real Challenge for Large Scale Distributed Web CrawlersMitra Nasri, Mohsen Sharifi. 715-720 [doi]
- A Content-Oriented Framework for Online Discussion AnalysisAnna Stavrianou, Jean-Hugues Chauchat, Julien Velcin. 721-726 [doi]
- A Hybrid Approach to Validate Induced Syntactic RelationsNicolas Béchet, Mathieu Roche, Jacques Chauché. 727-732 [doi]
- Sentence-Level Opinion-Topic Association for Opinion Detection in BlogsMalik Muhammad Saad Missen, Mohand Boughanem. 733-737 [doi]
- Wikipedia Relatedness Measurement Methods and Influential FeaturesKotaro Nakayama, Masahiro Ito, Takahiro Hara, Shojiro Nishio. 738-743 [doi]
- Voted Spheres: An Online, Fast Approach to Large Scale LearningBassam Farran, Craig Saunders. 744-749 [doi]
- SOA Initiatives for eLearning: A Moodle CaseMarÃa José Casany Guerrero, Marc Alier Forment, Miguel Ãngel Conde González, Francisco José GarcÃa Peñalvo. 750-755 [doi]
- Toward Feedback-Based Web Search EngineMehdi Adda, Rokia Missaoui, Petko Valtchev. 756-761 [doi]
- Temporal Dynamics of User Interests in Web Search QueriesAysegul Cayci, Selcuk Sumengen, Cagatay Turkay, Selim Balcisoy, Yücel Saygin. 762-767 [doi]
- Benchmarking Latency Effects on Mobility Tracking in WSNsRichard Tynan, Michael J. O Grady, Gregory M. P. O Hare, Conor Muldoon. 768-774 [doi]
- A Range-Only Tracking Algorithm for Wireless Sensor NetworksEvangelos B. Mazomenos, Jeffrey S. Reeve, Neil M. White. 775-780 [doi]
- LIFT: An Efficient Cross-Layer Service Discovery Protocol in MANETMiguel A. Wister, Dante Arias Torres. 781-786 [doi]
- Prioritized Buffer Management Policy for Wireless Sensor NodesWeihuan Shu, Kumar Padmanabh, Puneet Gupta. 787-792 [doi]
- Automatic Monitoring for Workers Healthcare in Tropical ClimatesPablo Pancardo García, Jorge A. Pardo, Juan Carlos Dueñas López. 793-797 [doi]
- Analysis of Handoff Delay Components for Mobile IP-Based 3GPP UMTS/WLAN Interworking ArchitectureAbdul-Aziz Al-Helali, Ashraf S. Hasan Mahmoud, Talal Al-Kharobi, Tarek R. Sheltami. 798-803 [doi]
- Impact of Power Control in Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) for Railroad Health MonitoringHwee Pink Tan, Pius W. Q. Lee, Winston Khoon Guan Seah, Zhi Ang Eu. 804-809 [doi]
- A Dynamic Size Distributed Program Image Cache for Wireless Sensor NetworksJoshua Ellul, Kirk Martinez, David De Roure. 810-814 [doi]
- Triangular Power Saving Routing Protocol with Power Balance in Mobile Ad Hoc NetworksYi-Chao Wu, Chiu-Ching Tuan, Po-Chun Chen. 815-819 [doi]
- Performance Evaluation of Max Flow Multipath Protocol with Congestion AwarenessAhmed Redha Mahlous, Brahim Chaourar, Mahmoud Mansour. 820-825 [doi]
- Opportunistic Routing for Disruption Tolerant NetworksMarcello Caleffi, Luigi Paura. 826-831 [doi]
- Privacy in Content-Based Opportunistic NetworksAbdullatif Shikfa, Melek Önen, Refik Molva. 832-837 [doi]
- Improving Opportunistic Data Dissemination via Known VectorJyh-How Huang, Ying-Yu Chen, Yi-Chao Chen, Shivakant Mishra, Ling-Jyh Chen. 838-843 [doi]
- Approximating Travel Times Using Opportunistic NetworkingRudi Ball, Naranker Dulay. 844-849 [doi]
- Opportunistic Social Network ExperimentsNicolas Montavont, Safaa Hachana, Lucien Loiseau. 850-855 [doi]
- A Design of Reduced Data Representation for Information Sharing in the Disaster-Affected AreaMisako Urakami, Keiji Fujii, Mitsuhiro Kota, Hiroshi Matsuno. 856-861 [doi]
- Wireless Distributed Network System for Relief Activities after DisastersTetsuya Shigeyasu, Misako Urakami, Hiroshi Matsuno. 862-867 [doi]
- Development of the Student Refuge Information System Using IC Card Type Student Identification CardsHiroaki Yuze, Yuji Aota, Takashi Kawada. 868-872 [doi]
