| 2010 | 24th IEEE International Conference on Advanced Information Networking and Applications, AINA 2010, Perth, Australia, 20-13 April 2010 |
| 2010 | A Comparative Study on the Performance of the Parallel and Distributing Computing Operation in MatLab. Mohammed Goryawala, Magno R. Guillen, Ruchir N. Bhatt, Anthony J. McGoron, Malek Adjouadi |
| 2010 | A Condition Monitoring Platform Using COTS Wireless Sensor Networks: Lessons and Experience. Ranjan Panda, Damith Chinthana Ranasinghe, Ajith Kumar Parlikad, Duncan C. McFarlane |
| 2010 | A Cross-Layer Decision for Mobile IP Handover. Mohamed Alnas, Irfan-Ullah Awan, D. R. W. Holton |
| 2010 | A DSL-Based Approach to Software Development and Deployment on Cloud. Krzysztof Sledziewski, Behzad Bordbar, Rachid Anane |
| 2010 | A Dynamic Normalized Weighting Based Context Reasoning in Home-Based Care. Hyun Lee, Jae Sung Choi, Ramez Elmasri |
| 2010 | A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost. Silvio Cesare, Yang Xiang |
| 2010 | A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks. Bezawada Bruhadeshwar, Kishore Kothapalli, Indira Radhika Pulla |
| 2010 | A Hybrid Technique for Efficient Medium Access Control in Wireless Sensor Networks. Thi Hong Hanh Le, Makoto Takizawa |
| 2010 | A Japanese Calligraphy Trainer Based on Skill Acquisition Through Haptization. Hiroaki Nishino, Kouta Murayama, Tsuneo Kagawa, Kouichi Utsumiya |
| 2010 | A Modified QRD-M Algorithm Based on Layer Branch Pruning for MIMO Systems. Xue Xin, Xiaohui Li, Yongqiang Hei, Weiyi Yin, Guanghui Yu |
| 2010 | A Novel Cache Management Using Geographically Partial Matching for Location-Based Services. Chung-Ming Huang, Ming-Sian Lin, Wen-Yao Chang |
| 2010 | A Novel Cross Layer Intrusion Detection System in MANET. Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Seung Jo Han |
| 2010 | A Novel Spatial TDMA Scheduler for Concurrent Transmit/Receive Wireless Mesh Networks. Kwan-Wu Chin, Sieteng Soh, Chen Meng |
| 2010 | A PCA Analysis of Daily Unwanted Traffic. Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara |
| 2010 | A Particle Swarm Optimization-Based Heuristic for Scheduling Workflow Applications in Cloud Computing Environments. Suraj Pandey, Linlin Wu, Siddeswara Mayura Guru, Rajkumar Buyya |
| 2010 | A Photonics Based Intelligent Airport Surveillance and Tracking System. Ian H. White, Michael J. Crisp, Richard V. Penty |
| 2010 | A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. Masayuki Fukumitsu, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata |
| 2010 | A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs. Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca |
| 2010 | A Scalable Peer-to-Peer Group Communication Protocol. Isamu Tsuneizumi, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa |
| 2010 | A Secure Key Management Model for Wireless Mesh Networks. Li Gao, Elizabeth Chang, Sazia Parvin, Song Han, Tharam S. Dillon |
| 2010 | A Specialized Tool for Simulating Lock-Keeper Data Transfer. Feng Cheng, Thanh-Dien Tran, Sebastian Roschke, Christoph Meinel |
| 2010 | A Study on Sensor Multiplicity in Optical Fiber Sensor Networks. Nobutoshi Abe, Yusuke Arai, Michiko Nishiyama, Norihiko Shinomiya, Kazuhiro Watanabe, Yoshimi Teshigawara |
| 2010 | A Survey on Multimedia Communicating Technology Based on Spatial Audio Coding. Naixue Xiong, Shuixian Chen, Jing He, Yanxiang He, Athanasios V. Vasilakos, Jong Hyuk Park, Yan Yang |
