Abstract is missing.
- A Simple Statistical Methodology for Testing Ad Hoc NetworksMakoto Ikeda, Giuseppe De Marco, Leonard Barolli. 1-10 [doi]
- Sensor-Actuator Communication Protocols in Wireless NetworksKiyohiro Morita, Keiji Ozaki, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa. 11-19 [doi]
- The Effect of Routing Protocol Dynamics on TCP Performance in Mobile Ad Hoc NetworksConsolee Mbarushimana, Alireza Shahrabi, Hadi Larijani. 20-29 [doi]
- Battery and Power Aware Routing in Mobile Ad Hoc NetworksFumiaki Sato, Sumito Iijima. 30-39 [doi]
- Wireless Balloon Network for Disaster Information SystemYoshitaka Shibata, Yosuke Sato, Kazuya Sakakibara, Kazuo Takahata. 40-48 [doi]
- Wireless Networks as an Infrastructure for Mission-Critical Business ApplicationsKrzysztof Gierlowski, Krzysztof Nowicki. 49-58 [doi]
- The DecoyPort: Redirecting Hackers to HoneypotsIksu Kim, MyungHo Kim. 59-68 [doi]
- Network Security Improvement with Isolation Implementation Based on ISO-17799 StandardYeu-Pong Lai, Jui-Heng Tai. 69-78 [doi]
- Positive and Negative Authorizations to Access Protected Web ResourcesSylvia B. Encheva, Sharil Tumin. 79-87 [doi]
- An Analysis of Mobile WiMAX Security: Vulnerabilities and SolutionsTaeshik Shon, Wook Choi. 88-97 [doi]
- An Automatic Meta-revised Mechanism for Anti-malicious InjectionJin-Cherng Lin, Jan-Min Chen, Hsing-Kuo Wong. 98-107 [doi]
- SKEMON: A Simple Certificate-Less Method for Key Exchange by Using Mobile NetworkChizuro Sakamoto, Giuseppe De Marco, Rihito Yaegashi, Masaharu Tadauchi, Leonard Barolli. 108-117 [doi]
- A Secure Authentication Scheme for a Public Terminal Before a TransactionChin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan. 118-126 [doi]
- Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface StudyMichitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata. 127-136 [doi]
- A Key Predistribution Scheme for Wireless Sensor Networks Using the Small-World ConceptYung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng. 137-146 [doi]
- Multigroup Rekeying for a Wireless NetworkKuang-Hui Chi, Ji-Han Jiang, Yu-Ching Hsu. 147-156 [doi]
- Rich Internet Architectures for Browser-Based Multiplayer Real-Time Games - Design and Implementation Issues of virtual-kicker.comMatthias Häsel. 157-166 [doi]
- Distribution of Lecture Concepts and Relations in Digital ContentsPo-Jen Chuang, Chu-Sing Yang, Ming-Chao Chiang. 167-176 [doi]
- Design of the Middleware Enabling Context Awareness and Energy Optimizing for Smart EnvironmentYuebin Bai, Haixing Ji, Huabin Lu, Chao Li, Qi Zou, Peng Lv. 177-186 [doi]
- Multilayer Quality and Grade of Service Support for High Speed GMPLS IP/DWDM NetworksWalter Colitti, Kris Steenhaut, Ann Nowé, Jan Lemeire. 187-196 [doi]
- Implementing Range Queries with a Decentralized Balanced Tree over Distributed Hash TablesNuno Lopes, Carlos Baquero. 197-206 [doi]
- Byzantine-Tolerant, Information Propagation in Untrustworthy and Unreliable NetworksKai Han, Binoy Ravindran, E. Douglas Jensen. 207-216 [doi]
- COMICS: A Global Constraint Manager for Interactive Component Database SystemsLudmila Himmelspach, Mehmet Kolac, Krasimir Kutsarov, Alexander Chernin, Christopher Popfinger, Stefan Conrad. 217-226 [doi]
- Guidelines for Network Service Pricing: An Extended Model Considering Increase of Network UsersValbona Barolli, Heihachiro Fukuda, Leonard Barolli, Makoto Takizawa. 227-237 [doi]
- Role-Based Scheduling and Synchronization Algorithms to Prevent Illegal Information FlowTomoya Enokido, Valbona Barolli, Makoto Takizawa. 238-247 [doi]
- A Probabilistic Multi-agent Scheduler Implemented in JXTAAndré Trudel, Elhadi Shakshuki, Yiqing Xu. 248-257 [doi]
- Scheduling Real-Time Requests in On-Demand Broadcast EnvironmentsKwok-Wa Lam, Sheung-lun Hung. 258-267 [doi]
- A Fair Replica Placement for Parallel Download on Cluster GridChih-Ming Wang, Chu-Sing Yang, Ming-Chao Chiang. 268-277 [doi]
