Abstract is missing.
- Six-Shot Multicast: A Location-Aware Strategy for Efficient Message Routing in MANETsBenoît Garbinato, Adrian Holzer, François Vessaz. 1-9 [doi]
- Improved Architectures for Range Encoding in Packet Classification SystemXin He, Jorgen Peddersen, Sri Parameswaran. 10-19 [doi]
- AGGRO: Boosting STM Replication via Aggressively Optimistic Transaction ProcessingRoberto Palmieri, Francesco Quaglia, Paolo Romano. 20-27 [doi]
- Cost-Based Optimization of Buffer Size in M/G/1/N Systems under Different Service-Time DistributionsDerek Doran, Lester Lipsky, Steve Thompson. 28-35 [doi]
- Distributed Clustering Algorithms for Lossy Wireless Sensor NetworksZhexi Pan, Yuanyuan Yang, Dawei Gong. 36-43 [doi]
- Modeling Fast Link Failure Detection for Dependable Wireless Mesh NetworksTimo Lindhorst, Georg Lukas, Edgar Nett. 44-51 [doi]
- Fault-Tolerant Deadlock-Free Adaptive Routing for Any Set of Link and Node Failures in Multi-cores SystemsFabien Chaix, Dimiter Avresky, Nacer-Eddine Zergainoh, Michael Nicolaidis. 52-59 [doi]
- Detection of Performance Anomalies in Web-Based ApplicationsJoão Paulo Magalhães, Luis Moura Silva. 60-67 [doi]
- Ecosystem of Cloud Naming Systems: An Approach for the Management and Integration of Independent Cloud Name SpacesAntonio Celesti, Massimo Villari, Antonio Puliafito. 68-75 [doi]
- Colocation as a Service: Strategic and Operational Services for Cloud ColocationVatche Ishakian, Raymond Sweha, Jorge Londoño, Azer Bestavros. 76-83 [doi]
- SOAP Web Services Compression Using Variable and Fixed Length CodingDhiah Al-Shammary, Ibrahim Khalil. 84-91 [doi]
- Authentication Using Virtual Certificate Authorities: A New Security Paradigm for Wireless Sensor NetworksEdmond Holohan, Michael Schukat. 92-99 [doi]
- GROK: A Practical System for Securing Group CommunicationsJoseph A. Cooley, Roger I. Khazan, Benjamin W. Fuller, Galen E. Pickard. 100-107 [doi]
- Quantification of Attackers Activities on Servers Running Web 2.0 ApplicationsKaterina Goseva-Popstojanova, Risto Pantev, Ana Dimitrijevikj, Brandon Miller. 108-116 [doi]
- Design of an Extensible Network TestbedCharlie Wiseman, Jyoti Parwatikar, Ken Wong, John D. DeHart, Jonathan S. Turner. 117-124 [doi]
- A Performance Model of Gossip-Based Update PropagationImad Antonios, Reetu Dhar, Feng Zhang, Lester Lipsky. 125-131 [doi]
- Assessing the Impact of a Realistic Radio Propagation Model on VANET Scenarios Using Real MapsFrancisco J. Martinez, Manuel Fogue, Manuel Coll, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni. 132-139 [doi]
- Time-Free Authenticated Byzantine ConsensusMoumen Hamouma, Achour Mostéfaoui. 140-146 [doi]
- Improving Conjunctive Query Routing in Unstructured P2P NetworksWai Gen Yee, Linh Thai Nguyen, Ophir Frieder. 147-154 [doi]
- ASE: Authenticated Statement ExchangeBenjamin W. Fuller, Roger I. Khazan, Joseph A. Cooley, Galen E. Pickard, Daniil M. Utin. 155-161 [doi]
- Prediction of Job Resource Requirements for Deadline Schedulers to Manage High-Level SLAs on the CloudGemma Reig, Javier Alonso, Jordi Guitart. 162-167 [doi]
- Under the Cloud: A Novel Content Addressable Data Framework for Cloud Parallelization to Create and Virtualize New Breeds of Cloud ApplicationsAmir H. Basirat, Anang H. Mohammad Amin, Asad I. Khan. 168-173 [doi]
