Abstract is missing.
- Efficient Seamless Non-Broadcast Routing Algorithm for Wireless Mesh NetworkGhassan Kbar, Wathiq Mansoor. 1-5 [doi]
- Framework for Embedding Tacit Knowledge in Pedagogical Model to Enhance E-LearningRizwana Irfan, Maqbool Uddin Shaikh. 1-5 [doi]
- Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh NetworksHassen Redwan, Ki-Hyung Kim. 1-5 [doi]
- Intrusion Detection for Computational GridsAlexandre Schulter, Kleber Vieira, Carlos Becker Westphall, Carla Merkle Westphall, Abderrahim Sekkaki. 1-5 [doi]
- Link-Based VoIP Aggregation in Mesh NetworksJames M. Okech, Anish M. Kurien, Marcel Odhiambo. 1-5 [doi]
- Decentralized Alerts Correlation Approach for DDoS Intrusion DetectionRida Khatoun, Guillaume Doyen, Dominique Gaïti, Radwane Saad, Ahmed Serhrouchni. 1-5 [doi]
- An Autonomous Data Gathering Scheme Adaptive to Sensing Requirements for Industrial Environment MonitoringYoshiaki Taniguchi, Naoki Wakamiya, Masayuki Murata, Takashi Fukushima. 1-5 [doi]
- Cooperative Inter-Vehicle Communication Protocol Dedicated to Intelligent Transport SystemsXun Xing Diao, Jian-Jin Li, Kun Mean Hou, Haiying Zhou, Aurélien Jacquot. 1-5 [doi]
- Security Analysis of Tu and Piramuthu s ProtocolJorge Munilla, Alberto Peinado. 1-5 [doi]
- From Agents and Plugins to Plugin-Agents, Concepts for Flexible ArchitecturesBenjamin Schleinzer, Lawrence Cabac, Daniel Moldt, Michael Duvigneau. 1-5 [doi]
- On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov ProcessesDimitris A. Karras, Vasilios Zorkadis. 1-7 [doi]
- On the Authentication of RFID Systems with Bitwise OperationsBasel Alomair, Radha Poovendran. 1-6 [doi]
- MASA: End-to-End Data Security in Sensor Networks Using a Mix of Asymmetric and Symmetric ApproachesHani Alzaid, Manal Alfaraj. 1-5 [doi]
- Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor NetworksManel Abdelkader, Mohamed Hamdi, Noureddine Boudriga. 1-5 [doi]
- Query Optimization in a Mediator for Digital LibrariesFaouzia Wadjinny, Dalila Chiadmi. 1-6 [doi]
- Stateful Firewalling for Wireless Mesh NetworksPablo Neira Ayuso, Rafael Martinez Gasca, Leonardo Maccari, Laurent Lefèvre. 1-5 [doi]
- Attack Scenarios Reconstruction and Paths of Packets Transfer Identification in Multihop Wireless SystemsSlim Rekhis, Noureddine Boudriga. 1-4 [doi]
- Characterizing On-Body Wireless Sensor NetworksCarla Oliveira, LuÃs D. Pedrosa, Rui M. Rocha. 1-6 [doi]
- Interactions Between Agents As Shared Resources in Multi-Agents SystemsAdil Sayouti, Fatima Qrichi Aniba, Hicham Medromi. 1-4 [doi]
- AOnesC: An Aspect-Oriented Extension to nesCErandi Lakshika, Chamath Keppitiyagama, Dulan Wathugala. 1-5 [doi]
- Automatic 3D Facial Feature Extraction AlgorithmVandana Dixit Kaushik, Saurabh Singh, Hemant Tiwari, Sachin K. Goyal, Vinay K. Pathak, Phalguni Gupta. 1-5 [doi]
- Mobile Payment Protocol for Micropayments: Withdrawal and Payment AnonymousRafael MartÃnez-Peláez, Francisco Rico-Novella, Cristina Satizábal. 1-5 [doi]
- ScatterFactory2: An Architecture Centric Framework for New Generation ScatterWebMohammad Al Saad, Elfriede Fehr, Nicolai Kamenzky, Jochen H. Schiller. 1-5 [doi]
- AdaMS: An Adaptation Multimedia System for Heterogeneous EnvironmentsFayçal M hamed Bouyakoub, Abdelkader Belkhir. 1-5 [doi]
