Abstract is missing.
- Keynote 2: Information-centric networking: Overview, current state and key challengesGeorge Pavlou. [doi]
- Keynote 1: Intelligent Network Operations and Management - It s about the dataMahmoud Daneshmand. [doi]
- Keynote 4: Communications standards: IEEE standards association and ComSoc perspectivesCurtis A. Siller. [doi]
- Keynote 3: Towards sustainability: Harnessing computing and communications for a better futureMartin Curley. [doi]
- Keynote 5: Exploiting social metrics in content distributionIoannis Stavrakakis. [doi]
- A distributed scheduling mechanism to improve quality of service in IEEE 802.11 ad hoc networksMunther M. Hammouri, John N. Daigle. 1-6 [doi]
- Data seeding in nomadic cooperative groupsLeonardo Militano, Frank H. P. Fitzek, Antonio Iera, Antonella Molinaro. 1-6 [doi]
- A study of multimedia application performance over Multiple Care-of Addresses in Mobile IPv6Bruno Sousa, Kostas Pentikousis, Marilia Curado. 7-12 [doi]
- 3DTV streaming over Peer-to-Peer networks using FEC-based noncooperative multiple descriptionSimone Milani, Marco Gaggio, Giancarlo Calvagno. 13-18 [doi]
- QoE-based transport optimization for video delivery over next generation cellular networksNoam Amram, Bo Fu, Gerald Kunzmann, Telemaco Melia, Daniele Munaretto, Sabine Randriamasy, Bessem Sayadi, Jörg Widmer, Michele Zorzi. 19-24 [doi]
- A hybrid MIPv6 and PMIPv6 distributed mobility management: The MEDIEVAL approachFabio Giust, Carlos Jesus Bernardos, Sérgio Figueiredo, Pedro Neves, Telemaco Melia. 25-30 [doi]
- Wireless access mechanisms and architecture definition in the MEDIEVAL projectMarco Mezzavilla, Michelle Wetterwald, Leonardo Badia, Daniel Corujo, Antonio de la Oliva. 31-36 [doi]
- Multicast video streaming over WiFi networks: Impact of multipath fading and interferenceShafqat-ur Rehman, Thierry Turletti, Walid Dabbous. 37-42 [doi]
- Performance evaluation of FEC techniques based on BCH codes in video streaming over wireless sensor networksMatteo Petracca, Marco Ghibaudi, Claudio Salvadori, Paolo Pagano, Daniele Munaretto. 43-48 [doi]
- Inter-packet symbol approach to Reed-Solomon FEC codes for RTP-multimedia stream protectionFilippo Casu, Julián Cabrera, Fernando Jaureguizar, Narciso N. García. 49-54 [doi]
- A Multi-Agent selection of Web Service providers driven by composite QoSFatma Siala, Khaled Ghédira. 55-60 [doi]
- Social, fast, efficient: Content distribution in hybrid networksBernd Klasen. 61-67 [doi]
- Self-stabilizing algorithm for energy saving in Wireless Sensor NetworksJalel Ben-Othman, Karim Bessaoud, Alain Bui, Laurence Pilard. 68-73 [doi]
- Energy-aware analysis for supplying partner selection in mobile P2P 3D streamingHaifa Raja Maamar, Graciela Román-Alonso, Azzedine Boukerche, Emil M. Petriu. 74-79 [doi]
- MMSE-Based amplifying relay matrix for noncooperative AF wireless relay network under power constraintsKanghee Lee, Hyuck M. Kwon, Zuojun Wang. 80-84 [doi]
- SocioSpace: An adaptive service-oriented architecture that integrates smart spaces and social networks through the IP multimedia subsystemAhmed Hasswa, Hossam S. Hassanein. 85-90 [doi]
- Hierarchically distributed treeAzzedine Boukerche, YunFeng Gu. 91-96 [doi]
- Quantitative verification for response times in composite Web service modelYoussou Kasse, Lynda Mokdad. 97-102 [doi]
- Performance evaluation of multidimensional parabolic type problems on distributed computing systemsNorma Alias, Rasiya Anwar, Che Rahim Che Teh, Noriza Satam, Norhafiza Hamzah, Zarith Safiza Abdul Ghaffar, Roziha Darwis, Md. Rajibul Islam. 103-110 [doi]
- An optimal testing technique for finite state machinesHacène Fouchal. 111-116 [doi]
