Abstract is missing.
- Undersea wireless sensor network for ocean pollution preventionArijit Khan, Lawrence Jenkins. 2-8 [doi]
- An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomialsAshok Kumar Das, Indranil Sengupta. 9-16 [doi]
- Simulation blocks for TOSSIM-T2Tamma V. Prabhakar, S. Venkatesh, M. S. Sujay, J. Kuri, K. Praveen. 17-23 [doi]
- Performance evaluation of a new overloading scheme for cellular DS-CDMA with iterative multistage interference cancellation receiverPreetam Kumar, Saswat Chakrabarti. 25-30 [doi]
- Experiments with low power commodity hardware platforms for challenged networksR. Sethi. 31-36 [doi]
- Thresholds for LDPC codes over OFDMAravind Iyengar, M. K. Dileep, Andrew Thangaraj, Srikrishna Bhashyam. 37-42 [doi]
- Smart middleware for mutual service-network awareness in evolving 3GPP networks network aware applications & application aware networksSahin Albayrak, Muslim Elkotob, Ahmet Cihat Toker. 44-50 [doi]
- Power allocation schemes for cognitive radiosA. Guha, Viswanath Ganapathy. 51-56 [doi]
- MIMO in wireless WAN - the UMB systemSandip Sarkar, Tamer Kadous, Tingfang Ji, Naga Bhushan, Alexei Gorokhov, Aamod Khandekar, Rajiv Vijayan, Avneesh Agrawal. 57-64 [doi]
- Communication in personal healthcarePraveen Kumar, Viswanatha Rao Thumparthy. 66-73 [doi]
- Hierarchical modeling of the Axis2 web services framework with FMC-QEFlavius Copaciu, Stephan Kluth, Tomasz Porzucek, Werner Zorn. 74-81 [doi]
- Extracting dense communities from telecom call graphsVinayaka Pandit, Natwar Modani, Sougata Mukherjea, Amit Anil Nanavati, Sambuddha Roy, Amit Agarwal. 82-89 [doi]
- NBLS: Neighbor-information-based localization system for wireless sensor networksShanliang Li, Liusheng Huang, Junmin Wu, Hongli Xu, Jichun Wang. 91-94 [doi]
- Estimation of node density for an energy efficient deployment scheme in wireless sensor networkAnand Seetharam, Abhishek Bhattacharyya, Mrinal K. Naskar, Amitava Mukherjee. 95-98 [doi]
- Localization in Ultra Wideband sensor networks using Tabu searchA. Gopakumar, Lillykutty Jacob. 99-102 [doi]
- Cooperative relaying strategies for multi-hop wireless sensor networksJoongheon Kim, Wonjun Lee. 103-106 [doi]
- Estimated replication of data in wireless sensor networksQutub Bakhtiar Ali, Niki Pissinou, Kia Makki. 107-110 [doi]
- Enhanced location update mechanism in wireless cellular networks using knowledge of mobility patternsVihang Kamble, Suresh Kalyanasundaram, Rajeev Agrawal. 112-119 [doi]
- A platform for the development of location-based mobile applications with privacy protectionOliver Jorns, Oliver Jung, Gerald Quirchmayr. 120-127 [doi]
- A new ranging application of UWB modulated by orthogonal waves in wireless sensor networkQiaoqiao Chen, Ting Jiang, Zheng Zhou. 128-131 [doi]
- OFDM-MAC algorithms and their impact on TCP performance in next generation mobile networksL. A. Prashanth, K. Gopinath. 133-140 [doi]
- A Slotted Aloha joint MAC - cum - Routing protocol for data gathering sensor network applicationsTamma V. Prabhakar, H. S. Jamadagni, M. Aswath Kumar, Jacques Panchard. 141-148 [doi]
- Design of adaptive MAC for high speed packet access systemSaptarshi Chaudhuri, Ranjish Bhaskaran, Venkataveen Reddy. 149-157 [doi]
