Abstract is missing.
- The design and implementation of a wireless payment systemXianping Wu, Osama Dandash, Phu Dung Le, Bala Srinivasan.
- Utilizing network features for privacy violation detectionJaijit Bhattacharya, Rajanish Dass, Vishal Kapoor, S. K. Gupta.
- FACTS - A rule-based middleware architecture for wireless sensor networksKirsten Terfloth, Georg Wittenburg, Jochen H. Schiller. 1-8
- A Sensor network design from a probabilistic automaton model of impersonation attackSuman Roy, Debapriyay Mukhopadhyay, Chandrashekhara Thejaswi. 1-7
- Efficient algorithms for probabilistic spatial queries in mobile ad hoc networksDominique Dudkowski, Pedro José Marrón, Kurt Rothermel. 1-10
- Efficient cooperative caching in ad hoc networksNarottam Chand, Ramesh C. Joshi, Manoj Misra. 1-8
- Programmable active services for SIPM. Ranganathan, Jean Deruelle, Doug Montgomery. 1-8
- Mitigating overheads and path correlation in node-disjoint multipath routing for mobile ad hoc networksAsh Mohammad Abbas, Bijendra Nath Jain. 1-7
- An efficient mechanism for connecting MANET and internet through complete adaptive gateway discoveryVanzara Rakeshkumar, M. Misra. 1-5
- Comparing lexical analysis tools for buffer overflow detection in network softwareDavide Pozza, Riccardo Sisto, Luca Durante, Adriano Valenzano. 1-7
- Evaluation of queueing policies and forwarding strategies for routing in intermittently connected networksAnders Lindgren, Kaustubh S. Phanse. 1-10
- An efficient radio admission control algorithm for 2.5G/3G cellular networksSuresh Kalyanasundaram, Rajeev Agrawal. 1-7
- Separating control software from routersRamachandran Ramjee, Furquan Ansari, Martin Havemann, T. V. Lakshman, Thyagarajan Nandagopal, Krishan K. Sabnani, Thomas Y. C. Woo. 1-10
- Enhanced distributed hash tables for complex queriesPankaj Garg, Amit Kumar, Huzur Saran. 1-9
- Intel® IXP28XX network processor based NG edge routerVivek Jaiswal, Sanjay Kumar. 1-12
- The SIMPLE presence and event architectureHenning Schulzrinne. 1-9
- VoIP service quality monitoring using active and passive probesShipra Agrawal, P. P. S. Narayan, Jeyashankher Ramamirtham, Rajeev Rastogi, Mark Smith, Ken Swanson, Marina Thottan. 1-10
- Case study on the use of SDL for specifying an IETF micro mobility protocolTelemaco Melia, Amardeo Sarma, Rui L. Aguiar, Dieter Hogrefe. 1-5
- TCP-Migration with application-layer dispatching: A new HTTP request distribution architecture in locally distributed web server systemsMasahiko Takahashi, Akihito Kohiga, Tomoyoshi Sugawara, Atsuhiro Tanaka. 1-10
- Call control on linesR. Sai Anand, Thomas Erlebach. 1-6
- Performance of real-time traffic in edca-based IEEE 802.11 b/g WLANSAtanu Guchhait, Rajeev Muralidhar, Ajay Bakre. 1-7
- Spread-based heuristic for sensor selection in sensor networksVaishali P. Sadaphal, Bijendra N. Jain. 1-9
- Interactive and extensible framework for execution and monitoring of wireless sensor networksMark Ivester, Alvin Lim. 1-10
- Protected computing vs. trusted computingAntonio Mana, Antonio Muñoz. 1-7
- Resource management in heterogenous wireless networks with overlapping coverageBin Bin Chen, Mun Choon Chan. 1-10
- CARA: Cellular automata based remote-user authentication schemeSomanath Tripathy, Atanu Roy Chowdhury, Sukumar Nandi. 1-4
- A peer-to-peer reference architectureAtul Singh, Mads Haahr. 1-10
- Dynamic protocol plug-in: A middleware provision for enhancing network service performanceKaliappa Nadar Ravindran, Jun Wu. 1-11
- M2MC: Middleware for many to many communication over broadcast networksChaitanya Krishna Bhavanasi, Sridhar Iyer. 1-10
- A deployment tool for public safety ad-hoc networksShushan Zhao, Daniel Jaskiewicz, Jouni Karvo. 1-6
- Middleware for wireless sensor networks: A surveySalem Hadim, Nader Mohamed. 1-7
- Remote storage for mobile devicesJarkko Tolvanen, Tapio Suihko, Jaakko Lipasti, N. Asokan. 1-9
