Abstract is missing.
- Designing Strategies on Frame Structure in the Rate Adaptive CommunicationJianxi Yang, Yuan Wang, Liang Chu. 3-7 [doi]
- Lightweight Session Key Management Scheme in Sensor NetworksHui Jin, Haiguang Chen. 3-6 [doi]
- Home Device Authentication Method Based on PKIYun-kyung Lee, Deok-Gyu Lee, Jong-Wook Han. 7-11 [doi]
- Alternative Packet Forwarding for Otherwise Discarded PacketsLars Landmark, Knut Øvsthus, Øivind Kure. 8-15 [doi]
- Typical Behavior Patterns Extraction and Anomaly Detection Algorithm Based on Accumulated Home Sensor DataTaketoshi Mori, Akinori Fujii, Masamichi Shimosaka, Hiroshi Noguchi, Tomomasa Sato. 12-18 [doi]
- Generalized Partially Bent FunctionsXiaolin Wang, Jianqin Zhou. 16-21 [doi]
- Search System for Behavior Time Segments from Accumulated Sensor Data in Room EnvironmentHiroshi Noguchi, Hiroyuki Kojo, Taketoshi Mori, Tomomasa Sato. 19-24 [doi]
- An Architecture of Policy-Based Application-aware Network QoS Management for Large-scale Heterogeneous NetworksYujun Chen, Yuebin Bai, Chao Li, Shujuan Liu, Depei Qian. 22-26 [doi]
- Active RFID-Based Object Management System in Sensor-Embedded EnvironmentTaketoshi Mori, Chetaphan Siridanupath, Hiroshi Noguchi, Tomomasa Sato. 25-30 [doi]
- Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMAJianqin Zhou, Zhenfei Xie, Tomoaki Ohtsuki. 27-31 [doi]
- Tree-Clustered Data Gathering Protocol (TCDGP) for Wireless Sensor NetworksKai-Chun Huang, Yun-Sheng Yen, Han-Chieh Chao. 31-36 [doi]
- Threshold Signatures in Dynamic GroupsJacek Pomykala, Tomasz Warchol. 32-37 [doi]
- RFID Based Object Localization System Using Ceiling Cameras with Particle FilterPrachya Kamol, Stefanos Nikolaidis, Ryuichi Ueda, Tamio Arai. 37-42 [doi]
- The Optimization of the H.264 Encoder Based On TI TMS320DM642Chaonan Peng, Hui Wang, Chuanzhen Li, Qin Zhang. 38-42 [doi]
- Cone: A Topology-Aware Structured P2P System with Proximity Neighbor SelectionWang Huijin, Lin Yongting. 43-49 [doi]
- Novel Wireless Mesh Networking Architectures for Future Smart HomesBosheng Zhou, Alan Marshall, Wenzhe Zhou, Tsung-Han Lee. 43-48 [doi]
- A Systematic Design Tool of Context Aware System for Ubiquitous Healthcare Service in a Smart HomeDong-Oh Kang, Kyuchang Kang, Hyung Jik Lee, Eun Jung Ko, Jeun-Woo Lee. 49-54 [doi]
- A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6Xinyu Yang, Ting Ma. 50-55 [doi]
- An Optimal Access Points Allocation Scheme Based on Genetic AlgorithmJong-Hyouk Lee, Byung-Jin Han, Hyo-Keun Bang, Tai-Myoung Chung. 55-59 [doi]
- (Color/Gray) Image in Color Cover Hiding Using Modification of Spatial Domain Hiding MethodK. A. Moustafa, Wael M. Badawy. 56-61 [doi]
- An Implementation Framework for Smart Home Telecare ServicesMiguel Valero, Iván Pau, Laura Vadillo, Ana Peñhalver, Esther Gago, Marisa Martin, Magdalena González, Eloy Portillo. 60-65 [doi]
- Delay Model for Flooding of Service Prevention in E-Commerce SystemYoung-Soo Kim, Seok-Soo Kim. 62-67 [doi]
- Two Security Problems of Efficient Remote Mutual Authentication and Key AgreementEun-Jun Yoon, Kee-Young Yoo. 66-70 [doi]
- Grant Model for Message Detour in Electronic Business SystemYoung-Soo Kim, Seok-Soo Kim. 68-73 [doi]
- Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous SystemsDeqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen. 71-75 [doi]
- Intrusion Tolerance Model for Electronic Commerce SystemYoung-Soo Kim, Kab-Seung Kou, Gang-Soo Lee. 74-79 [doi]
- Link Quality-Based (LQ-CDS) Construction in Smart Home Wireless Mesh NetworksJunmo Yang, Bonam Kim, Ilsun You. 76-80 [doi]
- Two New Types of Candidate Symbol Sorting Schemes for Complexity Reduction of a Sphere DecoderEun Sung Jeon, Yohan Kim, Dong Ku Kim. 80-84 [doi]
