Abstract is missing.
- The Distributed Sensor Networks - An Emerging TechnologyS. Sitharama Iyengar. 1 [doi]
- Distribute Computing Track Chair s MessageArunabha Sen. 2 [doi]
- Efficient Binding Lifetime Determination Schemes in HMIPv6Sun Ok Yang, SungSuk Kim, Chong-Sun Hwang. 3-14 [doi]
- A Fast Search and Advanced Marking Scheme for Network IP Traceback ModelJia Hou, Moon Ho Lee. 15-20 [doi]
- Design and Performance Evaluation of Token-Based MAC Protocols in WDM Burst Switched Ring NetworksLi-Mei Peng, Young-Chul Kim, Kyoung-Min Yoo, Kyeong-Eun Han, Young-Chon Kim. 21-26 [doi]
- Self-stabilizing Energy-Aware Routing Algorithm in Wireless Sensor Network with Limited MobilitySmruti Padhy, Diganta Goswami. 27-38 [doi]
- Position Based Gradient Routing in Mobile Ad Hoc NetworksAnand Prakash Ruhil, D. K. Lobiyal, Ivan Stojmenovic. 39-49 [doi]
- Distributed Clustering Algorithm for Finding Virtual Backbone in Ad Hoc NetworksB. Paul, S. V. Rao. 50-55 [doi]
- Merging Clustering Algorithms in Mobile Ad Hoc NetworksOrhan Dagdeviren, Kayhan Erciyes, Deniz Cokuslu. 56-61 [doi]
- Performance Study and Implementation of Self Organized Routing Algorithm for Mobile Ad Hoc Network Using GloMoSimK. Murugan, S. Shanmugavel. 62-68 [doi]
- Self-stabilizing Deterministic TDMA for Sensor NetworksMahesh Arumugam, Sandeep S. Kulkarni. 69-81 [doi]
- Effect of Mobility on Communication Performance in Overloaded One-Dimensional Cellular NetworksMichihiro Inoue, Noriaki Yoshiura, Yoshikuni Onozato. 82-92 [doi]
- Distributed Time Slot Assignment in Wireless Ad Hoc Networks for STDMASubhasis Bhattacharjee, Nabanita Das. 93-104 [doi]
- Efficient Algorithm for Placing Base Stations by Avoiding Forbidden ZoneSasanka Roy, Debabrata Bardhan, Sandip Das. 105-116 [doi]
- Secure Two-Party Context Free Language RecognitionAnshuman Singh, Siddharth Barman, K. K. Shukla. 117-124 [doi]
- Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection SystemJaydip Sen, Indranil Sengupta. 125-131 [doi]
- Cleaning an Arbitrary Regular Network with Mobile AgentsPaola Flocchini, Amiya Nayak, Arno Schulz. 132-142 [doi]
- Multi-attribute Hashing of Wireless Data for Content-Based QueriesYon Dohn Chung, Ji Yeon Lee. 143-153 [doi]
- A Tool for Automated Resource Consumption Profiling of Distributed TransactionsB. Nagaprabhanjan, Varsha Apte. 154-165 [doi]
- An Efficient Algorithm for Removing Useless Logged Messages in SBML ProtocolsJinHo Ahn. 166-171 [doi]
- Divide and Concur: Employing Chandra and Toueg s Consensus Algorithm in a Multi-level SettingRahul Agarwal, Mahender Bisht, S. N. Maheshwari, Sanjiva Prasad. 172-183 [doi]
- Distributed Multiple Hypothesis Testing in Sensor Networks Under Bandwidth ConstraintChandrashekhara Thejaswi P. S., Ranjeet Patro. 184-191 [doi]
- A Scalable Multi-level Distributed System-Level DiagnosisParitosh Chandrapal, Padam Kumar. 192-202 [doi]
- Analysis of Interval-Based Global State DetectionPunit Chandra, Ajay D. Kshemkalyani. 203-216 [doi]
- A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2JungHee Lee, Dongsoo Han. 217-228 [doi]
- Towards an Agent-Based Framework for Monitoring and Tuning Application Performance in Grid EnvironmentSarbani Roy, Nandini Mukherjee. 229-234 [doi]
- GDP: A Paradigm for Intertask Communication in Grid Computing Through Distributed PipesD. Janakiram, M. Venkateswara Reddy, A. Vijay Srinivas, M. A. Maluk Mohamed, S. Santosh Kumar. 235-241 [doi]
- Internet Technology Track Chair s MessageSanjay Kumar Madria. 242 [doi]
- Rewriting Queries Using View for RDF/RDFS-Based Relational Data IntegrationHuajun Chen. 243-254 [doi]
- An Effective Searching Method Using the Example-Based QueryKil Hong Joo, Jaeho Lee. 255-266 [doi]
- On Communicating with Agents on the NetworkRajat Shuvro Roy, Mohammad Sohel Rahman. 267-277 [doi]
- Applying Fuzzy Logic to Recommend Consumer ElectronicsYukun Cao, Yunfeng Li, Xiaofeng Liao. 278-289 [doi]
