Abstract is missing.
- Simulation and Realization of High Input Impedence Biquad with Minimum Number of Passive ElementsManish Kumar, Umesh Kumar, M. C. Srivastava. 1-3
- TCP/IP Offload Engine - Implementation using VxWorks and its Performance AnalysisV. Senthilkumar. 4-8
- Packet Scheduling Schemes for Mobile Service Providers with Heterogeneous TrafficSalman AlQahtani. 9-13
- A Web-based Virtual Educational System for Self-Learning of Java Language Using Java Web PlayerDongsik Kim, Jiyoon Yoo. 14-20
- Efficient Dynamic Scheduling Algorithms for Real-Time Multiprocessor SystemsKetan Kotecha, Apurva Shah. 21-25
- Performance of Tree - Structured CLOS Multicast NetworksJamil Ayoub, Ghazi Al Sukkar. 26-31
- Ten 5-user collaborative codes with reduced constellation sizeA-Imam Al-Sammak. 32-35
- A Criteria Based Data Broadcast in Wireless Mobile ComputingJohn Tsiligaridis. 36-41
- FPGA Implementation of the Binary Pulse Compression Sequences based on DiscriminationM. Srinivasa Rao, K. Subba Rao, N. Balaji. 42-46
- Mobility Management Model for Healthcare ServicesLutfi Mohammed Omer Khanbary, Deo Prakash Vidyarthi. 47-53
- Energy Minimization for Data Sequence ProblemNallamothu Satyanarayana, A. Vinaya Babu. 54-57
- Energy-Delay Product Minimization Techniques for On-Chip InterconnectsNallamothu Satyanarayana, A. Vinaya Babu. 58-66
- Intra-File-Level Parallelism on XML Parsing: Framework and Performance EvaluationZhiyong Liang, Yang Xu, Yabin Dang. 67-74
- Policy based Agent Architecture for Sensor based Mesh Networks - Health Care MonitoringSuresh Sankaranarayanan. 75-81
- Image Retrieval from Databases: an Approach using Region Color and Indexing TechniqueC. R. Venugopal, M. V. Sudhamani. 82-89
- A Network-based Fast IPv6 Handover Scheme in IEEE 802.11 NetworksByungjoo Park, Dongcheul Lee, Youn-Hee Han, Bongki Kim. 90-97
- Application of Bandwidth Allocation Schemes In Epon: Approach to Semi - Static AlgorithmsG. Jagadeesh Kumar, E. V. Prasad. 98-102
- A Simple Selective Mapping Algorithm for the Peak to Average Power Ratio in Space Time Block Coded MIMO-OFDM SystemsEmad S. Hassan, Said E. El-Khamy, Moawad I. Dessouky, Sami A. El-Dolil, Fathi E. Abd El-Samie. 103-106
- Performance Comparison of Two STC-based Cooperative Relay ProtocolsSaman Atapattu. 107-112
- Enhancing the Performance of SIP in UMTS IP Multimedia SubsystemDhananjay Kumar, S. Nithya, H. Karthik, R. Sathish. 113-117
- Performance Analysis of a Cellular CDMA-TDD System to Support Asymmetric Internet TrafficDhananjay Kumar, C. Chellappan. 118-125
- An IEEE 802.11 Load Power Protocol Based on the Transmission PowerS. Sankara Gomathi, A. Arivoli. 126-132
- Performance Improvements of Power Efficient MANET Routing Based on Load Balancing and Multiple Black Holes AttackS. Sankara Gomathi, Preethi Murali. 133-140
- Effect of Subchannelization in Uplink in OFDM PHY of IEEE 802.16dJavad Hajipour, Bijan Vosoughi Vahdat. 141-145
- A novel connection admission control mechanism with statistical delay constraints in MPLS networksHichem Ayed Harhira, Samuel Pierre. 146-153
- Comparison Study of Three Types of Temperature Sensing Techniques Suitable for Embedded System ApplicationsXiaohe Wu, Morrision Obeng, Jing Wang, Thomas Yang. 154-158
- Stability and Link Efficiency of On-Demand Source Tree-Based Multicast Routing Protocols for Mobile Ad Hoc NetworksNatarajan Meghanathan. 159-166
- A Fault Tolerant Grid Scheduling Model to Minimize Turnaround TimeZahid Raza, Deo Prakash Vidyarthi. 167-175
- A Parallel Attractor-tree Based Clustering MethodBaoying Wang, Aijuan Dong. 176-180
- A Cluster-based Routing Scheme in Wireless Sensor NetworksHao-Li Wang, Yu-Yang Chao. 181-185
- Enhancing Reliable Multi-Path Secure Data Communication Protocol for Mobile Adhoc NetworkS. Sankara Gomathi, K. Parimala Rajeswari. 186-193
- Securing Networks from Distributed Denial of Service Attacks using Statistical FiltersJayashree Padmanabhan, K. S. Easwarakumar, V. Anandharaman, K. Aswin, S. Raja Vijay. 194-200
- PKI Vulnerability and x-Cryptography in Grid Computing NetworksHwajung Lee. 201-205
- Securing Trustworthy Three-Tier Grid Architecture with Spam FilteringP. Varalakshmi, S. Thamarai Selvi, Monica S., Akilesh G.. 206-213
- A Proposal for Taxonomy of Non-Classical Computer ArchitecturesHala A. Farouk. 214-221
- A Dynamic Scheduling Strategy for the GridAndy S. Chiou, Jung-Yang Shie. 222-228
- Investigating auto-configuration in MANETJin-Ok Hwang, Heyi-Sook Suh, Sung-Gi Min. 229-235