Abstract is missing.
- An Optical Wavelength Switching Architecture for a High-Performance Low-Power Photonic NoCSomayyeh Koohi, Alireza Shafaei, Shaahin Hessabi. 1-6 [doi]
- Fast Two Dimensional Convex Hull on the GPUSrikanth Srungarapu, Durga Prasad Reddy, Kishore Kothapalli, P. J. Narayanan. 7-12 [doi]
- QoS-Aware Middleware for Scalable ReplicationRaihan Al-Ekram, Richard C. Holt. 13-20 [doi]
- The Degree of Masking Fault Tolerance vs. Temporal RedundancyNils Müllner, Oliver E. Theel. 21-28 [doi]
- Generating Lowering and Lifting Schema Mappings for Semantic Web ServicesJakub Klímek, Martin Necaský. 29-34 [doi]
- Non-invasive Browser Based User Modeling Towards Semantically Enhanced Personlization of the Open WebKevin Koidl, Owen Conlan, Lai Wei, Ann Marie Saxton. 35-40 [doi]
- Algorithm for Population of Object Property Assertions Derived from Telecom Contact Centre Product Support DocumentationAlexandre Kouznetsov, Jonas B. Laurila, Christopher J. O. Baker, Bradley Shoebottom. 41-46 [doi]
- Semantic Reasoning Framework to Supervise and Manage Contexts and Objects in Pervasive Computing EnvironmentsLyazid Sabri, Abdelghani Chibani, Yacine Amirat, Gian Piero Zarri. 47-52 [doi]
- Evaluation of the Distributed Case-Based Reasoning System on a Distributed Computing PlatformHa Manh Tran, Jürgen Schönwälder. 53-58 [doi]
- Using I/O Schedulers to Reduce I/O Load in Virtualization EnvironmentsTsuyoshi Ota, Shusuke Okamoto. 59-62 [doi]
- Design and Evaluation of a Distributed Shared Memory Network for Application-Specific PC Cluster SystemsYoshimasa Ohnishi, Takaichi Yoshida. 63-70 [doi]
- GPU Accelerated Lanczos Algorithm with ApplicationsKiran Kumar Matam, Kishore Kothapalli. 71-76 [doi]
- The Research of Locating Methods for Mobile Stations Based on IEEE 802.16e Multi-hop WMANsSheng-Cheng Yeh, Chia-Hui Wang, Wu-Hsiao Hsu, Ming-Yang Su. 77-80 [doi]
- A Fast-Boot Method for Embedded Mobile Linux: Toward a Single-Digit User Sensed Boot Time for Full-Featured Commercial PhonesDaisuke Fuji, Toshihiko Yamakami, Kunihiro Ishiguro. 81-85 [doi]
- Extension of Proxy Mobile IPv6 with Bicasting for Support of Multi-homing and Mobility in Wireless NetworksJi In Kim, Seok Joo Koh. 86-89 [doi]
- An Efficient Model for Cooperative Caching in Mobile Information SystemsThu Nguyen Tran Minh, Dong Thi Bich Thuy. 90-95 [doi]
- A Dynamic Cluster Construction Method Based on Characteristics of Query Generation in Peer-to-Peer NetworksYukie Kobayashi, Tomoki Yoshihisa, Takahiro Hara, Shojiro Nishio. 96-101 [doi]
- An Anonymity Layer for JXTA ServicesJoan Arnedo-Moreno, Marc Domingo-Prieto. 102-107 [doi]
- New Structured P2P Network with Dynamic Load Balancing SchemeAtushi Takeda, Takuma Oide, Akiko Takahashi. 108-113 [doi]
- Detecting Sybils in Peer-to-Peer Overlays Using Psychometric Analysis MethodsK. Haribabu, Arindam Paul, Chittaranjan Hota. 114-119 [doi]
- Providing Secure Integrity in Peer-to-Peer Oriented Mobile EnvironmentsMasayuki Terada, Takayasu Yamaguchi, Sadayuki Hongo. 120-126 [doi]
