| 2007 | A Gossip-Style Crash Faults Detection Protocol for Wireless Ad-Hoc and Mesh Networks. Mourad Elhadef, Azzedine Boukerche |
| 2007 | A Hybrid Disk-Aware Spin-Down Algorithm with I/O Subsystem Support. Timothy Bisson, Scott A. Brandt, Darrell D. E. Long |
| 2007 | A Low Bound for Broadcast in Optical Networks of Bounded Treewidth Using Fewest Converters. Tong Yi, Guoli Ding, Bogdan Oporowski |
| 2007 | A Malware Signature Extraction and Detection Method Applied to Mobile Networks. Guoning Hu, Deepak Venugopal |
| 2007 | A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce. Pallapa Venkataram, B. Sathish Babu, M. K. Naveen, G. H. Samyama Gungal |
| 2007 | A Model-Based Admission Control for 802.11e EDCA using Delay Predictions. Aleksander Bai, Tor Skeie, Paal E. Engelstad |
| 2007 | A New Channel Allocation Scheme for Real-Time Traffic in Wireless Cellular Networks. Vineet Chaudhary, Rajeev Tripathi, N. K. Shukla, Nidal Nasser |
| 2007 | A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. Miguel Jimeno, Kenneth J. Christensen, Allen Roginsky |
| 2007 | A QoS Framework to Support Integrated Services in Multihop Wireless Networks with Infrastructure Support. Huiqing Wang, Kin Choong Yow |
| 2007 | A Queue-based Adaptive Polling Scheme to Improve System Performance in Gigabit Ethernet Networks. Xiaolin Chang, Jogesh K. Muppala, Wei Kong, Pengcheng Zou, Xiangkai Li, Zhongyuan Zheng |
| 2007 | A Reliable Wireless Mesh Infrastructure Deployment at Crisis Site. Raheleh B. Dilmaghani, Ramesh R. Rao |
| 2007 | A Traffic Chaos Reduction Approach for Emergency Scenarios. Syed Rashid Ali Rizvi, Stephan Olariu, Mona E. Rizvi, Michele C. Weigle |
| 2007 | ACM: A Transmission Mechanism for Urgent Sensor Information. Tetsuya Kawai, Naoki Wakamiya, Masayuki Murata |
| 2007 | Adaptive Probabilistic Scheduling for a Cellular Emergency Network. Jiazhen Zhou, Cory C. Beard |
| 2007 | Adaptive Transmission Scheme in IEEE 802.16 WMAN with Error Prone Channel. Haitang Wang, Dharma P. Agrawal, Qing-An Zeng |
| 2007 | An Additive Increase Smooth Decrease (AISD) Strategy for Data and Streaming Applications. Sivakumar Bakthavachalu, Steven Bassi, Xu Jianxuan, Miguel A. Labrador |
| 2007 | An Application Layer Extension for Multipoint Communication for the Session Initiation Protocol. Brian J. Thorp, Scott F. Midkiff |
| 2007 | An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi |
| 2007 | Analysis of Queuing Delay in RPR Networks. Behnoosh Hariri, Mohammad Reza Pakravan |
| 2007 | Application Insight Through Performance Modeling. Gabriel Marin, John M. Mellor-Crummey |
| 2007 | Applications of the Oriented Permission Role-Based Access Control Model. Liang Chen, Jason Crampton |
| 2007 | Applying Formal Evaluation to Worm Defense Design. Raman Sharykin, Phillip A. Porras |
| 2007 | Automatic Generation of User-Centric Multimedia Communication Services. Raju Rangaswami, Seyed Masoud Sadjadi, Nagarajan Prabakar, Yi Deng |
| 2007 | C2AP: Coverage-aware and Connectivity-constrained Actor Positioning in Wireless Sensor and Actor Networks. Kemal Akkaya, Mohamed F. Younis |
| 2007 | CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time. Kai Ouyang, James B. D. Joshi |
| 2007 | Classification Model for Access Control Constraints. Mathias Kohler, Christian Liesegang, Andreas Schaad |
