Abstract is missing.
- The Next Chapter in Networking Research: Evolutionary or Revolutionary?Guru M. Parulkar. 1 [doi]
- Performance of Fair Distributed Mutual Exclusion AlgorithmsKandarp Jani, Ajay D. Kshemkalyani. 2-15 [doi]
- A Framework for Automatic Identification of the Best Checkpoint and Recovery ProtocolHimadri Sekhar Paul, Arobinda Gupta, Amit Sharma. 16-27 [doi]
- Distributed Computation for Swapping a Failing EdgeLinda Pagli, Giuseppe Prencipe, Tranos Zuva. 28-39 [doi]
- Flexible Cycle Synchronized Algorithm in Parallel and Distributed SimulationXuehui Wang, Lei Zhang, Kedi Huang. 40-45 [doi]
- Rule Mining for Dynamic DatabasesA. Das, D. K. Bhattacharyya. 46-51 [doi]
- APPLE: A Novel P2P Based e-Learning EnvironmentHai Jin, Zuoning Yin, Xudong Yang, Fucheng Wang, Jie Ma, Hao Wang, Jiangpei Yin. 52-62 [doi]
- Heuristic-Based Scheduling to Maximize Throughput of Data-Intensive Grid ApplicationsSouvik Ray, Zhao Zhang. 63-74 [doi]
- Failure Recovery in Grid Database SystemsSushant Goel, Hema Sharda, David Taniar. 75-81 [doi]
- On Design of Cluster and Grid Computing Environment Toolkit for Bioinformatics ApplicationsChao-Tung Yang, Yu-Lun Kuo, Kuan-Ching Li, Jean-Luc Gaudiot. 82-87 [doi]
- Study of Scheduling Strategies in a Dynamic Data Grid EnvironmentR. A. Dheepak, Shakeb Ali, Shubhashis Sengupta, Anirban Chakrabarti. 88-94 [doi]
- Virtual Molecular Computing - Emulating DNA MoleculesSanjay Goswami, Susmita Sur-Kolay. 95-101 [doi]
- Complexity of Compositional Model Checking of Computation Tree Logic on Simple StructuresKrishnendu Chatterjee, Pallab Dasgupta, P. P. Chakrabarti. 102-113 [doi]
- A Multi-agent Framework Based on Communication and ConcurrencyM. Jamshid Bagherzadeh, S. Arun-Kumar. 114-125 [doi]
- Statistical Analysis of a P2P Query Graph Based on Degrees and Their Time-EvolutionJean-Loup Guillaume, Matthieu Latapy, Stevens Le-Blond. 126-137 [doi]
- t-UNITY - A Formal Framework for Modeling and Reasoning About Timing Constraints in Real-Time SystemsSumit Kumar Basu. 138-143 [doi]
- Finding Pareto-Optimal Set of Distributed Vectors with Minimum DisclosureSatish K. Sehgal, Asim K. Pal. 144-149 [doi]
- Lean-DFS: A Distributed Filesystem for Resource Starved ClientsShyam Antony, Gautam Barua. 150-155 [doi]
- A Fair Medium Access Protocol Using Adaptive Flow-Rate Control Through Cooperative Negotiation Among Contending Flows in Ad Hoc Wireless Network with Directional AntennaDola Saha, Siuli Roy, Somprakash Bandyopadhyay, Tetsuro Ueda, Shinsuke Tanaka. 156-167 [doi]
- Analytical-Numerical Study of Mobile IPv6 and Hierarchical Mobile IPv6Myung-Kyu Yi, Chong-Sun Hwang. 168-179 [doi]
- An Adaptive Transmission Power Control Protocol for Mobile Ad Hoc NetworksKyung-jun Kim, Nam-koo Ha, Ki Jun Han. 180-185 [doi]
- A Macro-Mobility Scheme for Reduction in Handover Delay and Signaling Traffic in MIPv6Basav Roychoudhury, Dilip K. Saikia. 186-191 [doi]
