Abstract is missing.
- Message from the Workshops Chair [doi]
- Message from the ADSN Chairs [doi]
- Message from the WWAN Chairs [doi]
- Message from the SDCS Chairs [doi]
- Message from the MPPS Chairs [doi]
- Message from the IWSAWC Chairs [doi]
- Message from the MNSA Chairs [doi]
- Workshop Committee Members [doi]
- Message from the DEBS Chairs [doi]
- Message from the MDC Chairs [doi]
- Message from the SIUMI Chairs [doi]
- Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast OverlayCristina Abad, Indranil Gupta, William Yurcik. 5-11 [doi]
- A Byzantine Fault-Tolerant Mutual Exclusion Algorithm and Its Application to Byzantine Fault-Tolerant Storage SystemsJoong Man Kim, Yoshifumi Manabe. 12-19 [doi]
- Zmail: Zero-Sum Free Market Control of SpamBenjamin Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda. 20-26 [doi]
- State Checksum and Its Role in System StabilizationChin-Tser Huang, Mohamed G. Gouda. 29-34 [doi]
- An Optimal Snap-Stabilizing Multi-Wave AlgorithmDoina Bein, Ajoy Kumar Datta, Mehmet Hakan Karaata, Safaa Zaman. 35-41 [doi]
- Reconciling the Theory and Practice of (Un)Reliable Wireless BroadcastGregory Chockler, Murat Demirbas, Seth Gilbert, Nancy A. Lynch, Calvin C. Newport, Tina Nolte. 42-48 [doi]
- Dynamic Load Balancing Using Network Transferable ComputerMegumi Hisayuki, Shinji Inoue, Yoshiaki Kakuda, Kenji Toda, Kuniyasu Suzaki. 51-57 [doi]
- Implementation Issues of Parallel Downloading Methods for a Proxy SystemJunichi Funasaka, Atsushi Kawano, Kenji Ishida. 58-64 [doi]
- Voting Multi-Dimensional Data with Deviations for Web Services under Group TestingWei-Tek Tsai, Yinong Chen, Dawei Zhang, Hai Huang. 65-71 [doi]
- A New TCP Congestion Control Method Considering Adaptability over Satellite InternetHiroyasu Obata, Satoru Takeuchi, Kenji Ishida. 75-81 [doi]
- Improving Mutipath Reliability in Topology-Aware Overlay NetworksChiping Tang, Philip K. McKinley. 82-88 [doi]
- Bandwidth Clustering for Reliable and Prioritized Network Routing Using Split Agent-Based MethodConstandinos X. Mavromoustakis, Helen D. Karatza. 89-94 [doi]
- InFilter: Predictive Ingress Filtering to Detect Spoofed IP TrafficAbhrajit Ghosh, Larry Wong, Giovanni Di Crescenzo, Rajesh Talpade. 99-106 [doi]
- Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff PacketsPai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang. 107-113 [doi]
- Specifying Information-Flow ControlsHoward Chivers, Jeremy Jacob. 114-120 [doi]
- MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS AttacksYu Chen, Yu-Kwong Kwok, Kai Hwang. 123-129 [doi]
- Performing BGP Experiments on a Semi-realistic Internet Testbed EnvironmentKe Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon Limprasittiporn, Kwan-Liu Ma, Shyhtsun Felix Wu, Chen-Nee Chuah. 130-136 [doi]
- A Replication- and Checkpoint-Based Approach for Anomaly-Based Intrusion Detection and RecoveryAdnan Agbaria, Roy Friedman. 137-143 [doi]
- Configurable Middleware-Level Intrusion Detection for Embedded SystemsEivind Naess, Deborah A. Frincke, A. David McKinnon, David E. Bakken. 144-151 [doi]
- Forensix: A Robust, High-Performance Reconstruction SystemAshvin Goel, Wu-chang Feng, David Maier, Wu-chi Feng, Jonathan Walpole. 155-162 [doi]
- A Simple Framework for Distributed ForensicsYongping Tang, Thomas E. Daniels. 163-169 [doi]
- Capacity Estimation of Non-Synchronous Covert ChannelsZhenghong Wang, Ruby B. Lee. 170-176 [doi]
- Increasing Attack Resiliency of Wireless Ad Hoc and Sensor NetworksHarald Vogt. 179-184 [doi]
