default search action
Computer Networks [and ISDN Systems], Volume 57
Volume 57, Number 1, January 2013
- Ian F. Akyildiz, Harry Rudin:
COMNET editorial for 2012. 1-2 - Christos Papathanasiou, Nikos Dimitriou, Leandros Tassiulas:
Dynamic radio resource and interference management for MIMO-OFDMA mobile broadband wireless access systems. 3-16 - Long Long, Ahmed E. Kamal:
Protecting multicast services in optical internet backbones. 17-28 - Ahmad Sardouk, Majdi Mansouri, Leïla Merghem-Boulahia, Dominique Gaïti, Rana Rahim-Amoud:
Crisis management using MAS-based wireless sensor networks. 29-45 - Dong Mei Shan, Kee Chaing Chua, Gurusamy Mohan, Jian Qiu:
Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks. 46-60 - Seung Yeob Nam, Seong Joon Kim, Sihyung Lee, Hyong S. Kim:
Estimation of the available bandwidth ratio of a remote link or path segments. 61-77 - Kishore Angrishi:
An end-to-end stochastic network calculus with effective bandwidth and effective capacity. 78-84 - Beakcheol Jang, Jun Bum Lim, Mihail L. Sichitiu:
An asynchronous scheduled MAC protocol for wireless sensor networks. 85-98 - Donghyeok An, Honguk Woo, Hyunsoo Yoon, Ikjun Yeom:
Enhanced cooperative communication MAC for mobile wireless networks. 99-116 - Mingwei Xu, Meijia Hou, Dan Wang, Jiahai Yang:
An efficient critical protection scheme for intra-domain routing using link characteristics. 117-133 - A. Mirsayar Barkoosaraei, A. Hamid Aghvami:
Dynamic partitioning of IP-based wireless access networks. 134-146 - Addisu Eshete, Yuming Jiang:
Generalizing the CHOKe flow protection. 147-161 - Anwesha Mukherjee, Srimoyee Bhattacherjee, Sucheta Pal, Debashis De:
Femtocell based green power consumption methods for mobile network. 162-178 - Weiwei Fang, Xiangmin Liang, Shengxin Li, Luca Chiaraviglio, Naixue Xiong:
VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers. 179-196 - Hui Chen, Yang Xiao, Susan V. Vrbsky:
An update-based step-wise optimal cache replacement for wireless data access. 197-212 - Enrico Gregori, Luciano Lenzini, Chiara Orsini:
k-Dense communities in the Internet AS-level topology graph. 213-227 - Abderrahmen Mtibaa, Khaled A. Harras:
Fairness-related challenges in mobile opportunistic networking. 228-242 - Guang Yao, Jun Bi, Peiyao Xiao:
VASE: Filtering IP spoofing traffic with agility. 243-257 - Pablo Serrano, Paul Patras, Andrea Mannocci, Vincenzo Mancuso, Albert Banchs:
Control theoretic optimization of 802.11 WLANs: Implementation and experimental evaluation. 258-272 - Fabio R. J. Vieira, José Ferreira de Rezende, Valmir Carneiro Barbosa, Serge Fdida:
Local heuristic for the refinement of multi-path routing in wireless mesh networks. 273-285 - Consolee Mbarushimana, Ali Shahrabi, Tom Buggy:
A cross-layer TCP enhancement in QoS-aware mobile ad hoc networks. 286-301 - Julia Amador, Jesus R. Artalejo:
Modeling computer virus with the BSDE approach. 302-316 - Toktam Mahmoodi, Vasilis Friderikos, Hamid Aghvami:
Using traffic asymmetry to enhance TCP performance. 317-329 - Devrim Unal, Mehmet Ufuk Çaglayan:
A formal role-based access control model for security policies in multi-domain mobile networks. 330-350 - Lin Cui, Weijia Jia:
Cyclic stable matching for three-sided networking services. 351-363 - Berk Canberk:
An adaptive and QoS-based spectrum awareness framework for CR networks. 364-373
Volume 57, Number 2, February 2013
- Ronaldo M. Salles, Guofei Gu, Morton Swimmer:
Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''. 375-377 - Sérgio S. C. Silva, Rodrigo M. P. Silva, Raquel Coelho Gomes Pinto, Ronaldo M. Salles:
Botnets: A survey. 378-403 - Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu:
The SIC botnet lifecycle model: A step beyond traditional epidemiological models. 404-421 - Marco Riccardi, Roberto Di Pietro, Marta Palanques, Jorge Aguila Vila:
Titans' revenge: Detecting Zeus via its own flaws. 422-435 - Aditya K. Sood, Richard J. Enbody, Rohit Bansal:
Dissecting SpyEye - Understanding the design of third generation botnets. 436-450 - Juan Caballero, Dawn Song:
Automatic protocol reverse-engineering: Message format extraction and field semantics inference. 451-474 - Christian J. Dietrich, Christian Rossow, Norbert Pohlmann:
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis. 475-486 - Roberto Perdisci, Davide Ariu, Giorgio Giacinto:
Scalable fine-grained behavioral clustering of HTTP-based malware. 487-500 - Hui-Tang Lin, Ying-You Lin, Jui-Wei Chiang:
Genetic-based real-time fast-flux service networks detection. 501-513 - Chun-Ying Huang:
Effective bot host detection based on network failure models. 514-525 - Pedro Henrique B. Las-Casas, Dorgival O. Guedes, Jussara M. Almeida, Artur Ziviani, Humberto T. Marques-Neto:
SpaDeS: Detecting spammers at the source network. 526-539 - Guanhua Yan:
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. 540-555 - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
Design and analysis of a social botnet. 556-578 - Jingyu Hua, Kouichi Sakurai:
Botnet command and control based on Short Message Service and human mobility. 579-597
Volume 57, Number 3, February 2013
- Antonio de la Oliva, Tito R. Vargas Hernández, Juan Carlos Guerri, José Alberto Hernández, Pedro Reviriego:
Performance analysis of Energy Efficient Ethernet on video streaming servers. 599-608 - Evan Tan, Chun Tung Chou:
Joint optimization of continuity and quality for streaming video. 609-621 - Chong Han, Josep Miquel Jornet, Etimad A. Fadel, Ian F. Akyildiz:
A cross-layer communication module for the Internet of Things. 622-633 - Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia:
Blog or block: Detecting blog bots through behavioral biometrics. 634-646 - Kush Kothari, Matthew K. Wright:
Mimic: An active covert channel that evades regularity-based detection. 647-657 - Noriaki Kamiyama:
Designing data center network by analytic hierarchy process. 658-667 - Yu Wang, Hari Krishna Garg, Mehul Motani:
Downlink scheduling for user equipment served by multiple mobile terminals in cellular systems. 668-681 - Tudor Dumitras, Priya Narasimhan:
A study of unpredictability in fault-tolerant middleware. 682-698 - Vincent Lucas, Jean-Jacques Pansiot, Dominique Grad, Benoît Hilt:
Robust and fair Multicast Congestion Control (M2C). 699-724 - Joo-Young Baek, Jeong-Yoon Lee, Young-Joo Suh:
An elastic compensation model for frame-based scheduling algorithms in wireless networks. 725-740 - Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara:
Autonomic load balancing of flow monitors. 741-761 - Faqir Zarrar Yousaf, Christian Wietfeld:
Optimizing throughput performance of FMIPv6 over legacy 802.11 networks using iterative scanning. 762-781 - Yi-Mao Hsiao, Yuan-Sun Chu, Jeng-Farn Lee, Jinn-Shyan Wang:
A high-throughput and high-capacity IPv6 routing lookup system. 782-794 - Emiliano Casalicchio, Luca Silvestri:
Mechanisms for SLA provisioning in cloud-based service providers. 795-810 - Aruna Jamdagni, Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. 811-824 - Reduan H. Khan, Jamil Y. Khan:
A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network. 825-845
Volume 57, Number 4, March 2013
- Ren-Huang Liou, Yi-Bing Lin:
Mobility management with the central-based location area policy. 847-857 - Wei-Tong Wang, Kuo-Feng Ssu:
Obstacle detection and estimation in wireless sensor networks. 858-868 - Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, Wei Zhao:
Protocol-level attacks against Tor. 869-886 - Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, Chin-Laung Lei:
An adaptive sector-based routing model over structured peer-to-peer networks. 887-896 - Juhoon Kim, Luigi Iannone, Anja Feldmann:
Caching Locator/ID mappings: An experimental scalability analysis and its implications. 897-909 - Kaikai Chi, Xiaohong Jiang, Yi-hua Zhu, Jing Wang, Yanjun Li:
Block-level packet recovery with network coding for wireless reliable multicast. 910-923 - Mohamed Diallo, Vasilis Sourlas, Paris Flegkas, Serge Fdida, Leandros Tassiulas:
