| 2008 | 2008 IEEE International Performance, Computing and Communications Conference, IPCCC 2008, Austin, TX, USA, December 7-9, 2008 Ty Znati, Youtao Zhang |
| 2008 | A Group-aware Service Discovery Scheme in Ubiquitous Environment using Service Assignment. Hankyul You, Dohyun Kim, XuanTung Hoang, Younghee Lee |
| 2008 | A High Scalability P2P Simulation Framework with Measured Realistic Network Layer Support. Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang |
| 2008 | A Highly Available Transparent Linux Cluster Security Model. Visham Ramsurrun, K. M. Sunjiv Soyjaudah |
| 2008 | A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems. Muhammad Ikram, Aminul Haque Chowdhury, Hassen Redwan, Jong-bin Koh, Ki-Hyung Kim, Dong-Kyoo Kim |
| 2008 | A Model to Use Denied Internet Traffic to Indirectly Discover Internal Network Security Problems. Chet Langin, Hongbo Zhou, Shahram Rahimi |
| 2008 | A Network Connection Proxy to Enable Hosts to Sleep and Save Energy. Miguel Jimeno, Ken Christensen, Bruce Nordman |
| 2008 | A New Trust Framework Based on Reputation for Unstructured P2P Networks. Chunqi Tian, Shihong Zou, LingWei Chu, Shiduan Cheng |
| 2008 | A Proxy Agent for Small Network-Enabled Devices. Hong Qian, Karen Lu, Asad M. Ali |
| 2008 | A Transient Overload Generator forWeb Servers. Paulo R. Farah, Cristina D. Murta |
| 2008 | Activity-based Security Scheme for Ubiquitous Environments. Le Xuan Hung, Hassan Jameel, Riaz Ahmed Shaikh, Syed Muhammad Khaliq-ur-Rahman Raazi, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung |
| 2008 | Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments. Junghwan Choi, Donghyun Kang, Hyun-Su Jang, Young Ik Eom |
| 2008 | An Adaptive Cache Management Using Dual LRU Stacks to Improve Buffer Cache Performance. Shenggang Wan, Qiang Cao, Xubin He, Changsheng Xie, Chentao Wu |
| 2008 | An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks. Amar A. Rasheed, Rabi N. Mahapatra |
| 2008 | An Evaluation of Java RMI/JavaSpaces and Ruby DRb/Rinda. Abhishek Jaiantilal, Yifei Jiang, Shivakant Mishra |
| 2008 | Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy. João V. P. Gomes, Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro |
| 2008 | Analysis on Probabilistic View Coverage for Image Sensing - A Geometric Approach. Fulu Li, Ramesh Raskar, Andrew Lippman |
| 2008 | Assessment Strategy with Markov Chain Utilized in Wireless Sensor Networks. Lun Zhang, Dongxiu Ou |
| 2008 | Asynchronous Detection and Avoidance (DAA) Protocol for Interference Mitigation in Dynamic Spectrum Access. Yu-Sheng Wang, Chun-Ting Chou |
| 2008 | Automatic Generation of User's Profiles for Location-Based Adaptation of Multimedia Documents. Fayçal M'hamed Bouyakoub, Abdelkader Belkhir |
| 2008 | Coding-Aware Multi-path Routing in Multi-Hop Wireless Networks. Song Han, Zifei Zhong, Hongxing Li, Guihai Chen, Edward Chan, Aloysius K. Mok |
| 2008 | Cooperative Monitoring for Internet Data Centers. Kuai Xu, Feng Wang |
| 2008 | Delay and Capacity Optimization in Multi-radio Multi-channel Wireless Mesh Networks. Weihuang Fu, Yun Wang, Dharma P. Agrawal |
| 2008 | Design and Evaluation of Localization Protocols and Algorithms in Wireless Sensor Networks Using UWB. Di Wu, Lichun Bao, Min Du, Renfa Li |