| 2010 | A Transport Protocol for Multimedia Transmission in Overlay Networks. Byung-Seok Kang, Kwangcheol Shin, In-Young Ko, Pyoung-Yun Kim |
| 2010 | A Tree Graph Model Based on Mobile Environment. Wei Liu, Zhoujun Li |
| 2010 | A Two-Phase Approach to Subscription Subsumption Checking for Content-Based Publish/Subscribe Systems. Xiulei Qin, Jun Wei, Wenbo Zhang, Hua Zhong, Tao Huang |
| 2010 | A Visual Semantic Service Browser Supporting User-Centric Service Composition. Jian Yu, Quan Z. Sheng, Paolo Falcarin |
| 2010 | AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement. Anas Al-Roubaiey, Tarek R. Sheltami, Ashraf S. Mahmoud, Elhadi M. Shakshuki, Hussein T. Mouftah |
| 2010 | Accountability Computing for E-society. Kwei-Jay Lin, Joe Zou, Yan Wang |
| 2010 | Active Data Selection for Sensor Networks with Faults and Changepoints. Michael A. Osborne, Roman Garnett, Stephen J. Roberts |
| 2010 | Adaptive Clustering Protocol for Wireless Networks. Arjan Durresi, Vamsi Paruchuri, Leonard Barolli |
| 2010 | Adaptive and Distributed Access Control in Cognitive Radio Networks. Gianmarco Baldini, Stefano Braghin, Igor Nai Fovino, Alberto Trombetta |
| 2010 | Admission Control and System Capacity Assessment of WiMAX with ACM and nb-LDPC Codes. Adam Flizikowski, Witold Holubowicz, Marcin Przybyszewski, Slawomir Grzegorzewski |
| 2010 | Against Spyware Using CAPTCHA in Graphical Password Scheme. Liming Wang, Xiuling Chang, Zhongjie Ren, Haichang Gao, Xiyang Liu, Uwe Aickelin |
| 2010 | Aletheia--Improving Industrial Service Lifecycle Management by Semantic Data Federations. Steffen Kunz, Franziska Brecht, Benjamin Fabian, Markus Aleksy, Matthias Wauer |
| 2010 | Algorithms for Reducing the Total Power Consumption in Data Communication-Based Applications. Tomoya Enokido, Kota Suzuki, Ailixier Aikebaier, Makoto Takizawa |
| 2010 | An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. Jiwen Cai, Ping Yi, Jialin Chen, Zhiyang Wang, Ning Liu |
| 2010 | An Adaptive Routing Protocol for Bus Networks. Luobei Kuang, Ming Xu, Zhijun Wang |
| 2010 | An Ant-Colony-Optimization Based Approach for Determination of Parameter Significance of Scientific Workflows. Fakhri Alam Khan, Yuzhang Han, Sabri Pllana, Peter Brezany |
| 2010 | An Authentication Model for Wireless Network Services. Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan |
| 2010 | An Efficient Scalable Trajectory Based Forwarding Scheme for VANETs. Houda Labiod, Nedal Ababneh, Miguel Garcia de la Fuente |
| 2010 | An Efficient Telematics Service Discovery Scheme over the Centralized Vehicular Peer-to-Peer (C-VP2P) Telematics Service Platform. Chung-Ming Huang, Chia-Ching Yang, Chun-Ming Hu |
| 2010 | An Energy Aware Routing Protocol with Sleep Scheduling for Wireless Sensor Networks. Amulya Ratna Swain, R. C. Hansdah, Vinod Kumar Chouhan |
| 2010 | An Enhanced Global Index for Location-Based Mobile Broadcast Services. Agustinus Borgy Waluyo, David Taniar, Bala Srinivasan, J. Wenny Rahayu |
| 2010 | An Identifier-Based Architecture for Native Vertical Handover Support. Walter Wong, Marcus Vinícius Lahr Giraldi, Maurício F. Magalhães, Fábio Luciano Verdi |
| 2010 | An Implementation of NaryRAID. Yuji Nakamura, Minoru Uehara |
| 2010 | An Information Platform for Low-Literate Villagers. Ashir Ahmed, Lutfe Kabir, Hiroto Yasuura |