- Collaborative group membership and access control for JXTAJoan Arnedo-Moreno, Jordi Herrera-Joancomartí. 159-166 [doi]
- A robust finger print based two-server authentication and key exchange systemRajeswari Mukesh, A. Damodaram, V. Subbiah Bharathi. 167-174 [doi]
- Interpretation of policy oriented common criteria components for network computing environmentManpreet Singh, Manjeet S. Patterh. 175-182 [doi]
- Quantifying presence using calling patternsHusain Husna, Santi Phithakkitnukoon, Enkh-Amgalan Baatarjav, Ram Dantu. 184-187 [doi]
- Quality of service investigation for multimedia transmission over UWB networksNawal F. El Fishawy, Mona Shokair, Waleed Saad. 188-191 [doi]
- Orthogonal multi-relay networks: capacity bounds and optimal resource allocationZhimeng Zhong, Shihua Zhu, Gangming Lv. 192-195 [doi]
- Service class downlink scheduling in WiMAXJoseph Thaliath, Mabel M. Joy, Elizabeth Priya John, Debabrata Das. 196-199 [doi]
- Symbol timing synchronization for ultra-wideband (UWB) multi-band OFDM (MB-OFDM) systemsDebarati Sen, Saswat Chakrabarti, R. V. Raja Kumar. 200-203 [doi]
- PHY/MAC adaptation approaches for dense wireless LAN MESHHui Ma, Sumit Roy, Jing Zhu. 204-207 [doi]
- Security aspects of inter-access system mobility between 3GPP and non-3GPP networksRajaduraia Rajavelsamy, Sungho Choi. 209-213 [doi]
- Dynamic authentication: Need than a choiceAshutosh Saxena. 214-218 [doi]
- A secure verifiable key agreement protocol for mobile conferencingMounita Saha, Dipanwita Roy Chowdhury, Indranil Sengupta. 219-222 [doi]
- Network coding for TCP throughput enhancement over a multi-hop wireless networkP. Samuel David, Anurag Kumar. 224-233 [doi]
- An adaptive CAC algorithm based on fair utility for low earth orbit satellite networksZhen-Yu Na, Zhenyong Wang, Qing Guo. 234-238 [doi]
- Solving channel allocation problem in cellular radio networks using genetic algorithmSrinivas Pinagapany, A. V. Kulkarni. 239-244 [doi]
- Behavior analysis of spam botnetsHusain Husna, Santi Phithakkitnukoon, Srikanth Palla, Ram Dantu. 246-253 [doi]
- Key-linked block ciphers with input-output shuffling applied to remotely keyed encryptionYassin M. Hasan, Hesham A. Abulenein. 254-259 [doi]
- From stream to provably secure block ciphers based on pseudorandom matrix transformationsYassin M. Hasan. 260-265 [doi]
- A Petri Net approach to analyze the effect of persistent connection on the scalability of web servicesHai-yan Wu, Xiao-zhu Lin, Dong-Xing Jiang. 267-270 [doi]
- DWT-DCT-SVD based watermarkingK. A. Navas, M. C. Ajay, M. Lekshmi, T. S. Archana, M. Sasikumar. 271-274 [doi]
- Communication enabled web applications The evolution of computer telephony integrationLogambigai Venkatachalam, Krishna Kishore Dhara, Venkatesh Krishnaswamy, Michael Vernick. 275-278 [doi]
- Community based search on power law networksTathagata Das, Subrata Nandi, Niloy Ganguly. 279-282 [doi]
- Coordination protocol for financial application in delay tolerant networksIacopo Carreras, Juwel Rana, Luigi Telesca. 283-286 [doi]
- An improved DNS server selection algorithm for faster lookupsSupratim Deb, Anand Srinivasan, Pavan Kuppili Pavan. 288-295 [doi]
- An efficient and bandwidth sensitive parallel download scheme in data gridsRuay Shiung Chang, Chun-fu Lin, Jiing-Hsing Ruey, Shih-Chun Hsi. 296-301 [doi]
- A reality check on sip-based streaming applications on the next generation mobile test networkChitra Balakrishna, Khalid Al-Begain. 302-308 [doi]
- Deniability - an alibi for users in P2P networksOfer Hermoni, Niv Gilboa, Eyal Felstaine, Sharon Shitrit. 310-317 [doi]
- On implementing security at the transport layerSwaminathan Pichumani, Sneha Kumar Kasera. 318-326 [doi]
- Realizing unified service experience with SaaS on SOAJithesh Sathyan, Krishnananda Shenoy. 327-332 [doi]
- Adaptive waiting time threshold estimation algorithm for power saving in sleep mode of IEEE 802.16eKhyati Sanghvi, Piyush K. Jain, Abhijit Lele, Debabrata Das. 334-340 [doi]
- Location management area (LMA)-based MBS handover in mobile WiMAX systemsJi Hoon Lee, Taekyoung Kwon, Yanghee Choi, Sangheon Pack. 341-348 [doi]
- On TCP-aware uplink scheduling in IEEE 802.16 networksHemant Kumar Rath, Abhay Karandikar. 349-355 [doi]
- Introducing Gateway Timeout control in wireless TCP moduleNanjun Li, Werner Zorn. 357-364 [doi]
- Hash optimization for cryptographically generated addressT. Rajendran, K. V. Sreenaath. 365-369 [doi]
- Multicast instant channel change in IPTV systemsDamodar Banodkar, K. K. Ramakrishnan, Shivkumar Kalyanaraman, Alexandre Gerber, Oliver Spatscheck. 370-379 [doi]
- mConnect: A context aware mobile transaction middlewareKartik Muralidharan, G. V. Karthik, Puneet Gupta, Atanu Roy Chowdhury. 381-386 [doi]
- A large scale publish-subscribe platform for information delivery to mobile phonesThejovardhana Kote, S. Ramamirtham Jeyashankher, Leena Chandran-Wadia. 387-394 [doi]
- Architecture for extensible mobile instant messaging and presence service over IMSJae-Wook Nah, Yeong-Hun Cho, Suwook Kim, Jong-Tae Park. 395-400 [doi]
- Spectrum-sensing based interference mitigation for WLAN devicesGuoqing Li, Srikathyayani Srikanteswara, Christian Maciocco. 402-408 [doi]
- Fuzzy based dynamic WEP keymanagement for WLAN security enhancementSoundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar. 409-414 [doi]
- Flow fairness using aggregate packet marking for wireless mesh networksEwa Kusmierek, Rajeev Koodli. 415-422 [doi]
- Performance engineering of replica voting protocols for high assurance data collection systemsKaliappa Nadar Ravindran, Jiang Wu, Mohammad Rabby, Kevin A. Kwiat, Ali Sabbir. 424-433 [doi]
- Coordination for the internet of services: A user-centric approachMaurelio Boari, Antonio Corradi, Enrico Lodolo, Stefano Monti, Samuele Pasini. 434-441 [doi]
- Managing client bandwidth in the presence of both real-time and non real-time network trafficMaarten Wijnants, Wim Lamotte. 442-450 [doi]
- Deterministic schemes for key distribution in wireless sensor networksAbhishek Gupta, Joy Kuri. 452-459 [doi]
- Extension of Fast Mobile IPv6 with multiple pre-registrations: Design and implementationYong Hoon Kim, Suwook Kim, Jae-Wook Nah, Jong-Tae Park. 460-464 [doi]
- A plain type of mobile attack: Compromise of user s privacy through a simple implementation methodIosif Androulidakis, Chris Basios. 465-470 [doi]
- Qos based handover layer for a multi-RAT mobile terminal in UMTS and Wi-MAX networksS. Vijay Anand. 472-479 [doi]