| 2008 | Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets. Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh |
| 2008 | Directional Double Metric Routing in Wireless Mesh Network. Dapeng Wang, Shoubao Yang, Yun Hu, Peng Zhang |
| 2008 | Discovering Resources in Tuple-Based Pervasive Systems using Resource-Aware Routing. Saman Kolahdooz, Shahpour Rahmani, Mohsen Sharifi |
| 2008 | Distributed Detection of Replica Cluster Attacks in Sensor Networks Using Sequential Analysis. Jun-Won Ho |
| 2008 | Distributed Energy-Efficient Scheduling for Data-Intensive Applications with Deadline Constraints on Data Grids. Cong Liu, Xiao Qin, S. Kulkarni, Chengjun Wang, Shuang Li, Adam Manzanares, Sanjeev Baskiyar |
| 2008 | Divisible Load Scheduling inWireless Sensor Networks with Information Utility. Kijeung Choi, Thomas G. Robertazzi |
| 2008 | Enhanced Scanning Scheme for Delay-Constrained Fast Handoff in IEEE 802.11 WLANs. Yazan M. Allawi, Mingon Kim, Minho Kang |
| 2008 | Exploring Load Balancing in Heterogeneous Networks by Rate Distribution. Kuheli Louha, Jung Hyun Jun, Dharma P. Agrawal |
| 2008 | Fairness Analysis in Competitive FIFO Buffer Management. Fei Li |
| 2008 | Fuzzy Evaluation for Wireless Sensor Networks Based on Rough Set Theory. Lun Zhang, Yan Lu, Lan Chen |
| 2008 | Graph Theoretic Approach to QoS-Guaranteed Spectrum Allocation in Cognitive Radio Networks. Sameer Swami, Chittabrata Ghosh, Rucha P. Dhekne, Dharma P. Agrawal, Ken A. Berman |
| 2008 | Increasing Lifetime of Wireless Sensor Networks Using Controllable Mobile Cluster Heads. Torsha Banerjee, Dharma P. Agrawal |
| 2008 | Joint Adaptive Redundancy and Partial Retransmission for Reliable Transmission in Wireless Sensor Networks. Hao Wen, Chuang Lin, Fengyuan Ren, Hongkun Yang, Tao He, Eryk Dutkiewicz |
| 2008 | KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks. Ting Yuan, Shiyong Zhang, YiPing Zhong, Jianqing Ma |
| 2008 | Laboratory Measurements and Verification of PSI/SI Transmission in DVB-H Systems. Jani Väre, Jyrki Alamaunu, Harri Pekkonen |
| 2008 | Location Authentication Methods for Wireless Network Access Control. Lichun Bao |
| 2008 | Masquerading a Wired Covert Channel into a Wireless-like Channel. Mina Guirguis, Jason Valdez |
| 2008 | Massively Parallel Network Coding on GPUs. Xiaowen Chu, Kaiyong Zhao, Mea Wang |
| 2008 | Minimizing Energy Consumption Using Cognitive Radio. An He, Srikathyayani Srikanteswara, Jeffrey H. Reed, Xuetao Chen, William H. Tranter, Kyung Kyoon Bae, Masoud Sajadieh |
| 2008 | Mitigating Evil Twin Attacks in 802.11. Kevin S. Bauer, Harold Gonzales, Damon McCoy |
| 2008 | Modeling and Performance Evaluation of Optical Burst Switched Ring Networks with Efficient Adaptive Routing. Xingbo Gao, Mostafa A. Bassiouni |
| 2008 | Neighborhood Route Diffusion for Packet Salvaging in Networks with High Mobility. Muhannad Quwaider, Jayanthi Rao, Subir Biswas |
| 2008 | Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems. Sun-il Kim, Nnamdi Nwanze |
| 2008 | On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks. Reiner Dojen, Fan Zhang, Tom Coffey |
| 2008 | Performance Models for the Instance Pooling Mechanism of the JBoss Application Server. Fábio N. Souza, Roberto D. Arteiro, Nelson S. Rosa, Paulo Romero Martins Maciel |