- QoS Support in TLMM: Three Level Mobility Model for IP-Based NetworksMohuya Chakraborty, Iti Saha Misra, Debashis Saha, Amitava Mukherjee. 192-197 [doi]
- Path Stability Based Adaptation of MANET Routing ProtocolsSandeep Choudhary, M. M. Gore, O. P. Vyas. 198-203 [doi]
- Computational Biology - The New Frontier of Computer ScienceAmar Mukherjee. 204-218 [doi]
- Cryptanalysis of Wavelet Tree Quantization Watermarking SchemeTanmoy Kanti Das, Subhamoy Maitra. 219-230 [doi]
- A Multisignature Scheme for Implementing Safe Delivery Rule in Group Communication SystemsS. Rahul, R. C. Hansdah. 231-239 [doi]
- Agent-Based Distributed Intrusion Alert SystemArjita Ghosh, Sandip Sen. 240-241 [doi]
- SCIDS: A Soft Computing Intrusion Detection SystemAjith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong Han. 252-257 [doi]
- Effect of Data Encryption on Wireless Ad Hoc Network PerformanceVijay K. Garg, R. K. Ghosh. 258-263 [doi]
- On-Board RSVP: An Extension of RSVP to Support Real-Time Services in On-Board IP NetworksMuhammad Ali Malik, Salil S. Kanhere, Mahbub Hassan, Boualem Benatallah. 264-275 [doi]
- A Secure PIM-SM Multicast Routing ProtocolJunqi Zhang, Vijay Varadharajan, Yi Mu. 276-288 [doi]
- Restoration of Virtual Private Networks with QoS Guarantees in the Pipe ModelChittaranjan Hota, Sanjay Kumar Jha, G. Raghurama. 289-302 [doi]
- A User Level, Reliable, and Reconfigurable Transport Layer ProtocolTan Wang, Ajit Singh. 303-314 [doi]
- The Notion of Veto Number for Distributed Agreement ProblemsRoy Friedman, Achour Mostéfaoui, Michel Raynal. 315-325 [doi]
- Reliability of VLSI Linear Arrays with Redundant LinksSoumen Maity, Amiya Nayak, Bimal K. Roy. 326-337 [doi]
- A Technique to Ensure Reliability in a WDM Optical Backbone Network with Contemporary Link FailuresSwarup Mandal, Sougata Bera, Debashis Saha. 338-346 [doi]
- Formal Proof of Impossibility of Reliability in Crashing ProtocolsK. Gopinath, Anil K. Pugalia, K. V. M. Naidu. 347-352 [doi]
- Altera Max Plus II Development Environment in Fault Simulation and Test Implementation of Embedded Cores-Based Sequential CircuitsSunil R. Das, Chuan Jin, Liwu Jin, Mansour H. Assaf, Emil M. Petriu, Mehmet Sahinoglu. 353-360 [doi]
- A Distributed Contention Resolution Scheme to Reduce Blocking Probability in Optical Burst Switching NetworksAshok K. Turuk, Rajeev Kumar. 361-372 [doi]
- Polynomial Interpolation on OTIS-Mesh Optoelectronic ComputersPrasanta K. Jana. 373-378 [doi]
- A New Network Topology with Multiple Three-Dimensional MeshesNahid Afroz, Bhabani P. Sinha, Rabiul Islam, Subir Bandyopadhyay. 379-384 [doi]
- Adaptive Fault Tolerant Routing in Star GraphRajib K. Das. 385-390 [doi]
- Routing and Wavelength Assignment in Wavelength Division Multiplexing NetworksAjit Pal, Umesh Patel. 391-396 [doi]
- Designing the MDVM-Stub and Memory EstimatorSusmit Bagchi, Mads Nygaard. 397-411 [doi]
- Improved Algorithm for Minimum Cost Range Assignment Problem for Linear Radio NetworksGautam K. Das, Sasthi C. Ghosh, Subhas C. Nandy. 412-423 [doi]
