


default search action
Computer Networks, Volume 51
Volume 51, Number 1, January 2007
- Francesc Sebé

, Josep Domingo-Ferrer:
Scalability and security in biased many-to-one communication. 1-13 - Davide Careglio

, Josep Solé-Pareta
, Salvatore Spadaro
:
Service category-to-wavelength selection technique for QoS support in connection-oriented optical packet switching. 14-30 - Ka Ki To, Jack Y. B. Lee:

Parallel overlays for high data-rate multicast data transfer. 31-42 - Junfeng Wang, Lei Li, Mingtian Zhou:

Topological dynamics characterization for LEO satellite networks. 43-53 - Zhi Li, Prasant Mohapatra:

On investigating overlay service topologies. 54-68 - Shanyu Zheng, David O. Manz

, Jim Alves-Foss:
A communication-computation efficient group key algorithm for large and dynamic groups. 69-93 - Hung Tuan Tran, Thomas Ziegler:

A design framework towards the profitable operation of service overlay networks. 94-113 - Giovanna Carofiglio, Michele Garetto

, Emilio Leonardi
, Alessandro Tarello, Marco Ajmone Marsan:
Beyond fluid models: Modelling TCP mice in IP networks under non-stationary random traffic. 114-133 - Li Feng, Qinglin Zhao, Hanwen Zhang:

Location management based on distance and direction for PCS networks. 134-152 - Tamma Bheemarjuna Reddy

, John P. John, C. Siva Ram Murthy:
Providing MAC QoS for multimedia traffic in 802.11e based multi-hop ad hoc wireless networks. 153-176 - Tao Meng, Hongfei Yan:

On the peninsula phenomenon in web graph and its implications on web search. 177-189 - Shay Kutten, David Peleg:

Asynchronous resource discovery in peer-to-peer networks. 190-206 - Salvatore Spadaro

, Alessandro D'Alessandro, Antonio Manzalini, Josep Solé-Pareta
:
TRIDENT: An automated approach to traffic engineering in IP/MPLS over ASON/GMPLS networks. 207-223 - Robert M. Hierons

, Hasan Ural:
Reducing the cost of applying adaptive test cases. 224-238 - Javed I. Khan, Raid Zaghal:

Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport. 239-257 - Hirozumi Yamaguchi

, Khaled El-Fakih, Gregor von Bochmann, Teruo Higashino:
Deriving protocol specifications from service specifications written as Predicate/Transition-nets. 258-284 - Fei Hu, Waqaas Siddiqui, Krishna Sankar:

Scalable security in Wireless Sensor and Actuator Networks (WSANs): Integration re-keying with routing. 285-308 - Marcos Postigo-Boix

, Joan García-Haro
, José Luis Melús-Moreno:
A cost-efficient method for streaming stored content in a guaranteed QoS Internet. 309-335 - Wenting Tang, Yun Fu, Ludmila Cherkasova, Amin Vahdat:

Modeling and generating realistic streaming media server workloads. 336-356
Volume 51, Number 2, February 2007
- Stephan Reiff-Marganiec

, Mark Ryan
:
Guest Editorial. 357-358 - Michael Weiss, Babak Esfandiari, Yun Luo:

Towards a classification of web service feature interactions. 359-381 - Rui Gustavo Crespo, Miguel Carvalho

, Luigi Logrippo:
Distributed resolution of feature interactions for internet applications. 382-397 - Mohamed Shehata

, Armin Eberlein
, Abraham O. Fapojuwo:
A taxonomy for identifying requirement interactions in software systems. 398-425 - Caixia Chi, Ruibing Hao:

Test generation for interaction detection in feature-rich communication systems. 426-438 - Alice Miller

, Muffy Calder
, Alastair F. Donaldson:
A template-based approach for the generation of abstractable and reducible models of featured networks. 439-455 - Pierre-Yves Schobbens

, Patrick Heymans, Jean-Christophe Trigaux, Yves Bontemps:
Generic semantics of feature diagrams. 456-479 - Wu-Hon F. Leung:

Program entanglement, feature interaction and the feature language extensions. 480-495 - Kenneth J. Turner, Lynne Blair:

Policies and conflicts in call control. 496-514 - Xiaotao Wu, Henning Schulzrinne:

Handling feature interactions in the language for end system services. 515-535 - Mario Kolberg

, Evan H. Magill:
Managing feature interactions between distributed SIP call control services. 536-557
Volume 51, Number 3, February 2007
- Bhamidipati Praveen, Jayachandran Praveen, C. Siva Ram Murthy:

On using forward error correction for loss recovery in optical burst switched networks. 559-568 - Carlo K. da Silva Rodrigues

, Rosa M. M. Leão:
Bandwidth usage distribution of multimedia servers using Patching. 569-587 - Yeim-Kuan Chang:

Fast binary and multiway prefix searches for packet forwarding. 588-605 - Sungchang Kim, Young-Chon Kim, Bin-Yeong Yoon, Minho Kang:

An integrated congestion control mechanism for optimized performance using two-step rate controller in optical burst switching networks. 606-620 - Young-June Choi, Jin-Ghoo Choi, Saewoong Bahk:

Upper-level scheduling supporting multimedia traffic in cellular data networks. 621-631 - Dong Yu, Deborah A. Frincke:

Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. 632-654 - Zhiguo Wan, Robert H. Deng

