Abstract is missing.
- Data Integration at Scale: From Relational Data Integration to Information EcosystemsMichael L. Brodie. 2-3 [doi]
- Design of Network Based SoftwareBogdan M. Wilamowski. 4-10 [doi]
- A Photonics Based Intelligent Airport Surveillance and Tracking SystemIan H. White, M. J. Crisp, Richard V. Penty. 11-16 [doi]
- Next Decade of Social, Economical and Ethical ChallengesA. Min Tjoa. 17-18 [doi]
- Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical SocietyHai Zhuge. 19-26 [doi]
- Cloud Computing: Issues and ChallengesTharam S. Dillon, Chen Wu, Elizabeth Chang. 27-33 [doi]
- Accountability Computing for E-societyKwei-Jay Lin, Joe Zou, Yan Wang 0002. 34-41 [doi]
- Performance Evaluation of Database DesignsRasha Osman, Irfan-Ullah Awan, Michael E. Woodward. 42-49 [doi]
- Performance of Weighted Fair Queuing System with Multi-class JobsAmina Al-Sawaai, Irfan-Ullah Awan, Rod J. Fretwell. 50-57 [doi]
- Enhanced DR-Tree for Low Latency Filtering in Publish/Subscribe SystemsLuciana Arantes, Maria Gradinariu Potop-Butucaru, Pierre Sens, Mathieu Valero. 58-65 [doi]
- RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival ProccessLee Booi Lim, Lin Guan, Alan Grigg, Iain W. Phillips, Xingang Wang, Irfan-Ullah Awan. 66-73 [doi]
- Performance Analysis of VCP Controller on DCCP TrafficHanliu Chen, Oliver W. W. Yang, Yang Hong. 74-81 [doi]
- Comparative Analysis and Evaluation of Botnet Command and Control ModelsPavan Roy Marupally, Vamsi Paruchuri. 82-89 [doi]
- Simulation-Based Performance Evaluation of the SNDP Protocol for Infrastructure WMNsGlêdson Elias da Silveira, Mateus Novaes, Gustavo Cavalcanti, Daniel Charles Ferreira Porto. 90-97 [doi]
- An Adaptive Routing Protocol for Bus NetworksLuobei Kuang, Ming Xu, Zhijun Wang. 98-104 [doi]
- Adaptive Clustering Protocol for Wireless NetworksArjan Durresi, Vamsi Paruchuri, Leonard Barolli. 105-111 [doi]
- PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic NetworkTing-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen. 112-119 [doi]
- Multicast QoS Routing Using Collaborative Path ExplorationJaipal Singh. 120-125 [doi]
- High Performance Computing on Demand: Sharing and Mutualization of ClustersRodrigue Chakode, Jean-François Méhaut, Francois Charlet. 126-133 [doi]
- An Implementation of NaryRAIDYuji Nakamura, Minoru Uehara. 134-141 [doi]
- Algorithms for Reducing the Total Power Consumption in Data Communication-Based ApplicationsTomoya Enokido, Kota Suzuki, Ailixier Aikebaier, Makoto Takizawa. 142-149 [doi]
- A Comparative Study on the Performance of the Parallel and Distributing Computing Operation in MatLabMohammed Goryawala, Magno R. Guillen, Ruchir Bhatt, Anthony McGoron, Malek Adjouadi. 150-157 [doi]
- Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data AssignmentsChonglei Mei, Hai Jiang, Jeff Jenness. 158-165 [doi]
- Distributed Orchestration of Pervasive ServicesLeonardo Mostarda, Srdjan Marinovic, Naranker Dulay. 166-173 [doi]
- Integrating Load Balancing into Channelization Strategy in Publish/SubscribeHaibiao Chen, Beihong Jin, Fengliang Qi. 174-181 [doi]
- A Specialized Tool for Simulating Lock-Keeper Data TransferFeng Cheng 0002, Thanh-Dien Tran, Sebastian Roschke, Christoph Meinel. 182-189 [doi]
- Transmit Power Allocation for Precoded Distributed MIMO OFDM SystemsReza Holakouei, Adão Silva, Atílio Gameiro. 190-197 [doi]
- Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection ChainYing-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern, Jianhua Yang. 198-205 [doi]
