Analysis of Hierarchical Scheduling for Heterogeneous Traffic Over Network

Author(s): Rabie Barhoun | Abdelwahed Namir | Anas Barhoun
Volume: 5
Issue: 3
Year: 2013





Distributed Firewalls and IDS Interoperability Checking Based on A Formal Approach

Author(s): Kamel Karoui | Fakher Ben Ftima | Henda Ben Ghezala
Volume: 5
Issue: 5
Year: 2013





Cloud Computing Challenges And Solutions

Author(s): Nidal M. Turab | Anas Abu Taleb | Shadi R. Masadeh | Shadi R. Masadeh
Volume: 5
Issue: 5
Year: 2013





Exact Network Reconstruction from Consensus Signals and One Eigen Value

Author(s): Enzo Fioriti | Stefano Chiesa | Fabio Fratichini | ENEA
Volume: 5
Issue: 5
Year: 2013





Security Analysis of Generalized Confidentialmodulation for Quantum Communication

Author(s): Hidema Tanaka
Volume: 5
Issue: 5
Year: 2013





Visualize Network Anomaly Detection by Using K-Means Clustering Algorithm

Author(s): A. M. Riad | Ibrahim Elhenawy | Ahmed Hassan | Nancy Awadallah
Volume: 5
Issue: 5
Year: 2013





Performance Analysis of Economic Model and Radio Resource Management in Heterogeneous Wireless Networks

Author(s): Nilkantha Chakraborty
Volume: 5
Issue: 5
Year: 2013





Corporate Role in Protecting Consumers from the Risk of Identity Theft

Author(s): Omondi John Opala | Syed (Shawon) M. Rahman
Volume: 5
Issue: 5
Year: 2013





A Novel Secure E-Contents System for Multi-Media Interchange Workflows in E-Learning Environments

Author(s): Shadi R. Masadeh | Bilal Abul-Huda | Nidal M. Turab
Volume: 5
Issue: 5
Year: 2013





Cloud Computing Challenges with Emphasis on Amazon EC2 and Windows Azure

Author(s): Azzam Sleit | Nada Misk | Fatima Badwan | Tawfiq Khalil
Volume: 5
Issue: 5
Year: 2013





New Design of Leaky Wave Antenna Based on SIW Technology for Beam Steering

Author(s): Souaad Doucha | Mehadji Abri
Volume: 5
Issue: 5
Year: 2013





A General Stochastic Information Diffusion Model in Social Networks Based on Epidemic Diseases

Author(s): Hamidreza Sotoodeh | Farshad Safaei | Arghavan Sanei | Elahe Daei
Volume: 5
Issue: 5
Year: 2013





Joint Multiple Resource Allocation Method for Cloud Computing Services with Different QOS to Users at Multiple Locations

Author(s): Shin-ichi Kuribayashi
Volume: 5
Issue: 5
Year: 2013





On Client’s Interactive Behaviour to Design Peer Selection Policies for Bittorrent-Like Protocols

Author(s): Marcus V. M. Rocha | Carlo Kleber da S. Rodrigues | Carlo Kleber da S. Rodrigues
Volume: 5
Issue: 5
Year: 2013





Towards Internet of Things (IOTS): Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing

Author(s): Rajeev Piyare | Seong Ro Lee
Volume: 5
Issue: 5
Year: 2013





Available Network Bandwidth Schema to Improve Performance in TCP Protocols

Author(s): Marcos Talau
Volume: 5
Issue: 5
Year: 2013





Improved Quality of Service Protocol for Real Time Traffic in MANET

Author(s): Iftikhar Ahmad | Humaira Jabeen | Faisal Riaz
Volume: 5
Issue: 4
Year: 2013





Designing Secure Clustering Protocol With The Approach Of Reducing Energy Consumption In Wireless Sensor Networks

Author(s): Sanaz Sadeghi | Behrouz Sadeghi
Volume: 5
Issue: 4
Year: 2013





Performance and Rekeying Analysis of Multicast Security in LTE

Author(s): Mohsen M. Tantawy | Adly S. Tag ELdien | Esraa Mosleh Eid
Volume: 5
Issue: 4
Year: 2013





An IDE for Android Mobile Phones with Extended Functionalities Using Best Developing Methodologies

Author(s): Sakila Banu Ali | Saba V Kumar
Volume: 5
Issue: 4
Year: 2013





Threats and Anti-threats Strategies for Social Networking Websites

Author(s): Omar Saeed Al Mushayt
Volume: 5
Issue: 4
Year: 2013





A New Programming Model to Simulate Wireless Sensor Networks : Finding The Best Routing Path

Author(s): Abrar Alajlan | Khaled Elleithy | Varun Pande
Volume: 5
Issue: 4
Year: 2013





Optimizing Voip Using A Cross Layer Call Admission Control Scheme

Author(s): Mumtaz AL-Mukhtar | Huda Abdulwahed
Volume: 5
Issue: 4
Year: 2013





A Wavelength and Converter Assignment Scheme using Converter Usage History in Wavelength-Routed Networks

Author(s): Yukinobu Fukushima | Takahiro Ooishi | Tokumi Yokohira
Volume: 5
Issue: 4
Year: 2013





