All Stories

  1. Assessment of energy consumption for information flow control protocols in IoT devices
  2. An energy-efficient quorum-based locking protocol by omitting meaningless methods on object replicas
  3. A comparison study of chi-square and uniform distributions of mesh clients for different router replacement methods using WMN-PSODGA hybrid intelligent simulation system
  4. Probability and topic‐based data transmission protocol
  5. Implementation and evaluation of the information flow control for the Internet of Things
  6. Effect of Slice Priority for admission control in 5G Wireless Networks: A comparison study for two Fuzzy-based systems considering Software-Defined-Networks
  7. Fault-Tolerant Strategies in the Tree-Based Fog Computing Model
  8. Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT
  9. Protocol to efficiently prevent illegal flow of objects in P2P type of publish/subscribe (PS) systems
  10. A Hierarchical Group of Peers in Publish/Subscribe Systems
  11. A Model for Mobile Fog Computing in the IoT
  12. An Energy-Efficient Process Replication Algorithm with Multi-threads Allocation
  13. Data and Subprocess Transmission on the Edge Node of TWTBFC Model
  14. Evaluation of an OI (Operation Interruption) Protocol to Prevent Illegal Information Flow in the IoT
  15. Evaluation of Data and Subprocess Transmission Strategies in the Tree-Based Fog Computing Model
  16. Fault Detection of Process Replicas on Reliable Servers
  17. Performance Analysis of WMNs by WMN-PSOHC-DGA Simulation System Considering Linearly Decreasing Inertia Weight and Linearly Decreasing Vmax Replacement Methods
  18. User Oriented Protocols for Data Sharing and Services Management
  19. Causally ordering delivery of event messages in P2PPSO systems
  20. Message Ordering Based on the Object-Based-Causally (OBC) Precedent Relation
  21. Performance Analysis of WMNs by WMN-PSOHC-DGA Simulation System Considering Random Inertia Weight and Linearly Decreasing Vmax Router Replacement Methods
  22. Personalized Protocols for Data Division and Knowledge Management
  23. Subprocess Transmission Strategies for Recovering from Faults in the Tree-Based Fog Computing (TBFC) Model
  24. Capability-Based Information Flow Control Model in the IoT
  25. Evaluation of a Two-Way Tree-Based Fog Computing (TWTBFC) Model
  26. The Improved Energy Consumption Laxity Based (IECLB) Algorithm to Perform Computation Processes
  27. A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received Signal
  28. Biometric-Based Linguistic Solutions for Data Encryption and Sharing
  29. Centrality Based Geocasting for Opportunistic Networks
  30. Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems
  31. Energy-Efficient Group Migration of Virtual Machines in a Cluster
  32. Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) Model
  33. Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Weibull and Chi-square Client Distributions
  34. Selection of IoT Devices in Opportunistic Networks: A Fuzzy-Based Approach Considering IoT Device’s Selfish Behaviour
  35. The Improved Energy-Efficient Quorum Selection with Excluding Meaningless Methods
  36. Information flow control in object-based peer-to-peer publish/subscribe systems
  37. Complex, Intelligent, and Software Intensive Systems
  38. A Model of Virtual Machines to Support Storage Processes
  39. A Two-Way Flow Model for Fog Computing
  40. Consideration of Implementation Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain
  41. Effect of Client Priority in the Performance of a Fuzzy-Based WLAN Triage System
  42. Evaluation of TBC and OBC Precedent Relations Among Messages in P2P Type of Topic-Based Publish/Subscribe System
  43. Improving Peer Reliability Considering Jitter Parameter: A Fuzzy-Based System for JXTA-Overlay P2P System
  44. Performance Evaluation of Routing Protocols in DTNs Considering Different Mobility Models
  45. A Flexible Synchronization Protocol to Learn Hidden Topics in P2PPS Systems
  46. Static and Dynamic Group Migration Algorithms of Virtual Machines to Reduce Energy Consumption of a Server Cluster
  47. The energy consumption laxity-based algorithm to perform computation processes in virtual machine environments
  48. Simple estimation and energy-aware migration models of virtual machines in a server cluster
  49. An energy-efficient model for fog computing in the Internet of Things (IoT)
  50. Concept of Policy Information Decision Method in the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain
  51. Energy consumption laxity-based quorum selection for distributed object-based systems
  52. A Tree-Based Model of Energy-Efficient Fog Computing Systems in IoT
  53. An Eco IDMMV Migration Algorithm of Dynamic Virtual Machines in a Server Cluster
  54. Energy-Efficient Process Replication by Forcing Meaningless Replicas to Terminate in Virtual Machine Environment
  55. Evaluation of a Protocol to Prevent Malicious Information Flow in P2PPS Systems
  56. Influence of Management and Sharing Protocols for Decision Making Processes in Cloud Computing
  57. Performance Evaluation of WMN-PSOSA Considering Exponential and Weibull Distributions
  58. One-to-One Routing Protocols for Wireless Ad-Hoc Networks Considering the Electric Energy Consumption
  59. Performance Analysis of Simulation System Based on Particle Swarm Optimization and Distributed Genetic Algorithm for WMNs Considering Different Distributions of Mesh Clients
  60. Virtual Machine Migration Algorithms to Reduce Electric Energy Consumption of a Server Cluster
  61. An information flow control model in a topic-based publish/subscribe system
  62. Message from IEEE AINA 2018 Steering Committee Co-Chairs
  63. A Protocol to Prevent Malicious Information Flow in P2PPS Systems
  64. A Simple Algorithm to Select Energy-Efficient Servers for Storage and Computation Processes
  65. An Eco Migration Algorithm of Virtual Machines in a Server Cluster
  66. An Energy-Efficient Model of Fog and Device Nodes in IoT
  67. An Energy-Efficient Process Replication Algorithm Based on the Active Time of Cores
  68. Cognitive Systems for Service Management in Cloud Computing
  69. Concept of User Authentication Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain
  70. Design and Implementation of a Hybrid Intelligent System Based on Particle Swarm Optimization, Hill Climbing and Distributed Genetic Algorithm for Node Placement Problem in WMNs: A Comparison Study
  71. Message from IEEE AINA 2018 Steering Committee Co-Chairs
  72. Performance Evaluation of WMN-PSODGA System for Node Placement Problem in WMNs Considering Four Different Crossover Methods
  73. Simple Models of Processes Migration with Virtual Machines in a Cluster of Servers
  74. Unicast Routing Protocols to Reduce Electric Energy Consumption in Wireless Ad-Hoc Networks
  75. Cognitive Approaches for Medicine in Cloud Computing
  76. Algorithms for energy-efficient broadcasting messages in wireless networks
  77. Dynamic migration of virtual machines to reduce energy consumption in a cluster
  78. Simple algorithms for selecting an energy-efficient server in a cluster of servers
  79. Implementation of an intelligent hybrid simulation systems for WMNs based on particle swarm optimization and simulated annealing: performance evaluation for different replacement methods
  80. Visual CAPTCHA application in linguistic cryptography
