Abstract is missing.
- Outdoor Path Loss Measurements of WiMAX at 2.5 GHz in Suburban EnvironmentMarco Petracca, Francesco Vatalaro, Annalisa Durantini, Marco Vari. 1-5 [doi]
- Active ISP Involvement in Content-Centric Future InternetSalekul Islam, Jean-Charles Grégoire. 1-5 [doi]
- A Dual Approach to Detect Pharming Attacks at the Client-SideSophie Gastellier-Prevost, Gustavo Gonzalez Granadillo, Maryline Laurent. 1-5 [doi]
- Secure Instant Messaging Protocol for Centralized Communication GroupMohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, Hassan M. Elkamchouchi. 1-4 [doi]
- OST-Tree: An Access Method for Obfuscating Spatio-Temporal Data in Location Based ServicesQuoc Cuong To, Tran Khanh Dang, Josef Küng. 1-5 [doi]
- Ontology Based Interoperation for Securely Shared Services: Security Concept Matching for Authorization Policy InteroperabilityIoana Ciuciu, Gang Zhao, David W. Chadwick, Quentin Reul, Robert Meersman, Cristian Vasquez Paulus, Mark Hibbert, Sandra Winfield, Thomas Kirkham. 1-5 [doi]
- MMOR: A Mapping Method for Ontology Registration to Improve XMDRJeong-Dong Kim, Jiseong Son, Doo-Kwon Baik. 1-5 [doi]
- Self-Stabilizing Passive Replication for Internet Service PlatformsKoji Hasebe, Kei Yamatozaki, Akiyoshi Sugiki, Kazuhiko Kato. 1-6 [doi]
- Providing Resistance against Server Information Leakage in RFID SystemsSüleyman Kardas, Albert Levi, Ertugrul Murat. 1-7 [doi]
- Securing Communications between Multiple Entities Using a Single TLS SessionMohamad Badra. 1-4 [doi]
- eTNet: A Smart Card Network Architecture for Flexible Electronic Commerce ServicesTakeshi Yashiro, M. Fahim Ferdous Khan, Ito So, Masahiro Bessho, Shinsuke Kobayashi, Tomonori Usaka, Noboru Koshizuka, Ken Sakamura. 1-5 [doi]
- Anonymization in Intelligent Surveillance SystemsHauke Vagts, Christoph Bier, Jürgen Beyerer. 1-4 [doi]
- Digital Fountains + P2P for Future IPTV Platforms: A Test-Bed EvaluationGustavo Marfia, Marco Roccetti, Alessandro Cattaneo, Alexandro Sentinelli, Andrea Vitali, Luca Celetto, Mario Gerla. 1-5 [doi]
- A Hybrid Stateless QoS Approach for Wireless Mobile Ad hoc NetworksLyes Khoukhi, Ali El Masri, Dominique Gaïti. 1-5 [doi]
- Powering Wireless Sensor Networks Nodes in Northern Europe Using Solar Cell Panel for Energy HarvestingJakob Gakkestad, Leif Hanssen. 1-5 [doi]
- Steps Towards Autonomous Network Security: Unsupervised Detection of Network AttacksPedro Casas, Johan Mazel, Philippe Owezarski. 1-5 [doi]
- Non-Line-Of-Sight Error Mitigation Technique for Wireless Localization in Micro-Cell NetworksHooman Lal Dehghani, Kamal Shadi, Saeed Golmohammadi. 1-5 [doi]
- A Distributed Data Collection Algorithm for Wireless Sensor Networks with Persistent Storage NodesSalah A. Aly, Ahmed Ali-Eldin, H. Vincent Poor. 1-5 [doi]
- Performance Evaluation of Storage-Independent Model for SPARQL-to-SQL Translation AlgorithmsJiseong Son, Jeong-Dong Kim, Doo-Kwon Baik. 1-4 [doi]
