Abstract is missing.
- Preface [doi]
- ICSNS Committees [doi]
- Energy Aware Topology Management in Ad Hoc Wireless NetworksT. Shivaprakash, G. S. Badrinath, K. R. Venugopal, Lalit M. Patnaik. 1 [doi]
- Hybrid Agents for Power-Aware Intrusion Detection in Highly Mobile Ad Hoc NetworksT. Srinivasan, V. Mahadevan, A. Meyyappan, A. Manikandan, M. Nivedita, N. Pavithra. 2 [doi]
- An Enhanced Gnutella for Ad-Hoc NetworksHyun-Duk Choi, Ho-Hyun Park, Miae Woo. 3 [doi]
- A New EAAODV Routing Protocol based on Mobile AgentChenchen Zhao, Zhen Yang. 4 [doi]
- The Case of Multi-hop Peer-to-Peer Implementation of Mobile Social ApplicationsPanayotis Antoniadis, Costas Courcoubetis. 5 [doi]
- Mobile agent communication schemeMâamoun Bernich, Fabrice Mourlin. 6 [doi]
- Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive ClusteringChien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, Chin-Laung Lei. 7 [doi]
- Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless NetworksScott Fowler, Sherali Zeadally. 8 [doi]
- A Neuro-ForecastWater-Filling Scheme of Server SchedulingHomayoun Yousefi zadeh. 9 [doi]
- A Two - Phase Distributed Reconfiguration Algorithm for Node Failures in IP-Over-WDM NetworksN. Sreenath, Balaji Palanisamy. 10 [doi]
- Grooming of Multicast Sessions in Sparse Splitting WDM Mesh Networks using Virtual Source Based TreesN. Sreenath, Balaji Palanisamy, S. R. Nadarajan. 11 [doi]
- Cost Benefit Study of Sparse-Partial Wavelength Conversion ArchitecturesAndré Castelo Branco Soares, José Maranhão Neto, William Giozza, Paulo Cunha. 12 [doi]
- A new approach of data hiding within speech based on Hash and Hilbert TransformDeng Lixin. 13 [doi]
- Active Service Quality Management in ASEMA systemMarkus Sihvonen, Mikko Nieminen, Johannes Oikarinen, Tomi Räty. 14 [doi]
- End-to-End Differentiation of Congestion and Wireless Losses using a Fuzzy Arithmetic based on Relative EntropyYong Li, Fang Su, Yinglei Fan, Huimin Xu. 15 [doi]
- On the Applicability of Remote Rendering of Networked Virtual Environments on Mobile DevicesPeter Quax, Bjorn Geuns, Tom Jehaes, Wim Lamotte, Gert Vansichem. 16 [doi]
- Fast Block Center Weighted Hadamard TransformMoon Ho Lee, Xiao-Dong Zhang. 17 [doi]
- Autonomically Improving the Security and Robustness of Structured P2P OverlaysGerald Kunzmann, Andreas Binzenhöfer. 18 [doi]
- ASASI: An Environment for Addressing Software Application Security IssuesMehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala. 19 [doi]
- Towards Requirement and Modeling Driven Security EvaluationReijo Savola. 20 [doi]
- Privacy-Invasive Software and Preventive MechanismsMartin Boldt, Bengt Carlsson. 21 [doi]
- A Real-time Secure Voice Communication System Based on Speech RecognitionZongyuan Deng, Zhen Yang, Lixin Deng. 22 [doi]
- Verification of Strict Integrity Policy via Petri NetsZhao-Li Zhang, Fan Hong, Hai-Jun Xiao. 23 [doi]
- Security Architecture for Web-based Health Insurance SystemsMucahit Mutlugun, Ibrahim Sogukpinar. 24 [doi]
- Confessible Threshold Ring SignaturesYu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang. 25 [doi]
- Kleptographic Weaknesses in Benaloh-Tuinstra ProtocolPiotr Borzecki, Jedrzej Kabarowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski. 26 [doi]
- Usage Control Requirements in Mobile and Ubiquitous Computing ApplicationsManuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter. 27 [doi]
- Neural Wireless Sensor NetworksFrank Oldewurtel, Petri Mähönen. 28 [doi]
- A Locally Group Key Management with Revocation and Self-healing Capability for Sensor NetworksHui Li, Kefei Chen, Yanfei Zheng, Mi Wen. 29 [doi]
- Application Development in Vision-Enabled Wireless Sensor NetworksStephan Hengstler, Hamid K. Aghajan. 30 [doi]
- Topological Hole Detection in Sensor Networks with Cooperative NeighborsKun Bi, Kun Tu, Naijie Gu, Wan Lin Dong, Xiaohu Liu. 31 [doi]
- Probabilistic-Based Energy Aware Routing for Network Lifetime and Source Level Fairness in Wireless Sensor NetworksNa Wang, Chorng Hwa Chang. 32 [doi]
- E-Services for an Electronic Education MarketFreimut Bodendorf. 33 [doi]
- Components for a pervasive information dissemination architectureJan Moons, Carlos De Backer, Herwig Mannaert. 34 [doi]
- Remote Screen Recording and PlaybackShann-Chiuen Wu, Shih-Jen Chu, Tzao-Lin Lee. 35 [doi]
- Jazz Sebastian Bach: A GA System for Music Style ModificationDimitrios Tzimeas, Eleni E. Mangina. 36 [doi]
