Abstract is missing.
- Efficient Address Management for Mobile Ad Hoc NetworksSudath Indrasinghe, Rubem Pereira, John Haggerty. 1-8 [doi]
- Analysis of MANET Routing Protocols for Indoor EnvironmentMakoto Ikeda, Elis Kulla, Masahiro Hiyama, Leonard Barolli, Makoto Takizawa. 9-16 [doi]
- A Zone Based Routing Protocol for Ad Hoc Networks and Its Performance Improvement by Reduction of Control PacketsYuki Sato, Akio Koyama, Leonard Barolli. 17-24 [doi]
- Impact of Mobile Sink for Wireless Sensor Networks Considering Different Radio Models and Performance MetricsTao Yang, Gjergji Mino, Leonard Barolli, Fatos Xhafa, Arjan Durresi. 25-32 [doi]
- A Communication Protocol to Improve Fairness and Data Amount on Sensor Data Collection with a Mobile SinkWataru Seino, Tomoki Yoshihisa, Takahiro Hara, Shojiro Nishio. 33-40 [doi]
- AntSens: An Ant Routing Protocol for Large Scale Wireless Sensor NetworksMukul Goyal, Weigao Xie, Seyed Hossein Hosseini 0001, Yusuf Bashir. 41-48 [doi]
- Solving K-Coverage Problem in Wireless Sensor Networks Using Improved Harmony SearchShohreh Ebrahim Nezhad, Hoda Jalal Kamali, Mohsen Ebrahimi Moghaddam. 49-55 [doi]
- Parallel Implementation of a Balancing Domain Decomposition Method for Multi-core ProcessorsMasao Ogino, Hiroshi Kawai, Ryuji Shioya, Shinobu Yoshimura. 56-61 [doi]
- Parallel CAE System for Large Scale Problems Based on Computer NetworkRyuji Shioya, Masao Ogino, Hiroshi Kawai. 62-66 [doi]
- Architecture and Design of Efficient 3D Network-on-Chip (3D NoC) for Custom Multicore SoCAkram Ben Ahmed, Ben Abdallah Abderazek, Kenichi Kuroda. 67-73 [doi]
- Advanced Design Issues for OASIS Network-on-Chip ArchitectureKenichi Mori, Adam Esch, Ben Abdallah Abderazek, Kenichi Kuroda. 74-79 [doi]
- Tuning Operators of Genetic Algorithms for Mesh Routers Placement Problem in Wireless Mesh NetworksFatos Xhafa, Christian Sánchez, Admir Barolli, Rozeta Miho, Leonard Barolli, Makoto Takizawa. 80-87 [doi]
- Autonomous Power Supplied Wireless Mesh Network for Disaster Information SystemToshihiro Suzuki, Yoshitaka Shibata. 88-93 [doi]
- Impact of Source and Destination Movement on MANET Performance Considering BATMAN and AODV ProtocolsElis Kulla, Makoto Ikeda, Leonard Barolli, Rozeta Miho. 94-101 [doi]
- Provisioning Vehicular Ad Hoc Networks with Quality of ServiceGongjun Yan, Danda B. Rawat, Bhed Bahadur Bista. 102-107 [doi]
- A Solution to Protecting USB Keyboard DataKyungroul Lee, Wansoo Kim, Kwangjin Bae, Kangbin Yim. 108-111 [doi]
- Managing Some Security Risks Related to the Deployment of Multifarious Authentication and Authorization in a Virtualized EnvironmentAnnette Tolnai, Sebastiaan H. von Solms. 112-116 [doi]
- An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage ThreatsValentina Viduto, Carsten Maple, Wei Huang. 117-123 [doi]
- Differentiated Bandwidth Allocation and WaveLength Assignment Method in WDM EPONMin Jun Kim, Yong-Suk Jang, Yong-Do Choi, Sung-Ho Kim. 124-128 [doi]
- Design and Evaluation of Fiber Direct Coupling Optical Antennas for Next Generation Optical Wireless Communication SystemsKoichi Takahashi, Nobuo Nakajima. 129-136 [doi]
- Inter-ONU Scheduling Scheme for QoS Guarantee in 10G EPONJae-Hyun Jun, Zhibin Yu, Min-Suk Jung, Sung-Ho Kim. 137-141 [doi]
- Examination of Selection for Relay Nodes Adapted to Priority of Transportation in Triage NetworkHiroki Tamura, Hikaru Kobayashi, Hiroshi Shigeno, Ken-ichi Okada. 142-148 [doi]