- Information and Communication Network Infrastructure Based on Experiences from Noto-hanto-oki EarthquakeAkihiro Miyakawa, Yoshitaka Shibata. 873-878 [doi]
- Disaster Information Network by Cognitive Radio LANsGoshi Sato, Daisuke Asahizawa, Yasuhiro Kawano, Yoshitaka Shibata. 879-883 [doi]
- Disaster Surveillance Video Transmission System by Wireless Ballooned NetworkDaisuke Asahizawa, Yosuke Sato, Goshi Sato, Yoshitaka Shibata. 884-889 [doi]
- A Proposal of Tsunami Warning System Using Area Mail Disaster Information Service on Mobile PhonesYasuaki Teshirogi, Jun Sawamoto, Norihisa Segawa, Eiji Sugino. 890-895 [doi]
- Effective Disaster Communication Method by Personalized Wireless LAN SystemKeisuke Okaya, Takashi Miura, Mikio Tanii, Akiko Yokota, Sho Koshigoe, Kazuo Takahata, Yoshitaka Shibata. 896-901 [doi]
- The Small-World Model for Amino Acid Interaction NetworksOmar Gaci, Stefan Balev. 902-907 [doi]
- Loss of Linearity and Symmetrisation in Regulatory NetworksJacques Demongeot, Eric Goles Ch., Sylvain Sené. 908-913 [doi]
- A Numerical Simulation of Transport and Biodegradation in Saturated Porous MediaS. A. Kammouri, M. Elhatri, Mohammed Nabil Kabbaj. 914-917 [doi]
- Towards a Rational Approach for the Logical Modelling of Inhibition in Metabolic NetworksOliver Ray. 918-923 [doi]
- Regulatory Networks Analysis: Robustness in Morphogenesis RegulationHedi Ben Amor, Sebastien Cadau, Adrien Elena, Daniele Dhouailly, Jacques Demongeot. 924-929 [doi]
- Modeling the Glycolysis: An Inverse Problem ApproachJacques Demongeot, Andrei Doncescu. 930-935 [doi]
- Imaging and Modelling of a Degenerative Disease of RetinaMuhammad Tayyab, Yves Usson, Thierry Léveillard, Jacques Demongeot. 936-941 [doi]
- Machine Learning Applied to BRCA1 Hereditary Breast Cancer DataAndrei Doncescu, Baptiste Tauzain, Nabil Kabbaj. 942-947 [doi]
- Abductive Reasoning in Cancer TherapyYoshitaka Yamamoto, Katsumi Inoue, Andrei Doncescu. 948-953 [doi]
- Mixing Scores from Artificial Neural Network and Social Network Analysis to Improve the Customer LoyaltyCarlos André Reis Pinheiro, Markus Helfert. 954-959 [doi]
- User Age Profile Assessment Using SMS Network Neighbors Age ProfilesSung Hyuk Park, Ho-Jin Lee, Sang Pil Han, Dong-Hoon Lee. 960-965 [doi]
- A Contextualized and Personalized Approach for Mobile SearchFeng Gui, Malek Adjouadi, Naphtali Rishe. 966-971 [doi]
- CCA: A Calculus of Context-Aware AmbientsFrançois Siewe, Antonio Cau, Hussein Zedan. 972-977 [doi]
- A Content Clipping System for Web Browsing Using Cellular PhonesKenji Ohnishi, Yuki Arase, Takahiro Hara, Toshiaki Uemukai, Shojiro Nishio. 978-983 [doi]
- On a TDMA Slot Assignment Considering the Amount of Traffic in Wireless Sensor NetworksAkimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 984-989 [doi]
- Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor NetworksYang Zhang, Nirvana Meratnia, Paul J. M. Havinga. 990-995 [doi]
- Knowledge Extraction and Extrapolation Using Ancient and Modern Biomedical LiteratureHarsha Gopal Goud Vaka, Snehasis Mukhopadhyay. 996-1001 [doi]
- A Software System Development for Probabilistic Relational Database Applications for Biomedical InformaticsPing-Tsai Chung, Fahmeed Afzal, Hsin-Hua Hsiao. 1002-1007 [doi]
- Analyzing the Interaction of ADF/Cofilin with Actin through Molecular Dynamics SimulationsErshela Durresi, Paul Dalhaimer, Thomas D. Pollard. 1008-1012 [doi]
- Real-Time Monitoring of Vital SignsBirhan Payli, Arjan Durresi, Deniz U. Dincer, Leonard Barolli. 1013-1018 [doi]
- A New Teleconference System for Healthcare Applications by GigaEther-based Omni-directional Video TransmissionHirokazu Ookuzu, Yosuke Sato, Koji Hashimoto, Yoshitaka Shibata. 1019-1024 [doi]
