Abstract is missing.
- A Survey of Reinforcement Learning Based Routing Protocols for Mobile Ad-Hoc NetworksSaloua Chettibi, Salim Chikhi. 1-13 [doi]
- Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile AgentDebdutta Barman Roy, Rituparna Chaki. 14-23 [doi]
- A Novel Power-Balanced Routing Scheme for WSNAyan Kumar Das, Rituparna Chaki. 24-34 [doi]
- SRCHS - A Stable Reliable Cluster Head Selection ProtocolDitipriya Sinha, Rituparna Chaki. 35-44 [doi]
- Handover Latency Reduction Using Integrated Solution Scheme for Proxy Mobile IPv6Md. Mahedi Hassan, Poo Kuan Hoong. 45-56 [doi]
- Combating Sybil Attacks in Vehicular Ad Hoc NetworksKhaled Mohammed Rabieh, Marianne Amir Azer. 65-72 [doi]
- TCSAP: A New Secure and Robust Modified MANETconf ProtocolAbdelhafid Abdelmalek, Zohra Slimane, Mohamed Feham, Abdelmalik Taleb-Ahmed. 73-82 [doi]
- Highly Resilient Communication Using Affine Planes for Key Predistribution and Reed Muller Codes for Connectivity in Wireless Sensor NetworkSamiran Bag, Amrita Saha, Pinaki Sarkar. 83-94 [doi]
- A Cyclic-Translation-Based Grid-Quadtree Index for Continuous Range Queries over Moving ObjectsHao Chen, Guangchun Luo, Aiguo Chen, Ke Qin, Caihui Qu. 95-109 [doi]
- Two-Stage Clustering with k-Means AlgorithmRaied Salman, Vojislav Kecman, Qi Li, Robert Strack, Erik Test. 110-122 [doi]
- An Energy and Delay-Aware Routing Protocol for Mobile Ad-Hoc NetworksJihen Drira Rekik, Leïla Baccouche, Henda Ben Ghézala. 123-134 [doi]
- Energy-Aware Transmission Scheme for Wireless Sensor NetworksAbdullahi Ibrahim Abdu, Muhammed Salamah. 135-144 [doi]
- PRWSN: A Hybrid Routing Algorithm with Special Parameters in Wireless Sensor NetworkArash Ghorbannia Delavar, Javad Artin, Mohammad Mahdi Tajari. 145-158 [doi]
- Cone Tessellation Model for Three-Dimensional NetworksGözde Sarisin, Muhammed Salamah. 159-169 [doi]
- The PerformanceComparison Between Hybrid and Conventional Beamforming Receivers in a Multipath ChannelRim Haddad, Ridha Bouallegue. 185-196 [doi]
- A Qualitative Survey on Multicast Routing in Delay Tolerant NetworksSushovan Patra, Sujoy Saha, Vijay K. Shah, Satadal Sengupta, Konsam Gojendra Singh, Subrata Nandi. 197-206 [doi]
- Integrating RFID Technology in Internet ApplicationsSimon Fong 0001. 207-216 [doi]
- BPSO Algorithms for Knapsack ProblemAmira Gherboudj, Salim Chikhi. 217-227 [doi]
- Systematic Selection of CRC Generator Polynomials to Detect Double Bit Errors in Ethernet NetworksBehrouz Zolfaghari, Hamed Sheidaeian, Saadat Pour-Mozafari. 228-235 [doi]
- Security Analysis of Ultra-lightweight Protocol for Low-Cost RFID Tags: SSL-MAPMehrdad Kianersi, Mahmoud Gardeshi, Hamed Yousefi. 236-245 [doi]
- File Distribution Algorithm from Multiple Road Side Units in Vehicular NetworksSaleh Yousefi, Amin Amini Maleki, Reza Hashemi. 246-255 [doi]
- SMART-IP: A Multi-Agent System for Network Analysis and IP Addressing ResolutionSamia Boucherkha, Mohamed Nadjib Djeghri. 256-265 [doi]
- Adaptive QoS Resource Management by Using Hierarchical Distributed Classification for Future Generation NetworksSimon Fong 0001. 266-278 [doi]
- 0.18um CMOS Technology in Implementation of S Box and a Modified S BoxK. Rahimunnisa, K. Rajeshkumar, S. Suresh Kumar. 279-287 [doi]
- A Survey of Middleware for Internet of ThingsSoma Bandyopadhyay, Munmun Sengupta, Souvik Maiti, Subhajit Dutta. 288-296 [doi]
- New Framework for Dynamic Policy Management in Grid EnvironmentsTariq Falah Alwada'n, Helge Janicke, Omer Aldabbas 0001, Hamza Aldabbas. 297-304 [doi]
- Zone Based Seamless Vertical Handoff Technique between WiFi and WiMaxAbhijit Sarma, Sukumar Nandi. 305-314 [doi]
- A Cluster-Based Dynamic Load Balancing Protocol for GridsResat Ümit Payli, Kayhan Erciyes, Orhan Dagdeviren. 315-324 [doi]
- A P2P Based Scheduler for Home GridsErick Lopes da Silva, Peter F. Linington. 325-336 [doi]
- A Multi-Agent System-Based Resource Advertisement Model for Grid EnvironmentsMuntasir Al-Asfoor, Maria Fasli, Salah Al-Majeed. 337-347 [doi]
- Grid-Enabled Framework for Large-Scale Analysis of Gene-Gene InteractionsMoez Ben Haj Hmida, Yahya Slimani. 348-357 [doi]
- A Context-Based Cyber Foraging Approach to Mobile Computing EmpowermentSomayeh Kafaie, Omid Kashefi, Mohsen Sharifi. 358-367 [doi]
- An Implementation of $\mathcal{A}^{xml(T)}$ : An Answer Set Programming Based Formal Language of Authorisation for XML DocumentsSean Policarpio, Yun Bai. 378-387 [doi]
- On Cloud Computing SecurityYun Bai, Sean Policarpio. 388-396 [doi]
- PAPR Reduction in OFDM by Using Modernize SLM TechniqueAshutosh K. Dubey, Yogeshver Khandagre, Ganesh Raj Kushwaha, Khushboo Hemnani, Ruby Tiwari, Nishant Shrivastava. 397-405 [doi]
- Application of Integrated Decision Support Model in TenderingFadhilah Ahmad, Md. Yazid Bin Mohd. Saman. 406-413 [doi]
- Query and Update Support for Indexed and Compressed XML (QUICX)Radha Senthilkumar, Arputharaj Kannan. 414-428 [doi]