Abstract is missing.
- Multi-user Frequency Pre-filtering Technique for MIMO SFBC MC-CDMA SystemsAdão Silva, Elídio Silva, Atílio Gameiro. 1-5 [doi]
- Impacts of Transmission Range in Homogeneous Wireless NetworksMohamed Djoudi. 6-10 [doi]
- Design, Simulation and Implementation of a Channel Equalizer for DVB-T On-channel RepeatersMikel Mendicute, Iker Sobrón, Javier Del Ser, Pablo Prieto, Ricardo Isasi. 11-16 [doi]
- Fairness in a Static Wireless NetworkMarc Gilg, Pascal Lorenz, Abderrahim Makhlouf. 17-22 [doi]
- Intrusion Detection: A SurveyFarzad Sabahi, Ali Movaghar. 23-26 [doi]
- Analysis of User Experience of Access Selection in Multi-operator EnvironmentsPetteri Pöyhönen, Jan Markendahl, Ove Strandberg. 27-32 [doi]
- Modeling and Design of a Novel Backward-Wave Scanning-Beam Antenna Based on Negative Refractive Index Material StructuresAbdelaziz Hamdi, Ammar B. Kouki, Abdelaziz Samet. 33-37 [doi]
- Management Model for Wireless Broadband NetworksNuno Salvador, Vitor Filipe, Carlos Rabadão, António Pereira. 38-43 [doi]
- Employing of Clustering Algorithm CWN-PAM in Mobile Network PlanningManal El Harby, Lamiaa Fattouh Ibrahim. 44-49 [doi]
- Survivability Quantification of Real-Sized Networks Including End-to-End Delay DistributionsPoul E. Heegaard, Kishor S. Trivedi. 50-55 [doi]
- Routing and Performance Analysis of Double-Buffered Omega Networks Supporting Multi-class Priority TrafficDimitris C. Vasiliadis, George E. Rizos, Costas Vassilakis, Euripidis Glavas. 56-63 [doi]
- A Joint Coded Two-Step Interference Cancellation Technique for a Multiuser MIMO-SC-FDE SystemAbdullah Aljohani, Jonathon A. Chambers. 64-68 [doi]
- Traffic Demand Derivation in IP-Based Multi Service Class EnvironmentLucian Ioan, Grazziela Niculescu, Eugen Borcoci. 69-74 [doi]
- Blind a Daptive Channel Shortening with a Generalized Lag-Hopping Algorithm Which Employs Squared Auto-Correlation Minimization [GLHSAM]K. Maatoug, Jonathon A. Chambers. 75-78 [doi]
- AURED - Autonomous Random Early Detection for TCP Congestion ControlHsiu-Jy Ho, Wei-Ming Lin. 79-84 [doi]
- The Design and Implementation of Profile Management Module Including Policy-Based Repository in the Customer Network Management System for Corporate-Level Network Service ClientsEun-Jin Ko, Il-Gu Jung, Gilhaeng Lee. 85-89 [doi]
- A Minimization Cost Heuristic Approach for Traffic Grooming in IP-over-WDM NetworksNoélia S. C. Correia, José Coimbra, Maria C. R. Medeiros. 90-97 [doi]
- Group Tone Spectrum Management Algorithm (GTSM) for VDSL2 TechnologyIoannis Karamitsos, Katerina Vagelatou, Gianna Koliopanou. 98-102 [doi]
- OFFH-CDMA Merged M-Sequence/Hyperbolic Code for Two Weights One Length WDM SystemMoez Ferchichi, Monia Najjar, Houria Rezig. 103-108 [doi]
- Performance Modeling of Fault Tolerant Fully Adaptive Wormhole Switching 2-D Meshes in Presence of Virtual ChannelsS. Nickmanesh, Ali Movaghar, F. Rookhosh. 109-114 [doi]
- Performance Improvement of DSTBC Systems Using Decision Feedback ApproachTetsuki Taniguchi, Yang Liu, Yoshio Karasawa. 115-120 [doi]
- A Simplified Deterministic Approach for Accurate Modeling of the Indoor Power Line ChannelAbdelali Rennane, Christophe Konate, Mohamed Machmoum. 121-126 [doi]
