Abstract is missing.
- Committees and chairs [doi]
- Reviewers [doi]
- Author Index [doi]
- Technical program committee [doi]
- Message from the technical program chairs [doi]
- Message from the general co-chairs [doi]
- The construction of a novel agent fault-tolerant migration modelYichuan Jiang, ZhengYou Xia, YiPing Zhong, Shiyong Zhang. 1-6 [doi]
- Adaptive applications of intelligent agentsIbrahim F. Imam. 7-12 [doi]
- The performance server: rational server selection for mobile agentsCarsten Pils, Klaus Deissner, Stefan Diepolder, Jan Kritzner. 13-18 [doi]
- Agent-based autonomous information services integration and allocation to achieve high response and low cost in distributed information service systemXiaodong Lu, Ivan Luque, Miho Kanda, Kinji Mori. 19-24 [doi]
- Agent coordination in the mobile agent P2P architecture for supporting mobile devices in a Gnutella file-sharing networkTim Hsin-Ting Hu, Binh Thai, Aruna Seneviratne. 25-30 [doi]
- A workflow-based dynamic scheduling approach for Web services platformsMuhammed S. Peerbocus, Zahir Tari. 31-37 [doi]
- Enabling Web services: towards service gridsDionisis X. Adamopoulos, Constantine A. Papandreou. 38-43 [doi]
- Integrating Web services into map image applicationsShengru Tu, Eric Normand, S. Kuchimanchi, V. Bizot, S. Shu, Mahdi Abdelguerfi, Jay J. Ratcliff, Kevin Shaw. 44-49 [doi]
- A new efficient micropayment scheme against overspendingWeimin Lang, Zongkai Yang, Gan Liu, Wenqing Cheng, Yunmeng Tan. 50-55 [doi]
- A performance study on Internet Server Provider mail serversJun Wang, Yiming Hu. 56-61 [doi]
- Scheduling real time parallel structures on cluster computing with possible processor failuresA. Amin, R. Ammar, A. El Dessouly. 62-67 [doi]
- Reliability oriented task allocation in heterogeneous distributed computing systemsGamal Attiya, Yskandar Hamam. 68-73 [doi]
- A methodology to compute task remaining execution timeSarah Tasneem, Reda A. Ammar, Howard A. Sholl. 74-79 [doi]
- On the grooming of multicast traffic in WDM networksRazaRaza Ul-Mustafa, Ahmed E. Kamal. 76-81 [doi]
- Routing based workflow for construction of distributed applicationsWanjun Huang, Xinhua Zhang, Uwe Roth, Christoph Meinel. 80-85 [doi]
- Optimized external scheduling for fair service discriminationAsser N. Tantawi. 86-91 [doi]
- Functional networks training algorithm for statistical pattern recognitionEmad A. El-Sebakhy. 92-97 [doi]
- A new classification sentence technique using intension expressionsKazuhiro Morita, El-Sayed Atlam, Masao Fuketa, Yuki Kadoya, Toru Sumitomo, Jun-Ichi Aoe. 98-103 [doi]
- A compact memory space of dynamic full-text search using Bi-gram indexEl-Sayed Atlam, Elmarhomy Ghada, Masao Fuketa, Kazuhiro Morita, Jun-Ichi Aoe. 104-109 [doi]
- Genetic algorithms based optimization of membership functions for fuzzy weighted association rules miningMehmet Kaya, Reda Alhajj. 110-115 [doi]
- Using divide-and-conquer GA strategy in fuzzy data miningTzung-Pei Hong, Chun-Hao Chen, Yu-Lung Wu, Yeong-Chyi Lee. 116-121 [doi]
- An new E-mail filtering technique using time priority measurementToru Sumitomo, Yuki Kadoya, Masao Fuketa, Kazuhiro Morita, Shinkaku Kashiji, Jun-Ichi Aoe. 122-127 [doi]
- Discovery of fuzzy inclusion dependencies in fuzzy relational databasesAwadhesh Kumar Sharma, A. Goswami, D. K. Gupta. 128-133 [doi]
- FTS relational data model for source-aware fuzzy relational multidatabasesAwadhesh Kumar Sharma, A. Goswami, D. K. Gupta. 134-139 [doi]
- Modeling and analysis of a multilevel caching in distributed database systemsDoaa S. El Zanfaly, Reda A. Ammar, A. S. Eldin. 140-145 [doi]