Node Failure Time and Coverage Loss Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree Based Data Gathering in Mobile Sensor Networks

Author(s): Natarajan Meghanathan | Philip D. Mumford
Volume: 5
Issue: 4
Year: 2013





Effects Of Filters on DVB-T Receiver Performance Under AWGN, RAYLEIGH and RICEAN Fading Channels

Author(s): AKM Arifuzzaman | Mussab Saleh | Mohammed Tarique | Rumana Islam
Volume: 5
Issue: 4
Year: 2013





The Extended Clustering AD HOC Routing Protocol (ECRP)

Author(s): Buthayna Al-Sharaa
Volume: 5
Issue: 3
Year: 2013





A Secure Data Communication System Using Cryptogaphy And Steganography

Author(s): Saleh Saraireh
Volume: 5
Issue: 3
Year: 2013





I Am 4 VHO: New Approach to Improve Seamless Vertical Handover in Heterogeneous Wireless Networks

Author(s): Omar Khattab | Omar Alani
Volume: 5
Issue: 3
Year: 2013





A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications

Author(s): H. Raggad | M. Latrach | A. Gharsallah
Volume: 5
Issue: 3
Year: 2013





An Optimal Software Framework for Parallel Computation of CRC

Author(s): Hamed Sheidaeian | Behrouz Zolfaghari
Volume: 5
Issue: 3
Year: 2013





Reducing the Peak to Average Power Ratio of MIMO-OFDM Systems

Author(s): Asim M. Mazin | Garth V. Crosby
Volume: 5
Issue: 3
Year: 2013





ETOR-Efficient Token based Opportunistic Routing

Author(s): A. Saichand | A. R. Naseer
Volume: 5
Issue: 3
Year: 2013





Healthy Nutrition Under ASP-PROLOG

Author(s): Fernando Zacarias F | Rosalba Cuapa | Erick Madrid | Dionicio Zacarias
Volume: 5
Issue: 3
Year: 2013





LTE QOS Dynamic Resource Block Allocation with Power Source Limitation and Queue Stability Constraints

Author(s): Mohamed A. Abd El-Gawad | Mohsen M. Tantawy | Mohamed El-Mahallawy
Volume: 5
Issue: 3
Year: 2013





Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration

Author(s): Mohammad Z. M. Masoud
Volume: 5
Issue: 3
Year: 2013





Centrality-Based Network Coder Placement for Peer-To-Peer Content Distribution

Author(s): Dinh Nguyen | Hidenori Nakazato
Volume: 5
Issue: 3
Year: 2013





A Framework for SOFTWARE-AS-A-SERVICE Selection and Provisioning

Author(s): Elarbi Badidi
Volume: 5
Issue: 3
Year: 2013





Probability Density Functions of the Packet Length for Computer Networks with Bimodal Traffic

Author(s): Ewerton R. S. Castro | Marcelo S. Alencar | Iguatemi E. Fonseca
Volume: 5
Issue: 3
Year: 2013





Designing Run-Time Environments to Have Predefined Global Dynamics

Author(s): Massimo Monti | Pierre Imai | Christian
Volume: 5
Issue: 3
Year: 2013





Fine-tuning of k in a K-fold Multicast Network with Finite Queue using Markovian Model

Author(s): Mahmudul Hasan
Volume: 5
Issue: 2
Year: 2013





New Metric for HWMP Protocol (NMH)

Author(s): Sidi Ould Cheikh | Malik Mubashir Hassan | Abdelhak Geuroui
Volume: 5
Issue: 2
Year: 2013





Simulation of Cognitive Radio System Applying Different Wireless Channel Models

Author(s): Mohamed Shalaby | Mona Shokair | Yaser S. E. Abdo
Volume: 5
Issue: 2
Year: 2013





Energy and Bandwidth Constrained QoS Enabled Routing for MANETs

Author(s): N.Sumathi | C.P.Sumathi
Volume: 5
Issue: 2
Year: 2013





Replay Attack Prevention in Kerberos Authentication Protocol using Triple Password

Author(s): Gagan Dua | Nitin Gautam | Dharmendar Sharma | Ankit Arora
Volume: 5
Issue: 2
Year: 2013





Performance Evaluation of Distributed Synchronous Greedy Graph Coloring Algorithms on Wireless Ad Hoc and Sensor Networks

Author(s): Esra Ruzgar | Orhan Dagdeviren
Volume: 5
Issue: 2
Year: 2013





A Pair-Wise Key Establishment Scheme for AD HOC Network

Author(s): Isra Sitan Al-Qasrawi | Obaida Mohammed Al-Hazaimeh
Volume: 5
Issue: 2
Year: 2013





A Survey on Energy Efficiency for Wireless Mesh Network

Author(s): Sarra Mamechaoui | Fedoua Didi | Guy Pujolle
Volume: 5
Issue: 2
Year: 2013





Performance study of IEEE 802.16d under Stanford University Interim (SUI)Channel

Author(s): A K M Arifuzzman | Abdul HashibSiddique | Mohammed Tarique
Volume: 5
Issue: 2
Year: 2013




