Abstract is missing.
- IP Application Test FrameworkMichael Sauer. 1-7 [doi]
- Cross-Layer Based Approach to Detect Idle Channels and Allocate Them Efficiently Using Markov ModelsY. B. Reddy. 9-15 [doi]
- Threshold Based Call Admission Control for QoS Provisioning in Cellular Wireless Networks with Spectrum RentingShow-Shiow Tzeng, Ching-Wen Huang. 17-22 [doi]
- Ontology-Based Web Application TestingSamad Paydar, Mohsen Kahani. 23-27 [doi]
- Preventing the "Worst Case Scenario: " Combating the Lost Laptop Epidemic with RFID TechnologyDavid C. Wyld. 29-33 [doi]
- Information Security and System DevelopmentMargareth Stoll, Dietmar Laner. 35-40 [doi]
- A Survey of Wireless Sensor Network Interconnection to External NetworksAgnius Liutkevicius, Arunas Vrubliauskas, Egidijus Kazanavicius. 41-46 [doi]
- Comparing the Performance of UMTS and Mobile WiMAX Convolutional Turbo CodeEhab Ahmed Ibrahim, Mohamed Amr Mokhtar. 47-51 [doi]
- Perfromance of Interleaved Cipher Block Chaining in CCMPZadia Codabux-Rossan, M. Razvi Doomun. 53-58 [doi]
- Localization and Frequency of Packet Retransmission as Criteria for Successful Message Propagation in Vehicular Ad Hoc NetworksAndriy Shpylchyn, Abdelshakour Abuzneid. 59-64 [doi]
- Authentication Information Alignment for Cross-Domain FederationsZhengping Wu, Alfred C. Weaver. 65-70 [doi]
- Path Failure Effects on Video Quality in Multihomed EnvironmentsKarena Stannett, Adomas Sutkevicius, Enda Fallon, Yuansong Qiao, Paul Jacob, Austin Hanley. 81-86 [doi]
- Reconfigurable Implementation of Karatsuba Multiplier for Galois Field in Elliptic CurvesAshraf El-Sisi, Sameh M. Shohdy, Nabil A. Ismail. 87-92 [doi]
- Nonlinear Congestion Control Scheme for Time Delayed Differentiated-Services NetworksR. Vahidnia, M. Najafi, H. Firouzi, M. T. H. Beheshti. 93-97 [doi]
- Effect of Packet Size and Channel Capacity on the performance of EADARP Routing Protocol for Multicast Wireless ad hoc NetworksDina Darwish, Imane Aly Saroit, Abdel wehab Hassan. 99-104 [doi]
- Improving BGP Convergence Time via MRAI TimerAbdelshakour Abuzneid, Brandon J. Stark. 105-110 [doi]
- Enhanced Reconfigurability for MIMO Systems using Parametric ArraysNicolae Crisan, Ligia Chira Cremene. 117-122 [doi]
- Modified LEACH - Energy Efficient Wireless Networks CommunicationMohammed Abuhelaleh, Khaled M. Elleithy, Thabet M. Mismar. 123-127 [doi]
- Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural NetworksVicente Alarcón Aquino, Carlos A. Oropeza-Clavel, Jorge Rodríguez-Asomoza, Oleg Starostenko, Roberto Rosas-Romero. 129-134 [doi]
- Automatic Construction and Optimization of Layered Network Attack GraphYonggang Wang, Nike Gui, Jian-bin Hu, Zhong Chen. 135-138 [doi]
- Parallel Data Transmission: A Proposed Multi-layered Reference ModelThomas Chowdhury, Rashed Mustafa. 139-142 [doi]
- Besides Tracking - Simulation of RFID Marketing and BeyondZeeshan-ul-hassan Usmani, Fawzi Abdulkhaliq Alghamdi, Amina Tariqand, Talal Naveed Puri. 143-148 [doi]
- Light Path Provisioning using Connection Holding Time and Flexible WindowFatima Yousaf, Savera Tanwir, Smh Zaidi. 149-154 [doi]
- Distributed Hybrid Research Network Operations FrameworkDongkyun Kim, Kwangjong Cho, Huhn-Kuk Lim. 155-160 [doi]
- Performance of the Duo-Binary Turbo Codes in WiMAX SystemsTeodor B. Iliev, Georgi V. Hristov, Plamen Z. Zahariev, Mihail P. Iliev. 161-165 [doi]
- A unified event reporting solution for wireless sensor networksFaisal-Bashir Hussain, Yalçin Çebi. 167-172 [doi]
- A Low Computational Complexity Multiple Description Image Coding Algorithm Based on JPEG StandardYing-ying Shan, Xuan Wang. 173-176 [doi]