- Consensus in Anonymous Distributed Systems: Is There a Weakest Failure Detector?François Bonnet, Michel Raynal. 206-213 [doi]
- Recommender Systems for Human Resources Task AssignmentPedro T. Isaías, Cristiane Casaca, Sara Pífano. 214-221 [doi]
- Minimizing Execution Costs when Using Globally Distributed Cloud ServicesSuraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajkumar Buyya. 222-229 [doi]
- Schedule Distributed Virtual Machines in a Service Oriented EnvironmentLizhe Wang, Gregor von Laszewski, Marcel Kunze, Jie Tao. 230-236 [doi]
- Software-as-a-Service and Versionology: Towards Innovative Service DifferentiationYouakim Badr, Guy Caplat. 237-243 [doi]
- A Visual Semantic Service Browser Supporting User-Centric Service CompositionJian Yu, Quan Z. Sheng, Paolo Falcarin. 244-251 [doi]
- An Identifier-Based Architecture for Native Vertical Handover SupportWalter Wong, Marcus Giraldi, Maurício F. Magalhães, Fábio Luciano Verdi. 252-259 [doi]
- DACS System s Implementation Method to Realize the Next Generation Policy-Based Network Management SchemeKazuya Odagiri, Shogo Simizu, Rihito Yaegashi, Masaharu Takizawa, Naohiro Ishii. 260-267 [doi]
- A Scalable Peer-to-Peer Group Communication ProtocolIsamu Tsuneizumi, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 268-275 [doi]
- TCP Testing: How Well Does ns2 Match Reality?Martin Bateman, Saleem N. Bhatti. 276-284 [doi]
- Network Integrated Transparent TCP AcceleratorJeongkeun Lee, Puneet Sharma, Jean Tourrilhes, Rick McGeer, Jack Brassil, Andy C. Bavier. 285-292 [doi]
- Integrated Modeling, Generation and Optimization for Packet based NoC TopologyJueping Cai, Zheng Liu, Ming Du, Zan Li, Lei Yao. 293-298 [doi]
- Bounded Fano Decoders over Intermediate Hops Excluding Packet RetransmissionKhalid A. Darabkh, Backer N. Abu-Jaradeh. 299-303 [doi]
- Maximizing Bandwidth Using Disjoint PathsRuen Chze Loh, Sieteng Soh, Mihai Lazarescu. 304-311 [doi]
- Applying TCP-Friendly Congestion Control to Concurrent Multipath TransferThomas Dreibholz, Martin Becke, Jobin Pulinthanath, Erwin P. Rathgeb. 312-319 [doi]
- Exploiting Spectrum Usage Patterns for Efficient Spectrum Management in Cognitive Radio NetworksChangwoo Lee, Wonjun Lee. 320-327 [doi]
- Improving Reliability Calculation with Augmented Binary Decision DiagramsJohannes Ulrich Herrmann. 328-333 [doi]
- Community-Aware Scheduling Protocol for GridsYe Huang, Amos Brocco, Nik Bessis, Pierre Kuonen, Béat Hirsbrunner. 334-341 [doi]
- Flow Vector Prediction in Large IP NetworksTarem Ahmed. 342-349 [doi]
- Utilizing WiMAX as a Public Safety Network in JordanNidhal Kamel Taha El-Omari, Mohamad Hisham Alzaghal. 350-355 [doi]
- Hybrid Communication Reconfigurable Network on Chip for MPSoCZheng Liu, Jueping Cai, Ming Du, Lei Yao, Zan Li. 356-361 [doi]
- An Overlay Multicast that Supports a Distinguished QoS Based on Service Levels and User Environments in the Next Generation NetworkBoyoung Rhee, Sunyoung Han. 362-368 [doi]
- The Power of Orientation in Symmetry-BreakingSatya Krishna Pindiproli, Kishore Kothapalli. 369-376 [doi]
- A PCA Analysis of Daily Unwanted TrafficKensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara. 377-384 [doi]
- The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDSYeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su. 385-391 [doi]
- Iterative Route Discovery in AODVNashid Shahriar, Syed Ashker Ibne Mujib, Arup Raton Roy, Ashikur Rahman. 392-399 [doi]