- Handling Failures of Static Sensor Nodes in Wireless Sensor Network by Use of Mobile SensorsEdison Pignaton de Freitas, Tales Heimfarth, Ivayr Farah Netto, Carlos Eduardo Pereira, Armando Morado Ferreira, Flávio Rech Wagner, Tony Larsson. 127-134 [doi]
- A JADE Middleware for Grid Inter-cooperated InfrastructuresStelios Sotiriadis, Nik Bessis, Ye Huang, Pierre Kuonen, Nick Antonopoulos. 135-140 [doi]
- GridCuda: A Grid-Enabled CUDA Programming ToolkitTyng-Yeu Liang, Yu-wei Chang. 141-146 [doi]
- Satellite Cloud ComputingKamen Kanev, Nikolay N. Mirenkov. 147-152 [doi]
- Application to the Disaster Data of an Idea Generation Consistent Support SystemToshihiro Ajiki, Hiroshi Fukuda, Tomohiro Kokogawa, Junko Itou, Jun Munemori. 153-158 [doi]
- Design and Implementation of a Web 2.0 Service Platform for DPWS-Based Home-Appliances in the Cloud EnvironmentChung-Ming Huang, Hao-Hsiang Ku, Yen-Wen Chen. 159-163 [doi]
- A Novel Bandwidth Estimation Scheme Used in Admission Control for Wireless Mesh NetworksChen Su, Kaiping Xue, Peilin Hong, Hancheng Lu. 164-169 [doi]
- Trustworthy Path Discovery in MANET - A Message Oriented Cross-Correlation ApproachGirish Kumar Patnaik, M. M. Gore. 170-177 [doi]
- Modifying the IEEE 802.11 MAC Protocol for Multi-hop Reservation in MIMC Tactical Ad Hoc NetworksYoun-Chul Cho, Sun-Joong Yoon, Young-Bae Ko. 178-183 [doi]
- Coordination Issues in an Agent-Based Approach for Territorial Emergence ManagementElton Domnori, Giacomo Cabri, Letizia Leonardi. 184-189 [doi]
- Cloud-Based Support for Transactional Mobile AgentsIzabela Moise, Michel Hurfin, Linda Zeghache, Nadjib Badache. 190-197 [doi]
- Analysis of Failures Characteristics in the UNINETT IP Backbone NetworkAndrés J. Gonzalez, Bjarne E. Helvik. 198-203 [doi]
- Effects of Soft Error to System ReliabilityLei Xiong, Qingping Tan, Jianjun Xu. 204-209 [doi]
- Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation ApproachKok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal. 210-215 [doi]
- Recursive Implementation of Markov Model, A New ApproachMd. Osman Gani, Sarah Isnain Binte Ashraf, Nafia Malik, Bushra Hossain, M. Afzal Hossain, Hasan Sarwar. 216-220 [doi]
- An Intelligent Scan Mechanism for 802.11 Networks by Using Media Independent Information Server (MIIS)Muhammad Qasim Khan, Steinar Hidle Andresen. 221-225 [doi]
- Bio-inspired Service Management Framework: Green Data-Centres Case StudyRay Carroll, Sasitharan Balasubramaniam, Dmitri Botvich, William Donnelly. 226-231 [doi]
- Space Division Multiplexing Aided Opportunistic Spectrum Access for Cognitive Radio NetworksZhao Li, Qin Liu, Linjing Zhao. 232-237 [doi]
- Comparison of Performance of ROADMs in Optical Networks with BPP Traffic ModelsT. S. Indumathi, T. Srinivas, K. Rajaiah, Velur Rajappa. 238-242 [doi]
- A Novel Spectrum Sensing Algorithm Based on Compressive Sensing for Cognitive RadioLinjing Zhao, Xi Chen, Gangshan Zhang. 243-246 [doi]
- Conceptual Analysis of Transactional-, Capacity-Driven Web ServicesZakaria Maamar, Sami Bhiri, Samir Tata, Khouloud Boukadi, Wathiq Mansoor. 247-252 [doi]
