Abstract is missing.
- Secure Key Exchange and Encryption Mechanism for Ad Hoc NetworksS. Sumathy, B. Upendra Kumar. 1-6 [doi]
- Impact of Sink Mobility on Network Performance in Wireless Sensor NetworksK. Thanigaivelu, K. Murugan. 7-11 [doi]
- Intelligent Clustering in Wireless Sensor NetworksEhsan Heidari, Ali Movaghar. 12-17 [doi]
- A Novel Algorithm for Graded Precision Localization in Wireless Sensor NetworksSanat Sarangi, Subrat Kar. 18-22 [doi]
- MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor NetworksPankaj Gupta, Tarun Bansal, Manoj Misra. 23-27 [doi]
- Energy Efficient Wireless Sensor MAC Protocol for Collision AvoidanceAbhishek Samanta, Dripto Bakshi, Amitava Mukherjee, Mita Nasipuri. 28-33 [doi]
- Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor NetworksNeeraj Kumar Nehra, Manoj Kumar, R. B. Patel. 34-39 [doi]
- Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc NetworksNiu Jianwen, Liu Chang, Ma Jian. 40-45 [doi]
- K Bipartite Partitioning Algorithm for Channel Allocation Problem in Wireless Mesh NetworksRajiv Misra, Ajay Shukla. 46-51 [doi]
- Posture-Predictive Power Control in Body Sensor Networks Using Linear-Quadratic Gaussian ControlMuhannad Quwaider, Azizah Muhammad, Jongeun Choi, Subir Biswas. 52-59 [doi]
- Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor NetworksBehnam Dezfouli, Marjan Radi, Mohammad Ali Nematbakhsh. 60-65 [doi]
- Vertical Handoff in Heterogeneous Wireless Mobile NetworksChandravva Hebbi, S. V. Saboji. 66-71 [doi]
- Multiple Mobile Routers Based Seamless Handover Scheme for Next Generation Heterogeneous NetworksArun Prakash, Rajesh Verma, Rajeev Tripathi, Kshirasagar Naik. 72-77 [doi]
- A Practical Approach for Planning WLAN Deployment under 3G Cellular NetworkSamir K. Sadhukhan, Swarup Mandal, Debashis Saha. 78-82 [doi]
- A Scheduling Policy for Battery Management in Mobile DevicesB. Malarkodi, B. Prasana, B. Venkataramani. 83-87 [doi]
- AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc NetworksSuparna DasGupta, Rituparna Chaki. 88-92 [doi]
- Node Mobility Support Scheme Between the Mobile Network and PMIPv6 NetworksHyo-Beom Lee, Youn-Hee Han, Sung-Gi Min. 93-97 [doi]
- An Analytical Model of Multi-service Call Admission Control in Next Generation Wireless Overlay NetworksAsish K. Mukhopadhyay, Sajal Saha, Suranjan Ghose, Debasish Saha, Dhinaharan Nagamalai. 98-103 [doi]
- An Improved Method of Detecting Spoofed Attack in Wireless LANShikha Goel, Sudesh Kumar. 104-108 [doi]
- Performance Study of Large Block FEC with Drop Tail for Video Streaming over the InternetOmar Almomani, Osman Gazali, Suhaidi Hassan. 109-112 [doi]
- High Performance Image Steganalysis Through Stego Sensitive Feature Selection Using MBEGAS. Geetha, Siva S. Sivatha Sindhu, V. Kabilan, N. Kamaraj. 113-118 [doi]
- Accuracy of 3D Location Computation in GSM Through NS2Anand Gupta, Harsh Bedi, M. S. Don Bosco, Vinay Shashidhar. 119-122 [doi]
- Cricket/Mica2 Based Discrete Event Simulator for WiHoc Ver.1.0 Localization AnalysisShamala S, Sangeetha T, Moqry A. 123-128 [doi]
- Performance Improvement of Wireless Sensor Networks Using Layered Space Time CodesM. A. Bhagyaveni, K. Rajeswari. 129-134 [doi]
- The FN Quadratic Marking/Dropping Probability FunctionMohammed M. Kadhum, Suhaidi Hassan. 135-140 [doi]
- Performance Analysis of MANET under Blackhole AttackAnu Bala, Munish Bansal, Jagpreet Singh. 141-145 [doi]