- A Particle Swarm Optimization-Based Heuristic for Scheduling Workflow Applications in Cloud Computing EnvironmentsSuraj Pandey, Linlin Wu, Siddeswara Mayura Guru, Rajkumar Buyya. 400-407 [doi]
- Whois Based Geolocation: A Strategy to Geolocate Internet HostsPatricia Takako Endo, Djamel Fawzi Hadj Sadok. 408-413 [doi]
- A DSL-Based Approach to Software Development and Deployment on CloudKrzysztof Sledziewski, Behzad Bordbar, Rachid Anane. 414-421 [doi]
- Internet Host Geolocation Using Maximum Likelihood Estimation TechniqueMohammed Jubaer Arif, Shanika Karunasekera, Santosh Kulkarni, Ajith Gunatilaka, Branko Ristic. 422-429 [doi]
- CAPTCHA Using Strangeness in Machine TranslationTakumi Yamamoto, J. Doug Tygar, Masakatsu Nishigaki. 430-437 [doi]
- A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support SystemMasayuki Fukumitsu, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata. 438-445 [doi]
- CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and ApplicationsBhathiya Wickremasinghe, Rodrigo N. Calheiros, Rajkumar Buyya. 446-452 [doi]
- Mapping the Blogosphere with RSS-FeedsJustus Bross, Matthias Quasthoff, Philipp Berger, Patrick Hennig, Christoph Meinel. 453-460 [doi]
- A Modified QRD-M Algorithm Based on Layer Branch Pruning for MIMO SystemsXue Xin, Xiaohui Li, YongQiang Hei, Weiyi Yin, Guanghui Yu. 461-464 [doi]
- Genetic Algorithms for Efficient Placement of Router Nodes in Wireless Mesh NetworksFatos Xhafa, Christian Sánchez, Leonard Barolli. 465-472 [doi]
- A Condition Monitoring Platform Using COTS Wireless Sensor Networks: Lessons and ExperienceRanjan Panda, Damith Chinthana Ranasinghe, Ajith K. Parlikad, Duncan McFarlane. 473-480 [doi]
- A Novel Spatial TDMA Scheduler for Concurrent Transmit/Receive Wireless Mesh NetworksKwan-Wu Chin, Sieteng Soh, Chen Meng. 481-488 [doi]
- Probabilistic Proactive Routing with Active Route Trace-Back for Highly Mobile Ad Hoc NetworksKeyvan Kashkouli Nejad, Xiaohong Jiang, Jianhua Ma. 489-494 [doi]
- Mobility Effects of Wireless Multi-hop Networks in Indoor ScenariosMakoto Ikeda, Masahiro Hiyama, Leonard Barolli, Fatos Xhafa, Arjan Durresi, Makoto Takizawa. 495-502 [doi]
- Service Invocation over Content-Based Communication in Disconnected Mobile Ad Hoc NetworksYves Mahéo, Romeo Said. 503-510 [doi]
- A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc NetworksBezawada Bruhadeshwar, Kishore Kothapalli, Indira Radhika Pulla. 511-518 [doi]
- A Study on Sensor Multiplicity in Optical Fiber Sensor NetworksNobutoshi Abe, Yusuke Arai, Michiko Nishiyama, Norihiko Shinomiya, Kazuhiro Watanabe, Yoshimi Teshigawara. 519-525 [doi]
- RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc NetworksSubrata Saha, Syed Rafiul Hussain, Ashikur Rahman. 526-532 [doi]
- Active Data Selection for Sensor Networks with Faults and ChangepointsMichael A. Osborne, Roman Garnett, Stephen J. Roberts. 533-540 [doi]
- Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless NetworksStepan Ivanov, Dmitri Botvich, Sasitharan Balasubramaniam. 541-547 [doi]
- Investigating Impact of Quorum Construction on Data Processing in Mobile Ad Hoc NetworksTakahiro Hara, Sanjay Kumar Madria, Shojiro Nishio. 548-555 [doi]
- New Approach to Quantification of Privacy on Social Network SitesTran Hong Ngoc, Isao Echizen, Komei Kamiyama, Hiroshi Yoshiura. 556-564 [doi]
- Trustworthiness among Peer Processes in Distributed Agreement ProtocolAilixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 565-572 [doi]
- Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between ItemsMinako Tada, Hiroaki Kikuchi, Sutheera Puntheeranurak. 573-578 [doi]
- Towards Trust Establishment for Spectrum Selection in Cognitive Radio NetworksSazia Parvin, Song Han, Li Gao, Farookh Khadeer Hussain, Elizabeth Chang. 579-583 [doi]
- A Tree Graph Model Based on Mobile EnvironmentWei Liu, Zhoujun Li. 584-591 [doi]
- BPE Acceleration Technique for S/W Update for Mobile PhonesRyozo Kiyohara, Satoshi Mii. 592-599 [doi]
- An Efficient Scalable Trajectory Based Forwarding Scheme for VANETsHouda Labiod, Nedal Ababneh, Miguel Garcia De La Fuente. 600-606 [doi]
- An Efficient Telematics Service Discovery Scheme over the Centralized Vehicular Peer-to-Peer (C-VP2P) Telematics Service PlatformChung-Ming Huang, Chia-Ching Yang, Chun-Ming Hu. 607-613 [doi]
- A Novel Cache Management Using Geographically Partial Matching for Location-Based ServicesChung-Ming Huang, Ming-Sian Lin, Wen-Yao Chang. 614-619 [doi]
- CoMiHoC: A Middleware Framework for Context Management in MANET EnvironmentWaskitho Wibisono, Arkady B. Zaslavsky, Sea Ling. 620-627 [doi]
- RF-Based Indoor Locating System for NLOS EnvironmentHoon Choi, Sanghyun Son, Jamje Kim, Yunju Baek. 628-633 [doi]
- AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection EnhancementAnas Al-Roubaiey, Tarek Sheltami, Ashraf S. Mahmoud, Elhadi Shakshuki, H. T. Mouftah. 634-640 [doi]
- A Cross-Layer Decision for Mobile IP HandoverMohamed Alnas, Irfan-Ullah Awan, D. R. W. Holton. 641-646 [doi]
- A Novel Cross Layer Intrusion Detection System in MANETRakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han. 647-654 [doi]
- A Secure Key Management Model for Wireless Mesh NetworksLi Gao, Elizabeth Chang, Sazia Parvin, Song Han, Tharam S. Dillon. 655-660 [doi]
- Bright Pupil Detection in an Embedded, Real-Time Drowsiness Monitoring SystemSalvatore Vitabile, Alessandra De Paola, Filippo Sorbello. 661-668 [doi]
- A Transport Protocol for Multimedia Transmission in Overlay NetworksByung-Seok Kang, Kwangcheol Shin, In-Young Ko, Pyoung-Yun Kim. 669-674 [doi]
- A Survey on Multimedia Communicating Technology Based on Spatial Audio CodingNaixue Xiong, Shuixian Chen, Jing He, Yanxiang He, Athanasios T. Vasilakos, Jong Hyuk Park, Yan Yang. 675-681 [doi]
- User-Excentric Service Composition in Pervasive EnvironmentsNoha Ibrahim, Stéphane Frénot, Frédéric Le Mouël. 682-689 [doi]
- Modeling and Measuring Quality of Context Information in Pervasive EnvironmentsJosé Bringel Filho, Alina Dia Miron, Ichiro Satoh, Jérôme Gensel, Hervé Martin. 690-697 [doi]
- Interactive Home Supervision ApplicationJulia Kantorovitch, Ilkka Niskanen. 698-704 [doi]
- Context-Aware Mobile Services TransactionsMuhammad Younas, Soraya Kouadri Mostéfaoui. 705-712 [doi]
- Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility StudyAlvin C. Valera, Hwee Pink Tan, Xiaoping Ma. 713-720 [doi]
- A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the EndhostSilvio Cesare, Yang Xiang. 721-728 [doi]
- Modbus/DNP3 State-Based Intrusion Detection SystemIgor Nai Fovino, Andrea Carcano, Thibault De Lacheze Murel, Alberto Trombetta, Marcelo Masera. 729-736 [doi]
- Efficient Algorithms for Dynamic Detection and Resolution of IPSec/VPN Security Policy ConflictsSalman Niksefat, Masoud Sabaei. 737-744 [doi]
- Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing SchemesXiujie Zhang, Mingxing He. 745-752 [doi]
- MARS: Multi-stage Attack Recognition SystemFaeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, Andrea J. Cullen, Pravin Mirchandani. 753-759 [doi]