  81. A flexible read-write abortion protocol with role safety concept to prevent illegal information flow
  82. A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Weibull Distribution, HWMP and TCP Protocols
  83. An Energy-Efficient Migration Algorithm of Virtual Machines in Server Clusters
  84. Energy-Aware Dynamic Migration of Virtual Machines in a Server Cluster
  85. Energy-Efficient Quorum Selection Algorithm for Distributed Object-Based Systems
  86. Flexible Synchronization Protocol to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems
  87. An Energy-Saving Unicast Routing Protocol in Wireless Ad-hoc Network
  88. Security of Selected Secret Sharing Schemes
  89. Simple Energy-Aware Algorithms to Selecting a Server for Storage and Computation Processes in a Cluster
  90. Personalized cryptography in cognitive management
  91. A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering Exponential Distribution, HWMP and TCP Protocols
  92. A Trustworthiness-Based Ad-Hoc Routing Protocol in Wireless Networks
  93. Algorithms to Energy-Efficiently Select a Server for a General Process in a Scalable Cluster
  94. An Eco Migration of Virtual Machines in a Server Cluster
  95. Design and Implementation of a Simulation System Based on Deep Q-Network for Mobile Actor Node Control in Wireless Sensor and Actor Networks
  96. Differentiating the Starting Time of Computation Process Replicas in the Improved Redundant Delay Time-Based (IRDTB) Algorithm
  97. Energy-Aware Virtual Machine Migration Models in a Scalable Cluster of Servers
  98. Evaluation of Protocols to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems
  99. Load Experiment of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations
  100. Message from IEEE AINA 2017 Steering Committee Co-Chairs
  101. Message from IEEE AINA 2017 Steering Committee Co-Chairs
  102. Safety and Standardization of Data Sharing Techniques and Protocols for Management of Strategic Data
  103. Simple Energy-Aware Algorithms for Selecting a Server in a Scalable Cluster
  104. Topic-Based Selective Delivery of Event Messages in Peer-to-Peer Model of Publish/Subscribe Systems in Heterogeneous Networks
  105. An energy-aware load balancing algorithm to perform computation type application processes in a cluster of servers
  106. Eco Models of Distributed Systems
  107. Malware Algorithm Classification Method Based on Big Data Analysis
  108. Multi-level power consumption model and energy-aware server selection algorithm
  109. Sensitivity-based synchronisation protocol to prevent illegal information flow among objects
  110. Guest Editorial: Large-scale Multimedia Data Management: Techniques and Applications
  111. A Model for Energy-Aware Migration of Virtual Machines
  112. A Neural Network Based User Identification for Tor Networks: Comparison Analysis of Different Activation Functions Using Friedman Test
  113. An Eco Model of Process Migration with Virtual Machines
  114. Experimental Results of a Raspberry Pi Based WMN Testbed in Indoor Environment: A Comparison Study of LoS and NLoS Scenarios
  115. Message from ADPNA 2016 Workshop Co-Chairs
  116. Message from NBiS 2016 Steering Committee Co-Chairs
  117. Multi-level Power Consumption and Computation Models and Energy-Efficient Server Selection Algorithms in a Scalable Cluster
  118. Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Uniform Distribution
  119. Power Control Scheme for Underlay Approach in Cognitive Radio Networks
  120. Selection Algorithms to Select Energy-Efficient Servers for Storage and Computation Processes
  121. Subscription Initialization (SI) Protocol to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems
  122. The Improved Redundant Delay Time-Based (IRDTB) Algorithm to Perform Computation Type Application Processes in Heterogeneous Server Clusters
  123. Topic-Based Causally Ordered Delivery of Event Messages in a Peer-to-Peer (P2P) Model of Publish/Subscribe Systems
  124. Medical Image Analysis by Cognitive Information Systems – a Review
  125. A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks
  126. A Model for Migration of Virtual Machines to Reduce Electric Energy Consumption
  127. An Energy-Efficient Routing Protocol for Infrastructure-Less Opportunistic Networks
  128. Design and Evaluation of Algorithms to Energy-Efficiently Select Servers for Storage and Computation Processes
  129. Energy-Aware Algorithms to Select Servers in Scalable Clusters
  130. Energy-Aware Analysis of Synchronizing a Groupware Calendar
  131. Experimental Results of a Raspberry Pi Based Wireless Mesh Network Testbed Considering TCP and LoS Scenario
  132. Information Flow Control Models in Peer-to-Peer Publish/Subscribe Systems
  133. Message from ECDS 2016 Workshop Co-Chairs
  134. Performance Analysis of a Genetic Algorithm Based System for Wireless Mesh Networks Considering Weibull Distribution, DCF and EDCA
  135. Scalable Group Communication Protocols in the Peer-to-Peer Model of Topic-Based Publish/Subscribe Systems
  136. The Extended Power Consumption Model to Perform Computation Type Application Processes on Virtual Machines
  137. A Scalable Group Communication Protocol in Heterogeneous Networks
  138. A Web Interface for Satellite Scheduling Problems
  139. An Energy-Aware Migration of Virtual Machines
  140. An Energy-Efficient Load Balancing Algorithm for Virtual Machine Environments to Perform Communication Type Application Processes
  141. Energy-Aware Clusters of Servers for Storage and Computation Applications
  142. Energy-Aware Server Selection Algorithms in a Scalable Cluster
  143. Examination of the Implementation Method of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations
  144. Experimental Results of a Raspberry Pi and OLSR Based Wireless Content Centric Network Testbed Considering OpenWRT OS
  145. Influential Abortion Probability in a Flexible Read-Write Abortion Protocol
  146. Message from IEEE AINA 2016 Steering Committee Co-Chairs
  147. Message from IEEE AINA 2016 Steering Committee Co-Chairs
  148. Protocols for Energy-Efficiently Broadcasting Messages in Wireless Networks
  149. Reduction of Unnecessarily Ordered Event Messages in Peer-to-Peer Model of Topic-Based Publish/Subscribe Systems
  150. Interface and results visualization of WMN-GA simulation system: Evaluation for Exponential and Weibull distributions considering different transmission rates
  151. Journal of Computer and System Sciences Special Issue on Reliability and Optimization for Wireless Networking and Cloud Computing
  152. Read-abortion (RA) based synchronization protocols to prevent illegal information flow
  153. Solving mesh router nodes placement problem in Wireless Mesh Networks by Tabu Search algorithm
  154. A Study on Performance of Hill Climbing for Router Placement in Wireless Mesh Networks
  155. Energy-Aware Migration and Replication of Processes in a Cluster
  156. Energy-Efficient Virtualisation of Threads in a Server Cluster
  157. Experimental Results of a Raspberry Pi Based WMN Testbed for Different OSs in Indoor Environment Considering LoS Scenario
  158. Message from MNSA 2015 Symposium Co-Chairs
  159. Power Consumption Model of a Server to Perform Communication Type Application Processes on Virtual Machines
  160. Power Consumption and Computation Models of a Storage Server
  161. Reliable and Efficient Parallel Transmission Protocols in P2P Networks
