| 2009 | A Communication Model of Broadcast in Wormhole-Routed Networks on-Chip. Mahmoud Moadeli, Wim Vanderbauwhede |
| 2009 | A Distributed Dynamic Adaptation Model for Component-Based Applications. Maria-Teresa Segarra, Françoise André |
| 2009 | A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-Tree. Yeim-Kuan Chang, Yung-Chieh Lin |
| 2009 | A Generic Database Web Service for the Venice Service Grid. Michael Koch, Markus Hillenbrand, Paul Müller |
| 2009 | A Hierarchical Model for Firewall Policy Extraction. Eduardo Horowitz, Luís C. Lamb |
| 2009 | A Highly Available Grid Metadata Catalog. Henrik Thostrup Jensen, Josva Kleist |
| 2009 | A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection Systems. Varsha Sainani, Mei-Ling Shyu |
| 2009 | A Measurement Study on Peer Behaviors for a Pure P2P Network. Satoshi Ohzahata, Konosuke Kawashima |
| 2009 | A Method for Determining Weight Reset Timing in a Wirelessly Networked Array with Independently Mobile Elements. William A. Lintz, John C. McEachen, Murali Tummala |
| 2009 | A New Ballooned Wireless Mesh Network System for Disaster Use. Yoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba, Kazuo Takahata |
| 2009 | A New Counting Scheme for Multicast Broadcast Service with WiBro. Nak Beom Sung, Kyung Tae Kim, Sun Sik Park, Hee Yong Youn |
| 2009 | A New Method of Proactive Recovery Mechanism for Large-Scale Network Failures. Takuro Horie, Go Hasegawa, Satoshi Kamei, Masayuki Murata |
| 2009 | A New Space Time Cooperative Diversity Scheme Based on Simple Feedback. Dechun Sun, Kechu Yi, Xiaohui Li |
| 2009 | A New Video Surveillance Video Tracking System Based on Omni-directional and Network Controlled Cameras. Yosuke Sato, Koji Hashimoto, Yoshitaka Shibata |
| 2009 | A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis. Rongfei Zeng, Chuang Lin, Hongkun Yang, Yuanzhuo Wang, Yang Wang, Peter D. Ungsunan |
| 2009 | A Pipelined IP Forwarding Engine with Fast Update. Yeim-Kuan Chang, Yen-Cheng Liu, Fang-Chen Kuo |
| 2009 | A Proposal to Enhance and Control Continuous Communications in Proxy Mobile IPv6. Joon-Suk Kang, Motoyuki Ohmori, Koji Okamura |
| 2009 | A Protocol for Releasing Purpose Marks to Prevent Illegal Information Flow. Tomoya Enokido, S. Misbah Deen, Makoto Takizawa |
| 2009 | A Resource Discovery Scheme for Large Scale Ad Hoc Networks Using a Hypercube-Based Backbone. Lyes Dekar, Hamamache Kheddouci |
| 2009 | A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming. Jaideep Vaidya |
| 2009 | A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc Networks. Ki-seok Lee, Cheeha Kim |
| 2009 | A Survey and Analysis on Semantics in QoS for Web Services. Vuong Xuan Tran, Hidekazu Tsuji |
| 2009 | ANFIS Based AQM Controller for Congestion Control. Rafe Khalaf Alasem, M. Alamgir Hossain, Irfan Awan, Hussein Mansour |
| 2009 | Adaptive FEC Algorithm Based on Prediction of Video Quality and Bandwidth Utilization Ratio. Jiao Feng, Xuefen Chi, Peng Li, Yining Wang, Lin Guan |
| 2009 | Advantages of User Authentication Using Unclear Images. Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki |
| 2009 | An Analytical Model for MAC Protocol Configuration in WLAN. Suhaimi Bin Abd Latif, Mohammed A. Rashid, Fakhrul Alam |
| 2009 | An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol. Mohammad Baharloo, Reza Hajisheykhi, Mohammad Arjomand, Amir-Hossein Jahangir |
| 2009 | An Anonymous DoS-Resistant Password-Based Authentication, Key Exchange and Pseudonym Delivery Protocol for Vehicular Networks. Joseph Chee Ming Teo, Lek Heng Ngoh, Huaqun Guo |
