561-023
|
Towards Dual Fallible Agreement in a Virtual Subnet Network
S.-C. Wang, K.-Q. Yan, and G.-Y. Zheng (Taiwan)
|
Abstract
|
|
561-042
|
An Adaptive Physiological Homeostasis Congestion Control
X. Fan and J. Wang (PRC)
|
Abstract
|
|
561-046
|
Connectivity Performance for CDMA-based Wireless Sensor Networks with Variations of Deployment
Y.-F. Huang, C.-C. Tsai, and Y.-M. Tseng (Taiwan)
|
Abstract
|
|
561-058
|
The Study of Transmission Performances for Integrated TFRC and ARQ over WLANs
C.-C. Lee, P.-C. Chang, and Y.-A. Tsai (Taiwan)
|
Abstract
|
|
561-061
|
Statistical Texture Analysis Methods for Network Traffic Classification
T. Kisner, A. Essoh, and F. Kaderali (Germany)
|
Abstract
|
|
561-070
|
Path Selection Strategies for Multipath Ad Hoc Network
S. Lertvorratham and P. Hiranvanichchakorn (Thailand)
|
Abstract
|
|
561-075
|
A Bit-Serial
Word-Parallel Finite Field Multiplier Using Redundant Basis in F2m
A.H. Namin, H. Wu, and M. Ahmadi (Canada)
|
Abstract
|
|
561-079
|
Secure Localization in Wireless Sensor Networks
T. Zia and A. Zomaya (Australia)
|
Abstract
|
|
561-085
|
A Discovery Method for Node-Disjoint Multi-Paths by Valid Source-Destination Edges
S.H. Jung, E. Talipov, M.W. Ahn, and C. Kim (Korea)
|
Abstract
|
|
561-090
|
A New
Hybrid Ant based Routing in Mobile Ad Hoc Networks
S. Prasad and Y.P. Singh (India)
|
Abstract
|
|
561-096
|
RSVP-TE Extensions to Offer Guarantee of Service to Privileged Flows in MPLS Networks
F.J. Rodriguez-Perez, J.L. Gonzalez-Sanchez, A. Gazo-Cervero, and M. Castro-Ruiz (Spain)
|
Abstract
|
|
561-105
|
Systolic Array for String Matching in NIDS
T.N. Thinh and S. Kittitornkun (Thailand)
|
Abstract
|
|
561-116
|
Intelligence System Approach for Computer Network Security
S. Srinoy (Thailand)
|
Abstract
|
|
561-126
|
A Hybrid Multi-Application Authentication and Authorization Model using Multi-Agent System and PKI
S. Fugkeaw, P. Manpanpanich, and S. Juntapremjitt (Thailand)
|
Abstract
|
|
561-136
|
An Improved
End-to-End Secure Authentication Scheme for CDMA Networks
M. Saha, D.R. Chowdhury, and I. Sengupta (India)
|
Abstract
|
|
561-155
|
Interference
and Backbone Sensor Network
M. Tun, L. Gewali, and H. Selvaraj (USA)
|
Abstract
|
|
561-157
|
Dynamic Separated Host Configuration Protocol (DSHCP)
A. Siri and T. Thaiupathump (Thailand)
|
Abstract
|
|
561-173
|
Graphical Passwords: Drawing a Secret with Rotation as a New Degree of Freedom
S. Chakrabarti, G.V. Landon, and M. Singhal (USA)
|
Abstract
|
|
561-175
|
Fast End-to-End Encryption for Voice in GSM Networks
M. Hassinen (Finland)
|
Abstract
|
|
561-808
|
Coverage Restoration of Wireless Sensor Networks through the Usage of Decision Trees
M. Al-Mutairi and S. Habib (Kuwait)
|
Abstract
|
|