  162. Role Safety in a Flexible Read-Write Abortion Protocol
  163. A GA-Based Simulation System for WMNs: Performance Analysis of WMN-GA System for Different WMN Architectures Considering DCF and EDCA
  164. A Flexible Read-Write Abortion Protocol with Sensitivity of Roles
  165. A New FACS for Cellular Wireless Networks Considering QoS: A Comparison Study of FuzzyC with MATLAB
  166. An Energy-Efficient Load Balancing Algorithm to Perform Computation Type Application Processes for Virtual Machine Environments
  167. Eco Models of Storage-Based Severs
  168. Energy-Efficient Broadcast Protocols in Wireless Network
  169. Message from ADPNA 2015 Workshop Organizers
  170. Message from Steering Committee Co-Chairs
  171. Multi-level Computation and Power Consumption Models
  172. On Streaming Consistency of Big Data Stream Processing in Heterogenous Clutsers
  173. Performance Evaluation of a WMN Testbed in Indoor Environment Considering Mobile Mesh Node Scenario
  174. Performance Evaluation of a Neural Network Based Intrusion Detection System for Tor Networks Considering different Hidden Units
  175. Reduction of Unnecessarily Ordered Messages in Scalable Group Communication
  176. Selective Delivery of Event Messages in Peer-to-Peer Topic-Based Publish/Subscribe Systems
  177. Suggestion of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations
  178. Trustworthiness in Peer-to-Peer Systems
  179. A Flexible Read-Write Abortion Protocol with Sensitivity of Objects to Prevent Illegal Information Flow
  180. Energy-Efficient Replication and Migration of Processes in a Cluster
  181. Evaluation of Energy-Aware Server Selection Algorithms
  182. Message from ECDS 2015 Workshop Co-Chairs
  183. Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-cloud Computing
  184. Power Consumption and Computation Models of Virtual Machines to Perform Computation Type Application Processes
  185. Synchronization of Peers in Peer-to-Peer Publish/Subscribe Systems
  186. Trustworthiness-Based Broadcast Protocols in Wireless Networks
  187. Frontiers in intelligent cloud services
  188. A Flexible Read-Write Abortion Protocol to Prevent Illegal Information Flow
  189. AINA 2015 Steering Committee Co-Chairs
  190. Asynchronous Migration of Process Replicas in a Cluster
  191. Broadcast Protocols in Wireless Networks
  192. Causally Ordered Delivery of Event Messages with Keyword Vectors in P2P Publish/Subscribe Systems
  193. Energy-Efficient Delay Time-Based Process Allocation Algorithm for Heterogeneous Server Clusters
  194. Establishment of Virtual Policy Based Network Management Scheme by Load Experimets in Virtual Environment
  195. Message from AINA 2015 Steering Committee Co-Chairs
  196. Power Consumption and Computation Models of a Server with a Multi-core CPU and Experiments
  197. Future Data and Security Engineering
  198. An energy-efficient process migration approach to reducing electric energy consumption in a cluster of servers
  199. The delay time-based server selection algorithm for energy-efficient redundant execution of processes
  200. An extended improved redundant power consumption laxity-based (EIRPCLB) algorithm for energy efficient server cluster systems
  201. A P2P Model of Publish/Subscribe Systems
  202. A Process Migration Approach to Energy-Efficient Computation in a Cluster of Servers
  203. Analysis of WMN-GA Simulation System Results: A Comparison Study for Node Placement in WMNs Considering Exponential and Weibull Distributions and Different Transmission Rates
  204. Message from MNSA 2014 Symposium Co-Chairs
  205. The Redundant Delay Time-Based (RDTB) Algorithm for Fault Tolerant Server Clusters
  206. A Comparison Study on Meta-Heuristics for Ground Station Scheduling Problem
  207. Analysis of WMN-GA Simulation Results: Optimization of Number of Mesh Routers Considering Exponential and Weibull Distributions of Mesh Clients
  208. Functional Experiment of Virtual Policy Based Network Management Scheme in Cloud Environment
  209. Power Consumption Models for Migrating Processes in a Server Cluster
  210. The Improved Delay Time-Based (IDTB) Algorithm to Perform Computation Type Application Processes
  211. Trustworthiness-Based Group Communication Protocols
  212. Welcome Message from ADPNA 2014 Workshops Chair
  213. Welcome Message from NBiS Steering Committee Co-Chairs
  214. Energy-efficient dynamic clusters of servers
  215. A Power Reduction Method in a House Considering Comfortability
  216. Power Consumption Models for Redundantly Performing Mobile-Agents
  217. Situation-Aware Group Communication Protocols
  218. The Delay Time-Based (DTB) Algorithm for Energy-Efficient Server Cluster Systems
  219. WMN-GA for Node Placement in WMN: Evaluation and Visualization Using HotSpot Ad-Hoc Method
  220. CISIS ECDS Welcome Message
  221. A Tabu Search Algorithm for Ground Station Scheduling Problem
  222. An Extended Simple Power Consumption Model for Selecting a Server to Perform Computation Type Processes in Digital Ecosystems
  223. Energy-Aware Replication Models of Mobile Agents
  224. Evaluation of the Extended Improved Redundant Power Consumption Laxity-Based (EIRPCLB) Algorithm
  225. Message from AINA 2014 Steering Committee Co-Chairs
  226. Role-Based Information Flow Control Models
  227. Modern cognitive and ubiquitous computing
  228. Evaluation of struggle strategy in Genetic Algorithms for ground stations scheduling problem
  229. Special issue on intelligent and innovative information systems
  230. Differentiating the Starting Time of Processes in Energy-Efficient Redundant Execution Algorithm
  231. Effects of Selection Operators for Mesh Router Placement in Wireless Mesh Networks Considering Weibull Distribution of Mesh Clients
  232. Energy-Efficient Dynamic Clusters of Servers
  233. Group Communication Protocols Based on Hybrid Types of Logical and Physical Clocks
  234. Investigating the Effect of HELLO Validity Time of OLSR in a MANET Testbed
  235. MNSA 2013: Message from the Workshop Co-chairs
  236. Energy-Efficient Server Clusters to Perform Communication Type Application Processes
  237. Energy-Efficient Redundant Execution of Processes in a Fault-Tolerant Cluster of Servers
  238. A Simulated Annealing Algorithm for Ground Station Scheduling Problem
  239. Coordination in Android Mobile Teams
  240. Dynamic Clusters of Servers for Reducing Electric Power in P2P Overlay Networks
  241. Experimentation of Group Communication Protocols
  242. Power consumption and processing models of servers in computation and storage based applications
  243. Redundant Execution Algorithm for Reducing Total Power Consumption of Server Clusters by Differentiating the Starting Time of Processes
  244. Special Issue on “Advances in mobile, ubiquitous and cognitive computing”
  245. NBiS 2013: Welcome Message from the Steering Committee Co-chairs
  246. ADPNA 2013: Welcome Message from the Workshop Organizers
  247. A Scalable Group Communication Protocol on P2P Overlay Networks
  248. Dynamic Clusters of Servers to Reduce Total Power Consumption
  249. Effect of AODV HELLO Packets for Different Mobility Degrees
  250. Message from ECDS 2013 International Workshop Organizers
  251. Performance Analysis of Wireless Sensor Networks for Different Speeds of Sink and Sensor Nodes
  252. Performance Comparison of OLSR with ETX_Float and ETX_ff in a MANET Testbed