- The use of SQO rules in DMLsAyla Sayli, Bora Gökçe. 146-151 [doi]
- Performance evaluation of hybrid environments with mobile gatewaysHabib M. Ammari, Hesham El-Rewini. 152-157 [doi]
- Enhancing the support of multihopping in an IEEE 802.11 ad-hoc networkH. A. ElAdly, Thomas M. Chen. 158-163 [doi]
- Merging and partitioning in ad hoc networksMaria Fazio, Massimo Villari, Antonio Puliafito. 164-169 [doi]
- Bluetooth scatternet formation for single-hop ad hoc networks based on virtual positionsYu Wang, Ivan Stojmenovic, Xiang-Yang Li. 170-175 [doi]
- Achieving MAC fairness in wireless ad-hoc networks using adaptive transmission controlZhifei Li, Sukumar Nandi, Anil K. Gupta. 176-181 [doi]
- Achieving loop-free incremental routing in ad hoc networksHari Rangarajan, J. J. Garcia-Luna-Aceves. 182-187 [doi]
- A connectionless approach to mobile ad hoc networksYao Hua Ho, Ai Hua Ho, Kien A. Hua, Georgiana L. Hamza-Lup. 188-195 [doi]
- Dynamic survivable resource pooling in mobile ad-hoc networksMariusz A. Fecko, Ulas C. Kozat, Sunil Samtani, M. Ümit Uyar, Ibrahim Hökelek. 196-201 [doi]
- Power aware image transmission in energy constrained wireless networksHuaming Wu, Alhussein A. Abouzeid. 202-207 [doi]
- PatchPSMP: an extension of NSMP based on pool nodeCai ShaoBin, Yang XiaoZong, Yao WenBin. 208-213 [doi]
- An adaptive coordinated medium access control for wireless sensor networksJing Ai, Jingfei Kong, Damla Turgut. 214-219 [doi]
- Improving the reliability of event reports in wireless sensor networksW. Yuan, Srikanth V. Krishnamurthy, Satish K. Tripathi. 220-225 [doi]
- On the correlated data gathering problem in wireless sensor networksJamal N. Al-Karaki, Ahmed E. Kamal. 226-231 [doi]
- Reliable data delivery in event-driven wireless sensor networksHari Rangarajan, J. J. Garcia-Luna-Aceves. 232-237 [doi]
- Solar-aware clustering in wireless sensor networksThiemo Voigt, Adam Dunkels, Juan Alonso, Hartmut Ritter, Jochen H. Schiller. 238-243 [doi]
- WiseMAC: an ultra low power MAC protocol for the downlink of infrastructure wireless sensor networksAmre El-Hoiydi, Jean-Dominique Decotignie. 244-251 [doi]
- Linear program formulation for routing problem in OBS networksEsa Hyytiä, L. Nieminen. 252-257 [doi]
- Performance evaluation of visible-light wireless communication system using white LED lightingsT. Komine, M. Nakagawa. 258-263 [doi]
- A new analytical model for computing blocking probability in optical burst switching networksAyman Kaheel, Hussein M. Alnuweiri, Fayez Gebali. 264-269 [doi]
- All-optical logic circuits based on the nonlinear properties of the semiconductor optical amplifierN. Elfaramawy, A. Awad. 270-275 [doi]
- On multicast traffic grooming in WDM networksAhmad Khalil, Chadi Assi, Antonis Hadjiantonis, Georgios Ellinas, Mohamed A. Ali. 282-287 [doi]
- Routing in all-optical ring networks revisitedStamatis Stefanakos, Thomas Erlebach. 288-293 [doi]
- Integrated traffic grooming in converged data-optical networksNasir Ghani, Chadi Assi, Abdallah Shami, Mohamed A. Ali. 294-299 [doi]
- Restoration techniques and delay analysis for fault recovery in WDM networksM. R. Ahmadi. 300-305 [doi]
- Optimized security of WAP based on modification of encryption algorithm for PKQ cryptosystem in mobile networksT. M. Barakat, I. I. Ismail, I. A. Ali, N. Abdrabouh. 306-311 [doi]
- Energy-efficient placement/activation algorithms for authorization servers in sensor networkS. Ray, K. Kwiat, D. Zhang. 312-317 [doi]
- A framework for integrated Internet and ad hoc network securityBin Xie, A. Kumar. 318-324 [doi]
- EDKM: efficient distributed key management for mobile ad hoc networksO. M. Erdem. 325-330 [doi]
