The distributed sensor networks - an emerging technology | p. 1 |
Distributed computing track chair's message | p. 2 |
Efficient binding lifetime determination schemes in HMIPv6 | p. 3 |
A fast search and advanced marking scheme for network IP traceback model | p. 15 |
Design and performance evaluation of token-based MAC protocols in WDM burst switched ring networks | p. 21 |
Self-stabilizing energy-aware routing algorithm in wireless sensor network with limited mobility | p. 27 |
Position based gradient routing in mobile ad hoc networks | p. 39 |
Distributed clustering algorithm for finding virtual backbone in ad hoc networks | p. 50 |
Merging clustering algorithms in mobile ad hoc networks | p. 58 |
Performance study and implementation of self organized routing algorithm for mobile ad hoc network using GloMoSim | p. 62 |
Self-stabilizing deterministic TDMA for sensor networks | p. 69 |
Effect of mobility on communication performance in overloaded one-dimensional cellular networks | p. 82 |
Distributed time slot assignment in wireless ad hoc networks for STDMA | p. 93 |
Efficient algorithm for placing base stations by avoiding forbidden zone | p. 105 |
Secure two-party context free language recognition | p. 117 |
Autonomous agent based distributed fault-tolerant intrusion detection system | p. 125 |
Cleaning an arbitrary regular network with mobile agents | p. 132 |
Multi-attribute hashing of wireless data for content-based queries | p. 143 |
A tool for automated resource consumption profiling of distributed transactions | p. 154 |
An efficient algorithm for removing useless logged messages in SBML protocols | p. 166 |
Divide and concur : employing Chandra and Toueg's Consensus algorithm in a multi-level setting | p. 172 |
Distributed multiple hypothesis testing in sensor networks under bandwidth constraint | p. 184 |
A scalable multi-level distributed system-level diagnosis | p. 192 |
Analysis of interval-based global state detection | p. 203 |
A two-phase scheduling algorithm for efficient collective communications of MPICH-G2 | p. 217 |
Towards an agent-based framework for monitoring and tuning application performance in grid environment | p. 229 |
GDP : a paradigm for intertask communication in grid computing through distributed pipes | p. 235 |
Internet technology track chair's message | p. 242 |
Rewriting queries using view for RDF/RDFS-based relational data integration | p. 243 |
An effective searching method using the example-based query | p. 255 |
On communicating with agents on the network | p. 267 |
Applying fuzzy logic to recommend consumer electronics | p. 278 |
Generic XML schema definition (XSD) to GUI translator | p. 290 |
Off-line micro-payment system for content sharing in P2P networks | p. 297 |
FlexiRank : an algorithm offering flexibility and accuracy for ranking the Web pages | p. 308 |
Adaptable Web browsing of images in mobile computing environment : experiments and observations | p. 314 |
An incremental document clustering algorithm based on a hierarchical agglomerative approach | p. 321 |
System security track chair's message | p. 333 |
A game based model of security for key predistribution schemes in wireless sensor network | p. 334 |
E-mail worm detection using the analysis of behavior | p. 348 |
Verifiably encrypted signature scheme without random oracles | p. 357 |
An improved intrusion detection technique for mobile adhoc networks | p. 364 |
User revocation in secure adhoc networks | p. 377 |
A hybrid method to intrusion detection systems using HMM | p. 389 |
Enhanced network traffic anomaly detector | p. 397 |
Statistically secure extension of anti-collusion code fingerprinting | p. 404 |
An improvement of auto-correlation based video watermarking scheme using perceptual masking for motion | p. 410 |
Validation of policy integration using alloy | p. 420 |
Linking theories of concurrency by retraction | p. 432 |
Software engineering track chair's message | p. 433 |
Integrating architecture description languages : a semantics-based approach | p. 434 |
Automated runtime validation of software architecture design | p. 446 |
Analyzing loop paths for execution time estimation | p. 458 |
A technique for early software reliability prediction | p. 470 |
Executable requirements specifications using triggered message sequence charts | p. 482 |
Efficient symmetry reduction for an actor-based model | p. 494 |
Validated code generation for activity diagrams | p. 508 |
Data mining track chair's message | p. 522 |
An approach to find embedded clusters using density based techniques | p. 523 |
Using sub-sequence information with kNN for classification of sequential data | p. 536 |
Distance-based outliers in sequences | p. 547 |
Capturing market intelligence from customer feedback E-mails using self-enhancing Bolztmann machine-based network of knowledge maps | p. 553 |
Algorithm for fuzzy clustering of mixed data with numeric and categorical attributes | p. 561 |
Dissemination of multidimensional data using broadcast clusters | p. 573 |
Multidimensional frequent pattern mining using association rule based constraints | p. 585 |
A classification based approach for root unknown phylogenetic networks under constrained recombination | p. 592 |
Table of Contents provided by Blackwell. All Rights Reserved. |