| 2008 | Practical Covert Channel Implementation through a Timed Mix-Firewall. Richard E. Newman, Ira S. Moskowitz |
| 2008 | Progressive Parity-Based Hardening of Data Stores. Ahmed Amer, Jehan-François Pâris, Darrell D. E. Long, Thomas J. E. Schwarz |
| 2008 | Proxy Aided Key Pre-distribution Schemes for Sensor Networks. Mahalingam Ramkumar |
| 2008 | QELAR: A Q-learning-based Energy-Efficient and Lifetime-Aware Routing Protocol for Underwater Sensor Networks. Tiansi Hu, Yunsi Fei |
| 2008 | QoS Behavior of Optical Burst Switching under Multimedia Traffic: an Analytical Approach. Aresh Dadlani, Ahmad Khonsari, Mohammad R. Aghajani, Ali Rajabi |
| 2008 | RFID Reader Anti-collision Algorithm Using a Server and Mobile Readers Based on Conflict-Free Multiple Access. Jun-Bong Eom, Tae-Jin Lee |
| 2008 | Simple and Effective Adaptive Routing Algorithms in Multi-Layer Wormhole Networks. Kyung Min Su, Ki Hwan Yum |
| 2008 | Spectral Sensing of Adaptive Frequency Hopping signal for Cognitive Radio. Kapil Jaiswal |
| 2008 | Spectrum Handoff for Cognitive Radio Networks: Reactive-Sensing or Proactive-Sensins? Li-Chun Wang, Chung-Wei Wang |
| 2008 | Stability Analysis for Communication of Voice and Data Terminals with Packet Reservation Multiple Access Protocol. AmirAli Sharifi, Eyad H. Abed |
| 2008 | Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks. Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel |
| 2008 | Support for Security and Privacy in SenSearch. Jyh-How Huang, John Black, Shivakant Mishra |
| 2008 | TIME: Time-based Index Management for Event Query Processing in Wireless Sensor Networks. Guilin Li, Jianzhong Li, Yingshu Li |
| 2008 | TSS: An Energy Efficient Communication Scheme for Low Power Wireless Networks. Rabindranath Ghosh, Koushik Sinha, Debasish Datta, Bhabani P. Sinha |
| 2008 | The Scalability of Secure Lock. Cory J. Antosh, Barry E. Mullins |
| 2008 | Theoretical and Experimental Evaluation of Communication-Induced Checkpointing Protocols in FE Family. Yi Luo, D. Manivannan |
| 2008 | Threshold Proxy Re-Signature. Piyi Yang, Zhenfu Cao, Xiaolei Dong |
| 2008 | Throughput Enhancement of Macro and Femto Networks By Frequency Reuse and Pilot Sensing. Tae-Hwan Kim, Tae-Jin Lee |
| 2008 | Towards Green Routers: Depth-Bounded Multi-Pipeline Architecture for Power-Efficient IP Lookup. Weirong Jiang, Viktor K. Prasanna |
| 2008 | Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary. Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila |
| 2008 | Towards a Queue Sensitilve Transport Protocol. Ritesh Kumar, Jasleen Kaur |
| 2008 | Traffic Differentiating Queue For Enhancing AODV Performance in Real-Time Interactive applications. Allaa R. Hilal, Amal El-Nahas, Ahmed R. Bashandy, Samir I. Shaheen |
| 2008 | Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks. Teek Parval Sharma, Ramesh C. Joshi, Manoj Misra |
| 2008 | UD-GEM: A Multi-Path Routing Algorithm for Wireless Sensor Networks. Yuxing Huang, Qiang Ye, Yanxia Jia |
| 2008 | Understanding Divide-Conquer-Scanning Worms. Yubin Li, Zesheng Chen, Chao Chen |
| 2008 | Universal Classifier Synchronizer Demodulator. Qinqin Chen, Ying Wang, Charles W. Bostian |