- Performance analysis of selective DF relay networks over Rician fading channelsEhsan Soleimani-Nasab, Ashkan Kalantari, Mehrdad Ardebilipour. 117-122 [doi]
- Optimal clustering method in ultrametric spacesSaid Fouchal, Murat Ahat, Ivan Lavallée. 123-128 [doi]
- Increasing Cloud power efficiency through consolidation techniquesAntonio Corradi, Mario Fanelli, Luca Foschini. 129-134 [doi]
- Autonomic management of elastic services in the cloudPatrick Martin, Andrew Brown, Wendy Powley, José Luis Vázquez-Poletti. 135-140 [doi]
- Operational trust in Clouds environmentImad M. Abbadi. 141-145 [doi]
- Revealing the MAPE loop for the autonomic management of Cloud infrastructuresMichael Maurer, Ivan Breskovic, Vincent C. Emeakaroha, Ivona Brandic. 147-152 [doi]
- Translation of application-level terms to resource-level attributes across the Cloud stack layersGeorge Kousiouris, Dimosthenis Kyriazis, Spyridon V. Gogouvitis, Andreas Menychtas, Kleopatra Konstanteli, Theodora A. Varvarigou. 153-160 [doi]
- Architectures for autonomic service management in cloud-based systemsEmiliano Casalicchio, Luca Silvestri. 161-166 [doi]
- How CLEVER-based clouds conceive horizontal and vertical federationsFrancesco Tusa, Antonio Celesti, Maurizio Paone, Massimo Villari, Antonio Puliafito. 167-172 [doi]
- Scheduling and monitoring of internally structured services in Cloud federationsLars Larsson, Daniel Henriksson, Erik Elmroth. 173-178 [doi]
- Transparent migration of virtual infrastructures in large datacenters for Cloud computingRoberto Bifulco, Roberto Canonico, Giorgio Ventre, Vittorio Manetti. 179-184 [doi]
- Load dependent resource allocation in cooperative multiservice wireless networks: Throughput and delay analysisThomas Lagkas, Dimitrios Stratogiannis, Georgios Tsiropoulos, Panagiotis G. Sarigiannidis, Malamati D. Louta. 185-190 [doi]
- Efficient online estimation of bursty wireless linksMuhammad Hamad Alizai, Hanno Wirtz, Georg Kunz, Benjamin Grap, Klaus Wehrle. 191-198 [doi]
- The impact of interference on the performance of a multi-path metropolitan wireless mesh networkElias Z. Tragos, Alexandros G. Fragkiadakis, Ioannis G. Askoxylakis, Vasilios A. Siris. 199-204 [doi]
- Scheduling avionics flows on an IEEE 802.11e HCCA and AFDX hybrid networkBafing Sambou, Fabrice Peyrard, Christian Fraboul. 205-212 [doi]
- Joint per-flow scheduling and routing in wireless multihop networksDimitrios J. Vergados, Aggeliki Sgora, Dimitrios D. Vergados, Periklis Chatzimisios. 213-217 [doi]
- Wireless image transmission using joint adaptation of modulation and channel codingRimas A. Zrae, Mohamed Hassan, Mohamed El-Tarhuni. 218-223 [doi]
- History-aware rate adaptation in 802.11 wireless networksIoannis Pefkianakis, Yun Hu, Songwu Lu. 224-229 [doi]
- An adaptive epidemic information dissemination scheme with cross-layer enhancementsTheofanis Kontos, Evripidis Zaimidis, Christos Anagnostopoulos, Stathes Hadjiefthymiades, Evangelos Zervas. 230-235 [doi]
- Cross-layer CQI feedback window adaptation for OFDMA systems under feedback budget constraintMohammad Abdul Awal, Lila Boukhatem. 242-247 [doi]
- On optimized joint uplink/downlink resource allocation in OFDMA networksAhmad M. El-Hajj, Zaher Dawy. 248-253 [doi]
- On delay distribution in IEEE 802.11 wireless networksStepan Ivanov, Dmitri Botvich, Sasitharan Balasubramaniam. 254-256 [doi]
- Highly compressed multi-pattern string matching on the cell broadband engineXinyan Zha, Daniele Paolo Scarpazza, Sartaj Sahni. 257-264 [doi]
- PC-DUOS: Fast TCAM lookup and update for packet classifiersTania Mishra, Sartaj Sahni, Gunasekaran S. Seetharaman. 265-270 [doi]
- Fine-grained intercontact characterization in disruption-tolerant networksTiphaine Phe-Neau, Marcelo Dias de Amorim, Vania Conan. 271-276 [doi]