- On the Enhanced Ranging Performance for IEEE 802.15.4 Compliant WSN DevicesHemat K. Maheshwari, Andrew H. Kemp. 1-5 [doi]
- RMC-MAC: A Reactive Multi-Channel MAC Protocol for Opportunistic Spectrum AccessSonia Fourati, Soumaya Hamouda, Sami Tabbane. 1-5 [doi]
- The Problem of NIDS Evasion in Mobile NetworksMichele Colajanni, Luca Dal Zotto, Mirco Marchetti, Michele Messori. 1-6 [doi]
- Several Characteristics of Active/Sleep Model in Wireless Sensor NetworksWei Wayne Li. 1-5 [doi]
- 3GPP IMS-Based Inter-Device CollaborationSyed S. Husain, Shin-ichi Isobe, Kaniz Mahdi, LaeYoung Kim, Arnaud Vedrine, Andreas Kunz, Antoine Mouquet, Rajat Ghai, Mario Madella. 1-6 [doi]
- A Batch Authentication Protocol for V2G CommunicationsHuaqun Guo, Yongdong Wu, Hongmei Chen, Maode Ma. 1-5 [doi]
- A Novel Attack Model Simulation in DSDV RoutingRajbir Kaur, Manoj Singh Gaur, Vijay Laxmi. 1-5 [doi]
- Ensuring Low Cost Authentication with Privacy Preservation in Federated IMS EnvironmentsKheira Bekara, Yosra Ben Mustapha, Samia Bouzefrane, Khaled Garri, Maryline Laurent, Pascal Thoniel. 1-5 [doi]
- On the Security of Two Fuzzy Identity-Based Signature SchemesSyh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi. 1-5 [doi]
- A High Performance Neurocomputing Algorithm for Prediction Tasks in Wireless Sensor NetworksJochen Rust, Xinwei Wang, Rainer Laur, Steffen Paul. 1-5 [doi]
- On the Partial Ordering of the Discrete Memoryless Channels Arising in Cooperative Sensor NetworksPaul Cotae, Ira S. Moskowitz. 1-5 [doi]
- Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector MachinesPhilipp Winter, Eckehard Hermann, Markus Zeilinger. 1-5 [doi]
- Sinks Mobility Strategy in IPv6-Based WSNs for Network Lifetime ImprovementLeila Ben Saad, Bernard Tourancheau. 1-5 [doi]
- Distributed Detection of Events for Evaluation of Energy Efficiency in BuildingsSergio A. de la Campa, Ana B. Rodríguez-Gonzílez, Javier Ramos, Antonio J. Caamaño. 1-6 [doi]
- Towards Usable Client-Centric Privacy Advisory for Mobile Collaborative Applications Based on BDDsMohamed Bourimi, Jörn Ossowski, Dhiah el Diehn I. Abou-Tair, Stefan Berlik, Dirar Abu-Saymeh. 1-6 [doi]
- Neighbour Discovery for Transmit Power Adjustment in IEEE 802.15.4 Using RSSIWilawan Rukpakavong, Iain Phillips, Lin Guan. 1-4 [doi]
- Well-Conditioned Sensor Placement for Range-Only LocalizationKamal Shadi, Hooman Lal Dehghani, Iman Gholampour. 1-5 [doi]
- Pmcmtp's Implementation (in nesC/TinyOS2.x) and Testbed for Its Operation ValidationJamila Ben Slimane, Yeqiong Song, Anis Koubaa, Mounir Frikha, Hugo Cruz-Sanchez. 1-6 [doi]
- Design of Wireless Sensor System for Neonatal MonitoringWei Chen 0015, Son Tung Nguyen, Sibrecht Bouwstra, Roland Coops, Lindsay Brown, Sidarto Bambang-Oetomo, Loe M. G. Feijs. 1-5 [doi]
- 2PLS: Integrating Proxy Mobile IPv6 and MPLS in Wireless Access NetworksCarlos A. Astudillo, Oscar J. Calderón, Jesús H. Ortiz. 1-5 [doi]