- One Size Does Not Fit All: A Group-Based Service Selection for Web-Based Business ProcessesBasem Suleiman, Carlos Eduardo da Silva, Sherif Sakr. 253-260 [doi]
- Handling Large Datasets in Parallel Metaheuristics: A Spares Management and Optimization Case StudyChee Shin Yeo, Elaine Wong Kay Li, Yong Siang Foo. 261-266 [doi]
- Towards a Self-Healing Approach to Sustain Web Services ReliabilityMohamed-Hedi Karray, Chirine Ghedira, Zakaria Maamar. 267-272 [doi]
- Adaptive Genetic Algorithm for QoS-aware Service SelectionChengwen Zhang. 273-278 [doi]
- A Component-Based Approach to Security Protocol DesignN. Nobelis, Karima Boudaoud, Christian Delettre, Michel Riveill. 279-284 [doi]
- Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading SystemsHusna Osman, Hamish Taylor. 285-290 [doi]
- A Simple Path Diversity Algorithm for Interdomain RoutingWu-Hsiao Hsu, Yuh-Pyng Shieh, Sheng-Cheng Yeh, Pei-Siou Hung. 291-296 [doi]
- On the Rateless Character of Irregular RA CodesRong Sun, Jingwei Liu, Pingli Zhang, Baoming Bai. 297-301 [doi]
- Hybrid Virtual Router and Mesh Networks: A Cost Effective Strategy for Road TunnelsYao H. Ho. 302-307 [doi]
- Evaluation of Gigabit Ethernet Local Area Networks in Windows Vista-Server 2008 EnvironmentSamad S. Kolahi, Burjiz K. Soorty. 308-312 [doi]
- SmartChannel: A Robust and Energy-Aware Multi-channel Management Scheme in Wireless Sensor NetworksXin Yang, Huanyu Zhao, Xiaolin Li. 313-318 [doi]
- Decentralized Multi-sink Data Transfer Protocol for Wireless Sensor NetworksYuuki Tanno, Toshiaki Miyazaki. 319-324 [doi]
- Pilgrims Tracking Using Wireless Sensor NetworkM. Mohandes, M. A. Haleem, A. Abul-Hussain, K. Balakrishnan. 325-328 [doi]
- Fusion Function Placement Algorithm for Distributed Data Fusion Application in Wireless Sensor NetworksZongqing Lu, Su-Lim Tan, Jit Biswas. 329-334 [doi]
- Empirical Survey: Experimentation and Implementations of High Speed Protocol Data Transfer for GRIDDanilo Valeros Bernardo, Doan B. Hoang. 335-340 [doi]
- Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet TraceMasaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata. 341-348 [doi]
- An Oblivious Image Retrieval ProtocolPruthvi Reddy Sabbu, Ganugula Umadevi, Kannan Srinathan, Bezawada Bruhadeshwar. 349-354 [doi]
- Analysis of Spoofed IP Traffic Using Time-to-Live and Identification Fields in IP HeadersMasayuki Ohta, Yoshiki Kanda, Kensuke Fukuda, Toshiharu Sugawara. 355-361 [doi]
- SmartVANET: The Case for a Cross-Layer Vehicular Network ArchitectureHarsh Trivedi, Prakash Veeraraghavan, Seng Wai Loke, Aniruddha Desai, Jack Singh. 362-368 [doi]
- Building an HPC-as-a-Service Toolkit for User-Interactive HPC Services in the CloudXiaorong Li, Henry Novianus Palit, Yong Siang Foo, Terence Hung. 369-374 [doi]
- Proposal for Solar Powered Grid Based on Reused PCsKenichi Fujii, Motoi Yamagiwa, Minoru Uehara. 375-380 [doi]
- Improving Probe UsabilityAlexandre Otto Strube, Dolores Rexachs, Emilio Luque. 381-387 [doi]
- Evaluation of an Intelligent Fuzzy-Based Cluster Head Selection System for WSNs Using Different ParametersLeonard Barolli, Hironori Ando, Fatos Xhafa, Arjan Durresi, Rozeta Miho, Akio Koyama. 388-395 [doi]
- A Reliable Event Response Framework for Wireless Sensor and Actor NetworksGhalib A. Shah, Mehwish Hassan. 396-401 [doi]
- A Medium Access Control Protocol with Adaptive Parent Selection Mechanism for Large-Scale Sensor NetworksBehnam Dezfouli, Marjan Radi, Mohammad Ali Nematbakhsh, Shukor Abd Razak. 402-408 [doi]
- An Adaptive Reliable Transport Protocol Based on Automatic reSend reQuest(ASQ) Technique for Wireless Sensor NetworksM. P. Gilesh, R. C. Hansdah. 409-416 [doi]
- Auctions for Secure Multi-party Policy Negotiation in Ambient IntelligenceJulian Schütte, Stephan Heuser. 417-423 [doi]
- Towards a Forensic Analysis for Multimedia Communication ServicesDimitris Geneiatakis, Angelos D. Keromytis. 424-429 [doi]
- IPAS: Implicit Password Authentication SystemSadiq Almuairfi, Parakash Veeraraghavan, Naveen Chilamkurti. 430-435 [doi]
- Key Distribution in Wireless Sensor Networks Using Finite Affine PlaneSamiran Bag, Sushmita Ruj. 436-441 [doi]
- A Publish/Subscribe Communication Infrastructure for VANET ApplicationsTulika Mishra, Deepak Garg, Manoj Madhav Gore. 442-446 [doi]
- Configuration Interface for Industrial Wireless Sensor NetworksJosé Cecílio, João Pedro Costa, Pedro Martins, Pedro Furtado. 447-452 [doi]
- Analysis of Cloud Computing Delivery Architecture ModelsIrena Bojanova, Augustine Samba. 453-458 [doi]
- A Facility Framework for Distributed ApplicationQingti Guo, Carol Smidts. 459-466 [doi]
- Network Failure Recovery with Tie-SetsKiyoto Kadena, Kiyoshi Nakayama, Norihiko Shinomiya. 467-472 [doi]
- Modelling and Image Processing of Constriction and Proliferation in the Gastrulation Process of Drosophila melanogasterMuhammad Tayyab, A. Lontos, Emmanuel Promayon, Jacques Demongeot. 473-477 [doi]
- Stochastic Approach in Modelling Epidemic SpreadJulie Mintsa, Mustapha Rachdi, Jacques Demongeot. 478-482 [doi]
- Random Boolean Networks and Attractors of their Intersecting CircuitsJacques Demongeot, Adrien Elena, Mathilde Noual, Sylvain Sené. 483-487 [doi]
- Determination, Optimization and Taxonomy of Regulatory Networks: The Example of Arabidopsis thaliana Flower MorphogenesisNicolas Glade, Adrien Elena, Fabien Corblin, Eric Fanchon, Jacques Demongeot, Hedi Ben Amor. 488-494 [doi]
- Application of Meta-level Abduction for the Treatment of Hypertension Using SOLARGrégoire Lejay, Katsumi Inoue, Andrei Doncescu. 495-500 [doi]
- Operator Decision in Simulation of Biological SystemsPierre Siegel, Andrei Doncescu. 501-506 [doi]
- Performance Analysis of Hadoop for Query ProcessingTomasz Wiktor Wlodarczyk, Yi Han, Chunming Rong. 507-513 [doi]
- K-means Clustering in the Cloud - A Mahout TestRui Maximo Esteves, Rui Pais, Chunming Rong. 514-519 [doi]
- Markov Chain Based Monitoring Service for Fault Tolerance in Mobile Cloud ComputingJi Su Park, Heon-Chang Yu, Kwang-Sik Chung, Eunyoung Lee. 520-525 [doi]