- Multipattern string matching on a GPUXinyan Zha, Sartaj Sahni. 277-282 [doi]
- Study of lifetime extension in wireless sensor networks through congestion control algorithmsCharalambos Sergiou, Vasos Vassiliou. 283-286 [doi]
- PSP: Path state protocol for inter-domain routingChen Avin, Ran Giladi, Dotan Guy. 287-293 [doi]
- Overlay addressing and routing system based on hyperbolic geometryCyril Cassagnes, Telesphore Tiendrebeogo, David Bromberg, Damien Magoni. 294-301 [doi]
- Geographical quadtree routingChen Avin, Yaniv Dvory, Ran Giladi. 302-308 [doi]
- The dissemination speed of correlated messages in opportunistic networksPeiyan Yuan, Huadong Ma, Xufei Mao. 309-315 [doi]
- Interface specific fast failure rerouting for load balanced ip networksSteven S. W. Lee, Po-Kai Tseng, Kuang-Yi Li, Wen-Yu Chang, Alice Chen. 316-319 [doi]
- Enhance content broadcast efficiency in routers with integrated cachingLijun Dong, Yanyong Zhang, Dipankar Raychaudhuri. 320-322 [doi]
- Linear precoding for centralized multicell MIMO networksReza Holakouei, Adão Silva, Atílio Gameiro. 323-328 [doi]
- Attenuation over distance for indoor propagation topologies at 2.4 GHzTheofilos Chrysikos, Giannis Georgopoulos, Stavros Kotsopoulos. 329-334 [doi]
- Complex orthogonal coded binary transmission with amicable Hadamard matrices over Rayleigh fading channelsAthanasios C. Iossifides. 335-340 [doi]
- Implementation and evaluation of a voice codec for ZigBeeEmmanuel Touloupis, Apostolos Meliones, Spyros Apostolacos. 341-347 [doi]
- Selection of modulation and coding schemes of single carrier PHY for 802.11ad multi-gigabit mmWave WLAN systemsLiru Lu, Xin Zhang, Ryuhei Funada, Chin-Sean Sum, Hiroshi Harada. 348-352 [doi]
- Using learning automata for adaptively adjusting the downlink-to-uplink ratio in IEEE 802.16e wireless networksAntonios Sarigiannidis, Petros Nicopolitidis, Georgios I. Papadimitriou, Panagiotis G. Sarigiannidis, Malamati D. Louta. 353-358 [doi]
- Multi-layer data protection using N-Channel stop-and-wait Hybrid-ARQ in WiMAXObaid Ur Rehman, Natasa Zivic. 359-364 [doi]
- Maximizing network capacity in an heterogeneous macro-micro cellular scenarioFrancesco Ivan Di Piazza, Stefano Mangione, Ilenia Tinnirello. 365-370 [doi]
- Performance comparison of JTCP over QoS-aware WiMAX networksAlessandro Andreadis, Sandro Rizzuto, Riccardo Zambon. 371-376 [doi]
- Multi-Topology design and link weight assignment for green IP networksSteven S. W. Lee, Po-Kai Tseng, Alice Chen. 377-382 [doi]
- On powering communication networks in developing regionsAmos Nungu, Robert Olsson, Björn Pehrson. 383-390 [doi]
- Towards an effective energy efficient passive optical networkPanagiotis G. Sarigiannidis, Vasiliki D. Pechlivanidou, Malamati D. Louta, Pantelis Angelidis. 391-396 [doi]
- Smart routing mechanism for green ZigBee-based wireless sensor networksAntonio Manuel Ortiz, Teresa Olivares, Luis Orozco-Barbosa. 397-403 [doi]
- Communication-based Plug-In Hybrid Electrical Vehicle load management in the smart gridMelike Erol-Kantarci, Jahangir H. Sarker, Hussein T. Mouftah. 404-409 [doi]
- Utility-based resource allocation for virtual machines in Cloud computingDorian Minarolli, Bernd Freisleben. 410-417 [doi]
- Performance and cost evaluation of Gang Scheduling in a Cloud Computing system with job migrations and starvation handlingIoannis A. Moschakis, Helen D. Karatza. 418-423 [doi]
- Cloud computing, security and data concealmentChristian Delettre, Karima Boudaoud, Michel Riveill. 424-431 [doi]
- Workflow scheduling in e-Science networksEun Sung Jung, Sanjay Ranka, Sartaj Sahni. 432-437 [doi]
- Virtual network mapping into heterogeneous substrate networksJoao Nogueira, Márcio Melo, Jorge Carapinha, Susana Sargento. 438-444 [doi]
