Abstract is missing.
- Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacksP. Jongsuebsuk, Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo. 1-5 [doi]
- Multi-photon implementation of three-stage quantum cryptography protocolSayonnha Mandal, Gregory Macdonald, Mayssaa El Rifai, Nikhil Punekar, Farnaz Zamani, Yuhua Chen, Subhash Kak, Pramode K. Verma, Robert C. Huck, James J. Sluss Jr.. 6-11 [doi]
- A study on stream assignment method for secure MIMO communicationSatoru Shimosaka, Kenta Umebayashi, Yasuo Suzuki. 12-17 [doi]
- An enhanced measurement transmission scheme for privacy protection in smart gridShi Li, Kyung Choi, Kijoon Chae. 18-23 [doi]
- A holistic immune system against active P2P wormsEng Keong Lua, Ruichuan Chen. 24-29 [doi]
- Detecting protected links to keep reachability to server against failuresKoji Imagawa, Hiroyoshi Miwa. 30-35 [doi]
- QRMSC: Efficient QoS-aware relay node placement in wireless sensor networks using Minimum Steiner tree on the Convex hullSookyoung Lee, Meejeong Lee. 36-41 [doi]
- Movement path estimation for multiple humans in a room using binary infrared sensorsYuki Kasama, Toshiaki Miyazaki. 42-47 [doi]
- Latency aware Broadcast Scheduling in Duty Cycled wireless sensor networksDuc Tai Le, Thang Le Duc, Vyacheslav V. Zalyubovskiy, Hyunseung Choo. 48-53 [doi]
- Information discovery in multidimensional wireless sensor networksMenik Tissera, Robin Doss, Gang Li, Lynn Margaret Batten. 54-59 [doi]
- Game theory for misbehaving detection in wireless sensor networksImeddine Ben Abid, Noureddine Boudriga. 60-65 [doi]
- Improved DOA estimation of correlated signals in correlated antenna noises environmentIll-Keun Rhee, Hee-Soo Kim. 66-70 [doi]
- - architectureMenghan Li, Xiaoping Zhang, Yupeng Tian, Haixiang Zhang. 71-76 [doi]
- A trust-based routing strategy in structured P2P overlay networksYang Han, Kei'ichi Koyanagi, Takeshi Tsuchiya, Tadashi Miyosawa, Hiroo Hirose. 77-82 [doi]
- Energy-efficient flow control and routing for clustered wireless sensor networksSoo-Hoon Moon, Seung-Jae Han, Sunju Park. 83-88 [doi]
- Multi-metric geo-routing protocol for tactical ad hoc networksHyochun Ahn, Youn Seo, Jaebeom Kim, Young-Bae Ko, Cheolhyo Lee, Chang-Joo Kim. 89-94 [doi]
- Implementation and validation of an address resolution mechanism using adaptive routingSebastian Schellenberg, Peggy Begerow, Markus Hager, Jochen Seitz, Thomas Finke, Juergen Schroeder. 95-100 [doi]
- Stable multicast trees based on Ant Colony optimization for vehicular Ad Hoc networksAlisson B. Souza, Joaquim Celestino Júnior, Felipe A. Xavier, Francisco D. Oliveira, Ahmed Patel, Maryam Latifi. 101-106 [doi]
- Distributed mobility management in proxy mobile IPv6 using hash functionJi In Kim, Seok Joo Koh. 107-112 [doi]
- Real-time traffic control for multihomed devicesTapio Frantti, Mikko Majanen. 113-118 [doi]
- Mobile content distribution and selective traffic offload in the 3GPP evolved packet system (EPS)Nicholas Katanekwa, Neco Ventura. 119-124 [doi]
- PMIPv6-based make-before-break handover for real-time services in 3GPPs Evolved Packet CoreCharna John, Sibonelo Madlopha, Neco Ventura. 125-130 [doi]
- Service engagement model for mobile advertising based on user behaviorArto Kaasinen, Yong-Ik Yoon. 131-134 [doi]
- Implementation of open Two-Factor Authentication service applied to Virtual Private NetworkPham Ngoc Thanh, Keecheon Kim. 135-140 [doi]
- End-to-end performance analysis based on cross-layer retransmission scheme in wireless communication systemKwang-Chun Go, Jae-Ryong Cha, Seong Keun Oh, Jae-Hyun Kim. 141-144 [doi]
