Abstract is missing.
- A new method of verifying digital signatures in e-cheque processingN. R. Sunitha, B. B. Amberker. 1-5 [doi]
- Rewarding stability in peer-to-peer backup systemsLluis Pamies-Juarez, Pedro GarcÃa López, Marc Sánchez Artigas. 1-6 [doi]
- Towards a realistic context dissemination protocol using pure multi-level overlay networksDineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar. 1-7 [doi]
- FLMAP: A fast lightweight mutual authentication protocol for RFID systemsAlireza Sadighian, Rasool Jalili. 1-6 [doi]
- Estimation of communication overhead during Pair-wise key establishment in wireless sensor networksAbraham Jibi, K. S. Ramanatha. 1-6 [doi]
- Efficient user authentication and secure data transmission in wireless sensor networksManik Lal Das. 1-6 [doi]
- A hierarchical approach of integrating Mobile ad hoc Network and the internetKhaleel Ur Rahman Khan, Rafi U. Zaman, A. Venugopal Reddy, Kashifa Hafeez, Tabassum Sultana. 1-4 [doi]
- Improved agent based explicit path computation algorithm for MPLS-TESeema Ladhe, Satish Devane, Madhumita Chatterjee. 1-5 [doi]
- Tree-based key management scheme for heterogeneous sensor networksA. S. Poornima, B. B. Amberker. 1-6 [doi]
- A novel mobile WiMAX solution for higher throughputIftekhar Ahmad, Daryoush Habibi. 1-5 [doi]
- Dual radio based cooperative caching for wireless sensor networksT. P. Sharma, Ramesh Chandra Joshi, Manoj Misra. 1-7 [doi]
- Reliability analysis of Wireless Sensor NetworkNeetesh Purohit, Pritish Varadwaj, Sanjiv Tokekar. 1-6 [doi]
- Designing wireless sensor network with low cost and low powerS. S. Sonavane, V. Kumar, B. P. Patil. 1-5 [doi]
- Enhanced AODV routing protocol for Ad hoc networksKhushboo Agarwal, Lalit Kumar Awasthi. 1-5 [doi]
- Non-cryptographic methods of MAC spoof detection in wireless LANRicha Bansal, Siddharth Tiwari, Divya Bansal. 1-6 [doi]
- ICA based multiuser detection of DS-CDMA using differential entropy estimation in Rayleigh fading channelG. Thavasi Raja, Omkar Reddy. 1-4 [doi]
- A framework for transparent relocation in distributed filesystem using R-TCPChinmay P. Soman, Anant Mahajan. 1-6 [doi]
- High performance rearrangeable nonblocking networks with polarization selective elementsJiun-Shiou Deng, Ming-Feng Lu, Yang-Tung Huang. 1-5 [doi]
- Energy efficient processing of location based query in Wireless Sensor NetworksJyoti Singh, Renuka Agrawal. 1-4 [doi]
- Object oriented multi-layer router with application on wireless sensor-actuator networksDavid Villa, Felix Jesús Villanueva, Francisco Moya, G. Urzaiz, Fernando Rincón, Juan Carlos López. 1-7 [doi]
- A scheme for efficient topology management of wireless ad hoc networks using the MARI algorithmB. Nanancharaiah, Gnanou Florence Sudha, M. B. R. Murthy. 1-4 [doi]
- A distributed intrusion detection system for wireless ad hoc networksJaydip Sen, Arijit Ukil, Debasish Bera, Arpan Pal. 1-6 [doi]
- A matrix formulation for NTRU cryptosystemRakesh Nayak, C. V. Sastry, Jayaram Pradhan. 1-5 [doi]
- Analysis of TCP flow data for traffic anomaly and scan detectionN. Muraleedharan. 1-4 [doi]
- Behavioral modeling, simulation and synthesis of an output queuing Batcher-Banyan ATM switch with internal speedup networkSuresh S. Balpande, Sudhir B. Lande, Sourabh Rungta. 1-4 [doi]