- A multi-access asynchronous low-power MAC based on preamble sampling for WSNsNoseong Park, Bong-Wan Kim, Yoonmee Doh, Jongarm Jun. 445-450 [doi]
- Mobility in WSNs for critical applicationsRicardo Silva, Zinon Zinonos, Jorge Sá Silva, Vasos Vassiliou. 451-456 [doi]
- Semi-adaptive channel estimation technique for LTE systemsElSayed A. Ahmed, Mohamed M. Khairy. 457-482 [doi]
- Context driven enhancement of RSS-based localization systemsPaolo Barsocchi, Stefano Chessa, Erina Ferro, Francesco Furfari, Francesco Potorti. 463-468 [doi]
- Location estimation in multi-carrier systems using extended Kalman based interacting multiple model and data fusionEnver Bahar, Gunes Karabulut Kurt. 469-471 [doi]
- Towards realization of the ABC vision: A comparative survey of Access Network SelectionMalamati D. Louta, Philippos Zournatzis, Stylianos KraounaWs, Panagiotis G. Sarigiannidis, Ioannis Demetropoulos. 472-477 [doi]
- Cooperative transmission among ordinary users in wireless communication networksHamzeh H. Omari, John N. Daigle. 478-484 [doi]
- A multiple care of addresses modelBruno Sousa, Marco Silva, Kostas Pentikousis, Marilia Curado. 485-490 [doi]
- DC-MAC: A data-centric multi-hop MAC protocol for underwater acoustic sensor networksMing Yang, Mingsheng Gao, Chuan Heng Foh, Jianfei Cai, Periklis Chatzimisios. 491-496 [doi]
- Towards a compatible Level-2 DSM algorithm to protect downstream multiuser xDSL legacy systemsHernán Córdova, Leo Van Biesen, Rob van den Brink, Bas van den Heuvel. 497-500 [doi]
- MAC framework and algorithms for dynamic subcarrier assignment in OFDMA-PONsKonstantinos Kanonakis, Ioannis Tomkos. 501-505 [doi]
- Optimization models for reliable long-reach PON deploymentBurak Kantarci, Hussein T. Mouftah. 506-511 [doi]
- Analytical model of optical burst switched networks with share-per-node buffersDaniele Tafani, Conor McArdle, Liam P. Barry. 512-518 [doi]
- Wavelength scheduling in Time-domain Wavelength Interleaved NetworksYan Li, Sanjay Ranka, Sartaj Sahni. 519-524 [doi]
- An asymmetric access strategy with propagation delay analysis for bandwidth utilization improvement in WDM networksPeristera A. Baziana, Ioannis E. Pountourakis. 525-530 [doi]
- Pervasive multiparty delivery framework for ubiquitous multimedia servicesNuno Carapeto, Filipe Cabral Pinto, Daniel Figueira, Nuno Filipe Coutinho, Susana Sargento, Pierre Roux. 531-537 [doi]
- Quality-improved and secure multicast delivery method in mobile IPv6 networksAbbas Mehdizadeh, Fazirulhisyam Hashim, Raja S. Azmir Raja Abdullah, Borhanuddin Mohd Ali, Mohamed Othman. 538-543 [doi]
- Media Ecosystem deployment in a content-aware Future Internet architectureGeorgios Gardikis, Georgios Xilouris, Anastasios Kourtis, Daniel Negru, Yiping Chen, Petros Anapliotis, Evangelos Pallis. 544-549 [doi]
- Scaling Instant Messaging communication services: A comparison of blocking and non-blocking techniquesLeigh Griffin, Kieran Ryan, Eamonn de Leastar, Dmitri Botvich. 550-557 [doi]
- An efficient sequential iterative matching algorithm for CIOQ switchesYanping Gao, Christoforos Kachris, Manolis Katevenis. 558-563 [doi]
- Performance evaluation of the suitability of Opportunistic Networks for the Future InternetMarios Logothetis, Kostas Tsagkaris, Panagiotis Demestichas. 564-566 [doi]
- Increasing spectrum utilization in wireless infrastructure-based systemsDimitris Tsolkas, Nikos I. Passas, Lazaros F. Merakos. 567-572 [doi]
- Feedback reduction for MIMO broadcast channel with heterogeneous fadingJin-Hao Li, Hsuan-Jung Su. 573-578 [doi]
- A low-complexity SLM approach based on time-domain sub-block conversion matrices for OFDM PAPR reductionYuh-Ren Tsai, Chi-Hung Lin, Yen-Chen Chen. 579-584 [doi]