| 2009 | An Approach to Find Maximal Disjoint Paths with Reliability and Delay Constraints. Ruen Chze Loh, Sieteng Soh, Mihai M. Lazarescu |
| 2009 | An Efficient Admission Control Methodology for Satisfying QoS Requirements in NGN Networks. Cherif Ghazel, Leïla Azouz Saïdane |
| 2009 | An Efficient FEC Allocation Algorithm for Unequal Error Protection of Wireless Video Transmission. Yoong Choon Chang, Sze Wei Lee, Ryoichi Komiya |
| 2009 | An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks. Ling-Jyh Chen, Che-Liang Chiou, Yi-Chao Chen |
| 2009 | An Experimental Evaluation of Sender-Side TCP Enhancements for Wired-to-Wireless Paths: A Real-World Home WLAN Case Study. Ritesh K. Taank, Xiaohong Peng |
| 2009 | An Ontology-Based Architecture for Federated Identity Management. Farah Layouni, Yann Pollet |
| 2009 | An Overlay Application-Layer Multicast Infrastructure. Daniel C. Uchôa, Samuel Kopp, Hélcio M. Pimentel, Reinaldo Matushima, Regina Melo Silveira |
| 2009 | Analyzing the Hold Time Schemes to Limit the Routing Table Calculations in OSPF Protocol. Mukul Goyal, Mohd Soperi, Seyed Hossein Hosseini, Kishor S. Trivedi, Aman Shaikh, G. Choudhury |
| 2009 | Anomaly Detection for DNS Servers Using Frequent Host Selection. Akira Yamada, Yutaka Miyake, Masahiro Terabe, Kazuo Hashimoto, Nei Kato |
| 2009 | Brain Image Registration Analysis Workflow for fMRI Studies on Global Grids. Suraj Pandey, William Voorsluys, Mustafizur Rahman, Rajkumar Buyya, James E. Dobson, Kenneth Chiu |
| 2009 | Building Distributed Index for Semantic Web Data. Juan Li |
| 2009 | Business Compliance Governance in Service-Oriented Architectures. Florian Daniel, Fabio Casati, Vincenzo D'Andrea, Emmanuel Mulo, Uwe Zdun, Schahram Dustdar, Steve Strauch, David Schumm, Frank Leymann, Samir Sebahi, Fabien De Marchi, Mohand-Said Hacid |
| 2009 | Classification of Bloggers Using Social Annotations. Shigeaki Sakurai, Hideki Tsutsui, Ryohei Orihara |
| 2009 | Combined On-line and Off-line Trust Mechanism for Agent Computing. Babak Khosravifar, Jamal Bentahar, Maziar Gomrokchi, Philippe Thiran |
| 2009 | Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless Networks. Okan Yilmaz, Ing-Ray Chen |
| 2009 | Configuring Beaconless IEEE 802.15.4 Networks Under Different Traffic Loads. Dawn Rohm, Mukul Goyal, Seyed Hossein Hosseini, August Divjak, Yusuf Bashir |
| 2009 | Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks. Dario Gallucci, Attilio Fiandrotti, Enrico Masala, Juan Carlos De Martin |
| 2009 | Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long Ni, Shou-Hsuan Stephen Huang |
| 2009 | DACA: Dynamic Anti-Cheating Architecture for MMOGs. Huey-Ing Liu, Bing-Rong Tang |
| 2009 | DAVO: A Domain-Adaptable, Visual BPEL4WS Orchestrator. Tim Dörnemann, Markus Mathes, Roland Schwarzkopf, Ernst Juhnke, Bernd Freisleben |
| 2009 | DCM-Arch: An Architecture for Data, Control, and Management in Wireless Sensor Networks. Quan Le Trung, Amirhosein Taherkordi, Frank Eliassen, Hai Ngoc Pham, Tor Skeie, Paal E. Engelstad |
| 2009 | DINCast: Optimizing Application-Level Shared-Tree Multicast. Huaqun Guo, Lek Heng Ngoh, Wai-Choong Wong, Ping Yang, Nazreen Beevi |
| 2009 | Data Dissemination with Drop Boxes. Mun J. Lok, Bilal R. Qazi, Jaafar M. H. Elmirghani |
| 2009 | Design of Quasi-Cyclic LDPC Codes Based on Euclidean Geometries. Yuan-Hua Liu, Xinmei Wang, Jian-Hua Ma |
| 2009 | Design of q-ary Irregular Repeat-Accumulate Codes. Wei Lin, Baoming Bai, Ying Li, Xiao Ma |
| 2009 | Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks. Stephen Mark Glass, Vallipuram Muthukkumarasamy, Marius Portmann |
| 2009 | Determining the Net Financial Risk for Decision Making in Business Interactions. Omar Khadeer Hussain, Tharam S. Dillon, Elizabeth Chang, Farookh Khadeer Hussain |
| 2009 | Diagnosing Incompatibilities in Web Service Interactions for Automatic Generation of Adapters. Yehia Taher, Ali Aït-Bachir, Marie-Christine Fauvet, Djamal Benslimane |
| 2009 | Distributed Secure Virtual File System Using Hysteresis Signatures. Shin Tezuka, Hiroko Tomori, Ryuya Uda, Ken-ichi Okada |
| 2009 | Effective Sensing Function Allocation Using a Distributed Graph Coloring and a Slot Allocation Algorithm in Wireless Sensor Networks. Ryouhei Kawano, Toshiaki Miyazaki |
| 2009 | Effects of On-path Buffering on TCP Fairness. Saleem N. Bhatti, Martin Bateman |
| 2009 | Enabling Fast Bootstrap of Reputation in P2P Mobile Networks. Roberto G. Cascella |
| 2009 | Energy Efficiency: Optimal Transmission Range with Topology Management in Rectangular Ad-hoc Wireless Networks. Wei Feng, Hamada Alshaer, Jaafar M. H. Elmirghani |
| 2009 | Evaluating the Performance of Network Protocol Processing on Multi-core Systems. Matthew Faulkner, Andrew Brampton, Stephen Pink |
| 2009 | Evaluation and Optimization of the Registrar Redundancy Handling in Reliable Server Pooling Systems. Xing Zhou, Thomas Dreibholz, Fu Fa, Wencai Du, Erwin P. Rathgeb |
| 2009 | Exclusion of Forged Files from Multi-source Downloadable P2P Systems. Yuna Kim, Jong Kim, Junghei You, Heejae Park |
| 2009 | Exploiting Request Characteristics to Improve Performance of Web Services Based Business Applications. Yizhu Tong, Hao Wang, Taoying Liu |
| 2009 | Fair Scheduling with Multiple Gateways in Wireless Mesh Networks. Jason B. Ernst, Mieso K. Denko |
| 2009 | Fault-Tolerant Flocking of Mobile Robots with Whole Formation Rotation. Yan Yang, Samia Souissi, Xavier Défago, Makoto Takizawa |
| 2009 | Finding Influential eBay Buyers for Viral Marketing. Hon Wai Lam, Chen Wu |
| 2009 | Fuzzy ESVDF Approach for Intrusion Detection Systems. Safaa Zaman, Fakhri Karray |
| 2009 | GBLT: Load Distribution Method for High Density by User Behavior in MMO Virtual Environment. Rei Endo, Kenji Takagi, Hiroshi Shigeno |
| 2009 | Heterogeneous Error Protection of H.264/AVC Video Using Hierarchical 16-QAM. Ahmed B. Abdurrhman, Michael E. Woodward |
| 2009 | How Long is the Lifetime of a Wireless Sensor Network?. Nok Hang Mak, Winston Khoon Guan Seah |
| 2009 | IGMPx: Port Based Service Access Control for IP Multicast. Prashant Pillai, Yim-Fun Hu |
| 2009 | Implementation of Lightweight TCP/IP for Small, Wireless Embedded Systems. In-Su Yoon, Sang-Hwa Chung, Jeong-Soo Kim |
| 2009 | Implementation of an E-learning System Using P2P, Web and Sensor Technologies. Keita Matsuo, Leonard Barolli, Fatos Xhafa, Vladi Kolici, Akio Koyama, Arjan Durresi, Rozeta Miho |
| 2009 | Improved 4-ary Query Tree Algorithm for Anti-Collision in RFID System. Yonghwan Kim, Sungsoo Kim, SeongJoon Lee, Kwangseon Ahn |
| 2009 | Improving QoS through Network Real-Time Measurement and Self-Adaption. Erol Gelenbe |
| 2009 | Information Communication Mechanism for Loosely Coupled Mobile User Groups in Wireless Sensor Fields. Soochang Park, Euisin Lee, Fucai Yu, Min-Sook Jin, Sang-Ha Kim |
| 2009 | Introducing Group Participation Support into P2P Web Caching Systems. Akihiro Iwamaru, Tsuyoshi Itokawa, Teruaki Kitasuka, Masayoshi Aritsugi |