- A Novel Prioritized Control Scheme Using Random Access Period Control for Wide Area Ubiquitous Wireless NetworksYoshitaka Shimizu, Fusao Nuno, Kazuji Watanabe. 127-132 [doi]
- An Algorithm for Selecting the Cluster Leader in a Partially Connected Sensor NetworkMohammad Mostafizur Rahman Mozumdar, Francesco Gregoretti, Luciano Lavagno, Laura Vanzago. 133-138 [doi]
- A Survey of Available Tools for Developing Wireless Sensor NetworksGuodong Teng, Kougen Zheng, Wei Dong. 139-144 [doi]
- Differences in Robustness of Self-Organized Control and Centralized Control in Sensor Networks Caused by Differences in Control DependenceMasashi Sugano, Yuichi Kiri, Masayuki Murata. 145-150 [doi]
- Use of MPEG-21 for Security and Authentication in Biomedical Sensor NetworksWolfgang Leister, Truls Fretland, Ilangko Balasingham. 151-156 [doi]
- Automated Testing of WSN ApplicationsMohammad Al Saad, Elfriede Fehr, Nicolai Kamenzky, Jochen H. Schiller. 157-166 [doi]
- Geminga: Service Discovery for Mobile RoboticsPhilipp A. Baer, Thomas Weise, Kurt Geihs. 167-172 [doi]
- Protecting the DNS Infrastructure of a Top Level Domain: Dynamic Firewalling with Network SensorsJoão Afonso, Pedro Veiga. 173-178 [doi]
- HIP Tags Privacy ArchitecturePascal Urien, Dorice Nyami, Simon Elrharbi, Hervé Chabanne, Thomas Icart, Cyrille Pepin, Mathieu Bouet, Daniel de Oliveira Cunha, Vincent Guyot, Guy Pujolle, Eric Gressier-Soudan, Jean-Ferdy Susini. 179-184 [doi]
- A Mechanism for Federated Identification Services for Public Access Portals Using Access-CardsSylvia B. Encheva, Sharil Tumin. 185-190 [doi]
- GEMOM - Significant and Measurable Progress beyond the State of the ArtHabtamu Abie, Ilesh Dattani, Milan Novkovic, John Bigham, Shaun Topham, Reijo Savola. 191-196 [doi]
- Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless NetworksSanjay Kumar Dhurandher, Sudip Misra, Deepansh Agrawal, Avanish Rayankula. 197-201 [doi]
- A High Availability Firewall Model Based on SCTP ProtocolEdmo Lopes Filho, Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa. 202-207 [doi]
- Risk Analysis Methodology for New Critical Information InfrastructureJun Heo, Jong-Whoi Shin, Wansuk Lee, Yoojae Won. 208-211 [doi]
- Improvement of GPON MAC Protocol for IP TV ServiceSeungKun Lee, Jongwook Jang, MoonHan Bae. 212-217 [doi]
- A Simple Computer Design with Monitor Interface: Integrating Hardware and Software in Early Research in Computer ScienceHassan Farhat. 218-222 [doi]
- Performance Modelling and Evaluation of Handover Mechanism in IP Multimedia SubsystemsIs-Haka Mkwawa, Demetres D. Kouvatsos. 223-228 [doi]
- Integration of WiMAX Access Management and Control in a Multi-domain System for Multimedia DistributionEugen Borcoci, Radu Lupu, Serban Georgica Obreja. 229-234 [doi]
- Social Networking Service Based on Peer-to-Peer NetworkIl-Woo Lee, Moon-Ok Choi, Ho-Jin Park, Kwang-Roh Park. 235-238 [doi]
- Regulatory Models in Telecommunications Market in Bosnia and HerzegovinaMirko Skrbic, Kemal Huseinovic, Zlatko Lagumdzija. 239-244 [doi]
- A New Preemption Algorithm Supporting Differentiated Services Aware Traffic EngineeringAfef Kotti, Rached Hamza, Kamel Bouleimen. 245-249 [doi]
- Automated Evaluation of Reusable Learning Objects via a Decision Support SystemSylvia B. Encheva, Sharil Tumin. 250-255 [doi]