A content-based publish/subscribe framework for large-scale content delivery. 924-943 - Xiuzhong Chen, Marc De Leenheer, Rui Wang, Chaitanya S. K. Vadrevu, Lei Shi, Jie Zhang, Biswanath Mukherjee:
High-performance routing for hose-based VPNs in multi-domain backbone networks. 944-953 - José M. Camacho, Alberto García-Martínez, Marcelo Bagnulo, Francisco Valera:
BGP-XM: BGP eXtended Multipath for transit Autonomous Systems. 954-975 - Stefano Secci, Kunpeng Liu, Bijan Jabbari:
Efficient inter-domain traffic engineering with transit-edge hierarchical routing. 976-989 - Yuting Miao, Qiang Yang, Chunming Wu, Ming Jiang, Jinzhou Chen:
Multicast virtual network mapping for supporting multiple description coding-based video applications. 990-1002 - Rachid El Azouzi, Francesco De Pellegrini, Habib B. A. Sidi, Vijay Kamble:
Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation. 1003-1018 - Alex Borges Vieira, Rafael Barra de Almeida, Jussara Marques de Almeida, Sérgio Vale Aguiar Campos:
SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming. 1019-1036 - Xiaoyuan Luo, Yanlin Yan, Shaobao Li, Xinping Guan:
Topology control based on optimally rigid graph in wireless sensor networks. 1037-1047 - Sungoh Kwon, Neung-Hyung Lee:
Cell ID extension in femtocell environments. 1048-1062
Volume 57, Number 5, April 2013
- Feng Shan, Weifa Liang, Jun Luo, Xiaojun Shen:
Network lifetime maximization for time-sensitive data gathering in wireless sensor networks. 1063-1077 - Christian Bauer:
A Secure Correspondent Router Protocol for NEMO Route Optimization. 1078-1100 - Mehmet Yunus Donmez, Sinan Isik, Cem Ersoy:
Combined analysis of contention window size and duty cycle for throughput and energy optimization in wireless sensor networks. 1101-1112 - Mohammad A. Raayatpanah, H. Salehi Fathabadi, Babak H. Khalaj, Salman Khodayifar:
Minimum cost multiple multicast network coding with quantized rates. 1113-1123 - Efe Karasabun, Ibrahim Korpeoglu, Cevdet Aykanat:
Active node determination for correlated data gathering in wireless sensor networks. 1124-1138 - Donggyu Yun, Jungseul Ok, Bongjhin Shin, Soobum Park, Yung Yi:
Embedding of virtual network requests over static wireless multihop networks. 1139-1152 - Ji-Hoon Yun:
Performance analysis of IEEE 802.11 WLANs with rate adaptation in time-varying fading channels. 1153-1166 - Pavlos Antoniou, Andreas Pitsillides, Tim Blackwell, Andries P. Engelbrecht, Loizos Michael:
Congestion control in wireless sensor networks based on bird flocking behavior. 1167-1191 - Necati Kilic, Vehbi Cagri Gungor:
Analysis of low power wireless links in smart grid environments. 1192-1203 - Gregory Detal, Christoph Paasch, Simon van der Linden, Pascal Mérindol, Gildas Avoine, Olivier Bonaventure:
Revisiting flow-based load balancing: Stateless path selection in data center networks. 1204-1216 - Slavisa Aleksic, Margot Deruyck, Willem Vereecken, Wout Joseph, Mario Pickavet, Luc Martens:
Energy efficiency of femtocell deployment in combined wireless/optical access networks. 1217-1233 - Peristera A. Baziana, Ioannis E. Pountourakis:
An access protocol for efficiency optimization in WDM networks: A propagation delay and collisions avoidance analysis. 1234-1252 - Lucia D'Acunto, Nitin Chiluka, Tamás Vinkó, Henk J. Sips:
BitTorrent-like P2P approaches for VoD: A comparative study. 1253-1276 - Daniele Casagrande, Pier Luca Montessoro, Franco Blanchini:
Fair and optimal dynamic admission control of elastic flows. 1277-1288 - Saeed Salah, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo:
A model-based survey of alert correlation techniques. 1289-1317 - Christian Esposito, Domenico Cotroneo, Stefano Russo:
On reliability in publish/subscribe services. 1318-1343 - Wenye Wang, Zhuo Lu:
Cyber security in the Smart Grid: Survey and challenges. 1344-1371
Volume 57, Number 6, April 2013
- Márton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly, Gergely Biczók:
Incrementally upgradable data center architecture using hyperbolic tessellations. 1373-1393 - Christos Anagnostopoulos, Stathes Hadjiefthymiades:
Multivariate context collection in mobile sensor networks. 1394-1407 - Kai-Wei Ke, Chia-Hui Huang:
Performance evaluation of multisource Application Layer Multicast (ALM): Theoretical and simulative aspects. 1408-1424 - Urs Hunkeler, Clemens Lombriser, Hong Linh Truong, Beat Weiss:
A case for centrally controlled wireless sensor networks. 1425-1442 - Conrado Borraz-Sánchez, Diego Klabjan:
Optimal placement of reconfigurable optical add/drop multiplexers with packing, blocking, and signal loss. 1443-1458 - Adel Ali Ahmed:
An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks. 1459-1473 - Linjun Fan, Yunxiang Ling, Tao Wang, Xiaomin Zhu, Xiaoyong Tang:
Novel clock synchronization algorithm of parametric difference for parallel and distributed simulations. 1474-1487 - Youghourta Benfattoum, Steven Martin, Khaldoun Al Agha:
QoS for real-time reliable multicasting in wireless multi-hop networks using a Generation-Based Network Coding. 1488-1502 - Edoardo Amaldi, Antonio Capone, Luca Giovanni Gianoli:
Energy-aware IP traffic engineering with shortest path routing. 1503-1517 - Rajarshi Mahapatra, Antonio De Domenico, Rohit Gupta, Emilio Calvanese Strinati:
Green framework for future heterogeneous wireless networks. 1518-1528 - Xiaoping Wang, Yunhao Liu, Zheng Yang, Kai Lu, Jun Luo:
OFA: An optimistic approach to conquer flip ambiguity in network localization. 1529-1544 - S. Chiappetta, Claudio Mazzariello, Roberta Presta, Simon Pietro Romano:
An anomaly-based approach to the analysis of the social behavior of VoIP users. 1545-1559 - Ryoichi Kawahara, Tetsuya Takine, Tatsuya Mori, Noriaki Kamiyama, Keisuke Ishibashi:
Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management. 1560-1576
Volume 57, Number 7, May 2013
- S. H. Shah Newaz, Ángel Cuevas, Gyu Myoung Lee, Noël Crespi, Jun Kyun Choi:
Adaptive Delay-Aware Energy Efficient TDM-PON. 1577-1596 - Christian Facchini, Oliver Holland, Fabrizio Granelli, Nelson L. S. da Fonseca, Hamid Aghvami:
Dynamic green self-configuration of 3G base stations using fuzzy cognitive maps. 1597-1610 - Weibo Chu, Xiaohong Guan, Zhongmin Cai, Lixin Gao:
Real-time volume control for interactive network traffic replay. 1611-1629 - Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, Guy Leduc:
Outbound SPIT filter with optimal performance guarantees. 1630-1643 - Jongwook Lee, Jin-Ghoo Choi, Saewoong Bahk:
Opportunistic downlink data delivery for mobile collaborative communities. 1644-1655 - T. D. Lagkas, Panagiotis G. Sarigiannidis, Malamati D. Louta:
On analyzing the intra-frame power saving potentials of the IEEE 802.16e downlink vertical mapping. 1656-1673 - Weijie Wu, John C. S. Lui, Richard T. B. Ma:
On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation. 1674-1688 - Wei Kuang Lai, Chang-Lung Tang:
QoS-aware downlink packet scheduling for LTE networks. 1689-1698 - Cristina Rottondi, Giacomo Verticale, Antonio Capone:
Privacy-preserving smart metering with multiple data Consumers. 1699-1713 - Javad Akbari Torkestani:
An energy-efficient topology construction algorithm for wireless sensor networks. 1714-1725 - Ahmad Vakili, Jean-Charles Grégoire:
QoE management for video conferencing applications. 1726-1738
Volume 57, Number 8, June 2013
- Stamatios Arkoulis, Evangelos Anifantis, Vasileios Karyotis, Symeon Papavassiliou, Nikolas Mitrou:
On the optimal, fair and channel-aware cognitive radio network reconfiguration. 1739-1757 - László Gyarmati, András Gulyás, Balázs Sonkoly, Tuan Anh Trinh, Gergely Biczók:
Free-scaling your data center. 1758-1773 - Gongqi Lin, Sieteng Soh, Kwan-Wu Chin, Mihai M. Lazarescu:
Efficient heuristics for energy-aware routing in networks with bundled links. 1774-1788 - Giacomo Bacci, Marco Luise:
QoS-aware game-theoretic rate & power control for CDMA wireless communication networks. 1789-1804 - Shengbo Yang, Chai Kiat Yeo, Bu-Sung Lee:
MaxCD: Efficient multi-flow scheduling and cooperative downloading for improved highway drive-thru Internet systems. 1805-1820