- A fully distributed IDS for MANETRicardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Rafael T. de Sousa Jr.. 331-338 [doi]
- Detecting DDoS attacks with passive measurement based heuristicsChristos Siaterlis, Basil S. Maglaris. 339-344 [doi]
- Defense against low-rate TCP-targeted denial-of-service attacksGuang Yang, Mario Gerla, M. Y. Sanadidi. 345-350 [doi]
- A denial-of-service-resistant IP traceback approachBao-Tung Wang, Henning Schulzrinne. 351-356 [doi]
- Protecting integrity and confidentiality for data communicationFangyong Hou, Zhiying Wang, Yuhua Tang, Zhen Liu. 357-362 [doi]
- A:::2:::cast: an adaptive source authentication protocol for multicast streamsYacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah. 363-368 [doi]
- An access control policy for active networksZhengYou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang. 369-374 [doi]
- Quantum m-out-of-n oblivious transferZhide Chen, Hong Zhu. 375-380 [doi]
- Provably secure entity authentication the three party caseA. M. Allam, I. I. Ibrahim, I. A. Ali, A. E. H. Elsawy. 381-385 [doi]
- Revocation invocation for accountable anonymous PKI certificate treesD. Critchlow, Ning Zhang. 386-392 [doi]
- A framework for protecting Web services with IPsecCássio Ditzel Kropiwiec, Edgard Jamhour, Carlos Maziero. 393-398 [doi]
- A secure proxy signature protocol for agent-based M-commerce applicationsOmaima Bamasak, Ning Zhang. 399-406 [doi]
- A new efficient ID-based proxy blind signature schemeWeimin Lang, Yunmeng Tan, Zongkai Yang, Gan Liu, Bing Peng. 407-411 [doi]
- A secure and fair DSA-based signature exchange protocolAleksandra Nenadic, Ning Zhang, Stephen Barton. 412-417 [doi]
- Finding suitable differential characteristics for block ciphers with Ant colony techniqueAbbas Ghaemi Bafghi, Babak Sadeghiyan. 418-423 [doi]
- An identity-based proxy ring signature scheme from bilinear pairingsWenqing Cheng, Weimin Lang, Zongkai Yang, Gan Liu, Yunmeng Tan. 424-429 [doi]
- High capacity image steganography using wavelet-based fusionMohamed Fahmy Tolba, M. Al-Said Ghonemy, Ismail Abdoul-Hameed Taha, Amal Said Khalifa. 430-435 [doi]
- Downlink resource allocation for data traffic in heterogenous cellular CDMA networksM. Shabany, Keivan Navaie, Elvino S. Sousa. 436-441 [doi]
- Joint rate allocation and routing scheme in multihop cellular CDMA networksM. Shabany, Elvino S. Sousa. 442-447 [doi]
- Adaptive multimedia traffic multiplexing for dedicated channels in the UMTS systemJosé Ramón Gállego, A. Hernandez-Solaria, María Canales, Antonio Valdovinos. 448-453 [doi]
- QoS-guaranteed call admission scheme for broadband multiservices mobile wireless networksGan Liu, Weimin Lang, Weimin Wu, Youlin Ruan, Xiaofeng Shen, Guangxi Zhu. 454-459 [doi]
- Resource reservation in mobile wireless networksDario Bruneo, Luca Paladina, Maurizio Paone, Antonio Puliafito. 460-465 [doi]
- Experimental analysis of an application-independent energy management policy for Wi-Fi hotspotsGiuseppe Anastasi, Marco Conti, Enrico Gregori, Andrea Passarella. 466-471 [doi]
- A multiplex-multicast scheme that improves system capacity of voice-over-IP on wireless LAN by 100 Wei Wang, Soung C. Liew, Qixiang Pang, Victor O. K. Li. 472-477 [doi]
- Enhanced service differentiation extensions for the IEEE 802.11a wireless networkSeongkwan Kim, Sangwook Kang, Sunshin An. 478-483 [doi]
- Distributed and centralized algorithms for large-scale IEEE 802.11b infrastructure planningEnrique Costa-Montenegro, Francisco J. González-Castaño, Ubaldo M. García-Palomares, M. Vilas-Paz, Pedro S. Rodríguez-Hernández. 484-491 [doi]
