The next chapter in networking research : evolutionary or revolutionary? | p. 1 |
Performance of fair distributed mutual exclusion algorithms | p. 2 |
A framework for automatic identification of the best checkpoint and recovery protocol | p. 16 |
Distributed computation for swapping a failing edge | p. 28 |
Flexible cycle synchronized algorithm in parallel and distributed simulation | p. 40 |
Rule mining for dynamic databases | p. 46 |
APPLE : a novel P2P based e-learning environment | p. 52 |
Heuristic-based scheduling to maximize throughput of data-intensive grid applications | p. 63 |
Failure recovery in grid database systems | p. 75 |
On design of cluster and grid computing environment toolkit for bioinformatics applications | p. 82 |
Study of scheduling strategies in a dynamic data grid environment | p. 88 |
Virtual molecular computing - emulating DNA molecules | p. 95 |
Complexity of compositional model checking of computation tree logic on simple structures | p. 102 |
A multi-agent framework based on communication and concurrency | p. 114 |
Statistical analysis of a P2P query graph based on degrees and their time-evolution | p. 126 |
T-UNITY - a formal framework for modeling and reasoning about timing constraints in real-time systems | p. 138 |
Finding pareto-optimal set of distributed vectors with minimum disclosure | p. 144 |
Lean-DFS : a distributed filesystem for resource starved clients | p. 150 |
A fair medium access protocol using adaptive flow-rate control through cooperative negotiation among contending flows in ad hoc wireless network with directional antenna | p. 156 |
Analytical-numerical study of mobile IPv6 and hierarchical mobile IPv6 | p. 168 |
An adaptive transmission power control protocol for mobile ad hoc networks | p. 180 |
A macro-mobility scheme for reduction in handover delay and signaling traffic in MIPv6 | p. 186 |
QoS support in TLMM : three level mobility model for IP-based networks | p. 192 |
Path stability based adaptation of MANET routing protocols | p. 198 |
Computational biology - the new frontier of computer science | p. 204 |
Cryptanalysis of "wavelet tree quantization" watermarking scheme | p. 219 |
A multisignature scheme for implementing safe delivery rule in group communication systems | p. 231 |
Agent-based distributed intrusion alert system | p. 240 |
SCIDS : a soft computing intrusion detection system | p. 252 |
Effect of data encryption on wireless ad hoc network performance | p. 258 |
On-board RSVP : an extension of RSVP to support real-time services in on-board IP networks | p. 264 |
A secure PIM-SM multicast routing protocol | p. 276 |
Restoration of virtual private networks with QoS guarantees in the pipe model | p. 289 |
A user level, reliable, and reconfigurable transport layer protocol | p. 303 |
The notion of veto number for distributed agreement problems | p. 315 |
Reliability of VLSI linear arrays with redundant links | p. 326 |
A technique to ensure reliability in a WDM optical backbone network with contemporary link failures | p. 338 |
Formal proof of impossibility of reliability in crashing protocols | p. 347 |
Altera max plus II development environment in fault simulation and test implementation of embedded cores-based sequential circuits | p. 353 |
A distributed contention resolution scheme to reduce blocking probability in optical burst switching networks | p. 361 |
Polynomial interpolation on OTIS-mesh optoelectronic computers | p. 373 |
A new network topology with multiple three-dimensional meshes | p. 379 |
Adaptive fault tolerant routing in star graph | p. 385 |
Routing and wavelength assignment in wavelength division multiplexing networks | p. 391 |
Designing the MDVM-stub and memory estimator | p. 397 |
Improved algorithm for minimum cost range assignment problem for linear radio networks | p. 412 |
Optimal schemes for channel assignment problem in wireless networks modeled as 2-dimensional square grids | p. 424 |
Mobility tolerant broadcast in mobile ad hoc networks | p. 435 |
Distributed mobility tracking for ad hoc networks based on an autoregressive model | p. 447 |
Broadcast and gossiping algorithms for mobile ad hoc networks based on breadth-first traversal | p. 459 |
RINGS : lookup service for peer-to-peer systems in mobile ad hoc networks | p. 471 |
Performance analysis of location caching with fixed local anchor in wireless networks | p. 477 |
On the optimization trade-offs of expanding ring search | p. 489 |
Dynamic location management with personalized location area for future PCS networks | p. 495 |
Improvement of paging cost by updating using paging delay divergence | p. 502 |
Distributed power control in sensor networks : a game theoretic approach | p. 508 |
A K-connected energy-saving topology control algorithm for wireless sensor networks | p. 520 |
Locating objects in a sensor grid | p. 526 |
A novel remote user authentication scheme through dynamic login identity | p. 532 |
A probabilistic admission control algorithm in wireless/mobile cellular networks | p. 533 |
A rough neuro data mining approach for network intrusion detection | p. 534 |
An efficient implementation of distance-based update scheme using directional cell identification codes | p. 535 |
Application of formal methods for analysis of authentication protocols | p. 536 |
BUSTRAP - an efficient travel planner for metropolitans | p. 537 |
Distributed evolutionary algorithm search for multiobjective spanning tree problem | p. 538 |
MSIP : a protocol for efficient handoffs of real time multimedia sessions in mobile wireless scenarios | p. 539 |
Network management system using Web server controlled mobile agents | p. 540 |
Security scheme for malicious node detection in mobile ad hoc networks | p. 541 |
High-level grid execution patterns | p. 543 |
Table of Contents provided by Blackwell. All Rights Reserved. |