Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks --Yang Xiang, Wanlei Zhou, et al. An effective state-based predictive approach for leakage energy management on embedded systems --Minyi Guo, Linfeng Pan, et al. A scalable key pre-distribution mechanism for large-scale wireless sensor networks --An-Ni Shen, Song Guo, et al. Designing energy efficient target tracking protocol with quality monitoring in wireless sensor networks --Minyi Guo, Elizabeth Olule, et al. Balanced bipartite graph based register allocation for network processors in mobile and wireless networks --Feilong Tang, Ilsun You, et al. Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks. --Sancheng Peng, Weijia Jia, et al. Tier-Based Scalable and Secure Routing for Wireless Sensor Networks with Mobile Sinks. --Feilong Tang, Minyi Guo, et al. A Secure and Scalable Rekeying Mechanism for Hierarchical Wireless Sensor Networks. --Song Guo, An-Ni Shen, et al. Context reasoning using extended evidence theory in pervasive computing environments --Daqiang Zhang, Minyi Guo, et al. Dynamic scratch-pad memory management with data pipelining for embedded systems --Yanqin Yang, Meng Wang, et al.