Abstract is missing.
- Dynamic Attribute Based Vehicle AuthenticationShlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal. 1-8 [doi]
- Using Virtual Mobile Nodes for Neighbor Detection in Proximity-Based Mobile ApplicationsBehnaz Bostanipour, Benoît Garbinato. 9-16 [doi]
- ADD: A Data Dissemination Solution for Highly Dynamic Highway EnvironmentsAllan Mariano de Souza, Guilherme Maia, Leandro A. Villas. 17-23 [doi]
- Does Mobility Matter? An Evaluation Methodology for Opportunistic AppsJesus Friginal, Marc-Olivier Killijian, Roberto Pasqua, Matthieu Roy, Gilles Trédan. 24-31 [doi]
- Strip Interoperability for Wireless Ad Hoc Routing ProtocolsMarco Antonio To, Gerardo Morales, Stephane Maag. 32-36 [doi]
- GTO: A Broadcast Protocol for Highway Environments over Diverse Traffic ConditionsAdemar Takeo Akabane, Leandro Aparecido Villas, Edmundo Roberto Mauro Madeira. 37-40 [doi]
- A Deadline Aware DTN Approach Based on Epidemic RoutingChung-Jae Lee, Ki-Il Kim. 41-44 [doi]
- VANets: An Exploratory Evaluation in Vehicular Ad Hoc Network for Urban EnvironmentClaudio Correa, Jo Ueyama, Rodolfo Ipolito Meneguette, Leandro Aparecido Villas. 45-49 [doi]
- Congestion-Aware Adaptive Routing in 2D-Mesh MulticoresDimiter Avresky, Fabien Chaix, Michael Nicolaidis. 50-58 [doi]
- Optimal Configuration for N-Dimensional Twin Torus NetworksFrancisco J. Andujar, Juan A. Villar, José L. Sánchez, Francisco J. Alfaro, José Duato. 59-66 [doi]
- Resource Management in Cloud Federation Using XMPPMaria Fazio, Antonio Celesti, Massimo Villari, Antonio Puliafito. 67-70 [doi]
- On-Demand Resource Allocation Middleware for Massively Multiplayer Online GamesAndré Pessoa Negrão, Miguel Adaixo, Luís Veiga, Paulo Ferreira. 71-74 [doi]
- A Low-Complexity Fault-Tolerant Document Storage SystemDishelt Francisco Torres Paz, Jorge Antonio Perez Espinoza, Jose Juan Garcia Hernandez. 75-79 [doi]
- A Resilient Hierarchical Distributed Loop Self-Scheduling Scheme for Cloud SystemsYiming Han, Anthony T. Chronopoulos. 80-84 [doi]
- Health Records Protection in Cloud EnvironmentDoan B. Hoang, Lingfeng Chen. 85-90 [doi]
- Interference Avoidance through Frequency Assignment and Association Control in IEEE 802.11 WLANBabul P. Tewari, Sasthi C. Ghosh. 91-95 [doi]
- Recovery of Information Lost by the Least Squares Estimation in Real-Time Network EnvironmentHengky Susanto, Byung-Guk Kim. 96-100 [doi]
- Based-Agent Distributed Architecture to Manage the Dynamic Multi-hop Ridesharing SystemSondes Ben Cheikh, Slim Hammadi, Christian Tahon. 101-104 [doi]
- A Novel Approach for Dual-Direction Load Balancing and Storage Optimization in Cloud ServicesKlaithem Al Nuaimi, Nader Mohamed, Mariam Al Nuaimi, Jameela Al-Jaroodi. 105-112 [doi]
- A Sharing-Aware Greedy Algorithm for Virtual Machine MaximizationSafraz Rampersaud, Daniel Grosu. 113-120 [doi]
- Deploying Large-Scale Service Compositions on the Cloud with the CHOReOS Enactment EngineLeonardo A. F. Leite, Carlos Eduardo Moreira Dos Santos, Daniel Cordeiro, Marco Aurélio Gerosa, Fabio Kon. 121-128 [doi]
- SDN-Based Private InterconnectionShlomi Dolev, Shimrit Tzur-David. 129-136 [doi]
- GPU-Based NSEC3 Hash BreakingMatthäus Wander, Lorenz Schwittmann, Christopher Boelmann, Torben Weis. 137-144 [doi]
- On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer OverflowsHector Marco-Gisbert, Ismael Ripoll. 145-152 [doi]
- Green Proxy-Based Approaches for BitTorrentSena Efsun Cebeci, Öznur Özkasap, Giuseppe Anastasi. 153-156 [doi]