- Replica voting: A distributed middleware service for real-time dependable systemsKaliappa Nadar Ravindran, Kevin A. Kwiat, Ali Sabbir, Bei Cao. 1-7
- Effective bandwidth utilisation in multihoming networksAshok Singh Sairam, Gautam Barua. 1-8
- A measurement study of the Linux TCP/IP stack performance and scalability on SMP systemsShourya P. Bhattacharya, Varsha Apte. 1-10
- Fault repair framework for mobile sensor networksTuan D. Le, Nadeem Ahmed, Nandan Parameswaran, Sanjay Jha. 1-8
- Using the liberty alliance architecture to secure ip-level handoversGovindarajan Krishnamurthi, Tat-Keung Chan. 1-10
- Architecting protocol stack optimizations on mobile devicesVijay T. Raisinghani, Sridhar Iyer. 1-10
- Access control in communication systemsK. Gopinath. 1-8
- Path diminution is unavoidable in node-disjoint multipath routing with single route discoveryAsh Mohammad Abbas, Bijendra Nath Jain. 1-10
- On access-based self-organized clustering in ad hoc mobile wireless networksMohammad M. Rashid, Ekram Hossain, Majid Khabbazian, Vijay K. Bhargava. 1-8
- A multidomain modeling and simulation for advanced services designMoinul H. Khan, Vijay K. Madisetti. 1-9
- Design keys to adapt web prefetching algorithms to environment conditionsJosep Domènech, Julio Sahuquillo, Ana Pont, José A. Gil. 1-7
- Exploiting multi-channel clustering for power efficiency in sensor networksAshima Gupta, Chao Gui, Prasant Mohapatra. 1-10
- Performance trade-offs of a software defined radio for 2G and 3G cellular mobile communication standardsYogita Ramesh Dixit, Sameer Muhammed. 1-5
- Class-based bandwidth allocation and admission control for QoS VPN with DiffServXue Li, Sanjoy Paul. 1-10
- Modular approach for anomaly based NIDSSuresh Reddy, Sukumar Nandi. 1-6
- Application aware overlay one-to-many data dissemination protocol for high-bandwidth sensor actuator networksTarun Banka, Panho Lee, Anura P. Jayasumana, V. Chandrasekar. 1-5
- QoS-constrained fault-tolerant routing in MANETs based on segment-backup pathsAjay Agarwal, Bijendra N. Jain. 1-9
- Architecture and framework for supporting open-access multi-user wireless experimentationSachin Ganu, Maximilian Ott, Ivan Seskar, Dipankar Raychaudhuri. 1-9
- Intuitive service discovery in RFID-enhanced networksZoe Antoniou, Govindarajan Krishnamurthi, Franklin Reynolds. 1-5
- Multicommodity flow based routing in wireless sensor network with lifetime latency tradeoffKumar Padmanabh, Rajarshi Roy. 1-10
- Trust-propagation based authentication protocol in multihop wireless home networksHan Sang Kim, Jin-Wook Lee, Sandeep K. S. Gupta, Yann-Hang Lee. 1-5
- Dynamic system activity profile forecasting for improved resource selection in quality of service based grid computing modelMohit S. Malhan, Rushin N. Shah. 1-5
- Blind adaptive recognition of different QPSK modulated signals for software defined radio applicationsM. Vastram Naik, R. Bhattacharjee, A. Mahanta, H. B. Nemade. 1-6
- Maintaining update-linearizability for replicated information in MANETsJörg Hähner, Christian Becker, Pedro José Marrón, Kurt Rothermel. 1-10
- A low-cost disaster recovery method for H.323 based VoIP networkArava Uday Kumar, Srikanth Ballal Kunjibettu, Suresh S. Bhat, Dipanjan Dutta. 1-9
- WLAN location sharing through a privacy observant architectureKavitha Muthukrishnan, Nirvana Meratnia, Maria Eva Lijding, Georgi Koprinkov, Paul J. M. Havinga. 1-10
- Impact of video encoding parameters on dynamic video transcodingVidyut Samanta, Ricardo V. Oliveira, Advait Dixit, Parixit Aghera, Petros Zerfos, Songwu Lu. 1-9
- Utilizing network features for privacy violation detectionJaijit Bhattacharya, Rajanish Dass, Vishal Kapoor, S. K. Gupta. 1-10
- Towards a programming model and middleware architecture for self-configuring systemsUmesh Bellur, Nanjangud C. Narendra. 1-6