- End-to-end delay analysis method for tandem switches with variable bandwidth linksOsamu Takada, Kohta Ohshima, Matsuaki Terada. 145-150 [doi]
- Performance evaluation of synchronous distributed wireless network emulator for high-speed mobilityTomoaki Tsutsumi, Minoru Koizumi, Tomoichi Ebata, Kohta Ohshima, Matsuaki Terada. 151-156 [doi]
- FPGA implementation of human emotion reasoning engineKwang-Soon Choi, Young-choong Park, Byoung-Ha Park, Sung Hee Hong, KwangMo Jung. 157-162 [doi]
- Optimal network selection coordination in heterogeneous Cognitive Radio NetworksTuan LeAnh, Nguyen Van Mui, Cuong T. Do, Choong Seon Hong, Sungwon Lee, Jinpyo Hong. 163-168 [doi]
- Deterministic time pattern based channel selection in cognitive Radio networkVishram Mishra, Chiew Tong Lau, Syin Chen. 169-174 [doi]
- An evolution-inspired algorithm for efficient dynamic spectrum selectionCamila S. Barbosa, Vinicius C. M. Borges, Sand Correa, Kleber Vieira Cardoso. 175-180 [doi]
- An efficient blind turbo equalizer for compensating Doppler effectsDo-Hoon Kim, Heung-Gyoon Ryu. 181-185 [doi]
- An approach with two-stage mode to detect cache-based side channel attacksSi Yu, Xiaolin Gui, Jiancai Lin. 186-191 [doi]
- A green rate-and-power control transmission scheme in multi-carrier base stationsYao-Liang Chung. 192-197 [doi]
- Dual-radios hypermesh network based on CSMA protocolNuredin Ali Salem Ahmed, Adel Emhemmed, Khaled Elgaid. 198-203 [doi]
- An adaptive probe selection mechanism for k-link fault diagnosis on all-optical mesh networksChi-Shih Chao, Szu-Pei Lu. 204-209 [doi]
- Requirements of secure WSN-MCN edge routerTapio Frantti, Hannu Hietalahti, Reijo Savola. 210-215 [doi]
- A cooperative TDMA MAC protocol using dynamic slot assignment schemeJong Kwan Lee, Hong-Jun Noh, JaeSung Lim. 216-220 [doi]
- Border surveillance using sensor based thick-linesRamzi Bellazreg, Noureddine Boudriga, Sunshin An. 221-226 [doi]
- An enhanced approach for estimating writable working set by pre-copy and predictionTin Yu Wu, Wei-Tsong Lee, Jhih-Siang Huang, Chien-Yu Duan, Tain-Wen Suen. 227-231 [doi]
- A novel approach for developing interoperable services in cloud environmentBinh Minh Nguyen, Viet D. Tran, Ladislav Hluchý. 232-237 [doi]
- A solution of thin-thick client collaboration for data distribution and resource allocation in cloud computingPham Phuoc Hung, Bui Tuan-Anh, Eui-nam Huh. 238-243 [doi]
- Design and performance evaluation for Hadoop clusters on virtualized environmentMasakuni Ishii, Jungkyu Han, Hiroyuki Makino. 244-249 [doi]
- A study of secure data transmissions in mobile cloud computing from the energy consumption sideJin-A. Hong, Sangmin Seo, Namgi Kim, Byoung-Dai Lee. 250-255 [doi]
- A study on switching symbol timing detection method for continuous OFDM signalsKenko Ota, Kohei Miyasaka, Takaharu Nagahashi, Yoshio Nogami, Shunichi Tada, Hideaki Matsue. 256-261 [doi]
- Alternate time-switched multiplexed space-time block coding technique for single-carrier modulationHyeok Koo Jung. 262-267 [doi]
- A study on detection method of same spreading code signals by multimodulus algorithmGenichiro Murata, Kenta Umebayashi, Yasuo Suzuki. 268-273 [doi]
- Design of modified Sierpinski fractal based miniaturized patch antennaSika Shrestha, Seung Jo Han, Sun-Kuk Noh, Sunwoong Kim, Hyun-Bai Kim, Dong-You Choi. 274-279 [doi]
- Cooperation through secondary relaying in TDMA cellular networksYoung Ju Hwang, Seong-Lyun Kim. 280-285 [doi]
- A distributed quasi-orthogonal space time block code for cooperative communication with information exchange errors for decode-and-forward relay networksShu-Ming Tseng, Yueh-Teng Hsu, Shiou-Cheng Ren. 286-290 [doi]