- Forecasting Unstable Policy EnforcementJavier Baliosian, Ann Devitt. 37 [doi]
- Beyond the Hype: Policies for Military Network OperationsRitu Chadha. 38 [doi]
- A Multi-Layer Ubiquitous Middleware for Bijective Adaptation between Context and Activity in a Mobile and Collaborative learningJihen Malek, Mona Laroussi, Alain Derycke. 39 [doi]
- Security Issues in Wireless Sensor NetworksTanveer Zia, Albert Y. Zomaya. 40 [doi]
- Mac Address Assignment In Wireless Sensor Networks: A Mixed Strategy Game ApproachKun Tu, Kun Bi, Naijie Gu, Wan Li Dong, Xiaohu Liu. 41 [doi]
- Maintaining Coverage by Progressive Crystal-Lattice Permutation in Mobile Wireless Sensor NetworksPang-Chieh Wang, Ting-Wei Hou, Ruei-Hong Yan. 42 [doi]
- Distributed Event Detection in Sensor NetworksFernando Martincic, Loren Schwiebert. 43 [doi]
- Tracing and Managing hazardous material in Sensor NetworksRonny Fehling. 44 [doi]
- A Novel Blind SNR Estimator Based on the Modified PASTd Algorithm for IF SignalsDan Sui, Lindong Ge. 45 [doi]
- Accelerating VOD Streaming with Adaptive Proxy- Assisted Scheduling, Caching and PatchingLi Zimu, Jianping Wu, ShaoHua Qin. 46 [doi]
- Localization with Power Control in Wireless Sensor NetworksWen-Hwa Liao, Yu-Chee Lee. 47 [doi]
- Wireless Broadband Internet Access in KoreaYoon-Ju Lee, Sung Cheol Chang, Young-Il Kim, Song In Choi, Jee Hwan Ahn. 48 [doi]
- Application Programming Interface offering classification services to end-user applicationsKarol Molnar, Martin Kyselak. 49 [doi]
- A Flexible Weight Based Clustering Algorithm in Mobile Ad hoc NetworksZouhair El-Bazzal, Michel Kadoch, Basile L. Agba, François Gagnon, Maria Bennani. 50 [doi]
- A New Communication Architecture Based on the Spatial Information Field ModelHaibin Liu. 51 [doi]
- XHTML encoding and compressionSathiamoorthy Manoharan. 52 [doi]
- A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area NetworksM. Farahmand, A. Azarfar, A. Jafari, V. Zargari. 53 [doi]
- A Novel Bargaining Based Dynamic Spectrum Management Scheme in Reconfigurable SystemsMiao Pan, Shuo Liang, Haozhi Xiong, Jie Chen, Guangyi Li. 54 [doi]
- Performance Analysis of a Time-Threshold Based Bandwidth Allocation Scheme for Data Calls in Cellular NetworksIdil Candan, Muhammed Salamah. 55 [doi]
- TCP Based Resource Allocation Method for Base Station Diversity SystemKatsuhiro Naito, Kazuo Mori, Hideo Kobayashi. 56 [doi]
- Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LANJong-Hyouk Lee, Tai-Myoung Chung. 57 [doi]
- Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 NetworksJong-Hyouk Lee, Tai-Myoung Chung. 58 [doi]
- A ROD based Fuzzy packet loss differentiating algorithm for TCP in the hybrid wired/wireless networkSu Fang, Fan Yinglei, Li Yong, Xu Huimin. 59 [doi]
- Dynamic Cell Coverage Control for Power Saving in IEEE802.16 Mobile MultihopRelay SystemsChanghoi Koo, Yong Woo Chung. 60 [doi]
- Performance Analysis and Evaluation of Bluetooth Networks in Wireless Channel EnvironmentJae-Sung Roh. 61 [doi]
- Middleware - An Effort towards Making Mobile Applications Platform IndependentNeeraj Gupta, Vishal Srivastav, M. P. S. Bhatia. 62 [doi]
- An Energy-Efficient Redundant Nodes Tree Mechanism for Wireless Sensor NetworksZhang zhenjiang, Liu Yun. 63 [doi]
- A Novel Way of Determining the Optimal Location of a Fragment in a DDBS: BGBRAshkan Bayati, Pedram Ghodsnia, Maseud Rahgozar, Reza Basseda. 64 [doi]
- Error Correcting Codes from Modified Butson-Hadamard MatricesMoon Ho Lee, Xueqin Jiang, Gi Yeon Hwang, Subash Shree Pokhrel. 65 [doi]
- Ternary Codes From Modified Hadamard MatricesXueqin Jiang, Moon Ho Lee, Sergey A. Stepanov, KwangJe Lee, KimSung Hun. 66 [doi]
- Codes From Generalized Hadamard MatricesXueqin Jiang, Moon Ho Lee, Ram Prasad Paudel, TaeChol Shin. 67 [doi]
- A Cluster Based Topology Control Algorithm for Wireless Ad-Hoc NetworksAli Sarrafi, Mohammad Hamed Firooz, Hassan Barjini. 68 [doi]
- A Real-Time Study of 802.11b and 802.11gVictor A. Clincy, Ajay Sitaram, David Odaibo, Garima Sogarwal. 69 [doi]
- System capacity in OFDMA-based WiMAXChadi Tarhini, Tijani Chahed. 70 [doi]
- GPSenseCar - A Collision Avoidance Support System Using Real-Time GPS Data in a Mobile Vehicular NetworkYin-Jun Chen, Ching-Chung Chen, Shou-Nian Wang, Han-En Lin, Roy Chaoming Hsu. 71 [doi]
- Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc NetworksAbderrezak Rachedi, Abderrahim Benslimane. 72 [doi]