| 2009 | JPEG Steganography: A Performance Evaluation of Quantization Tables. Adel Almohammad, Gheorghita Ghinea, Robert M. Hierons |
| 2009 | Key Management in Web of Trust for Mobile Ad Hoc Networks. Hisham Dahshan, James Irvine |
| 2009 | Lessons Learned: Simulation Vs WSN Deployment. Elhadi M. Shakshuki, Haroon Malik, Tarek R. Sheltami |
| 2009 | Location-Aware Authentication and Access Control. Elisa Bertino, Michael S. Kirkpatrick |
| 2009 | Masquerade Detection Using Command Prediction and Association Rules Mining. Han-Ching Wu, Shou-Hsuan Stephen Huang |
| 2009 | Massively Scalable Web Service Discovery. George Anadiotis, Spyros Kotoulas, Holger Lausen, Ronny Siebes |
| 2009 | Medium Access Control in Large Scale Clusters for Wireless Sensor Networks. Pedro N. E. S. Barbosa, Neil M. White, Nick R. Harris |
| 2009 | Mitigation of Intercarrier Interference Based on General Precoder Design in OFDM Systems. Xia Wang, Shihua Zhu |
| 2009 | Modeling Web Request and Session Level Arrivals. Xuan Wang, Katerina Goseva-Popstojanova |
| 2009 | Modelling Network Performance with a Spatial Stochastic Process Algebra. Vashti Galpin |
| 2009 | Multi-user MIMO Broadcast System Grouping Strategy Based on Particle Swarm Optimization. Yongqiang Hei, Xiaohui Li, Kechu Yi, Wentao Li |
| 2009 | N-nary RAID: 3-resilient RAID Based on an N-nary Number. Katsuyoshi Matsumoto, Minoru Uehara |
| 2009 | Name Resolution Middleware Using Relative Positional Relationship to Support Wireless Visible Area Communication. Atsushi Noda, Teruaki Kitasuka, Shigeaki Tagashira, Tsuneo Nakanishi, Akira Fukuda |
| 2009 | Network Voronoi Diagram Based Range Search. Kefeng Xuan, Geng Zhao, David Taniar, Bala Srinivasan, Maytham Safar, Marina L. Gavrilova |
| 2009 | On the False-Positive and False-Negative Behavior of a Soft-State Signaling Protocol. Melissa Tjiong, Johan Lukkien |
| 2009 | On the Synchronization of Web Services Interactions. Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Khouloud Boukadi, Xitong Li |
| 2009 | Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic Sensors. Nobutoshi Abe, Norihiko Shinomiya, Yoshimi Teshigawara |
| 2009 | Optimized Broadcast in a Geographical Area of Wireless Ad Hoc and Sensor Networks. Ibrahim Amadou, Pascale Minet |
| 2009 | PHD. Marcos A. Simplício Jr., Vlad Coroama, Yeda Regina Venturini, Tereza Cristina M. B. Carvalho, Mats Näslund, Makan Pourzandi |
| 2009 | Packet Scheduling Algorithm with QoS Provision in HSDPA. Ying-Hong Wang, Kuo-Feng Huang, Chengyi Le |
| 2009 | Parameterised Gradient Based Routing (PGBR) for Future Internet. Sasitharan Balasubramaniam, Dmitri Botvich, Julien Mineraud, William Donnelly |
| 2009 | Performance Analysis of OLSR and BATMAN Protocols Considering Link Quality Parameter. Leonard Barolli, Makoto Ikeda, Giuseppe De Marco, Arjan Durresi, Fatos Xhafa |
| 2009 | Predictive Simulation of HPC Applications. Simon D. Hammond, J. A. Smith, Gihan R. Mudalige, Stephen A. Jarvis |
| 2009 | Priority Scheduling of Requests to Web Portals. D. R. W. Holton, Irfan-Ullah Awan, Muhammad Younas |
| 2009 | Privacy-Aware Routing Approach for Mobile Applications. Markus Aleksy, Thomas Butter |
| 2009 | Probabilistic Network Fault-Diagnosis Using Cross-Layer Observations. Anders Nickelsen, Jesper Grønbæk, Thibault Renier, Hans-Peter Schwefel |
| 2009 | QoS Enhancements and Performance Analysis for Delay Sensitive Applications. Jie Wang, Lin Guan, Xin Gang Wang, Alan Grigg, Irfan Awan, Iain Phillips, Xuefen Chi |