- QoS and Admission Probability Study for a SIP-Based Central Managed IP Telephony SystemJosé Ma Saldaña, Jenifer Murillo, Julián Fernández-Navajas, José Ruíz-Mas, Eduardo Viruete Navarro, José I. Aznar. 1-6 [doi]
- The Flexible Bus Systems Using Zigbee as a Communication MediumRazi Iqbal, Kenichi Yukimatsu, Tatsuya Ichikawa. 1-5 [doi]
- Wireless Alarming and Routing Protocol for Earthquake Early Warning SystemsJens Nachtigall, Jens-Peter Redlich. 1-6 [doi]
- A Multi Tier Group Location Management Scheme for Multi Interface Mobile StationYun Won Chung. 1-4 [doi]
- Extending Beacon-Enabled IEEE 802.15.4 to Achieve Efficient Energy Savings: Simulation-Based Performance AnalysisMounib Khanafer, Mouhcine Guennoun, Hussein T. Mouftah. 1-5 [doi]
- A Path Selection Criterion for Advance Resource ReservationEraldo Silveira e Silva, Jean-Marie Farines, Michel Diaz. 1-5 [doi]
- Performance of the Controlled Randomness Protocol on .NET Compact Framework Embedded SystemsKyriakos Stefanidis, Artemios G. Voyiatzis, Dimitrios N. Serpanos. 1-5 [doi]
- 2ANET: A Mobile Medium Ad Hoc NetworkJohn DeDourek, Przemyslaw Pochec. 1-4 [doi]
- A Semi-Markovian Individual Model of Users for P2P Video Streaming ApplicationsGrégory Bonnet, Ihsan Ullah, Guillaume Doyen, Lionel Fillatre, Dominique Gaïti, Igor Nikiforov. 1-5 [doi]
- An Algorithm for Restraining the OVSF Codes Shortage in HSDPAJahangir Dadkhah Chimeh, Seyed Mahmoud Mousavinejad, Aziz Mahmoodi. 1-4 [doi]
- Services Composition Based on Next-Generation Service Overlay Networks ArchitectureChristian Makaya, Benjamin Falchuk, Dana Chee, F. Joe Lin, Subir Das, Manabu Ito, Satoshi Komorita, Tsunehiko Chiba, Hidetoshi Yokota. 1-6 [doi]
- Broadband Video Streaming with Built-In ResiliencyIsmail A. Ali, Salah M. Saleh Al-Majeed, Sandro Moiron, Martin Fleury, Mohammed Ghanbari. 1-5 [doi]
- Agent-Based Approach to Plan Sensors Relocation in a Virtual Geographic EnvironmentNabil Sahli, Nafaâ Jabeur, Mohamad Badra. 1-5 [doi]
- OverCovert: Using Stack-Overflow Software Vulnerability to Create a Covert ChannelTamer S. Fatayer, Sherif M. Khattab, Fatma A. Omara. 1-5 [doi]
- A Markov Process for Dynamic Spectrum AccessUsama Mir, Leïla Merghem-Boulahia, Moez Esseghir, Dominique Gaïti. 1-5 [doi]
- Channel Loss Based Energy Consumption Model for Low-Power Wireless CommunicationsNikola Zogovic, Goran Dimic, Dragana Bajic. 1-5 [doi]
- A Novel Clustering Scheme for Sensor Networks Based on Intra-Cluster ConnectivityJiehui Chen, Mariam B. Salim, Mitsuji Matsumoto. 1-4 [doi]
- Can WiMAX Be a Viable Alternative for Wireless Broadband Operators in Europe?Marco Araújo, A. Manuel de Oliveira Duarte. 1-5 [doi]
- Architectural Design of Unified Multiplex Communications for One-Time Use of IP AddressesShingo Ata, Hiroshi Kitamura, Masayuki Murata. 1-4 [doi]