- Power control optimization in LMDS networks operating above 20GHz through Fuzzy Inference SystemsKonstantinos S. Chaloulos, Dimitris E. Charilas, Athanasios D. Panagopoulos. 585-590 [doi]
- Performance of APSK modulation in wireless tactical scenarios for land mobile systemsMarco Baldi, Franco Chiaraluce, Antonio de Angelis, Rossano Marchesani, Sebastiano Schillaci. 591-596 [doi]
- Prediction model for the GSM Dual Half Rate gain in a noise-limited environment based on field measurements and simulationsJyrki T. J. Penttinen, Francesco Davide Calabrese, David Valerdi, Inigo Guemes. 597-602 [doi]
- Reliable multicasting over LTE: A performance studyAntonios G. Alexiou, Konstantinos Asimakis, Christos Bouras, Vasileios Kokkinos, Andreas Papazois, Georgia Tseliou. 603-608 [doi]
- An experimental analysis of routing inconsistency in indoor wireless mesh networksRodrigo S. Couto, Miguel Elias M. Campista, Luís Henrique Maciel Kosmalski Costa, Otto Carlos Muniz Bandeira Duarte. 609-614 [doi]
- Towards cellular IP address assignment in wireless heterogeneous sensor networksMazen G. Khair, Burak Kantarci, Hussein T. Mouftah. 615-619 [doi]
- Non-uniform channelization methods for next generation SDR PMR base stationsAlvaro Palomo Navarro, Tony Keenan, Rudi Villing, Ronan Farrell. 620-625 [doi]
- Performance evaluation of enhanced CSH-MU solution in a heterogeneous network environmentThang Tran, Faqir Zarrar Yousaf, Christian Wietfeld. 626-629 [doi]
- Enhancing trust establishment in wireless multi-hop networks via preferential attachmentEleni Stai, Vasileios Karyotis, Symeon Papavassiliou. 630-635 [doi]
- SeFLOOD: A secure network discovery protocol for Underwater Acoustic NetworksGianluca Dini, Angelica Lo Duca. 636-638 [doi]
- Quantitative model checking of an RSA-based email protocol on mobile devicesSophia G. Petridou, Stylianos Basagiannis, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros. 639-645 [doi]
- Exploitation of auctions for outsourcing security-critical projectsMiltiadis Kandias, Alexios Mylonas, Marianthi Theoharidou, Dimitris Gritzalis. 646-651 [doi]
- Security analysis and improvement of Smart Card-Based Authenticated Key Exchange protocol with CAPTCHAs for wireless mobile networkMaryam Saeed, Hadi Shahriar Shahhoseini. 652-657 [doi]
- Evaluating automatic pools distribution techniques for self-configured networksReinaldo Gomes, Ricardo de Oliveira Schmidt. 658-663 [doi]
- Assignment of multicast groups to publish/subscribe topics in multi-domain networksVisa Holopainen. 664-670 [doi]
- Autonomous recovery for link failure based on tie-sets in information networksKiyoshi Nakayama, Norihiko Shinomiya. 671-676 [doi]
- MIB design and application for source address validation improvement protocolChangqing An, Jessie Hui Wang, Jiahai Yang. 677-680 [doi]
- Neighbourhood monitoring for decentralised coordination in multi-agent systems: A case-studyGianluca Dini, Francesco Giurlanda, Lucia Pallottino. 681-683 [doi]
- Cross-layer optimization of Low Power Listening MAC protocols for Wireless Sensor NetworksSoledad Escolar, Stefano Chessa, Jesús Carretero. 684-691 [doi]
- A TDMA jitter minimization algorithm for real-time applications in wireless sensor networksLiqiang Tao, Fengqi Yu. 692-697 [doi]
- Reliable data delivery in sparse WSNs with multiple Mobile Sinks: An experimental analysisGiuseppe Anastasi, Eleonora Borgia, Marco Conti, Mario Di Francesco. 698-705 [doi]
- Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networksEliana Stavrou, Andreas Pitsillides. 706-712 [doi]
- Selective Dropping Congestion Control for wireless multimedia sensor networksAndrea Martelli, Luigi Alfredo Grieco, Manlio Bacco, Gennaro Boggia, Pietro Camarda. 713-718 [doi]