| 2007 | Compiler-Directed Functional Unit Shutdown for Microarchitecture Power Optimization. Santosh Talli, Ram Srinivasan, Jeanine E. Cook |
| 2007 | Components and Analysis of Disaster Tolerant Computing. Chad M. Lawler, Michael A. Harper, Mitchell A. Thornton |
| 2007 | Composite Event Detection in Wireless Sensor Networks. Chinh T. Vu, Raheem A. Beyah, Yingshu Li |
| 2007 | Detecting Misused Keys in Wireless Sensor Networks. Donggang Liu, Qi Dong |
| 2007 | Diversified Process Replicæ for Defeating Memory Error Exploits. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi |
| 2007 | Dynamic and User-Centric Network Selection in Heterogeneous Networks. Xuejun Cai, Ling Chen, Rute C. Sofia, Yanqi Wu |
| 2007 | Ensuring Performance in Activity-Based File Relocation. Joel C. Wu, Bo Hong, Scott A. Brandt |
| 2007 | Epidemics of Mobile Worms. Yuriy Bulygin |
| 2007 | First Responders' Crystal Ball: How to Scry the Emergency from a Remote Vehicle. Marco Roccetti, Mario Gerla, Claudio E. Palazzi, Stefano Ferretti, Giovanni Pau |
| 2007 | GKM: A Group Dynamics Aware Key Management Scheme for Multicast Communications in Ad-hoc Sensor Networks. Hui Ling, Taieb Znati |
| 2007 | Hierarchical Policy-Based Replication. Cormac J. Doherty, Neil J. Hurley |
| 2007 | How to Assign Traffic Sources to Nodes in Disaster Area Scenarios. Nils Aschenbruck, Peter Martini, Michael Gerharz |
| 2007 | IMPACT - A Family of Cross-Layer Transmission Protocols for Wireless Sensor Networks. Marcin Brzozowski, Reinhardt Karnapke, Jörg Nolte |
| 2007 | Intelligent Highway Infrastructure for Planned Evacuations. Michele C. Weigle, Stephan Olariu |
| 2007 | Inverse Geolocation: Worms with a Sense of Direction. Randal Acton, Nathan Friess, John Aycock |
| 2007 | LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points. Henning Schulzrinne, Hannes Tschofenig, Andrew Newton, Ted Hardie |
| 2007 | Memory Performance and Scalability of Intel's and AMD's Dual-Core Processors: A Case Study. Lu Peng, Jih-Kwon Peir, Tribuvan K. Prakash, Yen-Kuang Chen, David M. Koppelman |
| 2007 | Mobility Support of Multi-User Services in Next Generation Wireless Systems. Luis Veloso, Paulo Mendes, Edmundo Monteiro |
| 2007 | Moving Schemes for Mobile Sinks in Wireless Sensor Networks. Yanzhong Bi, Jianwei Niu, Limin Sun, Wei Huangfu, Yi Sun |
| 2007 | O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks. My T. Thai, Yingshu Li, Feng Wang |
| 2007 | On Frugality of Control Packets in Multi-Hop Wireless Networks. Noun Choi, S. Venkatesan |
| 2007 | On Network Coding Based Multirate Video Streaming in Directed Networks. Chen-guang Xu, Yinlong Xu, Cheng Zhan, Ruizhe Wu, Qingshan Wang |
| 2007 | Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework. Leszek Lilien, Ajay Gupta, Zijiang Yang |
| 2007 | Optimal Cluster Head Selection in the LEACH Architecture. Haiming Yang, Biplab Sikdar |
| 2007 | Optimising Networks Against Malware. Pierre-Marc Bureau, José M. Fernandez |
| 2007 | PID: A Queue Management Scheme for Improving Network Resilience Under Worm Attacks. Jintao Xiong |
| 2007 | Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach. Zhibin Zhang, Li Guo, Binxing Fang, Xiaojun Chen |
| 2007 | Peer-to-Peer Multimedia Streaming Using BitTorrent. Purvi Shah, Jehan-François Pâris |