- Comparative Study of Various Cooling Schedules for Location Area Planning in Cellular Networks Using Simulated AnnealingNilesh B. Prajapati, Rupal R. Agravat, Mosin I. Hasan. 146-150 [doi]
- A Pascal Graph Property and Computer Network TopologySanjay Kumar Pal, Samar Sen-Sarma, Subhrendu Guha Neogi. 151-154 [doi]
- Perceptual Features Based Isolated Digit and Continuous Speech Recognition Using Iterative Clustering ApproachA. Revathi, Y. Venkataramani. 155-160 [doi]
- Just Queueing (JQ): Scheduling Algorithm for the InternetYaser Miaji, Suhaidi Hassan. 161-165 [doi]
- Performance of Dominating Sets in AODV Routing Protocol for MANETsA. Nagaraju, B. Eswar. 166-170 [doi]
- On-body Packet Routing Algorithms for Body Sensor NetworksMuhannad Quwaider, Subir Biswas. 171-177 [doi]
- End-to-End Network Delay-Constrained for QoS Multicast RoutingBalakannan S. P, Yier Yan, Jae Seung Yang, Moon Ho Lee. 178-183 [doi]
- Securing Internet Protocol (IP) Storage: A Case StudySiva Rama Krishnan Somayaji, Ch. A. S. Murty. 190-195 [doi]
- Tree-Like Peer-to-Peer Symmetric Key Management in Mobile Ad Hoc NetworkGirish Kumar Patnaik, M. M. Gore. 196-201 [doi]
- Service Coverage Bounds Through Efficient Load Approximation in UMTS Network PlanningSasthi C. Ghosh, Roger M. Whitaker, Stuart M. Allen, Steve Hurley. 202-207 [doi]
- An Energy-Conserving Topology Maintenance Algorithm for MANETsS. Muthuramalingam, P. Janani, B. Bavya, R. Rajaram. 208-213 [doi]
- Agent Based Web Services with RuleML for Network ManagementMydhili K. Nair, V. Gopalakrishna. 214-219 [doi]
- A Status Monitoring System Design/Implementation for Home Appliances Controlled by Home ServerBoyoung Lee, Sojung Yang, Deokjai Choi. 220-223 [doi]
- A Genetic Algorithm Based Oblivious Image Watermarking Scheme Using Singular Value Decomposition (SVD)B. Jagadeesh, S. Srinivas Kumar, K. Raja Rajeswari. 224-229 [doi]
- Energy Based Quantization for Image Compression Using Contourlet TransformKilari Veera Swamy, B. Chandra Mohan, Y. V. Bhaskar Reddy, S. Srinivas Kumar. 230-234 [doi]
- PhishNet: Enhancing the Security Aspect of IMS UsersReshmi Maulik, Nabendu Chaki. 235-239 [doi]
- Fault Analysis of Security Policy Implementations in Enterprise NetworksP. Bera, S. K. Ghosh, Pallab Dasgupta. 240-245 [doi]
- Multicrypt: A Provably Secure Encryption Scheme for Multicast CommunicationA. John Prakash, V. Rhymend Uthariaraj. 246-253 [doi]
- An Attack Vector for Deception Through Persuasion Used by Hackers and CrakersMosin I. Hasan, Nilesh B. Prajapati. 254-258 [doi]
- Anonymous but Traceable IP Address-Based Communication SystemKeiichi Sakakima, Shingo Ata, Hiroshi Kitamura. 259-264 [doi]
- Secure Mobile Multicast Handoff Mechanisms Using a Time-Limited KeyMi Yeon Yoon, Kwangkyum Lee, Mijoo Kim, Yongtae Shin. 271-276 [doi]
- A Middleware Architectural framework for Vehicular Safety over VANET (InVANET)K. Saravanan, Arunkumar Thangavelu, K. Rameshbabu. 277-282 [doi]
- An Approach for Security Assessment of Network Configurations Using Attack GraphNirnay Ghosh, S. K. Ghosh. 283-288 [doi]
- Galaxia: A Semi-decentralized System for Implementing Secure-Group P2P NetworksSaurav Muralidharan, Sajin Koroth, Nevil Anto, Rafeeque Pandarachalil. 289-294 [doi]
- Reminder: please update your details : Phishing TrendsBeatrice Cynthia Dhinakaran, Jae Kwang Lee, Dhinaharan Nagamalai. 295-300 [doi]