- Delay Model for Saturated IEEE 802.16 NetworksHai L. Vu, Sammy Chan. 1-5 [doi]
- An Optimization Approach for Designing Wireless Sensor NetworksFatiha Bendali, Christophe Duhamel, Kean Mean Hou, Jean Mailfert, Andréa C. Santos. 1-6 [doi]
- Mobility Simulation for the Evaluation of UMTS Power Control AlgorithmsChibli Joumaa, Alexandre Caminada, Sid Lamrous. 1-5 [doi]
- An Improved Single Home Base Station Localization MethodLingwen Zhang, Zhenhui Tan. 1-6 [doi]
- Fault Analysis Attack on an FPGA AES ImplementationFarouk Khelil, Mohamed Hamdi, Sylvain Guilley, Jean-Luc Danger, Nidhal Selmane. 1-5 [doi]
- SCAR: Sequential Coordinate Routing Algorithm for Autonomous Wireless Sensor NetworkAmir M. Jafari, Adam Sklorz, Walter Lang. 1-6 [doi]
- Performance Analysis of Single Relay Cooperative ARQ protocol under Time Correlated Rayleigh Fading ChannelHong Il Cho, Chan-yong Lee, Gang Uk Hwang. 1-5 [doi]
- On Improved Event Scheduling Mechanisms for Wireless Communications Simulation ModellingP. M. Papazoglou, Dimitrios A. Karras, Rallis C. Papademetriou. 1-5 [doi]
- The Optimistic Schemes of Cluster Analysis and k-NN Classifier Method in Detecting and Counteracting Learned DDoS AttackEdwin R. Ramos, Sooyoung Chae, Mansig Kim, Myeonggil Choi. 1-5 [doi]
- Threat Modeling in Pervasive Computing ParadigmNazir A. Malik, Muhammad Younus Javed, Umar Mahmud. 1-5 [doi]
- Performance Tuning of Steganography Algorithm for Privacy Preserving Association Rule Mining in Heterogeneous Data BaseMahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail. 1-6 [doi]
- Efficiency of PRI and WRR DiffServ Scheduling Mechanisms for Real-Time Services on UMTS EnvironmentNuno Vasco Lopes, Maria João Nicolau, Alexandre Santos. 1-5 [doi]
- Low Cost Differential GPS Receivers (LCD-GPS): The Differential Correction FunctionMessaoud Kara, Kun Mean Hou. 1-6 [doi]
- Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP ServiceMoussa Ouedraogo, Djamel Khadraoui, Benoît De Rémont, Eric Dubois, Haralambos Mouratidis. 1-5 [doi]
- Localization of Anchor Nodes for Wireless Sensor NetworksQiao-Ling Du, Zhihong Qian, Hong Jiang, Shu-Xun Wang. 1-5 [doi]
- Coverage Area Computation on the Run for Efficient Sensor Data CollectionPrem Prakash Jayaraman, Arkady B. Zaslavsky, Jerker Delsing. 1-4 [doi]
- Connectivity Aware Instrumental Approach for Measuring Vocal Transmission Quality Over a Wireless Ad-Hoc NetworkSofiene Jelassi, Habib Youssef. 1-5 [doi]
- Security Oriented Analysis of B92 by Model CheckingMohamed Elboukhari, Abdelmalek Azizi, Mostafa Azizi. 1-6 [doi]
- Querying and Semantic Mapping Approaches for Semantic Resolution in E-Learning SystemRashid Jayousi, Yasmin Bali. 1-5 [doi]
- A Bayesian Filter to Detect Misbehaving Nodes in MANETsYoucef Beghriche, Vincent Toubiana, Houda Labiod. 1-5 [doi]
- TLS TandemMohamad Badra, Pascal Urien. 1-5 [doi]
- Computation of SAR for Two Antennas Used in Mobile Communication Systems: Monopole and PatchMohammed Bouhorma, F. Elouaai, Ahmed Mamouni. 1-5 [doi]
- Time and Location Based Services with Access ControlClara Bertolissi, Maribel Fernández. 1-6 [doi]
- End-to-End QoS Improvement of HSDPA End-User Multi-Flow Traffic Using RAN Buffer ManagementSuleiman Y. Yerima, Khalid Al-Begain. 1-5 [doi]