- Energy-Efficient Code Dissemination Using Minimal Virtual Backbone in Sensor NetworksJisun Kim, Jiyoung Lim, Kijoon Chae. 149-154 [doi]
- Defect Identification by Sensor Network Under UncertaintiesTomonari Furukawa, Jinquan Cheng, Shen Hin Lim, Fei Xu, Ryuji Shioya. 155-158 [doi]
- Energy-Efficient Server Selection Algorithms for Network ApplicationsTomoya Enokido, Ailixier Aikebaier, Makoto Takizawa. 159-166 [doi]
- Modified Estimation Algorithm for Radio Communication Distance along Random Rough SurfaceJunichi Honda, Kazunori Uchida, Kwang-Yeol Yoon. 167-174 [doi]
- Bandwidth Reservation Method to Consider Reservation Failure in VLANYong-Do Choi, Jae-Hyun Jun, Gi-Beom Kil, Sung-Ho Kim. 175-180 [doi]
- Solid Convex-Hull Sequential Support Vector MachineZhibin Yu, Min Jun Kim, Kyung-Seok Park, Sung-Ho Kim. 181-185 [doi]
- Towards a Common Notion of Privacy Leakage on Public DatabaseShinsaku Kiyomoto, Keith M. Martin. 186-191 [doi]
- Constructivist Approach to Information Security Awareness in the Middle EastMohammed Boujettif, Yongge Wang. 192-199 [doi]
- A Contextual Access Control ModelBoustia Narhimene, Aïcha Mokhtari. 200-205 [doi]
- Redundancy and Defense Resource Allocation Algorithms to Assure Service Continuity against Natural Disasters and Intelligent AttackersFrank Yeong-Sung Lin, Yu-Shun Wang, Po-Hao Tsang, Jui-Pin Lo. 206-213 [doi]
- A Scalable Hybrid Time Protocol for a Heterogeneous GroupIsamu Tsuneizumi, Ailixier Aikebaier, Makoto Ikeda, Tomoya Enokido, Makoto Takizawa. 214-221 [doi]
- Queue Management for the Heavy-Tailed TrafficsTakuo Nakashima. 222-228 [doi]
- Fault Tolerant Methods for Intermitted Failures in Virtual Large Scale DisksMinoru Uehara. 229-234 [doi]
- Mobility Based MIMO Link Adaptation in LTE-Advanced Cellular NetworksVishwanath Ramamurthi, Wei-Peng Chen. 235-241 [doi]
- Reliable Message Broadcast Schemes in Distributed Agreement ProtocolsAilixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 242-249 [doi]
- Application of Genetic Algorithms for QoS Routing in Mobile Ad Hoc Networks: A SurveyAdmir Barolli, Makoto Takizawa, Fatos Xhafa, Leonard Barolli. 250-259 [doi]
- Wireless Distributed Network System for Relief Activities after Disasters - A Field Experiment for Channel Setting and a System for Information Exchange among SheltersMisako Urakami, Satoshi Innami, Makoto Kamegawa, Tetsuya Shigeyasu, Hiroshi Matsuno. 260-267 [doi]
- Performance Evaluation of PC Router Based Cognitive Wireless LANs for Disaster Information SystemGoshi Sato, Yoshitaka Shibata. 268-273 [doi]
- Distributed Disaster Information System in DTN Based Mobile Communication EnvironmentYutaka Sasaki, Yoshitaka Shibata. 274-277 [doi]
- Darknet Monitoring on Real-Operated NetworksSeiichiro Mizoguchi, Yoshiro Fukushima, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai. 278-285 [doi]
- Secure Hybrid Communications for Medical ApplicationsArjan Durresi, Mimoza Durresi, Zeynep Salih, Leonard Barolli. 286-292 [doi]
- Comments on a One-Way Hash Chain Based Authentication for FMIPv6Ilsun You, Jong-Hyouk Lee. 293-296 [doi]
- Malware Obfuscation Techniques: A Brief SurveyIlsun You, Kangbin Yim. 297-300 [doi]
- An Iterative Domain Decomposition Method of Magnetostatic Problems Based on a Mixed FormulationDaisuke Tagami. 301-303 [doi]
- Introduction of a Direct Method at Subdomains in Non-linear Magnetostatic Analysis with HDDMShin-ichiro Sugimoto, Masao Ogino, Hiroshi Kanayama, Shinobu Yoshimura. 304-309 [doi]
