| 2008 | A CGAbased IP source address authentication method in IPv6 access network. Guang Yao, Jun Bi |
| 2008 | A Tag Prediction Algorithm using Upper Bit in RFID systems. Sung Soo Kim, Yong Hwan Kim, Seong Joon Lee, Kyung Ho Chung, Kwang Seon Ahn |
| 2008 | A client-based vertical handoff approach for seamless mobility in next generation wireless networks. Yong-Sung Kim, Dong-Hee Kwon, Young-Joo Suh |
| 2008 | A collaborative peer-to-peer architecture to defend against DDoS attacks. Radwane Saad, Farid Naït-Abdesselam, Ahmed Serhrouchni |
| 2008 | A cross-domain framework for coordinated end-to-end QoS adaptation. Lifeng Zhou, Hung Keng Pung, Lek Heng Ngoh |
| 2008 | A distributed mobility management scheme for large-scale Mobile Networks. Keita Kawano, Kazuhiko Kinoshita, Nariyoshi Yamai |
| 2008 | A forwarding protocol with relay acknowledgement for vehicular ad-hoc networks. Inhyeok Jang, Wooyeol Choi, Hyuk Lim |
| 2008 | A graph theoretic approach in achieving robust peer-to-peer networking paradigm. Hosein Shafiei, F. Hoseini, Ahmad Khonsari, Mohamed Ould-Khaoua |
| 2008 | A hybrid MAC with prioritization for wireless sensor networks. Ines Slama, Bharat Shrestha, Badii Jouaber, Djamal Zeghlache |
| 2008 | A loosely synchronized gossip-based algorithm for aggregate information computation. Dongsheng Peng, Weidong Liu, Chuang Lin, Zhen Chen, Jiaxing Song |
| 2008 | A medium access control protocol for UWB sensor networks with QoS support. Jicong Tan, Mun Choon Chan, Hwee-Xian Tan, Peng Yong Kong, Chen-Khong Tham |
| 2008 | A new approach for network vulnerability analysis. Hai Le Vu, Kenneth K. Khaw, Tsong Yueh Chen, Fei-Ching Kuo |
| 2008 | A new approach for the construction of multiple multicast trees using multiple description video for wireless ad hoc networks. Osamah S. Badarneh, Michel Kadoch, Ahmed K. Elhakeem |
| 2008 | A performance evaluation of OLSR and AODV routing protocols using a self-configuration mechanism for heterogeneous wireless mesh networks. Azzedine Boukerche, Lucas Guardalben, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare |
| 2008 | A performance study of scheduling algorithms in Point-to-Multipoint WiMAX networks. Pratik Dhrona, Najah A. Abu Ali, Hossam S. Hassanein |
| 2008 | A proactive distance-based flooding technique for MANETs with heterogeneous radio ranges. Abdulla Al-Qawasmeh, Saïd Bettayeb |
| 2008 | A proactive secure routing algorithm defense against node compromise in sensor networks. Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, Zhihua Liu |
| 2008 | A service-differentiated real-time communication scheme for wireless sensor networks. Yuyan Xue, Byrav Ramamurthy, Mehmet C. Vuran |
| 2008 | A time multiplexing coordination mechanism on top of the IEEE 802.11 MAC layer. Alexander Leonovich, Huei-Wen Ferng |
| 2008 | A two-stage aggregation/thresholding scheme for multi-model anomaly-based approaches. Karim Tabia, Salem Benferhat, Yassine Djouadi |
| 2008 | A weighted RED for alleviating starvation problem in wireless mesh networks. Chaegwon Lim, Chong-Ho Choi, Hyuk Lim |
| 2008 | Accurate real-time monitoring of bottlenecks and performance of packet trace collection. Javier Rubio-Loyola, Dolors Sala, Ali Ismail Awad |
| 2008 | Achieving host mobility using DNS dynamic updating protocol. Bashir Yahya, Jalel Ben-Othman |
| 2008 | An analysis on error servers for stochastic network calculus. Jing Xie, Yuming Jiang |
