Abstract is missing.
- Distributed Collaborative Control Using Wireless Sensor and Actuator NetworksXianghui Cao, Jiming Chen, Yang Xiao, Youxian Sun. 3-6 [doi]
- C-NMSP: A High Performance Network Management Service Platform for Complex Event ProcessingKun Ding, Xiaoyi Zhang, Bo Deng. 7-10 [doi]
- Joint Application and Network Defense against DDoS Flooding Attacks in the Future InternetRoger Karrer, Ulrich Kuehn, Thomas Huehn. 11-16 [doi]
- NetTopo: Beyond Simulator and Visualizer for Wireless Sensor NetworksLei Shu, Chun Wu, Yan Zhang, Jiming Chen, Lei Wang, Manfred Hauswirth. 17-20 [doi]
- A Clustering Head Selection Algorithm for Underwater Sensor NetworksChenn-Jung Huang, You-Jia Chen, I-Fan Chen, Kai-Wen Hu, Jia-Jian Liao, Dian-Xiu Yang. 21-24 [doi]
- GMPR: A Greedy Multi-path Routing Algorithm for Wireless Sensor NetworksSobhan Masoudi, AmirMasoud Rahmani, Arash Nasiri Eghbali, Ahmad Khademzadeh. 25-30 [doi]
- A Kernel-Based Localization Approach in Wireless Sensor NetworksHao Wu, Jiming Chen, Chengqun Wang, Youxian Sun. 31-34 [doi]
- An Interference Free Data Aggregation Protocol for Clustered Wireless Sensor NetworksLei Chen, Bao-hua Zhao. 35-39 [doi]
- A Hybrid Recommender Approach Based on Widrow-Hoff LearningLei Ren, Liang He, Junzhong Gu, Weiwei Xia, Faqing Wu. 40-45 [doi]
- Universal Video Adaptation Model for Contents Delivery Using Focus-of-Choice ModelSvetlana Kim, Yongik Yoon. 46-49 [doi]
- Adaptive Top-k Query Processing in Intermittently Connected NetworksBo Deng, Hui Zhang, Kun Deng, Guoquan Jiang. 50-53 [doi]
- Assessment and Open-Issues of the Load-Balanced Switching ArchitectureYury Audzevich, Yoram Ofek. 54-61 [doi]
- A Voronoi Diagram Approach for Mobile Element Scheduling in Sparse Sensor NetworksRuiyun Yu, Xingwei Wang, Sajal K. Das. 62-67 [doi]
- Geographic Routing in Wireless Multimedia Sensor NetworksLei Shu, Yan Zhang, Laurence Tianruo Yang, Yu Wang, Manfred Hauswirth. 68-73 [doi]
- An Improved Scheme for Delegation Based on Usage ControlYongming Jin, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen. 74-78 [doi]
- Simulation Results on Hierarchical Cell StructuresJi Jun, Xiao Hong, Meng Xiang Ping, Xu Jan Ren, Zhao Jie Hong. 79-82 [doi]
- Performance Modeling and Analysis of the Booting Process in a Transparent Computing EnvironmentGuanfei Guo, Yaoxue Zhang, Yuezhi Zhou, Laurence Tianruo Yang, Li Wei 0002, Pengwei Tian. 83-88 [doi]
- A Density-Based Algorithm for Redundant Reader Elimination in a RFID NetworkKun-Ming Yu, Chang-Wu Yu, Zheng-Yi Lin. 89-92 [doi]
- A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion DeceptionNan Li, Chunhe Xia, Jianzhong Qi, Haiquan Wang. 93-97 [doi]
- An Efficient Self-Healing Scheme for Wireless Sensor NetworksJian Wan, Wanyong Chen, Xianghua Xu, Miaoqi Fang. 98-101 [doi]
- A Detecting Superpoint Algorithm on Multiple Sampling TechnologyGuang Cheng, Jian Gong. 102-105 [doi]
- Steganalysis of LSB Matching Based on Wavelet Denoising Estimation in Grayscale ImageManKun Xu, Tianyun Li, Xijian Ping. 106-109 [doi]
- Real-Time Monitoring of Multi Mobile Objects with USN and GMLSung Won Kim, Chang-Wu Lee, Won-Hee Han, Sung-Jin Baek, Eun-Ha Song, Young-Sik Jeong. 110-115 [doi]
- An Approach on Adaptive Time-Delay Estimate and Compensation Control in Internet-Based Control SystemsNaixue Xiong, Hongyan Li, Tai-Hoon Kim, Laurence Tianruo Yang. 116-121 [doi]
- An End-to-End Content-Aware Congestion Control Approach for MPEG Video TransmissionHongyun Yang, Xuhui Chen, Ruiming Hu. 122-125 [doi]