- Improving wireless connectivity for mobile computing environmentsZ. G. Zhou, Aruna Seneviratne. 492-497 [doi]
- MUM: a middleware for the provisioning of continuous services to mobile usersPaolo Bellavista, Antonio Corradi, Luca Foschini. 498-505 [doi]
- Mobility management for multicast sessions in a UMTS-IP converged environmentGeorgios Leoleis, Lila Dimopoulou, Vaggelis Nikas, Iakovos S. Venieris. 506-511 [doi]
- Performance analysis of a hybrid push-pull algorithm with QoS adaptations in wireless networksAzzedine Boukerche, Trivikram Dash, Maria Cristina Pinotti. 512-524 [doi]
- Cooperative location management method in next generation cellular networksS. M. S. Masajedian, H. Khoshbin. 525-530 [doi]
- A QoS management middleware based on mobility prediction for multimedia service continuity in the wireless InternetPaolo Bellavista, Antonio Corradi. 531-538 [doi]
- Improving wireless link throughput via interleaved FECLing-Jyh Chen, Tony Sun, M. Y. Sanadidi, Mario Gerla. 539-544 [doi]
- G-Snoop: enhancing TCP performance over wireless networksKui-Fai Leung, Kwan Lawrence Yeung. 545-550 [doi]
- TCP-swift: an end-host enhancement scheme for TCP over satellite IP networksKui-Fai Leung, Kwan Lawrence Yeung. 551-555 [doi]
- An efficient fault-tolerant multicast approach for wireless mobile systemsJenn-Wei Lin. 556-561 [doi]
- Base station assisted search approach for mitigation of pilot pollution interferenceAnup Kumar, Mostafa M. El-Said, Adel Said Elmaghraby. 562-567 [doi]
- Wireless sporadic communication protocol for supporting cluster-to-base station communicationSayaka Harada, Hiroaki Higaki. 568-573 [doi]
- DFT based transceivers with-windowingYuan-Pei Lin, See-May Phoong. 574-579 [doi]
- Recognizing emotions for the audio-visual document indexingSee-May Phoong, Georges Quénot, Eric Castelli. 580-584 [doi]
- Accelerating fractal image compression by domain pool reduction adaptive partitioning and structural block classificationB. Aoued. 585-589 [doi]
- Design of odd-periodic complementary binary signal setHong Wen, Fei Hu, Fan Jin. 590-593 [doi]
- Semiblind estimation of time varying STFBC-OFDM channels using Kalman filter and CMAMohamed A. S. Hassan, Bayan S. Sharif, Wai Lok Woo, S. Jimaa. 594-599 [doi]
- Interleaving harmonic broadcasting and receiving scheme with loss-anticipation deliveryHung-Chang Yang, Hsiang-Fu Yu, Li-Ming Tseng, Yi-Ming Chen. 600-605 [doi]
- A heuristic approach to optimization of the decision-directed maximum-likelihood feedforward carrier phase error detection algorithmReza Danesfahani, Tony Jeans. 606-609 [doi]
- Nonlinear space-time multiuser detector for non-Gaussian channelsA. M. Hmidat, Bayan S. Sharif, Wai Lok Woo, S. A. Jimma. 610-614 [doi]
- Distortion-optimized FEC for unequal error protection in MPEG-4 video deliveryImed Bouazizi, Mesut Günes. 615-620 [doi]
- Optical CDMA protocol with selective retransmissionM. A. A. Mohamed, Hossam M. H. Shalaby, El-Sayed A. El-Badawy. 621-626 [doi]
- Performance analyses of DPSK-FFHSS and DPSK-FFH-SSMA systems over Nakagami fading channelsChaiyaporn Khemapatapan, Watit Benjapolakul. 627-632 [doi]
- Time-series model for wireless fading channels in isotropic and non-isotropic scattering environmentsP. Sharma. 633-638 [doi]
- Evaluating and improving Bluetooth piconet performance over Nakagami-m fading channelsJoão H. Kleinschmidt, Marcelo Eduardo Pellenz, Luiz A. Paula Lima Jr.. 639-644 [doi]
- Closed-form results for the BER of maximal ratio combining with channel estimation errors in Ricean fading channelsLingzhi Cao, Norman C. Beaulieu. 645-650 [doi]
- Adaptive LDPC for Rayleigh fading channelYuling Zhang, Dongfeng Yuan, Haigang Zhang. 651-656 [doi]