- Fire Detection using Wireless Sensor Networks: An Approach Based on Statistical Data ModelingGennaro Boggia, Pietro Camarda, Luigi Alfredo Grieco, Maria Rita Palattella. 1-5 [doi]
- WMTP - A Modular WSN Transport Protocol: The Fairness ModuleLuÃs D. Pedrosa, Rui M. Rocha. 1-6 [doi]
- Specification of Rating Function of Online Charging System in 3GPP IP Multimedia System (IMS) EnvironmentHanane Oumina, Daniel Ranc. 1-5 [doi]
- Performance Evaluation of the Location-Based Protocol DREAM for Large Mobile Ad Hoc NetworksMohamed Bakhouya, Nathanael Cottin. 1-6 [doi]
- Mutual Authentication for SIP: A Semantic Meaning for the SIP Opaque ValuesThomas Guillet, Ahmed Serhrouchni, Mohamad Badra. 1-6 [doi]
- Formal Modelling and Validation of a Novel Energy Efficient Cross-Layer MAC Protocol in Wireless Multi Hop Sensor Networks Using Time Petri NetsKechar Bouabdellah, Larbi Sekhri. 1-5 [doi]
- Aspect Oriented Modeling of Component Architectures Using AADLLydia Michotte, Thomas Vergnaud, Peter H. Feiler, Robert B. France. 1-6 [doi]
- A Distributed Dynamic Mobility Management Scheme Designed for Flat IP ArchitecturesPhilippe Bertin, Servane Bonjour, Jean-Marie Bonnin. 1-5 [doi]
- Joint Optimization of Node Cooperation and Energy Saving in Wireless Sensor Networks with Multiple Access Channel SettingNavid MirMotahhary, S. Ali. A. Fakoorian, Hamed Asadi, Reza Khaniki, Zahra Rahimkhani. 1-5 [doi]
- An Overlay Network for a SIP Servlet-Based Service Execution Environment in Stand Alone MANETsSlimane Bah, Roch H. Glitho, Rachida Dssouli. 1-5 [doi]
- A New Wireless Fiber Optic Sensor for Monitoring Breath MotionXiaobin Xu, Chunxi Zhang, Kun Mean Hou, Hao Ding, Xunming Diao. 1-5 [doi]
- Multi Layer Cyber Attack Detection through HoneynetJagjit S. Bhatia, Rakesh Sehgal, Bharat Bhushan, Harneet Kaur. 1-5 [doi]
- A Heuristic Approach to Minimum-Cost Network Hardening Using Attack GraphTania Islam, Lingyu Wang. 1-5 [doi]
- Multipath Routing Scheme in Solar Powered Wireless Sensor NetworksThirumal Kandasamy, Jaya Kumar Krishnan. 1-5 [doi]
- Towards Efficient Over-Encryption in Outsourced Databases Using Secret SharingShuai Liu, Wei Li, Lingyu Wang. 1-5 [doi]
- Hybrid Integration Approach for Heteregenous Information Sources: Applied to Medical Resources and Patients Medical DocumentsLoubna Cherrat, Mostafa Ezziyyani, Mohammed Essaaidi, Mustapha Bennouna, Mohammed Ezziyyani. 1-5 [doi]
- Support Vector Machines for Multiple Targets Tracking with Sensor NetworksA. El Gonnouni, S. Pino Povedano, Francisco Javier González Serrano, Abdelouahid Lyhyaoui. 1-5 [doi]
- Annulling Traps & Fixed Traps in Chaos CryptographyStamatios V. Kartalopoulos. 1-4 [doi]
- Distributed Intrusion Detection Systems of Computer Communication NetworksAdam Grzech, Mariusz Kazmierski. 1-5 [doi]
- Architecture for Consuming Long-Lived Mobile Web Services over Multiple Transport ProtocolsFahad Aijaz, Seyed Mohammad Adeli, Bernhard Walke. 1-5 [doi]
- Securing Roaming and Vertical Handover between Mobile WiMAX and UMTSNeila Krichene, Noureddine Boudriga. 1-5 [doi]
- Biometric Identification System Based on Electrocardiogram DataY. Gahi, M. Lamrani, Abdelhak Zoglat, Mouhcine Guennoun, Bill Kapralos, Khalil El-Khatib. 1-5 [doi]
- A Simple and Efficient Detection of Wormhole AttacksDang-Quan Nguyen, Louise Lamont. 1-5 [doi]