- Against Spyware Using CAPTCHA in Graphical Password SchemeLiming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin. 760-767 [doi]
- Intrusion Tolerant Services Through Virtualization: A Shared Memory ApproachValdir Stumm Jr., Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau. 768-774 [doi]
- An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc NetworkJiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu. 775-780 [doi]
- Empirical Analysis of Attackers Activity on Multi-tier Web SystemsKaterina Goseva-Popstojanova, Brandon Miller, Risto Pantev, Ana Dimitrijevikj. 781-788 [doi]
- Key Parameters in Identifying Cost of Spam 2.0Farida Ridzuan, Vidyasagar Potdar, Alex Talevski, William F. Smyth. 789-796 [doi]
- Web Spambot Detection Based on Web Navigation BehaviourPedram Hayati, Vidyasagar Potdar, Kevin Chai, Alex Talevski. 797-803 [doi]
- A Dynamic Normalized Weighting Based Context Reasoning in Home-Based CareHyun Lee, Jae Sung Choi, Ramez Elmasri. 804-811 [doi]
- Energy Constrained Dominating Set for Clustering in Wireless Sensor NetworksJulia Albath, Mayur Thakur, Sanjay Madria. 812-819 [doi]
- Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-Oriented MiddlewareTales Heimfarth, Edison Pignaton de Freitas, Carlos Eduardo Pereira, Armando Morado Ferreira, Flávio Rech Wagner, Tony Larsson. 820-826 [doi]
- Modeling and Evaluating the Reliability of Cluster-Based Wireless Sensor NetworksHamed Yousefi, Kambiz Mizanian, Amir-Hossein Jahangir. 827-834 [doi]
- Prioritizing Information for Achieving QoS Control in WSNAtif Sharif, Vidyasagar Potdar, A. J. D. Rathnayaka. 835-842 [doi]
- Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor NetworksKhaled Almiani, Anastasios Viglas, Lavy Libman. 843-850 [doi]
- Symbolic Routing for Location-Based Services in Wireless Mesh NetworksHarald Weinschrott, Frank Dürr, Kurt Rothermel. 851-858 [doi]
- Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADAHani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo. 859-865 [doi]
- Communication Scheme to Support Sink Mobility in Multi-hop Clustered Wireless Sensor NetworksSeungmin Oh, Euisin Lee, Soochang Park, Juhyun Jung, Sang-Ha Kim. 866-872 [doi]
- On Barrier Coverage in Wireless Camera Sensor NetworksKuei-Ping Shih, Chien-Min Chou, I-Hsin Liu, Chun-Chih Li. 873-879 [doi]
- A Hybrid Technique for Efficient Medium Access Control in Wireless Sensor NetworksThi Hong Hanh Le, Makoto Takizawa. 880-887 [doi]
- Routing Loops in DAG-Based Low Power and Lossy NetworksWeigao Xie, Mukul Goyal, Hossein Hosseini, Jerald Martocci, Yusuf Bashir, Emmanuel Baccelli, Arjan Durresi. 888-895 [doi]
- Energy-Aware, Self-Deploying Approaches for Wireless Sensor NetworksShih-Chang Huang. 896-901 [doi]
- Employing IEEE 802.15.4 for Quality of Service Provisioning in Wireless Body Area Sensor NetworksHuasong Cao, Sergio González-Valenzuela, Victor C. M. Leung. 902-909 [doi]
- Sink-Initiated Geographic Multicasting Protocol in Wireless Sensor NetworksJeongcheol Lee, Euisin Lee, Soochang Park, Hosung Park, Sang-Ha Kim. 910-916 [doi]
- Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor NetworksWuyungerile Li, Masaki Bandai, Takashi Watanabe. 917-924 [doi]
- Real-Time Data Dissemination Based on Reactive and Restricted Zone Search in Sensor NetworksJuhyun Jung, Soochang Park, Euisin Lee, Seungmin Oh, Sang-Ha Kim. 925-932 [doi]