- On the Delay Evaluation of a Maximum Bandwidth Usage IP Based Mobile SystemJahangir Dadkhah Chimeh, Mohammad Hakkak, Paeiz Azmi, Hamidreza Bakhshi. 126-129 [doi]
- Protection Routing Algorithm Based on Survivable Integrated Auxiliary Graph in Waveband Switching Optical NetworksLei Guo, Xingwei Wang, Dong Wang, Cunqian Yu, Weigang Hou, Ying Li, Chongshan Wang. 130-133 [doi]
- Detection of Synonym-Substitution Modified Articles Using Context InformationZhenshan Yu, Liusheng Huang, Zhili Chen, Lingjun Li, Xinxin Zhao, Youwen Zhu. 134-139 [doi]
- A Novel Caching Mechanism for P2P Video-on-Demand SystemsJian Feng. 140-143 [doi]
- Analysis and Optimization of Network Entry Delay in WiMax NetworksPero Latkoski, Borislav Popovski. 144-147 [doi]
- Dynamic Management on Quality of Service in Mobile Communication Networks Based on VPRS ModelGang Xie, Wuyi Yue, Shouyang Wang. 148-151 [doi]
- XOR Hashing Algorithms to Measured Flows at the High-Speed LinkGuang Cheng, Wei Zhao, Jian Gong. 152-155 [doi]
- Multi-attribute Query Processing with Partial Information in Sensor NetworksSungSuk Kim, Sun Ok Yang. 156-159 [doi]
- Spacing Based Authentication Protocol for Low-Cost RFIDZhen-Ai Jin, Zi-Qiang Cheng, Kee-Young Yoo. 160-163 [doi]
- Dynamic Multi-channel MAC Protocol for LR-WPAN Based on Interference LearningKwang-il Hwang. 164-167 [doi]
- Throughput Evaluation in UMTSJahangir Dadkhah Chimeh, Mohammad Hakkak, Hamidreza Bakhshi, Paeiz Azmi. 168-171 [doi]
- Collaborative Distributed Intrusion Detection SystemWei Lin, Liu Xiang, Derek Chi-Wai Pao, Bin Liu. 172-177 [doi]
- A Document Based Framework for Smart Object SystemsFahim Kawsar, Tatsuo Nakajima, Jong Hyuk Park, Young-Sik Jeong. 178-183 [doi]
- Performance Analysis and Optimization of TML in ForCES RouterShangda Yang, Weiming Wang, Bin Zhuge. 184-187 [doi]
- Performance Evaluation of Content Distribution in Hybrid CDN-P2P NetworkHai Jiang, Jun Li, Zhongcheng Li, Xiang-yu Bai. 188-193 [doi]
- A Novel General RFID Framework Based on Middleware and Data CleaningLu Ye. 194-197 [doi]
- A Query Tree Dynamic Frame Slot ALOHA Collision Resolution Protocol for RFID TagsXinqing Yan, Zhouping Yin, Youlun Xiong. 198-201 [doi]
- Trust-Based LEACH Protocol for Wireless Sensor NetworksFei Song, Baohua Zhao. 202-207 [doi]
- Routing in Degree-Constrained FSO Mesh NetworksZiping Hu, Pramode K. Verma, James J. Sluss Jr.. 208-215 [doi]
- Extending the Verification of Multimedia Presentation Consistency to Resource Requirements.Abdelkrim Abdelli. 216-219 [doi]
- Barycentric Location Estimation for Indoors Localization in Opportunistic Wireless NetworksGuoDong Kang, Tanguy Pérennou, Michel Diaz. 220-225 [doi]
- Performance Analysis and Diversity-Multiplexing Tradeoff in Virtual Antenna ArrayPeng Zhang, Furong Wang, Lai Tu, Sacko Diouba. 226-229 [doi]
- An Improved Resistant to Destruction Routing Algorithm Based on LEO Satellite NetworkYuntao Zhao, Yongxin Feng, Liu Fang. 230-233 [doi]
- A Novel Approach for Infrastructure Deployment for VANETUne Thoing Rosi, Chowdhury Sayeed Hyder, Tai-Hoon Kim. 234-238 [doi]
- A New Descriptor of Slices Histogram from 3D Shape ModelsYou-Shin Park, Ki-Hyun Kang, Yong-In Yun, Jong-Soo Choi, Ho-Keun Song, Jong-Ho Choi. 239-242 [doi]
- A New Collaborative Multipath Transmission Scheme for Mobile Ad Hoc NetworksLianfen Huang, Mingyong Lu, Jianan Lin, Xueyuan Jiang. 243-247 [doi]
- A Routing Algorithm for Energy-Balanced under Reliability Constraint in Wireless Sensor NetworksZhichao Mi, Jianjiang Zhou. 248-251 [doi]
- A Segment Strategy Based on Flooding Search in Unstructured P2P NetworkYuhua Liu, Longquan Zhu, Jingju Gao, Yuling Li. 252-255 [doi]