- Ambient Lamp Display in the Active Home Ubiquitous Computing Environment for Relaxing and MediationKyudong Lee, Hyun Sang Cho, Kyoung Shin Park, Minsoo Hahn. 81-86 [doi]
- Complexity Limited Sphere Decoder and its SER Performance AnalysisEun Sung Jeon, Jang Hoon Yang, Dong Ku Kim. 85-89 [doi]
- Automated Grocery Ordering Systems for Smart HomeKi-sung Hong, Hyoung Joong Kim, Chulung Lee. 87-92 [doi]
- MyEvalvid_RTP: A New Simulation Tool-set Toward More Realistic SimulationChia-Yu Yu, Chih-Heng Ke, Reuy-Shin Chen, Ce-Kuen Shieh, Bilal Munir, Naveen K. Chilamkurti. 90-93 [doi]
- Design of Intelligent Fitness Guide System in Context Aware Exercise EnvironmentJung-Eun Lim, O-Hoon Choi, Hong-Seok Na, Doo-Kwon Baik. 93-96 [doi]
- Survivable Routing with Risk-Level Disjoint in WDM Optical NetworksLei Guo, Xingwei Wang, Cunqian Yu. 94-99 [doi]
- Windows Pagefile Collection and Analysis for a Live Forensics ContextSeokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim. 97-101 [doi]
- Host Mobility Protocol for Secure Group Communication in Wireless Mobile EnvironmentsMiss Laiha Mat Kiah, Keith M. Martin. 100-107 [doi]
- Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing EvidenceMitsuyuki Takatsuka, Masataka Tada, Ryoichi Sasaki. 102-107 [doi]
- Collaboration in Routing and Velocity Measurement Function for Mobile Ad hoc NetworksToshihiro Suzuki, Ashiq Khan, Motonari Kobayashi, Wataru Takita. 108-113 [doi]
- An Efficient Packet-level JPEG Forensic Data CollectionChe-Jen Hsieh, Wei-Cheng Liu, Jung-Shian Li. 108-113 [doi]
- A New Anti-Forensic Tool Based on a Simple Data Encryption SchemeSang-Su Lee, Ku-Young Chang, Deokgyu Lee, Dowon Hong. 114-118 [doi]
- A Biometric Identity Based Signature Scheme with Convenient VerificationXiaodong Liu, Quan Miao, Daxing Li. 114-117 [doi]
- BGP-ESOM: BGP Egress Selection Optimization Model Based on Traffic DemandLiu Yaping, He Junfeng, Gong Zhenghu. 118-123 [doi]
- Digital Codec Design for RFID Tag Based on Cryptographic Authentication ProtocolJin-Oh Jeon, Su-Bong Ryu, Tae-Min Chang, Ho-Yong Choi, Min-Sup Kang. 119-124 [doi]
- Edge Detection Using Orientation-Independent Operators in Large-Scale Sensor NetworksKyungryong Seo, Soo-Young Lee. 124-129 [doi]
- Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-IntrusionsShiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang. 125-129 [doi]
- Discovering Methodology and Scenario to Detect Covert Database SystemGu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Lee. 130-135 [doi]
- HSUPA/HSDPA Systems: Capacity and DimensioningAbir Baroudy, Salah-Eddine Elayoubi. 130-135 [doi]
- An Evalulation of the Pool Maintenance Overhead in Reliable Server Pooling SystemsThomas Dreibholz, Erwin P. Rathgeb. 136-143 [doi]
- Consistency Issue on Live Systems ForensicsFrank Y. W. Law, K. P. Chow, Michael Y. K. Kwan, Pierre K. Y. Lai. 136-140 [doi]
- Improving Disk Sector Integrity Using 3-dimension Hashing SchemeZoe L. Jiang, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu, Pierre K. Y. Lai. 141-145 [doi]
- A Minimum Entropy Estimation Based Mobile Positioning AlgorithmGuolin Sun, Bo Hu. 144-147 [doi]
- A Field Guide to Hidden Accounting Information DetectionYeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee, Jongin Lim. 146-150 [doi]
- Delay Analysis of IEEE 802.11 DCF with Back-off SuspensionGuolin Sun, Bo Hu. 148-151 [doi]
- On ElGamal Signature SchemeWen-Chung Kuo. 151-153 [doi]
- Effects of Neighbor Attachment Policies on Interference in Ad-hoc and Sensor NetworksRamin Hekmat, Xueli An. 152-156 [doi]
- Standard Operating Procedure and Privilege Management in Taiwan Digital ForensicsYu-Li Lin, Tzong-Chen Wu, Chien-Lung Hsu, Yen-Chun Chou. 154-158 [doi]
