| The next chapter in networking research : evolutionary or revolutionary? | p. 1 |
| Performance of fair distributed mutual exclusion algorithms | p. 2 |
| A framework for automatic identification of the best checkpoint and recovery protocol | p. 16 |
| Distributed computation for swapping a failing edge | p. 28 |
| Flexible cycle synchronized algorithm in parallel and distributed simulation | p. 40 |
| Rule mining for dynamic databases | p. 46 |
| APPLE : a novel P2P based e-learning environment | p. 52 |
| Heuristic-based scheduling to maximize throughput of data-intensive grid applications | p. 63 |
| Failure recovery in grid database systems | p. 75 |
| On design of cluster and grid computing environment toolkit for bioinformatics applications | p. 82 |
| Study of scheduling strategies in a dynamic data grid environment | p. 88 |
| Virtual molecular computing - emulating DNA molecules | p. 95 |
| Complexity of compositional model checking of computation tree logic on simple structures | p. 102 |
| A multi-agent framework based on communication and concurrency | p. 114 |
| Statistical analysis of a P2P query graph based on degrees and their time-evolution | p. 126 |
| T-UNITY - a formal framework for modeling and reasoning about timing constraints in real-time systems | p. 138 |
| Finding pareto-optimal set of distributed vectors with minimum disclosure | p. 144 |
| Lean-DFS : a distributed filesystem for resource starved clients | p. 150 |
| A fair medium access protocol using adaptive flow-rate control through cooperative negotiation among contending flows in ad hoc wireless network with directional antenna | p. 156 |
| Analytical-numerical study of mobile IPv6 and hierarchical mobile IPv6 | p. 168 |
| An adaptive transmission power control protocol for mobile ad hoc networks | p. 180 |
| A macro-mobility scheme for reduction in handover delay and signaling traffic in MIPv6 | p. 186 |
| QoS support in TLMM : three level mobility model for IP-based networks | p. 192 |
| Path stability based adaptation of MANET routing protocols | p. 198 |
| Computational biology - the new frontier of computer science | p. 204 |
| Cryptanalysis of "wavelet tree quantization" watermarking scheme | p. 219 |
| A multisignature scheme for implementing safe delivery rule in group communication systems | p. 231 |
| Agent-based distributed intrusion alert system | p. 240 |
| SCIDS : a soft computing intrusion detection system | p. 252 |
| Effect of data encryption on wireless ad hoc network performance | p. 258 |
| On-board RSVP : an extension of RSVP to support real-time services in on-board IP networks | p. 264 |
| A secure PIM-SM multicast routing protocol | p. 276 |
| Restoration of virtual private networks with QoS guarantees in the pipe model | p. 289 |
| A user level, reliable, and reconfigurable transport layer protocol | p. 303 |
| The notion of veto number for distributed agreement problems | p. 315 |
| Reliability of VLSI linear arrays with redundant links | p. 326 |
| A technique to ensure reliability in a WDM optical backbone network with contemporary link failures | p. 338 |
| Formal proof of impossibility of reliability in crashing protocols | p. 347 |
| Altera max plus II development environment in fault simulation and test implementation of embedded cores-based sequential circuits | p. 353 |
| A distributed contention resolution scheme to reduce blocking probability in optical burst switching networks | p. 361 |
| Polynomial interpolation on OTIS-mesh optoelectronic computers | p. 373 |
| A new network topology with multiple three-dimensional meshes | p. 379 |
| Adaptive fault tolerant routing in star graph | p. 385 |
| Routing and wavelength assignment in wavelength division multiplexing networks | p. 391 |
| Designing the MDVM-stub and memory estimator | p. 397 |
| Improved algorithm for minimum cost range assignment problem for linear radio networks | p. 412 |
| Optimal schemes for channel assignment problem in wireless networks modeled as 2-dimensional square grids | p. 424 |
| Mobility tolerant broadcast in mobile ad hoc networks | p. 435 |
| Distributed mobility tracking for ad hoc networks based on an autoregressive model | p. 447 |
| Broadcast and gossiping algorithms for mobile ad hoc networks based on breadth-first traversal | p. 459 |
| RINGS : lookup service for peer-to-peer systems in mobile ad hoc networks | p. 471 |
| Performance analysis of location caching with fixed local anchor in wireless networks | p. 477 |
| On the optimization trade-offs of expanding ring search | p. 489 |
| Dynamic location management with personalized location area for future PCS networks | p. 495 |
| Improvement of paging cost by updating using paging delay divergence | p. 502 |
| Distributed power control in sensor networks : a game theoretic approach | p. 508 |
| A K-connected energy-saving topology control algorithm for wireless sensor networks | p. 520 |
| Locating objects in a sensor grid | p. 526 |
| A novel remote user authentication scheme through dynamic login identity | p. 532 |
| A probabilistic admission control algorithm in wireless/mobile cellular networks | p. 533 |
| A rough neuro data mining approach for network intrusion detection | p. 534 |
| An efficient implementation of distance-based update scheme using directional cell identification codes | p. 535 |
| Application of formal methods for analysis of authentication protocols | p. 536 |
| BUSTRAP - an efficient travel planner for metropolitans | p. 537 |
| Distributed evolutionary algorithm search for multiobjective spanning tree problem | p. 538 |
| MSIP : a protocol for efficient handoffs of real time multimedia sessions in mobile wireless scenarios | p. 539 |
| Network management system using Web server controlled mobile agents | p. 540 |
| Security scheme for malicious node detection in mobile ad hoc networks | p. 541 |
| High-level grid execution patterns | p. 543 |
| Table of Contents provided by Blackwell. All Rights Reserved. |