- Performance Evaluation for Saturated 802.16 Networks with Binary Backoff MechanismHai L. Vu, Sammy Chan. 1-5 [doi]
- Security Analysis and Security Optimizations for the Context Transfer ProtocolFabien Allard, Jean Michel Combes, Rafa Marin, Antonio F. Gómez-Skarmeta. 1-5 [doi]
- An Efficient Self-Healing Key Distribution SchemeBiming Tian, Song Han, Tharam S. Dillon. 1-5 [doi]
- Offline Approach to Modeling and Optimization of Flows in Peer-to-Peer SystemsKrzysztof Walkowiak. 1-5 [doi]
- An RF Channel Emulator-Based Testbed for Cooperative Transmission Using Wireless Sensor DevicesJin-Woo Jung, Mary Ann Ingram. 1-4 [doi]
- Introduction of Security in the Service Level Negotiated with SLNP ProtocolMohamed Aymen Chalouf, Xavier Delord, Francine Krief. 1-5 [doi]
- Energy Adaptive Approach In a Multi-Channel Dissemination-Based NetworkAhmad S. Al-Mogren. 1-6 [doi]
- Multihop Data Message Transmission with Inter-Vehicle Communication and Store-Carry-Forward in Sparse Vehicle Ad-Hoc Networks (VANET)Hiroaki Oka, Hiroaki Higaki. 1-5 [doi]
- Municipal Wireless Networks PlanningPaolo Giacomazzi, Alessandro Poli. 1-3 [doi]
- Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall IntegrationSenda Hammouda, Lilia Maalej, Zouheir Trabelsi. 1-5 [doi]
- A New SIP Based Services Connecting IMS and DLNA for Future Converged NetworksS. Vijay Anand. 1-5 [doi]
- Private Communication and Authentication Protocol for Wireless Sensor NetworksSk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata. 1-6 [doi]
- Mobility Support and Improving GPSR Routing Approach in Vehicular Ad Hoc NetworksNadia Brahmi, Mounir Boussedjra, Joseph Mouzna. 1-6 [doi]
- An Approach to Improve the Radio Channel Bandwidth in Hierarchical Mobile IP Networks (HMIPv6-BI)Line Becerra, Jhon Padilla, Josep Paradells. 1-5 [doi]
- A New Link Adaptation Scheme for IEEE 802.11 WLANsAhmed Riadh Rebai, Mariem Fliss, Slah Jarboui, Saïd Hanafi. 1-5 [doi]
- Proposal of a Novel Bandwidth Management Framework for IEEE 802.16 Based on AggregationMohamad El Masri, Slim Abdellatif, Guy Juanole. 1-5 [doi]
- Self Organizing Maps for Synchronization in Wireless Sensor NetworksLuca Paladina, Antonino Biundo, Marco Scarpa, Antonio Puliafito. 1-6 [doi]
- MEHR: Multi-Hop Energy-Aware Hierarchical Routing for Wireless Sensor NetworksAbolfazl Asudeh, Ali Movaghar. 1-6 [doi]
- A New Approach for Wireless Sensor Network Management: LiveNCMAurélien Jacquot, Jean-Pierre Chanet, Kun Mean Hou, Xun Xing Diao, Jian-Jin Li. 1-6 [doi]
- Impact of IPSec on the Performance of the IEEE 802.16 Wireless NetworksEzedin Barka, Khaled Shuaib, H. Chamas. 1-6 [doi]
- The Relationship between Cyber Crime and Mental IllnessShabana Kabeer, Maqbool Uddin Shaikh. 1-6 [doi]
- Mobility Impact on DSR-Based Power-Aware Ad hoc Routing ProtocolFedoua Didi, Benamar Bouyedou, Mohamed Feham, Houda Labiod. 1-6 [doi]
- Path Selection Method for Localized QoS RoutingAhmed S. Alzahrani, Michael E. Woodward. 1-5 [doi]
- Controlling Physical Objects with Privacy using Secure RFID SystemFahad Samad, Sadeq Ali Makram. 1-4 [doi]
- NETPOPPS: A Network Provider Oriented Peer-to-Peer SystemMarguerite Fayçal, Ahmed Serhrouchni. 1-6 [doi]
- Employing Clustering Techniques in Mobile Network PlanningLamiaa Fattouh Ibrahim, Manal Hamed Al Harbi. 1-9 [doi]