- Suggested Improvements for Wireless TCP EndpointsNanjun Li, Werner Zorn. 157-161 [doi]
- Rate Control for Zero-Forcing Beamforming Multiuser MIMO Systems with QR-Decomposition MLD ReceiverMasaaki Fujii. 159-162 [doi]
- A Model-Driven Simulation for Performance Evaluation of 1xEV-DOMehdi Mekni, Ronald Beaubrun. 162-166 [doi]
- A Performance Comparison of DS-CDMA and MC-CDMA with Per-User MMSE Frequency Domain EqualizationTao Luo, Yong Liang Guan, Gang Wu, Shaoqian Li, Choi Look Law. 163-167 [doi]
- An Authentication Scheme for Personalized Mobile Multimedia Services: A Cognitive Agents Based ApproachB. Sathish Babu, Pallapa Venkataram. 167-172 [doi]
- Collaborative Strategy for Route and Spectrum Selection in Cognitive Radio NetworksShoufeng Deng, Jie Chen, Hao He, Wanbin Tang. 168-172 [doi]
- Effect of Adaptive Threshold on Time Synchronization Based on PN Sequences in OFDM SystemYuan Tian, Xia Lei, Wanbin Tang, Shaoqian Li. 173-176 [doi]
- Evaluation of a Simple Load Balancing Improvement for Reliable Server Pooling with Heterogeneous Server PoolsXing Zhou, Thomas Dreibholz, Erwin P. Rathgeb. 173-180 [doi]
- BER Criterion for Transmit Beamforming in MISO-OFDM with Limited FeedbackLei Zhang, Gang Wu, Shaoqian Li. 177-180 [doi]
- An Improved Approach of Reducing Feedback for Precoded MIMO-OFDM SystemXiaoyin Fang, Gang Wu, Haiyang Huang, Xia Lei, Shaoqian Li. 181-185 [doi]
- Design and Implementation of MPICH2 over Optical FiberXuan Bi, Minglu Li. 181-184 [doi]
- B-Reno: A New TCP Implementation Designed for TCP over OBS NetworksYan Zhang, Sheng Wang, Lemin Li. 185-190 [doi]
- Experimental Evaluation of UWB Ranging Performance for Correlation and ED Receivers in Dense Multipath EnvironmentChi Xu, Choi L. Law. 186-192 [doi]
- Bandwidth Allocation for MPEG-4 Traffic in IEEE 802.11e Wireless Networks Based on Traffic PredictionZhong Fan. 191-196 [doi]
- Analysis of the Performance of Iterative Estimation and Cancellation of Clipping Non-linear Distortion in OFDMXia Lei, Zheng Li, Youxi Tang, Shaoqian Li. 193-197 [doi]
- Uplink Throughput Optimization for Delay-Tolerant and Contention-Based Application in IEEE 802.16 Broadband Wireless Access NetworksFei Yin, Guy Pujolle. 197-202 [doi]
- Design on the Simulation Platform for Mobility Management in LEO Satellite Network Based on OPNETLi-ming Li, Li-dong Zhu, Shi-qi Wu. 198-202 [doi]
- An Ordered HARQ Scheme for LDPC-Coded OFDM SystemXuehua Li, Zhensong Li, Yiqing Cao, Dacheng Yang. 203-206 [doi]
- Implementation of FC-1 and FC-2 Layer for Multi-Gigabit Fibre Channel TransportYu Zhang, Dan Feng, Wei Tong, Jingning Liu. 203-207 [doi]
- Comparison of CP-OFDM and OFDM/OQAM in Doubly Dispersive ChannelsJinfeng Du, Svante Signell. 207-211 [doi]
- Collaborative Peer-to-Peer Training and Target Classification in Wireless Sensor NetworksXue Wang, Sheng Wang, Daowei Bi, Liang Ding, Junjie Ma. 208-213 [doi]
- A Time Domain Tracking Method for Limited-Rate Feedback Precoding in MIMO SystemsQi Wu, Haiyang Huang, Gang Wu, Xia Lei, Shaoqian Li. 212-215 [doi]
- PDE-Based Interpolation Methods for Image Super ResolutionYoungjoon Cha, Seongjai Kim. 214-219 [doi]
- Evaluation of the Authentication Service on the Access Management for Heterogeneous Mobile Communication NetworksAntoni Barba Marti, Juan Antonio Guerrero Ibáñez, Daniel Hernández García, Oriol Rocafort. 216-219 [doi]
- K-Divided Bloom Filter Algorithm and Its AnalysisXiaoguang Liu, Jun Lee, Gang Wang, Guangjun Xie, Jing Liu. 220-224 [doi]
- An Adaptive Packet Repeat Proposal RB_IR_HARQ Scheme based on LDPC codeNing He, Hong Wen, Shuya Yang, Liang Zhou. 220-223 [doi]