- Defending against Sybil Attacks in Sensor NetworksQinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning. 185-191 [doi]
- Adaptive Real-Time Anomaly Detection with Improved Index and Ability to ForgetKalle Burbeck, Simin Nadjm-Tehrani. 195-202 [doi]
- Trust Framework for P2P Networks Using Peer-Profile Based Anomaly TechniqueNatalia Stakhanova, Samik Basu, Johnny Wong, Oleg Stakhanov. 203-209 [doi]
- A Topologically-Aware Worm Propagation Model for Wireless Sensor NetworksSyed A. Khayam, Hayder Radha. 210-216 [doi]
- Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment SystemHyun Seok Kim, Il-Gon Kim, Jin-Young Choi. 217-223 [doi]
- Real-Time Protection against DDoS Attacks Using Active GatewaysOnur Demir, Kanad Ghose. 224-231 [doi]
- A Fast Mobile Node Configuration Using Address Caching in Hybrid Wireless NetworksWooseong Kim, Yang Woo Ko, Soojeon Lee. 237-243 [doi]
- Indoor and Outdoor Location Based Services for Portable Wireless DevicesCristiano di Flora, Massimo Ficco, Stefano Russo, Vincenzo Vecchio. 244-250 [doi]
- A Sensor-Based Tracking System Using WitnessesJyh-How Huang, Shivakant Mishra. 251-255 [doi]
- An Intermediary Software Infrastructure for Edge ServicesRaffaella Grieco, Delfina Malandrino, Vittorio Scarano, Francesco Varriale, Francesca Mazzoni. 259-265 [doi]
- A Distributed Architecture for Management and Retrieval of Extended Points of InterestClaudio Bettini, Nicolò Cesa-Bianchi, Daniele Riboni. 266-272 [doi]
- Service Description for Pervasive Service DiscoveryMichael S. Thompson, Scott F. Midkiff. 273-279 [doi]
- Integrating Web Services and Mobile Agent SystemsPaolo Bellavista, Antonio Corradi, Stefano Monti. 283-290 [doi]
- Generating Mobile Agent Securely by Using MASLTarig Mohamed Ahmed. 291-296 [doi]
- Mobile Proxies for Proactive Buffering in Wireless Internet Multimedia StreamingPaolo Bellavista, Antonio Corradi, Carlo Giannelli. 297-304 [doi]
- Probability Based Power Aware Error Resilient CodingMinyoung Kim, Hyunok Oh, Nikil D. Dutt, Alexandru Nicolau, Nalini Venkatasubramanian. 307-313 [doi]
- Using a Fairness Monitoring Service to Improve Load-Balancing in DSRHugo Miranda, Luís Rodrigues. 314-320 [doi]
- The Last Hop of Global Notification Delivery to Mobile Users: Accommodating Volume Limits and Device ConstraintsDmitrii Zagorodnov, Dag Johansen. 321-328 [doi]
- Performance Comparison of Distributed Architectures for Content Adaptation and Delivery of Web ResourcesClaudia Canali, Valeria Cardellini, Michele Colajanni, Riccardo Lancellotti. 331-337 [doi]
- A User-Driven Adaptation Strategy for Mobile Video Streaming ApplicationsDomenico Cotroneo, Generoso Paolillo, C. Pirro, Stefano Russo. 338-344 [doi]
- Framework and Rule-Based Language for Facilitating Context-Aware Computing Using Information AppliancesKouji Nishigaki, Keiichi Yasumoto, Naoki Shibata, Minoru Ito, Teruo Higashino. 345-351 [doi]
- An Adaptive Middleware to Support Context-Aware Knowledge SharingRoberto Boselli, Federico Cabitza, Flavio De Paoli, Marco Loregian. 352-358 [doi]
- Analysis and Algorithms for Content-Based Event MatchingSatyen Kale, Elad Hazan, Fengyun Cao, Jaswinder Pal Singh. 363-369 [doi]
- MEDYM: Match-Early and Dynamic Multicast for Content-Based Publish-Subscribe Service NetworksFengyun Cao, Jaswinder Pal Singh. 370-376 [doi]
- On Introducing Location Awareness in Publish-Subscribe MiddlewareGianpaolo Cugola, Jose Enrique Munoz de Cote. 377-382 [doi]
- Policy-Controlled Event Management for Distributed Intrusion DetectionChristian Kreibich, Robin Sommer. 385-391 [doi]
- Integrating Databases with Publish/SubscribeLuis Vargas, Jean Bacon, Ken Moody. 392-397 [doi]
- Integrating Distributed Object Transactions with Wide-Area Content-Based Publish/Subscribe SystemsAnton Michlmayr, Pascal Fenkam. 398-403 [doi]
- CHR: A Distributed Hash Table for Wireless Ad Hoc NetworksFilipe Araújo, Luís Rodrigues, Jörg Kaiser, Changling Liu, Carlos Mitidieri. 407-413 [doi]
- Publish-Subscribe Tree Maintenance over a DHTPaolo Costa, Davide Frey. 414-420 [doi]
- Publisher Mobility in Distributed Publish/Subscribe SystemsVinod Muthusamy, Milenko Petrovic, Dapeng Gao, Hans-Arno Jacobsen. 421-427 [doi]
- A Stateful and Open Publish-Subscribe Structure for Online MarketplalcesIngar Mæhlum Arntzen, Dag Johansen. 431-437 [doi]
- Low Latency Optimisation of Content Based Publish Subscribe for Real-Time Mobile Gaming ApplicationsDuncan McCaffery, Joe Finney. 438-443 [doi]
- A Distributed Alerting Service for Open Digital Library SoftwareAnnika Hinze, George Buchanan. 444-450 [doi]
- On the Benefits of Non-Canonical Filtering in Publish/Subscribe SystemsSven Bittner, Annika Hinze. 451-457 [doi]
- Using Fine-Grained Infrared Positioning to Support the Surface-Based Activities of Mobile UsersAlbert Krohn, Michael Beigl, Mike Hazas, Hans-Werner Gellersen. 463-468 [doi]
- A Self Configurable Topology-Aware Network for Smart MaterialsTadashi Yanagihara, Hiroshi Sakakibara, Ryo Ohsawa, Masao Ideuchi, Naohiko Kohtake, Masayuki Iwai, Kazunori Takashio, Hideyuki Tokuda. 469-474 [doi]
- An Information Retrieval System for Supporting Casual Conversation in Wearable Computing EnvironmentsNga Viet Pham, Tsutomu Terada, Masahiko Tsukamoto, Shojiro Nishio. 477-483 [doi]
- IASO - An Activity-Based Computing Platform for Wearable ComputingJakob E. Bardram, Jonathan Bunde-Pedersen. 484-490 [doi]
- Thera-Network: A Wearable Computing Network to Motivate Exercise in Patients Undergoing Physical TherapyJanna C. Kimel. 491-495 [doi]
- DistScroll - A New One-Handed Interaction DeviceMatthias Kranz, Paul Holleis, Albrecht Schmidt. 499-505 [doi]
- Visual Code Widgets for Marker-Based InteractionMichael Rohs. 506-513 [doi]
- DiamondHelp: A Collaborative Interface Framework for Networked Home AppliancesCharles Rich, Candy L. Sidner, Neal Lesh, Andrew Garland, Shane Booth, Markus Chimani. 514-519 [doi]
- The BluePost - A Smart Car Heating SystemLasse Kaila, Lauri Lehti, Tero Hakkinen, Pasi Myllymaki, Ville Makinen, Jukka Vanhala. 523-528 [doi]
- Implementation and Evaluation of the Personal Wellness CoachRamy Asselin, Guillermo Ortiz, Jonathan Pui, Asim Smailagic, Christian Kissling. 529-535 [doi]
- Adding Context Information to Digital PhotosPaul Holleis, Matthias Kranz, Marion Gall, Albrecht Schmidt. 536-542 [doi]
- Mobility in Ad Hoc Wireless Networks: A Villain or a Friend?Jie Wu. 547 [doi]
- Angular Routing Protocol for Mobile Ad Hoc NetworksVenkata C. Giruka, Mukesh Singhal. 551-557 [doi]
- Hybrid Uplink Scheduling in an Integrated 3G/WLAN Network with RelayingJu Wang, Jonathan Liu. 558-563 [doi]
- Self-Stabilizing Optimal Local Routing in Ad Hoc NetworksDoina Bein, Ajoy Kumar Datta, Vincent Villain. 564-570 [doi]
- Consistency of Cooperative Caching in Mobile Peer-to-Peer Systems over MANETJiannong Cao, Yang Zhang, Li Xie, Guohong Cao. 573-579 [doi]
- A Formal Framework for Agent Itinerary Specification, Security Reasoning and Logic AnalysisShiyong Lu, Cheng-Zhong Xu. 580-586 [doi]
- Communication Partner Identification in Distributed Job Workflow Execution over the GridYuhong Feng, Wentong Cai, Jiannong Cao. 587-593 [doi]
- A Framework for Reconfiguring Mobile ApplicationsHasina Abdu. 594-600 [doi]
- Stable, Time-Bund Object References in Context of Dynamically Changing EnvironmentsRüdiger Kapitza, Hans P. Reiser, Franz J. Hauck. 603-609 [doi]
- A Key Establishment Protocol for Bluetooth ScatternetsHuaizhi Li, Mukesh Singhal. 610-616 [doi]
- A Middleware Architecture for Mobile 3D GraphicsEmmanuel Agu, Kutty Banerjee, Shirish Nilekar, Oleg Rekutin, Diane Kramer. 617-623 [doi]
- A Fair QoS Multicast Routing Scheme for IP/DWDM Optical InternetXingwei Wang, Cong Liu, Jianye Cui, Min Huang, Sajal K. Das. 624-629 [doi]
- Wireless LAN Positioning with Mobile Devices in a Library EnvironmentWilliam Hak-Lim Wong, Joseph Kee-Yin Ng, Wilson M. Yeung. 633-636 [doi]
- Increasing Mobile Transaction Concurrency in Dynamically Configurable EnvironmentsAngelo Brayner, José de Aguiar Moraes Filho. 637-641 [doi]
- Cluster-Based Intelligent Searching in Unstructured Peer-to-Peer NetworksXiuqi Li, Jie Wu. 642-645 [doi]
- Anonymizing Geographic Ad Hoc Routing for Preserving Location PrivacyZhou Zhi, Yow Kin Choong. 646-651 [doi]
- Context Adaptation of the Communication StackJosé Mocito, Liliana Rosa, Nuno Almeida, Hugo Miranda, Luís Rodrigues, Antónia Lopes. 652-655 [doi]
- Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous NetworksFang Qi, Weijia Jia, Jie Wu. 656-659 [doi]
- A Path-History-Sensitive Access Control Model for Mobile Agent EnvironmentChun Cao, Jian Lu. 660-663 [doi]
- Secure Enhancement Scheme for Routing Protocol in Mobile Ad Hoc NetworksRuijun Yang, Qunhua Pan, Weinong Wang, Minglu Li. 664-667 [doi]
- A Discrimination System for Identification of Cultivated Products by Trace Elements Analysis - Using Broccoli as an ExampleNobuyoshi Sato, Minoru Uehara, Jin Tamaoka, Koichiro Shimomura, Hirobumi Yamamoto, Ken ichi Kamijo. 673-679 [doi]
- An Intelligent Semantic Agent for Supervising Chat Rooms in e-Learning SystemYing-Hong Wang, Wen-Nan Wang, Chu-Chi Huang. 680-685 [doi]
- Implementation of WWW Conference System for Supporting Remote Mental Health Care EducationKaoru Sugita, Noriki Uchida, Akihiro Miyakawa, Giuseppe De Marco, Leonard Barolli. 686-692 [doi]
- Measurement-Based Peer-to-Peer Grouping for Networked Virtual EnvironmentHajime Sogawa, Niwat Thepvilojanapong, Hiroki Saito, Kaoru Sezaki, Yoshito Tobe. 693-697 [doi]
- A Hybrid Scheduling Algorithm with Low Complexity: Jumping Virtual Clock Round RobinLain-Chyr Hwang, Steen J. Hsu, San-Yuan Wang, Yong-Hua Huang. 698-703 [doi]
- Cross-Media Translation between Human Motions and Texts Based on Mental Image Directed Semantic TheoryMikio Amano, Daisuke Hironaka, Seio Oda, Valbona Barolli, Genci Capi, Masao Yokota. 707-713 [doi]
- Parallel Bindings in Distributed Multimedia SystemsMichael Repplinger, Florian Winter, Marco Lohse, Philipp Slusallek. 714-720 [doi]
- High Immersive System Aiming at the Collaboration Working over the Japan Gigabit Network II (JGNII)Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata. 721-726 [doi]
- A Novel Cache Scheme for Cluster-Based Streaming Proxy ServerSong Wu, Hai Jin, Jie Chu, Kaiqin Fan. 727-733 [doi]
- Striping Communication Protocol for Reliable Multimedia Communication in a Hierarchical GroupYasutaka Nishimura, Tomoya Enokido, Makoto Takizawa. 734-740 [doi]
- A New MAC Protocol for Robot Communication and Its Performance EvaluationJunpei Arai, Akio Koyama, Leonard Barolli. 743-748 [doi]
- Optimized Geographical Routing Protocol for Inter-Vehicle CommunicationsMimoza Durresi, Arjan Durresi, Leonard Barolli. 749-755 [doi]