- Performance of QoS-based coordination framework for wireless aware multimedia applicationsN. Kumar, R. Singh. 1-6 [doi]
- HiOPS overlay - efficient provision of multicast in peer-to-peer systemsHermann Schloss, Jean Botev, Alexander Höhfeld, Ingo Scholtes, Rainer Oechsle, Markus Esch. 1-6 [doi]
- Secured biometric templateAmar Kumar Mohapatra, Nupur Prakash, Sonali Aggarwal. 1-4 [doi]
- Delay bound multicast routing algorithm using evolutionary programmingSushma Jain, Jaydev Sharma. 1-4 [doi]
- Weighted soft decision for cooperative sensing in cognitive radio networksMohammad Iqbal Bin Shahid, Joarder Kamruzzaman. 1-6 [doi]
- Classification of MIMO channel modelsRashmi Verma, Shilpa Mahajan, Vishal Rohila. 1-4 [doi]
- A Hybrid Resource Information Dissemination Protocol for dynamic GridsRamakrishna Garudadri, Krishna Kant. 1-4 [doi]
- Improving QoS of audio and video packets in MPLS using network processorsB. Kaarthick, N. Nagarajan, S. Rajeev, R. Joanna Angeline. 1-5 [doi]
- A genetic algorithm based approach for traffic grooming, routing and wavelength assignment in optical WDM mesh networksTanmay De, Puneet Jain, Ajit Pal, Indranil Sengupta. 1-6 [doi]
- Optimized client side solution for cross site scriptingSiddharth Tiwari, Richa Bansal, Divya Bansal. 1-4 [doi]
- CPN model for a Hierarchical Fault Tolerance Protocol for Mobile Agent systemsHeman Pathak, Kumkum Garg, Nipur. 1-6 [doi]
- Multi-path BGP (MBGP): A solution for improving network bandwidth utilization and defense against link failures in inter-domain routingHiroshi Fujinoki. 1-6 [doi]
- Business offer driven dynamic Web service selectionDemian Antony D Mello, V. S. Ananthanarayana, Raghavendra Achar. 1-5 [doi]
- Performance evaluation of TCP-AFC in an emulated real networkN. J. Kothari, J. J. Patel, K. D. Patel, K. S. Dasgupta. 1-6 [doi]
- Chain based Conical Clustering (CCC) framework for data gathering in WSNsBhaskar P. Deosarkar, Narendra Singh Yadav, Rajendra Prasad Yadav. 1-6 [doi]
- The performance evaluation of cached Genetic Zone Routing Protocol for MANETsP. Sateesh Kumar, S. Ramachandram. 1-5 [doi]
- Optimizing iSCSI storage network: A direct data transfer scheme using connection migrationVeena Tyagi, Chanchal Gupta. 1-6 [doi]
- Analysis of Quality of Service (QoS) in WiMAX networksRohit A. Talwalkar, Mohammad Ilyas. 1-8 [doi]
- Efficient hierarchical content distribution using P2P technologyHai Jiang, Jun Li, Zhongcheng Li, Jing Liu. 1-6 [doi]
- Design analysis of wireless sensors in BAN for stress monitoring of fighter pilotsGoutam Chatterjee, Ajay Somkuwar. 1-6 [doi]
- Improvement of VoIP QoS parameters in comparison to IPTV requirements in Next Generation Broadband Ethernet networkMohammad Reza Sheikhattar, Hassan Yeganeh, Mansour Mirzabaghi, Maryam Bahmani. 1-7 [doi]
- Enhanced SIP based method for vertical handoff between WiFi and WiMax networksE. Prince Edward, V. Sumathy. 1-5 [doi]
- Using Neuro-Fuzzy Techniques to reduce false alerts in IDSPravesh Gaonjur, N. Z. Tarapore, S. G. Pukale, M. L. Dhore. 1-6 [doi]
- MASLKE: Mobile Agent Based Secure Location aware Key Establishment in sensor networksNeeraj Nehra, R. B. Patel. 1-6 [doi]