- A Parallel Skyline Solver for Coarse Grid Correction of BDD Pre-conditioning in Domain Decomposition MethodHiroshi Kawai, Masao Ogino, Ryuji Shioya, Shinobu Yoshimura. 310-314 [doi]
- A Cloud-Based Support System for Offshore Software DevelopmentYuki Kaeri, Yusuke Manabe, Claude Moulin, Kenji Sugawara, Jean-Paul A. Barthès. 315-319 [doi]
- Two Types of Trustworthiness of Acquaintances in Peer-to-Peer (P2P) Overlay NetworksSoichi Sawamura, Leonard Barolli, Ailixier Aikebaier, Valbona Barolli, Makoto Takizawa. 320-327 [doi]
- Multihopped Wireless Disaster Information Network by Automatic Directional Antenna Control MethodDaisuke Asahizawa, Yoshitaka Shibata. 328-333 [doi]
- An Approximation for Fresnel Function to Reduce Computation Time Based on DRTMKazunori Uchida, Junichi Honda, Yuuki Kimura. 334-339 [doi]
- Wireless Link Selection by Time Transitional AHP Based on Emergent Policy in Cognitive Wireless NetworkNoriki Uchida, Kazuo Takahata, Yoshitaka Shibata. 340-345 [doi]
- LiNS: A Library Navigation System Using Sensors and SmartphonesKazuki Watanabe, Tomoyuki Takahashi, Toshihiko Ando, Kaoru Takahashi, Yoshifumi Sasaki, Tatsuya Funakoshi. 346-350 [doi]
- Network-Adaptive Multipath Video Delivery over Wireless Multimedia Sensor Networks Based on Packet and Path Priority SchedulingAmir Rastegar Lari, Behzad Akbari. 351-356 [doi]
- Received Signal Strength Technique Performance in Sensor Network Localization ApplicationKazim Firat Taraktas, Osman Ceylan, H. Bulent Yagci. 357-362 [doi]
- Hop-by-Hop Reliable Data Deliveries for Underwater Wireless Sensor NetworksMuhammad Ayaz, Azween Abdullah, Ibrahima Faye. 363-368 [doi]
- Enhancing RSSI Technologies in Wireless Sensor Networks by Using Different FrequenciesOsman Ceylan, Kazim Firat Taraktas, H. Bulent Yagci. 369-372 [doi]
- A Novel Adaptable Routing Protocol for Wireless Sensor NetworksK. G. Aravind, M. M. Manohara Pai. 373-378 [doi]
- Multipath Data Transfer in Wireless Multimedia Sensor NetworkShobha Poojary, M. M. Manohara Pai. 379-383 [doi]
- Contract Signatures in E-Commerce ApplicationsLein Harn, Chu-Hsing Lin, Che-Wei Hu. 384-388 [doi]
- A Proxy Partially Blind Signature Scheme with Proxy RevocationFuw-Yi Yang, Ling-Ren Liang. 389-394 [doi]
- Varied Oblivious Transfer Protocols Enabling Multi-receiver and ApplicationsShiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen. 395-400 [doi]
- Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like SystemsChia-Yu Lu, Wu-Chuan Yang, Chi-Sung Laih. 401-406 [doi]
- VoIP Digital Evidence Forensics Standard Operating Procedure (DEFSOP)I-Long Lin, Yun-Sheng Yen, Bo-Lin Wu, Hsiang-Yu Wang. 407-412 [doi]
- Fast Deployment of Computer Forensics with USBsChung-Huang Yang, Pei-Hua Yen. 413-416 [doi]
- Source Camera Identification in Real Practice: A Preliminary ExperimentationAniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Umberto Ferraro Petrillo. 417-422 [doi]
- Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market ApplicationChin-Ling Chen, Jinn-ke Jan, Chih-Feng Chien. 423-428 [doi]
- The Iterative Distributed Re-authentication Scheme Based on EAP-AKA in 3G/UMTS-WLAN Heterogeneous Mobile NetworksShen-Ho Lin, Jung-Hui Chiu, Sung-Shiou Shen. 429-434 [doi]
- Transparent Digital Rights Management System with SuperdistributionChih-Ta Yen, Horng-Twu Liaw, Nai-Wei Lo, Ting-Chun Liu, Jay Stu. 435-440 [doi]
- Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM EnvironmentYi-Fung Huang, Fang-Yie Leu, Chao-Hong Chiu. 441-446 [doi]
- Securing the Cloud s Core Virtual InfrastructureAnnette Tolnai, Sebastiaan H. von Solms. 447-452 [doi]
- A Biologically Modeled Intrusion Detection System for Mobile NetworksBrian C. Williams, Errin W. Fulp. 453-458 [doi]
- High-Capacity Multi-secret Sharing by Random GridTzung-Her Chen, Yao-Sheng Lee, Ci-Lin Li. 459-462 [doi]
- Noise-Resistant Joint Fingerprinting and Decryption Based on Vector QuantizationChih-Yang Lin, Wei-Lun Huang, Tzung-Her Chen. 463-468 [doi]
- Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based TechniquesFuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Chu-Hsing Lin. 469-474 [doi]
- An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security ThreatsAniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri. 475-481 [doi]
- A Wrapper Approach Based on Clustering for Sensors Selection of Industrial Monitoring SystemsCesar Uribe, Claudia Isaza, Oscar Gualdron, Cristian Duran, Adrian Carvajal. 482-487 [doi]
- Discrete Flatness for Non Linear Systems FDINan Zhang, Andrei Doncescu, Félix Mora-Camino. 488-494 [doi]
- Feature Selection for Fault Diagnosis Using Fuzzy-ARTMAP Classification and Conflict IntersectionMourad Benkaci, Andrei Doncescu, Bruno Jammes. 495-500 [doi]
- A Diagnosis Approach Based on Kolmogorov ComplexityNabil Kabbaj, Andrei Doncescu, Mourad Benkaci. 501-504 [doi]
- Detour Routing Protocol for Geographic Sensor NetworksLih-Chyau Wuu, Wen-Bin Li, Wen-Chung Kuo. 505-510 [doi]
- Fast Seamless Secure Handoff for Loosely Coupled Systems in Heterogeneous Wireless Mobile NetworksBen-Jye Chang, Ying-Hsin Liang, Shou-Chi Liang. 511-516 [doi]
- The Decision Scheme of Frame Importance Factor for Video Streaming SystemHuan-Yao Kang, Ching-Lung Chang. 517-521 [doi]
- Frequency Domain Analysis of Human Motions in Surveillance VideoHsuan T. Chang, Chang-Sian Chen, Chun-Wen Hung, Day-Fann Shen. 522-526 [doi]
- Automatic Facial Skin Defect Detection SystemChuan-Yu Chang, Shang-Cheng Li, Pau-Choo Chung, Jui-Yi Kuo, Yung-Chin Tu. 527-532 [doi]
- Fingertip-Writing Alphanumeric Character Recognition for Vision-Based Human Computer InteractionChien-Cheng Lee, Cheng-Yuan Shih, Bor-Shenn Jeng. 533-537 [doi]
- A Motion Planning of Swarm Robots Using Genetic AlgorithmChien-Chou Lin, Po-Yuan Hsiao, Kun-Cheng Chen. 538-543 [doi]
- Gaussian Distributive Filtering in Histogram EqualizationPing-Hsien Lin, Hsu-Chun Yen, Chia-Chen Yu. 544-549 [doi]
- A 3D Model Retrieval System Based on the Cylindrical Projection DescriptorJau-Ling Shih, Chang-Hsing Lee, Chih-Hsun Chou, Hsiang-Yuen Chang. 550-555 [doi]
- An Information Hiding Scheme Using Magic SquaresMing-Gun Wen, Su-Chieng Huang, Chin-Chuan Han. 556-560 [doi]
- Numerical Analysis of Scattered Eletromagnetic Wave by a Dielectric Cylinder with High Contrast by CIP MethodHiroshi Maeda, Hiroyuki Terashima, Tetsuo Maruyama, Shinjiro Hironaka. 561-564 [doi]
- Back Scattering from Target above Random Rough SurfaceKazunori Uchida, Junichi Honda, Shunsuke Nakashima, Kwang-Yeol Yoon. 565-570 [doi]
- Characteristics of Diffracted Waves Going over Building RooftopJiro Iwashige, Leonard Barolli, Katsuki Hayashi. 571-576 [doi]
- Electromagnetic Scattering from Cylinders Located near Periodic Cylinder ArrayKoki Watanabe, Yoshimasa Nakatake. 577-580 [doi]