- Differential Space-Time Modulation for Modified V-BLAST SystemDefu Sun, Youxi Tang, Shihai Shao, Shaoqian Li. 224-227 [doi]
- Novel Numerical Methods for Efficient and Reliable SegmentationHongseok Choi, Seongjai Kim. 225-230 [doi]
- Link Adaptation of LDPC Codes Based on Exponential Effective-SNR Mapping Link Quality ModelWei Sun, Xiang Chen, Zesong Fei, Jingming Kuang. 228-232 [doi]
- A Power-Balancing Scheme for Clustered Wireless Sensor NetworksDajin Wang. 231-236 [doi]
- A Dynamic Network Access Identifier Used for Location PrivacyChangsheng Wan, Aiqun Hu. 233-236 [doi]
- A QoS Improvement for Voice over Mobile IPv4 (Mobile VoIPv4)Chien-Ting Liu, Chia-Hui Wang, Ray-I Chang. 237-243 [doi]
- A Time Reversal Based Time Division Duplex IDMA Communication SystemLan Tian, Hu Jianhao, Xiong Xingzhong. 237-240 [doi]
- The New Decoding Method of Rate Compatible LDPC Codes Based on the IR-HARQ SchemesShuya Yang, Hong Wen, Ning He, Liang Zhou. 241-243 [doi]
- Identifying and Correcting Mislabeled Training InstancesJiangwen Sun, Feng-ying Zhao, Chong-Jun Wang, Shifu Chen. 244-250 [doi]
- The Spectral Efficiency of 2 × 2 Adaptive MIMO Systems in Spatially Correlated Rayleigh Fading ChannelJinliang Huang, Svante Signell. 244-247 [doi]
- A Combining Decoding Method of LDPC Codes for HARQZhiping Shi, Liang Zhou. 248-251 [doi]
- A New Structure for Single User Detection in MC-CDMA Based on Maximum Likelihood DetectionHamid Shahrokh, Kamal Mohamed-Pour. 251-255 [doi]
- A Novel 3-5GHz Distributed Amplifier Structure Based Matched Filter for UWB ReceiverJisu Jiang, Choi L. Law, Chao Fang. 252-257 [doi]
- A PKC-Based Node Revocation Scheme in Wireless Sensor NetworksPo-Jen Chuang, Shao-Hsuan Chang, Chih-Shin Lin. 256-261 [doi]
- Performance Evaluation of Alamouti STC through Amplify-Forward Cooperative Relay Network over Nakagami-m Fading ChannelsSaman Atapattu, Nandana Rajatheva. 258-263 [doi]
- 2nd Generation Wireless Mesh Networks: Technical, Economical and Social ChallengesRoger Karrer, Antonio Pescapè. 262-267 [doi]
- Cognitive RelayXiaomao Mao, Peiliang Qiu. 264-269 [doi]
- An Autonomous Multicast-tree Creation Algorithm for Wireless Sensor NetworksKatsumi Onodera, Toshiaki Miyazaki. 268-273 [doi]
- Basic Simulation Result of Inter System Handover for Cognitive RadioTakashi Ishikawa, Seishi Hanaoka, Mikio Kataoka, Masashi Yano, Shinji Nishimura. 270-273 [doi]
- Cover Set Problem in Directional Sensor NetworksYanli Cai, Wei Lou, Minglu Li. 274-278 [doi]
- A Dynamic Spectrum Sharing Scheme Based on SA-OFDM for Cognitive RadiosHao Hu, Wenan Zhou, Junde Song. 274-278 [doi]
- The Shifting Interleaver Design Based on PN Sequence for IDMA SystemsZhang Chenghai, Hu Jianhao. 279-284 [doi]
- Masquerade on One-Time Password Authentication SchemeChun-Li Lin, Ching-Po Hung. 279-283 [doi]
- A Dynamic Description Logic Approach to Extended RBAC ModelLi Ma, Shilong Ma, Yuefei Sui. 284-288 [doi]
- A MAC-Routing Integrated Protocol for Geographic Forwarding in Wireless Sensor NetworksJian Qiang, Gong Zheng-hu, Gui Chun-mei. 285-290 [doi]
- Progressive Download for 3G Wireless MulticastingZeki Yetgin, Gamze Seckin. 289-295 [doi]
- Asynchronous Cooperative Transmission Using Distributed Unitary Space-Frequency Coded OFDM in Mobile Ad Hoc NetworksQuan Yu, Jun Zheng, Tielian Fu, Kejun Wu, Baoxian Zhang. 291-296 [doi]
- A Proposal of an Efficient Timing Recovery Algorithm for 4-ary Elliptical Phase Shift KeyingChunyi Song, Shigeru Shimamoto. 296-300 [doi]
- A Resource Search Model Based on Semantically Enabled P2P GridJun Ye, Zhishu Li, Qing Li. 297-302 [doi]
- Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio SystemZhu Chen, Moon Ho Lee, Chang-Joo Kim. 301-306 [doi]
