Ad Hoc and Sensor Networks Critical Transmission Range for Connectivity in Ad-Hoc Networks; Hossein Ajorloo, Mahdi Dehghan. ScatterFactory: An Architecture Centric Framework for Wireless Sensor Networks; Mohammad Al Saad, Jochen Schiller, Benjamin Hentrich. Performance of Multi-Hop Relaying Systems over Weibull Fading Channels; Salama Ikki, Mohamed Hossam Ahmed. Performance Study of a MAC Algorithm to Reduce Energy and Delay in Wireless Sensor Networks; Ioannis Gragopoulos, Ioannis Tsetsinas, Eirini Karapistoli and Fotini-Niovi Paulidou. A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks; Taojun Wu, Yi Cui, Brano Kusy, Akos Ledeczi, Janos Sallai, Nathan Skirvin, Jan Werner, Yuan Xue. Resource Management, QoS TMN Management Systems using a Grid based agnostic middleware; Pasquale Donadio, Antonio Cimmino, Bela Berde, Andrea Paparella. Direct RF Conversion Transceivers as a Base for Designing Dynamic Spectrum Allocation Systems; Oleg Panfilov, Antonio Turgeon, Ron Hickling, Igor Alexandrov, Kelly McClellan. Scalable Communication for High Performance and Inexpensive Reliable Strict QoS; Ing-Wher Chen, M Robert Ito. A User Interface for Resource Management in a Mobile Environment; Badr Benmammar, Zeina Jrad and Francine Krief. Application of Reuse Partitioning Concept to the IEEE 806.16 System: Design and Analysis; Soumaya Hamouda, Philippe Godlewski, S. Tabbane. Evaluation of the performance of the SLoPS: Available Bandwidth Estimation Technique in IEEE 802.11b Wireless Networks; Abadelaziz Amamra, Kun Mean Hou, Jean Pierre Chanet. Quality of Service Provisioning Issue of Accessing IP Multimedia Subsystem via Wireless LANs; Asma Elmangosh, Majdi Ashibani, Fathi Ben Shatwan. Cross-Layer Design Three-color Marking with MLCN for Cross-layer TCP Congestion Control in Multi-hop Mobile Ad-hoc Networks; Yi-Jen Lu, Chi-Jen Huang, and Tsang-Ling Sheu. Joint cross-layer power control and FEC design for TCP Westwood+ in Hybrid Wireless-Wired Networks; Gennaro Boggia, Pietro Camarda, Alessandro D'Alconzo, Luigi Grieco, Saverio Mascolo. Joint Cross-layer and Dynamic Subcarrier Allocation Design for Multicast OFDM Networks; Hoda Najafi, Hassan Taheri, Hamidreza Amindavar, seyed Hossein Hosseini. Mobility Management, Handover and Power Management Handover Optimization for vehicle NEMO Networks; Lin Hai, Houda Labiod. Introducing L3 Network-based Mobility Management for Mobility-Unaware IP Hosts; Damjan Damic. WiMax-based Vertical handovers for Next Generation Networks; Nadine Adra, Samir Tohme, Mahmoud Doughan. A System-Level Analysis of Power Consumption & Optimizations in 3G Mobile Devices; Nicolas Sklavos, K. Touliou. Fault-Tolerance, Networks, Transport & Software Engineering Runtime software modification method used on COTS system for high-availability network service; Takashi Ikebe, Yasuro Kawarasaki, Naoki Uchida, Shoichi Hirasawa, Hiroki Honda. MRC Diversity Reception of OFDM with M-ary Modulation over Frequency-Selective Nakagami-m Fading Channels; Ahmed F. ALNahhal, Mohamed Khedr, Roshdy A. AbdelRassoul. Performance and flexibility of open source routing software; Vincenzo Eramo, Antonio Cianfrani. Emerging Wireless Communication Technologies; Ghais El Zein, Ali Khaleghi. Upgrade of a Composite-Star Optical Network; Stefano Secci, Brunilde Sanso. An Adaptive Approach to Optimize Software Component Quality Predictive Models: Case of Stability; Danielle Azar, Doina Precup. Transport Information Collection Protocol with clustering of information sources; Mohamed Karim SBAI, Chadi Barakat. Security Virtual Authentication Ring for Securing Network Operations; Na Li, David