- WS-Re2Policy: A Policy Language for Distributed SLA Monitoring and EnforcementNicolas Repp, André Miede, Michael Niemann, Ralf Steinmetz. 256-261 [doi]
- Implementation of Traffic Engineering in NGNs Using Hybrid Genetic AlgorithmsAlex Vallejo, Agustín Zaballos, David Vernet, David Cutiller, Jordi Dalmau. 262-267 [doi]
- Modified DMAC Clustering Algorithm for VANETsGrzegorz Wolny. 268-273 [doi]
- PMIPv6 Route Optimization Mechanism Using the Routing Table of MAGByung-Jin Han, Jae-Min Lee, Jong-Hyouk Lee, Tai-Myoung Chung. 274-279 [doi]
- Performance Analysis of Route Optimization on Proxy Mobile IPv6Jae-Min Lee, Jong-Hyouk Lee, Tai-Myoung Chung. 280-285 [doi]
- Network Coding for Detection and Defense of Sink Holes in Wireless Reconfigurable NetworksRafaela Villalpando Hernandez, César Vargas Rosales, David Muñoz Rodríguez. 286-291 [doi]
- An Analysis of the Nanosatellites Launches between 2004 and 2007Maria-Mihaela Burlacu, Joséphine Kohlenberg. 292-297 [doi]
- Space Imaging Infrastructure Development of PUBSAT and NERVA Orbital VehicleRadu Rugescu, Joséphine Kohlenberg, Mahendiran Prathaban. 298-303 [doi]
- Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 EnvironmentJoong-Hee Lee, Jong-Hyouk Lee, Tai-Myoung Chung. 304-309 [doi]
- Adaptive DSR Protocol with Cooperative Agents for Different Mobility and Traffic PatternsM. Rajabzadeh, Fazllolah Adibniya, Mohammad GhasemZadeh. 310-315 [doi]
- Testing Methodology Using SDL for an On-demand Routing Protocol in MANETF. Rookhosh, Abolfazl Toroghi Haghighat, S. Nickmanesh. 316-321 [doi]
- Improvement of TCP Performance in Ad Hoc Networks Using Cross Layer ApproachSeyed Mohsen Mirhosseini, Fatemeh Torgheh. 322-328 [doi]
- Wireless Routing Protocol Based on Trust EvaluationBen Arbia Anis, Hédi Hamdi, Youssef Habib. 329-334 [doi]
- A Fuzzy Logic Based Model for Representing and Evaluating Service Composition PropertiesHeiko Pfeffer, Steffen Krüssel, Stephan Steglich. 335-342 [doi]
- Long Term Management of Private Digital AssetsHeinrich Jasper. 343-348 [doi]
- Elder Care ArchitectureIsabel Marcelino, João Barroso, José Bulas-Cruz, António Pereira. 349-354 [doi]
- Remote Robot Training of Its Artificial Neural Network through GSM CommunicationG. Venkat Ramu, R. Hariprakash, K. Visalakshi, S. Ananthi, K. Padmanabhan. 355-358 [doi]
- Semantic Policies for Service Access in Mobile Supported Sensor NetworksSarfraz Alam, Josef Noll, Dumitru Roman. 359-364 [doi]
- Capturing User Contexts: Dynamic Profiling for Information Seeking TasksRoman Y. Shtykh, Qun Jin. 365-370 [doi]
- Supports for Identity Management in Ambient Environments - The Hydra ApproachHasan Akram, Mario Hoffmann. 371-377 [doi]
- Gradual Adaption Model for Estimation of User Information Access BehaviorJian Chen, Roman Y. Shtykh, Qun Jin. 378-383 [doi]
- Automatic Control of Students' Attendance in Classrooms Using RFIDFrancisco Silva, Víctor Filipe, António Pereira. 384-389 [doi]
- Gateways and Capacity in Ad Hoc NetworksErlend Larsen, Vinh Pham, Paal Engelstad, Øivind Kure. 390-399 [doi]
- Some Problems & Methods for Remotely Controllable Automatic Home Security SystemsR. Hariprakash, G. Venkat Ramu, T. Rajakumari, S. Ananthi, K. Padmanabhan. 400-403 [doi]