| 2010 | An Overlay Multicast that Supports a Distinguished QoS Based on Service Levels and User Environments in the Next Generation Network. Boyoung Rhee, Sunyoung Han |
| 2010 | Analyzing Human Behavior Using Case-Based Reasoning with the Help of Forensic Questions. Wolfgang Boehmer |
| 2010 | Applications of Wireless Sensor Networks in the Oil, Gas and Resources Industries. Mohammad Reza Akhondi, Alex Talevski, Simon Carlsen, Stig Petersen |
| 2010 | Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer. Thomas Dreibholz, Martin Becke, Jobin Pulinthanath, Erwin P. Rathgeb |
| 2010 | Automatic Application Signature Construction from Unknown Traffic. Yu Wang, Yang Xiang, Shun-Zheng Yu |
| 2010 | Automatic Method for Author Name Disambiguation Using Social Networks. Dongwook Shin, Taehwan Kim, Hana Jung, Joongmin Choi |
| 2010 | BPE Acceleration Technique for S/W Update for Mobile Phones. Ryozo Kiyohara, Satoshi Mii |
| 2010 | Beyond Fixed Key Size: Classifications Toward a Balance Between Security and Performance. Abdullah Mohammed Almuhaideb, Mohammed A. Alhabeeb, Phu Dung Le, Bala Srinivasan |
| 2010 | Bounded Fano Decoders over Intermediate Hops Excluding Packet Retransmission. Khalid A. Darabkh, Backer N. Abu-Jaradeh |
| 2010 | Bright Pupil Detection in an Embedded, Real-Time Drowsiness Monitoring System. Salvatore Vitabile, Alessandra De Paola, Filippo Sorbello |
| 2010 | CAPTCHA Using Strangeness in Machine Translation. Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigaki |
| 2010 | Cloud Computing: Issues and Challenges. Tharam S. Dillon, Chen Wu, Elizabeth Chang |
| 2010 | CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications. Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Rajkumar Buyya |
| 2010 | CoMiHoC: A Middleware Framework for Context Management in MANET Environment. Waskitho Wibisono, Arkady B. Zaslavsky, Sea Ling |
| 2010 | Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes. Xiujie Zhang, Mingxing He |
| 2010 | Communication Scheme to Support Sink Mobility in Multi-hop Clustered Wireless Sensor Networks. Seungmin Oh, Euisin Lee, Soochang Park, Juhyun Jung, Sang-Ha Kim |
| 2010 | Community-Aware Scheduling Protocol for Grids. Ye Huang, Amos Brocco, Nik Bessis, Pierre Kuonen, Béat Hirsbrunner |
| 2010 | Comparative Analysis and Evaluation of Botnet Command and Control Models. Pavan Roy Marupally, Vamsi Paruchuri |
| 2010 | Compensation of Sensors Nonlinearity with Neural Networks. Nicholas J. Cotton, Bogdan M. Wilamowski |
| 2010 | Consensus in Anonymous Distributed Systems: Is There a Weakest Failure Detector?. François Bonnet, Michel Raynal |
| 2010 | Context-Aware Mobile Services Transactions. Muhammad Younas, Soraya Kouadri Mostéfaoui |
| 2010 | Controlling File Distribution in the Share Network Through Content Poisoning. Masahiro Yoshida, Satoshi Ohzahata, Akihiro Nakao, Konosuke Kawashima |
| 2010 | DACS System's Implementation Method to Realize the Next Generation Policy-Based Network Management Scheme. Kazuya Odagiri, Shogo Shimizu, Rihito Yaegashi, Masaharu Takizawa, Naohiro Ishii |
| 2010 | Data Integration at Scale: From Relational Data Integration to Information Ecosystems. Michael L. Brodie |
| 2010 | Data Mapping, Matching and Loading Using Grid Services. Ejaz Ahmed, Nik Bessis, Yong Yue, Muhammad Sarfraz |
| 2010 | Delta-equalities of Complex Fuzzy Relations. Guangquan Zhang, Tharam S. Dillon, Kai-Yuan Cai, Jun Ma, Jie Lu |