- IPv4/IPv6 Handoff on Lock-Keeper for High Flexibility and SecurityAhmad AlSa'deh, Feng Cheng 0002, Sebastian Roschke, Christoph Meinel. 1-6 [doi]
- Managing Access Control in Delay/Disruption Tolerant Networking (DTN) EnvironmentEnyenihi Johnson, Haitham S. Cruickshank, Zhili Sun. 1-5 [doi]
- Evaluation of Path Loss Models at WiMAX Cell-EdgeMohammed Alshami, Tughrul Arslan, John S. Thompson, Ahmet T. Erdogan. 1-5 [doi]
- Pre-Allocation of DHCP Leases: A Cross-Layer ApproachAndré Zúquete, Carlos Frade. 1-5 [doi]
- SLA Management & Monitoring Based-eTOM and WS-Composite for IMS NetworksRaouyane Brahim, Mohamed Errais, Mostafa Bellafkih, Daniel Ranc. 1-6 [doi]
- Upper Bounds on Network Lifetime for Clustered Wireless Sensor NetworksMaciej Nikodem, Bartosz Wojciechowski. 1-6 [doi]
- Fair and Abuse-Free Contract Signing Protocol Supporting Fair License ResellingTarek Gaber, Ning Zhang. 1-7 [doi]
- Protecting Privacy While Discovering and Maintaining Association RulesTran Khanh Dang, Josef Küng, Phuong Huynh Van Quoc. 1-5 [doi]
- Shared Backup & Restore: Save, Recover and Share Personal Information into Closed Groups of SmartphonesVittorio Ottaviani, Alessandro Lentini, Antonio Grillo, Silvia Di Cesare, Giuseppe F. Italiano. 1-5 [doi]
- Cross-Layer Secrecy Design on TCP/IP and 802.11 for Energy SavingAntonio Urbano Fullana, Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, María Francisca Hinarejos Campos, Llorenç Huguet i Rotger. 1-5 [doi]
- How Resistant are Sboxes to Power Analysis Attacks?Keanhong Boey, Máire O'Neill, Roger Woods. 1-6 [doi]
- Dynamic Spectrum Hole Management in Cognitive RadioInes Aissa, Mounir Frikha, Sami Tabbane. 1-4 [doi]
- Distributed Resource Allocation Mechanism for SOA Service Level AgreementsKostas Katsalis, Leandros Tassiulas, Yannis Viniotis. 1-6 [doi]
- QMoEs: A Bandwidth Estimation and Monitoring Tool for QoE-Driven Broadband NetworksJosé I. Aznar, Eduardo Viruete Navarro, Julián Fernández-Navajas, José Ruíz-Mas, José Ma Saldaña, Jenifer Murillo. 1-4 [doi]
- A Self-Stabilizing Algorithm for Stable Clustering in Mobile Ad-Hoc NetworksJunpei Kuroiwa, Yukiko Yamauchi, Weihua Sun, Minoru Ito. 1-7 [doi]
- The Effect of Unwanted Internet Traffic on Cellular Phone Energy ConsumptionIsmo H. Puustinen, Jukka K. Nurminen. 1-5 [doi]
- High Power Efficiency and Low Nonlinear Distortion for Wireless Visible Light CommunicationSang Burm Ryu, Jae Hoon Choi, Junyeong Bok, HuiKyu Lee, Heung-Gyoon Ryu. 1-5 [doi]
- A Scheme of H.264/SVC Video Broadcasting over IEEE 802.11 WLANYoung-Hwan Kim, Hae-Ryeon Park, Jung-Bong Suk. 1-5 [doi]
- A Mobility Management Solution for Simultaneous Mobility with mSCTPKaibo Zhou, Gang Liu, Yong Yao, Adrian Popescu. 1-5 [doi]
- Robust Blind and Secure Biometric Watermarking Based on Partial Multi-Map Chaotic EncryptionMohamed El-Mahallawy, Esam A. A. Hagras, Ahmed Zein Eldin, Mohamed Waleed Fakhr. 1-5 [doi]