| 2008 | An ant based rate allocation algorithm for media streaming in peer to peer networks. Amir Hesam Salavati, Hadi Goudarzi, Mohammad Reza Pakravan |
| 2008 | An efficient anti-collision algorithm through division transfer of tag ID in RFID systems. Seong Joon Lee, Young Tae Kim, Sung Soo Kim, Yong Soo Park, Yong Hwan Kim, Kwang Seon Ahn |
| 2008 | An efficient cooperation of on-demand and proactive modes in Hybrid Wireless Mesh Protocol. Won-Ju Yoon, Sang-Hwa Chung, Seong-Joon Lee, Yun-Sung Lee |
| 2008 | An efficient service oriented architecture for heterogeneous and dynamic wireless sensor networks. Jeremie Leguay, Mario Lopez-Ramos, Kathlyn Jean-Marie, Vania Conan |
| 2008 | An evaluation method for delay time and its jitter of WLAN using a GSPN model. Masahiro Tsunoyama, Hiroei Imai |
| 2008 | An experimental analysis of Zigbee networks. E. Dalila Pinedo-Frausto, J. Antonio García-Macías |
| 2008 | Analysis and evaluation of a scalable QoS device for broadband access to multimedia services. Wenyu Zhu, Thomas Dreibholz, Erwin P. Rathgeb |
| 2008 | Analysis of proxy MIPv6 performance compared to fast MIPv6. Ali Diab, Andreas Mitschele-Thiel, Kalin Getov, Oliver Blume |
| 2008 | Avoidance of multicast incapable branching nodes for multicast routing in WDM networks. Fen Zhou, Miklós Molnár, Bernard Cousin |
| 2008 | Beasties: Simple wireless sensor nodes. Asher Hoskins, Julie A. McCann |
| 2008 | CDMA/MPLS platforms for WIMAX mesh networks. Imam Al-wazedi, Ahmed K. Elhakeem |
| 2008 | CORE: centrally optimized routing extensions for the IEEE 802.16 MeSH mode. Parag S. Mogre, Nico d'Heureuse, Matthias Hollick, Ralf Steinmetz |
| 2008 | Channel assignment and scheduling in multichannel wireless sensor networks. Yuanyuan Zeng, Naixue Xiong, Tai-Hoon Kim |
| 2008 | Connectivity-driven flow recovery for time-sensitive transport services. Michio Honda, Jin Nakazawa, Yoshifumi Nishida, Hideyuki Tokuda |
| 2008 | Constructing low-latency overlay networks: Tree vs. mesh algorithms. Knut-Helge Vik, Carsten Griwodz, Pål Halvorsen |
| 2008 | Cooperative caching: The case for P2P traffic. Mohamed Hefeeda, Behrooz Noorizadeh |
| 2008 | Cost-efficient backup-plane architecture for single-hop WDM network. Noriaki Kamiyama |
| 2008 | Covert channels in multiplayer first person shooter online games. Sebastian Zander, Grenville J. Armitage, Philip Branch |
| 2008 | Cross-Layer analysis and enhancement of fast MIPv6 in the real IEEE 802.11 based WLANs. Yilin Song, Yi Sun |
| 2008 | Decision process for automated selection of security protocols. Lars Völker, Christoph Werle, Martina Zitterbart |
| 2008 | Delay constrained placement of mobile data collectors in underwater acoustic sensor networks. Waleed Alsalih, Hossam S. Hassanein, Selim G. Akl |
| 2008 | Demonstration of bird species detection using an acoustic wireless sensor network. Darren Moore |
| 2008 | Design and implementation of a generic hybrid wireless sensor network platform. Eugene Pamba Capo-Chichi, Hervé Guyennet, Jean-Michel Friedt, Ian Johnson, Craig Duffy |
| 2008 | Design and implementation of a policy-based management system for data reliability in Wireless Sensor Networks. Tuan Dinh Le, Wen Hu, Sanjay Jha, Peter I. Corke |
| 2008 | Designing a sensor network testbed for smart heterogeneous applications. Andreas Reinhardt, Matthias Kropff, Matthias Hollick, Ralf Steinmetz |
| 2008 | Detecting changes in the Hurst parameter. Shubhankar Chatterjee, Mike H. MacGregor, Stephen Bates |