| 2010 | Deployment of a Secure Wireless Infrastructure Oriented to Vehicular Networks. Pedro Javier Fernández Ruiz, Cristian A. Nieto Guerra, Antonio Fernandez Gómez-Skarmeta |
| 2010 | Design of Network Based Software. Bogdan M. Wilamowski |
| 2010 | Distributed Orchestration of Pervasive Services. Leonardo Mostarda, Srdjan Marinovic, Naranker Dulay |
| 2010 | Efficient Algorithms for Dynamic Detection and Resolution of IPSec/VPN Security Policy Conflicts. Salman Niksefat, Masoud Sabaei |
| 2010 | Empirical Analysis of Attackers Activity on Multi-tier Web Systems. Katerina Goseva-Popstojanova, Brandon Miller, Risto Pantev, Ana Dimitrijevikj |
| 2010 | Employing IEEE 802.15.4 for Quality of Service Provisioning in Wireless Body Area Sensor Networks. Huasong Cao, Sergio González-Valenzuela, Victor C. M. Leung |
| 2010 | Enabling Scalable RFID Traceability Networks. Quan Z. Sheng, Yanbo Wu, Damith Chinthana Ranasinghe |
| 2010 | Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks. Julia Albath, Mayur Thakur, Sanjay Madria |
| 2010 | Energy-Aware, Self-Deploying Approaches for Wireless Sensor Networks. Shih-Chang Huang |
| 2010 | Enhanced DR-Tree for Low Latency Filtering in Publish/Subscribe Systems. Luciana Arantes, Maria Gradinariu Potop-Butucaru, Pierre Sens, Mathieu Valero |
| 2010 | Environmental Sustainability and Improved Quality of Life Through Service Convergence Technologies. Meisam Aboudi, Alex Talevski |
| 2010 | Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-Oriented Middleware. Tales Heimfarth, Edison Pignaton de Freitas, Carlos Eduardo Pereira, Armando Morado Ferreira, Flávio Rech Wagner, Tony Larsson |
| 2010 | Exploiting Rateless Coding in Structured Overlays to Achieve Data Persistence. Heverson Borba Ribeiro, Emmanuelle Anceaume |
| 2010 | Exploiting Spectrum Usage Patterns for Efficient Spectrum Management in Cognitive Radio Networks. Changwoo Lee, Wonjun Lee |
| 2010 | Extracting Named Entities and Synonyms from Wikipedia. Christian Bohn, Kjetil Nørvåg |
| 2010 | Flow Vector Prediction in Large IP Networks. Tarem Ahmed |
| 2010 | From Communities of Web Services to Marts of Composite Web Services. Zakaria Maamar, Leandro Krug Wives, Ghazi AlKhatib, Quan Z. Sheng, Antonio Rodrigo Delepiane de Vit, Djamal Benslimane |
| 2010 | Genetic Algorithms for Efficient Placement of Router Nodes in Wireless Mesh Networks. Fatos Xhafa, Christian Sánchez, Leonard Barolli |
| 2010 | Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks. Stepan Ivanov, Dmitri Botvich, Sasitharan Balasubramaniam |
| 2010 | Grid of Segment Trees for Packet Classification. Yeim-Kuan Chang, Yung-Chieh Lin, Chen-Yu Lin |
| 2010 | HealthPass: Fine-Grained Access Control to Portable Personal Health Records. Robert Steele, Kyongho Min |
| 2010 | High Performance Computing on Demand: Sharing and Mutualization of Clusters. Rodrigue Chakode, Jean-François Méhaut, Francois Charlet |
| 2010 | Human-Computer Interaction Experiments. Tomasz P. Bednarz, Con Caris, Jeremy P. Thompson, Chris Wesner, Mark T. Dunn |
| 2010 | Hybrid Communication Reconfigurable Network on Chip for MPSoC. Zheng Liu, Jueping Cai, Ming Du, Lei Yao, Zan Li |
| 2010 | IDSec: An Identification Layer Security Model. Walter Wong, Maurício F. Magalhães, Fábio Luciano Verdi |