  253. Performance Evaluation of OLSR Protocol in a Grid Manhattan VANET Scenario for Different Applications
  254. Performance Evaluation of WMN-GA System for Node Placement in WMNs Considering Exponential and Weibull Distribution of Mesh Clients and Different Selection and Mutation Operators
  255. Reduction of Processing Overhead to Synchronize Multmedia Replicas
  256. The Evaluation of the Improved Redundant Power Consumption Laxity-Based (IRPCLB) Algorithm in Homogeneous and Heterogeneous Clusters
  257. Using STK Toolkit for Evaluating a GA Base Algorithm for Ground Station Scheduling
  258. Mobile Peer-to-Peer data dissemination in wireless ad-hoc networks
  259. A Dynamic Energy-Aware Server Selection Algorithm
  260. A Fuzzy-Based Simulation System for Controlling Sensor Speed in Wireless Sensor Networks
  261. A Fuzzy-Based Trustworthiness System for P2P Communications in JXTA-Overlay Considering Positive and Negative Effects
  262. An Efficient Hybrid Medium Access Control Technique for Digital Ecosystems
  263. An Energy-Efficient Redundant Execution Algorithm by Terminating Meaningless Redundant Processes
  264. An Extended Multimedia Quorum-based Synchronization Protocol
  265. Group Communication Protocols for Scalable Groups of Peers
  266. Investigation of AODV Throughput Considering RREQ, RREP and RERR Packets
  267. Investigation of OLSR Behavior for Different Hello Packets Intervals in a MANET Testbed
  268. Message from IEEE AINA 2013 Steering Committee Co-Chairs
  269. Message from IEEE AINA 2013 Steering Committee Co-Chairs
  270. Node Placement in WMNs: Performance Evaluation of WMN-GA System for Weibull and Exponential Distribution of Mesh Clients
  271. Performance Comparison of Wireless Sensor Networks for Different Speeds of Multi Mobile Sensor Nodes
  272. Performance Evaluation of OLSR and AODV Protocols in a VANET Crossroad Scenario
  273. Performance Evaluation of WMN-GA System for Node Placement in WMNs Considering Normal Distribution of Mesh Clients and Different Selection and Mutation Operators
  274. Steady State Genetic Algorithm for Ground Station Scheduling Problem
  275. An Integrated Power Consumption Model for Distributed Systems
  276. Quorum-based synchronization protocols for multimedia replicas
  277. Energy-efficient Passive Replication of a Process in Mobile Environment
  278. Macro Level Models of Power Consumption for Servers in Distributed Systems
  279. The Evaluation of the Transmission Power Consumption Laxity-Based (TPCLB) Algorithm
  280. Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS system part-I)
  281. DOA-Trusted Cloud 2013 PC Co-Chairs Message
  282. Investigation of TCP and UDP multiple-flow traffic in wireless mobile ad-hoc networks
  283. A Redundant Power Consumption Laxity-Based (RPCLB) Algorithm for Computation Type Applications
  284. Communication Protocols in Layered Groups with Heterogeneous Clocks
  285. Concept of the Support System for Operation and Management of DACS System
  286. Data Replication in P2P Collaborative Systems
  287. Design Pattern Usage in Grid Computing
  288. Evaluation of the Algorithms for Selecting an Energy-efficient Storage Server in Storage and Computation Oriented Applications
  289. Impact of Population Size and Number of Generations on the Performance of Dense WMNs
  290. Message from MNSA 2012 International Symposium Co-chairs
  291. Multimedia Quorum-based Synchronization Protocols
  292. Performance Evaluation of WSNs for MAC and Routing Protocols Considering Depletion and Routing Efficiency Metrics
  293. Performance of OLSR and DSDV Protocols in a VANET Scenario: Evaluation Using CAVENET and NS3
  294. Setting Up Static Components for Investigating MANET Performance: A Simulation Case
  295. Transmission Power Consumption Laxity-Based (TPCL) Algorithm for Communication Type Applications
  296. Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments
  297. Using Data Replication for Improving QoS in MANETs
  298. The evaluation of the extended transmission power consumption (ETPC) model to perform communication type processes
  299. A Fuzzy-Based Simulation System for Controlling Sensor Speed in Wireless Sensor Networks
  300. A Struggle Genetic Algorithm for Ground Stations Scheduling Problem
  301. An Implementation of Visualization System for Visualizing Network Topology and Packet Flow in Mobile Ad Hoc Networks
  302. An Interface for Simulating Node Placement in Wireless Mesh Networks
  303. Design and Evaluation of Multimedia Quorum-Based Synchronization Protocols
  304. Evaluation of an Energy-Aware Selection Algorithm for Computation and Storage-Based Applications
  305. Ordered Delivery of Messages in Group Communication Protocols
  306. Performance Evaluation of AODV Protocol for Single and Multiple Traffic in MANETs Considering Packet Delivery Fraction Parameter
  307. Performance Evaluation of DYMO Protocol in Different VANET Scenarios
  308. Performance Evaluation of WSNs Considering MAC and Routing Protocols Using Goodput and Delay Metrics
  309. Simulation Performance of a MANET Using Static Source and Destination Considering AODV Routing Protocol
  310. TCP Congestion Control in MANETs for Multiple Traffic Considering Proactive and Reactive Routing Protocols
  311. The Extended Transmission Power Consumption Model for Communication-Based Applications
  312. Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS System Part-I)
  313. Trustworthiness of Peers in P2P Overlay Networks
  314. Trustworthy Group Formation Algorithm Based on Decentralized Trust Management in Distributed Systems
  315. Visualization of Evolutionary Computation Process for Node Placement in WMNs Considering Weibull and Exponential Distribution of Mesh Clients
  316. ADPNA 2012 Welcome Message
  317. Welcome Message from NBiS Steering Committee Co-Chairs
  318. A Fuzzy-Based Cluster-Head Selection System for WSNs: A Comparison Study for Static and Mobile Sensors
  319. Congestion Control for Multi-flow Traffic in Wireless Mobile Ad-Hoc Networks
  320. Energy-Aware Distributed Systems for Computation and Storage-Based Applications
  321. Energy-Efficient Server Selection Algorithm Based on the Extended Simple Power Consumption Model
  322. Experimental Evaluation of a Waste Management Robot System
  323. Message from the ECDS 2012 International Workshop Co-Chairs
  324. Mission Operations Scheduling: Complexity and Resolution Methods
  325. Multimedia Transmissions over a MANET Testbed: Problems and Issues
  326. Performance Analysis of DSR and DYMO Routing Protocols for VANETs
  327. Performance Evaluation of WMN-GA Simulation System for Different Settings of Genetic Operators Considering Giant Component and Number of Covered Users
  328. Performance Evaluation of WMN-GA System for Dense Networks Considering Different Distributions
  329. Performance Evaluation of WMN-GA System for Low Densities of Clients and Different Settings of Population Size
  330. Performance Evaluation of WSNs for Different MAC Protocols Considering TwoRayGround Radio Model and AODV Routing Protocol
  331. Performance Investigation of a MANET Testbed in Outdoor Stairs Environment for Different Scenarios
  332. Quorums for Replication of Multimedia Objects in P2P Overlay Networks
  333. Trustworthiness-based Group Communication Protocols
  334. Tuning of Operators in Memetic Algorithms for Independent Batch Scheduling in Computational Grids