- On the design of UPnP gateways for service discovery in wireless sensor networksBruno da Silva Campos, Eduardo Freire Nakamura, Carlos Mauricio S. Figueiredo, Joel J. P. C. Rodrigues. 719-722 [doi]
- Priority based Routing Protocol in Vehicular Ad hoc NetworkChakkaphong Suthaputchakun, Zhili Sun. 723-728 [doi]
- Real-time graph visualization tool for vehicular ad-hoc networks: (VIVAGr: VIsualization tool of VAnet graphs in real-time)Emmanouil Spanakis, Christodoulos Efstathiades, George Pallis, Marios D. Dikaiakos. 729-734 [doi]
- Maximizing network capacity in an heterogeneous macro-micro cellular scenarioFrancesco Ivan Di Piazza, Stefano Mangione, Ilenia Tinnirello. 735-740 [doi]
- Applying adaptive QoS-aware medium access control in priority-based vehicular ad hoc networksChrysostomos Chrysostomou, Constantinos Djouvas, Lambros Lambrinos. 741-747 [doi]
- Fusion of WLAN and GNSS observables for positioning in urban areas: The position ambiguityDaniel Fernandez, Francisco Barceló-Arroyo, Israel Martín-Escalona, Marc Ciurana, Marti Jofre, Esteban Gutierrez. 748-751 [doi]
- Privacy-preserving scheme for mobile ad hoc networksAntonis Michalas, Vladimir A. Oleshchuk, Nikos Komninos, Neeli R. Prasad. 752-757 [doi]
- A survey on throughput-efficient architectures for IEEE P1619 for shared storage mediaAthanasios P. Kakarountas, Epameinontas Hatzidimitriou, Athanasios Milidonis. 758-763 [doi]
- Spatio temporal emergency role based access control (STEM-RBAC): A time and location aware role based access control model with a break the glass mechanismEmmanouil Georgakakis, Stefanos A. Nikolidakis, Dimitrios D. Vergados, Christos Douligeris. 764-770 [doi]
- A2BeST: An adaptive authentication service based on mobile user s behavior and spatio-temporal contextCristiano C. da Rocha, Joao Carlos D. Lima, M. A. R. Dantas, Iara Augustin. 771-774 [doi]
- DISPUTE: Distributed puzzle tussleAndrey Lukyanenko, Andrei Gurtov, Antti Ylä-Jääski. 775-778 [doi]
- Inter-carrier interconnection services: QoS, economics and business issuesCostas Courcoubetis, Manos Dramitinos, George D. Stamoulis, Gideon Blocq, Avi Miron, Ariel Orda. 779-784 [doi]
- A multivariate cross-country empirical analysis of the digital divideMichael S. Iliadis, John A. Paravantis. 785-788 [doi]
- On the pursue for a Fair Internet Regulation System: A blueprint for a content blocking system encouraging participation by the Internet usersNikolaos Koumartzis, Andreas A. Veglis. 789-791 [doi]
- A strawman proposal for future diverse internetsMalathi Veeraraghavan, Jie Li, Martin Reisslein. 792-795 [doi]
- Dual-Beacon mobile-node discovery in sparse wireless sensor networksKoteswararao Kondepu, Giuseppe Anastasi, Marco Conti. 796-801 [doi]
- Planning updates in multi-application wireless sensor networksAbolhassan Shamsaie, Jafar Habibi. 802-808 [doi]
- Information hovering: A new approach for performance acceleration of wireless push systemsChristos Liaskos, Andreas Xeros, Georgios I. Papadimitriou, Andreas Pitsillides. 809-814 [doi]
- Improving source-location privacy through opportunistic routing in wireless sensor networksPetros Spachos, Liang Song, Francis Minhthang Bui, Dimitrios Hatzinakos. 815-820 [doi]
- Efficient detection of composite events in Wireless Sensor Networks: Design and evaluationGiuseppe Amato, Stefano Chessa, Claudio Gennaro, Claudio Vairo. 821-823 [doi]
- An adaptive QoE-based multipath video streaming algorithm for Scalable Video Coding (SVC)Majd Ghareeb, Adlen Ksentini, César Viho. 824-829 [doi]
- Real-world IPTV network measurementsGeorgios Baltoglou, Eirini Karapistoli, Periklis Chatzimisios. 830-835 [doi]
