Abstract is missing.
- Some Notes and Results on Bandwidth-based Routing and Implicit Load BalancingVic Grout, Nigel Houlden. 19-30 [doi]
- Scalable Distributed-FDPS Algorithm for QoS ProvisioningChee Kheong Siew, Shuai Peng, Wuqiong Luo, Peng Tang, Yanting Mo. 31-40 [doi]
- Intelligent IP Traffic / Flow Classification SystemIsara Anantavrasilp. 41-50 [doi]
- Improving Fairness in Ad Hoc Networks Through Collision Rate ControlMohamed Arabi, Bogdan V. Ghita, Xingang Wang. 51-59 [doi]
- A Bootstrap Mechanism for NGN QoS ProfilingFrank Weber, Woldemar F. Fuhrmann, Ulrich Trick, Udo Bleimann, Bogdan V. Ghita. 61-70 [doi]
- Possible Future Revenue Creation Through IMS Service EnablersJohannes Häussler, Anett Schülke, Marcus Q. Kuhnen, Jochen Bauknecht. 71-74 [doi]
- Enhanced Concept of the TeamCom SCE for Automated Generated Services Based on JSLEEThomas Eichelmann, Woldemar F. Fuhrmann, Ulrich Trick, Bogdan V. Ghita. 75-84 [doi]
- Improving the Performance of IP Filtering using a Hybrid Approach to ACLsJohn N. Davies, Vic Grout, Rich Picking. 85-95 [doi]
- Signalling Effort Evaluation of Mobility Protocols within Evolved Packet Core NetworkSandra Frei, Woldemar F. Fuhrmann, Andreas Rinkel, Bogdan V. Ghita. 99-108 [doi]
- Enabling Push-based Mobile Web Services for Today's Cell Phone Provider NetworksSascha Roth. 109-120 [doi]
- A Cross-Layer Media-Independent Handover Mechanism in Heterogeneous WiMAX/WiFi NetworksYue-Huei Huang, Yaw-Chung Chen. 121-130 [doi]
- Fast Implementation of AES on Mobile DevicesAshar Javed. 133-142 [doi]
- Conceptual Trusted Incident Reaction ArchitectureChristophe Feltus. 143-152 [doi]
- Information Security Culture: A SurveyOleksiy Mazhelis, Hannakaisa Isomäki. 153-157 [doi]
- Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial ProposalCarlos Javier Hernández Castro, Jonathan D. Stainton-Ellis, Arturo Ribagorda, Julio César Hernández Castro. 159-168 [doi]
- The Effect of Pre-written Scripts on the Use of Simple Software Security Analysis ToolsMatti Mantere, Kaarina Karppinen, Mika Rautila. 169-177 [doi]
- Password Visualization beyond Password MaskingNils Gruschka, Luigi Lo Iacono. 179-188 [doi]
- Survey on Legal Data Protection Norms Relevant to Automated Network Infrastructure AnalysisIngo Ritter, Martin Kappes, Peter Wedde, Ruediger Gad, Andreas Renner. 189-197 [doi]
- Strong Remote User Authentication Scheme using Smart CardsRafael Martínez-Peláez, Francisco Rico-Novella, Cristina Satizábal, Jacek Pomykala. 199-208 [doi]
- Usable SurvivabilityMichael Atighetchi, Andrew Gronosky, Partha Pal, Joseph P. Loyall. 209-212 [doi]
- Using the Generation One EPC RFID LockID Command as a Method of Directed AttackChristopher Bolan. 213-221 [doi]
- Manipulating Mobile Devices with a Private GSM Base Station - A Case StudyChristoph Kemetmüller, Mark M. Seeger, Harald Baier, Christoph Busch. 223-234 [doi]
- Application and Impacts of Mobile Learning: A Case Study in Technology for Sustainable Distance LearningSubramaniam Chandran. 237-240 [doi]
- Didactic Networks and ExemplificationFrancisco Javier del Álamo, Raquel Martínez, José Alberto Jaén. 241-252 [doi]
- An Architecture of eLearning Enterprise Authoring Studio Ivo Hristov. 253-262 [doi]
- Linking Web 2.0 and 3D Virtual Reality for Language Learning: Design and ImplementationYa-Chun Shih, Mau-Tsuen Yang. 263-267 [doi]
- Service Quality Assessment in Distance LearningHanna V. Shauchenka, Udo Bleimann, Matthias Knoll, Nathan L. Clarke. 269-277 [doi]
- Exploration of Learner Preferences and their Impact Within a Media Module Ingo Stengel, Oliver Schneider, Udo Bleimann. 279-288 [doi]
- Semantic Integration in TelecommunicationsVilho Räisänen. 291-300 [doi]
- Case Study on DiaHDL: A Web-based Electronic Design Automation Tool for Education PurposeMuhammad Shoaib Iqbal Ansari, Thomas Schumann. 301-305 [doi]
- One Way to Detecting of Link Spam Ruslan Vladimirovich Sharapov, Ekaterina Viktorovna Sharapova. 307-314 [doi]
- Updates of Compressed Dynamic XML DocumentsTomasz Müldner, Christopher Fry, Jan Krzysztof Miziolek, Tyler Corbin. 315-324 [doi]
- Commoditization as a Criterion for Semantic Service ProvisioningNormen Haas, Bernhard Humm, Ingo Stengel, Paul Walsh. 325-334 [doi]
- Quantitative and Qualitative Description of the Consumer to Provider Relation in the Context of Utility ComputingBenjamin Heckmann, Andrew D. Phippen. 335-344 [doi]
- Psycho-Analytical Considerations in Internet Marketing - Focusing on Human Needs And Personal TrustFelix Rimbach, Udo Bleimann, Steven Furnell. 345-354 [doi]
- ITO Success Factor Model - First Steps Towards a Guide for IT Outsourcing (ITO) SuccessKarin Kronawitter, Christoph Wentzel, Maria Papadaki. 355-359 [doi]
- High Level Semantic Networking - Using K-Infinity to Build a Multiontological Learning EnviromentRoland Böving, Udo Bleimann, Christoph Wentzel, Paul Walsh. 361-370 [doi]
- Towards a New Role Model in Virtual Teams: the Effects of "Elective Leadership"Ralf Friedrich, Udo Bleimann, Ingo Stengel, Paul Walsh. 371-374 [doi]
- Finding Reusable Units of Modelling - an Ontology ApproachMarcus Zinn, Klaus Peter Fischer-Hellmann, Andrew D. Phippen, Alois Schütte. 377-386 [doi]
- Towards a Complete and Minimal Basis for the Definition of Software Architecture LanguagesHüseyin Yüksel, Johannes Reichardt, Chris Johnson. 387-397 [doi]
- An Organizational Approach for Industrialized Systems IntegrationMatthias Minich, Bettina Harriehausen-Mühlbauer, Christoph Wentzel. 399-407 [doi]