| 2007 | Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols. Lijuan Cao, Teresa A. Dahlberg, Yu Wang |
| 2007 | Performance Evaluation of Optimized Link State Routing-based Localization. Tomoya Takenaka, Hiroshi Mineno, Yuichi Tokunaga, Naoto Miyauchi, Tadanori Mizuno |
| 2007 | Performance Guarantees for Flow-Mapping Parallel Packet Switch. Lei Shi, Gao Xia, Bin Liu |
| 2007 | Priority-Ensured Medium Access in Ad Hoc Networks. Jun Peng, Liang Cheng |
| 2007 | Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA |
| 2007 | Profiling Database Application to Detect SQL Injection Attacks. Elisa Bertino, Ashish Kamra, James P. Early |
| 2007 | Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture. Hannes Tschofenig, Henning Schulzrinne, Murugaraj Shanmugam, Andrew Newton |
| 2007 | QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures. F. Richard Yu, Helen Tang, Victor C. M. Leung |
| 2007 | Reducing ALU and Register File Energy by Dynamic Zero Detection. Soontae Kim |
| 2007 | Rerouting Time and Queueing in Proactive Ad Hoc Networks. Vinh Pham, Erlend Larsen, Knut Øvsthus, Paal E. Engelstad, Øivind Kure |
| 2007 | Rover: An Integration and Fusion Platform to Enhance Situational Awareness. Christian B. Almazan, Moustafa Youssef, Ashok K. Agrawala |
| 2007 | Scalable and Decentralized Content-Aware Dispatching in Web Clusters. Zhiyong Xu, Jizhong Han, Laxmi N. Bhuyan |
| 2007 | Scheduling Divisible Loads on Bus Networks with Arbitrary Processor Release Time and Start-Up Costs: XRMI. Jie Hu, Raymond Klefstad |
| 2007 | Scheduling of Periodic Packets in Energy-Aware Wireless Networks. Xiao Qin, Mohammed I. Alghamdi, Mais Nijim, Ziliang Zong, Kiranmai Bellam |
| 2007 | Self-Adaptive Two-Dimensional RAID Arrays. Jehan-François Pâris, Thomas J. E. Schwarz, Darrell D. E. Long |
| 2007 | SpyCon: Emulating User Activities to Detect Evasive Spyware. Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
| 2007 | Stochastic Fair Traffic Management for Efficient and Robust IP Networking. Jae Chung, Mark Claypool, Robert E. Kinicki |
| 2007 | Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation. Toby Xu, Ymg Cai |
| 2007 | TCP Vegas Performance with Streaming Media. Sean D. Boyden, Anirban Mahanti, Carey L. Williamson |
| 2007 | The Interworking between EDCA 802.11e and DiffServ. Asma A. Elmangosh, Majdi A. Ashibani, Fathi B. Shatwan |
| 2007 | Threat Analysis of the Session Initiation Protocol Regarding Spam. Stelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis F. Marias, Dimitris Gritzalis |
| 2007 | Towards Survivable and Secure Wireless Sensor Networks. Yi Qian, Kejie Lu, David Tipper |
| 2007 | Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving Association Rule Mining in Vertically Partitioned Data. Dragos Trinca, Sanguthevar Rajasekaran |
| 2007 | Understanding Localized-Scanning Worms. Zesheng Chen, Chao Chen, Chuanyi Ji |
| 2007 | Using Byzantine Agreement in the Design Of IPS Systems. Fernando C. Colón Osorio |
| 2007 | Workload Characterization for News-on-Demand Streaming Services. Frank T. Johnsen, Trude Hafsøe, Carsten Griwodz, Pål Halvorsen |
| 2007 | d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms. Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada |