How much do we gain by introducing route optimization in Proxy Mobile IPv6 networks? Jong-Hyouk LeeTai-Myoung Chung OriginalPaper 29 August 2009 Pages: 233 - 246
EFT: a high throughput routing metric for IEEE 802.11s wireless mesh networks Md. Shariful IslamMuhammad Mahbub AlamSungwon Lee OriginalPaper 25 September 2009 Pages: 247 - 262
Access network survivability: an architecture approach for monitoring, protection and restoration in FTTH application Aswir PremadiBoon Chuan NgKasmiran Jumari OriginalPaper 09 January 2010 Pages: 263 - 269
An EAP-EHash authentication method adapted to resource constrained terminals Omar CheikhrouhouMaryline LaurentMaher Ben Jemaa OriginalPaper 08 November 2009 Pages: 271 - 284
On unequal error protection for LZSS compressed data Richard Demo SouzaMarcelo Eduardo PellenzZaqueu Cabral Pereira OriginalPaper 17 October 2009 Pages: 285 - 292
Performance enhancement of SC-FDMA systems using a companding technique Fathi E. Abd El-SamieFaisal S. Al-kamaliFarid Shawki OriginalPaper 16 January 2010 Pages: 293 - 300
Survey of NLOS identification and error mitigation problems in UWB-based positioning algorithms for dense environments Jasurbek KhodjaevYongwan ParkAamir Saeed Malik OriginalPaper 04 August 2009 Pages: 301 - 311
On the achievable rate region of the Gaussian interference channel: the two- and three-user cases Patrick TortelierAbdoulaye Bagayoko OriginalPaper 29 October 2009 Pages: 313 - 323
On the cooperative MIMO communication for energy-efficient cluster-to-cluster transmission at wireless sensor network Mohammad Rakibul IslamJinsang Kim OriginalPaper 18 December 2009 Pages: 325 - 340