  335. Concept of Policy-Based Wide Area Network Management System
  336. A multi‐layered model for scalable group communication with hybrid clocks
  337. Algorithms for Selecting Energy-Efficient Storage Servers in Storage and Computation Oriented Applications
  338. An Extended Power Consumption Model for Distributed Applications
  339. Completable Quorums of Multimedia Objects
  340. Conflict Intersection as Diagnostic Model
  341. Effect of Population Size for Node Placement in WMNs Considering Giant Component and Number of Covered Users Parameters
  342. Evaluation of Genetic Algorithms for Single Ground Station Scheduling Problem
  343. Impact of Multi-flow Traffic in Wireless Mobile Ad-hoc Networks
  344. Initialization of Masses by the Okm for the Belief Function Theory: Application to System Biology
  345. Message from AINA 2012 Steering Committee Co-Chairs
  346. Message from IEEE AINA-2012 Steering Committee Co-Chairs
  347. WMN–GA: a simulation system for WMNs and its evaluation considering selection operators
  348. Evaluation of multimedia quorum-based synchronization protocols
  349. Hybrid algorithms for independent batch scheduling in grids
  350. Quorums-based Replication of Multimedia Objects in Distributed Systems
  351. Energy-Efficient Server Selection Algorithms for Distributed Applications
  352. A Comparison Study for Different Settings of Crossover and Mutation Rates Using WMN-GA Simulation System
  353. Energy Efficient Distributed Systems for Storage-Based Applications
  354. Trustworthiness-Based Broadcast Protocols in Peer-to-Peer Overlay Networks
  355. A Tabu Search Algorithm for Efficient Node Placement in Wireless Mesh Networks
  356. An Event-based Approach to Supporting Team Coordination and Decision Making in Disaster Management Scenarios
  357. Energy Efficient Distributed Systems for Storage Servers
  358. Enriching and Impoverishing Types of Write Operations in the Multimedia Quorum-based (MQB) Protocol
  359. Evaluation of the Improved EPCLB Algorithm for Distributed Applications
  360. On Exploitation vs Exploration of Solution Space for Grid Scheduling
  361. R-MAC: A MAC Protocol for Power Reduction in Wireless Sensor Networks Based on Load Estimation and Its Performance Evaluation
  362. Trustworthy Group Based Agreement Protocol in Scalable Distributed Networks
  363. Welcome Message from the MNSA 2011 Chairs
  364. A Quorum-Based Synchronization Protocol
  365. Effects of Mutation and Crossover in Genetic Algorithms for Node Placement in WMNs Considering Giant Component Parameter
  366. Energy Efficient Distributed Systems for Storage-Based Applications
  367. Evaluation of Hybridization of GA and TS Algorithms for Independent Batch Scheduling in Computational Grids
  368. Improving of EPCLB Algorithm for Reducing the Overhead of a Load Balancer
  369. Multi-hop Wireless Networks Performance Evaluation via NS-3 Simulator
  370. A Multi-layered Communication Model with Hybrid Clocks in P2P Overlay Networks
  371. A Power Consumption Model of a Storage Server
  372. AN APPLICATION-ORIENTED POWER CONSUMPTION MODEL OF STORAGE SERVERS
  373. Application of GA and Multi-objective Optimization for QoS Routing in Ad-Hoc Networks
  374. EVALUATION OF WMN-GA FOR DIFFERENT MUTATION AND CROSSOVER RATES CONSIDERING GIANT COMPONENT PARAMETER
  375. Message from the NBiS 2011 Steering Committee Co-chairs
  376. ADPNA 2011 Message from the International Workshop Organizers
  377. Optimization Problems and Resolution Methods for Node Placement in Wireless Mesh Networks
  378. Performance Evaluation of WMN Using WMN-GA System for Different Mutation Operators
  379. Performance Evaluation of Wireless Mobile Ad-Hoc Network via NS-3 Simulator
  380. Quorum-Based Replication of Multimedia Objects in Distributed Systems
  381. The Computation and Transmission Rate Based (CTRB) Algorithm for Distributed Applications
  382. Trustworthiness-Based Group Making Approach in Scalable P2P Group
  383. Virtual Common Gateway Interface Program on the Network Using the Destination Addressing Control System Scheme
  384. Special issue on emerging trends in cyber-physical systems
  385. Design and Implementation of Hybrid Time (HT) Group Communication Protocol for Homogeneous Broadcast Groups
  386. A GA-based System for WMN and its Performance Evaluation for Different Scenarios
  387. A Power Consumption Model for Storage-based Applications
  388. A Scalable Communication Protocol for Multi-layered Groups
  389. A Study on the Effect of Mutation in Genetic Algorithms for Mesh Router Placement Problem in Wireless Mesh Networks
  390. An Algorithm for Reducing the Total Power Consumption Based on the Computation and Transmission Rates
  391. ECDS-2011 Message from Workshop Co-Chairs
  392. Process Allocation Algorithms for Saving Power Consumption in Peer-to-Peer Systems
  393. Purpose-Based Information Flow Control for Cyber Engineering
  394. Quorum-based Synchronization Protocol of Object Replicas in Scalable Distributed Systems
  395. Trustworthiness-based Approach to Reliably Make Agreement among Peers in Scalable P2P Group
  396. Wireless Ad-hoc Networks Performance Evaluation Using NS-2 and NS-3 Network Simulators
  397. Performance Evaluation of Wireless Sensor Networks for Mobile Sensor Nodes Considering Goodput and Depletion Metrics
  398. Danger warning via fuzzy inference in an RFID-deployed environment
  399. A Multi-layered Model for Scalable Group Communication in P2P Overlay Networks
  400. A Study on the Performance of Search Methods for Mesh Router Nodes Placement Problem
  401. Adaptive and Efficient Data Dissemination in Mobile P2P Environments
  402. An Integrated Power Consumption Model for Communication and Transaction Based Applications
  403. Experimental Results of a MANET Testbed in Indoor Stairs Environment
  404. Message from AINA Steering Committee Co-Chairs
  405. Message from the Symposium Co-chairs
  406. Objective Trustworthiness of Acquaintances in Peer-to-Peer (P2P) Overlay Networks
  407. Trustworthiness-Based Broadcast Algorithm in Scalable P2P Group
  408. A study on the performance of local search versus population-based methods for mesh router nodes placement problem
  409. An extended power consumption-based algorithm for communication-based applications
  410. A marketable quality and profitability model for corporations considering sellers and buyers market
  411. A multimedia quorum-based (MQB) protocol in P2P overlay networks
  412. Application of Genetic Algorithms for QoS routing in mobile ad-hoc networks: approaches and solutions
  413. Design and evaluation of algorithms for obtaining objective trustworthiness on acquaintances in P2P overlay networks
  414. Fault-tolerant flocking for a group of autonomous mobile robots
  415. Performance evaluation for different settings of crossover and mutation rates considering number of covered users
  416. Special issue on the information networking and services
  417. TMPR-scheme for reliably broadcast messages among peer processes
  418. Trustworthy Group Making Algorithm in Distributed Systems
  419. Trustworthy acquaintances in Peer-to-Peer (P2P) overlay networks
  420. Abnormal behavior detection with fuzzy clustering for elderly care
  421. A scalable group communication protocol with hybrid clocks
  422. A Scalable Hybrid Time Protocol for a Heterogeneous Group
