Abstract is missing.
- Distributed Security Algorithms by Mobile AgentsPaola Flocchini, Nicola Santoro. 1-14 [doi]
- A Real-Time Guarantee Scheme Based on the Runtime Message Scheduling and Error Control for the Dual Wireless Ad Hoc Sensor NetworkMikyung Kang, Abhijit Saha, Junghoon Lee, Gyung-Leen Park, Hanil Kim. 15-26 [doi]
- ADIAN: A Distributed Intelligent Ad-Hoc NetworkSaeed Shahbazi, Gholamreza Ghassem-Sani, Hamid R. Rabiee, Mohammed Ghanbari, Mehdi Dehghan. 27-39 [doi]
- A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-Heads for a Large Ad Hoc NetworkParama Bhaumik, Somprakash Bandyopadhyay. 40-45 [doi]
- Prediction Based QoS Routing in MANETsShahram Mohrehkesh, Mahmood Fathy, Saleh Yousefi. 46-51 [doi]
- MCDS Based Multicasting in Mobile Adhoc NetworksM. Shukla, M. Rai, G. S. Tomar, Shekhar Verma. 52-57 [doi]
- Programmer-Centric Conditions for Itanium Memory ConsistencyLisa Higham, LillAnne Jackson, Jalal Kawash. 58-69 [doi]
- A Group Quorum System of Degree 1+sqrt(1+n/m)Fouad B. Chedid. 70-81 [doi]
- An Efficient Non-intrusive Checkpointing Algorithm for Distributed Database SystemsJiang Wu, D. Manivannan. 82-87 [doi]
- Adaptive Connected Dominating Set - An Exercise in Distributed Output SwitchingAnkur Jain, Sushanta Karmakar, Arobinda Gupta. 88-93 [doi]
- An Efficient and Scalable Checkpointing and Recovery Algorithm for Distributed SystemsK. P. Krishna Kumar, R. C. Hansdah. 94-99 [doi]
- On Distributed VerificationAmos Korman, Shay Kutten. 100-114 [doi]
- The Price of Defense and Fractional MatchingsMarios Mavronicolas, Vicky G. Papadopoulou, Giuseppe Persiano, Anna Philippou, Paul G. Spirakis. 115-126 [doi]
- Construction of Adaptive IDS Through IREP++ and ARMRamakrishna Raju S., Sreenivasa Rao. 127-132 [doi]
- Proving Optimality of DWS(Distance-Weighted Sampling) Probability Function for FMS IP Trace-Back TechniqueJeankyung Kim, Jinsoo Hwang, Byungryong Kim, Kichang Kim. 133-138 [doi]
- A Mechanism for Detection and Prevention of Distributed Denial of Service AttacksJaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta. 139-144 [doi]
- Auction Based Resource Allocation in GridsSai Rahul Reddy P., Arobinda Gupta. 145-156 [doi]
- MLBLM: A Multi-level Load Balancing Mechanism in Agent-Based GridMohsen Amini Salehi, Hossain Deldari, Bahare Mokarram Dorri. 157-162 [doi]
- Data Management for a Distributed Hash TableReshma Sonar, D. M. Thakore. 163-168 [doi]
- DRWT: An Efficient Random Walk Algorithm for Unstructured P2P NetworksYiming Zhang, Xicheng Lu, Dongsheng Li, Nong Xiao. 169-174 [doi]
- Stochastic Models of IEEE 802.11e Wireless Networks with Multimedia ApplicationsAnurag Kumar. 175-192 [doi]
- Maintaining Information About Nearby Processors in a Mobile EnvironmentFaith Ellen, Sivaramakrishnan Subramanian, Jennifer L. Welch. 193-202 [doi]
- Energy Aware Topology Management in Ad Hoc Wireless NetworksT. Shivaprakash, G. S. Badrinath, K. R. Venugopal, Lalit M. Patnaik. 203-214 [doi]
- On Maximizing Network Lifetime of Broadcast in WANETs Under an Overhearing Cost ModelGuofeng Deng, Sandeep K. S. Gupta. 215-226 [doi]
- On Maximizing Residual Energy of Actors in Wireless Sensor and Actor NetworksKandasamy Selvaradjou, C. Siva Ram Murthy. 227-238 [doi]
- Locant: A Nature Inspired Location Service for Ad Hoc NetworksR. C. Hansdah, Prashant Khanna. 239-244 [doi]
- An Analytical Model for Capacity Evaluation of VoIP on HCCA and TCP File Transfers over EDCA in an IEEE 802.11e WLANSri Harsha, S. V. R. Anand, Anurag Kumar, Vinod Sharma. 245-256 [doi]
- Developing Analytical Framework to Measure Robustness of Peer-to-Peer NetworksBivas Mitra, Md. Moin Afaque, Sujoy Ghose, Niloy Ganguly. 257-268 [doi]
- Design and Implementation of a Network Processor Based 10Gbps Network Traffic GeneratorSanket Shah, Tularam M. Bansod, Amit Singh. 269-275 [doi]
- Stochastic Spectral Density Analysis on Network Traffic CharacterizationAbhik Das, S. K. Ghosh. 276-281 [doi]
- Negotiating Monitoring Task Allocation for OrbitersDoran Chakraborty, Sabyasachi Saha, Sandip Sen, Bradley Clement. 282-287 [doi]
- Primality Tests Based on Fermat s Little TheoremManindra Agrawal. 288-293 [doi]
- Efficient Distributed Handshake Using Mobile AgentsBilel Derbel. 294-305 [doi]
- Improved Distributed Exploration of Anonymous NetworksShantanu Das, Shay Kutten, Ayelet Yifrach. 306-318 [doi]
- The Complexity of Updating Multi-writer Snapshot ObjectsHagit Attiya, Faith Ellen, Panagiota Fatourou. 319-330 [doi]
- Simultaneous Consensus Tasks: A Tighter Characterization of Set-ConsensusYehuda Afek, Eli Gafni, Sergio Rajsbaum, Michel Raynal, Corentin Travers. 331-341 [doi]
- Database Summarization and Publishing in Wireless EnvironmentsAnshul Gandhi, R. K. Ghosh. 342-348 [doi]
- Read-Write ReductionsEli Gafni. 349-354 [doi]
- Large Scale Voice over IP Experiences on High Performance IntranetsFrancesco Palmieri. 355-366 [doi]
- Z!Stream: An Application Streaming System by Copy-on-Reference Block of Executable FilesDongho Song. 367-372 [doi]
- Supervised Grid-of-Tries: A Novel Framework for Classifier ManagementT. Srinivasan, R. Balakrishnan, S. A. Gangadharan, V. Hayawardh. 373-378 [doi]
- BGPSep_S: An Algorithm for Constructing IBGP Configurations with Complete VisibilityFeng Zhao, Xicheng Lu, Peidong Zhu, Jinjing Zhao. 379-384 [doi]
- Performance Enhancement in REM Using Adaptive Drop Policy for Protective and Best-Effort TrafficHyon-Young Choi, Sung-Gi Min. 385-390 [doi]
- A New Precomputation Scheme for MPLS Traffic Engineering RoutingZhaowei Meng, Jinshu Su, Vittorio Manetti. 391-396 [doi]
- A Mobility Aware Technique for Clustering on Mobile Ad-Hoc NetworksCharalampos Konstantopoulos, Damianos Gavalas, Grammati E. Pantziou. 397-408 [doi]
- Design and Analysis of Rate Aware Ad Hoc 802.11 NetworksG. Sandhya, K. Gopinath. 409-420 [doi]
- Tightly Packed IP Address Configuration (TPIA) Protocol in Small-Scale MANETJin-Ok Hwang, Sung-Gi Min, Young-Il Choi. 421-429 [doi]
- TransMAN: A Group Communication System for MANETsKulpreet Singh, Andronikos Nedos, Siobhán Clarke. 430-441 [doi]
- On Fault Tolerance of Two-Dimensional Mesh NetworksSoumen Maity, Amiya Nayak, S. Ramsundar. 442-453 [doi]
- Feedback Control with Prediction for Thread Allocation in Pipeline Architecture Web ServerShaoliang Peng, Shanshan Li, Xiangke Liao, Yuxing Peng, Ye Hui. 454-465 [doi]
- Variants of Priority Scheduling Algorithms for Reducing Context-Switches in Real-Time SystemsBiju K. Raveendran, K. Durga Prasad, Sundar Balasubramaniam, S. Gurunarayanan. 466-478 [doi]
- Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical NetworksLei Guo, Lemin Li, Jin Cao, Hongfang Yu, Xuetao Wei. 479-490 [doi]
- A Time Model for Distributed Multimedia ApplicationsWinfried E. Kühnhauser, Martin Süßkraut. 491-496 [doi]
- Destination Initiated Multi-wavelength Reservation Protocol (DIMRP) in WDM Optical Networks: Finding the Optimal Selectivity for Wavelength AssignmentMalabika Sengupta, Swapan Kumar Mondal, Debasish Saha. 497-502 [doi]
- A Hybrid Transformation Technique for Video CodingM. Ezhilarasan, P. Thambidurai. 503-508 [doi]
- Location Verification Based Defense Against Sybil Attack in Sensor NetworksDebapriyay Mukhopadhyay, Indranil Saha. 509-521 [doi]
- A New Scheme for Establishing Pairwise Keys for Wireless Sensor NetworksAbhishek Gupta, Joy Kuri, Pavan Nuggehalli. 522-533 [doi]
- Distributed Location and Lifetime Biased Clustering for Large Scale Wireless Sensor NetworkBiswanath Dey, Sukumar Nandi. 534-545 [doi]
- Power Aware Duty Scheduling in Wireless Sensor NetworksUmesh Bellur, Nishant Jaiswal. 546-551 [doi]
- Data Forwarding Protocol for Reliable Delivery Service in Wireless Sensor NetworksJoo Sang Youn, Jihoon Lee, Seung-Joon Seok, Chul-Hee Kang. 552-557 [doi]
- Synchronous and Asynchronous Auction Models for Dynamic Spectrum AccessShamik Sengupta, Mainak Chatterjee. 558-569 [doi]
- A One-Pass Method of MIP Registration by WLAN Host Through GPRS NetworkSibaram Khara, Iti Saha Misra, Debashis Saha. 570-581 [doi]
- An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANsJerzy Konorski. 582-593 [doi]
- A Signalling Technique for Disseminating Neighbouring AP Channel Information to Mobile StationsGurpal Singh, Ajay Pal Singh Atwal, B. S. Sohi. 594-599 [doi]
- A Predictive Location Management Scheme by Extracting the Unique Sub-patterns from the Mobility LogsSubrata Nandi, Sanjib Sadhu. 600-605 [doi]