, Feng Bao, Akkihebbal L. Ananda:
Access control protocols with two-layer architecture for wireless networks. 655-670 - Hailong Li, Ian Li-Jin Thng:

Performance analysis of limited number of wavelength converters by share per node in optical switching network. 671-682 - Péter Hága, Krisztián Diriczi, Gábor Vattay, István Csabai

:
Granular model of packet pair separation in Poissonian traffic. 683-698 - Jean-Marc Kelif, Eitan Altman, Ioannis Z. Koukoutsidis:

Admission and GoS control in a multiservice WCDMA system. 699-711 - Yuh-Jzer Joung

, Jiaw-Chang Wang:
Chord2: A two-layer Chord for reducing maintenance overhead via heterogeneity. 712-731 - Zhiqiang Gao, Nirwan Ansari

:
A practical and robust inter-domain marking scheme for IP traceback. 732-750 - Glenn S. Benson:

Portable security transaction protocol. 751-766 - Meng Chang Chen, Li-Ping Tung, Yeali S. Sun, Wei-Kuan Shih:

A new per-class flow fixed proportional differentiated service for multi-service wireless LAN. 767-780 - Michel Mandjes, Petteri Mannersalo, Ilkka Norros:

Gaussian tandem queues with an application to dimensioning of switch fabric interfaces. 781-797 - Zhenqiang Ye, Lap Kong Law, Srikanth V. Krishnamurthy

, Zhong Xu, Suvidhean Dhirakaosal, Satish K. Tripathi, Mart L. Molle:
Predictive channel reservation for handoff prioritization in wireless cellular networks. 798-822 - Lap Kong Law, Srikanth V. Krishnamurthy

, Michalis Faloutsos
:
A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks. 823-834 - Sergio Sánchez-López, Xavier Masip-Bruin

, Josep Solé-Pareta
, Jordi Domingo-Pascual:
Fast setup of end-to-end paths for bandwidth constrained applications in an IP/MPLS-ATM integrated environment. 835-852 - Jianping Pan

, Lin Cai
, Xuemin Shen
, Jon W. Mark:
Identity-based secure collaboration in wireless ad hoc networks. 853-865 - Jen-Shiuh Liu, Zhi-Jian Lee, Yeh-Ching Chung:

Dynamic probabilistic packet marking for efficient IP traceback. 866-882 - Yuh-Ren Tsai

, Shiuh-Jeng Wang:
Two-tier authentication for cluster and individual sets in mobile ad hoc networks. 883-900 - Ernst W. Biersack, Damiano Carra, Renato Lo Cigno

, Pablo Rodriguez, Pascal Felber
:
Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases. 901-917
Volume 51, Number 4, March 2007
- Ian F. Akyildiz, Harry Rudin:

Editorial. 919-920 - Ian F. Akyildiz, Tommaso Melodia

, Kaushik R. Chowdhury
:
A survey on wireless multimedia sensor networks. 921-960 - Kurtis B. Kredo II, Prasant Mohapatra:

Medium access control in wireless sensor networks. 961-994 - Yi Li, Gaoxi Xiao

, Hooshang Ghafouri-Shiraz:
Performance evaluation of multi-fiber optical packet switches. 995-1012 - Gabriel Maciá-Fernández

, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against iterative servers. 1013-1030 - Konstantinos P. Ferentinos

, Theodore A. Tsiligiridis:
Adaptive design optimization of wireless sensor networks using genetic algorithms. 1031-1051 - Theodore L. Willke, Nicholas F. Maxemchuk:

Coordinated interaction using reliable broadcast in mobile wireless networks. 1052-1059 - Majid Ghaderi, Raouf Boutaba, Gary W. Kenward:

Joint call and packet QoS in cellular packet networks. 1060-1071 - Jinwon Lee, Hyonik Lee, Seungwoo Kang

, Su Myeon Kim, Junehwa Song:
CISS: An efficient object clustering framework for DHT-based peer-to-peer applications. 1072-1094 - Shantidev Mohanty, Jiang Xie:

Performance analysis of a novel architecture to integrate heterogeneous wireless systems. 1095-1105 - Mohamed G. Gouda, Alex X. Liu:

Structured firewall design. 1106-1120 - Praveen Jayachandran, Praveen Bhamidipati, C. Siva Ram Murthy:

On providing elastic QoS in optical burst switched networks. 1121-1132 - Yaqing Huang, Roch Guérin:

A simple FIFO-based scheme for differentiated loss guarantees. 1133-1150 - Wei-Tsung Su, Ko-Ming Chang, Yau-Hwang Kuo:

eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. 1151-1168 - Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi

:
Robust self-keying mobile ad hoc networks. 1169-1182 - Sajjad Zarifzadeh, Nasser Yazdani, Hamed Khanmirza:

A routing framework for load balancing of bandwidth sensitive traffic in differentiated service networks. 1183-1204 - Fabio Ricciato, Francesco Vacirca, Philipp Svoboda

:
Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis. 1205-1231
Volume 51, Number 5, April 2007
- Deborah A. Frincke, Andreas Wespi, Diego Zamboni:

From intrusion detection to self-protection. 1233-1238 - Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest

:
Learning DFA representations of HTTP for protecting web applications. 1239-1255 - Georgios Portokalidis

, Herbert Bos
:
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. 1256-1274 - Marcos Laureano, Carlos Maziero, Edgard Jamhour:

Protecting host-based intrusion detectors through virtual machines. 1275-1283 - Paul D. Williams, Eugene H. Spafford