- An Energy Aware Routing Protocol with Sleep Scheduling for Wireless Sensor NetworksAmulya Ratna Swain, R. C. Hansdah, Vinod Kumar Chouhan. 933-940 [doi]
- Applications of Wireless Sensor Networks in the Oil, Gas and Resources IndustriesMohammad reza Akhondi, Alex Talevski, Simon Carlsen, Stig Petersen. 941-948 [doi]
- Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas IndustriesPedram Radmand, Alex Talevski, Stig Petersen, Simon Carlsen. 949-957 [doi]
- From Communities of Web Services to Marts of Composite Web ServicesZakaria Maamar, Leandro Krug Wives, Ghazi AlKhatib, Quan Z. Sheng, Antonio Rodrigo Delepiane de Vit, Djamal Benslimane. 958-965 [doi]
- YASA-M: A Semantic Web Service MatchmakerYassin Chabeb, Samir Tata, Alain Ozanne. 966-973 [doi]
- Using Recommendation to Limit Search Space in Web Services DiscoveryMohamed Sellami, Walid Gaaloul, Samir Tata, Mohamed Jmaiel. 974-981 [doi]
- Environmental Sustainability and Improved Quality of Life Through Service Convergence TechnologiesMeisam Aboudi, Alex Talevski. 982-987 [doi]
- Adaptive and Distributed Access Control in Cognitive Radio NetworksGianmarco Baldini, Stefano Braghin, Igor Nai Fovino, Alberto Trombetta. 988-995 [doi]
- An Authentication Model for Wireless Network ServicesHuy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan. 996-1003 [doi]
- Controlling File Distribution in the Share Network Through Content PoisoningMasahiro Yoshida, Satoshi Ohzahata, Akihiro Nakao, Konosuke Kawashima. 1004-1011 [doi]
- HealthPass: Fine-Grained Access Control to Portable Personal Health RecordsRobert Steele, Kyongho Min. 1012-1019 [doi]
- Towards More Trustable Log Files for Digital Forensics by Means of Benjamin Bock, David Huemer, A. Min Tjoa. 1020-1027 [doi]
- InnoDB Database ForensicsPeter Fruhwirt, Marcus Huber, Martin Mulazzani, Edgar R. Weippl. 1028-1036 [doi]
- A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLsSergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca. 1037-1046 [doi]
- Beyond Fixed Key Size: Classifications Toward a Balance Between Security and PerformanceAbdullah M. Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan. 1047-1053 [doi]
- Non-interactive Information Reconciliation for Quantum Key DistributionStefan Rass, Peter Schartner. 1054-1060 [doi]
- Enabling Scalable RFID Traceability NetworksQuan Z. Sheng, Yanbo Wu, Damith Ranasinghe. 1061-1068 [doi]
- Increasing TCP Throughput and Fairness in Cognitive WLAN over FiberAlireza Attar, Haoming Li, Victor C. M. Leung. 1069-1076 [doi]
- Admission Control and System Capacity Assessment of WiMAX with ACM and nb-LDPC CodesAdam Flizikowski, Witold Holubowicz, Marcin Przybyszewski, Slawomir Grzegorzewski. 1077-1084 [doi]
- Secure Communication for Internet Payment in Heterogeneous NetworksRefka Abdellaoui, Marc Pasquet. 1085-1092 [doi]
- IDSec: An Identification Layer Security ModelWalter Wong, Maurício F. Magalhães, Fábio Luciano Verdi. 1093-1100 [doi]
- Resist Intruders Manipulation via Context-Based TCP/IP Packet MatchingYongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang. 1101-1107 [doi]
- Deployment of a Secure Wireless Infrastructure Oriented to Vehicular NetworksPedro J. Fernandez Ruiz, Cristian A. Nieto Guerra, Antonio F. Gómez-Skarmeta. 1108-1114 [doi]
- Automatic Application Signature Construction from Unknown TrafficYu Wang, Yang Xiang, Shun-Zheng Yu. 1115-1120 [doi]
- Simulation Analysis of Moving Peer Influence on Location-Aware P2P NetworkAtsushi Tagami, Shigehiro Ano, Yoichi Tomiura. 1121-1127 [doi]
