Abstract is missing.
- Usable Mobile SecurityN. Asokan, Cynthia Kuo. 1-6 [doi]
- Actor-Network Procedures - (Extended Abstract)Dusko Pavlovic, Catherine Meadows. 7-26 [doi]
- Knowledge as a Window into Distributed CoordinationYoram Moses. 27-34 [doi]
- Decision Making as Optimization in Multi-robot TeamsLynne E. Parker. 35-49 [doi]
- Mstar: A New Two Level Interconnection NetworkNibedita Adhikari, Chitta Ranjan Tripathy. 50-61 [doi]
- An Improved Scheme for False Data Filtering in Wireless Sensor NetworksC. Anudeep, Manik Lal Das. 62-70 [doi]
- Anonymity and Security in Mobile Ad Hoc NetworksJhansi Vazram Bolla, Valli Kumari Vatsavayi, J. V. R. Murthy. 71-82 [doi]
- Circle Formation by Asynchronous Fat Robots with Limited VisibilityAyan Dutta, Sruti Gan Chaudhuri, Suparno Datta, Krishnendu Mukhopadhyaya. 83-93 [doi]
- High Concurrency for Continuously Evolving OODBMSV. Geetha, Niladhuri Sreenath. 94-105 [doi]
- A New Scheme for IPv6 BD-TTCS TranslatorJ. Hanumanthappa, D. H. Manjaiah. 106-116 [doi]
- Nash Equilibrium in Weighted Concurrent Timed Games with Reachability ObjectivesShankara Narayanan Krishna, Lakshmi Manasa, Ashish Chiplunkar. 117-128 [doi]
- Parallelization of PageRank on Multicore ProcessorsTarun Kumar, Parikshit Sondhi, Ankush Mittal. 129-140 [doi]
- Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication SchemeChunguang Ma, Ding Wang, Qi-Ming Zhang. 141-152 [doi]
- An Algebra of Social DistanceHrushikesha Mohanty. 153-165 [doi]
- Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification AnimationAnil Mundra, Anish Mathuria, Manik Lal Das. 166-176 [doi]
- Strong Minimum Energy Minimum Interference Topology in Wireless Sensor NetworksBhawani Sankar Panda, D. Pushparaj Shetty, Bijaya Kishor Bhatta. 177-187 [doi]
- Distributed Processing and Internet Technology to Solve Challenges of Primary Healthcare in IndiaArun Pande, Sanjay Kimbahune, Nandini Bondale, Ratnendra Shinde, Sunita Shanbhag. 188-199 [doi]
- Packet Forwarding Strategies for Cooperation Enforcement in Mobile Ad Hoc Wireless NetworksNidhi Patel, Sanjay Srivastava. 200-211 [doi]
- A Study on Scalability of Services and Privacy Issues in Cloud ComputingR. S. M. Lakshmi Patibandla, Santhi Sri Kurra, Nirupama Bhat Mundukur. 212-230 [doi]
- A Recommendation Model for Handling Dynamics in User ProfileChhavi Rana, Sanjay Kumar Jain. 231-241 [doi]
- Allocation of Slotted Deadline Sensitive Leases in Infrastructure CloudDhairya Vora, Sanjay Chaudhary, Minal Bhise, Vikas Kumar 0002, Gaurav Somani. 242-252 [doi]
- Grids Security without Public Key SettingsManik Lal Das. 253-254 [doi]
- Concurrent HCM for Authorizing Grid ResourcesMustafa Kaiiali, Chillarige Raghavendra Rao, Rajeev Wankar, Arun Agarwal. 255-256 [doi]
- Seamless Provision of Cloud Services Using Peer-to-Peer (P2P) ArchitectureSnehal Masne, Rajeev Wankar, Chillarige Raghavendra Rao, Arun Agarwal. 257-258 [doi]
- Distributed Fault Tolerant Estimation in Wireless Sensor Network Using Robust Diffusion AdaptationMeenakshi Panda, Pabitra Mohan Khilar. 259-260 [doi]
- Robust Distributed Block LMS over WSN in Impulsive NoiseTrilochan Panigrahi, Ganapati Panda, Bernard Mulgrew. 261-262 [doi]
- Resource Allocation Techniques Based on Availability and Movement Reliability for Mobile Cloud ComputingJi Su Park, Heon-Chang Yu, Eunyoung Lee. 263-264 [doi]
- Transparency Computation for Work GroupsA. B. Sagar. 265-266 [doi]
- A New Hierarchical Structure of Star Graphs and ApplicationsWei Shi, Feng Luo, Pradip K. Srimani. 267-268 [doi]
- Incremental Discovery of Sequential Pattern from Semi-structured Document Using Grammatical InferenceRamesh Thakur, Suresh Jain, Narendra S. Chaudhari. 269 [doi]
- Group Associated Petri Nets in Bio ComputingK. Thirusangu, D. Gnanaraj Thomas, B. J. Balamurugan. 270-271 [doi]
- Concept Map Based Service Specification and DiscoverySupriya Vaddi. 272-273 [doi]
- Semantic Search Using Constrained Spread Activation for Semantic Digital LibrarySandeep Vasani, Mohit Pandey, Minal Bhise. 274-275 [doi]