- Generalized regression neural network prediction model for indoor environmentIleana Popescu, Philip Constantinou, M. Nafornita, Ioan Nafornita. 657-661 [doi]
- Progressive time series visualization in a mobile environmentTak-Chung Fu, Fu-Lai Chung, Robert Wing Pong Luk, Chak-man Ng. 662-667 [doi]
- A fast convergent scheme for the Doppler shift estimation in mobile communication systemsHua Jing-Yu, You Xiao-Hu, Sheng Bin, W. Martin, S. Egon. 668-671 [doi]
- MDP-based OVSF code assignment scheme and call admission control for wideband-CDMA communicationsMin-Xiou Chen, Ben-Jye Chang, Ren-Hung Hwang, Jun-Fan Juang. 672-677 [doi]
- A baseband receiver architecture for UMTS-WLAN interworking applicationsLasse Harju, Jari Nurmi. 678-685 [doi]
- Performance analysis of cooperative macro-diversity in mobile cellular networksWeijun Cheng, Laibo Zheng, Jiandong Hu. 686-689 [doi]
- Path loss model for TETRA networks in metropolitan areasN. E. Rittas, A. G. Asimakopoulos, D. G. Xenikos. 690-695 [doi]
- Capacity of M-ary PAM impulse radio with various derivatives of Gaussian pulse subject to FCC spectral masksTao Wang, Yong Wang. 696-701 [doi]
- Reverse link performance improvement for an wideband OFDM using Alamouti coded heterogeneous polarization antennasChang-Jun Ahn, K. Kamio, Satoshi Takahashi, Hiroshi Harada. 702-707 [doi]
- A novel ICI cancellation scheme to reduce both frequency offset and IQ imbalance effects in OFDMK. Sathananthan, Chandranath R. N. Athaudage, B. Qiu. 708-713 [doi]
- Radio coverage measurements into tunnel with leaky section radiating cableNikolaos Papanikolaou 0002, A. Spanakis, D. Apostolakis, Philip Constantinou. 714-719 [doi]
- Design of a new class of spreading sequence using chaotic dynamical systems for asynchronous DS-CDMA applicationsA. Mirzaee, H. Aghaeinia. 720-724 [doi]
- PAPR reduction by combining selected mapping and selected spreading code in MC-CDMA systemsS. Ruangsuthinarupap, K. M. Ahmed, W. A. C. Fernando, M. E. R. Khan. 725-729 [doi]
- Extended framework for delay-constrained multipoint-to-multipoint communicationAyse Karaman, Hossam S. Hassanein. 730-735 [doi]
- Oblivious router policies and Nash equilibriumJuan A. Almendral, Luis L. Fernández, Vicent Cholvi, Miguel A. F. Sanjuán. 736-741 [doi]
- Using fuzzy-PI controller in active queue managementMiao Zhang, Fengyuan Ren, Jianping Wu, Ke Xu. 742-747 [doi]
- Design a robust controller for active queue management in large delay networksFengyuan Ren, Chuang Lin, Bo Wei. 748-754 [doi]
- Reserve price in progressive second price auctionsA. Delenda, Patrick Maillé, Bruno Tuffin. 755-759 [doi]
- Providing soft bandwidth guarantees using elastic TCP-based tunnelsMina Guirguis, Azer Bestavros, Ibrahim Matta, Niky Riga, G. Diamant, Yuting Zhang. 760-765 [doi]
- Availability aware cost modeling of mesh architectures for long-haul networksHakki C. Cankaya, A. Lardies, G. W. Ester. 766-771 [doi]
- Congestion analysis during outage, congestion treatment and outage recovery for simple GPRS networksPaolo Lollini, Andrea Bondavalli, Felicita Di Giandomenico, Stefano Porcarelli. 772-778 [doi]
- Availability analysis and simulation of mesh restoration networksHassan Naser, Hussein T. Mouftah. 779-785 [doi]
- A hierarchical analysis of access multiplexers with multimedia trafficS. Ghani, M. Schwartz. 786-791 [doi]
- Performance analysis of DBA scheme with interleaved polling algorithm in an Ethernet PONChul Geun Park, Ho Suk Jung, Dong Hwan Han, Yutae Lee. 792-797 [doi]
- Modeling the contention mechanism of DOCSIS in HFC networksKai-Chien Chang, Wanjiun Liao. 798-803 [doi]