- Design and Implementation of NETCONF-Based Network Management SystemYanan Chang, Debao Xiao, Hui Xu, Limiao Chen. 256-259 [doi]
- Multicast Congestion Control on Many-to-Many VideoconferencingXuan Zhang, Chongrong Li, Xing Li, CongXiao Bao. 260-263 [doi]
- The Aegis: UICC-Based Security FrameworkJaemin Park, Kyoungtae Kim, Minjeong Kim. 264-269 [doi]
- A Novel Fault Detection and Recovery Mechanism for Zigbee Sensor NetworksJian Wan, Jianrong Wu, Xianghua Xu. 270-274 [doi]
- Dimensioning of Next Generation Networks Signaling Gateway for Improving a Quality of Service TargetCherif Ghazel, Leila Saidane. 275-278 [doi]
- An Adaptive Network Allocation Vector for IEEE 802.11-based Multi-hop NetworksMaryam Najimi, Yousef Darmani, Mohammad Sayad Haghighi, Kamal Mohamedpour. 279-282 [doi]
- Chaos Synchronization Based on Phase-Locked LoopsZhang Gang, Li Shu-Jie, Zhang Dong-Xu. 283-287 [doi]
- A Dynamic Minislot Allocation Scheme Based on IEEE 802.16 Mesh ModeHao-Min Lin, Whai-En Chen, Han-Chieh Chao. 288-293 [doi]
- An Enhanced Routing Protocol for ZigBee/IEEE 802.15.4 Wireless NetworksXianghua Xu, Daomin Yuan, Jian Wan. 294-298 [doi]
- Security Design for Multi-service Smart Card SystemsMei Hong, Hui Guo, Bin Luo. 299-304 [doi]
- A Process Algebra Approach for the Compatibility Analysis of Web ServicesChen Shu, Wu Guo Qing, Xiao Jing. 305-308 [doi]
- Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor NetworksXi Luo, Yi-Ying Zhang, WenCheng Yang, Myong-Soon Park. 309-312 [doi]
- An Enhanced Routing Protocol for Wireless Sensor NetworksMansoureh Ghiasabadi, Mohsen Sharifi, Nafiseh Osati, Sareh Beheshti, Mona Sharifnejad. 313-316 [doi]
- QoSR Algorithm of Q-ACO Based on Convergence Grads ExpectationQin Yong, Jia Yun-Fu, Liang Ben-Lai, Huang Han, Liang Huo-Min, Cai Zhao-Quan. 317-320 [doi]
- Block Size Estimation for Time-Sensitive Applications under Wireless Network CodingKui Xu, Fan Zhang, Chunming Rong, Bin Dai, Benxiong Huang. 321-324 [doi]
- A Reliable Routing for Industrial Wireless Sensor NetworksZhengxin Lu, Yi Wang, Laurence Tianruo Yang, Lan Li, Furong Wang. 325-328 [doi]
- An Algorithm for Acquiring PRN Code in DSSS System Based on Sub-samplingBo Qian, Li Yang, Yongxin Feng, Chengsheng Pan. 329-332 [doi]
- The High Efficiency Method of Tracking Base on Navigation SignalFang Liu, Bo Qian, Yongxin Feng, Chengsheng Pan. 333-336 [doi]
- A Prioritized Service Protocol for Vehicular CommunicationUne Thoing Rosi, Chowdhury Sayeed Hyder, Tai-Hoon Kim. 337-342 [doi]
- A Scalable QoS Device for Broadband Access to Multimedia ServicesWenyu Zhu, Thomas Dreibholz, Erwin P. Rathgeb, Xing Zhou. 343-348 [doi]
- Distance and Velocity Assisted Handoff Decision Algorithm in Heterogeneous NetworksFeng He, Furong Wang, Duan Hu. 349-353 [doi]
- A Flexible Garbage Collect Algorithm for Flash Storage ManagementYu Xin, Rong Chun-ming, Huang Ben-xiong. 354-357 [doi]
- A Spectral Density Approach in Research of Internet Topology PropertiesYe Xu, Zhuo Wang. 358-361 [doi]
- A DMR Fair Algorithm for Realtime SchedulerZhang Shi-jun, Yu Xin, Yu Shao-hua, Huang Ben-xiong. 362-366 [doi]
- A Robust Optical Light-Path Establishment Scheme for Core Network Architecture of Future InternetJunjie Lee, Hayoung Oh, Chong-kwon Kim. 367-372 [doi]
- Distributed Routing for Wireless Sensor Networks Based on Cluster MaintenanceYuhua Liu, Jingju Gao, Longquan Zhu, Xiaoxu Li. 373-376 [doi]
- Linguistic Approach to Cryptographic Data SharingMarek R. Ogiela, Urszula Ogiela. 377-380 [doi]