| 2008 | Detection of anomalous network packets using lightweight stateless payload inspection. Nnamdi Nwanze, Douglas Summerville |
| 2008 | DiCAP: Distributed Packet Capturing architecture for high-speed network links. Cristian Morariu, Burkhard Stiller |
| 2008 | Distributed and scalable control plane for next generation routers: A case study of OSPF. Kim Khoa Nguyen, Brigitte Jaumard |
| 2008 | Distributed channel assignment in Wireless Mesh Networks with guaranteed connectivity. Suleyman Uludag, Kemal Akkaya |
| 2008 | Distributed search revisited: Resolving the conflict of flexibility and efficiency. Raouf Boutaba |
| 2008 | Effect of intrusion detection on secure group communications in hierarchically structured group architectures. Jin-Hee Cho, Ing-Ray Chen |
| 2008 | Efficient bandwidth management in Broadband Wireless Access Systems using CAC-based dynamic pricing. Bader Al-Manthari, Nidal Nasser, Najah A. Abu Ali, Hossam S. Hassanein |
| 2008 | Efficient power management for Wireless Sensor Networks: A data-driven approach. MingJian Tang, Jinli Cao, Xiaohua Jia |
| 2008 | End-to-end diagnosis of QoS violations with neural network. Lifeng Zhou, Lei Chen, Hung Keng Pung, Lek Heng Ngoh |
| 2008 | Energy efficient Ethernet encodings. Yanpei Chen, Tracy Xiaoxiao Wang, Randy H. Katz |
| 2008 | Energy-efficient transmission scheme of JPEG images over Visual Sensor Networks. Abdelhamid Mammeri, Ahmed Khoumsi, Djemel Ziou, Brahim Hadjou |
| 2008 | Energy-saving scheduling in IEEE 802.16e networks. Chia-Yen Lin, Hsi-Lu Chao |
| 2008 | Evaluating "no-new-wires" home networks. Yeting Yu, Jianping Pan, Ming Lu, Lin Cai, Daniel Malcolm Hoffman |
| 2008 | Evaluation and parameterization of voice traffic models for disaster area scenarios. Nils Aschenbruck, Peter Martini |
| 2008 | Event-B based invariant checking of secrecy in group key protocols. Amjad Gawanmeh, Sofiène Tahar, Leila Jemni Ben Ayed |
| 2008 | Experimental comparison of peer-to-peer streaming overlays: An application perspective. Jeff Seibert, David Zage, Sonia Fahmy, Cristina Nita-Rotaru |
| 2008 | Firewalling wireless sensor networks: Security by wireless. Ivan Martinovic, Nicos Gollan, Jens B. Schmitt |
| 2008 | Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks. Junhai Luo, Xue Liu, Yi Zhang, Danxia Ye, Zhong Xu |
| 2008 | GENI - global environment for network innovations. Chip Elliott |
| 2008 | Graph theory based aggregation of sensor readings in wireless sensor networks. Tatiana Bokareva, Nirupama Bulusu, Sanjay K. Jha |
| 2008 | Hybrid role hierarchy for the extended role based access control model. Zhenxing Luo, Jing Chen, Zuoquan Lin |
| 2008 | Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks. Christine Laurendeau, Michel Barbeau |
| 2008 | IEEE 802.11p modeling in NS-2. Balkrishna Sharma Gukhool, Soumaya Cherkaoui |
| 2008 | IP address assignment in wireless mesh networks. Alexander Zimmermann, Volker Bohme, Arnd Hannemann |
| 2008 | IP address configuration in VANET using centralized DHCP. Brijesh Kadri Mohandas, Ramiro Liscano |
| 2008 | IPclip: An architecture to restore Trust-by-Wire in packet-switched networks. Harald Widiger, Stephan Kubisch, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow |
| 2008 | Identification of malicious web pages through analysis of underlying DNS and web server relationships. Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky |
| 2008 | Implementation and performance evaluation of Selective Repeat ARQ for WiMAX NS-2 model. Michael Hempel, Wei Wang, Hamid Sharif, Ting Zhou, Puttipong Mahasukhon |
