Paper 2 Performance Analysis of Packet Bursting scheme in IEEE 802.11e WLANs under Slow Rayleigh Fading with Non Markovian Stochastic Petri Nets, Kamel Barkaoui (Cnam- Paris, Paris, FR) Mohamed Escheikh (ENIT, Ariana, TN)
Paper 3 Privacy Preserving Neighborhood Awareness in Vehicular Ad Hoc Network, Osama Abumansoor (University of Ottawa, Montreal, CA), Azzedine Boukerche (University of Ottawa, , CA)
Paper 4 Robust and Low-Cost Solution for Preventing Sidejacking Attacks in Wireless Networks using a Rolling Code Jeffrey Cashion (University of Central Florida, Oviedo, US) Mostafa Bassiouni (University of Central Florida, Orlando, US)
Paper 5 mCoSS: a multi-Constraints Scheduling Strategy for WiMAX Networks, Ikbal Chammakhi Msadaa (EURECOM, Sophia-Antipolis, FR) Fethi Filali (QU Wireless Innovations Center, Doha, QA) Daniel Camara (EURECOM, Sophia Antipolis, FR)
Paper 6 An O(N)+ε Clustering Method Said Fouchal (University Paris 8, Paris, FR)
Paper 7 Model refinement and data filtering in High-Tunnel greenhouse sensor network Ju Wang (Virginia State University, , US)
Paper 8 Performance Analysis of HIP Diet Exchange for WSN Security Establishment Pin Nie (Aalto University, Espoo, FI) Juho Vähä-Herttua (Aalto University, , FI), Tuomas Aura (Aalto University, , FI) Andrei Gurtov (Helsinki Institute for Information Technology, , FI)
Paper 9 A key management method based on an AVL tree and ECC cryptography for wireless sensor networks, H.Boumerzoug( University of Quebec at Trois-Rivières,Canada), B.Amar Bensaber (University of Quebec at Trois-Rivières,Canada), I.Biskri ( University of Quebec at Trois-Rivières,Canada)