- Live Migration of Parallel Applications with OpenVZFabian Romero, Thomas J. Hacker. 526-531 [doi]
- A P2P Network Construction Method Based on Cycle of Sensing and Location in Ubiquitous Sensor EnvironmentYoshihiro Kosaka, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 532-537 [doi]
- Proposal and Evaluation of an Extraction Method for Inaccurate Example Sentences Using a Web Search Engine for Multilingual Parallel TextsTaku Fukushima, Takashi Yoshino, Aguri Shigeno. 538-543 [doi]
- Smart Blood Query: A Novel Mobile Phone Based Privacy-Aware Blood Donor Recruitment and Management System for Developing RegionsMuhammad Sajidur Rahman, Khondoker Asif Akter, Shakil Hossain, Anjon Basak, Syed Ishtiaque Ahmed. 544-548 [doi]
- MANET-Viewer II: A Visualization System for Visualizing Packet Flow in Mobile Ad-hoc NetworksShohei Sato, Akio Koyama, Leonard Barolli. 549-554 [doi]
- Resilient and Secure File Dispersal in a Mobile P2P SystemKhalid Ashraf, Rachid Anane, Nick Blundell. 555-560 [doi]
- Protocol Data Parts Inclusion in a Formal Passive Testing ApproachFelipe Lalanne, Stephane Maag. 569-573 [doi]
- Yet Another Sanitizable and Deletable SignaturesTetsuya Izu, Masami Izumi, Noboru Kunihiro, Kazuo Ohta. 574-579 [doi]
- An Approach for Integrating 3D Virtual Worlds with Multiagent SystemsJeanne Blair, Fuhua Lin. 580-585 [doi]
- Using Natural Language Tool to Assist VPRG Automated Extraction from Textual Vulnerability DescriptionHa-Thanh Le, Peter Kok Keong Loh. 586-592 [doi]
- Selective Encryption Scheme and Mode to Avoid Generating Marker Codes in JPEG2000 Code Streams with Block CipherHiroki Ikeda, Keiichi Iwamura. 593-600 [doi]
- Improvement and Evaluation of a Method to Manage Multiple Types of LogsAkihiro Tomono, Minoru Uehara, Yuji Shimada. 601-606 [doi]
- Digital Identity Metadata Scheme: A Technical Approach to Reduce Digital Identity RisksGhazi Ben Ayed. 607-612 [doi]
- Optimizing Security Efficiency through Effective Risk ManagementSolange Ghernaouti-Helie, Igli Tashi, David Simms. 613-619 [doi]
- Calculating Wikipedia Article Similarity Using Machine Translation Evaluation MetricsMaike Erdmann, Andrew M. Finch, Kotaro Nakayama, Eiichiro Sumita, Takahiro Hara, Shojiro Nishio. 620-625 [doi]
- Closed and Maximal Subgraph Mining in Internally and Externally Weighted Graph DatabasesTomonobu Ozaki, Minoru Etoh. 626-631 [doi]
- Domain Independent Sentiment Classification with Many LexiconsBruno Ohana, Brendan Tierney, Sarah Jane Delany. 632-637 [doi]
- XML Retrieval More Efficient Using ADXPI Indexing SchemeTanakorn Wichaiwong, Chuleerat Jaruskulchai. 638-643 [doi]
- An Improved Hybrid Recommender System by Combining PredictionsBelkacem Chikhaoui, Mauricio Chiazzaro, Shengrui Wang. 644-649 [doi]
- The Design of a Web-Based Multimedia Sport Instructional SystemKosuke Takano, Kin Fun Li, Mark Graham Johnson. 650-657 [doi]
- A Novel Mechanism to Improve Handover Efficiency Considering the Duplicate Address Occurs in HMIPv6Yu-Hsuang Chen, Tin Yu Wu, Wei-Tsong Lee. 658-663 [doi]
- A Handoff Scheme Using Movement Prediction in Radio over Fiber Indoor Network at 60 GHzVan Quang Bien, R. Venkatesha Prasad, Ignas G. Niemegeers. 664-669 [doi]
- Performance Evaluation of AODV and DYMO as a Plattform for Rescue Task Applications in MANETsMiguel A. Wister, Pablo Pancardo, Francisco D. Acosta, Dante Arias Torres. 670-675 [doi]
- Experimentations for QoS Evaluation of Publish/Subscribe Systems Deployed on Ad-hoc NetworkImene Lahyani, Mohamed Jmaiel. 676-681 [doi]
- Bundling Consumer Connections - A Performance AnalysisAntti Mäkelä, Jukka Manner. 682-689 [doi]
- Exploring Multi-homing Issues in Heterogeneous EnvironmentsGlenford E. Mapp, Mahdi Aiash, Hélio Crestana Guardia, Jon Crowcroft. 690-695 [doi]
- Host-Centric Site-Exit Router Selection in IPv6 Site Multihoming EnvironmentKenji Ohira, Yasuo Okabe. 696-703 [doi]
- Policy-Based IP Address Selection in SCTP Automatic Address ReconfigurationShin Maruyama, Masahiro Kozuka, Yasuo Okabe, Motonori Nakamura. 704-707 [doi]
- Evaluation of Concurrent Multipath Transfer over Dissimilar PathsHakim Adhari, Thomas Dreibholz, Martin Becke, Erwin P. Rathgeb, Michael Tüxen. 708-714 [doi]
- Enhanced CAC with QoS Scheme for Improving the Efficiency of Resource Allocation on the IEEE 802.16 NetworkShin-Jer Yang, Chun-Hsiu Cheng, Rei-Yao Wu. 715-720 [doi]
- The Influence of User-Context on Mobile Information NeedsAlton Yeow-Kuan Chua, Radhika Shenoy Balkunje, Dion Hoe-Lian Goh. 721-726 [doi]
- Steady/Unsteady Communication Performance in Large-Scale Regular NetworksTakashi Yokota, Kanemitsu Ootsu, Takanobu Baba. 727-732 [doi]
- STARS: A Framework for Statistically Rigorous Simulation-Based Network ResearchEamon Millman, Deepali Arora, Stephen W. Neville. 733-739 [doi]
- Evaluations of Resettable Stateful NMRKatsuyoshi Matsumoto, Minoru Uehara, Hideki Mori. 740-745 [doi]
- Performance Evaluation of Load Balanced Web ProxiesSudsanguan Ngamsuriyaroj, Pak Rattidham, Ittipon Rassameeroj, Pisut Wongbuchasin, Nuttida Aramkul, Suttatip Rungmano. 746-750 [doi]
- A Study of Efficiency-Campus Networks in Western Himalayan Universities of IndiaDhirendra Sharma, Vikram Kumar, Marco Zennaro, Vikram Singh. 751-756 [doi]
- A Performance Evaluation Study of Video-on-Demand Traffic over IP NetworksNader F. Mir, Meera M. Nataraja, Savitha Ravikrishnan. 757-762 [doi]
- SMART CAMP: Benefits of Media and Smart Service ConvergenceLukas J. Oslislo, Alex Talevski, Achim Karduck. 763-768 [doi]
- A Prototyping Development of ArabGrid Toolkit Using MML-GSCATS MethodologyEjaz Ahmed, Nik Bessis, Yong Yue, Peter Norrington, Muhammad Sarfraz. 769-776 [doi]
- Effect of WPA2 Security on IEEE 802.11n Bandwith and Round Trip Time in Peer-Peer Wireless Local Area NetworksPeng Li, Samad S. Kolahi, Mustafa Safdari, Mulugeta Argawe. 777-782 [doi]
- A Distributed and Dynamic System for Detecting MalwareHwasu Shin, Jongsub Moon, Manhyun Chung. 783-788 [doi]
- SenseKey - Simplifying the Selection of Key Management Schemes for Sensor NetworksRodrigo Roman, Javier Lopez, Cristina Alcaraz, Hsiao-Hwa Chen. 789-794 [doi]