- Investigating quality of Experience and Learning (QoE & QoL) of audiovisual content broadcasting to learners over IP networksGeorge Kalliris, Charalampos Dimoulas, Andreas A. Veglis, Maria Matsiola. 836-841 [doi]
- A packet queueing engine for configurable network QoSGary Chang, Chung-Chieh Lee. 842-849 [doi]
- jPBC: Java pairing based cryptographyAngelo De Caro, Vincenzo Iovino. 850-855 [doi]
- Towards multiple-exchange protocol use in distributed AAA frameworks for more autonomy in MANETsSondes Larafa, Maryline Laurent. 856-863 [doi]
- Utilizing document classification for grooming attack recognitionDimitrios Michalopoulos, Ioannis Mavridis. 864-869 [doi]
- A cryptographic suite for underwater cooperative applicationsGianluca Dini, Angelica Lo Duca. 870-875 [doi]
- Open issues on privacy and trust in collaborative environmentsGiorgos Pentafronimos, Athanasios Karantjias, Nineta Polemi. 876-880 [doi]
- Robustness of a P2P community management system based on two-level hierarchical DHT overlaysTimo Koskela, Erkki Harjula, Otso Kassinen, Mika Ylianttila. 881-886 [doi]
- Biological-inspired algorithms for dynamic search in web graphsGeorgios Kouzas, Ioannis Anagnostopoulos. 887-891 [doi]
- Overlay networks measurement for resource indexing under different routing schemeMo Zhou, Jianyu Zhang, Junhua Pan, Yu Chen, Wei Zou. 892-897 [doi]
- On the effectiveness of PR-SCTP in networks with competing trafficMohammad Rajiullah, Anna Brunstrom. 898-905 [doi]
- The effects of Active Queue Management and Explicit Congestion Notification on DNS trafficStefanos Harhalakis, Nikolaos Samaras, Vasileios Vitsas. 906-911 [doi]
- Hint-driven DNS resolutionRui Ferreira, Alfredo Matos, Rui L. Aguiar. 912-915 [doi]
- A model for designing scalable and efficient adaptive routing approaches in emergency Ad hoc communicationsTipu Arvind Ramrekha, Grant P. Millar, Christos Politis. 916-923 [doi]
- Cellular network location estimation via RSS-based data clean enhanced schemeKai Chen, Niki Pissinou, Kia Makki. 924-930 [doi]
- A chunk-based resource allocation scheme for downlink MIMO-OFDMA channel using linear precodingSotirios Karachontzitis, Tasos Dagiuklas. 931-936 [doi]
- Route change latency in low-power and lossy wireless networks using RPL and 6LoWPAN Neighbor DiscoveryHamidrez R. Kermajani, Carles Gomez. 937-942 [doi]
- Performance evaluation of crosspoint queued switch under the heavy trafficMilutin Radonjic, Igor Radusinovic, Zoran Veljovic, Ivo Maljevic. 943-949 [doi]
- Multi-step ahead response time prediction for single server queuing systemsPayam Amani, Maria Kihl, Anders Robertsson. 950-955 [doi]
- EDP-ORD: Efficient distributed/parallel Optimal Rule DiscoverySahar M. Ghanem, Mona A. Mohamed, Magdy H. Nagi. 956-963 [doi]
- Performance modelling of a priority scheduling system with exhaustive service, finite capacity and switchoverMuhammad Faisal Hayat, Farrukh Zeeshan Khan, Agnieszka Lezanska. 964-966 [doi]
- Colored Petri nets model based conformance test generationJing Liu, Xinming Ye, Jun Li. 967-970 [doi]
- iMuse Mobile Tour: A personalized multimedia museum guide opens to groupsAthanasios Fevgas, Panagiota Tsompanopoulou, Panayiotis Bozanis. 971-975 [doi]
- A game theory-based approach to reducing interference in dense deployments of home wireless networksJosephine Antoniou, Andreas Pitsillides, Lavy Libman. 976-982 [doi]
- TLS and energy consumption on a mobile device: A measurement studyPedro Miranda, Matti Siekkinen, Heikki Waris. 983-989 [doi]
- A WSN-based testbed for energy efficiency in buildingsFrancesco Corucci, Giuseppe Anastasi, Francesco Marcelloni. 990-993 [doi]
- SEDA4SC: A staged event-driven architecture for adaptive service computing runtimeZhuqing Li, Dianfu Ma, Dou Sun, Jian Liu. 994-1001 [doi]
