• 2-Chord Halved

  • Improving semantic routing efficiency

  • Peer-Tree: a peer-to-peer message forwarding structure for relaying messages in mobile applications

  • Modeling and analysis of random walk search algorithms in P2P networks

  • Comet: a scalable coordination space for decentralized distributed environments

  • A packet snif.ng and synchronization technique to boost P2P satellite networks

  • A packet-level traffic model of Starcraft

  • An empirical study of data redundancy for high availability in large overlay networks

  • A methodology for P2P file-sharing traffic detection

  • Introducing secure peergroups in SP2A

  • A reputation-based mechanism for isolating selfish nodes in ad hoc networks

  • Secure reporting of traffic forwarding activity in mobile ad hoc networks

  • Defend against cache consistency attacks in wireless ad hoc networks

  • An ECA-P policy-based framework for managing ubiquitous computing environments

  • Content-based routing in mobile ad hoc networks

  • Multi-constraint dynamic access selection in always best connected networks

  • Extended ZRP: a routing layer based service discovery protocol for mobile ad hoc networks

  • Market models and pricing mechanisms in a multihop wireless hotspot network

  • SWAT: small world-based attacker traceback in ad-hoc networks

  • Correlation analysis for alleviating effects of inserted data in wireless sensor networks

  • Efficient aggregation of encrypted data in wireless sensor networks

  • Practical broadcast authentication in sensor networks

  • PPP migration: a technique for low-latency handoff in CDMA2000 networks

  • A relay based MAC protocol to support multi-rate feature in mobile ad hoc networks

  • MPA assisted optimized proactive handoff scheme

  • An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification

  • Loosely coupling ontological reasoning with an efficient middleware for context-awareness

  • Contextualizing applications via semantic middleware

  • Plethora: a framework for converting generic applications to run in a ubiquitous environment

  • Exploiting co-location history for efficient service selection in ubiquitous computing systems

  • A generalization of the FACE ROUTING algorithm to a class of non-planar networks

  • Routing in MANETs with address conflicts

  • Transparent heterogeneous mobile ad hoc networks

  • SRDP: securing route discovery in DSR

  • On incremental processing of continual range queries for location-aware services and applications

  • Decentralizing query processing in sensor networks

  • Energy efficient processing of K nearest neighbor queries in location-aware sensor networks

  • A location aware mobile tourist guide selecting and interpreting sights and services by context matching

  • Decentralized optimization of dynamic Bluetooth scatternets

  • Improving connectivity of wireless ad hoc networks

  • Efficient continuous mapping in sensor networks using isolines

  • A peer-to-peer architecture for context lookup

  • Community-based asynchronous wakeup protocol for wireless peer-to-peer file sharing networks

  • Multivariate analysis for probabilistic WLAN location determination systems

  • Proxy-based hand-off of Web sessions for user mobility

  • WebProfiles: a negotiation model for user awareness in personal area networks

  • A SIP-based architecture model for contextual coalition access control for ubiquitous computing

  • A cooperative learning framework for mobility-aware resource management in multi-inhabitant smart homes

  • Multi-path admission control for mobile ad hoc networks

  • Personal AP protocol for mobility management in IEEE 802.11 systems