- A General Method for Synthesis of Uniform Sequences with Perfect Periodic AutocorrelationB. Y. Bedzhev, Mihail P. Iliev. 177-182 [doi]
- Using Support Vector Machines for Passive Steady State RF FingerprintingGeorgina O Mahony Zamora, Susan Bergin, Irwin O. Kennedy. 183-188 [doi]
- Genetic Optimization for Optimum 3G Network Planning: an Agent-Based Parallel ImplementationAlessandra Esposito, Luciano Tarricone, Stefano Luceri, Marco Zappatore. 189-194 [doi]
- A Survey about IEEE 802.11e for better QoS in WLANsMd. Abdul Based. 195-200 [doi]
- Method of a Signal Analysis for Imitation Modeling in a Real-Time NetworkIgor Sychev, Irina Sycheva. 201-206 [doi]
- Game Theoretic Approach for Discovering Vulnerable Links in Complex NetworksIgor Mishkovski, Sonja Filiposka, Sasho Gramatikov, Dimitar Trajanov, Ljupco Kocarev. 211-216 [doi]
- Modeling Trust in Wireless Ad-Hoc NetworksTirthankar Ghosh, Hui Xu. 217-221 [doi]
- Address Management in MANETs Using an Ant Colony MetaphorA. Pachón, M. Veiga, J. M. Madrid. 223-228 [doi]
- Elitism Between Populations For The Improvement Of The Fitness Of A Genetic Algorithm SolutionJustin Champion. 229-233 [doi]
- Adaptive Genetic Algorithm for Neural Network RetrainingC. I. Bauer, H. Yu, B. Boffey. 235-238 [doi]
- A New Collaborative Approach for Intrusion Detection System on Wireless Sensor NetworksMarcus Vinícius Sousa de Lemos, Líliam Barroso Leal, Raimir Holanda Filho. 239-244 [doi]
- A Dynamic Scheme For Authenticated Group Key Agreement ProtocolYang Yu, Aixin Zhang, Junhua Tang, Haopeng Chen. 245-250 [doi]
- Performance Evaluation of TCP Congestion Control MechanismsEman Abdelfattah. 251-256 [doi]
- Optimization and Job Scheduling in Heterogeneous NetworksAbdelrahman Elleithy, Syed Sajjad Rizvi, Khaled M. Elleithy. 257-262 [doi]
- A New Methodology for Self Localization in Wireless Sensor NetworksAllon Rai, Sangita Ale, Syed Sajjad Rizvi, Aasia Riasat. 263-268 [doi]
- A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)Syed Sajjad Rizvi, Majid A. Jafri, Khaled M. Elleithy, Aasia Riasat. 269-274 [doi]
- A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANETSyed Sajjad Rizvi, Aasia Riasat, Mustafa A. Khan. 275-279 [doi]
- Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing AlgorithmSyed Sajjad Rizvi, Adil Sheikh, Aasia Riasat. 281-286 [doi]
- Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD)Jaiminkumar Gorasia, Syed Sajjad Rizvi, Aasia Riasat. 287-292 [doi]
- A Novel Encrypted Database Technique to Develop a Secure Application for an Academic InstitutionSyed Sajjad Rizvi, Aasia Riasat, Mustafa A. Khan, Khaled M. Elleithy. 293-298 [doi]
- A Mathematical Model for Reducing Handover Time at MAC Layer for Wireless NetworksSyed Sajjad Rizvi, Aasia Riasat, Mohammad A. Sheikh. 299-304 [doi]
- A Software Solution for Mobile Context Handoff in WLANsHalûk Gümüskaya, M. V. Nural, S. Dogan. 305-309 [doi]
- Robust Transmission of Video Stream over Fading ChannelsMao-Quan Li, ZhengQuan Xu, Yanyan Xu. 311-316 [doi]
- An Attack Classification Tool Based On Traffic Properties and Machine LearningVictor Pasknel de Alencar Ribeiro, Raimir Holanda Filho. 317-321 [doi]
- Browser based Communications Integration using Representational State TransferKeith Griffin, Colin Flanagan. 323-328 [doi]
- Security Aspects of Internet based VotingMd. Abdul Based. 329-332 [doi]
- Middleware-based distributed heterogeneous simulationCecil Bruce-Boye, Dmitry A. Kazakov, Helge Colmorgen, Rüdiger zum Beck, Jehan Z. Hassan, Harald Wojtkowiak. 333-337 [doi]
- Analysis of the flooding search algorithm with OPNETArkadiusz Biernacki. 339-342 [doi]
- Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor NetworksMilan Simek, Dan Komosny, Radim Bürget, Ricardo Silva, Jorge Silva. 343-348 [doi]