- Adaptive Fuzzy-MAC for Power Reduction in Wireless Sensor NetworksErwing Ricardo Sanchez, Bartolomeo Montrucchio, Laura M. Murillo, Maurizio Rebaudengo. 1-5 [doi]
- Evaluation of Average Communication Interruption Time in MANETsBernardo Leal, Luigi Atzori. 1-5 [doi]
- Cooperative Mobility Management in Multihomed End-to-End CommunicationsXiaofei Zhang, Thi Mai Trang Nguyen, Guy Pujolle. 1-5 [doi]
- Replication Schemes in Unattended Wireless Sensor NetworksDomenico Vitali, Angelo Spognardi, Luigi V. Mancini. 1-5 [doi]
- Beamforming with Partial Channel KnowledgeShimi Shilo, Anthony J. Weiss, Amir Averbuch. 1-5 [doi]
- mobSim - A Network Mobility Simulation Tool for Very Large-Scale ScenariosPedro Vale Pinheiro, Fernando Boavida. 1-5 [doi]
- Design and Evaluation of a Location-Based Mobile News ReaderSolveig Bjørnestad, Bjørnar Tessem, Lars Nyre. 1-4 [doi]
- A New Approach to Design Graphically Functional Tests for Communication ServicesPatrick Wacht, Thomas Eichelmann, Armin Lehmann, Ulrich Trick. 1-5 [doi]
- Reformulating User's Queries for Intentional Services Discovery Using an Ontology-Based ApproachKadan Aljoumaa, Saïd Assar, Carine Souveyet. 1-4 [doi]
- Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio NetworksColin O'Flynn. 1-5 [doi]
- Dimensionality Reduction and Noise Removal in Wireless Sensor NetworksEhsan Sheybani. 1-5 [doi]
- Performance of Localization Algorithm under Corrupted Measurement Data and Lopsided Sensor ArrangementHiroyuki Hatano, Tomoharu Mizutani, Kazuya Sugiyama, Yoshihiko Kuwahara. 1-4 [doi]
- Statistical Analysis of Self-Similar Session Initiation Protocol (SIP) Messages for Anomaly DetectionNeda Hantehzadeh, Anil Mehta, Vijay K. Gurbani, Lalit Gupta, Tin Kam Ho, Gayan Wilathgamuwa. 1-5 [doi]
- Deeploc: Discreet Indoor People Location ApplicationSergio Lujan-Fernandez, Juan Suardíaz Muro, Andres Cabrera-Lozoya, Fernando Cerdán. 1-5 [doi]
- Assessing the Impact of Signaling on the QoE of Push-Based P2P-TV Diffusion AlgorithmsDario Rossi, Paolo Veglia. 1-5 [doi]
- COSMIC: A Cooperative MAC Protocol for WSN with Minimal Control MessagesAhmed Ben Nacef, Sidi-Mohammed Senouci, Yacine Ghamri-Doudane, André-Luc Beylot. 1-5 [doi]
- Femtocell Traffic Offload Scheme for Core NetworksJaehoon Roh, Yungha Ji, Yong Gyoo Lee, Taehyo Ahn. 1-5 [doi]
- Coverage-Aware Node-Disjoint Multipath Selection in Wireless Multimedia Sensor NetworksDaniel G. Costa, Luiz Affonso Guedes. 1-5 [doi]
- Energy Efficient Data Restoring after Power-Downs for Wireless Sensor Networks Nodes with Energy ScavengingKonstantin Mikhaylov, Jouni Tervonen. 1-5 [doi]
- Optimizing Position Updates for kNN - Is It Worth It?Philipp Engel, Florian Gschwandtner, Johannes Martens, Florian Fuchs, Georg Treu. 1-8 [doi]
- Information-Centric Multiaccess P2P NetworksOlli Mämmelä, Kostas Pentikousis, Petteri Mannersalo. 1-4 [doi]
- Augmenting a Webmail Application with Cryptographic Puzzles to Deflect SpamMarius Cristea, Bogdan Groza. 1-5 [doi]
