Abstract is missing.
- A QoS Framework to Support Integrated Services in Multihop Wireless Networks with Infrastructure SupportHuiqing Wang, Kin Choong Yow. 1-8 [doi]
- Mobility Support of Multi-User Services in Next Generation Wireless SystemsLuis Veloso, Paulo Mendes, Edmundo Monteiro. 9-18 [doi]
- A Malware Signature Extraction and Detection Method Applied to Mobile NetworksGuoning Hu, Deepak Venugopal. 19-26 [doi]
- An Additive Increase Smooth Decrease (AISD) Strategy for Data and Streaming ApplicationsSivakumar Bakthavachalu, Steven Bassi, Xu Jianxuan, Miguel A. Labrador. 27-34 [doi]
- TCP Vegas Performance with Streaming MediaSean D. Boyden, Anirban Mahanti, Carey L. Williamson. 35-44 [doi]
- Stochastic Fair Traffic Management for Efficient and Robust IP NetworkingJae Chung, Mark Claypool, Robert E. Kinicki. 45-54 [doi]
- Memory Performance and Scalability of Intel s and AMD s Dual-Core Processors: A Case StudyLu Peng, Jih-Kwon Peir, Tribuvan K. Prakash, Yen-Kuang Chen, David M. Koppelman. 55-64 [doi]
- Application Insight Through Performance ModelingGabriel Marin, John M. Mellor-Crummey. 65-74 [doi]
- Ensuring Performance in Activity-Based File RelocationJoel C. Wu, Bo Hong, Scott A. Brandt. 75-84 [doi]
- O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor NetworksMy T. Thai, Yingshu Li, Feng Wang 0002. 85-92 [doi]
- Optimal Cluster Head Selection in the LEACH ArchitectureHaiming Yang, Biplab Sikdar. 93-100 [doi]
- Moving Schemes for Mobile Sinks in Wireless Sensor NetworksYanzhong Bi, Jianwei Niu, Limin Sun, Wei Huangfu, Yi Sun. 101-108 [doi]
- Performance Guarantees for Flow-Mapping Parallel Packet SwitchLei Shi, Gao Xia, Bin Liu. 109-116 [doi]
- A Queue-based Adaptive Polling Scheme to Improve System Performance in Gigabit Ethernet NetworksXiaolin Chang, Jogesh K. Muppala, Wei Kong, Pengcheng Zou, Xiangkai Li, Zhongyuan Zheng. 117-124 [doi]
- A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False PositivesMiguel Jimeno, Kenneth J. Christensen, Allen Roginsky. 125-133 [doi]
- Analysis of Queuing Delay in RPR NetworksBehnoosh Hariri, Mohammad Reza Pakravan. 134-141 [doi]
- A Low Bound for Broadcast in Optical Networks of Bounded Treewidth Using Fewest ConvertersTong Yi, Guoli Ding, Bogdan Oporowski. 142-149 [doi]
- Performance Evaluation of Optimized Link State Routing-based LocalizationTomoya Takenaka, Hiroshi Mineno, Yuichi Tokunaga, Naoto Miyauchi, Tadanori Mizuno. 150-159 [doi]
- Rerouting Time and Queueing in Proactive Ad Hoc NetworksVinh Pham, Erlend Larsen, Knut Øvsthus, Paal E. Engelstad, Øivind Kure. 160-169 [doi]
- Priority-Ensured Medium Access in Ad Hoc NetworksJun Peng, Liang Cheng. 170-177 [doi]
- Streaming in MANET: Proactive Link Protection and Receiver-Oriented AdaptationToby Xu, Ymg Cai. 178-185 [doi]
- Understanding Localized-Scanning WormsZesheng Chen, Chao Chen, Chuanyi Ji. 186-193 [doi]
- An Application Layer Extension for Multipoint Communication for the Session Initiation ProtocolBrian J. Thorp, Scott F. Midkiff. 194-201 [doi]
- Scalable and Decentralized Content-Aware Dispatching in Web ClustersZhiyong Xu, Jizhong Han, Laxmi N. Bhuyan. 202-209 [doi]
- Scheduling of Periodic Packets in Energy-Aware Wireless NetworksXiao Qin, Mohammed I. Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam. 210-217 [doi]
- Adaptive Transmission Scheme in IEEE 802.16 WMAN with Error Prone ChannelHaitang Wang, Dharma P. Agrawal, Qing-An Zeng. 218-225 [doi]