- RRNS-Convolutional encoded concatenated code for OFDM based wireless communicationT. K. Shahana, Babita R. Jose, Rekha K. James, K. Poulose Jacob, Sreela Sasi. 1-6 [doi]
- On scheduling concurrent multicast sessions over resource reserved networkXiaoyu Zhang, Fan Wang. 1-6 [doi]
- SIP/RTP session analysis and tracking for VoIP loggingAnnapurna Agrawal, K. R. Prasanna Kumar, G. Athithan. 1-5 [doi]
- A priority based resource allocation with max-min fairness in active sensor networksK. Vimala Devi, K. M. Mehata. 1-7 [doi]
- Finding the sensors location and the number of sensors in sensor networks with a genetic algorithmMohammad Robatmili, Mehdi Mohammadi, Ali Movaghar, Mehdi Dehghan. 1-3 [doi]
- Calculating a next-hop metric in multiradio networksIan D. Chakeres, Guntur Ravindra. 1-5 [doi]
- Distributed fair scheduling with distributed coordination function in WLANG. Indumathi, K. Murugesan. 1-6 [doi]
- Port scan detectionJayant Gadge, Anish Anand Patil. 1-6 [doi]
- Modeling and analysis of Sequence Number Attack and its detection in AODVAshish Dhane, Sanjeev Sharma. 1-6 [doi]
- 100Mbps Ethernet data transmission over SDH networks using Cross Virtual ConcatenationSunanda Manke, Kavita Khare, S. D. Sapre. 1-6 [doi]
- Ants-in-Mesh routing protocol for Wireless Mesh NetworkChen Yuan, Anjali Agarwal. 1-6 [doi]
- Proactive sliding -window strategy for merging sensor-enabled carsAnita Kanavalli, L. V. Udaya Ranga, A. G. Sathish, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik. 1-5 [doi]
- Cluster management in the known area of deployment for wireless sensor networkServesh Singh, M. M. Gore. 1-4 [doi]
- NeighborTrust: A trust-based scheme for countering Distributed Denial-of-Service attacks in P2P networksAnkur Gupta, Deepti Malhotra, Lalit K. Awasthi. 1-6 [doi]
- Weighted load balanced routing protocol for MANETAmita Rani, Mayank Dave. 1-6 [doi]
- A Service Oriented P2P architecture with semantic supportMaroun Chamoun, Rima Kilany, Ahmed Serhrouchni. 1-6 [doi]
- Search improvement in unstructured P2P network considering type of contentChinmay R. Totekar, M. Vani, Sharath R. Palavalli. 1-4 [doi]
- pathWave: Combined estimation of network link capacity and available bandwidth using statistical signal processingLin Cong, Guohan Lu, Yang Chen, Beixing Deng, Xing Li. 1-6 [doi]
- GRASP: Geographic Rendezvous ApplicationSaptarshi Debroy, Sabyasachi De, Pradip K. Das. 1-4 [doi]
- Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZAnjali Sardana, Ramesh Chandra Joshi. 1-7 [doi]
- Comprehensive test mechanism to detect attack on Web ServicesIrfan Siddavatam, Jayant Gadge. 1-6 [doi]
- On the prevention of collusion attack in OLSR-based Mobile Ad hoc NetworksM. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy. 1-6 [doi]
- Statistical analysis based efficient decentralized intrusion detection scheme for mobile ad hoc networksParul Agarwal, Brijesh Singh Yadav, Joydeep Chandra. 1-6 [doi]
- Performance analysis of TCP in VANETs by using 802.11eAneel Rahim, Muhammad Sher, Adeel Javed, Imran Ahmad, Rehman Hameed. 1-3 [doi]
- New admission control algorithm based on effective bandwidth for a multi-class networkPartha Bhattacharjee, Goutam Sanyal. 1-6 [doi]
- A novel traffic information system for VANET based on location serviceXiang-yu Bai, Xin-min Ye, Hai Jiang, Jun Li. 1-6 [doi]
