| Distributed security algorithms by mobile agents | p. 1 |
| A real-time guarantee scheme based on the runtime message scheduling and error control for the dual wireless ad hoc sensor network | p. 15 |
| ADIAN : a distributed intelligent ad-hoc network | p. 27 |
| A mobility tolerant cluster management protocol with dynamic surrogate cluster-heads for a large ad hoc network | p. 40 |
| Prediction based QoS routing in MANETs | p. 46 |
| MCDS based multicasting in mobile adhoc networks | p. 52 |
| Programmer-centric conditions for itanium memory consistency | p. 58 |
| A group quorum system of degree [actual symbol not reproducible] | p. 70 |
| An efficient non-intrusive checkpointing algorithm for distributed database systems | p. 82 |
| Adaptive connected dominating set - an exercise in distributed output switching | p. 88 |
| An efficient and scalable checkpointing and recovery algorithm for distributed systems | p. 94 |
| On distributed verification | p. 100 |
| The price of defense and fractional matchings | p. 115 |
| Construction of adaptive IDS through IREP++ and ARM | p. 127 |
| Proving optimality of DWS (distance-weighted sampling) probability function for EMS IP trace-back technique | p. 133 |
| A mechanism for detection and prevention of distributed denial of service attacks | p. 139 |
| Auction based resource allocation in grids | p. 145 |
| MLBLM : a multi-level load balancing mechanism in agent-based grid | p. 157 |
| Data management for a distributed hash table | p. 163 |
| DRWT : an efficient random walk algorithm for unstructured P2P networks | p. 169 |
| Stochastic models of IEEE 802. 11e wireless networks with multimedia applications | p. 175 |
| Maintaining information about nearby processors in a mobile environment | p. 193 |
| Energy aware topology management in ad hoc wireless networks | p. 203 |
| On maximizing network lifetime of broadcast in WANETs under an overhearing cost model | p. 215 |
| On maximizing residual energy of actors in wireless sensor and actor networks | p. 227 |
| Locant : a nature inspired location service for ad hoc networks | p. 239 |
| An analytical model for capacity evaluation of VoIP on HCCA and TCP file transfers over EDCA in an IEEE 802. 11e WLAN | p. 245 |
| Developing analytical framework to measure robustness of peer-to-peer networks | p. 257 |
| Design and implementation of a network processor based 10Gbps network traffic generator | p. 269 |
| Stochastic spectral density analysis on network traffic characterization | p. 276 |
| Negotiating monitoring task allocation for orbiters | p. 282 |
| Primality tests based on Fermat's little theorem | p. 288 |
| Efficient distributed handshake using mobile agents | p. 294 |
| Improved distributed exploration of anonymous networks | p. 306 |
| The complexity of updating multi-writer snapshot objects | p. 319 |
| Simultaneous consensus tasks : a tighter characterization of set-consensus | p. 331 |
| Database summarization and publishing in wireless environments | p. 342 |
| Read-write reductions | p. 349 |
| Large scale voice over IP experiences on high performance intranets | p. 355 |
| Z!Stream : an application streaming system by copy-on-reference block of executable files | p. 367 |
| Supervised grid-of-tries : a novel framework for classifier management | p. 373 |
| BGPSep. S : an algorithm for constructing IBGP configurations with complete visibility | p. 379 |
| Performance enhancement in REM using adaptive drop policy for protective and best-effort traffic | p. 385 |
| A new precomputation scheme for MPLS traffic engineering routing | p. 391 |
| A mobility aware technique for clustering on mobile ad-hoc networks | p. 397 |
| Design and analysis of rate aware ad hoc 802.11 networks | p. 409 |
| Tightly packed IP address configuration (TPIA) protocol in small-scale MANET | p. 421 |
| TransMAN : a group communication system for MANETs | p. 430 |
| On fault tolerance of two-dimensional mesh networks | p. 442 |
| Feedback control with prediction for thread allocation in pipeline architecture web server | p. 454 |
| Variants of priority scheduling algorithms for reducing context-switches in real-time systems | p. 466 |
| Dynamic path shared protection for survivable differentiated reliable WDM optical networks | p. 479 |
| A time model for distributed multimedia applications | p. 491 |
| Destination initiated multi-wavelength reservation protocol (DIMRP) in WDM optical networks : finding the optimal selectivity for wavelength assignment | p. 497 |
| A hybrid transformation technique for video coding | p. 503 |
| Location verification based defense against Sybil attack in sensor networks | p. 509 |
| A new scheme for establishing pairwise keys for wireless sensor networks | p. 522 |
| Distributed location and lifetime biased clustering for large scale wireless sensor network | p. 534 |
| Power aware duty scheduling in wireless sensor networks | p. 546 |
| Data forwarding protocol for reliable delivery service in wireless sensor networks | p. 552 |
| Synchronous and asynchronous auction models for dynamic spectrum access | p. 558 |
| A one-pass method of MIP registration by WLAN host through GPRS network | p. 570 |
| An idea bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs | p. 582 |
| A signalling technique for disseminating neighbouring AP channel information to mobile stations | p. 594 |
| A predictive location management scheme by extracting the unique sub-patterns from the mobility logs | p. 600 |
| Table of Contents provided by Blackwell. All Rights Reserved. |