:
CuPIDS: An exploration of highly focused, co-processor-based information system protection. 1284-1298 - Erol Gelenbe

, George Loukas
:
A self-aware approach to denial of service defence. 1299-1314 - Morton Swimmer:

Using the danger model of immune systems for distributed defense in modern data networks. 1315-1333 - Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford

:
Automated adaptive intrusion containment in systems of interacting services. 1334-1360 - Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Maier:

Automatic high-performance reconstruction and recovery. 1361-1377
Volume 51, Number 6, April 2007
- Hwangnam Kim, Jennifer C. Hou:

Mixed-mode simulation for IEEE 802.11-operated WLANs. 1379-1402 - Jeng Farn Lee, Meng Chang Chen, Yeali S. Sun:

WF2Q-M: Worst-case fair weighted fair queueing with maximum rate control. 1403-1420 - Jiang Li, Murat Yuksel, Xingzhe Fan, Shivkumar Kalyanaraman:

Generalized multicast congestion control. 1421-1443 - Lan Wang, Daniel Massey, Lixia Zhang:

Persistent detection and recovery of state inconsistencies. 1444-1458 - Sasu Tarkoma, Jaakko Kangasharju:

On the cost and safety of handoffs in content-based routing systems. 1459-1482 - Javier Vales-Alonso

, Esteban Egea-López
, Alejandro S. Martínez-Sala
, Pablo Pavón-Mariño, M. Victoria Bueno-Delgado
, Joan García-Haro
:
Performance evaluation of MAC transmission power control in wireless sensor networks. 1483-1498 - Nabhendra Bisnik, Alhussein A. Abouzeid

:
Optimizing random walk search algorithms in P2P networks. 1499-1514 - Hari Rangarajan, J. J. Garcia-Luna-Aceves:

Efficient use of route requests for loop-free on-demand routing in ad hoc networks. 1515-1529 - B. S. Manoj

, K. Jayanth Kumar, C. Siva Ram Murthy:
MuPAC: A new multi-power architecture for capacity enhancement in cellular networks. 1530-1554 - Yong Huat Chew, Boon Sain Yeo, Daniel Chien Ming Kuan:

Sensitivity study of location management area partitioning in cellular communication systems. 1555-1573 - Bo Li, Roberto Battiti

:
Achieving optimal performance in IEEE 802.11 wireless LANs with the combination of link adaptation and adaptive backoff. 1574-1600 - Hechmi Khlifi, Jean-Charles Grégoire:

ARTP: A buffer-aware rate control protocol for media streaming. 1601-1615 - Nikos Argiriou, Leonidas Georgiadis:

Channel sharing by multi-class rate adaptive streams: Performance region and optimization. 1616-1629 - Sangheon Pack

, Taekyoung Kwon, Yanghee Choi:
A performance comparison of mobility anchor point selection schemes in Hierarchical Mobile IPv6 networks. 1630-1642 - Mushi Jin, Oliver W. W. Yang:

APOSN: Operation, modeling and performance evaluation. 1643-1659 - Ashraf Al Daoud, Murat Alanyali:

Loss-cognizant pricing in networks with greedy users. 1660-1683 - Feng Zheng, John Nelson:

An Hinfinity approach to congestion control design for AQM routers supporting TCP flows in wireless access networks. 1684-1704 - Feng Gao, Michael E. Woodward:

A hybrid topological-stochastic partitioning method for scaling QoS routing algorithms. 1705-1724 - Gee-Swee Poo, Haibo Wang:

Multi-path routing versus tree routing for VPN bandwidth provisioning in the hose model. 1725-1743
Volume 51, Number 7, May 2007
- Katsushi Kobayashi

, Pascale Vicat-Blanc Primet, Joe Touch:
Protocols for fast, long-distance networks. 1745-1747 - Sangtae Ha, Long Le, Injong Rhee, Lisong Xu:

Impact of background traffic on performance of high-speed TCP variant protocols. 1748-1762 - Shan Chen, Brahim Bensaou:

Can high-speed networks survive with DropTail queues management? 1763-1776 - Yunhong Gu, Robert L. Grossman

:
UDT: UDP-based data transfer for high-speed wide area networks. 1777-1799 - Xiaomeng Huang, Chuang Lin, Fengyuan Ren:

A novel high speed transport protocol based on explicit virtual load feedback. 1800-1814 - Pasi Sarolahti, Mark Allman, Sally Floyd:

Determining an appropriate sending rate over an underutilized network path. 1815-1832 - Kiyohide Nakauchi, Katsushi Kobayashi

:
An explicit router feedback framework for high bandwidth-delay product networks. 1833-1846 - Lisong Xu:

Extending equation-based congestion control to high-speed and long-distance networks. 1847-1859
Volume 51, Number 8, June 2007
- Edith Cohen, Amos Fiat, Haim Kaplan:

Associative search in peer to peer networks: Harnessing latent semantics. 1861-1881 - Alex Raj, Oliver C. Ibe:

A survey of IP and multiprotocol label switching fast reroute schemes. 1882-1907 - Reuven Cohen, Amnon Shochot:

The "Global-ISP" paradigm. 1908-1921 - Hwangnam Kim, Jennifer C. Hou, Chunyu Hu, Ye Ge:

QoS provisioning in IEEE 802.11-compliant networks: Past, present, and future. 1922-1941 - Jin-Hee Choi, Young-Pil Kim

