Abstract is missing.
- A Protocol for Making an Agreement in a Peer-to-Peer (P2P) SocietyAilixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 1-6 [doi]
- On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior AnalysisBin Chang, Liang Dai, Yi Cui, Yuan Xue. 7-11 [doi]
- A Measurement Study of Cache Rejection in P2P Live Streaming SystemYishuai Chen, Changjia Chen, Chunxi Li. 12-17 [doi]
- A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay NetworksAlireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa. 18-23 [doi]
- Role Based Access Control in Distributed Object SystemsTomoya Enokido, Makoto Takizawa. 24-29 [doi]
- Security Framework in a Virtual Large-Scale Disk SystemMinoru Uehara. 30-35 [doi]
- Pose Estimation for Evaluating Standing Long Jumps via Dynamic Bayesian NetworksHui-Huang Hsu, Yao-Bao Yen, Chu-Song Chen, Chun-Ta Ho. 36-41 [doi]
- Delivery Infrastructure for Secure Scalable Coded MultimediaMarkus Dunte, Christoph Ruland. 42-47 [doi]
- Adaptive Layered Multimedia Transmissions over Wireless NetworksArjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli. 48-53 [doi]
- Experimental Evaluation of Usage Pattern in Campus Mobile IP NetworkJaehyuk Ryu, Koji Okamura. 54-59 [doi]
- An Adaptive Bandwidth Request Scheme for QoS Support in WiMAX Polling ServicesCheng-Yueh Liu, Yaw-Chung Chen. 60-65 [doi]
- Routing Efficiency of AODV and DSR Protocols in Ad-Hoc Sensor NetworksTao Yang, Makoto Ikeda, Giuseppe De Marco, Leonard Barolli, Arjan Durresi, Fatos Xhafa. 66-71 [doi]
- Collaborative and Multimodal Communications System Using Immersive Virtual Reality Environment over Ultrahigh-Speed NetworkTomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata. 72-77 [doi]
- Open 3D Shared Space Construction Scheme for Symbiotic Collaborative WorksTakayuki Kuroda, Akira Sakatoku, Gen Kitagata, Debasish Chakraborty, Norio Shiratori. 78-83 [doi]
- Adam A Testbed for Distributed Virtual EnvironmentsJan Sablatnig, Jiehua Chen, Ruedi Seiler, Sven Grottke, Andreas Köpke, Adam Wolisz. 84-89 [doi]
- MultiStream A Cross-Platform Display Sharing System Using Multiple Video StreamsYong Liu, Otto J. Anshus, Phuong Hoai Ha, Tore Larsen, John Markus Bjørndalen. 90-95 [doi]
- Bipartite Graph Based Dynamic Spectrum Allocation for Wireless Mesh NetworksJianjun Yang, Zongming Fei. 96-101 [doi]
- Cross-Layer Scheduling for Multiple Video Streams over a Hierarchical Emergency-Deployed NetworkVirginia Corvino, Velio Tralli, Roberto Verdone. 102-107 [doi]
- Joint Routing and Channel Assignment in WMN Using Extended Petri NetHejiao Huang, Yun Peng, Jing Li. 108-113 [doi]
- Real-Time Routing in Wireless Sensor NetworksAdel Ali Ahmed, Liza Abdul Latiff, M. A. Sarijari, Norsheila Fisal. 114-119 [doi]
- Fast Link Assessment in Wireless Mesh Networks by Using Non-Constant Weight CodeRavi Nelavelli, Rajesh Prasad, Hongyi Wu. 120-125 [doi]
- On Load Regulated CSMAManzur Ashraf, Aruna Jayasuriya, Sylvie Perreau. 126-131 [doi]
- Maximizing Aggregate Throughput of Wireless Ad Hoc Networks Using Enhanced Physical Carrier SensingNyein Aye Maung Maung, Taku Noguchi, Makoto Kawai. 132-137 [doi]
- Flip Error Resistant Stitching in Sensor Network LocalizationsOh-Heum Kwon, Ha-Joo Song. 138-143 [doi]