| 2010 | Improving Graduate Employability by Using Social Networking Systems. Zhe Jing, Elizabeth Chang, Omar Khadeer Hussain, K. L. Chin |
| 2010 | Improving Reliability Calculation with Augmented Binary Decision Diagrams. Johannes Ulrich Herrmann |
| 2010 | Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber. Alireza Attar, Haoming Li, Victor C. M. Leung |
| 2010 | InnoDB Database Forensics. Peter Frühwirt, Markus Huber, Martin Mulazzani, Edgar R. Weippl |
| 2010 | Integrated Modeling, Generation and Optimization for Packet based NoC Topology. Jueping Cai, Zheng Liu, Ming Du, Zan Li, Lei Yao |
| 2010 | Integrating Load Balancing into Channelization Strategy in Publish/Subscribe. Haibiao Chen, Beihong Jin, Fengliang Qi |
| 2010 | Integrating Recreational Fishing Behaviour within a Reef Ecosystem as a Platform for Evaluating Management Strategies. Lei Gao, Atakelty Hailu |
| 2010 | Interactive Home Supervision Application. Julia Kantorovitch, Ilkka Niskanen |
| 2010 | Internet Host Geolocation Using Maximum Likelihood Estimation Technique. Mohammed Jubaer Arif, Shanika Karunasekera, Santosh Kulkarni, Ajith Gunatilaka, Branko Ristic |
| 2010 | Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach. Valdir Stumm Jr., Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau |
| 2010 | Investigating Impact of Quorum Construction on Data Processing in Mobile Ad Hoc Networks. Takahiro Hara, Sanjay Kumar Madria, Shojiro Nishio |
| 2010 | Iterative Route Discovery in AODV. Nashid Shahriar, Syed Ashker Ibne Mujib, Arup Raton Roy, Ashikur Rahman |
| 2010 | Key Parameters in Identifying Cost of Spam 2.0. Farida Ridzuan, Vidyasagar M. Potdar, Alex Talevski, William F. Smyth |
| 2010 | Knowledge Sharing Effectiveness Measurement. Behrang Zadjabbari, Pornpit Wongthongtham, Farookh Khadeer Hussain |
| 2010 | MARS: Multi-stage Attack Recognition System. Faeiz Alserhani, Monis Akhlaq, Irfan-Ullah Awan, Andrea J. Cullen, Pravin Mirchandani |
| 2010 | MagicNET: Security System for Protection of Mobile Agents. Muhammad Awais Shibli, Imran Yousaf, Sead Muftic |
| 2010 | Mapping the Blogosphere with RSS-Feeds. Justus Bross, Matthias Quasthoff, Philipp Berger, Patrick Hennig, Christoph Meinel |
| 2010 | Maximizing Bandwidth Using Disjoint Paths. Ruen Chze Loh, Sieteng Soh, Mihai M. Lazarescu |
| 2010 | MeTree: A Contribution and Locality-Aware P2P Live Streaming Architecture. Huey-Ing Liu, I-Feng Wu |
| 2010 | Metaverses as a Platform for Game Based Learning. Kristoffer Getchell, Iain Oliver, Alan Miller, Colin Allison |
| 2010 | Minimizing Execution Costs when Using Globally Distributed Cloud Services. Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajkumar Buyya |
| 2010 | Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo |
| 2010 | Mobile Element Path Planning for Time-Constrained Data Gathering in Wireless Sensor Networks. Khaled Almiani, Anastasios Viglas, Lavy Libman |
| 2010 | Mobility Effects of Wireless Multi-hop Networks in Indoor Scenarios. Makoto Ikeda, Masahiro Hiyama, Leonard Barolli, Fatos Xhafa, Arjan Durresi, Makoto Takizawa |
| 2010 | Modbus/DNP3 State-Based Intrusion Detection System. Igor Nai Fovino, Andrea Carcano, Thibault De Lacheze Murel, Alberto Trombetta, Marcelo Masera |
| 2010 | Modeling and Evaluating the Reliability of Cluster-Based Wireless Sensor Networks. Hamed Yousefi, Kambiz Mizanian, Amir-Hossein Jahangir |