, Chuck Yoo:
Self-prevention of socket buffer overflow. 1942-1954 - Ye Ge, Jennifer C. Hou, Sunghyun Choi

:
An analytic study of tuning systems parameters in IEEE 802.11e enhanced distributed channel access. 1955-1980 - Steven Weber, Gustavo de Veciana:

Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link. 1981-1997 - Laura Galluccio

, Giacomo Morabito
, Sergio Palazzo, Marco Pellegrini
, M. Elena Renda
, Paolo Santi:
Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm. 1998-2014 - Jianbin Wei, Cheng-Zhong Xu

:
Consistent proportional delay differentiation: A fuzzy control approach. 2015-2032 - Ioannis Psaras, Vassilis Tsaoussidis

:
Why TCP timers (still) don't work well. 2033-2048 - Chun-Chuan Yang, Chun-Shian Tsai, Junn-Yen Hu, Tzu-Chien Chuang:

On the design of mobility management scheme for 802.16-based network environment. 2049-2066 - Jeremie Leguay

, Matthieu Latapy, Timur Friedman
, Kavé Salamatian
:
Describing and simulating internet routes. 2067-2085 - Michael Cho-Hoi Chek, Yu-Kwong Kwok:

Design and evaluation of practical coexistence management schemes for Bluetooth and IEEE 802.11b systems. 2086-2103 - Santpal Singh Dhillon, Piet Van Mieghem:

Performance analysis of the AntNet algorithm. 2104-2125 - B. S. Manoj

, Archana Sekhar, C. Siva Ram Murthy:
On the use of limited autonomous mobility for dynamic coverage maintenance in sensor networks. 2126-2143 - Glen MacLarty, Michael Fry:

Towards a platform for wide-area overlay network deployment and management. 2144-2162 - Srinivasan Ramasubramanian, Harish Krishnamoorthy, Marwan Krunz:

Disjoint multipath routing using colored trees. 2163-2180 - Coskun Cetinkaya:

Improving the efficiency of multipath traffic via opportunistic traffic scheduling. 2181-2197 - Dawn Sasha Lynette Dolcy, Costas C. Constantinou

, Steven F. Quigley:
A Fokker-Planck equation method predicting Buffer occupancy in a single queue. 2198-2216
Volume 51, Number 9, June 2007
- Josep Domingo-Ferrer, Joachim Posegga, Francesc Sebé

, Vicenç Torra
:
Advances in smart cards. 2219-2222 - Bart Preneel:

A survey of recent developments in cryptographic algorithms for smart cards. 2223-2233 - HongQian Karen Lu:

Network smart card review and analysis. 2234-2248 - Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra

:
Advances in network smart cards authentication. 2249-2261 - Jorge Munilla

, Alberto Peinado:
HB-MP: A further step in the HB-family of lightweight authentication protocols. 2262-2267 - Agusti Solanas

, Josep Domingo-Ferrer, Antoni Martínez-Ballesté
, Vanesa Daza
:
A distributed architecture for scalable private RFID tag identification. 2268-2279 - Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang:

Security enhancement of an IC-card-based remote login mechanism. 2280-2287 - Andrés Marín López

, Daniel Díaz Sánchez
, Florina Almenárez
, Carlos García-Rubio
, Celeste Campo
:
Smart card-based agents for fair non-repudiation. 2288-2298 - Francesc Sebé

, Alexandre Viejo
, Josep Domingo-Ferrer:
Secure many-to-one symbol transmission for implementation on smart cards. 2299-2307
- George T. Karetsos, Angelos N. Rouskas, Bijan Jabbari, Bernhard Walke:

Topics in wireless broadband systems. 2308-2310 - Claudio Cicconetti

, Luciano Lenzini, Enzo Mingozzi, Giovanni Stea
:
Design and performance analysis of the Real-Time HCCA scheduler for IEEE 802.11e WLANs. 2311-2325 - Xavier Pérez Costa

, Daniel Camps-Mur, Albert Vidal:
On distributed power saving mechanisms of wireless LANs 802.11e U-APSD vs 802.11 power save mode. 2326-2344 - Dimitris Vassis, George Kormentzas:

Performance analysis of IEEE 802.11 ad hoc networks in the presence of hidden terminals. 2345-2352 - Sebastian Max, Guido R. Hiertz, Erik Weiss, Dee Denteneer, Bernhard Walke:

Spectrum sharing in IEEE 802.11s wireless mesh networks. 2353-2367 - Patrick Hosein:

QoS scheduling of uplink resources in OFDMA networks. 2368-2378 - Georgios Leoleis, Iakovos S. Venieris:

Fast MIPv6 extensions supporting seamless multicast handovers. 2379-2396 - Vasileios Karyotis

, Symeon Papavassiliou:
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework. 2397-2410
Volume 51, Number 10, July 2007
- Jelena V. Misic, Carol J. Fung:

The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network. 2411-2449 - Yigal Bejerano, Seung-Jae Han, Amit Kumar:

Efficient load-balancing routing for wireless mesh networks. 2450-2466 - Guoqiang Mao

, Brian D. O. Anderson, Baris Fidan:
Path loss exponent estimation for wireless sensor network localization. 2467-2483 - Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum

, Arno Bakker:
Design and implementation of a secure wide-area object middleware. 2484-2513 - Supeng Leng, Liren Zhang, Huirong Fu, Jianjun Yang:

Mobility analysis of mobile hosts with random walking in ad hoc networks. 2514-2528 - Guoqiang Mao

, Baris Fidan, Brian D. O. Anderson:
Wireless sensor network localization techniques. 2529-2553 - Ning Lu, John Bigham:

On utility-fair bandwidth adaptation for multi-class traffic QoS provisioning in wireless networks. 2554-2564 - Birger Tödtmann, Erwin P. Rathgeb:

Anticipatory distributed packet filter configurations for carrier-grade IP networks. 2565-2579 - Dimitris Geneiatakis, Georgios Kambourakis

, Costas Lambrinoudakis
, Tasos Dagiuklas, Stefanos Gritzalis
:
A framework for protecting a SIP-based infrastructure against malformed message attacks. 2580-2593 - Vasudev Shah, Ece Gelal

, Srikanth V. Krishnamurthy
:
Handling asymmetry in power heterogeneous ad hoc networks. 2594-2615 - Zhenhai Duan, Yingfei Dong, Kartik Gopalan

:
DMTP: Controlling spam through message delivery differentiation. 2616-2630 - Ibtissam El Khayat, Pierre Geurts, Guy Leduc:

Machine-learnt versus analytical models of TCP throughput. 2631-2644 - Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femminella, Gianluca Reali:

Autonomic control and personalization of a wireless access network. 2645-2676 - Andrey Belenky, Nirwan Ansari

:
On deterministic packet marking. 2677-2700 - Baek-Young Choi

, Sue B. Moon
, Rene L. Cruz, Zhi-Li Zhang, Christophe Diot:
Quantile sampling for practical delay monitoring in Internet backbone networks. 2701-2716 - Aleksandar Kuzmanovic, Edward W. Knightly:

Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions. 2717-2737 - Marco Ajmone Marsan, Claudio Casetti, Gianluca Mardente, Marco Mellia

:
A framework for admission control and path allocation in DiffServ networks. 2738-2752 - Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng:

Improving the resilience of content distribution networks to large scale distributed denial of service attacks. 2753-2770 - Sun-Myeng Kim

, Young-Jong Cho:
Channel time allocation scheme based on feedback information in IEEE 802.11e wireless LANs. 2771-2787 - Yujie Zhu, Aravind Velayutham, Oyebamiji Oladeji, Raghupathy Sivakumar:

Enhancing TCP for networks with guaranteed bandwidth services. 2788-2804 - Chun-Ying Huang

, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
Secure multicast in dynamic environments. 2805-2817 - Shudong Jin, Hongbo Jiang:

Novel approaches to efficient flooding search in peer-to-peer networks. 2818-2832 - Jocelyne Elias, Fabio Martignon, Antonio Capone

, Guy Pujolle:
A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds. 2833-2853 - Srinivasan Ramasubramanian, Mithun Harkara, Marwan Krunz:

Linear time distributed construction of colored trees for disjoint multipath routing. 2854-2866 - Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley

:
Performance modeling of epidemic routing. 2867-2891 - Pablo Vidales, Carlos Jesus Bernardos

, Ignacio Soto
, David Naveen Cottingham, Javier Baliosian, Jon Crowcroft:
MIPv6 experimental evaluation using overlay networks. 2892-2915
Volume 51, Number 11, August 2007
- Georgios Smaragdakis

, Nikolaos Laoutaris
, Azer Bestavros
, Ibrahim Matta
, Ioannis Stavrakakis
:
Mistreatment-resilient distributed caching. 2917-2937 - Dah-Ming Chiu, Adrian Sai-Wah Tam:

Fairness of traffic controls for inelastic flows in the Internet. 2938-2957 - Eric W. M. Wong

, Andrew Zalesky
, Zvi Rosberg, Moshe Zukerman
:
A new method for approximating blocking probability in overflow loss networks. 2958-2975 - Ashima Gupta, Prasant Mohapatra:

A survey on ultra wide band medium access control schemes. 2976-2993 - Mário Alves

, Eduardo Tovar
:
Real-time communications over wired/wireless PROFIBUS networks supporting inter-cell mobility. 2994-3012 - Mehmet S. Kuran

, Tuna Tugcu
:
A survey on emerging broadband wireless access technologies. 3013-3046 - Lixiang Xiong, Guoqiang Mao

:
Saturated throughput analysis of IEEE 802.11e EDCA. 3047-3068 - Li Lao, Jun-Hong Cui, Mario Gerla:

Tackling group-to-tree matching in large scale group communications. 3069-3089 - Hualiang Chen, Zhongxin Liu

, Zengqiang Chen, Zhuzhi Yuan:
Extending TCP congestion control to multicast. 3090-3109 - Timo Vanhatupa, Marko Hännikäinen, Timo D. Hämäläinen:

Evaluation of throughput estimation models and algorithms for WLAN frequency planning. 3110-3124 - Hanping Lufei, Weisong Shi:

Energy-aware QoS for application sessions across multiple protocol domains in mobile computing. 3125-3141 - Anelise Munaretto

, Mauro Fonseca
:
Routing and quality of service support for mobile ad hoc networks. 3142-3156 - Xiaolong Li, Aaron Striegel

:
A case for Passive Application Layer Multicast. 3157-3171 - Gilberto Flores Lucio, Martin J. Reed, Ian D. Henning:

Guided local search as a network planning algorithm that incorporates uncertain traffic demands. 3172-3196 - H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal

:
Key management for content access control in a hierarchy. 3197-3219 - Yuan-Cheng Lai:

Two schedulers to provide delay proportion and reduce queueing delay simultaneously. 3220-3231 - Sebastian Kiesel, Michael Scharf:

Modeling and performance evaluation of transport protocols for firewall control. 3232-3251 - Jelena V. Misic:

Algorithm for equalization of cluster lifetimes in a multi-level Beacon enabled 802.15.4 sensor network. 3252-3264 - Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai:

Capacity analysis and MAC enhancement for UWB broadband wireless access networks. 3265-3277 - Zhenjiang Li, J. J. Garcia-Luna-Aceves:

Loop-free constrained path computation for hop-by-hop QoS routing. 3278-3293 - Steven Shelford, Gholamali C. Shoja, Eric G. Manning:

Achieving optimal revenues in dynamically priced network services with QoS guarantees. 3294-3304 - Dusit Niyato

, Ekram Hossain:
QoS-aware bandwidth allocation and admission control in IEEE 802.16 broadband wireless access networks: A non-cooperative game theoretic approach. 3305-3321
Volume 51, Number 12, August 2007
- Ahsan Habib, John Chuang

:
Improving application QoS with residential multihoming. 3323-3337 - Soo Young Shin

, Hong Seong Park, Wook Hyun Kwon:
Mutual interference analysis of IEEE 802.15.4 and IEEE 802.11b. 3338-3353 - Lih-Chyau Wuu, Tzong-Jye Liu, Kuo-Ming Chen:

A longest prefix first search tree for IP lookup. 3354-3367 - Jiann-Liang Chen, Ming-Chiao Chen, Yi-Ru Chian:

QoS management in heterogeneous home networks. 3368-3379 - Sumit Naiksatam, Stephen A. Chiappari, Silvia M. Figueira:

Efficient bandwidth utilization in LambdaGrids using pricing incentives. 3380-3391 - Vinay Sridhara, Stephan Bohacek:

Realistic propagation simulation of urban mesh networks. 3392-3412 - Luis López, Antonio Fernández, Vicent Cholvi

:
A game theoretic comparison of TCP and digital fountain based protocols. 3413-3426 - Saravanan Balasubramanian, Demet Aksoy:

Adaptive energy-efficient registration and online scheduling for asymmetric wireless sensor networks. 3427-3447 - Animesh Patcha, Jung-Min Park:

An overview of anomaly detection techniques: Existing solutions and latest technological trends. 3448-3470 - Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis

:
Defending against hitlist worms using network address space randomization. 3471-3490 - Stylianos Karapantazis, Fotini-Niovi Pavlidou:

Call admission control in multiservice high altitude platform (HAP) W-CDMA cellular systems. 3491-3506 - Grigorios Zachariadis, Javier A. Barria:

Demand management for telecommunications services. 3507-3524 - Ritesh Mukherjee, J. William Atwood

:
Scalable solutions for secure group communications. 3525-3548 - Christos Bouras, Afrodite Sevasti:

An analytical QoS service model for delay-based differentiation. 3549-3563 - Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang

:
A queueing analysis for the denial of service (DoS) attacks in computer networks. 3564-3573 - Wing-Yan Tam, King-Shan Lui, Suleyman Uludag

, Klara Nahrstedt:
Quality-of-Service routing with path information aggregation. 3574-3594 - Himabindu Pucha, Saumitra M. Das, Y. Charlie Hu:

The performance impact of traffic patterns on routing protocols in mobile ad hoc networks. 3595-3616 - Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee:

Cellular universal IP for nested network mobility. 3617-3631 - Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi

:
Threshold cryptography in P2P and MANETs: The case of access control. 3632-3649 - Saralees Nadarajah, Samuel Kotz:

On the convolution of Pareto and gamma distributions. 3650-3654 - Do Young Eun

, Xinbing Wang:
Performance analysis of TCP/AQM with generalized AIMD under intermediate buffer sizes. 3655-3671
Volume 51, Number 13, September 2007
- Abdullah Balamash, Marwan Krunz, Philippe Nain:

Performance analysis of a client-side caching/prefetching system for Web traffic. 3673-3692 - Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu:

On the scalability of rendezvous-based location services for geographic wireless ad hoc routing. 3693-3714 - Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam:

SPP: An anti-phishing single password protocol. 3715-3726 - Serdar Vural, Eylem Ekici

:
Probability distribution of multi-hop-distance in one-dimensional sensor networks. 3727-3749 - Issa M. Khalil

, Saurabh Bagchi, Ness B. Shroff:
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. 3750-3772 - Marios Lestas, Andreas Pitsillides, Petros A. Ioannou, George Hadjipollas:

Adaptive congestion protocol: A congestion control protocol with learning capability. 3773-3798 - Sakib A. Mondal

, Faisal B. Luqman:
Improving TCP performance over wired-wireless networks. 3799-3811 - Baek-Young Choi

, Sue B. Moon
, Zhi-Li Zhang, Konstantina Papagiannaki, Christophe Diot:
Analysis of point-to-point packet delay in an operational network. 3812-3827 - Zhi Li, Lihua Yuan, Prasant Mohapatra, Chen-Nee Chuah

:
On the analysis of overlay failure detection and recovery. 3828-3843 - Allen B. Downey

:
TCP self-clocking and bandwidth sharing. 3844-3863 - Anat Bremler-Barr

, Nir Halachmi, Hanoch Levy:
Protecting bursty applications against traffic aggressiveness. 3864-3877 - Nizar Bouabdallah, Harry G. Perros:

Cost-effective single-hub WDM ring networks: A proposal and analysis. 3878-3901 - Ignacio Más Ivars, Gunnar Karlsson

:
Probe-based admission control for a differentiated-services internet. 3902-3918 - Yongxiang Zhao, Changjia Chen:

A redundant overbooking reservation algorithm for OBS/OPS networks. 3919-3934 - Animesh Patcha, Jung-Min Park:

Network anomaly detection with incomplete audit data. 3935-3955
Volume 51, Number 14, October 2007
- Qi He, Constantinos Dovrolis, Mostafa H. Ammar:

On the predictability of large transfer TCP throughput. 3959-3977 - Yang Yang, Feiyi Huang, Xiaohu Ge

, Xiaodong Zhang, Xuanye Gu, Mohsen Guizani, Hsiao-Hwa Chen:
Double sense multiple access for wireless ad hoc networks. 3978-3988 - Luca Sanna Randaccio, Luigi Atzori:

Group multicast routing problem: A genetic algorithms based approach. 3989-4004 - Mahasweta Sarkar, Rene L. Cruz:

A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN. 4005-4031 - Tomaso de Cola

, Harald Ernst, Mario Marchese
:
Performance analysis of CCSDS File Delivery Protocol and erasure coding techniques in deep space environments. 4032-4049 - Wenji Wu

, Matt Crawford:
Interactivity vs. fairness in networked Linux systems. 4050-4069 - Chih-Yung Chang, Chao-Tsun Chang:

TARP: A traffic-aware restructuring protocol for Bluetooth radio networks. 4070-4091 - Mario Baldi, Guido Marchetto, Yoram Ofek:

A scalable solution for engineering streaming traffic in the future Internet. 4092-4111 - Ahmad Al Hanbali

, Arzad Alam Kherani, Robin Groenevelt, Philippe Nain, Eitan Altman:
Impact of mobility on the performance of relaying in ad hoc networks - Extended version. 4112-4130 - Ta Nguyen Binh Duong, Suiping Zhou:

A two-phase approach to interactivity enhancement for large-scale distributed virtual environments. 4131-4152 - Mehmet Hadi Gunes, Sevcan Bilir, Kamil Saraç, Turgay Korkmaz:

A measurement study on overhead distribution of value-added internet services. 4153-4173 - Sagy Bar, Mira Gonen, Avishai Wool

:
A geographic directed preferential internet topology model. 4174-4188 - Thierry Rakotoarivelo, Patrick Sénac, Aruna Seneviratne

, Michel Diaz:
SPAD: A distributed middleware architecture for QoS enhanced alternate path discovery. 4189-4211 - Samphel Norden, Katherine Guo:

Support for resilient Peer-to-Peer gaming. 4212-4233
Volume 51, Number 15, October 2007
- Abhishek Kashyap, Kwangil Lee, Mehdi Kalantari, Samir Khuller, Mark A. Shayman:

Integrated topology control and routing in wireless optical mesh networks. 4237-4251 - Shigang Chen, Yibei Ling, Randy Chow, Ye Xia:

AID: A global anti-DoS service. 4252-4269 - Pablo Pavón-Mariño, Joan García-Haro

, Andrzej Jajszczyk
:
Parallel desynchronized block matching: A feasible scheduling algorithm for the input-buffered wavelength-routed switch. 4270-4283 - Vaishnavi Krishnamurthy, Michalis Faloutsos

, Marek Chrobak, Jun-Hong Cui, Li Lao, Allon G. Percus
:
Sampling large Internet topologies for simulation purposes. 4284-4302 - Weichao Wang, Tylor Stransky:

Stateless key distribution for secure intra and inter-group multicast in mobile wireless network. 4303-4321 - Wesam Lootah, William Enck

, Patrick D. McDaniel:
TARP: Ticket-based address resolution protocol. 4322-4337 - Dongwook Lee, Gayathri Chandrasekaran, Mukundan Sridharan, Prasun Sinha:

Association management for data dissemination over wireless mesh networks. 4338-4355 - Evangelos Papapetrou, Stylianos Karapantazis, Fotini-Niovi Pavlidou:

Distributed on-demand routing for LEO satellite systems. 4356-4376 - Panagiotis Papadimitriou

, Vassilis Tsaoussidis
:
SSVP: A congestion control scheme for real-time video streaming. 4377-4395 - Dzmitry Kliazovich, Fabrizio Granelli

, Mario Gerla:
Performance improvement in wireless networks using cross-layer ARQ. 4396-4411 - Roberto Cusani, Tiziano Inzerilli, Luca Valentini:

Network monitoring and performance evaluation in a 3.5G network. 4412-4420 - Kenneth J. Turner, Koon Leai Larry Tan:

A rigorous approach to orchestrating grid services. 4421-4441 - Hyuk Lim

, Jennifer C. Hou:
Identifying lossy links in wired/wireless networks by exploiting sparse characteristics. 4442-4459 - Vicent Cholvi

, Juan Echagüe
:
Stability of FIFO networks under adversarial models: State of the art. 4460-4474 - Lijun Wang, Lin Cai

, Xinzhi Liu, Xuemin Shen
:
Stability and TCP-friendliness of AIMD/RED systems with feedback delays. 4475-4491 - Jordi Guitart

, David Carrera
, Vicenç Beltran
, Jordi Torres
, Eduard Ayguadé
:
Designing an overload control strategy for secure e-commerce applications. 4492-4510
Volume 51, Number 16, November 2007
- Simon Courtenage

, David Lewis
, Thanassis Tiropanis:
Innovations in Web communications infrastructure. 4511-4513 - Elke Michlmayr, Arno Pany, Gerti Kappel:

Using taxonomies for content-based routing with ants. 4514-4528 - Juan Ignacio Vázquez

, Diego López-de-Ipiña
:
mRDP: An HTTP-based lightweight semantic discovery protocol. 4529-4542 - Tao Gu, Hung Keng Pung, Daqing Zhang:

Information retrieval in schema-based P2P systems using one-dimensional semantic space. 4543-4560 - Frank Zhigang Wang, Na Helian

, Sining Wu, Yuhui Deng
, Vineet R. Khare, Michael Parker:
GridJet: An underlying data-transporting protocol for accelerating Web communications. 4561-4573 - Dominik Benz, Karen H. L. Tso, Lars Schmidt-Thieme

:
Supporting collaborative hierarchical classification: Bookmarks as an example. 4574-4585 - Trevor I. Fenner, Mark Levene, George Loizou, George Roussos

:
A stochastic evolutionary growth model for social networks. 4586-4595
- George Kormentzas, Thomas Magedanz:

Middleware challenges for next generation networks and services. 4596-4598 - Pruet Boonma

, Junichi Suzuki:
BiSNET: A biologically-inspired middleware architecture for self-managing wireless sensor networks. 4599-4616 - Yassine Hadjadj-Aoul, Ahmed Mehaoua, Charalabos Skianis

:
A fuzzy logic-based AQM for real-time traffic over internet. 4617-4633 - Jaakko Kangasharju, Tancred Lindholm, Sasu Tarkoma:

XML messaging for mobile devices: From requirements to implementation. 4634-4654 - Ivar Jørstad, Do Van Thanh:

Personalised ubiquitous file access with XML Web Services. 4655-4668 - Eugen Borcoci, Georgios Kormentzas, Abolghasem (Hamid) Asgari, Toufik Ahmed

:
Service invocation admission control algorithm for multi-domain IP environments. 4669-4678 - Georgios V. Lioudakis

, Eleftherios Koutsoloukas, Nikolaos L. Dellas, Nikolaos D. Tselikas
, Sofia Kapellaki, George N. Prezerakos, Dimitra I. Kaklamani, Iakovos S. Venieris:
A middleware architecture for privacy protection. 4679-4696 - Muhammad Sher

, Thomas Magedanz:
A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications. 4697-4709
Volume 51, Number 17, December 2007
- S. Jayashree, C. Siva Ram Murthy:

Towards estimating lifetime of ad hoc wireless networks. 4711-4726 - Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh:

A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. 4727-4743 - Lisong Xu, Josh Helzer:

Media streaming via TFRC: An analytical study of the impact of TFRC on user-perceived media quality. 4744-4764 - Luiz Henrique A. Correia

, Daniel F. Macedo
, Aldri L. dos Santos
, Antonio Alfredo Ferreira Loureiro, José Marcos S. Nogueira
:
Transmission power control techniques for wireless sensor networks. 4765-4779 - Jianhong Xia, Lixin Gao, Teng Fei:

A measurement study of persistent forwarding loops on the Internet. 4780-4796 - Luciano Paschoal Gaspary, Marinho P. Barcellos, André Detsch, Rodolfo Stoffel Antunes

:
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing. 4797-4815 - Dragos Ilie, Adrian Popescu:

Statistical models for Gnutella signaling traffic. 4816-4835 - Jian Chu, Chin-Tau Lea

:
A restorable MPLS-based hose-model VPN network. 4836-4848 - Telemaco Melia, Antonio de la Oliva

, Albert Vidal, Ignacio Soto
, Daniel Corujo
, Rui L. Aguiar
:
Toward IP converged heterogeneous mobility: A network controlled approach. 4849-4866 - Minh Huynh, Prasant Mohapatra:

Metropolitan Ethernet Network: A move from LAN to MAN. 4867-4894
Volume 51, Number 18, December 2007
- Andreas Pitsillides, Christophoros Christophorou:

MBMS Handover control: A new approach for efficient handover in MBMS enabled 3G cellular networks. 4897-4918 - Yung Yi, Sanjay Shakkottai:

FluNet: A hybrid internet simulator for fast queue regimes. 4919-4937 - Vanesa Daza

, Javier Herranz
, Paz Morillo, Carla Ràfols
:
Cryptographic techniques for mobile ad-hoc networks. 4938-4950 - Manos Dramitinos, George D. Stamoulis, Costas Courcoubetis:

An auction mechanism for allocating the bandwidth of networks to their users. 4979-4996 - Kuo-Feng Ssu, Chih-Hsun Chou, Wei-Tong Wang, Shin-Hung Chung:

Improving data transmission with helping nodes for geographical ad hoc routing. 4997-5010 - Shu Huang, Rudra Dutta

:
Spare capacity provisioning for quasi-static traffic. 5011-5035 - Kejie Lu, Dapeng Wu

, Jieyan Fan, Sinisa Todorovic, Antonio Nucci:
Robust and efficient detection of DDoS attacks for large-scale internet. 5036-5056

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