| 2009 | Quarc: A High-Efficiency Network on-Chip Architecture. Mahmoud Moadeli, Partha P. Maji, Wim Vanderbauwhede |
| 2009 | ReAlSec: A Relational Language for Advanced Security Engineering. Mohamed Hamdi, Nejla Essaddi, Noureddine Boudriga |
| 2009 | Real-Time Task Assignment in Heterogeneous Distributed Systems with Rechargeable Batteries. Jian (Denny) Lin, Albert M. K. Cheng, Rashmi Kumar |
| 2009 | Recoverable Cuts to Make Agreement among Peers. Ailixier Aikebaier, Valbona Barolli, Tomoya Enokido, Makoto Takizawa |
| 2009 | Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA. Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su |
| 2009 | Route Construction Based on Measured Characteristics of Radio Propagation in Wireless Sensor Networks. Yasuhiro Nose, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio |
| 2009 | Scalability Analysis to Optimize a Network on Chip. Marta Beltrán, Antonio Guzmán, Fernando Sevillano |
| 2009 | Sensor Data Fusion Using DSm Theory for Activity Recognition under Uncertainty in Home-Based Care. Hyun Lee, Jae Sung Choi, Ramez Elmasri |
| 2009 | Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia Objects. Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa |
| 2009 | Similarity Search over DNS Query Streams for Email Worm Detection. Nikolaos Chatzis, Nevil Brownlee |
| 2009 | Sink Location Service via Inner Rectangular in Wireless Sensor Networks. Hosung Park, Taehee Kim, Jeongcheol Lee, Min-Sook Jin, Sang-Ha Kim |
| 2009 | Situation-Aware Adaptive Recommendation to Assist Mobile Users in a Campus Environment. Amel Bouzeghoub, Kien Ngoc Do, Leandro Krug Wives |
| 2009 | Spigot: Fragment-Level File Sharing and Consistency on Grids. Po-Cheng Chen, Jyh-Biau Chang, Jia-Hao Yang, Yi-Chang Zhuang, Ce-Kuen Shieh |
| 2009 | Supporting Complex Scientific Database Schemas in a Grid Middleware. Helen X. Xiang |
| 2009 | Survivability in Existing ATM-Based Mesh Networks. Isaac Woungang, Guangyan Ma, Mieso K. Denko, Alireza Sadeghian, Sudip Misra, Alexander Ferworn |
| 2009 | Testing the Symbian OS Platform Security Architecture. Thomas Badura, Michael Becher |
| 2009 | The Efficiency Method of Sanitizable Signature Scheme for SMF. Hirokazu Miyata, Ryuya Uda, Kenichi Okada |
| 2009 | The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009 Irfan Awan, Muhammad Younas, Takahiro Hara, Arjan Durresi |
| 2009 | Towards an Approach to Defining Capacity-Driven Web Service. Zakaria Maamar, Samir Tata, Djamel Belaïd, Khouloud Boukadi |
| 2009 | Tracking Anonymous Sinks in Wireless Sensor Networks. Elhadi M. Shakshuki, Tarek R. Sheltami, Nan Kang, Xinyu Xing |
| 2009 | Transaction Management for Reliable Grid Applications. Feilong Tang, Minyi Guo, Minglu Li, Li Li |
| 2009 | Trust Management in Emergency Networks. Arjan Durresi, Mimoza Durresi, Vamsi Paruchuri, Leonard Barolli |
| 2009 | Trust Requirements in Identity Federation Topologies. Uwe Kylau, Ivonne Thomas, Michael Menzel, Christoph Meinel |
| 2009 | Trustworthiness Assessment of Wireless Sensor Data for Business Applications. Laurent Gomez, Annett Laube, Alessandro Sorniotti |
| 2009 | Utilising Multimodal Interaction Metaphors in E-learning Applications: An Experimental Study. Marwan Alseid, Dimitrios Rigas |
| 2009 | VirtCloud: Virtualising Network for Grid Environments. David Antos, Ludek Matyska, Petr Holub, Jirí Sitera |
| 2009 | Wormholes of Communication: Interfacing Virtual Worlds and the Real World. Alessandro Campi, Georg Gottlob, Ben Hoye |