Lee. Federated Dynamic Authentication and Authorization in Daidalos; Zhikui Chen. Secure and Fast Roaming in 802.11 WLANs; Hassnaa Moustafa, Gilles Bourdon. Wormhole Detection Method based on Location in Wireless Ad-hoc Networks; Kyu-ho Lee, Hyojin Jeon. An Effective Defense Against Spoofed IP Traffic; Hikmat Farhat. On the security of quantum networks: a proposal framework and its capacity; Quoc-Cuong Le, Patrick Bellot, Akim Demaille. An adaptive security Framework for ad hoc networks; Vincent Toubiana, Houda Labiod, Laurent Raynaud, Yvon Gourhant. Localization with witnesses; Arun Saha, Mart Molle. SAACCESS: Secured Ad hoc ACCess framework; Hakima Chaouchi. Maryline Maknavicius. Hiding User Credentials during the TLS authentication phase; Mohamad Badra, Ibrahim Hajjeh, Jacques Demerjian. On the Security of a Recent Chaotic Cipher; Muhammad Asim, Varun Jeoti. Enhanced Smart-Card-Based Authentication Scheme Providing Forward-Secure Key Agreement; Mahdi Asadpour, Behnam Sattarzadeh, Rasool Jalili. A Mathematical Framework for Risk Assessment; Marco Benini, Sabrina Sicari. An Efficient Hybrid Chaotic Image Encryption Scheme; Muhammad Asim, Varun Jeoti. Intrusion Detection and Mobile Code Security A Stateful Real Time Intrusion Detection System; Sourour Meharouech, Adel Bouhoula, Tarek Abbes. A dynamic Policy based Security Architecture for Mobile Agents; Misbah Mubarak, Zarrar Khan, Hajra Batool Asghar, Fakhra Jabeen, Sara Sultana, H Farooq Ahmad, Hiroki Suguri. A Scheme for Intrusion Detection and Response in Ad Hoc Networks; Marianne Azer, Sherif El-Kassas, Magdy El-Soudani. Web Services Query Answering in Distributed Description Logics; Faisal Alkhateeb, Antoine Zimmermann. WSRank: A New Algorithm for Ranking Web Services; Xiaodi Huang. Authenticated Web Services: A WS-Security Based Implementation; Emiliano De Cristofaro, Vincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato. Mobile Agents, Middleware and Pervasive Computing An architectural model for a Mobile Agents System Interoperability; Linda Zeghache, Nadjib Badache, Houari Boumediane, Aouaouche Elmaouhab. P2PNet: A Simulation Architecture for P2P Systems; Lechang Cheng. A Middleware for Managing Sensory Information in Pervasive Environments; Costas Pontikakos, Theodore Tsiligiridis. An Advanced Metering Infrastructure for Future Energy Networks; Stamatis Karnouskos. Internet Topology Based Identifier Assignment for Tree-based DHTs; Lechang Cheng, Mabo R. Ito, Norman C. Hutchinson. Poster papers A Secure Dynamic Remote User Authentication without any Secure Channel; Ashutosh Saxena. Cross-Layer Optimization for Dynamic Rate Allocation in a Multi-User Video Streaming System; Charles Yaacoub, Joumana Farah, Nancy Rachkidy, Beatrice Pesquet-Popescu. Design and implementation of a Decentralized Access Control System (DACS) and an application; Tobias Hof, Eric Robert, Isabelle Barthes, Sebastien Bastard. Monitoring and Security of Container Transports; Jens Ove Lauf, Dieter Gollmann. A new approach for anomalies resolution within filtering rules; Anis Yazidi, Adel Bouhoula. "SPMCS": A Scalable Architecture for Peer-to-Peer Multiparty Conferencing; Amad Mourad, Ahmed Meddahi. An Efficient Authenticated Key Agreement Protocol; Pierre Abi char, Abdallah Mhamed, Bachar El Hassan. Growing Hierarchical Self-Organizing Map for Alarm Filtering in Netowrk Intrusion Detection Systems; Ahmad Faour Philippe Leray, Bassam Eter. AGDH (Asymmetric Group Diffie Hellman) An Efficient and Dynamic Group Key Agreement Protocol for Ad hoc Networks; Raghav Bhaskar, Daniel Augot, Cedric Adjih, Paul Muhlethaler, Saadi Boudjit.