- The Permission Delegation Mechanism for P2P NetworkChangyou Zhang, Liu Renfen, Yuanda Cao, Zhitao Guan. 303-308 [doi]
- Node Availability-Based Congestion Control Model Using Fuzzy Logic for Computational GridSung-Ho Jang, In Kee Kim, Jong Sik Lee. 307-312 [doi]
- Efficient Skyline Retrieval on Peer-to-Peer NetworksLin Zhu, Shuigeng Zhou, Jihong Guan. 309-314 [doi]
- Characteristics of Rain Attenuation Parameter for Satellite Communications at 12.25GHzDong-You Choi, Jung-Jin Park. 313-317 [doi]
- Research on Simulation Framework of Structured P2P NetworkGao Wei, Xia Chunhe, Li Nan, Wang Haiquan, Discovery in. 315-319 [doi]
- A Study on the Cell Sectorization Using the Wide-beam and Narrow-beam for CDMA Mobile Communication SystemsDong-You Choi, Jung-Jin Park. 318-322 [doi]
- Intelligent Process PlatformDesheng Li, Haiyang Wang, Peiyao Nie. 320-325 [doi]
- Speech Quality Enhancement Based on Sinusoidal Model Using Chebyshev FilterKihong Kim, Yongick Chung, Cheolyong Park, Youngho Son, Janghong Yoon. 323-327 [doi]
- Peer-to-Peer Cooperation for Content-Oriented XML-RetrievalJudith Winter, Oswald Drobnik. 326-331 [doi]
- Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for MultimediaShiuh-Jeng Wang, Hung-Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai. 328-331 [doi]
- Architecture of an Intelligent Inter-system Handover Management SchemeMeriem Kassar, Brigitte Kervella, Guy Pujolle. 332-337 [doi]
- Routing Based Load Balancing for Unstructured P2P NetworksMing Xu, Jihong Guan. 332-337 [doi]
- A Heuristic Energy-Conserving Multicast Routing Protocol for Wireless Multihop NetworksYu-Zhi Huang, Wen-Jiunn Liu, Kai-Ten Feng. 338-341 [doi]
- A Peer-to-Peer Based Text Sharing and Retrieval SystemQinliang Jiang, Jihong Guan. 338-343 [doi]
- Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless NetworksGovardhanan Kousalya, P. Narayanasamy, Jong Hyuk Park, Yoon Ho Kim, Heau-Jo Kang. 342-349 [doi]
- EAGR: Energy Aware Greedy Routing in Sensor NetworksRazia Haider, Muhammad Younas Javed, Naveed S. Khattak. 344-349 [doi]
- Optimal Selection and Activation of Intrusion Detection Agents for Wireless Sensor NetworksTran Hoang Hai, Eui-nam Huh. 350-355 [doi]
- Capacity Increase for Voice over IP Traffic through Packet Aggregation in Wireless Multihop Mesh NetworksMarcel C. Castro, Peter Dely, Jonas Karlsson, Andreas Kassler. 350-355 [doi]
- A Performance Comparison Study of GTS Allocation Schemes in IEEE 802.15.4Liang Cheng, Anu G. Bourgeois, Xin Zhang. 356-361 [doi]
- A QoS Oriented Network Service Architecture for Grid ApplicationsChao Li, Yuebin Bai, Yujun Chen, Shujuan Liu, Lei Gong, Depei Qian. 356-361 [doi]
- Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and EvaluationHesiri Weerasinghe, Huirong Fu. 362-367 [doi]
- Application Driven Cluster Based Group Key Management with Identifier in Mobile Wireless Sensor NetworkNahar Sultana, Ki-Moon Choi, Eui-nam Huh. 362-367 [doi]
- Traffic Splitting with Network Calculus for Mesh Sensor NetworksHuimin She, Zhonghai Lu, Axel Jantsch, Li-Rong Zheng, Dian Zhou. 368-373 [doi]
- Distributed Video Surveillance System Based on Overlay NetworkXuesong Cao, Zhaoping Wang, Ruimin Hu, Jun Chen. 368-373 [doi]
- Transparent IP Mobility ManagementHuai-Jen Liu, Chih-Hao Wang, Chih-Lin Tseng. 374-377 [doi]
- A Framework for Flexible Packet Processing in Heterogeneous Sensor NetworksMarco Leogrande, Claudio Pastrone, Maurizio A. Spirito, Riccardo Tomasi. 374-379 [doi]
- A Novel Adaptive Load Shedding Scheme for Data Stream ProcessingYunyi Zhang, Chongzheng Huang, Deyun Zhang. 378-384 [doi]
- Energy-Based Target Numeration in Wireless Sensor NetworksYan Guo, Bei Hua, Lihua Yue. 380-385 [doi]
- Real-Time Foreground Segmentation for the Moving Camera Based on H.264 Video Coding InformationWei-Di Hong, Tien-Hsu Lee, Pao-Chi Chang. 385-390 [doi]
- Layered Structure and Management in Internet of ThingsHuansheng Ning, Na Ning, Shenfeng Qu, Yan Zhang, Huiping Yang. 386-389 [doi]
- Adaptive Application-specific Cooperative Relay for Wireless Video Sensor NetworksXiaoli Wang, Daqing Gu, Tao Shu. 390-395 [doi]
- Flow Balancing Hardware for Parallel TCP Streams on Long Fat Pipe NetworkYutaka Sugawara, Mary Inaba, Kei Hiraki. 391-396 [doi]
- Supporting Multimedia Communication within an 802.11g Ad-hoc NetworkChung-wei Lee, Jonathan Liu, Kun Chen, Yu-Chee Tseng, Sheng-Po Kuo. 396-401 [doi]
- First Passage Time Analysis in Event-Driven Wireless Sensor NetworksLu Yu. 397-401 [doi]
- A Survey of System Software for Wireless Sensor NetworksMajid Alkaee Taleghan, Amirhosein Taherkordi, Mohsen Sharifi, Tai-Hoon Kim. 402-407 [doi]
- A Context-Aware System Architecture for Dealing with the Emergency by the Community Service in ApartmentZion Hwang, Yoonsik Uhm, Minsoo Lee, Yong Kim, Gwanyeon Kim, Sehyun Park. 402-407 [doi]
- Supporting Deadline Monotonic Policy over 802.11 MAC Layer Service Time DistributionInès El Korbi, Leïla Azouz Saïdane. 408-413 [doi]
- An Empirical Study of Spam and Spam Vulnerable email AccountsBeatrice Cynthia Dhinakaran, Cheol-Joo Chae, Jae Kwang Lee. 408-413 [doi]
- Pitch Modification of Speech Signal Using Source Filter Model by Linear Prediction for Prosodic TransformationsYkhlef Fayçal, Mhania Guerti, Messaoud Bensebti. 414-419 [doi]
- Future Application Scenarios for MANET-Based Intelligent Transportation SystemsChai-Keong Toh. 414-417 [doi]
- A New Two-Stage Search Procedure for Misuse DetectionSlobodan Petrovic, Katrin Franke. 418-422 [doi]
- A New Framework for Distributed Boosting AlgorithmNguyen Thi Van Uyen, Tae-Choong Chung. 420-423 [doi]
- Which Trust Can Be Expected of the Common Criteria Certification at End-User Level?Damien Sauveron, Pierre Dusart. 423-428 [doi]
- Efficient Bandwidth and Buffer Management for Multimedia Data DownloadAbdelkrim Abdelli, Nadjib Badache. 424-429 [doi]
- Chord-Based Musical Composition and Incorporating it into Auto-Accompaniment InstrumentJae-young Jo, Yoon Ho Kim, Hee-jo Kang, Joo-shin Lee. 429-432 [doi]
- Adaptive Multi-beam Transmission of Uncompressed Video over 60GHz Wireless SystemsHuai-Rong Shao, Chiu Ngo, Harkirat Singh, Sandra Qin, Chang Yeul Kwon, Guoping Fan, Seong Soo Kim. 430-435 [doi]
- Parameter Estimation of Noisy Passive Telemetry Sensor System Using Unscented Kalman FilterKyung-Yup Kim, John T. Lee, Dong-Kuk Yu, Young-Sik Park. 433-438 [doi]
- A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 TagJaemin Park, Junchae Na, Minjeong Kim. 436-441 [doi]
- Design Multi-Band Microstrip Patch Antennas for Wireless TerminalsDong-Hee Park, Yoonsik Kwak. 439-441 [doi]
- The Genetic Algorithm for RNG in the Crypto Module of Ubiquitous Computing EnvironmentJinkeun Hong, Kihong Kim. 442-446 [doi]
- The Analysis of PPL Attention Effects in the Screen of Multimedia ContentsYoung Jae Lee, Yong Jae Lee. 442-447 [doi]
- Opportunistic Wireless Internet Access in Vehicular Environments Using Enhanced WAVE DevicesYunpeng Zang, Erik Weiss, Lothar Stibor, Hui Chen, Xi Cheng. 447-452 [doi]
- A Novel Method for Performance Evaluation of Focused Ultrasonic TransducersSunheum Lee, KwanSun Choi, Dongsik Kim, Changwan Jeon, Young Doo Ahn. 448-452 [doi]
- Translator Trust for the Internet Inter-domain RoutingXiangjiang Hu, Peidong Zhu, Zhenghu Gong. 453-458 [doi]
- Management of Access Control for Content Packages by Using XML Subject-Based EncryptionKwang Moon Cho. 453-457 [doi]
