Abstract is missing.
- On the Performance of Grooming Strategies for Offloading IP Flows onto Lightpaths in Hybrid NetworksRudolf Biesbroek, Tiago Fioreze, Lisandro Zambenedetti Granville, Aiko Pras. 1-10 [doi]
- MBAC: Impact of the Measurement Error on Key Performance IssuesAnne Nevin, Peder J. Emstad, Yuming Jiang. 11-20 [doi]
- An Algorithm for Automatic Base Station Placement in Cellular Network DeploymentIstván Töros, Péter Fazekas. 21-30 [doi]
- An Energy-Efficient FPGA-Based Packet Processing FrameworkDániel Horváth, Imre Bertalan, István Moldován, Tuan Anh Trinh. 31-40 [doi]
- Service Migration Protocol for NFC LinksAnders Nickelsen, Miquel Martin, Hans-Peter Schwefel. 41-50 [doi]
- Swarm Intelligence Heuristics for Component DeploymentMáté J. Csorba, Poul E. Heegaard. 51-64 [doi]
- On Force-Based Placement of Distributed Services within a Substrate NetworkLaurie Lallemand, Andreas Reifert. 65-75 [doi]
- Enabling P2P Gaming with Network CodingBalázs Lajtha, Gergely Biczók, Róbert Szabó. 76-86 [doi]
- A Virtual File System Interface for Computational GridsAbdulrahman Azab, Hein Meling. 87-96 [doi]
- Labeled VoIP Data-Set for Intrusion Detection EvaluationMohamed Nassar, Radu State, Olivier Festor. 97-106 [doi]
- Document Provenance in the Cloud: Constraints and ChallengesMohamed Amin Sakka, Bruno Defude, Jorge Tellez. 107-117 [doi]
- Wireless Handoff Optimization: A Comparison of IEEE 802.11r and HOKEYKashif Nizam Khan, Jinat Rehana. 118-131 [doi]
- Introducing Perfect Forward Secrecy for AN.ONBenedikt Westermann, Dogan Kesdogan. 132-142 [doi]
- Mobility-Aware Drop Precedence Scheme in DiffServ-Enabled Mobile Network SystemsBongkyo Moon. 143-154 [doi]
- Theoretical Analysis of an Ideal Startup Scheme in Multihomed SCTPJohan Eklund, Karl-Johan Grinnemo, Anna Brunstrom. 155-166 [doi]
- The Network Data Handling War: MySQL vs. NfDumpRick Hofstede, Anna Sperotto, Tiago Fioreze, Aiko Pras. 167-176 [doi]
- Processing of Flow Accounting Data in Java: Framework Design and Performance EvaluationJochen Kögel, Sebastian Scholz. 177-187 [doi]
- Fighting Spam on the Sender Side: A Lightweight ApproachWouter Willem de Vries, Giovane Cesar Moreira Moura, Aiko Pras. 188-197 [doi]
- Degradation Model for Erbium-Doped Fiber Amplifiers to Reduce Network DowntimeChristian Merkle. 198-208 [doi]
- A Token Based Approach Detecting Downtime in Distributed Application Servers or Network ElementsSune Jakobsson. 209-216 [doi]
- Distributed Resource Reservation for Beacon Based MAC ProtocolsFrank Leipold, Jörg Eberspächer. 217-225 [doi]
- On Runtime Adaptation of Application-Layer Multicast Protocol ParametersChristian Hübsch, Christoph P. Mayer, Oliver P. Waldhorst. 226-235 [doi]
- A Framework with Proactive Nodes for Scheduling and Optimizing Distributed Embedded SystemsAdrian Noguero, Isidro Calvo. 236-245 [doi]
- Resource Adaptive Distributed Information SharingHans Vatne Hansen, Vera Goebel, Thomas Plagemann, Matti Siekkinen. 246-255 [doi]
- Performance Impacts of Node Failures on a Chord-Based Hierarchical Peer-to-Peer NetworkQuirin Hofstätter. 256-258 [doi]
- A Low-Power Scheme for Localization in Wireless Sensor NetworksJorge Juan Robles, Sebastian Tromer, Monica Quiroga, Ralf Lehnert. 259-262 [doi]
- Flow Aggregation Using Dynamic Packet StateAddisu Eshete, Yuming Jiang. 263-265 [doi]
- Evaluating MDC with Incentives in P2PTV SystemsAlberto J. Gonzalez, Andre Rios, Guillermo Enero, Antoni Oller, Jesus Alcober. 266-269 [doi]
- Translation from UML to SPN Model: A Performance Modeling FrameworkRazib Hayat Khan, Poul E. Heegaard. 270-271 [doi]
- An Open and Extensible Service Discovery for Ubiquitous Communication SystemsNor Shahniza Kamal Bashah, Ivar Jørstad, Do Van Thanh. 272-273 [doi]