- Performance of an economical, redundant system for intranet connectivityAntti Mäkelä, Jukka Manner. 1001-1008 [doi]
- A novel classifier for engineering web trafficWathsala W. Vithanage, Ajantha S. Atukorale. 1009-1016 [doi]
- Network interfaces flying over IP networksJoão Paulo Barraca, Alexandre Brito, Rui L. Aguiar. 1016-1021 [doi]
- IP packet interleaving: Bridging the gap between theory and practiceAlessio Botta, Antonio Pescapè. 1022-1029 [doi]
- Supporting mobility in a publish subscribe internetwork architectureVarvara Giannaki, Xenofon Vasilakos, Charilaos Stais, George C. Polyzos, George Xylomenos. 1030-1032 [doi]
- Topology control in multi-channel cognitive radio networks with non-uniform node arrangementsPin-Yu Chen, Vasileios Karyotis, Symeon Papavassiliou, Kwang-Cheng Chen. 1033-1037 [doi]
- A distributed cooperative MAC for cognitive radio Ad-hoc networksYun Li, Ruifeng Zhang, Bin Cao, Xiaohu You, Ali Daneshmand. 1038-1043 [doi]
- Time-based cross-layer adaptations in wireless cognitive radio ad hoc networksEvangelos Anifantis, Vasileios Karyotis, Symeon Papavassiliou. 1044-1049 [doi]
- Upper bounds for Neyman-Pearson cooperative spectrum sensingSayed Jalal Zahabi, AliAkbar Tadaion, Sonia Aïssa. 1050-1055 [doi]
- Decentralized digital content exchange and copyright protection via P2P networksDimitris K. Tsolis, Spyros Sioutas, Alexandros Panaretos, Ioannis Karydis, Konstantinos Oikonomou. 1056-1061 [doi]
- Revisiting the swarm evolution: A long term perspectiveYong Zhao, Zhibin Zhang, Li Guo, Binxing Fang. 1062-1067 [doi]
- A comparison of streaming extensions to BitTorrentCharilaos Stais, George Xylomenos, Angelos Archodovassilis. 1068-1073 [doi]
- Effective epidemic dissemination of multimedia metadata in Peer-to-Peer overlay networks: The Metis architecture and prototypePaolo Bellavista, Antonio Corradi, Andrea Reale. 1073-1080 [doi]
- SPECT: A system for Peer-to-Peer economic transactionsFotis Loukos, Helen D. Karatza. 1081-1084 [doi]
- Reliable communication for mobile MANET-WSN scenariosGiuseppe Cardone, Antonio Corradi, Luca Foschini. 1085-1091 [doi]
- An efficient heuristic for estimating transportation network vulnerabilitySaleh Ibrahim, Reda A. Ammar, Sanguthevar Rajasekaran, Nicholas Lownes, Qixing Wang, Dolly Sharma. 1092-1098 [doi]
- Analysis of impact of trust on Secure Border Gateway ProtocolJunaid Israr, Mouhcine Guennoun, Hussein T. Mouftah. 1099-1104 [doi]
- Detecting non-transient anomalies in visual information using neural networksMichael E. Kounavis, Joel Morrissette, Sadagopan Srinivasan, Raj Yavatkar. 1105-1110 [doi]
- Exposing click-fraud using a burst detection algorithmDimitris Antoniou, Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Giannis Tzimas, Athanasios K. Tsakalidis, Emmanouil Viennas. 1111-1116 [doi]
- Using multiple links to increase the performance of bandwidth-intensive UDP-based applicationsKristian Evensen, Dominik Kaspar, Audun Fosselie Hansen, Carsten Griwodz, Pål Halvorsen. 1117-1122 [doi]
- Quick and simultaneous estimation of available bandwidth and effective UDP throughput for real-time communicationTakashi Oshiba, Kazuaki Nakajima. 1123-1130 [doi]
- The network neutrality bot architecture: A preliminary approach for self-monitoring of Internet access QoSSimone Basso, Antonio Servetti, Juan Carlos De Martin. 1131-1136 [doi]
- User-transparent reconfiguration method for self-organizing IP multimedia subsystemSatoshi Komorita, Hidetoshi Yokota, Ashutosh Dutta, Christian Makaya, Subir Das, Dana Chee, F. Joe Lin, Henning Schulzrinne. 1137-1144 [doi]
- Distributed community detection: Finding neighborhoods in a complex world using synthetic coordinatesHarris Papadakis, Paraskevi Fragopoulou, Costas Panagiotakis. 1145-1150 [doi]