- A Model-Based Admission Control for 802.11e EDCA using Delay PredictionsA. Bai, Tor Skeie, Paal E. Engelstad. 226-235 [doi]
- A Hybrid Disk-Aware Spin-Down Algorithm with I/O Subsystem SupportTimothy Bisson, Scott A. Brandt, Darrell D. E. Long. 236-245 [doi]
- Self-Adaptive Two-Dimensional RAID ArraysJehan-François Pâris, Thomas J. E. Schwarz, Darrell D. E. Long. 246-253 [doi]
- Hierarchical Policy-Based ReplicationCormac J. Doherty, Neil J. Hurley. 254-263 [doi]
- Composite Event Detection in Wireless Sensor NetworksChinh T. Vu, Raheem A. Beyah, Yingshu Li. 264-271 [doi]
- Detecting Misused Keys in Wireless Sensor NetworksDonggang Liu, Qi Dong. 272-280 [doi]
- C2AP: Coverage-aware and Connectivity-constrained Actor Positioning in Wireless Sensor and Actor NetworksKemal Akkaya, Mohamed F. Younis. 281-288 [doi]
- How to Assign Traffic Sources to Nodes in Disaster Area ScenariosNils Aschenbruck, Peter Martini, Michael Gerharz. 289-296 [doi]
- On Frugality of Control Packets in Multi-Hop Wireless NetworksNoun Choi, S. Venkatesan. 297-305 [doi]
- Performance Evaluation of Energy Efficient Ad Hoc Routing ProtocolsLijuan Cao, Teresa A. Dahlberg, Yu Wang. 306-313 [doi]
- Workload Characterization for News-on-Demand Streaming ServicesFrank T. Johnsen, Trude Hafsoe, Carsten Griwodz, Pål Halvorsen. 314-323 [doi]
- Automatic Generation of User-Centric Multimedia Communication ServicesRaju Rangaswami, Seyed Masoud Sadjadi, Nagarajan Prabakar, Yi Deng. 324-331 [doi]
- On Network Coding Based Multirate Video Streaming in Directed NetworksChen-guang Xu, Yinlong Xu, Cheng Zhan, Ruizhe Wu, Qingshan Wang. 332-339 [doi]
- Peer-to-Peer Multimedia Streaming Using BitTorrentPurvi Shah, Jehan-François Pâris. 340-347 [doi]
- Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition ApproachZhibin Zhang, Li Guo, Binxing Fang, Xiaojun Chen. 348-355 [doi]
- Scheduling Divisible Loads on Bus Networks with Arbitrary Processor Release Time and Start-Up Costs: XRMIJie Hu, Raymond Klefstad. 356-364 [doi]
- Reducing ALU and Register File Energy by Dynamic Zero DetectionSoontae Kim. 365-371 [doi]
- Compiler-Directed Functional Unit Shutdown for Microarchitecture Power OptimizationSantosh Talli, Ram Srinivasan, Jeanine Cook. 372-379 [doi]
- Components and Analysis of Disaster Tolerant ComputingChad M. Lawler, Michael A. Harper, Mitchell A. Thornton. 380-386 [doi]
- Applications of the Oriented Permission Role-Based Access Control ModelLiang Chen, Jason Crampton. 387-394 [doi]
- A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-CommercePallapa Venkataram, B. Sathish Babu, M. K. Naveen, G. H. Samyama Gungal. 395-401 [doi]
- Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving Association Rule Mining in Vertically Partitioned DataDragos Trinca, Sanguthevar Rajasekaran. 402-409 [doi]
- Classification Model for Access Control ConstraintsMathias Kohler, Christian Liesegang, Andreas Schaad. 410-417 [doi]
- An Efficient Technique for Preventing Mimicry and Impossible Paths Execution AttacksDanilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi. 418-425 [doi]
- Threat Analysis of the Session Initiation Protocol Regarding SpamStelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis. 426-433 [doi]
- Diversified Process Replicæ for Defeating Memory Error ExploitsDanilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi. 434-441 [doi]
- Towards Survivable and Secure Wireless Sensor NetworksYi Qian, Kejie Lu, David Tipper. 442-448 [doi]
