Abstract is missing.
- Genetic algorithm based mobility aware clustering for energy efficient routing in wireless sensor networksS. Sarangi, S. Kar. 1-6 [doi]
- Performance evaluation of reliable and unreliable opportunistic flooding in wireless sensor networkLinchao Zhang, Erwing Ricardo Sanchez, Maurizio Rebaudengo. 7-12 [doi]
- Efficient flooding using prefetching in on-demand routing protocols for mobile ad-hoc networksK. R. Shobha., Karthik Shetty, K. Rajanikanth. 13-18 [doi]
- Energy efficient high capacity HETNET by offloading high QoS users through femtoMuhammad Usman, Anders Vastberg, Tomas Edler. 19-24 [doi]
- Complexity-rate-distortion evaluation of video encoding for cloud media computingMing Yang, Jianfei Cai, Yonggang Wen, Chuan Heng Foh. 25-29 [doi]
- Towards robust video streaming for unicast and multicast: Modeling and implementationBin Zhang 0018, Mathias Wien. 30-35 [doi]
- Scalable broadcasting of sliced H.264/AVC over DVB-H networkSajid Nazir, Vladimir Stankovic, Dejan Vukobratovic. 36-40 [doi]
- Error-resilient slice interleaving for robust video transmission over bursty loss channelsYu Wang, Xuan Jing, Jo Yew Tham, Kwong Huang Goh, Wei Siong Lee. 41-46 [doi]
- Delay Tolerant Network based internet services for remote areas using train systemsEmir Husni. 47-52 [doi]
- Energy-efficient probabilistic target coverage in wireless sensor networksJau-Wu Huang, Chia-Mao Hung, Kai-Chao Yang, Jia-Shung Wang. 53-58 [doi]
- Multiple moving targets tracking from sensor scheduling perspectiveChen Wang, Zhiyun Lin, Gangfeng Yan. 59-64 [doi]
- Post sensing optimal channel selection in cognitive radio networksAaqib Patel, S. N. Merchant, Uday B. Desai. 65-70 [doi]
- Exploiting neighboring relationship for enhancement of AODV in hybrid wireless mesh networkMohammed Meftah Alrayes, Neeraj Tyagi, Rajeev Tripathi, A. K. Misra. 71-76 [doi]
- Capacity Based Data Rate-Aware Channel Assigment in multi-rate wireless mesh networksSook-Chin Yip, Su-Wei Tan, Teong Chee Chuah. 77-82 [doi]
- Delay constrained throughput analysis of CDMA using stochastic network calculusKashif Mahmood, Mikko Vehkaperä, Yuming Jiang. 83-88 [doi]
- Implementation of multi-layer techniques using FEDERICA, PASITO and OneLab network infrastructuresVíctor López, J. L. Anamuro, Victor Moreno, Jorge E. López de Vergara, Javier Aracil, C. Garcia, Juan P. Fernández Palacios, Mikel Izal. 89-94 [doi]
- Smoothing the XCP senderZhiqiang Shi, Dan Ionescu, Dongli Zhang. 95-99 [doi]
- Modeling call arrivals on VoIP networks as linear Gaussian Process under heavy traffic conditionImad Al Ajarmeh, James Yu, Mohamed Amezziane. 100-105 [doi]
- An autonomous maintenance algorithm for sensor networks subject to practical communication constraintsSijian Zhang, Zhiyun Lin, Gangfeng Yan. 106-111 [doi]
- AreaCast: A cross-layer approach for a communication by area in Wireless Sensor NetworksKarel Heurtefeux, Florence Maraninchi, Fabrice Valois. 112-117 [doi]
- RSSI based location estimation in wireless sensors networksRaida Al-Alawi. 118-122 [doi]
- Performance evaluation of agent and non-agent based data dissemination protocols for wireless sensor networksGovind P. Gupta, Manoj Misra, Kumkum Garg. 123-128 [doi]
- Scheduling hybrid divisible and indivisible loads on clustersMenglan Hu, Bharadwaj Veeravalli. 141-146 [doi]
- On the resource allocation and pricing strategies in Compute Clouds using bargaining approachesGanesh Neelakanta Iyer, Bharadwaj Veeravalli. 147-152 [doi]