- On Improving the Precision of Localization with Gross Error RemovalChongming Zhang, Xi Zhou, Chuanshan Gao, Chunmei Wang. 144-149 [doi]
- Comparing the Efficiency of Localization Algorithms with the Power-Error-Product (PEP)Frank Reichenbach, Jan Blumenthal, Dirk Timmermann. 150-155 [doi]
- Local Topology Assisted XOR Coding in Wireless Mesh NetworksRajesh Prasad, Hongyi Wu, Dmitri Perkins, Nian-Feng Tzeng. 156-161 [doi]
- Game Theoretic Packet Scheduling to Combat Non-Cooperativeness in Wireless Mesh NetworksZhen Kong, Yu-Kwong Kwok, Jiangzhou Wang. 162-167 [doi]
- A Middleware Services Simulation Platform for Wireless Sensor NetworksHock-Beng Lim, Bang Wang, Cheng Fu, Arpan Phull, Di Ma. 168-173 [doi]
- An Actor-Oriented Group Mobility Model for Wireless Ad Hoc Sensor NetworksEnkhbold Ochirsuren, Leandro Soares Indrusiak, Manfred Glesner. 174-179 [doi]
- Understanding the Tolerance of Dynamic Networks: A Routing-Oriented ApproachYifeng Shao, Jie Wu. 180-185 [doi]
- Reliable and Efficient Alarm Message Routing in VANETHao Jiang, Hao Guo, Li-jia Chen. 186-191 [doi]
- A Cooperative ARQ for Delay-Tolerant Vehicular NetworksJulián Morillo-Pozo, Óscar Trullols-Cruces, José M. Barceló, Jorge García-Vidal. 192-197 [doi]
- A Receiver-Based Opportunistic Forwarding Protocol for Mobile Sensor NetworksLian Li, Limin Sun, Jian Ma, Canfeng Chen. 198-203 [doi]
- Reality-Check for DTN Routing AlgorithmsArshad Islam, Marcel Waldvogel. 204-209 [doi]
- Bounded-Delay, Probability-Based Routing in Intermittently Connected Mobile Ad Hoc NetworksXianning Li, Xianwei Zhou. 210-215 [doi]
- Data Collection with Multiple Mobile Actors in Underwater Sensor NetworksJincheng Wang, Deshi Li, Mi Zhou, Dipak Ghosal. 216-221 [doi]
- Remaining Delivery Time Estimation Based Routing for Intermittently Connected Mobile NetworksFeng Liu, Ming Li, Run Zhang, He Zhang, Zhen Xu. 222-227 [doi]
- Online Estimation of Effective Delivery Capability in Delay-Tolerant Mobile Sensor NetworksZhipeng Yang, Ha Dang, Hongyi Wu. 228-233 [doi]
- A Grassroots Approach in P2P Reputation StudiesXiaoming Li. 234 [doi]
- H-Trust: A Robust and Lightweight Group Reputation System for Peer-to-Peer Desktop GridHuanyu Zhao, Xiaolin Li. 235-240 [doi]
- Modeling Attack Behaviors in Rating SystemsQinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei Dai. 241-248 [doi]
- On the Modeling of Honest Players in Reputation SystemsQing Zhang, Ting Yu. 249-254 [doi]
- Computing Reputation Metric in Multi-Agent E-Commerce Reputation SystemAnna Gutowska, Kevan Buckley. 255-260 [doi]
- Manetkit: A Framework for MANET Routing ProtocolsRajiv Ramdhany, Geoff Coulson. 261-266 [doi]
- The (k, l) Coredian Tree for Ad Hoc NetworksAmit Dvir, Michael Segal. 267-272 [doi]
- An Effective Algorithm for Computing Energy-Efficient Broadcasting Trees in All-Wireless NetworksDoina Bein, Si-Qing Zheng. 273-278 [doi]
- Fast-Converging Distance Vector Routing for Wireless Mesh NetworksYangcheng Huang, Saleem N. Bhatti. 279-284 [doi]
- Priority-Based Coverage-Aware Congestion Control for Multihop Wireless Sensor NetworksXiaoling Qiu, Dipak Ghosal, Biswanath Mukherjee, Jennifer Yick, Deshi Li. 285-290 [doi]
- Mobility Control for Complete Coverage in Wireless Sensor NetworksZhen Jiang, Jie Wu, Robert Kline, Jennifer Krantz. 291-296 [doi]