- Signal Parameter Extraction via Component Cancellation Using Evolutionary ProgrammingIn-Sik Choi, Ill-Keun Rhee, Young Hoon Lee. 458-462 [doi]
- Perceptually Adaptive Lagrange Multiplier for Rate-Distortion Optimization in H.264Chang Sun, Hong-Jun Wang, Hua Li, Tai-Hoon Kim. 459-463 [doi]
- Study on Channel Allocation Strategy Using Time Constraints in Cellular NetworksDonghee Shim, Dongyoung Cho, Wankwon Lee, SeongHoon Lee. 463-467 [doi]
- Quantum Oblivious Transfer Using Tripartite Entangled StatesWei Yang, Liusheng Huang, Yifei Yao, Zhili Chen. 464-468 [doi]
- A Design of X-internet Development Framework Based on Server Service Application Programming InterfaceDae-Sik Ko. 468-471 [doi]
- FECk: A New Efficient Clustering Algorithm for the Events Correlation Problem in Telecommunication NetworksJacques-H. Bellec, M. Tahar Kechadi. 469-475 [doi]
- Fault Detection System Using Directional Classified Rule-Based in AHUSang-Jo Youk, Seung-Sun Yoo, Yong-Tae Kim, Gil Cheol Park. 472-477 [doi]
- Research on a Model of Context-driven Similarities Computation between Data ObjectsHaixue Liu, Zhao Lv, Junzhong Gu. 476-481 [doi]
- Advanced Efficiency and Stability Combined Weight Based Distributed Clustering Algorithm in MANETYoon-Cheol Hwang, Yoon-Su Jeong, Sang Ho Lee, Jeong-Young Song, Jin-Il Kim. 478-483 [doi]
- An Analysis of RFID Tag Authentication Protocols Using Secret ValueJung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim. 482-487 [doi]
- Extended Model Design for Quality Factor Based Web Service ManagementYunHee Kang. 484-487 [doi]
- Performance of Adaptive Array Antenna for Multicarrier CDMA System in Slow Nakagami-m Fading ChannelsZe-Guang Jin, Heau-Jo Kang, Yoon Ho Kim. 488-491 [doi]
- An Inverted Index-Based Buffered Search Algorithm for Mobile Navigation ServicesDongseop Kwon, Wonik Choi, Sangjun Lee. 488-493 [doi]
- Error Performance Analysis of Multi-User Binary PAM TH UWB Systems with Multiple Receive AntennasSunyoung Baek, Jinyoung An, Sungsin Lee, Sangchoon Kim. 492-495 [doi]
- Pulse Oximeter Signal Amplitudes in Different Body Parts for Wireless SolutionsAntti Konttila, Miia Määttälä, Esko Alasaarela. 494-498 [doi]
- A Digit Reversal Circuit for the Variable-Length Radix-4 FFTSeung Ho Ok, Byung-In Moon. 496-500 [doi]
- A New Cross Layer Design of Adaptive Modulation and Coding in Finite Buffer Wireless LinksAbouzar Ghavami, Farid Ashtiani. 499-504 [doi]
- Performance Analysis of TCP over Wireless Network Using Error ModelYu-Doo Kim, Il-Young Moon, Heau-Jo Kang. 501-504 [doi]
- A New 3D Sound Reproduction Method Using an Auditory FilterByoung-Uk Park, Hack-Yoon Kim. 505-509 [doi]
- A Scalable Rate Adaptation Mechanism for IEEE 802.11e WirelessHakyung Jung, Yongho Seok, Taekyoung Kwon, Yanghee Choi. 505-509 [doi]
- Efficient Failure Detection and Recovery Scheme for Hierarchical Distributed MonitoringJinHo Ahn. 510-515 [doi]
- Grid Security Interoperation between CGSP and VEGADeqing Zou, Hai Jin, Xueguang Chen, Zongfen Han. 510-515 [doi]
- The Moving Picture Retrieval System Using Visual Descriptors and Cut DetectionJang-Hui Kim, Young-do Lim, Dae-Seong Kang. 516-521 [doi]
- Vulnerability of User Identification and Key Agreement Protocol with User AnonymityEun-Jun Yoon, Kee-Young Yoo. 516-521 [doi]
- A Survey of Routing Protocols for Energy Constrained Ad Hoc Wireless NetworksNatalia Vassileva, Francisco Barceló-Arroyo. 522-527 [doi]
- U-Storage: A New On-line Storage System for Ubiquitous EnvironmentSeok Il Song, Yoon-Sik Kwak. 522-526 [doi]
- Location-Based Routing Algorithm Using Clustering in the MANETJin-Il Kim, Jeong-Young Song, Yoon-Cheol Hwang. 527-531 [doi]
- Beacon-less Location Detection in Wireless Sensor Networks for Non-flat TerrainSireesha Velagapalli, Huirong Fu. 528-534 [doi]