- Relations among 10-Minute Precipitation, Rainfall Intensity and Ku-Band Rain Attenuation in Kyushu Island, JapanKiyotaka Fujisaki, Goshi Satoh, Mitsuo Tateiba. 581-586 [doi]
- Delay Profile Using Scale Model Method for Microcells in Urban AreasRyuichiro Iwakuma, Yu Funaki, Toyokazu Mine, Shinichi Ichitsubo. 587-591 [doi]
- Application Techniques of Particle Swarm OptimizationZhiqi Meng. 592-595 [doi]
- 2D Wave Propagation Characteristics of the CIP Method with Amplitude Error CompensationTsuyoshi Matsuoka. 596-599 [doi]
- Frequency-Selection Properties for Composite Periodic StructuresMaurice Sesay, Mitsuhiro Yokota. 600-605 [doi]
- Heuristic Maxmin Fairness for the Wireless Channel Allocation ProblemMario Köppen, Rodrigo Verschae, Kaori Yoshida, Masato Tsuru. 606-611 [doi]
- A New Design of Circular Polarized Planar AntennaeMayumi Matsunaga, Toshiaki Matsunaga. 612-615 [doi]
- Evaluation of a Fuzzy-Based CAC Scheme for Different Priorities in Wireless Cellular NetworksTaku Ikebata, Gjergji Mino, Leonard Barolli, Fatos Xhafa, Arjan Durresi, Akio Koyama. 616-621 [doi]
- Adaptive Mixed Bias Resource Allocation for Wireless Mesh NetworksJason B. Ernst, Thabo K. R. Nkwe. 622-626 [doi]
- Effect of Adaptive RTS/CTS ON/OFF Control Method for Mitigating Transmission Overhead of IEEE802.11DCFTetsuya Shigeyasu, Hiroshi Matsuno. 627-632 [doi]
- Field Estimation for Terrestrial Digital Broadcasting in Western Part of FukuokaKazunori Uchida, Junichi Honda, Masafumi Takematsu, Toshiaki Tazume. 633-638 [doi]
- Particle Swarm Optimization on DSI Method for PAPR Reduction in OFDM SystemsShu-Hong Lee, Ho-Lung Hung. 639-642 [doi]
- Phase Error Cancellation for OFDM Systems Using Adaptive FiltersChia-Hsin Cheng, Kai-Jie Chen, Gwo-Ruey Lee, Yung-Fa Huang. 643-647 [doi]
- An Intelligent Fuzzy-Based Cluster Head Selection System for WSNs and Its Performance Evaluation for D3N ParameterHironori Ando, Leonard Barolli, Arjan Durresi, Fatos Xhafa, Akio Koyama. 648-653 [doi]
- Jump Resonance Analysis for Systems with Parametric UncertaintiesLi-Shan Ma, Chih-Hung Wu, Jieh-La Jaw, Bing-Fei Wu, Jau-Woei Perng. 654-659 [doi]
- Dynamic Forensics System with Intrusion Tolerance Based on Hierarchical Coloured Petri-netsHsing-Chung Chen, Jai-Zong Sun, Zhen-Dong Wu. 660-665 [doi]
- Behavior Shaver: An Application Based Layer 3 VPN that Conceals Traffic Patterns Using SCTPMamoru Mimura, Hidehiko Tanaka. 666-671 [doi]
- DDoS Detection Technique Using Statistical Analysis to Generate Quick Response TimeShunsuke Oshima, Takuo Nakashima, Toshinori Sueyoshi. 672-677 [doi]
- Experimental Evaluation of a MANET Testbed in Indoor Stairs ScenariosMasahiro Hiyama, Makoto Ikeda, Leonard Barolli, Elis Kulla, Fatos Xhafa, Arjan Durresi. 678-683 [doi]
- Implementation and Evaluation of Distributed Hash Table Using MPIDaisuke Tsukamoto, Takuo Nakashima. 684-688 [doi]
- A Development of Environment Verification System View-Aid Using Digital Wireless Camera for Low VisionYoshifumi Oyama, Yuki Shimada. 689-694 [doi]
- A Mailing List Management System Mashing-Up with Web ServicesKeisuke Fujiwara, Yoshinari Nomura, Hideo Taniguchi. 695-700 [doi]
- Advanced Relay Nodes for Adaptive Network Services - Concept and Prototype ExperimentMasayoshi Shimamura, Takeshi Ikenaga, Masato Tsuru. 701-707 [doi]
- Gathering Large Scale Human Activity Information Using Mobile Sensor DevicesYuichi Hattori, Sozo Inoue, Takemori Masaki, Go Hirakawa, Osamu Sudoh. 708-713 [doi]