- Inter-domain connection of reload-based peer-to-peer overlaysJoscha Schneider, Eckhart Korner, Lothar Grimm. 291-296 [doi]
- A fuzzy cache lifetime determination scheme for LISP mapping systemsSheng-Chang Chen, Chung-Ju Chang, Yu-Huang Chu. 297-302 [doi]
- Approach for service search and peer selection in P2P service overlaysAdriano Fiorese, Paulo Simões, Fernando Boavida. 303-308 [doi]
- Application of genetic algorithm for logistics based on multi-agent systemHo Kuen Song, Kwang-Myung Kim, Kyung Tae Kim, Hee Yang Youn. 309-314 [doi]
- Threat of DoS by interest flooding attack in content-centric networkingSeungoh Choi, Kwangsoo Kim, Seongmin Kim, Byeong-hee Roh. 315-319 [doi]
- Contents sharing using PPSP in DLNA-based networksHyunwoo Nam, Younghan Kim. 320-323 [doi]
- Hybrid spectrum sharing in dynamic spectrum access networksSabari Somasekharan Nair, Sebastian Schellenberg, Jochen Seitz, Mainak Chatterjee. 324-329 [doi]
- Alternating renewal framework for estimation in spectrum sensing policy and proactive spectrum handoffThant Zin Oo, Choong Seon Hong, Sungwon Lee. 330-335 [doi]
- Pre- and post- equalization technique combining for wireless communicationsSuriya Kanthalue, Pheeradej Nanan. 336-340 [doi]
- A threshold-based frequency offset estimation scheme for OFDM systemsYoungpo Lee, Jaewoo Lee, Youngseok Lee, Jeongyoon Shim, Seokho Yoon. 341-345 [doi]
- An adaptive channel number tuning mechanism on parallel transfer with UDTJongseon Park, Dosik An, Gihwan Cho. 346-350 [doi]
- QoS-aware hierarchical token bucket (QHTB) queuing disciplines for QoS-guaranteed Diffserv provisioning with optimized bandwidth utilization and priority-based preemptionChang-Hwan Lee, Young-Tak Kim. 351-358 [doi]
- PACS metric based on regression for evaluating end-to-end QoS capability over the Internet for telemedicineSanon Chimmanee. 359-364 [doi]
- Transformation based low complexity algorithm for Nash bargaining solutions in dynamic networksEunhye Choi, Hyunggon Park. 365-370 [doi]
- VoIP call admission control scheme considering VoIP on-off patternsJi-Young Jung, Dong-Yoon Seo, Jung-Ryun Lee. 371-374 [doi]
- Time synchronization protocol in ad hoc networkYun-Jae Shin, Jung-Ryun Lee. 375-378 [doi]
- Price-based tethering for cooperative networkingJisub Lee, Chenglong Shao, Heejun Roh, Wonjun Lee. 379-384 [doi]
- R-HWMP: Reservation-based HWMP supporting end-to-end QoS in Wireless Mesh NetworksWhoi Jin Jung, SeokHong Min, Bong Gyu Kim, Hyung Suk Choi, Jae-Yong Lee, Byung-Chul Kim. 385-390 [doi]
- Agent driven multi-constrained quality of service anycast routing in mobile ad hoc networksVijayashree Budyal, S. S. Manvi, S. G. Hiremath. 391-396 [doi]
- Dynamic TXOP allocation for multimedia QoS providing over wireless networksKwangsung Ju, Kwangsue Chung. 397-401 [doi]
- Priority-based contention period allocation for directional CSMA/CA in smart homeYongsun Kim, Hoyong Kang. 402-406 [doi]
- OSLMAC: One-step look-ahead MAC protocol for concurrent transmission over wireless ad hoc networksJiseon Lee, Hyeonmok Ko, Cheeha Kim. 407-411 [doi]
- Indoor localization improvement via adaptive RSS fingerprinting databaseChavalit Koweerawong, Komwut Wipusitwarakun, Kamol Kaemarungsi. 412-416 [doi]
- Improved AOMDV to increase path stability by utilizing the node mobility information in MANETRan Park, Wuwoan Kim, Sangdong Jang. 417-422 [doi]
- Weighted bandwidth sharing scheme to guarantee the video quality in home networksDooyeol Yoon, Sungchang Lee, Jinpyo Hong, Kwangsue Chung. 423-427 [doi]