- Orchestration of Energy Efficiency Functionalities for a Sustainable Network ManagementAna C. Riekstin, Guilherme C. Januario, Bruno B. Rodrigues, Viviane T. Nascimento, M. Roxana Pirlea, Tereza Cristina M. B. Carvalho, Catalin Meirosu. 157-161 [doi]
- Entropy Adaptive On-Line CompressionShlomi Dolev, Sergey Frenkel, Marina Kopeetsky. 162-166 [doi]
- Local Search Heuristics for Media Streams Planning with TranscodingJiri Marek, Hana Rudová, Petr Holub. 167-170 [doi]
- A New Solution to Perform Automatic Meter Reading Using Unmanned Aerial VehicleJose Torres Neto, Daniel Ludovico Guidoni, Leandro A. Villas. 171-174 [doi]
- Secure Sensing over Named Data NetworkingJeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik. 175-180 [doi]
- An Adaptive Peer-to-Peer Overlay Scheme for Location-Based ServicesGiacomo Brambilla, Marco Picone, Michele Amoretti, Francesco Zanichelli. 181-188 [doi]
- A Probabilistic Greedy Algorithm with Forced Assignment and Compression for Fast Frequency Assignment in Cellular NetworkSubhankar Ghosal, Sasthi C. Ghosh. 189-196 [doi]
- Media Streams Planning with Uncertain Link CapacitiesPavel Troubil, Hana Rudová, Petr Holub. 197-204 [doi]
- Parallel Deferred Update ReplicationLeandro Pacheco, Daniele Sciascia, Fernando Pedone. 205-212 [doi]
- On Making Transactional Applications Resilient to Data Corruption FaultsMohamed Mohamedin, Roberto Palmieri, Binoy Ravindran. 213-220 [doi]
- An Advance Reservation Mechanism to Enhance Throughput in an Opportunistic High Performance Computing EnvironmentEliza Gomes, Mario Antonio Ribeiro Dantas. 221-228 [doi]
- An Adaptive Approach to Opportunistic Data Forwarding in Underwater Acoustic Sensor NetworksNusrat Nowsheen, Gour C. Karmakar, Joarder Kamruzzaman. 229-236 [doi]
- RLP: A Community Detection-Based Routing Protocol for Wireless Sensor NetworksMatheus A. De Paulo, Maria C. V. Nascimento, Valério Rosset. 237-244 [doi]
- Clustering in WSN Using Node Ranking with Hybrid Nodes Duty-Cycle and Energy ThresholdMariam Al Nuaimi, Khaled Shuaib, Klaithem Al Nuaimi. 245-252 [doi]
- A Coded Shared Atomic Memory Algorithm for Message Passing ArchitecturesViveck R. Cadambe, Nancy A. Lynch, Muriel Médard, Peter M. Musial. 253-260 [doi]
- Time and Location Power Based Malicious Code Detection Techniques for SmartphonesBryan Dixon, Shivakant Mishra, Jeannette Pepin. 261-268 [doi]
- Solvability-Based Comparison of Failure DetectorsSrikanth Sastry, Josef Widder. 269-276 [doi]
- An Evolutionary Game Theoretic Approach for Configuring Cloud-Integrated Body Sensor NetworksYi Cheng Ren, Junichi Suzuki, Dung H. Phan, Shingo Omura, Ryuichi Hosoya. 277-281 [doi]
- Self-Control Cloud ServicesTatiana Aubonnet, Noëmie Simoni. 282-286 [doi]
- Supporting SLA Negotiation for VSDN Based on Similarity and Price IssuesRafael Lopes Gomes, Luiz Fernando Bittencourt, Edmundo Roberto Mauro Madeira. 287-290 [doi]
- Formal Analysis of Secure Device Pairing ProtocolsTrung Nguyen, Jean Leneutre. 291-295 [doi]
- Immunization against Infection Propagation in Heterogeneous NetworksWaseem Abbas, Sajal Bhatia, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos. 296-300 [doi]
- Hardware Implementation of Quasigroup Encryption for SCADA NetworksWilliam Mahoney, Abhishek Parakh, Matthew Battey. 301-305 [doi]
- ETSSDetector: A Tool to Automatically Detect Cross-Site Scripting VulnerabilitiesThiago S. Rocha, Eduardo Souto. 306-309 [doi]