| 2008 | Improving information availability in storage-centric sensor networks. Nam Nguyen, Sudha Krishnamurthy, Peng Xie, Douglas L. Jones |
| 2008 | In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. Steffen Peter, Krzysztof Piotrowski, Peter Langendörfer |
| 2008 | Innovative approach for improving access to wireless services in high occupancy vehicles. Benjamin Falchuk, Ming Lai |
| 2008 | Intelligent Mobility Support for IPv6. Shengling Wang, Yong Cui, Sajal K. Das |
| 2008 | Interconnecting MANET and the internet a mobility approach. Francisco David Trujillo, Alicia Triviño-Cabrera, Eduardo Casilari-Pérez, Antonio Díaz Estrella, Antonio J. Yuste |
| 2008 | Key management in wireless sensor networks with inter-network sensor roaming. Sejin Choi, Venkatesh Sarangan, Steve Trost |
| 2008 | Key pre-distribution based secure backbone formation in wireless sensor networks. H. M. N. Dilum Bandara, Anura P. Jayasumana, Indrajit Ray |
| 2008 | Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. Xinxin Fan, Guang Gong |
| 2008 | Knowledge discovery in Wireless Sensor Networks for Chronological Patterns. Azzedine Boukerche, Samer Samarah, Hani Harbi |
| 2008 | LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings |
| 2008 | Managing energy use in a network with a new SNMP Power State MIB. Francisco Blanquicet, Kenneth J. Christensen |
| 2008 | Mitigate DDoS attack using TTL buckets and host threatening index. Xi Chen, Gaogang Xie, Jianhua Yang |
| 2008 | Mobility management for highly mobile users and vehicular networks in heterogeneous environments. Karl Andersson, Christer Åhlund, Balkrishna Sharma Gukhool, Soumaya Cherkaoui |
| 2008 | Modeling of multi-resolution active network measurement time-series. Prasad Calyam, Ananth Devulapalli |
| 2008 | Modeling of two-flow interactions under SINR model in Multi-hop Wireless Networks. Saquib Razak, Nael B. Abu-Ghazaleh, Vinay Kolar |
| 2008 | Monitoring the spatial-temporal effect of internet traffic based on Random Matrix Theory. Jia Liu, Wenzhu Zhang, Jian Yuan, Depeng Jin, Lieguang Zeng |
| 2008 | Multi-criteria p-cycle network design. Hamza Drid, Bernard Cousin, Samer Lahoud, Miklós Molnár |
| 2008 | Neighborhood aware power saving mechanisms for ad hoc networks. Abdelfattah Belghith, Wafa Akkari |
| 2008 | On handling weakened topologies of Wireless Sensor Networks. Mohamed F. Younis, Qiao Pan |
| 2008 | On measuring available bandwidth in wireless networks. Andreas Johnsson, Mats Björkman |
| 2008 | On selfish behavior using asymmetric carrier sensing in IEEE 802.11 wireless networks. Eunho Yang, Jaehyuk Choi, Sunglim Lee |
| 2008 | On supporting handoff management for multi-source video streaming in mobile communication systems. Tarik Taleb, Tomoyuki Nakamura, Kazuo Hashimoto |
| 2008 | On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks. Pascal Schöttle, Thomas Dreibholz, Erwin P. Rathgeb |
| 2008 | Online control techniques for optimal management of bandwidth over shared infrastructure networks. Kaliappa Nadar Ravindran, Mohammad Rabby |
| 2008 | Opportunistic Wireless Broadcast (OWB): Dynamic redundancy detection in the wireless medium. David Salyers, Aaron Striegel, Christian Poellabauer |
| 2008 | Optimal distance-based clustering for tag anti-collision in RFID systems. Waleed Alsalih, Kashif Ali, Hossam S. Hassanein |
| 2008 | Optimized resource allocation for the uplink of SFBC-CDMA systems. Taimour Aldalgamouni, Ahmed K. Elhakeem |