- Transmission frame assignment for latency-bounded data delivery in wsnsEui Jik Kim, Jung-Hyok Kwon, Chul-Hee Kang, Sang-Hong Lee. 428-433 [doi]
- Performance evaluation of Cognitive Radio Network Predictive MAC (P-MAC) access algorithm and its enhancementHanan Hussein, Hussein A. Elsayed, Salwa El-Ramly. 434-439 [doi]
- An efficient iterative detection scheme for coded MIMO systemsSaleem Ahmed, Sooyoung Kim. 440-443 [doi]
- Self-evaluating reinforcement learning based spectrum management for cognitive Ad Hoc networksE. Eylem Ozekin, F. Cihan Demirci, Fatih Alagöz. 444-449 [doi]
- Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networksNaoya Maki, Takayuki Nishio, Ryoichi Shinkuma, Tatsuro Takahashi, Tatsuya Mori, Noriaki Kamiyama, Ryoichi Kawahara. 450-455 [doi]
- Proactive cache management method for content hash based distributed archive systemYutaka Yasuda, Shingo Ata, Ikuo Oka. 456-461 [doi]
- An intelligent approach for virtual machine and QoS provisioning in cloud computingAmit Kumar Das, Tamal Adhikary, Md. Abdur Razzaque, Choong Seon Hong. 462-467 [doi]
- Security issues in vehicular networksYeongkwun Kim, Injoo Kim. 468-472 [doi]
- Security tactics for secured cloud computing resourcesByungRae Cha, JongWon Kim 0001. 473-475 [doi]
- A Network Partition Scheme to protect secure zone for malicious codeJungeun Jee, Joopal Jang, Inhee Jo, Yongtae Shin. 476-480 [doi]
- iPanda: A comprehensive malware analysis toolPeidai Xie, Xicheng Lu, Jinshu Su, Yong-Jun Wang, Meijian Li. 481-486 [doi]
- Media adaptation model based on character object for cognitive TVSvetlana Kim, Yongik Yoon. 487-492 [doi]
- A new video search approach based on user's preference and query ambiguityWangxi Jia, Hai Jin, Xiaofei Liao. 493-498 [doi]
- Multi-supplier integration management for public protection and disaster relief (PPDR) organizationsJyri Rajamäki, Markus Vuorinen. 499-504 [doi]
- A comparative study on wireless backhaul solutions for beyond 4G networkXin Su, KyungHi Chang. 505-510 [doi]
- Novel bulletin board system based on document object model and client-side scripting for improved interactionJunguye Hong, Myoungbeom Chung, Hyunseung Choo. 511-516 [doi]
- Binary-tree-based high speed packet classification system on FPGAJingjiao Li, Yong Chen, Cholman Ho, Zhenlin Lu. 517-522 [doi]
- Ontology modeling for REST Open APIs and web service mash-up methodWan Jung, Sang-Il Kim, Hwa-sung Kim. 523-528 [doi]
- A new estimation method using RTT for available bandwidth of a bottleneck linkMasaharu Imai, Yoshio Sugizaki, Koichi Asatani. 529-534 [doi]
- Efficient control plane for passive optical burst switching networkAhmed Triki, Paulette Gavignet, Bernard Arzur, Esther Le Rouzic, Annie Gravey. 535-540 [doi]
- A novel approach for designing a feedback controller of linear time invariant networked control systems with delayed-transmission timeHatim G. Zaini. 541-546 [doi]
- Andsf-based congestion control procedure in heterogeneous networksYoung Min Kwon, Jun Suk Kim, Jaheon Gu, Min Young Chung. 547-550 [doi]
- Green dynamic configuration in two-tier LTE femtocell networksYao-Liang Chung. 551-555 [doi]
- Performance evaluation of DCSK system with chaotic mapsSuwa Kim, Junyeong Bok, Heung-Gyoon Ryu. 556-559 [doi]
- Mobile communications challenges to cross-border tracking operations carried out by law enforcement authoritiesJyri Rajamäki, Pasi Kamppi. 560-565 [doi]
- Ecsy-Recsy: Considering Sybil attack with time dynamics and economics in recommender systemGiseop Noh, Young-myoung Kang, Chong-kwon Kim. 566-571 [doi]
- An effect of variable distance on IP camera performance implemented on WLAN robotSanon Chimmanee. 572-577 [doi]