  423. Analysis of MANET Routing Protocols for Indoor Environment
  424. Application of Genetic Algorithms for QoS Routing in Mobile Ad Hoc Networks: A Survey
  425. Energy-Efficient Server Selection Algorithms for Network Applications
  426. Performance Evaluation and Comparison of Fuzzy-Based Intelligent CAC Systems for Wireless Cellular Networks
  427. Reliable Message Broadcast Schemes in Distributed Agreement Protocols
  428. Tuning Operators of Genetic Algorithms for Mesh Routers Placement Problem in Wireless Mesh Networks
  429. Two Types of Trustworthiness of Acquaintances in Peer-to-Peer (P2P) Overlay Networks
  430. A Comparison Study between Simulation and Experimental Results for MANETs
  431. A Survey on Clustering Algorithms for Wireless Sensor Networks
  432. Confidence and Trustworthiness in Peer-to-Peer Overlay Networks
  433. Hybrid Clock-Based Synchronization in a Scalable Heterogeneous Group
  434. Message from the NBiS 2010 Steering Committee Co-Chairs
  435. Power Consumption-Based Server Selection Algorithms for Communication-Based Systems
  436. TBB-Scheme for Reliably Broadcast Messages among Peer Processes
  437. Performance analysis of multi-hop ad-hoc network using multi-flow traffic for indoor scenarios
  438. Special issue on emerging trends in ubiquitous computing systems
  439. Ubiquitous QoS communications using scalable satellite networking
  440. A Model for Reducing Power Consumption in Peer-to-Peer Systems
  441. Energy-Efficient Agreement Protocols in P2P Overlay Networks
  442. Message from MNSA 2010 Workshop Organizers
  443. An MPR-based Solution for Flooding Broadcast Messages in Distributed Agreement Protocols
  444. Laxity Based Algorithm for Reducing Power Consumption in Distributed Systems
  445. Reduction of Messages Unnecessarily Ordered in Scalable Group Communication
  446. Trustworthiness of Acquaintances in Peer-to-Peer(P2P) Overlay Networks
  447. Welcome Message from ARES 2010 Chairs
  448. A Hybrid Technique for Efficient Medium Access Control in Wireless Sensor Networks
  449. A Scalable Peer-to-Peer Group Communication Protocol
  450. A tradeoff analysis of delayed reconstruction for storage clusters
  451. A two-layered model for scalable, heterogeneous group communications
  452. Algorithms for Reducing the Total Power Consumption in Data Communication-Based Applications
  453. DACS System's Implementation Method to Realize the Next Generation Policy-Based Network Management Scheme
  454. Design and implementation of transactional agent
  455. Leveraging end-host parallelism to achieve scalable communication bandwidth utilization
  456. Mobility Effects of Wireless Multi-hop Networks in Indoor Scenarios
  457. Performance Evaluation of an Optimized Load Allocation Approach for Web Server Clusters
  458. Subjective and Objective Types of Trustworthiness in Peer-to-Peer(P2P) Overlay Networks
  459. Terabit/s-scalable end-to-end parallel networking architecture (TLAN) based on virtual optical resource control
  460. Trustworthiness among Peer Processes in Distributed Agreement Protocol
  461. A broadcast type Hierarchical Group communication protocol
  462. A pure P2P synchronous collaborative system
  463. A transactional agent model for distributed object systems
  464. A legal information flow (LIF) scheduler based on role-based access control model
  465. Distributed Cluster Architecture for Increasing Energy Efficiency in Cluster Systems
  466. Message from the ADPNA-2009 Chairs
  467. Message from the General Chairs
  468. Reliable and Efficient Agreement Protocol in Fully Distributed Systems
  469. Consistency Based Approach for Agreement Achievement among Peers
  470. Energy-Efficient Computation Models for Distributed Systems
  471. Evaluation of Purpose Mark Releasing Protocol for Purpose-based Marking (PM) Protocol
  472. Minimizing Power Consumption with Performance Efficiency Constraint in Web Server Clusters
  473. Self-stabilized Flocking of a Group of Mobile Robots under Memory Corruption
  474. Achieving large bandwidth by leveraging parallelism in end-hosts and networks
  475. Efficiently Making Agreement among Peer Processes by Using Recoverable Cuts
  476. Evaluation of a Purpose-Based Marking (PM) Protocol for Secure Distributed Systems
  477. Models for P2P Multi-Source Streaming
  478. A flexible group communication protocol with hybrid clocks
  479. A Protocol for Releasing Purpose Marks to Prevent Illegal Information Flow
  480. A protocol for reliably, flexibly, and efficiently making agreement among peers
  481. A purpose-based synchronisation protocol of multiple transactions in multi-agent systems
  482. Design of the notification system for failure detectors
  483. Energy-Efficient Process Allocation Algorithms in Peer-to-Peer Systems
  484. Fault-Tolerant Flocking of Mobile Robots with Whole Formation Rotation
  485. Heterogeneous clock group protocol for causally ordered delivery of messages
  486. Laxity-based process allocation algorithms to reduce power consumptions in peer-to-peer overlay networks
  487. Message from General Co-chairs
  488. Serial and Parallel Transmission Models for Multi-source Streaming of Multimedia Objects
  489. Transactional agents on distributed object systems
  490. Trustworthiness of acquaintances in Peer-to-Peer overlay networks
  491. A Backward Algorithm in a Distributed Agreement Computing
  492. A PROTOCOL FOR MAKING AN AGREEMENT IN A PEER-TO-PEER (P2P) SOCIETY
  493. A Purpose-Based Synchronization Protocol of Multiple Transactions
  494. The Rails Toolkit – Enabling End-System Topology-Aware High End Computing
  495. A Backward Strategy in a Peer-to-Peer Agreement Protocol
  496. A Redundant Data Transmission Protocol for a Wireless Sensor Network
  497. A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks
  498. A Protocol for Making an Agreement in a Peer-to-Peer (P2P) Society
  499. Role Based Access Control in Distributed Object Systems
  500. A data transmission protocol for reliable and energy-efficient data transmission in a wireless sensor-actuator network
  501. A BAT in the Lab: Experimental Results of New Link State Routing Protocol
  502. A computing model for improving marketable quality and profitability of corporations
  503. A Computing Model for Marketable Quality and Profitability of Corporations: A Case Study Evaluation Using a New Sources Data
  504. A Computing Model for Marketable Quality and Profitability of Corporations: Model Evaluation Based on Two Different Sources Data
  505. A Distributed Coordination Protocol for Multiple Peer Processes
  506. A distributed coordination protocol in an order-heterogeneous group
  507. A Fault-Tolerant Model of Wireless Sensor-Actuator Network
  508. A Model for Dynamic Integration of Ontologies in P2P/DAKS Coalitions
  509. A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks
  510. Actuator-Device Coordination in a Reliable Sensor, Actuator, and Device Network (SADN)
  511. An Intelligent Handoff System for Wireless Cellular Networks Using Fuzzy Logic and Random Walk Model
  512. Application Level QoS in Multimedia Peer-to-Peer (P2P) Networks
  513. Checkpointing in a Distributed Coordination Protocol for Multiple Peer Processes
  514. Coordination Protocols for a Reliable Sensor, Actuator, and Device Network (SADN)
  515. Design and Evaluation of Reliable Data Transmission Protocol in Wireless Sensor Networks