- Service differentiation at transport layer via TCP Westwood low-priority (TCPW-LP)Hideyuki Shimonishi, M. Y. Sanadidi, Mario Gerla. 804-809 [doi]
- Preferential treatment of SCTP subflows: analysis and simulationJianping Zou, M. Ümit Uyar, Mariusz A. Fecko, Sunil Samtani. 810-815 [doi]
- Admission control placement in differentiated services networksStylianos Georgoulas, Panos Trimintzios, George Pavlou. 816-821 [doi]
- End-to-end jitter minimization with TCM for real-time multimedia traffic in DiffServ networksTsang-Ling Sheu, Bing-Chi Kuo. 822-827 [doi]
- SPLIT: A priority based TCP-friendly video protocolNaveen K. Chilamkurti, Ben Soh, A. Aitham. 828-833 [doi]
- Optimal solution of total routing table size for hierarchical networksJie Lian, S. Naik, Gordon B. Agnew. 834-839 [doi]
- A B-tree dynamic router-table designHaibin Lu, Sartaj K. Sahni. 840-845 [doi]
- HCASP: A hop-constrained adaptive shortest-path algorithm for routing bandwidth-guaranteed tunnels in MPLS networksK. M. Elsayed. 846-851 [doi]
- Integrating path computation and precomputation for quality-of-service provisioningHanan H. Elazhary, Swapna S. Gokhale. 852-857 [doi]
- Dynamic IP router-tables using highest-priority matchingHaibin Lu, Sartaj K. Sahni. 858-863 [doi]
- Supporting service differentiation through end-to-end QoS routingHossam S. Hassanein, Jian Zhao. 864-869 [doi]
- A limited path unicast QoS routing algorithmYanxing Zheng, Jing Tian, Zhifeng Liu, Wenhua Dou. 870-875 [doi]
- Cost efficient overflow routing for outbound ISP trafficAlexander A. Kist, Richard J. Harris. 876-882 [doi]
- Impact of routing and traffic distribution on the performance of network admission controlMichael Menth, Jens Milbrandt, Stefan Kopf. 883-890 [doi]
- Generalized pursuit learning algorithms for shortest path routing tree computationSudip Misra, B. John Oommen. 891-896 [doi]
- QoS support for interactive communication with DVB/RCS satellitesTiziano Inzerilli, E. Paone, Antonio Pietrabissa, G. Tarquini. 897-902 [doi]
- Experience-based admission control (EBAC)Michael Menth, Jens Milbrandt, Simon Oechsner. 903-910 [doi]
- FDDT+: improving fairness for video transmission over IP networksYan Bai, Mabo Robert Ito. 911-914 [doi]
- Distribution-free conservative bounds for QoS measuresJózsef Bíró, András Gulyás, T. Szenasi, Zalán Heszberger. 915-920 [doi]
- Theoretical analysis of restorability of Hamiltonian protection cycles in random mesh networksShahram Shah-Heydari, Wail Mardini, Oliver W. W. Yang. 921-926 [doi]
- Improving the loss performance of random early detection gateway using fuzzy logic controlMohammad Hossien Yaghmaee, H. S. Farmad. 927-932 [doi]
- QoS estimators for client-side dynamic server selection: limitations and keysJ. L. Martinez, I. G. Munoz, J. F. Navajas. 933-938 [doi]
- Resource allocation algorithms for intra-domain quality of service provisioningEugenia G. Nikolouzou, Sotirios Maniatis, Iakovos S. Venieris. 939-944 [doi]
- A capacity margin for IP networks with QoS constraints and uncertain demandsSanaa Sharafeddine, Zaher Dawy. 945-950 [doi]
- Joint multifractal network traffic generator and characteristics analysisJinwu Wei, Jiangxing Wu, Shuqiao Chen. 951-956 [doi]
- A novel Lagrangian-relaxation to the minimum cost multicommodity flow problem and its application to OSPF traffic engineeringGábor Rétvári, József Bíró, Tibor Cinkler. 957-962 [doi]
- K-factor Gegenbauer ARMA process for network traffic simulationN. Sadek, Alireza Khotanzad. 963-968 [doi]
- Streaming over EGPRSMiikka Lundan. 969-974 [doi]
- Bandwidth aggregation in stream control transmission protocolAhmed Abd El Al, Tarek N. Saadawi, Myung J. Lee. 975-980 [doi]