- Dynamic Web Service Composition Middleware: A New Approach for QoS GuaranteesBruno Tardiole Kuehne, Júlio Cezar Estrella, Maycon L. M. Peixoto, Thiago Caproni Tavares, Regina Helena Carlucci Santana, Marcos José Santana. 174-177 [doi]
- Multi-level Multi-server Task Assignment with Work-Conserving MigrationMalith Jayasinghe, Zahir Tari, Panlop Zeephongsekul. 178-181 [doi]
- Understanding the Vulnerabilities of a SOA Platform - A Case StudyAndrew Gronosky, Michael Atighetchi, Partha Pratim Pal. 182-187 [doi]
- A Network Based Approach to Malware Detection in Large IT InfrastructuresBrijesh Kumar, Constantine Katsinis. 188-191 [doi]
- On the Integrity of Network Coding-Based Anonymous P2P File Sharing NetworksPaolo Gasti, Alessio Merlo, Giuseppe Ciaccio, Giovanni Chiola. 192-197 [doi]
- PwdIP-Hash: A Lightweight Solution to Phishing and Pharming AttacksBaber Aslam, Lei Wu, Cliff Changchun Zou. 198-203 [doi]
- Anomaly Detection with Wireless Sensor NetworksNathalie Dessart, Hacène Fouchal, Philippe Hunel, Nicolas Vidot. 204-209 [doi]
- Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor NetworksNaimah Yaakob, Ibrahim Khalil, Jiankun Hu. 210-213 [doi]
- QoS-enabled Video Streaming in Wireless Sensor NetworksS. Guo, T. D. C. Little. 214-217 [doi]
- A Decentralized Dynamic Sensor Activation Protocol for Chemical Sensor NetworksShanika Karunasekera, Champake Mendis, Alex Skvortsov, Ajith Gunatilaka. 218-223 [doi]
- Partition Participant Detector with Dynamic Paths in Mobile NetworksLuciana Arantes, Pierre Sens, Gaël Thomas 0001, Denis Conan, Léon Lim. 224-228 [doi]
- Improving Robustness of Network Fault Diagnosis to Uncertainty in ObservationsJesper Grønbæk, Hans-Peter Schwefel, Andrea Ceccarelli, Andrea Bondavalli. 229-232 [doi]
- A Multi-core Approach to Providing Fault Tolerance for Non-deterministic ServicesBalazs Gerofi, Yutaka Ishikawa. 233-238 [doi]
- NetOdyssey - A New Tool for Real-Time Analysis of Network TrafficFábio D. Beirão, João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire. 239-242 [doi]
- Location Awareness Rescue System: Support for Mountain Rescue TeamsPanagiotis Georgopoulos, Ben McCarthy, Christopher Edwards. 243-246 [doi]
- K-overlay: A Kautz Tree Structure for Video on Demand SystemUbaid Abbasi, Toufik Ahmed. 247-252 [doi]
- Dynamic Game-Play Arbitrators with 3D Voronoi DiagramsMahathir Almashor, Ibrahim Khalil, Geoff Leach. 253-256 [doi]
- Pareto-Based Optimization of Multicast Flows with QoS and Traffic Engineering RequirementsMarcos L. P. Bueno, Gina M. B. Oliveira. 257-260 [doi]
- Advanced Hashing with Hybrid Key Duplication for IP Address LookupRujiroj Tiengtavat, Wei-Ming Lin. 261-264 [doi]
- Evaluation of a Hardware-Software Codesign Technique of Network Protocol StacksTaehoon Kim, Sungwoo Tak. 265-268 [doi]
- Redundancy Infrastructure for Service-Oriented Wireless Sensor NetworksJana Neumann, Nils Hoeller, Christoph Reinke, Volker Linnemann. 269-274 [doi]
- Remote Reliable Services to Support Transactional Mobile AgentsIzabela Moise, Michel Hurfin, Linda Zeghache, Nadjib Badache. 275-279 [doi]
- A Geographic Unicast Routing Algorithm Using no Location ServiceDaniel Silvestre, Teresa Vazão. 280-285 [doi]