- Querying Similarity in Metric Social NetworksJan Sedmidubský, Stanislav Barton, Vlastislav Dohnal, Pavel Zezula. 278-287 [doi]
- Performance Evaluation of Dynamic Probabilistic Flooding Using Local Density Information in MANETsAamir Siddique, Abdalla M. Hanashi, Irfan Awan, Michael E. Woodward. 288-297 [doi]
- A Token Bucket Model with Assured Forwarding for Web TrafficSalvador Alcaraz, Katja Gilly, Carlos Juiz, Ramón Puigjaner. 298-307 [doi]
- An Analytical Approach to the Efficient Real-Time Events/Services Handling in Converged Network EnvironmentNatalia Kryvinska, Peter Zinterhof, Do Van Thanh. 308-316 [doi]
- Command Transition Probability Analysis on Mobile Internet Command SequencesToshihiko Yamakami. 317-324 [doi]
- A Solution for Congestion and Performance Enhancement by Dynamic Packet Bursting in Mobile Ad Hoc NetworksYoung-Duk Kim, Yeon-Mo Yang, Dong-ha Lee. 325-334 [doi]
- Empirical Study of Design Pattern Usage in Peer-to-Peer SystemsMarkus Aleksy, Martin Schader, Christian Seifried, Makoto Takizawa. 335-344 [doi]
- Improvement of JXTA Protocols for Supporting Reliable Distributed Applications in P2P SystemsFatos Xhafa, Raul Fernandez, Thanasis Daradoumis, Leonard Barolli, Santi Caballé. 345-354 [doi]
- A Ring Infrastructure for Neighbor-Centric Peer-to-Peer ApplicationsOliver Haase, Alfred Toth, Jürgen Wäsch. 355-364 [doi]
- Semantic Query Routing in SenPeer, a P2P Data Management SystemDavid Faye, Gilles Nachouki, Patrick Valduriez. 365-374 [doi]
- Jamjuree Cluster: A Peer-to-Peer Cluster Computing SystemKasame Tritrakan, Pakit Kanchana, Veera Muangsin. 375-384 [doi]
- Evaluations on Classified Selection of Dense Vectors for Vegetable Geographical Origin Identification System Using Trace ElementsNobuyoshi Sato, Minoru Uehara, Koichiro Shimomura, Hirobumi Yamamoto, Ken ichi Kamijo. 385-396 [doi]
- Integrated Biomedical System for Ubiquitous Health MonitoringArjan Durresi, Arben Merkoci, Mimoza Durresi, Leonard Barolli. 397-405 [doi]
- Tree Graph Views for a Distributed Pervasive EnvironmentTuyet-Tram Dang-Ngoc, Nicolas Travers. 406-415 [doi]
- A Distributed Resource Furnishing to Offload Resource-Constrained Devices in Cyber Foraging Toward Pervasive ComputingMinHwan Ok, Ja-Won Seo, Myong-Soon Park. 416-425 [doi]
- Trust Model for Mobile Devices in Ubiquitous EnvironmentZhefan Jiang, Sangwook Kim. 426-434 [doi]
- PoQBA: A New Path Admission Control for Diffserv NetworksEnrique Pena, Miguel Rios, Christian Oberli, Vladimir Marianov. 435-445 [doi]
- An Adaptive Call Admission Control Approach for Multimedia 3G NetworkWaqas Ahmad, Irfan Awan, Makoto Takizawa. 446-455 [doi]
- Spatial Correlation Code Based Data Aggregation Scheme for Maximizing Network LifetimeSangbin Lee, Younghwan Jung, Woojin Park, Sunshin An. 456-465 [doi]
- A Mesh-Based QoS Aware Multicast Routing ProtocolDayin Promkotwong, Ohm Sornil. 466-475 [doi]
- Virtual Large-Scale Disk System for PC-RoomErianto Chai, Minoru Uehara, Hideki Mori, Nobuyoshi Sato. 476-485 [doi]
- Application of Default Logic in an Intelligent Tutoring SystemSylvia B. Encheva, Sharil Tumin. 486-494 [doi]
- Consolidating with Media Streaming Server and Network Storage CardYong-Ju Lee, SongWoo Sok, Hag-Young Kim, Myung-Joon Kim, Cheolhoon Lee. 495-504 [doi]
- Design of the Tile-Based Embedded Multimedia Processor -TEMP-Shinya Toji, Minoru Uehara, Hideki Mori. 505-512 [doi]
- A Fuzzy-Based Speed-Aware Handoff System for Wireless Cellular NetworksLeonard Barolli, Arjan Durresi, Fatos Xhafa, Akio Koyama. 513-522 [doi]
- WPS and Voice-XML-Based Multi-Modal Fusion Agent Using SNNR and Fuzzy ValueJung-Hyun Kim, Kwang-Seok Hong. 523-532 [doi]
- A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational GridsKun-Ming Yu, Zhi-Jie Luo, Chih-Hsun Chou, Cheng-Kwan Chen, Jiayi Zhou. 533-542 [doi]