- Profiling Database Application to Detect SQL Injection AttacksElisa Bertino, Ashish Kamra, James P. Early. 449-458 [doi]
- GKM: A Group Dynamics Aware Key Management Scheme for Multicast Communications in Ad-hoc Sensor NetworksHui Ling, Taieb Znati. 459-466 [doi]
- CT-RBAC: A Temporal RBAC Model with Conditional Periodic TimeKai Ouyang, James B. D. Joshi. 467-474 [doi]
- Epidemics of Mobile WormsYuriy Bulygin. 475-478 [doi]
- Applying Formal Evaluation to Worm Defense DesignRaman Sharykin, Phillip A. Porras. 479-486 [doi]
- Inverse Geolocation: Worms with a Sense of DirectionRandal Acton, Nathan Friess, John Aycock. 487-493 [doi]
- PID: A Queue Management Scheme for Improving Network Resilience Under Worm AttacksJintao Xiong. 494-501 [doi]
- SpyCon: Emulating User Activities to Detect Evasive SpywareMadhusudhanan Chandrasekaran, Vidyaraman Vidyaraman, Shambhu J. Upadhyaya. 502-509 [doi]
- d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent WormsNobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada. 510-517 [doi]
- Optimising Networks Against MalwarePierre-Marc Bureau, José M. Fernández. 518-527 [doi]
- Using Byzantine Agreement in the Design Of IPS SystemsFernando C. Colón Osorio. 528-537 [doi]
- Dynamic and User-Centric Network Selection in Heterogeneous NetworksXuejun Cai, Ling Chen, Rute Sofia, Yanqi Wu. 538-544 [doi]
- The Interworking between EDCA 802.11e and DiffServAsma A. Elmangosh, Majdi A. Ashibani, Fathi B. Shatwan. 545-550 [doi]
- A New Channel Allocation Scheme for Real-Time Traffic in Wireless Cellular NetworksV. Chaudhary, R. Tripathi, N. K. Shukla, N. Nasser. 551-555 [doi]
- First Responders Crystal Ball: How to Scry the Emergency from a Remote VehicleMarco Roccetti, Mario Gerla, Claudio E. Palazzi, Stefano Ferretti, Giovanni Pau. 556-561 [doi]
- ACM: A Transmission Mechanism for Urgent Sensor InformationTetsuya Kawai, Naoki Wakamiya, Masayuki Murata. 562-569 [doi]
- QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical InfrastructuresF. Richard Yu, Helen Tang, Victor C. M. Leung. 570-575 [doi]
- A Traffic Chaos Reduction Approach for Emergency ScenariosSyed Rashid Ali Rizvi, Stephan Olariu, Mona E. Rizvi, Michele C. Weigle. 576-578 [doi]
- A Reliable Wireless Mesh Infrastructure Deployment at Crisis SiteRaheleh B. Dilmaghani, Ramesh R. Rao. 579-581 [doi]
- Rover: An Integration and Fusion Platform to Enhance Situational AwarenessChristian B. Almazan, Moustafa Youssef, Ashok K. Agrawala. 582-587 [doi]
- Opportunistic Networks for Emergency Applications and Their Standard Implementation FrameworkLeszek Lilien, Ajay K. Gupta, Zijiang Yang. 588-593 [doi]
- Intelligent Highway Infrastructure for Planned EvacuationsMichele C. Weigle, Stephan Olariu. 594-599 [doi]
- A Gossip-Style Crash Faults Detection Protocol for Wireless Ad-Hoc and Mesh NetworksMourad Elhadef, Azzedine Boukerche. 600-605 [doi]
- LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering PointsHenning Schulzrinne, Hannes Tschofenig, Andrew Newton, Ted Hardie. 606-611 [doi]
- Adaptive Probabilistic Scheduling for a Cellular Emergency NetworkJiazhen Zhou, C. Beard. 612-618 [doi]
- IMPACT - A Family of Cross-Layer Transmission Protocols for Wireless Sensor NetworksMarcin Brzozowski, Reinhardt Karnapke, Jörg Nolte. 619-625 [doi]
- Protecting First-Level Responder Resources in an IP-based Emergency Services ArchitectureHannes Tschofenig, Henning Schulzrinne, Murugaraj Shanmugam, Andrew Newton. 626-631 [doi]