| 2010 | Modeling and Measuring Quality of Context Information in Pervasive Environments. José Bringel Filho, Alina Dia Miron, Ichiro Satoh, Jérôme Gensel, Hervé Martin |
| 2010 | Multicast QoS Routing Using Collaborative Path Exploration. Jaipal Singh |
| 2010 | Network Integrated Transparent TCP Accelerator. Jeongkeun Lee, Puneet Sharma, Jean Tourrilhes, Rick McGeer, Jack Brassil, Andy C. Bavier |
| 2010 | Neural Network Trainer through Computer Networks. Nam Pham, Hao Yu, Bogdan M. Wilamowski |
| 2010 | New Approach to Quantification of Privacy on Social Network Sites. Tran Hong Ngoc, Isao Echizen, Komei Kamiyama, Hiroshi Yoshiura |
| 2010 | Next Decade of Social, Economical and Ethical Challenges. A Min Tjoa |
| 2010 | Non-interactive Information Reconciliation for Quantum Key Distribution. Stefan Rass, Peter Schartner |
| 2010 | On Barrier Coverage in Wireless Camera Sensor Networks. Kuei-Ping Shih, Chien-Min Chou, I-Hsin Liu, Chun-Chih Li |
| 2010 | Outsourced XML Database: Query Assurance Optimization. Andrew Clarke, Eric Pardede |
| 2010 | PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network. Ting-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen |
| 2010 | Performance Analysis of VCP Controller on DCCP Traffic. Hanliu Chen, Oliver W. W. Yang, Yang Hong |
| 2010 | Performance Evaluation of Database Designs. Rasha Osman, Irfan-Ullah Awan, Michael E. Woodward |
| 2010 | Performance of Weighted Fair Queuing System with Multi-class Jobs. Amina Al-Sawaai, Irfan-Ullah Awan, Rod J. Fretwell |
| 2010 | Pitcher: Enabling Distributed Parallel Computing with Automatic Thread and Data Assignments. Chonglei Mei, Hai Jiang, Jeff Jenness |
| 2010 | Prioritizing Information for Achieving QoS Control in WSN. Atif Sharif, Vidyasagar M. Potdar, A. J. D. Rathnayaka |
| 2010 | Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items. Minako Tada, Hiroaki Kikuchi, Sutheera Puntheeranurak |
| 2010 | Probabilistic Proactive Routing with Active Route Trace-Back for Highly Mobile Ad Hoc Networks. Keyvan Kashkouli Nejad, Xiaohong Jiang, Jianhua Ma |
| 2010 | Propagation Modeling of Peer-to-Peer Worms. Xiang Fan, Yang Xiang |
| 2010 | RBP: Reliable Broadcasting Protocol in Large Scale Mobile Ad Hoc Networks. Subrata Saha, Syed Rafiul Hussain, Ashikur Rahman |
| 2010 | RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival Proccess. Lee Booi Lim, Lin Guan, Alan Grigg, Iain W. Phillips, Xingang Wang, Irfan-Ullah Awan |
| 2010 | RF-Based Indoor Locating System for NLOS Environment. Hoon Choi, Sanghyun Son, Jamje Kim, Yunju Baek |
| 2010 | Real-Time Data Dissemination Based on Reactive and Restricted Zone Search in Sensor Networks. Juhyun Jung, Soochang Park, Euisin Lee, Seungmin Oh, Sang-Ha Kim |
| 2010 | Recommender Systems for Human Resources Task Assignment. Pedro T. Isaías, Cristiane Casaca, Sara Pífano |
| 2010 | Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang |
| 2010 | Routing Loops in DAG-Based Low Power and Lossy Networks. Weigao Xie, Mukul Goyal, Seyed Hossein Hosseini, Jerald Martocci, Yusuf Bashir, Emmanuel Baccelli, Arjan Durresi |
| 2010 | Schedule Distributed Virtual Machines in a Service Oriented Environment. Lizhe Wang, Gregor von Laszewski, Marcel Kunze, Jie Tao |
| 2010 | Secure Communication for Internet Payment in Heterogeneous Networks. Refka Abdellaoui, Marc Pasquet |
| 2010 | Semantic Driven Self-Adaptation of Communications Applied to ERCMS. Ismael Bouassida Rodriguez, Jérôme Lacouture, Khalil Drira |