- HRP: A HMAC-based RFID mutual authentication protocol using PUFSeung Wook Jung, Souhwan Jung. 578-582 [doi]
- Analysis in the internet traffic pattern based on RTT over ADSL in ThailandSanon Chimmanee, Puttinun Patpituck. 583-588 [doi]
- Picture archiving and communication system (PACS) characteristic on wired-line and wireless network for traffic simulationSanon Chimmanee, Puttinun Patpituck. 589-594 [doi]
- A classification of network traffic status for various scale networksJaehwa Park, JunSeong Kim. 595-599 [doi]
- Recursive layering of Forwarding on Gates and Traffic Engineering Middleware for EthernetFlorian Liers, Markus Hager, Sebastian Schellenberg, Jochen Seitz. 600-605 [doi]
- Time slot-adding algorithm for improving bottleneck link throughput in IEEE 802.16j relay networksTomoya Kitayama, Go Hasegawa, Yoshiaki Taniguchi, Hirotaka Nakano. 606-611 [doi]
- Influence of multi-rate control function on the end-to-end latency of multi-hop wireless LANMichifumi Miyashita, Jun-ichi Takada. 612-617 [doi]
- Reliable anchor node based range-free localization algorithm in anisotropic wireless sensor networksHyunjae Woo, Chaewoo Lee, Seong Keun Oh. 618-622 [doi]
- IP-based access to sensor networks enabled by a transparent proxy serverMarkus Hager, Maik Debes, Sebastian Schellenberg, Jochen Seitz. 623-627 [doi]
- Redundant transmission in wireless networked control system over IEEE 802.15.4eBui Xuan Yen, Do Tronghop, Myungsik Yoo. 628-631 [doi]
- Range-free localization with isotropic distance scaling in wireless sensor networksHyunjae Woo, Sangwoo Lee, Chaewoo Lee. 632-636 [doi]
- Bandwidth-aware routing for TDMA-based mobile ad hoc networksXu Zhen, Wenzhong Yang. 637-642 [doi]
- Packet value based scheduling for wireless local area networksAruna Jayasuriya, Anselm Teh. 643-647 [doi]
- A scheduling algorithm for shared sensor and actuator networksClaudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Wei Li, Albert Y. Zomaya, José Neuman de Souza. 648-653 [doi]
- Signaling-based service quality adaptation in heterogeneous networksAnbin Kim, Chan Hong Park, Seong-Ho Jeong. 654-657 [doi]
- Flow based 3G/WLAN vertical handover scheme using MIH modelHyun-Dong Chu, Hyunjung Kim, Seung-Joon Seok. 658-663 [doi]
- Secure handoff method for seamless service provisioning in infrastructure mode 802.11i systemJaesung Park. 664-669 [doi]
- A binary analysis method for protocol deviation discovery from implementationsMeijian Li, Yong-Jun Wang, Peidai Xie. 670-675 [doi]
- Software optimization for embedded communication systemInhye Park, Hyungkeun Lee, Hyukjoon Lee. 676-679 [doi]
- Radio access considerations for data offloading with multipath TCP in cellular/WiFi networksMiguel Angel Patino Gonzalez, Takeshi Higashino, Minoru Okada. 680-685 [doi]
- Network traffic reduction through smart networkJaehoon Jeong, Hyeryung Jang, Yujin Kim, Yung Yi, Jeonghoon Mo. 686-689 [doi]
- Deterministic approach to rendezvous channel setup in cognitive radio networksHaile B. Weldu, Bosung Kim, Byeong-hee Roh. 690-695 [doi]
- Multi-client/Multi-server split architectureBharat S. Rawal, Lewis Berman, Harold Ramcharan. 696-701 [doi]
- An interworking architecture between Internet and contents oriented networksHaneul Ko, Younghyun Kim, Minsu Shin, Sangheon Pack. 702-707 [doi]
- Feasibility considerations of multipath TCP in dealing with big data applicationZia Ush-Shamszaman, Safina Showkat Ara, Ilyoung Chong. 708-713 [doi]
- Correlation analysis of MQTT loss and delay according to QoS levelShinho Lee, Hyeonwoo Kim, Dong-Kweon Hong, Hongtaek Ju. 714-717 [doi]