Abstract is missing.
- From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networksHonglong Chen, Wei Lou. 1-8 [doi]
- RAPiD: An indirect rogue access points detection systemGuangzhi Qu, Michael M. Nefcy. 9-16 [doi]
- Towards dynamic self-tuning for intrusion detection systemsSun-il Kim, Nnamdi Nwanze, Jasen Kintner. 17-24 [doi]
- Secure localization against wormhole attacks using conflicting setsHonglong Chen, Wei Lou, Zhi Wang. 25-33 [doi]
- Cognitive Multi-Radio Mesh Networks on ISM bands: A cross-layer architectureWooseong Kim, Andreas J. Kassler, Marco Di Felice, Mario Gerla. 34-41 [doi]
- A non-uniform node deployment approach for event detection sensor networksXiaoguang Zhang, Zheng Da Wu. 42-49 [doi]
- EASARD: Towards an efficient Energy-Aware Service and Route Discovery scheme in MANETFatma Outay, Véronique Vèque, Ridha Bouallegue. 50-58 [doi]
- Incremental minimality: A property of optimal solutions for the minimum power broadcast tree problem in wireless ad hoc networksManki Min, Bipin C. Neupane. 59-66 [doi]
- Sender - Receiver cooperation and buffer observation for fine-grained adaptive transmission of video over mobile ad hoc networksPham Van Tien, Nguyen Thuy Chi, Nguyen Manh Thiep, Nguyen Van Tuyen, Dang Van Tuan, Nguyen Thanh Thuy, Nguyen Thi Thu Trang. 67-72 [doi]
- auto-AID: A data mining framework for autonomic anomaly identification in networked computer systemsQiang Guan, Song Fu. 73-80 [doi]
- Evaluation of a scalable and distributed mobile device video recording approach for accessible presentationsRaja S. Kushalnagar, Jehan-François Påris. 81-88 [doi]
- Reproducing non-deterministic bugs with lightweight recording in production environmentsNan Wang, Jizhong Han, Haiping Fu, Xubin He, Jinyun Fang. 89-96 [doi]
- Patient-centric hurricane evacuation management systemArny Ambrose, Mihaela Cardei, Ionut Cardei. 97-104 [doi]
- Optimized information discovery using self-adapting indices over Distributed Hash TablesFaraz Ahmed Memon, Daniel Tiebler, Frank Dürr, Kurt Rothermel. 105-113 [doi]
- ARM: An asynchronous receiver-initiated multichannel MAC protocol with duty cycling for WSNsJinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. 114-121 [doi]
- A QoS based routing protocol for wireless sensor networksMirela I. Fonoage, Mihaela Cardei, Arny Ambrose. 122-129 [doi]
- Statistical bandwidth scavenging for prioritized device coexistenceAnthony Plummer Jr., Mahmoud Taghizadeh, Subir Biswas. 130-137 [doi]
- Behavior monitoring framework in large-scale wireless sensor networksFeng Wang, Jianhua Gao. 138-145 [doi]
- A primal-dual approximation algorithm for the Minimum Cost Stashing problem in wireless sensor networksSalimur Choudhury, Kamrul Islam, Selim G. Akl. 146-152 [doi]
- Energy efficient scheduling for hard real-time systems with fixed-priority assignmentLinwei Niu. 153-160 [doi]
- ES-MPICH2: A Message Passing Interface with enhanced securityXiaojun Ruan, Qing Yang, Mohammed I. Alghamdi, Shu Yin, Zhiyang Ding, Jiong Xie, Joshua Lewis, Xiao Qin. 161-168 [doi]
- OS streaming deploymentDavid Clerc, Luis Garcés-Erice, Sean Rooney. 169-179 [doi]
- An automatic prefetching and caching systemJoshua Lewis, Mohammed I. Alghamdi, Mean Al Assaf, Xiaojun Ruan, Zhiyang Ding, Xiao Qin. 180-187 [doi]
- Loosely time-synchronized snapshots in object-based file systemsJan Stender, Mikael Högqvist, Björn Kolbeck. 188-197 [doi]
- Regression based multi-tier resource provisioning for session slowdown guaranteesSireesha Muppala, Xiaobo Zhou, Liqiang Zhang. 198-205 [doi]
- Online learning approaches in maximizing weighted throughputZhi Zhang, Fei Li, Songqing Chen. 206-213 [doi]
- Selfish misbehavior in scheduling algorithms of wireless networksGhazale Hosseinabadi, Nitin Vaidya. 214-221 [doi]
- Multiple description video multicast in MANETsOsamah S. Badarneh, Michel Kadoch. 222-230 [doi]
- FRuG: A benchmark for packet forwarding in future networksThilan Ganegedara, Weirong Jiang, Viktor K. Prasanna. 231-238 [doi]
- Soft error propagation in floating-point programsSha Li, Xiaoming Li. 239-246 [doi]
- Real-time models supporting resource management decisions in highly variable systemsSara Casolari, Michele Colajanni, Stefania Tosi, Francesco Lo Presti. 247-254 [doi]
- Mnemonic Lossy Counting: An efficient and accurate heavy-hitters identification algorithmQiong Rong, Guangxing Zhang, Gaogang Xie, Kavé Salamatian. 255-262 [doi]
- Internet topology on as-level: Model, generation methods and toolJoanna Tomasik, Marc-Antoine Weisser. 263-270 [doi]
- A time dependent performance model for multihop wireless networks with CBR trafficKunjie Xu, Siriluck Tipmongkonsilp, David Tipper, Prashant Krishnamurthy, Yi Qian. 271-280 [doi]
- Modelling the behavior of a beacon-based link sensing mechanism with variable sensing rangeGeir Egeland, Paal E. Engelstad. 281-288 [doi]
- Tuning ZRP framework for CR networks and MANETsMankanala N. SreeRangaRaju, Jitendranath Mungara. 289-293 [doi]
- Effects of channel SNR in mobile cognitive radios and coexisting deployment of cognitive wireless sensor networksVasanth Iyer, S. Sitharama Iyengar, Garimiela Rama Murthy, Nandan Parameswaran, Dhananjay Singh, Mandalika B. Srinivas. 294-301 [doi]
- Traffic eavesdropping based scheme to deliver time-sensitive data in sensor networksKhaled Daabaj, Michael Dixon, Terry Koziniec. 302-308 [doi]
- Performance evaluation of CDMA packet networks in Nakagami fadingJen-Shiun Chen. 309-314 [doi]
- Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoringCharles A. Kamhoua, Niki Pissinou, Alan Busovaca, Kia Makki. 315-324 [doi]
- Hardware-assisted security mechanism: The acceleration of cryptographic operations with low hardware costJed Kao-Tung Chang, Shaoshan Liu, Jean-Luc Gaudiot, Chen Liu. 327-328 [doi]
- Profiling and analysis of power consumption for virtualized systems and applicationsZiming Zhang, Song Fu. 329-330 [doi]
- Modeling of non-gaussian noise effect on DSL linesRodolpho G. de Siqueira, Rodrigo Perazzo, Djamel Sadok. 331-332 [doi]
- Virtual machine auto-configuration for web applicationYang Wang, Mengyu Qiao. 333-334 [doi]