- Qiao-Ling Du, Zhihong Qian, Hong Jiang, Shuxun Wang:
Localization of Anchor Nodes for Wireless Sensor Networks. NTMS 2008: 1-5 - Mohamed Elboukhari, Abdelmalek Azizi, Mostafa Azizi:
Security Oriented Analysis of B92 by Model Checking. NTMS 2008: 1-6 - Marguerite Fayçal, Ahmed Serhrouchni:
NETPOPPS: A Network Provider Oriented Peer-to-Peer System. NTMS 2008: 1-6 - Youssef Gahi, Meryem Lamrani, Abdelhak Zoglat, Mouhcine Guennoun, Bill Kapralos, Khalil El-Khatib:
Biometric Identification System Based on Electrocardiogram Data. NTMS 2008: 1-5 - Paolo Giacomazzi, Alessandro Poli:
Municipal Wireless Networks Planning. NTMS 2008: 1-3 - Amina El Gonnouni, Sara Pino-Povedano, Francisco Javier González-Serrano, Abdelouahid Lyhyaoui:
Support Vector Machines for Multiple Targets Tracking with Sensor Networks. NTMS 2008: 1-5 - Adam Grzech, Mariusz Kazmierski:
Distributed Intrusion Detection Systems of Computer Communication Networks. NTMS 2008: 1-5 - Thomas Guillet, Ahmed Serhrouchni, Mohamad Badra:
Mutual Authentication for SIP: A Semantic Meaning for the SIP Opaque Values. NTMS 2008: 1-6 - Senda Hammouda, Lilia Maalej, Zouheir Trabelsi:
Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall Integration. NTMS 2008: 1-5 - Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail:
Performance Tuning of Steganography Algorithm for Privacy Preserving Association Rule Mining in Heterogeneous Data Base. NTMS 2008: 1-6 - Lamiaa Fattouh Ibrahim, Manal Hamed Al Harbi:
Employing Clustering Techniques in Mobile Network Planning. NTMS 2008: 1-9 - Rizwana Irfan, Maqbool Uddin Shaikh:
Framework for Embedding Tacit Knowledge in Pedagogical Model to Enhance E-Learning. NTMS 2008: 1-5 - Tania Islam, Lingyu Wang:
A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph. NTMS 2008: 1-5 - Aurélien Jacquot, Jean-Pierre Chanet, Kun Mean Hou, Xunxing Diao, Jian-Jin Li:
A New Approach for Wireless Sensor Network Management: LiveNCM. NTMS 2008: 1-6 - Amir M. Jafari, Adam Sklorz, Walter Lang:
SCAR: Sequential Coordinate Routing Algorithm for Autonomous Wireless Sensor Network. NTMS 2008: 1-6 - Prem Prakash Jayaraman, Arkady B. Zaslavsky, Jerker Delsing:
Coverage Area Computation on the Run for Efficient Sensor Data Collection. NTMS 2008: 1-4 - Rashid Jayousi, Yasmin Bali:
Querying and Semantic Mapping Approaches for Semantic Resolution in E-Learning System. NTMS 2008: 1-5 - Sofiene Jelassi, Habib Youssef:
Connectivity Aware Instrumental Approach for Measuring Vocal Transmission Quality Over a Wireless Ad-Hoc Network. NTMS 2008: 1-5 - Chibli Joumaa, Alexandre Caminada, Sid Lamrous:
Mobility Simulation for the Evaluation of UMTS Power Control Algorithms. NTMS 2008: 1-5 - Jin-Woo Jung, Mary Ann Ingram:
An RF Channel Emulator-Based Testbed for Cooperative Transmission Using Wireless Sensor Devices. NTMS 2008: 1-4 - Shabana Kabeer, Maqbool Uddin Shaikh:
The Relationship between Cyber Crime and Mental Illness. NTMS 2008: 1-6 - Thirumal Kandasamy, Jaya Kumar Krishnan:
Multipath Routing Scheme in Solar Powered Wireless Sensor Networks. NTMS 2008: 1-5 - Messaoud Kara, Kun Mean Hou:
Low Cost Differential GPS Receivers (LCD-GPS): The Differential Correction Function. NTMS 2008: 1-6 - Dimitris A. Karras, Vasilios Zorkadis:
On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov Processes. NTMS 2008: 1-7 - Stamatios V. Kartalopoulos:
Annulling Traps & Fixed Traps in Chaos Cryptography. NTMS 2008: 1-4 - Vandana Dixit Kaushik, Saurabh Singh, Hemant Tiwari, Sachin K. Goyal, Vinay K. Pathak, Phalguni Gupta:
Automatic 3D Facial Feature Extraction Algorithm. NTMS 2008: 1-5 - Ghassan Kbar, Wathiq Mansoor:
Efficient Seamless Non-Broadcast Routing Algorithm for Wireless Mesh Network. NTMS 2008: 1-5 - Rida Khatoun, Guillaume Doyen, Dominique Gaïti, Radwane Saad, Ahmed Serhrouchni:
Decentralized Alerts Correlation Approach for DDoS Intrusion Detection. NTMS 2008: 1-5 - Farouk Khelil, Mohamed Hamdi, Sylvain Guilley, Jean-Luc Danger, Nidhal Selmane:
Fault Analysis Attack on an FPGA AES Implementation. NTMS 2008: 1-5 - Neila Krichene, Noureddine Boudriga:
Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS. NTMS 2008: 1-5