- Improvements to Inter System Handover in the EPC EnvironmentSandra Frei, Woldemar F. Fuhrmann, Andreas Rinkel, Bogdan V. Ghita. 1-5 [doi]
- An Energy Considered Routing Protocol of Free Space Optical Sensor NetworkRong Xie, Fei Tong, Won-Hyuk Yang, Young-Chon Kim. 1-5 [doi]
- Using OTP with PAKE: An Optimized Implementation of a Synchronization WindowMoez Ben MBarka, Louis Granboulan, Francine Krief. 1-5 [doi]
- Selective Reprogramming in Sensor NetworksDaniela Krüger, Dennis Pfisterer, Carsten Buschmann. 1-5 [doi]
- An Optimal Guard-Intervals Based Mechanism for Key Generation from Multipath Wireless ChannelsYoussef El Hajj Shehadeh, Dieter Hogrefe. 1-5 [doi]
- UACML: Unified Access Control Modeling LanguageNadera Slimani, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo. 1-8 [doi]
- An Analysis of Web Caching in Current Mobile Broadband ScenariosDaniel Catrein, Bernd Lohrer, Christoph Meyer, René Rembarz, Thomas Weidenfeller. 1-5 [doi]
- Extended Handover Keying and Modified IEEE 802.21 Resource Query Approach for Improving Vertical Handoff PerformanceAhmed H. Zahran, Cormac J. Sreenan. 1-7 [doi]
- A Taxonomy of Wireless Sensor Networks with QoSVasco Pereira, Jorge Sá Silva, Jorge Granjal, Ricardo Silva, Edmundo Monteiro, Qiang Pan. 1-4 [doi]
- HTTP Acceleration over High Latency LinksPaul Davern, Noor Nashid, Ahmed H. Zahran, Cormac J. Sreenan. 1-5 [doi]
- Towards an Autonomic Piloting Virtual Network ArchitectureIlhem Fajjari, Mouna Ayari, Othmen Braham, Guy Pujolle, Hubert Zimmermann. 1-5 [doi]
- Requirement Considerations for Ubiquitous Integration of Cooperating ObjectsStamatis Karnouskos, Vladimir Villaseñor Herrera, Muhammad Haroon, Marcus Handte, Pedro José Marrón. 1-5 [doi]
- Performance Analysis of Node Cooperation with Network Coding in Wireless Sensor NetworksHani Attar, Dejan Vukobratovic, Lina Stankovic, Vladimir Stankovic. 1-4 [doi]
- Ethernet Access Networks Resources Sharing from a Signalling PerspectiveMaxweel Carmo, Jorge Sá Silva. 1-5 [doi]
- A Hybrid Approach for Network Selection in Heterogeneous Multi-Access EnvironmentsMohamed Lahby, Leghris Cherkaoui, Abdellah Adib. 1-5 [doi]
- A Chemical Model to Enable Context AwarenessAhsan Ikram, Nigel Baker, Michael Knappmeyer, Ralf Tönjes. 1-5 [doi]
- Comparisons of Home Area Network Connection Alternatives for Multifamily Dwelling UnitsJun Wang 0008, Victor C. M. Leung. 1-5 [doi]
- C-DRIVE: Clustering Based on Direction in Vehicular EnvironmentNitin Maslekar, Mounir Boussedjra, Joseph Mouzna, Houda Labiod. 1-5 [doi]
- Fusion of Artificial Vision and GPS to Improve Blind Pedestrian PositioningAdrien Brilhault, Slim Kammoun, Olivier Gutierrez, Philippe Truillet, Christophe Jouffrais. 1-5 [doi]
- An Agile Service Platform for Telecommunication EnvironmentsLajos Lange, Alexander Blotny, Thomas Magedanz. 1-6 [doi]
