A. Mahanti, N. Carlsson, C. Williamson, and M. , Arlitt A Zone Assignment Algorithm for Fractional Frequency Reuse in Mobile WiMAX Networks, p.174

M. Einhaus, A. Mäder, and X. , Addressing and Routing Handling Transient Link Failures Using Alternate Next Hop Counters, p.186

R. Suksant-sae-lor and .. Landa, Redouane Ali, and Miguel Rio Efficient Recovery from False State in Distributed Routing Algorithms, Daniel Gyllstrom

J. Domenech, J. A. Gil, J. Sahuquillo, A. Infrastructures, and .. , Pont Table of Contents XV Dynamic Service Placement in Shared Service Hosting, p.251

Q. Zhang, J. Xiao, E. Gürses, and .. , Martin Karsten, and Raouf Boutaba Evaluating the Impact of a Novel Warning Message Dissemination Scheme for VANETs Using Real City Maps, p.265

I. Chatzidrossos, G. Dán, and .. , and Viktória Fodor End-to-End Throughput with Cooperative Communication in Multi-channel Wireless Networks, p.327

F. Zhou and M. Molnár, Bernard Cousin, and Chunming Qiao Bidirectional Range Extension for TCAM-Based Packet Classification, p.351

K. Casier, M. Tahon, M. A. Bilal, S. Verbrugge, and .. , Didier Colle, Mario Pickavet, and Piet Demeester Intercarrier Compensation between Providers of Different Layers: Advantages of Transmission Initiator Determination, p.373

R. Davoyan, W. Effelsberg, X. , and V. , Table of Contents Application of Secondary Information for Misbehavior Detection, p.385

A. Vulimiri, A. Gupta, P. Roy, S. N. Muthaiah, and A. Arzad, Kherani Path Attestation Scheme to Avert DDoS Flood Attacks, p.397