Abstract is missing.
- Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource InformationHiroshi Yamada, Akira Kawaguchi. 3-14 [doi]
- Advertising Via Mobile Terminals - Delivering Context Sensitive and Personalized Advertising While Guaranteeing PrivacyRebecca Bulander, Michael Decker, Gunther Schiefer, Bernhard Kölmel. 15-25 [doi]
- On Digital Cash-Like Payment SystemsDaniel A. Nagy. 26-38 [doi]
- In-Depth Analysis of Selected Topics Related to the Quality Assessment of E-Commerce SystemsAntonia Stefani, Dimitris Stavrinoudis, Michalis Xenos. 39-48 [doi]
- A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip TimeWilfred W. K. Lin, Allan K. Y. Wong, Richard S. L. Wu, Tharam S. Dillon. 49-61 [doi]
- Strategies for Service Composition in P2P NetworksJan Gerke, Peter Reichl, Burkhard Stiller. 62-77 [doi]
- End to End Adaptation for the Web: Matching Content to Client ConnectionsKristoffer Getchell, Martin Bateman, Colin Allison, Alan Miller. 78-90 [doi]
- Voice Biometrics Within the Family: Trust, Privacy and PersonalisationDelphine Charlet, Victor Peral Lecha. 93-100 [doi]
- Secret Locking: Exploring New Approaches to Biometric Key EncapsulationSeny Kamara, Breno de Medeiros, Susanne Wetzel. 101-112 [doi]
- Adaptive Real-Time Network Monitoring System: Detecting Anomalous Activity with Evolving Connectionist SystemMuhammad Fermi Pasha, Rahmat Budiarto, Mohammad Syukur, Masashi Yamada. 113-125 [doi]
- Host Identity Protocol ProxyPatrik Salmela, Jan Melén. 126-138 [doi]
- Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking EnvironmentSolange Ghernaouti-Helie, Mohamed Ali Sfaxi. 139-149 [doi]
- Optimal Trade-Off for Merkle Tree TraversalPiotr Berman, Marek Karpinski, Yakov Nekrich. 150-162 [doi]
- Supporting the Cybercrime Investigation Process: Effective Discrimination of Source Code Authors Based on Byte-Level InformationGeorgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis. 163-173 [doi]
- Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels - Achieving High Performance in Fully Loaded SystemsJoão Carlos Silva 0001, Nuno Souto, Francisco Cercas, Rui Dinis. 177-186 [doi]
- Flooding Attack on the Binding Cache in Mobile IPv6Christian Veigner, Chunming Rong. 187-200 [doi]
- Performance of VoIP over IEEE 802.11G DSSS-OFDM Mode with IEEE 802.11E QOS SupportGráinne Hanley, Seán Murphy, Liam Murphy. 201-214 [doi]
- The Robustness of Blocking Probability in a Loss System with Repeated CustomersAkira Takahashi, Yoshitaka Takahashi, Shigeru Kaneda, Yoshikazu Akinaga, Noriteru Shinagawa. 215-225 [doi]
- On the Evaluation of a Secure Solution to Access 802.11 NetworksFernando da Costa Jr., Luciano Paschoal Gaspary, Jorge L. V. Barbosa, Gerson G. H. Cavalheiro, Luciano Pfitscher, José Dirceu G. Ramos. 226-235 [doi]
- Searching for Resources in MANETs - A Cluster Based Flooding ApproachRodolfo Oliveira, Luís Bernardo, Paulo Pinto. 236-245 [doi]
- A Comparative Study of IEEE 802.11 MAC Access Mechanisms for Different Traffic TypesMohammad Saraireh, Reza Saatchi, Samir Al-Khayatt, Rebecca Strachan. 246-256 [doi]
- An Automatic Blind Modulation Recognition Algorithm for M-PSK Signals Based on MSE CriterionM. Vastram Naik, A. Mahanta, R. Bhattacharjee, H. B. Nemade. 257-266 [doi]
- Properties of Dominant Color Temperature DescriptorKarol Wnukowicz, Wladyslaw Skarbek. 269-278 [doi]
- Test Environment for Performance Evaluation of an Internet RadioDavid Melendi, Manuel Vilas, Xabiel G. Pañeda, Roberto García 0002, Víctor G. García. 279-292 [doi]