- A novel interface gateway architecture for seamless interoperability between 802.11e and 802.16eKalle Ritesh Kumar, Vidya Sagar, Sumit Kumar, Abhijit M. Lele, Debabrata Das. 480-487 [doi]
- Roaming between GSM/UMTS and IMS networksVikas Bajaj. 488-494 [doi]
- IP in wireless sensor networks Issues and lessons learntJorge Sá Silva, Ricardo Ruivo, Tiago Camilo, Goncalo Pereira, Fernando Boavida. 496-502 [doi]
- Experimental analysis of RSSI-based location estimation in wireless sensor networksMohit Saxena, Puneet Gupta, Bijendra N. Jain. 503-510 [doi]
- Tracking target using sensor networks: target detection and route activation under energy constraintsVaishali P. Sadaphal, Bijendra N. Jain. 511-518 [doi]
- Approximation of a confidence interval for link distances in Mobile Ad hoc NetworksMatin Bagherpour, Mohammad Mehdi Sepehri, Mehdi Sharifyazdi. 520-527 [doi]
- Density-first Ad-hoc routing protocol for MANETJiong Wang, Sirisha Medidi. 528-535 [doi]
- Integrating Mobile Ad Hoc Networks and the Internet: challenges and a review of strategiesKhaleel Ur Rahman Khan, Rafi U. Zaman, A. Venugopal Reddy. 536-543 [doi]
- A predictive handoff scheme for multi-hop heterogeneous wireless networksAbraham George, Sherif Rashad, Anup Kumar, Mehmed M. Kantardzic. 545-550 [doi]
- Intelligent mobile IPv6 handover with multiple pre-registrations and late tunnelingYeong-Hun Cho, Kyung Yoon Oh, Jong-Tae Park. 551-554 [doi]
- Efficient data gathering in distributed hybrid sensor networks using multiple mobile agentsPiyush Shah, Krishna M. Sivalingam, Prathima Agrawal. 556-563 [doi]
- Integrating sensor networks in pervasive computing environments using symbolic coordinatesMatthias Gauger, Pedro José Marrón, Marcus Handte, Olga Saukh, Daniel Minder, Andreas Lachenmann, Kurt Rothermel. 564-573 [doi]
- Implementation aspects of reliable transport protocols in wireless sensor networksTuan D. Le, Yifei Dong, Ren Liu, Sanjay Jha, Zvi Rosberg. 574-580 [doi]
- Stability analysis for communication of voice terminals with packet reservation multiple access protocol with high propagation delaysAmirali Sharifi, Eyad H. Abed. 582-590 [doi]
- Multilayer traffic engineering and DiffServ in the next generation internetWalter Colitti, Kris Steenhaut, Ann Nowé. 591-598 [doi]
- An intelligent user centric middleware for NGN: Infosphere and AmbientGridNoëmie Simoni, Chunyang Yin, Ghislain Du Chéné. 599-606 [doi]
- Tamper detection with self-correction hybrid spatial-DCT domains image authentication techniqueYassin M. Hasan, Ammar Hassan. 608-613 [doi]
- Robust image adaptive steganography using integer waveletsK. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal, Lalit M. Patnaik. 614-621 [doi]
- Swarm intelligence based key generation for text encryption in cellular networksN. K. Sreelaja, G. A. Vijayalakshmi Pai. 622-629 [doi]
- Capacity of grid-oriented wireless mesh networksNadeem Akhtar, Klaus Moessner. 631-636 [doi]
- Packet collision based Multiuser Interference (MUI) analysis for TH-PAM and TH-PPM ultra wideband (UWB) systemHimanshukumar B. Soni, Uday B. Desai, S. N. Merchant. 637-641 [doi]