| 2008 | Optimizing router locations for minimum-energy wireless networks. Sungsoon Cho, John P. Hayes |
| 2008 | P2P directory search: Signature Array Hash Table. Miguel Jimeno, Kenneth J. Christensen |
| 2008 | Path guiding mechanisms for a mobile anchor improving or balancing location accuracies of static sensors in WSNs. Chih-Yung Chang, Chao-Tsun Chang, Sheng-Wen Chang, Yu-Chieh Chen, Ming-Hsien Li |
| 2008 | Performance analysis of an admission control enhancement in WIMAX networks using SAN. Lynda Mokdad, Jalel Ben-Othman |
| 2008 | Performance evaluation of optimal sized cluster based wireless sensor networks with correlated data aggregation consideration. Fan Bai, Abbas Jamalipour |
| 2008 | Performance measurement and queueing analysis of medium-high blocking probability of two and three parallel connection servers. Chung-Ping Chen, Ying-Wen Bai, Yin-Sheng Lee |
| 2008 | Performance of IEEE 802.15.4 in wireless sensor networks with a mobile sink implementing various mobility strategies. Dusan Stevanovic, Natalija Vlajic |
| 2008 | Performance of opportunistic scheduling schemes for MIMO-OFDM wireless LANs. Mikael Gidlund, Per Åhag |
| 2008 | Priority interrupts of Duty Cycled communications in wireless sensor networks. Tony O'Donovan, Jonathan P. Benson, Utz Roedig, Cormac J. Sreenan |
| 2008 | Probabilistic packet dropping for load control in multihop wireless networks. Daewon Jung, Hyuk Lim |
| 2008 | Q-learning based collaborative load balancing using distributed search for unstructured P2P networks. Sabu M. Thampi, K. Chandra Sekaran |
| 2008 | QoE-based network selection for multimedia users in IEEE 802.11 wireless networks. Kandaraj Piamrat, Adlen Ksentini, César Viho, Jean-Marie Bonnin |
| 2008 | QoS provisioning in WCDMA cellular networks through rate and coverage adaptation. Khaled A. Ali, Hossam S. Hassanein, Hussein T. Mouftah |
| 2008 | Quality of service support in wireless local area network with error control protocol. Abdelsalam B. Amer, Fayez Gebali, Yousry Abdel-Hamid |
| 2008 | Queue-based contention control for congested multihop wireless networks. Jaeseon Hwang, Hyuk Lim |
| 2008 | Range queries and load balancing in a hierarchically structured P2P system. Simon Rieche, Bui The Vinh, Klaus Wehrle |
| 2008 | Real-time intrusion prevention and security analysis of networks using HMMs. Kjetil Haslum, Marie Elisabeth Gaup Moe, Svein J. Knapskog |
| 2008 | Real-time performance analysis of Adaptive Link Rate. Baoke Zhang, Karthik Sabhanatarajan, Ann Gordon-Ross, Alan D. George |
| 2008 | Real-time routing for mobile sensor/actor networks. Aravind R. Sama, Kemal Akkaya |
| 2008 | Receiver access control and secured handoff in mobile multicast using IGMP-AC. Salekul Islam, J. William Atwood |
| 2008 | Reconstructing the Plenoptic function from wireless multimedia sensor networks. Azzedine Boukerche, Jing Feng, Richard Werner Nelem Pazzi, Yan Du, Ying Huang |
| 2008 | Reducing network cost of many-to-many communication in unidirectional WDM rings with network coding. Long Long, Ahmed E. Kamal |
| 2008 | Reliability of wireless sensor grids. Hosam M. F. AboElFotoh, Ehab S. Elmallah |
| 2008 | Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA). Segla Kpodjedo, Samuel Pierre, Makan Pourzandi |
| 2008 | Resource assignment for adaptively modulated interconnected WLANs. Amiotosh Ghosh, Ahmed K. Elhakeem |
| 2008 | Routing and buffer placement optimization in optical burst switched networks. Jorge C. S. Castro, João Manuel Ferreira Pedro, Paulo P. Monteiro |