- IPv6 VoIP Deployment on Taiwan Academic Network (TANet)Whai-En Chen, Tzu-Hsuan Wu. 795-799 [doi]
- The Design of Real-Time Warning System in Future Internet EnvironmentWun-Yuan Huang, Jen-Wei Hu, Te-Lung Liu. 800-804 [doi]
- A Simple Network-Engineering Approach for Improving Connection Availability in WDM NetworksHung-Yi Chang, I.-Kai Chen, Wen-Ching Chiang. 805-807 [doi]
- A Sensor Relocation Scheme for Wireless Sensor NetworksMuhammad Asim, Hala M. Mokhtar, Muhammad Zahid Khan, Madjid Merabti. 808-813 [doi]
- Optimal Wireless Sensor Network Design for Efficient Energy UtilizationChutima Prommak, Sujitra Modhirun. 814-819 [doi]
- Limitations of Simulation Tools for Large-Scale Wireless Sensor NetworksMuhammad Zahid Khan, Bob Askwith, Faycal Bouhafs, Muhammad Asim. 820-825 [doi]
- An Enhanced Power Control Transmission Scheme Based on CVIAMing-Yang Chen, Ya-Chun Li, Tin Yu Wu, Wei-Tsong Lee. 826-829 [doi]
- Optimizing Power Consumption for Mobile Stations with Multiple Uplink and Downlink Connections in a Mobile WiMAX NetworkGuan-Hsiung Liaw, Chun-Yen Kuo, Kuo-Huang Chung. 830-836 [doi]
- QoE Aware Service Delivery in Distributed EnvironmentKhalil ur Rehman Laghari, Noël Crespi, Benjamín Molina, Carlos E. Palau. 837-842 [doi]
- A Generic Approach to the Services Delivery in Enterprise eBusiness PlatformsNatalia Kryvinska, Christine Strauss, Muhammad Younas, Do Van Thanh. 843-848 [doi]
- Quality of Service in Large Scale Mobile Distributed Systems Based on Opportunistic NetworksMihai Tanase, Valentin Cristea. 849-854 [doi]
- Cluster-Based Scheduling Algorithm for Periodic XML Data Broadcast in Wireless EnvironmentsYongrui Qin, Hua Wang, Lili Sun. 855-860 [doi]
- Adaptive and Efficient Data Dissemination in Mobile P2P EnvironmentsAgustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu, Makoto Takizawa. 861-866 [doi]
- Towards Improvement of Active XML RepresentationBinh Viet Phan, Eric Pardede, J. Wenny Rahayu. 867-872 [doi]
- Tracing Moving Objects in Internet-Based RFID NetworksYanbo Wu, Quan Z. Sheng, Damith Chinthana Ranasinghe. 873-878 [doi]
- A Hybrid Sharing Control Model for Context Sharing and Privacy in Collaborative SystemsAhmad Kamran Malik, Schahram Dustdar. 879-884 [doi]
- A Three-Dimension Analysis of Driving Factors for Mobile Application Stores: Implications of Open Mobile Business EngineeringToshihiko Yamakami. 885-889 [doi]
- The Digital Travel Diary System Using the Network Service PlatformSoichiro Ushio, Yuka Ito, Kazunori Okada, Tomoki Kitahara, Hidenori Tsuji, Satoko Moriguchi, Masahiko Narita, Yuka Kato. 890-895 [doi]
- Context-Aware Mobile Learning with a Semantic Service-Oriented InfrastructureYilun Chia, Flora S. Tsai, Wee Tiong Ang, Rajaraman Kanagasabai. 896-901 [doi]
- A Set of Simplified Scheduling Constraints for Underwater Acoustic MAC SchedulingWouter van Kleunen, Nirvana Meratnia, Paul J. M. Havinga. 902-907 [doi]
- Multi-stage AUV-aided Localization for Underwater Wireless Sensor NetworksMarc Waldmeyer, Hwee Pink Tan, Winston Khoon Guan Seah. 908-913 [doi]