Table of contents : Front Matter....Pages i-xv IP Application Test Framework....Pages 1-7 Cross-Layer Based Approach to Detect Idle Channels and Allocate Them Efficiently Using Markov Models....Pages 9-15 Threshold Based Call Admission Control for QoS Provisioning in Cellular Wireless Networks with Spectrum Renting....Pages 17-22 Ontology-Based Web Application Testing....Pages 23-27 Preventing the “Worst Case Scenario:” Combating the Lost Laptop Epidemic with RFID Technology....Pages 29-33 Information Security and System Development....Pages 35-40 A Survey of Wireless Sensor Network Interconnection to External Networks....Pages 41-46 Comparing the Performance of UMTS and Mobile WiMAX Convolutional Turbo Code....Pages 47-51 Performance of Interleaved Cipher Block Chaining in CCMP....Pages 53-58 Localization and Frequency of Packet Retransmission as Criteria for Successful Message Propagation in Vehicular Ad Hoc Networks....Pages 59-64 Authentication Information Alignment for Cross-Domain Federations....Pages 65-70 Formally Specifying Linux Protection....Pages 71-79 Path Failure Effects on Video Quality in Multihomed Environments....Pages 81-86 Reconfigurable Implementation of Karatsuba Multiplier for Galois Field in Elliptic Curves....Pages 87-92 Nonlinear Congestion Control Scheme for Time Delayed Differentiated-Services Networks....Pages 93-97 Effect of Packet Size and Channel Capacity on the performance of EADARP Routing Protocol for Multicast Wireless ad hoc Networks....Pages 99-104 Improving BGP Convergence Time via MRAI Timer....Pages 105-110 Error Reduction using TCP with Selective Acknowledgement and HTTP with Page Response Time over Wireless Link....Pages 111-116 Enhanced Reconfigurability for MIMO Systems using Parametric Arrays....Pages 117-122 Modified LEACH – Energy Efficient Wireless Networks Communication....Pages 123-127 Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks....Pages 129-134 Automatic Construction and Optimization of Layered Network Attack Graph....Pages 135-138 Parallel Data Transmission: A Proposed Multilayered Reference Model....Pages 139-142 Besides Tracking – Simulation of RFID Marketing and Beyond....Pages 143-148 Light Path Provisioning using Connection Holding Time and Flexible Window....Pages 149-154 Distributed Hybrid Research Network Operations Framework....Pages 155-160 Performance of the Duo-Binary Turbo Codes in WiMAX Systems....Pages 161-165 A unified event reporting solution for wireless sensor networks....Pages 167-172 A Low Computational Complexity Multiple Description Image Coding Algorithm Based on JPEG Standard....Pages 173-176 A General Method for Synthesis of Uniform Sequences with Perfect Periodic Autocorrelation....Pages 177-182 Using Support Vector Machines for Passive Steady State RF Fingerprinting....Pages 183-188 Genetic Optimization for Optimum 3G Network Planning: an Agent-Based Parallel Implementation....Pages 189-194 A Survey about IEEE 802.11e for better QoS in WLANs....Pages 195-200 Method of a Signal Analysis for Imitation Modeling in a Real-Time Network....Pages 201-206 Simple yet efficient NMEA sentence generator for testing GPS reception firmware and hardware.....Pages 207-210 Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks....Pages 211-216 Modeling Trust in Wireless Ad-Hoc Networks....Pages 217-221 Address Management in MANETs Using an Ant Colony Metaphor....Pages 223-228 Elitism Between Populations for the Improvement of the Fitness of a Genetic Algorithm Solution....Pages 229-233 Adaptive Genetic Algorithm for Neural Network Retraining....Pages 235-238 A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks....Pages 239-244 A Dynamic Scheme for Authenticated Group Key Agreement Protocol....Pages 245-250 Performance Evaluation of TCP Congestion Control Mechanisms....Pages 251-256 Optimization and Job Scheduling in Heterogeneous Networks....Pages 257-262 A New Methodology for Self Localization in Wireless Sensor Networks....Pages 263-268 A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)....Pages 269-274 A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET....Pages 275-279 Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing Algorithm....Pages 281-286 Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD)....Pages 287-292 A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution....Pages 293-298 A Mathematical Model for Reducing Handover Time at MAC Layer for Wireless Networks....Pages 299-304 A Software Solution for Mobile Context Handoff in WLANs * ....Pages 305-309 Robust Transmission of Video Stream over Fading Channels....Pages 311-316 An Attack Classification Tool Based On Traffic Properties and Machine Learning....Pages 317-321 Browser based Communications Integration using Representational State Transfer....Pages 323-328 Security Aspects of Internet based Voting....Pages 329-332 Middleware-based distributed heterogeneous simulation....Pages 333-337 Analysis of the flooding search algorithm with OPNET....Pages 339-342 Efficient Self-Localization and Data Gathering Architecture for Wireless Sensor Networks....Pages 343-348 Two Cross-Coupled H∞ Filters for Fading Channel Estimation in OFDM Systems....Pages 349-353 An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks....Pages 355-360 A highly parallel scheduling model for IT change management....Pages 361-366 Design and Implementation of a Multi-sensor Mobile Platform....Pages 367-372 Methods based on fuzzy sets to solve problems of Safe Ship control....Pages 373-377 Network Topology Impact on Influence Spreading....Pages 379-384 An Adaptive Combiner-Equalizer for Multiple-Input Receivers....Pages 385-390 KSAm – An Improved RC4 Key-Scheduling Algorithm for Securing WEP....Pages 391-396 Ubiquitous Media Communication Algorithms....Pages 397-401 Balancing Streaming and Demand Accesses in a Network Based Storage Environment....Pages 403-408 An Energy and Distance Based Clustering Protocol for Wireless Sensor Networks....Pages 409-412 Encoding Forensic Multimedia Evidence from MARF Applications as Forensic Lucid Expressions....Pages 413-416 Distributed Modular Audio Recognition Framework (DMARF) and its Applications Over Web Services....Pages 417-422 The Authentication Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement....Pages 423-429 Performance Evaluation of MPLS Path Restoration Schemes using OMNET++....Pages 431-436 FM Transmitter System for Telemetrized Temperature Sensing Project....Pages 437-442 Enhancing Sensor Network Security with RSL Codes....Pages 443-447 The Integrity Framework within the Java Data Security Framework (JDSF): Design and Implementation Refinement....Pages 449-455 A Multi-layer GSM Network Design Model....Pages 457-460 Performance Analysis of Multi Carrier CDMA and DSCDMA on the basis of different users and Modulation scheme....Pages 461-463 Scalability Analysis of a Model for GSM Mobile Network Design....Pages 465-469 Location Management in 4G Wireless Heterogeneous Networks using Mobile Data Mining Techniques....Pages 471-476 A new clustered Directed Diffusion Algorithm based on credit of nodes for wireless sensor networks....Pages 477-481 Multiview Media Transmission Algorithm for Next Generation Networks....Pages 483-487 A 4 GHz Clock Synchronized Non Coherent Energy Collection UWB Transceiver....Pages 489-493 Comparison of Cascaded LMS-RLS, LMS and RLS Adaptive Filters in Non-Stationary Environments....Pages 495-499 Data Mining Based Network Intrusion Detection System: A Survey....Pages 501-505 VDisaster recovery with the help of real time video streaming using MANET support....Pages 507-512 Back Matter....Pages 513-517