- A Method for Determination of Key Distribution Period Using QoS FunctionDong-Joo Kang, Hak-Man Kim. 532-535 [doi]
- Site Multihoming: Practices, Mechanisms and PerspectiveJun Bi, Ping Hu, Lizhong Xie. 535-540 [doi]
- Unequal Preamble Power Allocation Scheme for Frequency Offset Estimation in OFDM Based Packet Communication SystemsJaeMin Kwak, Kitaek Lim, Pusik Park, Daekyo Shin, Jongchan Choi. 536-539 [doi]
- New Algorithm for Effective Utilization of Bandwidth for Sensitive ApplicationsG. Varaprasad, R. S. D. Wahida Banu, Pallapa Venkataram. 540-542 [doi]
- An Efficient Music Retrieval Using Noise CancellationSazia Parvin, Jong Sou Park. 541-546 [doi]
- Web Anomaly Detection System for Mobile Web ClientSung-Min Jang, Yoo-Hun Won. 543-547 [doi]
- Internet Traffic and Capacity Evaluation in UMTS DownlinkJahangir Dadkhah Chimeh, Mohammad Hakkak, Seyed Ali Alavian. 547-552 [doi]
- Flexible License Management Mechanism for Group DistributionZonghua Liu, Guangqing Liu, Taemin Kim, Byungwook Lee, Myung-Mook Han. 548-552 [doi]
- Device Certification System and Method for User’s Convenient Contents UseJinhyung Kim, Jun Hwang, Taemin Kim, Byungwook Lee. 553-558 [doi]
- Signaling Technogies to Support QoS in IPv6-Based NGNGyu Myoung Lee, Jun Kyun Choi, Hyoung Jun Kim. 553-556 [doi]
- Improving CSMA for WLANs via Piggybacking and Scheduled Backoff MechanismsSiwaruk Siwamogsatham. 557-563 [doi]
- Experiments and Countermeasures of Security Vulnerabilities on Next Generation NetworkJeong-Wook Kim, Hyug-Hyun Cho, Gil-Jong Mun, Jae-Hyun Seo, Bong-Nam Noh, Yong-Min Kim. 559-564 [doi]
- Initial Case Analysis Using Windows Registry in Computer ForensicsKisik Chang, Gibum Kim, Kwonyoup Kim, Woosuk Kim. 564-569 [doi]
- User Behavior Analysis Framework (UBAF) : Mapping HCI with SEWoo Yeol Kim, Hyun Seung Son, Robert Young Chul Kim, Byung Kook Jeon. 565-568 [doi]
- Role of Annotation in Electronic Process Guide (EPG)Ahmad Ibrahim, Ho-Jin Choi. 569-572 [doi]
- Nonlinear Channel Estimation Based on Multi-level PN Sequence in OFDM SystemsNanqing Zhou, Hao Liu. 570-574 [doi]
- Preventing Social Engineering in Ubiquitous EnvironmentEnkhbold Nyamsuren, Ho-Jin Choi. 573-577 [doi]
- A Dynamic Domain-Based Network Information Model for Computational GridsChao-Tung Yang, Tsui-Ting Chen, Hao-Yu Tung. 575-578 [doi]
- Enhancing Requirements Engineering Activities through the Use of Mobile Technology Devices and ToolsSyed Ahsan Fahmi, Ahmad Ibrahim, Ho-Jin Choi. 578-581 [doi]
- A Platform for Smart SubstationsHak-Man Kim, Jong-Joo Lee, Dong-Joo Kang. 579-582 [doi]
- Implementation of Digital Stereo Amplifier for Mobile IT Devices Based on Wireless Communication System Using BluetoothJoonhoon Park, Ryumduck Oh. 582-585 [doi]
- Fast Transmission by Mobile Phone of Recognition Sign Language using a Segmented Multidecision Filter Adapted to the Parallel Virtual Machine (PVM)Marwa Elbouz, Ayman Alfalou, Habib Hamam. 586-589 [doi]
- System for Image Compression and Encryption by Spectrum Fusion in Order to Optimize Image TransmissionAyman Alfalou, Alain Loussert, A. Alkholidi, Rami El Sawda. 590-593 [doi]
- RGB Colored Image Encryption Processes Using Several Colored Keys ImagesRami El Sawda, Ayman Alfalou, Habib Hamam. 594-598 [doi]
- Design and Implementation of a Ubiquitous ECG Monitoring System Using SIP and the Zigbee NetworkBonam Kim, Youngjoon Kim, Insung Lee, Ilsun You. 599-604 [doi]
- Longest Fault-Free Paths in Hypercubes with both Faulty Nodes and EdgesSun-Yuan Hsieh, Che-Nan Kuo, Hui-Ling Huang. 605-608 [doi]
- A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA NetworkDong-Joo Kang, Hak-Man Kim. 609-613 [doi]