- Concurrency Control Using Role Ordering (RO) Scheduler for Distributed ObjectsTomoya Enokido, Makoto Takizawa. 756-762 [doi]
- A Two-Level ECN Marking for Fair Bandwidth Allocation between HSTCP and TCP RenoFumiaki Hirose, Masahiko Fukuhara, Tomoya Hatano, Hiroshi Shigeno, Ken-ichi Okada. 763-769 [doi]
- Control Theory Optimization of MECN in Satellite NetworksArjan Durresi, Mukundan Sridharan, Sriram Chellappan, Raj Jain, Hitai Ozbai, Leonard Barolli. 770-776 [doi]
- The Power of P2P beyond File SharingXiaodong Zhang. 781 [doi]
- JMobiPeer: A Middleware for Mobile Peer-to-Peer Computing in MANETsMario Bisignano, Giuseppe Di Modica, Orazio Tomarchio. 785-791 [doi]
- Supporting Mobile Clients in Publish/Subscribe SystemsJinling Wang, Jiannong Cao, Jing Li. 792-798 [doi]
- Mobility Churn in DHTsHung-Chang Hsiao, Chung-Ta King. 799-805 [doi]
- PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting ProximityFeng Hong, Minglu Li, Jiadi Yu, Yi Wang. 806-811 [doi]
- TruGrid: A Self-Sustaining Trustworthy GridYanmin Zhu, Jinsong Han, Yunhao Liu, Lionel M. Ni, Chunming Hu, Jinpeng Huai. 815-821 [doi]
- QoS Oriented Dynamic Replica Cost Model for P2P ComputingFeng Mao, Hai Jin, Deqing Zou, Baoli Chen, Li Qi. 822-828 [doi]
- Provide Privacy for Mobile P2P SystemsJinsong Han, Yanmin Zhu, Yunhao Liu, Jianfeng Cai, Lei Hu. 829-834 [doi]
- Access Control in Peer-to-Peer Collaborative SystemsYu Zhang, Xianxian Li, Jinpeng Huai, Yunhao Liu. 835-840 [doi]
- NaproxI: A Hash Based Collaborative Proxy System for Content AdaptationRavindra Sudhindra, Cheng-Zhong Xu, Sithanshu Shashidhara, Xiaobo Zhou. 843-849 [doi]
- Performance Issues of P2P File Sharing over Asymmetric and Wireless NetworksYao-Nan Lien. 850-855 [doi]
- ImDeploy: A Tool for Global-Scale Service Deployment on Peer-to-Peer NetworksChongnan Gao, Jing Sun, Jinfeng Hu, Ning Ning, Weimin Zheng. 856-860 [doi]
- On the Performance of Bluetooth Scatternets with Finite BuffersJelena V. Misic, Vojislav B. Misic, Gonapati Rajashekar Reddy. 865-870 [doi]
- Directional NAV Indicators and Orthogonal Routing for Smart Antenna Based Ad Hoc NetworksMasanori Sekido, Masanori Takata, Masaki Bandai, Takashi Watanabe. 871-877 [doi]
- A Practical Adaptive Packet Scheduling Algorithm with Single User Fairness Guarantee over the Forward Link of 3G Cellular Data ServicesYang Liu, Yu-Kwong Kwok, Jiangzhou Wang. 878-882 [doi]
- Geographical Cluster Based Routing in Sensing-Covered NetworksHannes Frey, Daniel Görgen. 885-891 [doi]
- SHARP: A New Approach to Relative Localization in Wireless Sensor NetworksAhmed A. Ahmed, Hongchi Shi, Yi Shang. 892-898 [doi]
- An Extended Directional MAC for Location Information Staleness in Ad Hoc NetworksMasanori Takata, Masaki Bandai, Takashi Watanabe. 899-905 [doi]
- Self-Stabilization in Self-Organized Multihop Wireless NetworksNathalie Mitton, Eric Fleury, Isabelle Guérin Lassous, Sébastien Tixeuil. 909-915 [doi]
- The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc NetworksStefaan Seys, Bart Preneel. 916-922 [doi]
- On Optimal TTL Sequence-Based Route Discovery in MANETsDimitrios Koutsonikolas, Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu. 923-929 [doi]
- Recognition in a Low-Power EnvironmentJonathan Hammell, André Weimerskirch, Joao Girão, Dirk Westhoff. 933-938 [doi]
- iMobif: An Informed Mobility Framework for Energy Optimization in Wireless Ad Hoc NetworksChiping Tang, Philip K. McKinley. 939-945 [doi]
- On Reducing Broadcast Expenses in Ad Hoc Route DiscoveryHao Zhang, Zhong-Ping Jiang. 946-952 [doi]