- TCP over 6LoWPAN for Industrial Applications: An Experimental StudyTiancong Zheng, Ahmed Ayadi, Xiaoran Jiang. 1-4 [doi]
- Implementation of a PUF Circuit on a FPGAMehmet Soybali, Siddika Berna Örs, Gökay Saldamli. 1-5 [doi]
- High Performance Implementation of Snow3G Algorithm in Memory Limited EnvironmentsVaidyanathan Jairaj, Jaakko Pohjonen, Konstantin Shemyak. 1-4 [doi]
- Distribution of Individually Watermarked Content in Peer-to-Peer NetworksKarl-Göran Stenborg, Magnus Herberthson, Robert Forchheimer. 1-4 [doi]
- BitTorrent's Mainline DHT Security AssessmentJuan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor. 1-5 [doi]
- A Connection Oriented Framework for Effectively Using Multicore in the EnterpriseSuresh Venugopal, Sravan Desikan. 1-7 [doi]
- Implementation of Complex Strategies of Security Insecure Embedded SystemsBruno Robisson, Michel Agoyan, Sébastien Le Henaff, Patrick Soquet, Guillaume Phan, Franck Wajsbürt, Pirouz Bazargan-Sabet. 1-5 [doi]
- Microwave Autodyne Sensor for Monitoring of Cardiac Rhythm of Mines WorkersIgor Shirokov. 1-4 [doi]
- Proposal and Evaluation of a Dynamic Resource Allocation Method Based on the Load of VMs on IaaSAtsuo Inomata, Taiki Morikawa, Minoru Ikebe, Yoshihiro Okamoto, Satoru Noguchi, Kazutoshi Fujikawa, Hideki Sunahara, Sk. Md. Mizanur Rahman. 1-6 [doi]
- Topology Dynamics and Network Architecture Performance in Wireless Body Sensor NetworksElyes Ben Hamida, Raffaele D'Errico, Benoît Denis. 1-6 [doi]
- Interference Modeling and Relay Selection Issue for Amplify-and-Forward IR-UWB Sensor NetworksJiejia Chen, Laurent Clavier, Yong Xi, Alister G. Burr, Nathalie Rolland, Paul-Alain Rolland. 1-5 [doi]
- Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware DetectionGregory Blanc, Ruo Ando, Youki Kadobayashi. 1-6 [doi]
- Secure Delivery of Equipment Identity from Vendor to OperatorKonstantin Shemyak, Jussi Kosonen. 1-5 [doi]
- Dynamic Topology Control for WSNs in Critical EnvironmentsZinon Zinonos, Vasos Vassiliou, Christina Ioannou, Marios Koutroullos. 1-5 [doi]
- An Ontological Approach to Inter-Operation of Mobile ServicesTara Raafat, Franjo Cecelja. 1-4 [doi]
- An Efficient Paging Scheme for Terminal Mobility Using Personal Mobility Management Information in Interworked Fixed and Mobile NetworksYun Won Chung. 1-5 [doi]
- Hybrid Indoor Positioning Approaches Based on WSN and RFIDZhoubing Xiong, Francesco Sottile, Maurizio A. Spirito, Roberto Garello. 1-5 [doi]
- Vulnerability Discrimination Using CVSS FrameworkLaurent Gallon. 1-6 [doi]
- TCP over Low-Power and Lossy Networks: Tuning the Segment Size to Minimize Energy ConsumptionAhmed Ayadi, Patrick Maillé, David Ros. 1-5 [doi]
- PHY-MAC Cross-Layer Optimized Design for Power Conservation in Wireless Ad Hoc NetworksHussein ElAttar, Hussein Abdelaty, Salwa H. Elramly, Mohamed A. Aboul-Dahab. 1-5 [doi]
- Mobility Assisted Routing in Mobile Ad Hoc NetworksKazi Atiqur Rahman, Kemal E. Tepe. 1-5 [doi]