15-01-2010, 07:31 PM
a. A Gen-Based RFID Authentication Protocol for Security and Privacy
b. Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks
c. Fair Class-Based Downlink Scheduling with Revenue Considerations in Next Gen
d. Message Authentication in Computationally Constrained Environments
e. Random Cast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks
f. Wardrop Routing in Wireless Networks
g. Distributed mobility management for target tracking in mobile sensor networks
h. Building Small-World Peer-to-Peer Networks Based on Hierarchical Structures
a. Firewall Policy Queries
i. On Fairness, Optimizing Replica Selection in Data Grids
j. The Proportional-Share Allocation Market for Computational Resources
k. Using Data Accessibility for Resource Selection in Large “Scale Distributed Systems
l. Hba: Distributed Metadata Management For Large Cluster-Based
m. Storage Systems
n. Minimizing File download Time In Stochastic Peer-To-Peer Networks
o. Statistical Technique For Detecting Traffic Anomalies Through Packet Header Data
p. A Geometric Approach To Improving Active Packet Loss Measurement
q. Distributed database architecture for global roaming in mobile networks
a. Consistency Management Strategies for Data Replication in Mobile Ad
b. Hoc Networks
c. Fair Class-Based Downlink Scheduling with Revenue Considerations in
d. Next Generation Broadband Wireless Access System
e. Message Authentication in Computationally Constrained Environments
f. On Channel Allocation for Heterogenous Data Broacasting
g. Paired Measurement Localization: A Robot Approach for Wireless
h. Localization