- Lightweight monitoring of label switched paths for bandwidth managementPere Vilà, José-Luis Marzo, Eusebi Calle, Liliana Carrillo. 981-986 [doi]
- Multi-layer autonomous community overlay network for enhancing communication delayKhaled Ragab, Yuji Horikoshi, Hisayuki Kuriyama, Kinji Mori. 987-992 [doi]
- Evaluation of a scalable reservation-based QoS architectureRui Prior, Susana Sargento, Pedro Brandão, Sérgio Crisóstomo. 993-999 [doi]
- On the provision of immersive audio communication to massively multi-player online gamesSérgio Crisóstomo, Farzad Safaei, Don Platt. 1000-1005 [doi]
- Hybrid checkpoint protocol for cell-dependent infrastructured networksMasakazu Ono, T. Hirakawa, Hiroaki Higaki. 1006-1011 [doi]
- GXcast: generalized explicit multicast routing protocolAli Boudani, Alexandre Guitton, Bernard Cousin. 1012-1017 [doi]
- Multi-objective optimization scheme for dynamic multicast groupsYezid Donoso, Ramón Fabregat, José-Luis Marzo. 1018-1023 [doi]
- An effective heuristic algorithm for dynamic multicast routing with delay-constrainedZhengQuan Xu, Lin Chen. 1024-1031 [doi]
- Fast-response receiver-driven layered multicastLin Chen, Kwan Lawrence Yeung. 1032-1037 [doi]
- Implementation and performance evaluation of multicast control protocolT. Takahashi, M. Tammi, Heikki Vatiainen, Rami Lehtonen, J. Hatju. 1038-1043 [doi]
- Multicast synchronous transfer protocol: a complete study of packet delay and packet loss behaviorPilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, J. J. Sanchez-Manzanares, Josemaria Malgosa-Sanahuja, Joan García-Haro. 1044-1050 [doi]
- Multicast error control for multimedia collaborative applicationsEmad Eldin Mohamed, Hussein M. Abdel-Wahab. 1051-1056 [doi]
- On robustness in application-level multicast: the case of HBMAyman El-Sayed, Vincent Roca. 1057-1062 [doi]
- A case for dense-mode multicast support in MPLSMozafar Bag Mohammadi, Siavash Samadian-Barzoki, M. Nikoopour, Nasser Yazdani, Nasser Rezaee. 1063-1070 [doi]
- Improving the stability of spanning trees for application-layer multicastBaitao Long, Lifeng Sun, Wenping Chen, Yuzhuo Zhong. 1071-1076 [doi]
- Evaluation of flow control algorithms for ABR multipoint servicesU. T. Nguyen. 1077-1084 [doi]
- Accuracy of link capacity estimates using passive and active approaches with CapProbeRohit Kapoor, Ling-Jyh Chen, M. Y. Sanadidi, Mario Gerla. 1085-1090 [doi]
- An analytical study of object relocation strategies for wireless environmentsMario Gerla, Zahir Tari, Peter Bertók. 1091-1097 [doi]
- Software application design based on architecture, reliability and costSwapna S. Gokhale. 1098-1103 [doi]
- Provisioning virtual active networks for dynamic active service deploymentHabib Bakour, Nadia Boukhatem. 1104-1109 [doi]
- Implementation of the almost guaranteed dimensioning strategy in integrated IP networksSanaa Sharafeddine. 1110-1116 [doi]
- A middleware-based service for employing resource management algorithms at distributed networks and evaluating their performanceVassilios M. Stathopoulos, Iakovos S. Venieris. 1117-1122 [doi]
- A heuristic buffer management scheme for tree-based reliable multicastJinsuk Baek, Jehan-François Pâris. 1123-1128 [doi]
- An infrastructure for runtime evolution of software systemsAntonella Di Stefano, Giuseppe Pappalardo, Emiliano Tramontana. 1129-1135 [doi]
- Experiences in the implementation of an SNMP-based high performance cluster management systemRodrigo Sanger Alves, Clarissa Cassales Marquezan, Lisandro Zambenedetti Granville. 1136-1141 [doi]
- Terabit/s data communication in distributed computer cluster networksStamatios V. Kartalopoulos. 1142-1147 [doi]