2008
2008
Volume 1, Number 1, 2008 December
-
- Development And Performance Analysis of A BR-DBA Algorithm For Improve Network Performance, Seung-Kun Lee, Jong-Wook Jang, Sung-Jin Jang and Ju-Young Shin (pp. 1-6).
- Design of Interoperable Module between Two Home Network Middlewares, Kwang-Soon Choi, Young-Choong Park, Yang-Keun Ahn, Kwang-Mo Jung, Suk-Il Hong (pp. 7-14).
- Mobile Systems Challenges in Next Generation Networks, Seyed Ali Alavian, Jahangir Dadkhah Chimeh (pp. 15-22).
- A Study on the Performance Analysis of Hybrid Fingerprint Matching Methods, Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung Bum Pan (pp. 23-28).
- Performance Evaluation of Group Mobility in Mobile Ad hoc Networks, Ehtsham Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Azeem Irshad, Muhammad Usman (pp. 29-36).
- Network Anomaly Detection using Fuzzy Gaussian Mixture Models, Dat Tran, Wanli Ma, Dharmendra Sharma (pp. 37-42).
- An Adaptive MAC Scheduling Algorithm for Guaranteed QoS in IEEE 802.11e HCCA, Sung-Ryun Kim, Dong-Yul Lee, Chae-Woo Lee (pp. 43-50).
- Vertical Handover in beyond Third Generation (B3G) Wireless Networks, Enrique Stevens-Navarro, Ulises Pineda-Rico, Jesus Acosta Elias (pp. 51-58).
- A Study on the Optimal Number of Interfaces in Wireless Mesh Network, Chi Moon Oh , Hwa Jong Kim, Goo Yeon Lee, Choong Kyo Jeong (pp. 59-66).
- Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network, Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong Kim (pp. 67-74).
- An Intelligent Middleware Platform and Framework for RFID Reverse Logistics, Jihyun Yoo, Yongjin Park (pp. 75-82).
- A Design and Implementation of U-health Diagnosis System using Expert System and Neural Network, Jang-Jae Lee, Byuong-Ho Song, Tae-Yeun Kim, Dae-Woong Seo, Sang-Hyun Bae (pp. 83-90).
- Clustering-based Feature Selection for Internet Attack Defense, Jungtaek Seo, Jungtae Kim, Jungsub Moon, Boo Jung Kang, Eul Gyu Im (pp. 91-98).
- Vulnerabilities in SCADA and Critical Infrastructure Systems, Rosslin John Robles, Min-kyu Choi, Eun-suk Cho, Seok-soo Kim, Gil-cheol Park, Sang-Soo Yeo (pp. 99-104).
- Apportioning Bandwidth to Clients as per Privileges, Mohammed A. Qadeer, Shahid Habib, Ahmad Yazdan Javaid (pp. 105-119).