Abstract is missing.
- Multipath Routing Based on Path Bandwidth in Multi-channel Wireless Mesh NetworksHong-Jong Jeong, Hongseok Yoo, Dongkyun Kim, Jungsoo Park. 1-12 [doi]
- The Efficiency of RSA Encrypted Video Calls on Mobile Internet DevicesMert Civriz, Derya Birant, Alp Kut 0001. 13-22 [doi]
- 2IRP: A New Energy Efficient Integrated Routing Protocol for MANETRakesh Kumar Mishra, Sankhayan Choudhury, Nabendu Chaki. 23-33 [doi]
- Multi-connection TFRC Video Streaming in a Concatenated Network: Latency and Video QualitySalah S. Al-Majeed, Martin Fleury. 34-45 [doi]
- Performance Evaluation of the Number of Database Accesses in Cellular NetworksMustafa Vahabzadeh Dolama, Akbar Ghaffarpour Rahbar. 46-58 [doi]
- BotSpot: Anonymous and Distributed Malware DetectionPéter Kenyeres, Attila Szentgyörgyi, Tamás Mészáros 0003, Gábor Fehér. 59-70 [doi]
- Throughput Maximisation of Different Signal Shapes Working on 802.16e Mobile Multihop Network Using Novel Cognitive MethodsBarbaros Preveze, Aysel Safak. 71-86 [doi]
- A Variant of Merkle Signature Scheme to Protect AODV Routing ProtocolSatria Mandala, Md. Asri Ngadi, Abdul Hanan Abdullah, Abdul Samad bin Haji Ismail. 87-98 [doi]
- Secure Spectrum Sensing and Decision in Cognitive Radio NetworksSeda Demirag Ersöz, Suzan Bayhan, Fatih Alagöz. 99-111 [doi]
- DRLC: A New Robust and Dynamically Load Balanced Clustering Scheme for Wireless Sensor NetworksIsmail Tellioglu, Haci A. Mantar. 112-122 [doi]
- Clustered De Bruijn Based Multi Layered Architectures for Sensor NetworksAnas Abu Taleb, Jimson Mathew, Dhiraj K. Pradhan. 123-136 [doi]
- An Adaptive Codec and Frame Size Modification Based QoS Algorithm over Multi-rate WLANsMehmet Fatih Tüysüz, Haci A. Mantar. 137-147 [doi]
- Efficient Scheduling of Low Cost Popular Services over a DVB-SH/3G NetworkAzza Jedidi, Frédéric Weis. 148-162 [doi]
- Semantic Routing for Improved Network Management in the Future InternetJohn Strassner, Sung-Su Kim, James Won-Ki Hong. 163-176 [doi]
- Mirror Routing for Satellite Networks with Cross-Layer OptimizationZhijiang Chang, Georgi Gaydadjiev. 177-189 [doi]
- Channels Intersection Weight Based Routing in Cognitive Radio NetworksLu Wang, Wei Wu 0008. 190-201 [doi]
- A Comparison on MANETs' Service Replication Schemes: Interest versus Topology PredictionMohamed Hamdy, Abdelouahid Derhab, Birgitta König-Ries. 202-216 [doi]
- Applying Vehicular Ad Hoc Networks for Reduced Vehicle Fuel ConsumptionMaazen Alsabaan, Kshirasagar Naik, Amiya Nayak. 217-228 [doi]
- An Analytical Model for Dynamic Inter-Operator Resource Sharing in 4G NetworksAhmet Cihat Toker, Fikret Sivrikaya, Nadim El Sayed, Sahin Albayrak. 229-240 [doi]
- Exact BER Performance of Antenna Array-Based Receiver using Multi-user Detection in a Multipath ChannelRim Haddad, Ridha Bouallegue. 241-253 [doi]
- On the Time between Successive Multi-path Discoveries and Hop Count Per Multi-path for Zone-Disjoint Routing in Mobile Ad Hoc NetworksNatarajan Meghanathan. 254-265 [doi]
- Knowledge, Opportunities and Information EthicsSyed Vickar Ahamed, Sevki S. Erdogan. 266-272 [doi]
- An Optimized MANET Gateway Discovery Based on Fuzzy LogicAntonio J. Yuste, Alicia Triviño, Eduardo Casilari, Francisco David Trujillo. 273-282 [doi]
- A Survey on Application of Neural Networks in Energy Conservation of Wireless Sensor NetworksNeda Enami, Reza Askari Moghadam, Abolfazl Haghighat. 283-294 [doi]
- A Dynamic Distributed Tree Based Tracking Algorithm for Wireless Sensor NetworksAysegul Alaybeyoglu, Aylin Kantarci, Kayhan Erciyes. 295-303 [doi]
- Distributed Weighted Node Shortest Path Routing for Wireless Sensor NetworksOnur Yilmaz, Kayhan Erciyes. 304-314 [doi]
- Host Based Dynamic Throughput Maximization Model for IEEE 802.11 WLANMurat Koyuncu, Mehmet Kazim Gercek, Tuncay Ercan. 315-326 [doi]
- Joint Reliable and Power-Efficient CDS-Based Topology Control for Wireless Multi-hop NetworksElahe Sadat Hosseini, Mahshid Yassaei, Alireza Ejlali, Hamid R. Rabiee, Vahid Esmaeelzadeh. 327-337 [doi]
- Vertical Handoff Decision Schemes for Heteregeneous Wireless Networks: An OverviewFatma Tansu, Muhammed Salamah. 338-348 [doi]
- Browser Games: The New Frontier of Social GamingJuha-Matti Vanhatupa. 349-355 [doi]
- IT Security Assessment for Interdisciplinary ResearchSyed M. Rahman, Syed Vickar Ahamed, Sevki S. Erdogan. 356-366 [doi]
- Structure and Communication of KnowledgeMichael R. Peterson, Syed V. Ahamed, Sevki S. Erdogan. 367-378 [doi]
- Existing Recognition Base Usability Features of the Graphical PasswordAli Mohamed Eljetlawi, Norafida Ithnin. 379-388 [doi]
- A Bilinear Pairing Based Hidden-Signature SchemeMohamed Rasslan, Amr M. Youssef. 389-397 [doi]
- An X.509 Based Licensed Digital Signature Framework for Hierarchical OrganizationsAlper Ugur, Ibrahim Sogukpinar. 398-408 [doi]
- Intelligent Network Applications for Medical SystemsSyed M. Rahman, Syed Vickar Ahamed. 409-416 [doi]
- Proposal of an On-demand Software Deployment System Based on Application Streaming, Virtualization Techniques and P2P TransportRafael Augusto Teixeira, Marcos Antônio Cavenaghi, Renata Spolon Lobato, Roberta Spolon Ulson. 417-424 [doi]
- Enhancing Web Caching Using Web Usage Mining TechniquesSamia Saidi, Yahya Slimani. 425-435 [doi]
- An Efficient Lightweight Authentication Protocol for Mobile Ad Hoc NetworkHeshem A. E. L. Zouka. 436-444 [doi]