| 2008 | Scalability considerations for an anomaly-free iBGP routing. Uli Alexander Bornhauser, Peter Martini, Martin Horneffer |
| 2008 | Scheduling optimization in multiuser detection based MAC design for Ad-Hoc networks. Mohamed Bouharras, Zbigniew Dziong, François Gagnon, Mohamad Haider |
| 2008 | Secure and efficient authentication in Wireless Mesh Networks using merkle trees. Lakshmi Santhanam, Bin Xie, Dharma P. Agrawal |
| 2008 | Self-adjusting scheme for high speed routers. Nizar Ben Neji, Adel Bouhoula |
| 2008 | Service outsourcing to support virtual home environments (VHE). Vitalis G. Ozianyi, Neco Ventura |
| 2008 | Short-term QoS provisioning in MPLS ingress nodes. Masoomeh Torabzadeh, Wessam Ajib |
| 2008 | Signal strength sensitivity and its effects on routing in maritime wireless networks. Chee-Wei Ang, Su Wen |
| 2008 | Single-path routing for life time maximization in multi-hop wireless networks. Yigal Bejerano, Seung-Jae Han, Keon-Taek Lee, Amit Kumar |
| 2008 | Smart Spanning Tree Bridging for Metro Ethernets. Aref Meddeb |
| 2008 | Spatially Disjoint Multipath Routing protocol without location information. Juan Jose Galvez, Pedro M. Ruiz, Antonio Fernandez Gómez-Skarmeta |
| 2008 | Speedo: Realistic achievable bandwidth in 802.11 through passive monitoring. Malik Ahmad Yar Khan, Darryl Veitch |
| 2008 | Spherical Coordinate Routing for 3D wireless ad-hoc and sensor networks. Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan |
| 2008 | Supporting a seamless map in peer-to-peer system for Massively Multiplayer Online Role Playing Games. Xinbo Jiang, Farzad Safaei |
| 2008 | Supporting geographical queries onto DHTs. Jordi Pujol Ahulló, Pedro García López, Marc Sánchez Artigas, Antonio Fernandez Gómez-Skarmeta |
| 2008 | Supporting real-time data traffic in safety-critical vehicle-to-infrastructure communication. Annette Böhm, Magnus Jonsson |
| 2008 | TCP computational energy cost within wireless Mobile Ad Hoc Network. Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mohammed Senouci |
| 2008 | TCP mechanisms for improving the user experience for time-dependent thin-stream applications. Andreas Petlund, Kristian Evensen, Carsten Griwodz, Pål Halvorsen |
| 2008 | TabooQMR: A Taboo-based search algorithm improving Mamcra for multicast routing. Adel Ben Mnaouer, Abdelfattah Belghith, Naouel Ben Ali, Miklós Molnár |
| 2008 | The design of a secure key management system for mobile ad hoc networks. Azzedine Boukerche, Yonglin Ren |
| 2008 | Towards a zero configuration authentication scheme for 802.11 based networks. Carolin Latze, Ulrich Ultes-Nitsche, Florian Baumgartner |
| 2008 | Two dynamic restoration schemes for survivable traffic grooming in WDM networks. Huaxiong Yao, Yan Yang, Zongkai Yang |
| 2008 | Understanding and using mobility on Publish/Subscribe based architectures for MANETs. Cristiano G. Rezende, Azzedine Boukerche, Bruno P. S. Rocha, Antonio Alfredo Ferreira Loureiro |
| 2008 | Utilizing IEEE 802.11n to enhance QoS support in wireless mesh networks. Abduladhim Ashtaiwi, Hossam S. Hassanein |
| 2008 | Video streaming with network coding and opportunistic relay in wireless mesh networks. Boubacar Kimba, Dit Adamou, Shihong Zou, Shiduan Cheng |
| 2008 | WBest: A bandwidth estimation tool for IEEE 802.11 wireless networks. Mingzhe Li, Mark Claypool, Robert E. Kinicki |
| 2008 | What's new? Message reduction in sensor networks using events. Andreas Köpke, Adam Wolisz |