- Maintaining Connected Coverage for Wireless Sensor NetworksJehn-Ruey Jiang, Tzu-Ming Sung. 297-302 [doi]
- An Enhanced Sensor Scheduling Protocol for Wireless Sensor NetworksCheng Fu, Bang Wang, Hock-Beng Lim. 303-308 [doi]
- A Distributed Intrusion Detection Scheme for Wireless Sensor NetworksGuorui Li, Jingsha He, Yingfang Fu. 309-314 [doi]
- Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor NetworksYang Xiao, Hui Chen, Yanping Zhang, Xiaojiang Du, Bo Sun, Kui Wu. 315-320 [doi]
- Design and Implementation of a WSN-Based Intelligent Light Control SystemMeng-Shiuan Pan, Lun-Wu Yeh, Yen-Ann Chen, Yu-Hsuan Lin, Yu-Chee Tseng. 321-326 [doi]
- SCALAR: Scalable Data Lookup and Replication Framework for Mobile Ad-hoc NetworksEmre Atsan, Öznur Özkasap. 327-332 [doi]
- Measuring the Node Energy Consumption in USB Based WSN TestbedsAndreas Köpke, Adam Wolisz. 333-338 [doi]
- Performance of Incomplete Channel Sensing for Frequency Hopping Cognitive Personal Area NetworksVojislav B. Misic, Jelena V. Misic. 339-344 [doi]
- Impact of Selfish Rate Adaptation on the Performance in IEEE 802.11-Based Wireless Multi-Hop NetworksPei Li, Yinlong Xu, Chunpeng Zhang. 345-350 [doi]
- Cyber Security: An Obtainable Goal?David H. C. Du. 351 [doi]
- Compromised Sensor Nodes Detection: A Quantitative ApproachTao Li, Min Song, Mansoor Alam. 352-357 [doi]
- Anonymous Misbehavior Detection in Mobile Ad Hoc NetworksBo Zhu, Kui Ren, Lingyu Wang. 358-363 [doi]
- A Novel CDS-Based Reputation Monitoring System for Wireless Sensor NetworksAvinash Srinivasan, Feng Li, Jie Wu. 364-369 [doi]
- ARM: An Account-Based Hierarchical Reputation Management System for Wireless Ad Hoc NetworksHaiying Shen, Ze Li. 370-375 [doi]
- LEAP++: A Robust Key Establishment Scheme for Wireless Sensor NetworksChae Hoon Lim. 376-381 [doi]
- Pairing Devices with Good Quality Output InterfacesNitesh Saxena, Jonathan Voris. 382-387 [doi]
- Optimized User Revocation for Group Signature Based Privacy-Aware PKIWei Ren, Kui Ren, Wenjing Lou. 388-393 [doi]
- Quality-of-Protection (QoP): A Quantitative Methodology to Grade Security ServicesYan Sun, Anup Kumar. 394-399 [doi]
- n-LDA: n-Layers Data Aggregation in Sensor NetworksIoana Rodhe, Christian Rohner. 400-405 [doi]
- Notes on the CRTDH Group Key Agreement ProtocolSpyros S. Magliveras, Wandi Wei, Xukai Zou. 406-411 [doi]
- Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor NetworksJianbo Yao, Guangjun Wen. 412-416 [doi]
- Higher Confidence in Event Correlation Using Uncertainty RestrictionsGerald G. Koch, Boris Koldehofe, Kurt Rothermel. 417-422 [doi]
- Flexible Concurrency Control for Real-Time Collaborative EditorsAbdessamad Imine. 423-428 [doi]
- A Dynamic Hashing Approach to Supporting Load Balance in P2P SystemsYe-In Chang, Hue-Ling Chen, Sih-Ning Li, Hung-Ze Liu. 429-434 [doi]
- ROCC: A Communication Overlay Abstraction for Wireless UsersSeth Holloway, Christine Julien. 435-440 [doi]
- Towards a Group-Based RBAC Model and Decentralized User-Role AdministrationQi Li, Mingwei Xu, Xinwen Zhang. 441-446 [doi]
- Scalable AOI-Cast for Peer-to-Peer Networked Virtual EnvironmentsJehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu. 447-452 [doi]
- A Formalism for Recongurability Analysis in Distributed Non-Blocking ComponentsMahdi Niamanesh, Rasool Jalili. 453-458 [doi]
