Abstract is missing.
- Monitoring End to End Bandwidth on Demand Circuits over Ethernet InfrastructureChristos Bouras, Apostolos Gkamas, Kostas Stamos. 3-13 [doi]
- Scalability Issues with the Hierarchical Feedback Aggregation for Large-Scale IPTV SystemsDan Komosny, Kathiravelu Ganeshan, Mojmir Jelinek, Radim Burget. 15-26 [doi]
- A Framework for Improved QoS Evaluation and Control in SIP-Based NGNFrank Weber, Woldemar F. Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan V. Ghita. 27-37 [doi]
- Genetic-Based Subcarrier and Bit Allocation Algorithm for Multiuser OFDM SystemMahmoud El-mesalawy, Gamal Abd-Elfadeel, Ibrahim Ibrahim. 39-52 [doi]
- Finding Optimal Solutions to Backbone Minimisation Problems using Mixed Integer ProgrammingMike Morgan, Vic Grout. 53-63 [doi]
- Firewalks: Discovery Mechanism for Non-Replicable Reusable ResourcesGeorgios Exarchakos, Nick Antonopoulos, Kan Zhang. 65-76 [doi]
- A Survey of Applying Ad Hoc Wireless Sensor Actuator Networks to Enhance Context-Awareness in Environmental Management SystemsArmando Roy Delgado, Alexia Robinet, Vic Grout, Rich Picking, John McGinn. 77-90 [doi]
- An Illustrative Discussion of Different Perspectives in Network EngineeringVic Grout, Stuart Cunningham, Rich Hebblewhite. 91-104 [doi]
- Traffic Modelling and Simulation Techniques for Evaluating ACL ImplementationVic Grout, John N. Davies, John McGinn. 105-123 [doi]
- Sharing Supply-Demand Trends for Efficient Resource Discovery in GRID EnvironmentsNick Antonopoulos, Georgios Exarchakos, Kan Zhang. 125-137 [doi]
- Needleman Wunsch Implementation for SPAM/UCE Inline FilterEmran Mohd Tamil, Mohd Yamani Idna Idris, Chiew Ming Thong, Madihah Mohd Saudi, Mohd Zalisham Jali. 141-147 [doi]
- Security Assessment and Planning in Small OrganizationsOleksiy Mazhelis, Hannakaisa Isomäki. 149-159 [doi]
- On the Security Controls of Portable Computing Devices in Healthcare EnvironmentsJames S. Briggs, Vasilios Katos, Azzri Bhaludin. 161-170 [doi]
- A Review of the Electronic Product Code Standards for RFID TechnologyChristopher Bolan. 171-178 [doi]
- Strongly Anonymous Communications in Mobile Ad Hoc NetworksYing Dong, Victor O. K. Li, Siu-Ming Yiu, Lucas Chi Kwong Hui. 181-191 [doi]
- Prediction of Wireless Network Signal Strength Within a BuildingJohn N. Davies, Vic Grout, Rich Picking. 193-207 [doi]
- Ontologies for eLearningBartlomiej Polakowski, Krzysztof Amborski. 211-221 [doi]
- Inside Coherence: Concept for a Non-Linear eLearning SolutionOliver Schneider, Udo Bleimann, Andrew D. Phippen, Bettina Harriehausen-Mühlbauer. 223-233 [doi]
- The MeAggregator: Personal Aggregation and the Life-Long Tail of the WebMichael P. Evans, Shirley Williams, Patrick Parslow, Robert P. Ashton, Karsten Øster Lundqvist, Edwin Porter-Daniels. 235-244 [doi]
- The Web 2.0 Demystified – Six Theses on a Misinterpreted ConceptHolger D. Hofmann, Martin Hans Knahl. 245-259 [doi]
- Service-Oriented Architecture: Performance Issues and ApproachesMartin Swientek, Udo Bleimann, Paul Dowland. 261-269 [doi]
- Optimisation in Multi-Agent SystemsIngo Stengel, Udo Bleimann, Jeanne Stynes. 271-280 [doi]