- Propagation Modeling of Peer-to-Peer WormsXiang Fan, Yang Xiang. 1128-1135 [doi]
- MeTree: A Contribution and Locality-Aware P2P Live Streaming ArchitectureHuey-Ing Liu, I-Feng Wu. 1136-1143 [doi]
- Grid of Segment Trees for Packet ClassificationYeim-Kuan Chang, Yung-Chieh Lin, Chen-Yu Lin. 1144-1149 [doi]
- Towards Near Real-Time Data WarehousingLi Chen, J. Wenny Rahayu, David Taniar. 1150-1157 [doi]
- Data Mapping, Matching and Loading Using Grid ServicesEjaz Ahmed, Nik Bessis, Yong Yue, Muhammad Sarfraz. 1158-1164 [doi]
- Exploiting Rateless Coding in Structured Overlays to Achieve Data PersistenceHeverson Borba Ribeiro, Emmanuelle Anceaume. 1165-1172 [doi]
- An Enhanced Global Index for Location-Based Mobile Broadcast ServicesAgustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu. 1173-1180 [doi]
- Outsourced XML Database: Query Assurance OptimizationAndrew Clarke, Eric Pardede. 1181-1188 [doi]
- Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic QuestionsWolfgang Boehmer. 1189-1194 [doi]
- Metaverses as a Platform for Game Based LearningKristoffer Getchell, Iain Oliver, Alan Miller, Colin Allison. 1195-1202 [doi]
- Neural Network Trainer through Computer NetworksNam Pham, Hao Yu, Bogdan M. Wilamowski. 1203-1209 [doi]
- Compensation of Sensors Nonlinearity with Neural NetworksNicholas J. Cotton, Bogdan M. Wilamowski. 1210-1217 [doi]
- Delta-equalities of Complex Fuzzy RelationsGuangquan Zhang, Tharam S. Dillon, Kai-Yuan Cai, Jun Ma, Jie Lu. 1218-1224 [doi]
- A Japanese Calligraphy Trainer Based on Skill Acquisition Through HaptizationHiroaki Nishino, Kouta Murayama, Tsuneo Kagawa, Kouichi Utsumiya. 1225-1232 [doi]
- MagicNET: Security System for Protection of Mobile AgentsMuhammad Awais Shibli, Imran Yousaf, Sead Muftic. 1233-1240 [doi]
- An Ant-Colony-Optimization Based Approach for Determination of Parameter Significance of Scientific WorkflowsFakhri Alam Khan, Yuzhang Han, Sabri Pllana, Peter Brezany. 1241-1248 [doi]
- Knowledge Sharing Effectiveness MeasurementBehrang Zadjabbari, Pornpit Wongthongtham, Farookh Khadeer Hussain. 1249-1254 [doi]
- Using Ontology for Personalized Mobile Message ComputationLi-Hua Li, Fu-Ming Lee, Yu-Chien Chou, Tsung-Jen Pu. 1255-1262 [doi]
- Automatic Method for Author Name Disambiguation Using Social NetworksDongwook Shin, Taehwan Kim, Hana Jung, Joongmin Choi. 1263-1270 [doi]
- An Information Platform for Low-Literate VillagersAshir Ahmed, Lutfe Kabir, Hiroto Yasuura. 1271-1277 [doi]
- A Two-Phase Approach to Subscription Subsumption Checking for Content-Based Publish/Subscribe SystemsXiulei Qin, Jun Wei, Wenbo Zhang, Hua Zhong, Tao Huang. 1278-1285 [doi]
- Integrating Recreational Fishing Behaviour within a Reef Ecosystem as a Platform for Evaluating Management StrategiesLei Gao, Atakelty Hailu. 1286-1291 [doi]
- Semantic Driven Self-Adaptation of Communications Applied to ERCMSIsmael Bouassida Rodriguez, Jérôme Lacouture, Khalil Drira. 1292-1299 [doi]
- Extracting Named Entities and Synonyms from WikipediaChristian Bohn, Kjetil Nørvåg. 1300-1307 [doi]
- Aletheia--Improving Industrial Service Lifecycle Management by Semantic Data FederationsSteffen Kunz, Franziska Brecht, Benjamin Fabian, Markus Aleksy, Matthias Wauer. 1308-1314 [doi]
- Improving Graduate Employability by Using Social Networking SystemsZhe Jing, Elizabeth Chang, Omar Khadeer Hussain, K. L. Chin. 1315-1322 [doi]
- Human-Computer Interaction ExperimentsTomasz P. Bednarz, Con Caris, Jeremy Thompson, Chris Wesner, Mark Dunn. 1323-1327 [doi]