- Teleoperation of a Robot Arm System Using Pneumatic Artificial Rubber Muscles: Teleoperation over the Internet Using UDP and a Web CameraTomonori Kato, Tomoaki Higashi, Kenichi Shimizu. 714-718 [doi]
- Application of a JXTA-Overlay P2P Control System for a Biped Walking RobotKeita Matsuo, Yuichi Ogata, Evjola Spaho, Fatos Xhafa, Leonard Barolli. 719-724 [doi]
- Study on Increase in Propulsion of Flexible Linear ActuatorKazuhiro Ohyama, Yasushi Hyakutake, Hitoshi Kino. 725-730 [doi]
- Decision Method of Internal Force for Sensorless Positioning of Musculoskeletal SystemHitoshi Kino, Shiro Kikuchi, Kenji Tahara. 731-736 [doi]
- Character Modeling and Calligraphic Learning by Haptic DeviceHiroyuki Fujioka, Hiroyuki Kano, Sousuke Kakehi. 737-742 [doi]
- Operational Feel Adjustment for Power-Assisted Positioning by an Actor-Critic MethodTetsuya Morizono. 743-748 [doi]
- A Method for Event Handling on Robot Town Platform and a Sharable Personal Mobility RobotTakafumi Ienaga, Yosuke Senta, Daisaku Arita, Yoshihiko Kimuro, Kouji Murakami, Tsutomu Hasegawa. 749-754 [doi]
- Experimental Studies on Various Types of Animal Mimicking RobotsYoshiyuki Kawamura. 755-759 [doi]
- Iterative Learning Scheme for a Redundant Musculoskeletal Arm: Task Space Learning with Joint and Muscle RedundanciesKenji Tahara, Hitoshi Kino. 760-765 [doi]
- Development of Detection System for the Bed Accident Using Ultrasonic Wave SensorHiroyuki Agatsuma, Takehiko Abe, Takuya Tajima, Haruhiko Kimura. 766-771 [doi]
- Design and Implementation of Repository-Based Agent Organization Method on Heterogeneous Agent PlatformTakahiro Uchiya, Tetsuo Kinoshita. 772-779 [doi]
- An OWL-Based Ontology to Represent Knowledge about Location, Space and Perceputual PrimitivesShigeru Fujita, Kenji Sugawara. 780-781 [doi]
- Multiagent Architecture of Knowledge Based Network Management Support SystemKazuto Sasai, Gen Kitagata, Tetsuo Kinoshita. 782-787 [doi]
- Perceptual Integration of Real-Space and Virtual-Space Based on Symbiotic RealityHiroshi Noguchi, Takuo Suganuma, Tetsuo Kinoshita. 788-793 [doi]
- Implementation of SmartBox End-Device for a P2P System and Its Evaluation for E-Learning and Medical ApplicationsYuichi Ogata, Keita Matsuo, Evjola Spaho, Leonard Barolli, Fatos Xhafa. 794-799 [doi]
- Moving Object Detection by a Ghost Cancel Method on Indoor ImagesHiroyuki Utsunomiya, Shigeru Fujita. 800-805 [doi]
- A Road Location Estimating Method by Many Trajectories to Realize Rapid Map Survey for a Car Navigation SystemHiromitsu Sugawara, Nobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata. 806-811 [doi]
- Wireless Sensor Network Transport Protocol - A State of the ArtA. J. Dinusha Rathnayaka, Vidyasagar M. Potdar, Atif Sharif, Saeed Sarencheh, Samitha Kuruppu. 812-817 [doi]
- Prototype Design and Analysis of Wireless Vibration SensorMohammad reza Akhondi, Alex Talevski, Tsung-Hsien Chou. 818-823 [doi]
- Wireless Sensor Networks: Challenges AheadA. J. Dinusha Rathnayaka, Vidyasagar M. Potdar, Atif Sharif, Saeed Sarencheh, Samitha Kuruppu. 824-829 [doi]
- State of the Art: Carbon Emission Accountability ModelingValencia Lo, Vidyasagar M. Potdar. 830-835 [doi]
- Criteria for Hardware Selection of Wireless Vibration SensorMohammad reza Akhondi, Alex Talevski, Tsung-Hsien Chou. 836-841 [doi]
- Wireless Multimedia Sensor Networks Applications and Security ChallengesBambang Harjito, Song Han. 842-846 [doi]