- Energy aware distributed data gathering and aggregation protocol to improve wireless sensor network s longevitySharmilee Yekkulur, Mohamed Suhail Vaseem Ubaidur, Krishnamurthy Kapil, Krishnan Murugan. 642-648 [doi]
- A flexible channel access model for wireless network interface cardsRyad Ben-El-Kezadri, Farouk Kamoun. 650-656 [doi]
- An efficient approach to lane tracking system vehicular telemeticsGaurav Kumar Santhalia, Sanatya Singh. 657-661 [doi]
- Intelligent networked containers for enhancing global supply chain security and enabling new commercial valueSu Jin Kim, Guofeng Deng, Sandeep K. S. Gupta, Mary Murphy-Hoye. 662-669 [doi]
- Workshop keynote speechAshok Chandra. 670 [doi]
- International Telecommunication Union (ITU) and decisions of world radio conference-07 wrt IMT systems and cognitive radioAshok Chandra. 671-675 [doi]
- Optimal level-homogeneous tree structure for logical key hierarchyJun-Sik Lee, Ju-Hyung Son, Young-Hoon Park, Seung-Woo Seo. 677-681 [doi]
- A security framework for personal networksSeongHan Shin, Kazukuni Kobara, Hideki Imai. 682-690 [doi]
- Video over wireless networks: A brief reviewM. Salim Beg, E. Khan. 692-698 [doi]
- Implementation of meid for mobile stations in CDMA networkR. Sanyal. 699-703 [doi]
- Wireless mobile user s location in an indoor environment - an overviewA. Kumar. 704-707 [doi]
- QoS in heterogeneous mobility managementEvangelos Gkroustiotis. 708-712 [doi]
- Network-aware adaptation with real-time channel statistics for wireless LAN multimedia transmissions in the digital homeDilip Krishnaswamy, Shanyu Zhao. 714-719 [doi]
- A QoS routing protocol for delay-sensitive applications in mobile ad hoc networksPradeep Macharla, Rakesh Kumar, Anil Kumar Sarje, Manoj Misra. 720-727 [doi]
- A distributed cooperative approach to improve detection and removal of misbehaving MANET nodesA. Dadhich, A. K. Sarje, K. Garg. 728-735 [doi]
- Reduced Task-Resource Assignment Graph based Static scheduling for grid workflow applicationHao Xianwen, Dai Yu, Zhang Bin, Chen Tingwei. 736-743 [doi]
- Pre-emption based call admission control with QoS and dynamic bandwidth reservation for cellular networksAnkur Guha Roy, Rajdeep Mandal, Iti Saha Misra, Kalpana Saha. 745-752 [doi]
- Scaleable network multicast for cooperative base stationsAndreas Ibing, Yosia Hadisusanto, Volker Jungnickel. 753-756 [doi]
- Call admission control: QoS issue for VoIPMohammad Asadul Hoque, Farhana Afroz. 757-761 [doi]
- Overhead reduction and energy management in DSR for MANETsMuthu Tamilarasi, S. Chandramathi, T. G. Palanivelu. 762-766 [doi]
- Adaptive multilayer routing in the next generation GMPLS InternetWalter Colitti, P. Gurzi, Kris Steenhaut, Ann Nowé. 768-775 [doi]
- Adaptive lookup for unstructured peer-to-peer overlaysK. Haribabu, Dayakar Reddy, Chittaranjan Hota, Antti Ylä-Jääski, Sasu Tarkoma. 776-782 [doi]
- A new battery and redundancy aware node scheduling protocol for Wireless Sensor NetworksKandasamy Selvaradjou, Marudachalam Dhanaraj, Buchi Goutham, C. Siva Ram Murthy. 784-790 [doi]
- MQTT-S - A publish/subscribe protocol for Wireless Sensor NetworksUrs Hunkeler, Hong Linh Truong, Andy Stanford-Clark. 791-798 [doi]
- A dynamic mining algorithm of association rules for alarm correlation in communication networksWu Jian, Li Xing Ming. 799-802 [doi]