- On a Local Heuristic for a Reverse Multicast Forwarding GameSarvesh Kumar Varatharajan, Gunes Ercal-Ozkaya. 307-312 [doi]
- Random Key GraphsOsman Yagan, Armand M. Makowski. 313-318 [doi]
- Semiring Pruning for Information Dissemination in Mobile Ad Hoc NetworksKiran K. Somasundaram, John S. Baras. 319-325 [doi]
- A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor NetworksWouter Horré, Kevin Lee, Danny Hughes, Sam Michiels, Wouter Joosen. 326-331 [doi]
- An Alternative Approach to Find the Fermat Point of a Polygonal Geographic Region for Energy Efficient Geocast Routing Protocols: Global Minima SchemeKaushik Ghosh 0002, Sarbani Roy, Pradip K. Das. 332-337 [doi]
- Analysis of Hierarchical Mobile IP Based Fast Mobility Management SchemesSajal Saha, Subhasree Bhattacharjee, Rajib Nath Bhowmick, Asish K. Mukhupadhyay, Dhinaharan Nagamalai. 338-343 [doi]
- Efficient Power-Aware Packet Scheduling for Multiantenna Packet Radio SystemsStanislav Nonchev, Mikko Valkama. 344-348 [doi]
- Time Domain Equalization Technique Using RAKE-MMSE Receivers for High Data Rate UWB Communication SystemSusmita Das, Bikramaditya Das. 349-353 [doi]
- Vulnerabilities in Some Recently Proposed RFID Ownership Transfer ProtocolsGaurav Kapoor, Selwyn Piramuthu. 354-357 [doi]
- Anomaly Behavior Analysis for Web Page InspectionChia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin. 358-363 [doi]
- Fairness Strategy and Scheduling Algorithm for IEEE 802.16 Wireless Access SystemsSheng-Tzong Cheng, Bo-Fu Chen, Chih-Lun Chou. 364-369 [doi]
- Fuzzy Switching Controller for the Security in 802.11 NetworksXu Huang, Dharmendra Sharma. 370-375 [doi]
- Performance Evaluation of ADV with AODV for Mobile Ad-hoc NetworksA. Nagaraju, Ch. Ramya Krishna. 376-380 [doi]
- An Agent Based Security Framework for Protecting Routing Layer Operations in MANETN. Jaisankar, R. Saravanan, K. Durai Swamy. 381-385 [doi]
- An Improved Collaborative Recommender SystemM. K. Kavitha Devi, P. Venkatesh. 386-391 [doi]
- A Handoff Management Scheme for Mobile Station in Wireless Body Area Mesh NetworksJilong Li, Jangkyu Yun, Junhyung Kim, Icksoo Lee, Kijun Han. 392-395 [doi]
- An Efficient Routing Protocol Based on Position Information in Mobile Wireless Body Area Sensor NetworksKihyun Kim, Ick-Soo Lee, Mahnsuk Yoon, Junhyung Kim, Honggil Lee, Kijun Han. 396-399 [doi]
- Analysis and Proposal of Wireless Mesh Network s Routing Metric for WBANSooyeol Yang, Jeongbae Yun, Jangkyu Yun, Honggil Lee, Kijun Han. 400-403 [doi]
- A Self-Adjustable Rate Control in Wireless Body Area NetworksYoung-mi Baek, Byung-hwa Lee, Jeongbae Yun, Keuchul Cho, Kijun Han. 404-407 [doi]
- Simulation Based Performance Comparison of Community Model, GFMM, RPGM, Manhattan Model and RWP-SS Mobility Models in MANETS. Gowrishankar, Subir Kumar Sarkar, T. G. Basavaraju. 408-413 [doi]
- iMeasure Security (iMS): A Novel Framework for Security QuantificationV. Vijayaraghavan, Sanjoy Paul. 414-421 [doi]
- Supporting Negative Authorization in Spatiotemporal Role Based Access ControlSamrat Mondal, Shamik Sural. 422-427 [doi]
- A Framework for Licensed Digital SignaturesAlper Ugur, Ibrahim Sogukpinar. 428-432 [doi]
- Packet Marking with Distance Based Probabilities for IP TracebackTurker Akyuz, Ibrahim Sogukpinar. 433-438 [doi]
- Crowd Management with RFID and Wireless TechnologiesMohammad Yamin, Yasser Ades. 439-442 [doi]