  516. Design and Implementation of a JXTA-Overlay P2P System and Smart Box Environment
  517. Distributed Databases in Dynamic R-Tree for Vehicle Information Systems
  518. Evaluation of the Reliable Data Transmission Protocol in Wireless Sensor-Actuator Networks
  519. Implementation and Design of New Functions for a Web-Based E-learning System to Stimulate Learners Motivation
  520. Making an Agreement in an Order-Heterogeneous Group
  521. Making Societies in Peer-to-Peer (P2P) Overlay Networks
  522. Message from the Steering Chair
  523. Message from CISIS 2008 Organizers
  524. Preventing Illegal Information Flow Based on Role-Based Access Control Model
  525. Role-Based Access Control in Peer-to-Peer (P2P) Societies
  526. Synchronization of Transactions to Prevent Illegal Information Flow in a Role-Based Access Control Model
  527. Synchronous transmission protocol for exchanging real-time and non-real-time multimedia data in group communications
  528. Techniques for Efficient Resource Management for Context-Sensitive Mobile Applications
  529. Trustworthiness and Confidence of Peers in Peer-to-Peer (P2P) Network
  530. ECDS 2008-Welcome Message from the Organizers
  531. A computing model for enhancing service quality and increasing profitability of corporations: model evaluation based on two different sources data
  532. Transfer Scheduling Schemes for Data-Intensive, Interactive Applications
  533. An Approach to Dynamic Ontology Integration for P2P/DAKS Coalitions
  534. An Enhanced Marketable Quality and Profitability Model for Network Service Pricing: Some Numerical Analysis
  535. Cooperation of Trustworthy Peers in P2P Overlay Networks
  536. Design and Evaluation of a Legal Information Flow (LIF) Scheduler in a Role-based Access Control Model
  537. Making an Agreement in an Order-Heterogeneous Group by using a Distributed Coordination Protocol
  538. Ranking factors in peer-to-peer overlay networks
  539. Three Dimensional Broadcast Protocol forWireless Networks
  540. Trustworthiness of Acquaintance peers on Access Control Models
  541. An enhanced network service pricing model considering network externalities
  542. A Distributed Coordination Protocol for a Heterogeneous Group of Peer Processes
  543. Efficient Data Transmission in a Lossy and Resource Limited Wireless Sensor-Actuator Network
  544. Fault Detection and Recovery in a Transactional Agent Model
  545. Message from the Steering Chair
  546. Role-based Concurrency Control in a Subject- and Purpose-Oriented (SPO) View
  547. Towards Terabit/s Systems: Performance Evaluation of Multi-Rail Systems
  548. A Marketable Quality and Profit-ability Model Considering Service Providers and Consumers Relation
  549. A Distributed Coordination Algorithm for a Heterogeneous Group of Peers
  550. A Superpeer-Based Two-Layer P2P Overlay Network with the CBF Strategy
  551. An Efficient Data Transmission Protocol in a Wireless Sensor-Actuator Network
  552. An Inter-peer Trustworthiness Based on Access Control in Peer-to-Peer Overlay Networks
  553. Distributed multi-source streaming models in peer-to-peer overlay networks
  554. Leasing Variants in Distributed Systems
  555. Guest Editorial
  556. A mobile agent model for fault-tolerant manipulation on distributed objects
  557. A TTF-Based Programming Model and a Support Kernel Running on a Communicating Sensor Platform
  558. Concurrency Control Based on Subject and Purpose Concepts
  559. A Legal Information flow (LIF) scheduler for distributed systems
  560. Concurrency Control using Subject- and Purpose-Oriented (SPO) View
  561. Confidence-based Trustworthiness of Acquaintance Peers in Peer-to-Peer Overlay Networks
  562. Coordination Protocols of Multiple Actuator Nodes in a Multi-Actuator/Multi-Sensor Model
  563. Evaluation of Reliable Data Transmission Protocol in Wireless Sensor-Actuator Network
  564. Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model
  565. Message from the ECDS Co-chairs
  566. Message from the ICPP 2007 Workshop Chairs
  567. Message from the Organizing Committee
  568. Performance Analysis of the Interrogation-based Failure Detector
  569. Performance Analysis of the Superpeer-based Two-layer P2P Overlay Network with the CBF Strategy
  570. Scalable multimedia streaming model in heterogeneous networks
  571. Message from Workshop Chairs
  572. Turning point from economies of scale to quality enhancement: a marketable quality and profitability model for corporations
  573. Zone-based congestion detection and control using routing method on the internet
  574. Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks
  575. HAMS: Scalable peer-to-peer multimedia streaming model in heterogeneous networks
  576. The Enhancement on Communication Stability in MANETs with Unit Disk Graph Model
  577. A fault-tolerant model for wireless sensor-actor system
  578. A fault-tolerant transactional agent model on distributed object systems
  579. A macro-level distributed method for the efficient allocation of zones in the Internet
  580. A Marketable Quality and Profitability Model for Network Service Pricing
  581. A marketable quality and profitability model: a case study for Japanese corporations
  582. Concurrency Control in Multi-Role Association
  583. Design of a notification system for the /spl phi/ accrual failure detector
  584. Distributed coordination for scalable multi-source multimedia streaming model
  585. Distributed Coordination for Scalable Multimedia Streaming Model
  586. Distributed Multimedia Streaming Systems in Peer-to-Peer Overlay Networks
  587. Evaluation of a marketable quality and profitability model considering general distribution
  588. HAMS: heterogeneous asynchronous multi-source streaming protocol to realize scalable multimedia communications
  589. Message from the Steering Committee Chair
  590. Message from the Workshop Co-chairs
  591. P2P/DAKS 2006 Foreword
  592. Performance Evaluation of the . Accrual Failure Detector
  593. Role-based concurrency control for distributed systems
  594. Satisfiability and trustworthiness of peers in peer-to-peer overlay networks
  595. Service oriented trustworthiness of acquaintances in peer-to-peer overlay networks
  596. Towards a Scalable Heterogeneous P2P Data and Knowledge Sharing Facility
  597. Trustworthiness of Peers Based on Access Control in Peer-to-Peer Overlay Networks
  598. Causally ordered delivery in a hierarchical group of peer processes
  599. Towards a smart world and ubiquitous intelligence: A walkthrough from smart things to smart hyperspaces and UbicKids
  600. High-speed group communication protocol for exchanging real-time multimedia data
  601. Message from the AINA Chairs
  602. Message from the DPNA-2005 Chairs
  603. Message from the General Co-Chairs
  604. Transactional agent model for fault-tolerant object systems
  605. Quorum-Based Multi-Invocation Model for Replicated Objects
  606. Database and Expert Systems Applications
  607. Mobile agent model for transaction processing on distributed objects
  608. Causally ordered delivery of multimedia objects
  609. Quality-based synchronization methods of multimedia objects
  610. A Strategy for MLS Workflow
  611. Δ-Causality and ε-delivery for wide-area group communications
  612. Consistent Lamport Clocks for Asynchronous Groups with Process Crashes
