Abstract is missing.
- Change detection and estimation for network-measurement applicationsErik Hartikainen, Svante Ekelin, Johan M. Karlsson. 1-10 [doi]
- Capacity analysis of interfering channelsÖzlem Durmaz Incel, Pierre G. Jansen, Stefan Dulman, Sape J. Mullender. 11-18 [doi]
- Implementation of a rule-based routing protocol for wireless sensor networksJosé C. Castillo, Teresa Olivares, Luis Orozco-Barbosa. 19-25 [doi]
- Enhanced communications firmware platform for co-verification of complex algorithmsKasra G. Nezami, Peter W. Stephens, Stuart D. Walker. 26-29 [doi]
- Impact of orthogonality factor on umts capacity simulationSubhalakshmi Datta, Costas Tzaras, Muhammad Ali Imran. 30-36 [doi]
- A distributed approach to handle topological changes in advanced switchingAntonio Robles-Gómez, Aurelio Bermúdez, Rafael Casado, Francisco J. Quiles, Tor Skeie. 37-44 [doi]
- Multi-path dynamic admission control in mpls networks with end-to-end delay guaranteesHichem Ayed Harhira, Samuel Pierre. 45-49 [doi]
- Performance evaluation of packet loss differentiation algorithms for wireless networksAzzedine Boukerche, Guihua Jia, Richard Werner Nelem Pazzi. 50-52 [doi]
- Complex query processing in wireless sensor networksT. E. Daniel, Robert M. Newman, Elena I. Gaura, S. N. I. Mount. 53-60 [doi]
- A heterogeneous role-based sensor networkAntonio Ortiz, Teresa Olivares, Luis Orozco-Barbosa. 61-67 [doi]
- Eco-mac: an energy-efficient and low-latencyhybrid mac protocol for wireless sensor networksHafedh Zayani, Rahma Ben Ayed, Karim Djouani, Kamel Barkaoui. 68-71 [doi]
- A simple automata based model for stable routing in dynamic ad hoc networksRaymond A. Marie, Miklós Molnár, Hanen Idoudi. 72-79 [doi]
- An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos)George S. Oreku, Jianzhong Li, Tamara Pazynyuk. 81-83 [doi]
- Tracking sensor node operation deviations in wireless sensor networksYaqoob Juma Al-Raisi, David J. Parish. 84-87 [doi]
- Kinetic graphs: a framework for capturing the dynamics of mobile structures in manetJérôme Härri, Christian Bonnet, Fethi Filali. 88-91 [doi]
- An architecture for handsets network test automationClauirton de Siebra, Fabio Q. B. da Silva, Andre M. Santos, Angela Freitas, Kleber Carneiro, Paulo Costa, Amanda Araujo, Karine Santos, Talita Spiller, Fernando Buononato. 92-95 [doi]
- Lha: logical hierarchical addressing protocol for mobile ad-hoc networksAusama Yousef, Hassan Al-Mahdi, Mohamed Abd rabou Kalil, Andreas Mitschele-Thiel. 96-99 [doi]
- Simulation case studies of wireless networked control systemsShekar Nethi, Mikael Pohjola, Lasse Eriksson, Riku Jäntti. 100-104 [doi]
- Characteristics of common mobility models for opportunistic networksMuhammad Abdulla, Robert Simon. 105-109 [doi]
- Performance modelling of the o-mac protocolJun Zhang, Farid Naït-Abdesselam, Brahim Bensaou. 110-113 [doi]
- Determination of optimal policy for code allocation in high speed downlink packet access networks with multi-state channel modelHussein Al-Zubaidy, Ioannis Lambadaris, Jerome Talim, Ioannis Marmorkos. 114-118 [doi]
- A multi-step vertical handoff mechanism for cellular multi-hop networksMingxin Li, Shanzhi Chen, Dongliang Xie. 119-123 [doi]
- Wm-sim: a platform for design and simulation of wireless mobile systemsJuan Jesús Sánchez, David Morales-Jiménez, Gerardo Gómez, Eduardo Martos-Naya, Unai Fernández-Plazaola. 124-127 [doi]
- Terminal-centric ap selection algorithm based on frame retransmissionsYuzo Taenaka, Shigeru Kashihara, Kazuya Tsukamoto, Suguru Yamaguchi, Yuji Oie. 128-131 [doi]
- A peer-to-peer environment for monitoring multiple wireless sensor networksAthanasios Antoniou, Ioannis Chatzigiannakis, Athanasios Kinalis, Georgios Mylonas, Sotiris E. Nikoletseas, Apostolos Papageorgiou. 132-135 [doi]