- Caching Invalidation Strategies for Supporting Weak Location Dependent QueriesYilin Wang, Edward Chan, Wenzhong Li, Sanglu Lu. 459-464 [doi]
- Heuristic Relay Node Selection Algorithm for One-Hop Overlay RoutingYin Chen, Li Tang, Jun Li. 465-470 [doi]
- Probabilistic Routing with Multi-Copies in Delay Tolerant NetworksZe Li, Haiying Shen. 471-476 [doi]
- RETROFIT: Reliable Exchanges through Resilient Overlays for Internet TeleoperationInvited Talk Lakshamanan, Raj Rajkumar. 477-482 [doi]
- Real-Time Data Services for Cyber Physical SystemsKyoung-Don Kang, Sang Hyuk Son. 483-488 [doi]
- A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical SystemsZhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu. 489-494 [doi]
- Secure Control: Towards Survivable Cyber-Physical SystemsAlvaro A. Cárdenas, Saurabh Amin, Shankar Sastry. 495-500 [doi]
- A Relaxation Approach to Dynamic Sensor Selection in Large-Scale Wireless NetworksJames E. Weimer, Bruno Sinopoli, Bruce H. Krogh. 501-506 [doi]
- Towards Cyber-Physical Holodeck Systems Via Physically Rendered Environments (PRE s)Veljko Krunic, Richard Han. 507-512 [doi]
- Module-Based Modeling of Cyber-Physical Power SystemsLe Xie, Marija D. Ilic. 513-518 [doi]
- Security Property Violation in CPS through TimingHan Tang, Bruce M. McMillin. 519-524 [doi]
- Design and Development Methodology for Resilient Cyber-Physical SystemsHonguk Woo, Jianliang Yi, James C. Browne, Aloysius K. Mok, Ella Atkins, Fei Xie. 525-528 [doi]
- Cyber-Physical Medical and Medication SystemsAlbert M. K. Cheng. 529-532 [doi]
- Coverage Based Testing for Concurrent SoftwareJuichi Takahashi, Hideharu Kojima, Zengo Furukawa. 533-538 [doi]
- Automated Addition of Fault-Tolerance to SCR Toolset: A Case StudyFuad Abujarad, Sandeep S. Kulkarni. 539-544 [doi]
- Improving Routing Reliability on Wireless Sensors Network with Emergency PathsBastien Mainaud, Mariem Zekri, Hossam Afifi. 545-550 [doi]
- On Robotics Applications in Service-Oriented ArchitectureYinong Chen, Xiaoying Bai. 551-556 [doi]
- Autonomous Decentralized VoD Architecture to Achieve Service AssuranceXiaodong Lu, Kinji Mori. 557-562 [doi]
- Autonomous Decentralized Community Construction Technology for High Quality Information ServiceKhalid Mahmood, Yuuya Kanamaru, Xiaodong Lu, Kinji Mori. 563-568 [doi]
- An Autonomous Clustering-Based Hierarchical Routing Using Decentralized Route Information Management Scheme for Mobile Ad Hoc NetworksRyotaro Oda, Tomoyuki Ohta, Yoshiaki Kakuda. 569-574 [doi]
- Route-Split Routing with Resiliency to Simultaneous Failure for Mobile Ad Hoc NetworksTsuyoshi Mizumoto, Tomoyuki Ohta, Yoshiaki Kakuda. 575-580 [doi]
- A Novel Railway Signal Control System Based on the Internet Technology and an Assurance TechnologyTakashi Kunifuji, Tadao Miura, Gen Kogure, Hiroyuki Sugahara, Masayuki Matsumoto. 581-586 [doi]
- A New Scheduling Algorithm for Distributed Streaming Media System Based on MulticastYunpeng Chai, Zhihui Du, Sanli Li. 587-592 [doi]
- A File Fetching Method to Reduce the Redundant Traffic on BitTorrent-Like P2P NetworksJunichi Funasaka, Akihiko Ishidu, Kenji Ishida. 593-598 [doi]
- Virtual Workspace Based Job Execution Methods and Dynamic Makespan Optimized Scheduling AlgorithmsZhili Cheng, Zhihui Du, Yinong Chen, Xiaoying Wang. 599-604 [doi]