Abstract is missing.
- An Overview of Membrane ComputingShankara Narayanan Krishna. 1-14 [doi]
- Protecting Critical Infrastructures While Preserving Each Organization s AutonomyYves Deswarte. 15-34 [doi]
- Computations and InteractionJos C. M. Baeten, Bas Luttik, Paul van Tilburg. 35-54 [doi]
- Scribbling Interactions with a Formal FoundationKohei Honda, Aybek Mukhamedov, Gary Brown, Tzu-Chun Chen, Nobuko Yoshida. 55-75 [doi]
- Open Government in Policy Development: From Collaborative Scenario Texts to Formal Policy ModelsMaria Wimmer. 76-91 [doi]
- Linear Process AlgebraVaughan Pratt. 92-111 [doi]
- Jump-Start Cloud: Efficient Deployment Framework for Large-Scale Cloud ApplicationsXiaoxin Wu, Zhiming Shen, Ryan Wu, Yunfeng Lin. 112-125 [doi]
- Capacity Estimation in HPC Systems: Simulation ApproachA. Anghelescu, R. B. Lenin, Srini Ramaswamy, Kenji Yoshigoe. 126-137 [doi]
- A Multi-Granular Lock Model for Distributed Object Oriented Databases Using SemanticsV. Geetha, Niladhuri Sreenath. 138-149 [doi]
- Contention-Free Many-to-Many Communication Scheduling for High Performance ClustersSatyajit Banerjee, Atish Datta Chowdhury, Koushik Sinha, Subhas Kumar Ghosh. 150-161 [doi]
- Recursive Competitive Equilibrium Approach for Dynamic Load Balancing a Distributed SystemK. Shahu Chatrapati, J. Ujwala Rekha, A. Vinaya Babu. 162-174 [doi]
- Smoothed Functional and Quasi-Newton Algorithms for Routing in Multi-stage Queueing Network with ConstraintsK. Lakshmanan, Shalabh Bhatnagar. 175-186 [doi]
- An Incremental Power Greedy Heuristic for Strong Minimum Energy Topology in Wireless Sensor NetworksB. S. Panda, D. Pushparaj Shetty. 187-196 [doi]
- ::::k:::::::::::th::::::: Order Geometric Spanners for Wireless Ad Hoc NetworksPrabhat Kiran, S. V. Rao. 197-208 [doi]
- Robust and Distributed Range-Free Localization Using Anchor Nodes with Varying Communication Range for Three Dimensional Wireless Sensor NetworksManas Kumar Mishra, M. M. Gore. 209-220 [doi]
- Decision Support Web ServiceN. Parimala, Anu Saini. 221-231 [doi]
- Socially Responsive Resource Usage: A ProtocolHrushikesha Mohanty. 243-254 [doi]
- An Automated HSV Based Text Tracking System from Complex Color VideoChinmaya Misra, P. K. Swain. 255-266 [doi]
- Enhanced Insider Threat Detection Model that Increases Data AvailabilityQussai Yaseen, Brajendra Panda. 267-277 [doi]
- Checking Anonymity Levels for Anonymized DataV. Valli Kumari, N. Sandeep Varma, A. Sri Krishna, K. V. Ramana, K. V. S. V. N. Raju. 278-289 [doi]
- Chaos Based Image Encryption Scheme Based on Enhanced Logistic MapI. Shatheesh Sam, P. Devaraj, Raghuvel S. Bhuvaneswaran. 290-300 [doi]
- Matrix Insertion-Deletion Systems for Bio-Molecular StructuresLakshmanan Kuppusamy, Anand Mahendran, Shankara Narayanan Krishna. 301-312 [doi]
- Artificial Bee Colony Based Sensor Deployment Algorithm for Target Coverage Problem in 3-D TerrainS. Mini, Siba K. Udgata, Samrat L. Sabat. 313-324 [doi]