| 2010 | Service Invocation over Content-Based Communication in Disconnected Mobile Ad Hoc Networks. Yves Mahéo, Romeo Said |
| 2010 | Simulation Analysis of Moving Peer Influence on Location-Aware P2P Network. Atsushi Tagami, Shigehiro Ano, Yoichi Tomiura |
| 2010 | Simulation-Based Performance Evaluation of the SNDP Protocol for Infrastructure WMNs. Glêdson Elias da Silveira, Mateus Novaes, Gustavo Cavalcanti, Daniel Porto |
| 2010 | Sink-Initiated Geographic Multicasting Protocol in Wireless Sensor Networks. Jeongcheol Lee, Euisin Lee, Soochang Park, Hosung Park, Sang-Ha Kim |
| 2010 | Socio-Natural Thought Semantic Link Network: A Method of Semantic Networking in the Cyber Physical Society. Hai Zhuge |
| 2010 | Software-as-a-Service and Versionology: Towards Innovative Service Differentiation. Youakim Badr, Guy Caplat |
| 2010 | Symbolic Routing for Location-Based Services in Wireless Mesh Networks. Harald Weinschrott, Frank Dürr, Kurt Rothermel |
| 2010 | TCP Testing: How Well Does ns2 Match Reality?. Martin Bateman, Saleem N. Bhatti |
| 2010 | Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries. Pedram Radmand, Alex Talevski, Stig Petersen, Simon Carlsen |
| 2010 | The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS. Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su |
| 2010 | The Crucial Role of Information Communication Technology in Western Australia. Lyn Beazley |
| 2010 | The Power of Orientation in Symmetry-Breaking. Satya Krishna Pindiproli, Kishore Kothapalli |
| 2010 | Towards More Trustable Log Files for Digital Forensics by Means of . Benjamin Bock, David Huemer, A Min Tjoa |
| 2010 | Towards Near Real-Time Data Warehousing. Li Chen, J. Wenny Rahayu, David Taniar |
| 2010 | Towards Trust Establishment for Spectrum Selection in Cognitive Radio Networks. Sazia Parvin, Song Han, Li Gao, Farookh Khadeer Hussain, Elizabeth Chang |
| 2010 | Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor Networks. Wuyungerile Li, Masaki Bandai, Takashi Watanabe |
| 2010 | Transmit Power Allocation for Precoded Distributed MIMO OFDM Systems. Reza Holakouei, Adão Silva, Atílio Gameiro |
| 2010 | Trustworthiness among Peer Processes in Distributed Agreement Protocol. Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa |
| 2010 | Underground Wireless Communications for Monitoring of Drag Anchor Embedment Parameters: A Feasibility Study. Alvin C. Valera, Hwee Pink Tan, Xiaoping Ma |
| 2010 | User-Excentric Service Composition in Pervasive Environments. Noha Ibrahim, Stéphane Frénot, Frédéric Le Mouël |
| 2010 | Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern, Jianhua Yang |
| 2010 | Using Ontology for Personalized Mobile Message Computation. Li-Hua Li, Fu-Ming Lee, Yu-Chien Chou, Tsung-Jen Pu |
| 2010 | Using Recommendation to Limit Search Space in Web Services Discovery. Mohamed Sellami, Walid Gaaloul, Samir Tata, Mohamed Jmaiel |
| 2010 | Utilizing WiMAX as a Public Safety Network in Jordan. Nidhal Kamel Taha El-Omari, Mohamad Hisham Alzaghal |
| 2010 | Web Spambot Detection Based on Web Navigation Behaviour. Pedram Hayati, Vidyasagar M. Potdar, Kevin Chai, Alex Talevski |
| 2010 | Whois Based Geolocation: A Strategy to Geolocate Internet Hosts. Patricia Takako Endo, Djamel Fawzi Hadj Sadok |
| 2010 | YASA-M: A Semantic Web Service Matchmaker. Yassin Chabeb, Samir Tata, Alain Ozanne |