- Generic XML Schema Definition (XSD) to GUI TranslatorV. Radha, S. Ramakrishna, N. Pradeep Kumar. 290-296 [doi]
- Off-Line Micro-payment System for Content Sharing in P2P NetworksXiaoling Dai, John C. Grundy. 297-307 [doi]
- FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web PagesDebajyoti Mukhopadhyay, Pradipta Biswas. 308-313 [doi]
- Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and ObservationsAtul Kumar, Anjali Bhargava, Bharat K. Bhargava, Sanjay Kumar Madria. 314-320 [doi]
- An Incremental Document Clustering Algorithm Based on a Hierarchical Agglomerative ApproachKil Hong Joo, Soojung Lee. 321-332 [doi]
- System Security Track Chair s MessageIndrajit Ray. 333 [doi]
- A Game Based Model of Security for Key Predistribution Schemes in Wireless Sensor NetworkDebapriyay Mukhopadhyay, Suman Roy. 334-347 [doi]
- E-mail Worm Detection Using the Analysis of BehaviorTao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong. 348-356 [doi]
- Verifiably Encrypted Signature Scheme Without Random OraclesM. Choudary Gorantla, Ashutosh Saxena. 357-363 [doi]
- An Improved Intrusion Detection Technique for Mobile Adhoc NetworksS. Prasanna, V. Vetri Selvi. 364-376 [doi]
- User Revocation in Secure Adhoc NetworksBezawada Bruhadeshwar, Sandeep S. Kulkarni. 377-388 [doi]
- A Hybrid Method to Intrusion Detection Systems Using HMMC. V. Raman, Atul Negi. 389-396 [doi]
- Enhanced Network Traffic Anomaly DetectorSuresh Reddy, Sukumar Nandi. 397-403 [doi]
- Statistically Secure Extension of Anti-collusion Code FingerprintingJae-Min Seol, Seong-Whan Kim. 404-409 [doi]
- An Improvement of Auto-Correlation Based Video Watermarking Scheme Using Perceptual Masking for MotionHyun-Seong Sung, Seong-Whan Kim. 410-419 [doi]
- Validation of Policy Integration Using AlloyManachai Toahchoodee, Indrakshi Ray. 420-431 [doi]
- Linking Theories of Concurrency by RetractionJifeng He. 432 [doi]
- Software Engineering Track Chair s MessageGopal Gupta. 433 [doi]
- Integrating Architecture Description Languages: A Semantics-Based ApproachQian Wang. 434-445 [doi]
- Automated Runtime Validation of Software Architecture DesignZhijiang Dong, Yujian Fu, Yue Fu, Xudong He. 446-457 [doi]
- Analyzing Loop Paths for Execution Time EstimationAbhik Roychoudhury, Tulika Mitra, Hemendra Singh Negi. 458-469 [doi]
- A Technique for Early Software Reliability PredictionRakesh Tripathi, Rajib Mall. 470-481 [doi]
- Executable Requirements Specifications Using Triggered Message Sequence ChartsBikram Sengupta, Rance Cleaveland. 482-493 [doi]
- Efficient Symmetry Reduction for an Actor-Based ModelMohammad Mahdi Jaghoori, Marjan Sirjani, Mohammad Reza Mousavi, Ali Movaghar. 494-507 [doi]
- Validated Code Generation for Activity DiagramsA. K. Bhattacharjee, R. K. Shyamasundar. 508-521 [doi]
- Data Mining Track Chair s MessageMukesh K. Mohania. 522 [doi]
- An Approach to Find Embedded Clusters Using Density Based TechniquesS. Roy, D. K. Bhattacharyya. 523-535 [doi]
- Using Sub-sequence Information with kNN for Classification of Sequential DataN. Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi. 536-546 [doi]
- Distance-Based Outliers in SequencesGirish Keshav Palshikar. 547-552 [doi]
- Capturing Market Intelligence from Customer Feedback E-mails Using Self-enhancing Bolzmann Machine-Based Network of Knowledge MapsN. Pradeep Kumar, Tapati Bandopadhyay. 553-560 [doi]
- Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical AttributesAmir Ahmad, Lipika Dey. 561-572 [doi]
- Dissemination of Multidimensional Data Using Broadcast ClustersIlias Michalarias, Hans-Joachim Lenz. 573-584 [doi]
- Multidimensional Frequent Pattern Mining Using Association Rule Based ConstraintsS. Vijayalakshmi, S. Suresh Raja. 585-591 [doi]
- A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained RecombinationM. A. H. Zahid, Ankush Mittal, Ramesh Chandra Joshi. 592-603 [doi]