- Two Cross-Coupled H INFINITY Filters for Fading Channel Estimation in OFDM SystemsAli Jamoos, Ahmad Abdo, Hanna Abdel Nour, Eric Grivel. 349-353 [doi]
- An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural NetworksRicardo Luis da Rocha Ataide, Zair Abdelouahab. 355-360 [doi]
- A highly parallel scheduling model for IT change managementDenílson Cursino Oliveira, Raimir Holanda Filho. 361-366 [doi]
- Design and Implementation of a Multi-sensor Mobile PlatformAyssam Yehia Elkady, Tarek M. Sobh. 367-372 [doi]
- Methods based on fuzzy sets to solve problems of Safe Ship controlMostefa Mohamed-Seghir. 373-377 [doi]
- Network Topology Impact on Influence SpreadingSasho Gramatikov, Dimitar Trajanov, Ljupco Kocarev, Aksenti Grnarov. 379-384 [doi]
- An Adaptive Combiner-Equalizer for Multiple-Input ReceiversLigia Chira Cremene, Nicolae Crisan, Marcel Cremene. 385-390 [doi]
- KSAm - An Improved RC4 Key-Scheduling Algorithm for Securing WEPBogdan Crainicu, Florian Mircea Boian. 391-396 [doi]
- Ubiquitous Media Communication AlgorithmsKostas E. Psannis. 397-401 [doi]
- Balancing Streaming and Demand Accesses in a Network Based Storage EnvironmentDhawal N. Thakker, Glenford E. Mapp, Orhan Gemikonakli. 403-408 [doi]
- An Energy and Distance Based Clustering Protocol for Wireless Sensor NetworksXu Wang, Liyan Qian, Jianjun Wu, Tian Liu. 409-412 [doi]
- Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web ServicesSerguei A. Mokhov, Rajagopalan Jayakumar. 417-422 [doi]
- The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation RefinementSerguei A. Mokhov, Farid Rassai, Lee Wei Huynh, Lingyu Wang. 423-429 [doi]
- Performance Evaluation of MPLS Path Restoration Schemes using OMNET++Marcelino Minero-Muñoz, Vicente Alarcón Aquino, Jose Galdino García-Fierro, Roberto Rosas-Romero, Jorge Rodríguez-Asomoza, Oleg Starostenko. 431-436 [doi]
- FM Transmitter System for Telemetrized Temperature Sensing ProjectSaeid Moslehpour, Jun Kondo, Hisham Alnajjar. 437-442 [doi]
- Enhancing Sensor Network Security with RSL CodesChunyan Bai, Gui Liang Feng. 443-447 [doi]
- The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation RefinementSerguei A. Mokhov, Lee Wei Huynh, Lingyu Wang. 449-455 [doi]
- A Multi-layer GSM Network Design ModelAlexei Barbosa de Aguiar, Plácido Rogério Pinheiro, Alvaro de Menezes S. Neto, Rebecca F. Pinheiro, Ruddy P. P. Cunha. 457-460 [doi]
- Performance Analysis of Multi Carrier CDMA and DSCDMA on the basis of different users and Modulation schemeKhalida Noori, Sami Ahmed Haider. 461-463 [doi]
- Scalability Analysis of a Model for GSM Mobile Network DesignRebecca F. Pinheiro, Alexei Barbosa de Aguiar, Plácido Rogério Pinheiro, Alvaro de Menezes S. Neto, Ruddy P. P. Cunha, Domingos Neto. 465-469 [doi]
- Location Management in 4G Wireless Heterogeneous Networks using Mobile Data Mining TechniquesSherif Rashad. 471-476 [doi]
- A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networksFarnaz Dargahi, Amir Masoud Rahmani, Reza Samadabadi. 477-481 [doi]
- Multiview Media Transmission Algorithm for Next Generation NetworksKostas E. Psannis. 483-487 [doi]
- A 4 GHz Clock Synchronized Non Coherent Energy Collection UWB TransceiverU. Bala Maheshwaran, Reshmi Raj, S. Sindhu Tharangini, K. A. Narayanan Kutty. 489-493 [doi]
- Comparison of Cascaded LMS-RLS, LMS and RLS Adaptive Filters in Non-Stationary EnvironmentsBharath Sridhar, I. Akram Sheriff, K. A. Narayanan Kutty, S. Sathish Kumar. 495-499 [doi]
- VDisaster recovery with the help of real time video streaming using MANET supportAbdelshakour Abuzneid, Chennaipattinam Raghuram Vijay Iyengar, Ramaswamy Gandhi Dasan Prabhu. 507-512 [doi]