- Energy-efficient overlay for data transfers in private networksAnne-Cécile Orgerie, Laurent Lefèvre. 153-158 [doi]
- Flexible tree-based Application-Layer MulticastChristian Hübsch, Oliver P. Waldhorst. 159-164 [doi]
- Rationing data updates with consistency considerations in distributed systemsHassan Zeineddine, Wael Bazzi. 165-170 [doi]
- A trust-based mechanism for protecting IPv6 networks against stateless address auto-configuration attacksZubair A. Baig, Suli C. Adeniye. 171-176 [doi]
- Churn performance study of structured peer-to-peer overlay in supporting massively multiplayer online role playing games (MMORPGs)Xinbo Jiang, Farzad Safaei. 183-188 [doi]
- A deadline-aware rate-adaptive packet pacing algorithm for small buffer networksT. Venkatesh, K. Phani Prakash. 189-194 [doi]
- Reducing blocking probability in dynamic WDM networks by rerouting and set-up delay toleranceAjmal Muhammad, Robert Forchheimer. 195-200 [doi]
- Dimesioning and resource provisioning for IP/MPLS-over-WDM networkPartha Goswami, S. K. Ghosh, Debasish Datta. 201-206 [doi]
- Comparison of performance of OCDMA networks with correlation and chiplevel receiversE. S. Shivaleela, Shrikant S. Tangade. 207-212 [doi]
- Impairment-aware dynamic provisioning in WDM networks with set-up delay tolerance and holding-time awarenessAjmal Muhammad, Robert Forchheimer, Lena Wosinska. 213-218 [doi]
- Application classification in cellular backhaul networksRonit Nossenson, Ayal Lior, Kobi Brener. 219-224 [doi]
- Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysisKun Zhang, Hong Zhang, Yongdong Wu, Feng Bao. 231-235 [doi]
- Automatic image capturing and processing for PetrolWatchYifei Dong, Salil S. Kanhere, Chun Tung Chou, Ren Ping Liu. 236-240 [doi]
- Enhancing security and confidentiality on mobile devices by location-based data encryptionRohollah Karimi, Mohammad Kalantari. 241-245 [doi]
- On enhancing the random linear network codingM. S. Najeem, C. Siva Ram Murthy. 246-251 [doi]
- Classification of UDP traffic from P2P applicationsGang Wang, Wei Ding, Shi Dong. 252-257 [doi]
- A scalable routing architecture for prefix triesYi Wu, Ge Nong. 264-269 [doi]
- New methods for network traffic matrix estimation based on a probability modelHui Tian, Yingpeng Sang, Hong Shen. 270-274 [doi]
- Network performance in virtualized environmentsRuediger Gad, Martin Kappes, Robin Mueller-Bady, Ingo Ritter. 275-280 [doi]
- A new approach to developing attack taxonomies for network security - including case studiesRay Hunt, Jill Slay. 281-286 [doi]
- Design and implementation of improved security protocols for DHCP using digital certificatesSurakarn Duangphasuk, Supakorn Kungpisdan, Sumeena Hankla. 287-292 [doi]
- Layered design of mobile backhaul networksDavid Fatseas, Ron Addie. 293-298 [doi]
- CS-CGA: Compact and more Secure CGAAhmad AlSa'deh, Feng Cheng 0002, Christoph Meinel. 299-304 [doi]
- On benchmarking routing protocolsChristoph Werle, Sebastian Mies, Martina Zitterbart. 305-310 [doi]
- Scheduling of OSPF routing table calculation using Generalized Regression Neural NetworkMohd Zahid M. Soperi, M. Haider, Kamalrulnizam Abu Bakar. 311-315 [doi]
- An offload method for traffic distribution based on service identificationHiroki Date, Takashi Kurimoto, Akira Misawa. 316-321 [doi]
- Optimized low mobility support in massive mobile broadband Evolved Packet Core architectureMarius Iulian Corici, Jens Fiedler, Dragos Vingarzan, Thomas Magedanz. 322-327 [doi]