- Toward fMRI Group Identification Based on Brain LateralizationMagno R. Guillen, Malek Adjouadi, Xiaozhen You, Armando Barreto, Naphtali Rishe, William Gaillard. 1025-1030 [doi]
- A Property Based Framework for Trust and Reputation in Mobile ComputingKevin Jones, Helge Janicke, Antonio Cau. 1031-1036 [doi]
- Distributed Search for Balanced Energy Consumption Spanning Trees in Wireless Sensor NetworksAndrei Gagarin, Sajid Hussain, Laurence Tianruo Yang. 1037-1042 [doi]
- Formal Specification of a Safety Critical Pervasive Application for a Nuclear Medicine DepartmentAntonio Coronato, Giuseppe De Pietro. 1043-1048 [doi]
- Dynamic Role Assignment Using Semantic ContextsAnand Dersingh, Ramiro Liscano, Allan G. Jost, John Finnson. 1049-1054 [doi]
- Secure Safety Messages Broadcasting in Vehicular NetworkMaryam Barzegar, Nasser Mozayani, Mahmood Fathy. 1055-1060 [doi]
- Improving the Scalability of Communication-Aware Task Mapping TechniquesRaul Soriano, Juan Manuel Orduña. 1061-1066 [doi]
- Quantitative Evaluation of Software Quality Metrics in Open-Source ProjectsHenrike Barkmann, Rüdiger Lincke, Welf Löwe. 1067-1072 [doi]
- Modeling Multiprocessor Cache Protocol Impact on MPI PerformanceGhassan Chehaibar, Meriem Zidouni, Radu Mateescu. 1073-1078 [doi]
- Quantifying Artifacts of Virtualization: A Framework for Mirco-BenchmarksChris Matthews, Yvonne Coady, Stephen Neville. 1079-1084 [doi]
- Understanding Behavioural Tradeoffs in Large-Scale Sensornet DesignJonathan Tate, Iain Bate. 1085-1091 [doi]
- The Rational for Developing Larger-scale 1000+ Machine Emulation-Based Research Test BedsStephen W. Neville, Kin Fun Li. 1092-1099 [doi]
- A Distributed Application-Level IT System Workload GeneratorChristopher Mueller, Michael Horie, Stephen W. Neville. 1100-1105 [doi]
- TopDNS: Experiences Building Internet-Based Topologies with GNPGert Pfeifer, Christof Fetzer. 1106-1111 [doi]
- SSL-Based Lightweight Security of IP-Based Wireless Sensor NetworksWooyoung Jung, Sungmin Hong, Minkeun Ha, Young-Joo Kim, Daeyoung Kim. 1112-1117 [doi]
- A Graph-Theoretic Model of Routing HierarchiesYvonne Lai, Wai Sum Lai. 1118-1123 [doi]
- Manipulation of Network Traffic Traces for Security EvaluationMohammed Gadelrab, Anas Abou El Kalam, Yves Deswarte. 1124-1129 [doi]
- Effects of Channel Estimation Errors in OFDM-MIMO-Based Underwater CommunicationsJan Erik Håkegård, Knut Harald Grythe. 1130-1135 [doi]
- Multi-node Processing for Asymmetrical Communications in Underwater Acoustic NetworksAntonio Silva, Julien Huillery, Sergio M. Jesus. 1136-1141 [doi]
- Analysis of an Automatic Repeat Request Scheme Addressing Long Delay ChannelsLeonardo Badia, Paolo Casari, Marco Levorato, Michele Zorzi. 1142-1147 [doi]
- Sector-Based Routing with Destination Location Prediction for Underwater Mobile NetworksNitthita Chirdchoo, Wee-Seng Soh, Kee Chaing Chua. 1148-1153 [doi]
- Topology Design of Undersea Cables Considering Survivability Under Major DisastersWeiwei Wu, Bill Moran, Jonathan H. Manton, Moshe Zukerman. 1154-1159 [doi]
- A Novel Spatially Shared TDMA Protocol and Quality Measure for Ad Hoc Underwater Acoustic NetworkRoee Diamant, Michael Pinkhasevich, Ido Achrak. 1160-1165 [doi]
- A CDMA-Based MAC Protocol in Tree-Topology for Underwater Acoustic Sensor NetworksJong-Pil Kim, Jae-Won Lee, Youn-Seon Jang, Kweon Son, Ho-Shin Cho. 1166-1171 [doi]
- A Lightweight Protocol Suite for Underwater CommunicationHelge Rustad. 1172-1177 [doi]
- A Survey on Medium Access Control in Underwater Acoustic Sensor NetworksGhalib Asadullah Shah. 1178-1183 [doi]