- Digital Coding of Speech Waveforms Using the Proposed ADMB. K. Sujatha, P. S. Satyanarayana, K. N. Haribhat. 381-386 [doi]
- Research on Recognition Methods for Traffic SignsSong Zhenghe, Zhao Bo, Zhu Zhongxiang, Wang Meng, Mao Enrong. 387-390 [doi]
- The Traceback Method about DoS Attack in Open Grid Computing EnvironmentSeoung-Hyeon Lee, Cheol-Joo Chae, Deok-Gyu Lee, Jong-Wook Han, Jae Kwang Lee. 391-394 [doi]
- Research of Information Processing on SDH Backbone NetworksXia Deng, Zhiping Huang, Shaojing Su, Chunwu Liu, Guilin Tang, Yimeng Zhang. 395-398 [doi]
- Performance of the FS MC-CDMA System with CCI Canceller Technique in Nakagami-m FadingZe-Guang Jin, Heau-Jo Kang. 399-402 [doi]
- On Network Management Solutions and the Potential of P2P TechnologiesHui Xu, Debao Xiao, Yanan Chang, Xi Peng. 403-406 [doi]
- Identity-Based Broadcast Group-Oriented Encryption from PairingsBo Zhang, Qiuliang Xu. 407-410 [doi]
- A Low-Latency GTS Strategy in IEEE802.15.4 for Industrial ApplicationsYouling Zhou, Yi Wang, Jianhua Ma, Junpin Jia, Furong Wang. 411-414 [doi]
- An Efficient Framework for Distributed Enterprise Portal for Maintaining Global Patch ConsistencyHui-Ling Lin, Ching-Shun Hsieh, Shao-Shin Hung, Derchian Tsaih. 415-418 [doi]
- Performance Improvement of SOK Key Distribution SchemeXiaodong Liu, Yuegong Zhang. 419-422 [doi]
- An Algorithm to Find the Constrained Steiner Tree in Halin NetworksYunting Lu, Zhenjun Li, Min Li. 423-426 [doi]
- An Enhanced Query Tree (EQT) Protocol for Memoryless Tag Anti-collision in RFID SystemsChing-Hsien Hsu, Chia-Hao Yu, Yi-Pin Huang, Kyung-Jae Ha. 427-432 [doi]
- Multi-state Fault Tolerant Topology Control Algorithm for Wireless Sensor NetworksAzadeh Forghani, Amir Masoud Rahmani. 433-436 [doi]
- The Research of Restraining Clipping Noise Algorithm Based on PTSHongxia Wang, Zijing Zhang. 437-440 [doi]
- Streaming Media Intrusion Detection through Interacting Protocol State MachinesYu Xin, Yu Shao-hua, Liu Yan, Ma Jian-hua. 441-444 [doi]
- Various Six-Port Correlators Using Coupler and Power DividerJae-du Yu, Kyung-sig Ban, Choo-yeon Shin, Young Wan Kim. 445-448 [doi]
- Research and Implementation of NAT Traversal for SIP in SoftswitchHu Guang, Liu Yan, Yu Xin. 449-453 [doi]
- Towards Automated Traffic System Using Vehicular Network with Directional AntennaChowdhury Sayeed Hyder, Anindya Iqbal, Une Thoing Rosi, Tai-Hoon Kim. 454-458 [doi]
- Dual Receiver Communication System for DSRCTsutomu Tsuboi, Jun Yamada, Naoki Yamauchi, Masato Hayashi. 459-464 [doi]
- A Scale-Free Routing Algorithm in Wireless Sensor NetworksYe Xu, Zhuo Wang. 465-468 [doi]
- A Comparative Study on the Performance of the RFID Tag Collision Resolution ProtocolsXinqing Yan, Zhouping Yin, Youlun Xiong. 469-472 [doi]
- Performance Analysis of OFDM-Based WAVE System Using Coefficient Tracking Synchronization AlgorithmSe-Kab Oh, Heau-Jo Kang. 473-478 [doi]
- Modeling Hierarchical Gossiping in Reliable Multicast ProtocolsXiaopeng Fan, Jiannong Cao, Weigang Wu, Hui Cheng. 479-484 [doi]
- A Study on the Efficient Mutual Authentication Mechanism Using the Agent ServerSang Wook Choi, Cheol-Joo Chae, Jae Kwang Lee. 485-488 [doi]
- Safeguard Intranet Using Embedded and Distributed Firewall SystemChu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, Tsung-Che Yang. 489-492 [doi]
- A Study of WiMAX Implementation at University CampusesChen-Hsiang Yu, Don-Lin Yang, An-Chi Liu. 493-496 [doi]
- The Development of a Realistic Simulation Framework with OMNeT++Jiming Chen, Jianhui Zhang, WeiQiang Xu, Lei Shu, Youxian Sun. 497-500 [doi]