- Optimal Schemes for Channel Assignment Problem in Wireless Networks Modeled as 2-Dimensional Square GridsB. S. Panda, Mahesh Kumar, Sajal K. Das. 424-434 [doi]
- Mobility Tolerant Broadcast in Mobile Ad Hoc NetworksPradip K. Srimani, Bhabani P. Sinha. 435-446 [doi]
- Distributed Mobility Tracking for Ad Hoc Networks Based on an Autoregressive ModelZainab R. Zaidi, Brian L. Mark. 447-458 [doi]
- Broadcast and Gossiping Algorithms for Mobile Ad Hoc Networks Based on Breadth-First TraversalKoushik Sinha, Pradip K. Srimani. 459-470 [doi]
- RINGS: Lookup Service for Peer-to-Peer Systems in Mobile Ad Hoc NetworksKalpesh Patel, Sridhar Iyer, Krishna Paul. 471-476 [doi]
- Performance Analysis of Location Caching with Fixed Local Anchor in Wireless NetworksKi-Sik Kong, Chong-Sun Hwang. 477-488 [doi]
- On the Optimization Trade-Offs of Expanding Ring SearchJahan Hassan, Sanjay Jha. 489-494 [doi]
- Dynamic Location Management with Personalized Location Area for Future PCS NetworksJun Zheng, Emma Regentova, Pradip K. Srimani. 495-501 [doi]
- Improvement of Paging Cost by Updating Using Paging Delay DivergenceDaisuke Senzaki, Goutam Chakraborty, Masafumi Matsuhara, Hiroshi Mabuchi. 502-507 [doi]
- Distributed Power Control in Sensor Networks: A Game Theoretic ApproachShamik Sengupta, Mainak Chatterjee. 508-519 [doi]
- A K-Connected Energy-Saving Topology Control Algorithm for Wireless Sensor NetworksLei Zhang, Xuehui Wang, Wenhua Dou. 520-525 [doi]
- Locating Objects in a Sensor GridBuddhadeb Sau, Krishnendu Mukhopadhyaya. 526-531 [doi]
- A Novel Remote User Authentication Scheme Through Dynamic Login IdentityManik Lal Das, Ashutosh Saxena, Ved Prakash Gulati. 532 [doi]
- A Probabilistic Admission Control Algorithm in Wireless/Mobile Cellular NetworksMonir Hossain, Mahbub Hassan. 533 [doi]
- A Rough Neuro Data Mining Approach for Network Intrusion DetectionTarun Bhaskar, B. Narasimha Kamath. 534 [doi]
- An Efficient Implementation of Distance-Based Update Scheme Using Directional Cell Identification CodesSubrata Nandi, Manish K. Raushan. 535 [doi]
- Application of Formal Methods for Analysis of Authentication ProtocolsRitesh Kumar Tiwari. 536 [doi]
- BUSTRAP - An Efficient Travel Planner for MetropolitansSandeep Gupta, M. M. Gore. 537 [doi]
- Distributed Evolutionary Algorithm Search for Multiobjective Spanning Tree ProblemRajeev Kumar, Pramod Kumar Singh, P. P. Chakrabarti. 538 [doi]
- MSIP: A Protocol for Efficient Handoffs of Real Time Multimedia Sessions in Mobile Wireless ScenariosA. Ranjeeth Kumar, Sridhar Iyer. 539 [doi]
- Network Management System Using Web Server Controlled Mobile AgentsAshutosh Upadhaya, Saurabh Vashishtha, Raman Grover, Anil Kumar Sarje. 540 [doi]
- Security Scheme for Malicious Node Detection in Mobile Ad Hoc NetworksPunit Rathod, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, Ajith Abraham. 541-542 [doi]
- High-Level Grid Execution PatternsKaizar Amin, Gregor von Laszewski. 543-544 [doi]