  613. Pseudo-active replication of distributed objects in wide-area networks
  614. Quorum-based locking protocol for replicated objects
  615. Purpose-oriented access control model in object-based systems
  616. Access program to minimize redundant refutations on the network database system
  617. Concurrent execution of Prolog transaction
  618. Logic interface system on navigational database systems
  619. Concurrency Control Using Role Ordering (RO) Scheduler
  620. A Scalable Group Communication Protocol with Global Clock
  621. Design of a Hierarchical Group to Realize a Scalable Group
  622. A High-Performance Multimedia Streaming Model on Multi-Source Streaming Approach in Peer-to-Peer Networks
  623. Charge-Based Flooding Algorithm for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks
  624. Distributed Coordination Protocols to Realize Scalable Multimedia Streaming in Peer-to-Peer Overlay Networks
  625. Trustworthiness in Peer-to-Peer Overlay Networks
  626. A Scalable Multimedia Streaming Model Based-on Multi-source Streaming Concept
  627. A Walkthrough from Smart Spaces to Smart Hyperspaces towards a Smart World with Ubiquitous Intelligence
  628. Acquaintance-based Protocol for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks
  629. Acquaintance-Based Protocol for Manipulating Multimedia Objects in Peer-to-Peer Overlay Networks
  630. Asynchronous Multi-source Streaming Protocol to Realize High-Performance Multimedia Communication
  631. Byzantine Agreement Protocol using Hierarchical Groups
  632. Causally Ordered Delivery with Global Clock in Hierarchical Group
  633. Charge-based Flooding Algorithm for Looking Up Multimedia Objects in Peer-to-Peer Overlay Networks
  634. Concurrency Control Based-on Significancy on Roles
  635. Concurrency Control on Distributed Objects using Role Ordering (RO) Scheduler
  636. Design and Implementation of Fault-Tolerant Transactional Agents for Manipulating Distributed Objects
  637. Design and Implementation of Transactional Agents for Manipulating Distributed Objects
  638. Group Communication Protocol for Autonomic Computing
  639. Hierarchical Protocol for Byzantine Agreement in a Peer-to-Peer Overlay Network
  640. Information Propagation on the φ Failure Detector
  641. Lattice-Based Precedence of Moderate Lock Modes on Objects
  642. Role Ordering (RO) Scheduler for Concurrency Control
  643. Scalable Peer-to-Peer Multimedia Streaming Model in Heterogeneous Networks
  644. Synchronous Transmission of Real-Time Multimedia Data in Group Communication
  645. Transactional Agent on Distributed Objects
  646. A group communication protocol for scalable causal ordering
  647. An autonomic group communication
  648. Causally ordered delivery for a hierarchical group
  649. Concurrency control protocol on distributed multimedia objects
  650. Distributed replication and caching: a mechanism for architecting responsive web services
  651. Hybrid concurrency control protocol for multimedia objects
  652. MaCC: supporting network formation and routing in wireless personal area networks
  653. Message from the Steering Committee Chair
  654. Mobile agent model for transaction processing on distributed objects
  655. QoS-based synchronous/asynchronous data transmission model in group communication
  656. Role ordering scheduler for concurrency control in distributed objects
  657. Agent-based transactions on distributed object servers
  658. Causality in a hierarchical group
  659. Causality in hierarchical group communication
  660. Communication protocol for a hierarchical group
  661. Design and implementation of transactional agents
  662. Fault-tolerant mobile agents in distributed objects systems
  663. Flexibility if group communication service
  664. Flexible group communication protocol
  665. Flexible group communication protocol for distributed applications
  666. Flexible group communication protocol for distributed systems
  667. Flexible group protocol for distributed systems
  668. Fully distributed communication protocol for exchanging real-time multimedia data in a group
  669. Group communication in distributed multimedia objects
  670. Hierarchical protocol for broadcast-type group communication
  671. Nested invocation protocol for object-based systems
  672. QoS-based ordered delivery for multimedia objects in a group
  673. Transactional aid to workflow distribution to support e-commerce
  674. Mobile agent model for distributed object systems
  675. Mobile agent model for distributed systems
  676. Protocol for large-scale group
  677. Protocol for synchronizing multimedia objects exchanged in a group of processes
  678. QoS control in group communication
  679. Timed information flow among objects based on role concept
  680. Two-layered protocol for a large-scale group of processes
  681. A secure transaction environment for workflows in distributed systems
  682. Authorization model based on object-oriented concept
  683. Causality of messages in object-based systems
  684. Group communication of multimedia objects
  685. Group communication protocol for multimedia applications
  686. Group protocol for inter-object communications
  687. Group protocol for object-based systems
  688. Object-causally ordered group protocol for distributed multimedia systems
  689. QoS-based method for compensating multimedia objects
  690. Quality-based approach to locking multimedia objects
  691. Quorum-based locking protocol for replicas in object-based systems
  692. Quorum-based protocol for locking replicas of objects
  693. Reliable nested invocation of methods in distributed object-based systems
  694. Replica management in object-based systems
  695. Access control model in object-oriented systems
  696. Asynchronous checkpointing protocol for object-based systems
  697. QoS-based recovery of multimedia objects
  698. Quorum-based replication of objects
  699. Checkpoints in distributed object-based systems
  700. Protocol for pseudo-active replication in wide-area network
  701. Quality-based lock modes of multimedia objects
  702. Quorum-based protocol for group communication
  703. A purpose-oriented access control model
  704. A purpose-oriented access control model for object-based systems
  705. ARQ protocols for bi-directional data transmission
  706. Extended recovery protocol in distributed systems
  707. Extending commitment protocol with binary domain to partially ordered domain
  708. Flexible wide-area group communication protocols-international experiments
  709. Group communication protocol in transaction-oriented applications
  710. Group protocol for distributed replicated objects
  711. Object-based locking protocol for replicated objects
  712. Pseudo-active replication of objects in heterogeneous clusters
  713. QoS-based flexibility in distributed systems
  714. Quality-based flexibility in distributed objects
  715. Wide-area group communication protocols-international experiment
  716. Group communication protocols: properties and evaluation
  717. Group communication protocol for large group
  718. Starvation-prevented priority-based total ordering broadcast protocol on high-speed single channel network
  719. Priority-based total and semi-total ordering broadcast protocols
  720. Design of reliable broadcast protocol for selectively partially ordering PDUs
  721. Interoperability of distributed information system