- Capability aware routing algorithm for Mobile Ad-Hoc Network in workplaceSarbani Roy, Dhrubajyoti Chatterjee, Nandini Mukherjee. 1-6 [doi]
- A dynamic balanced-energy sleep scheduling scheme in heterogeneous wireless sensor networkSounak Paul, Sukumar Nandi, Indrajeet Singh. 1-6 [doi]
- FTEP: A fault tolerant election protocol for multi-level clustering in homogeneous wireless sensor networksNidhi Bansal, T. P. Sharma, Manoj Misra, Ramesh Chandra Joshi. 1-6 [doi]
- Fully distributed active software objects replication in OO-MiddlewareA. Samydurai, Saswati Mukherjee. 1-6 [doi]
- Probability based routing for Ad Hoc networks in a buildingP. Eshwar Rohit, Shashikala Tapaswi, Ramesh Chandra Joshi. 1-6 [doi]
- Performance analysis of PBANT (PBANT: Position based ANT Colony Routing algorithm for MANETs)B. R. Sujatha, V. P. Harigovindan, M. N. Agnisarman Namboodiri, M. V. Sathyanarayana. 1-6 [doi]
- Analysis of a hybrid protocol for identification of a maximal set of node-disjoint paths in mobile Ad hoc networksAsh Mohammad Abbas. 1-7 [doi]
- Comparison of location management techniques for mobile agentsRama Sushil, Kumkum Garg, Rama Bhargava. 1-5 [doi]
- Clustering approach to data aggregation in wireless sensor networksManish Kumar, Shekhar Verma, Pankaj Pratap Singh. 1-6 [doi]
- Performance models for peering Content Delivery NetworksAl-Mukaddim Khan Pathan, Rajkumar Buyya. 1-7 [doi]
- A study on routing method in P2P networksS. Kalantary, Ali Movaghar, A. A. Ghafarizade. 1-6 [doi]
- Energy-aware multicast routing in MANETs based on genetic algorithmsS. M. Dilip Kumar, B. P. Vijay Kumar. 1-5 [doi]
- ID-NAC: Identity-based network access control for MANETsNarges Aghakazem Jourabbaf, Ali Movaghar. 1-6 [doi]
- MailZoro - email based P2P file sharingAjit D. Dhiwal, Sudip Gautam, Akshay K. Singh, Vijay K. Chaurasiya. 1-5 [doi]
- A new contention avoidance scheme in optical burst switch networkM. Nandi, Ashok K. Turuk, B. D. Sahoo, D. K. Puthal, S. Dutta. 1-5 [doi]
- A power-aware wireless sensor network based bridge monitoring systemSujan Kundu, Sudip Roy, Ajit Pal. 1-7 [doi]
- Survivability index for a GPRS networkNeetesh Purohit, Sanjiv Tokekar. 1-4 [doi]
- Analysis and design of Tree Based Interleaver for multiuser receivers in IDMA schemeManoj Shukla, V. K. Srivastava, S. Tiwari. 1-4 [doi]
- Data integrity and intrusion detection in Wireless Sensor NetworksRathanakar Acharya, K. Asha. 1-5 [doi]
- FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domainB. B. Gupta, Manoj Misra, Ramesh Chandra Joshi. 1-4 [doi]
- Analytical model for the switch handling self-similar traffic with variable packet lengthMalla Reddy Perati, L. P. Raj Kumar, Kumar K. Sampath, Shou-Kuo Shao. 1-5 [doi]
- Modeling and analysis of voice/data call admission control scheme in CDMA cellular network for variation in soft handoff threshold parametersRavi Sindal, Sanjiv Tokekar. 1-6 [doi]
- Search in P2P triangular mesh by space filling treesNicolas Bonnel, Gildas Ménier, Pierre-François Marteau. 1-6 [doi]
- A cross layer attack against MANET cooperation enforcement toolsVineet Toubiana, Houda Labiod. 1-5 [doi]
- A cluster based minimum battery cost AODV routing using multipath route for zigbeeAshutosh Bhatia, Praveen Kaushik. 1-7 [doi]