


default search action
Computer Communications, Volume 31
Volume 31, Number 1, January 2008
- Polychronis Koutsakis

:
On modeling multiplexed VBR videoconference traffic from H.263 video coders. 1-4
- Ali Mohammad Zareh Bidoki, Nasser Yazdani, Sayed Vahid Azhari:

A logarithmic scheduling algorithm for high speed input-queued switches. 5-18 - Gurusamy Mohan

, E. Cheng Tien:
QoS routing in GMPLS-capable integrated IP/WDM networks with router cost constraints. 19-34 - Yih-Fuh Wang:

Non-blocking extended OVSF codes on multi-rate CDMA systems. 35-48 - Salman AlQahtani

, Ashraf S. Hasan Mahmoud
:
Performance analysis of two throughput-based call admission control schemes for 3G WCDMA wireless networks supporting multiservices. 49-57 - Wei Wang, Xiaohong Guan, Xiangliang Zhang:

Processing of massive audit data streams for real-time anomaly intrusion detection. 58-72 - Vitalio Alfonso Reguera

, Félix F. Álvarez Paliza, Walter Godoy Jr., Evelio M. García Fernández
:
On the impact of active queue management on VoIP quality of service. 73-87 - Bazil Taha Ahmed

, Miguel Calvo-Ramón
:
WCDMA downlink capacity of cigar-shaped microcells using soft hand-over with SIR-based power control for over-ground train service. 88-94 - Thamer Al-Meshhadany, Wessam Ajib:

The impact of code allocation on the multiple access interference in WCDMA systems. 95-102 - Salman AlQahtani

:
Adaptive rate scheduling for 3G networks with shared resources using the generalized processor sharing performance model. 103-111 - Xingwei Wang, Lei Guo, Cunqian Yu:

RLDP: A novel risk-level disjoint protection routing algorithm with shared backup resources for survivable backbone optical transport networks. 112-118 - Vidhyacharan Bhaskar, Kondo H. Adjallah

:
A hybrid closed queuing network approach to model dataflow in networked distributed processors. 119-128 - Stylianos Georgoulas, Panos Trimintzios, George Pavlou, Kin-Hon Ho:

An integrated bandwidth allocation and admission control framework for the support of heterogeneous real-time traffic in class-based IP networks. 129-152 - Namhoon Kim, Jongman Heo, Hyung Seok Kim, Wook Hyun Kwon:

Reconfiguration of clusterheads for load balancing in wireless sensor networks. 153-159 - Sajjad Zarifzadeh, Amir Nayyeri, Nasser Yazdani:

Efficient construction of network topology to conserve energy in wireless ad hoc networks. 160-173 - Won-Hyoung Park, Sunghyun Cho, Saewoong Bahk:

Scheduler design for multiple traffic classes in OFDMA networks. 174-184
- Saralees Nadarajah:

Comment on "Modeling and analysis of mobility management state of packet-switched (PS) services in GPRS". 185-186
Volume 31, Number 2, February 2008
- Javed I. Khan, Adam Wierzbicki

:
Guest editors' introduction: Foundation of peer-to-peer computing. 187-189 - Chao Xie, Guihai Chen

, Art Vandenberg, Yi Pan:
Analysis of hybrid P2P overlay network topology. 190-200 - Kolja Eger, Ulrich Killat:

Bandwidth trading in BitTorrent-like P2P networks for content distribution. 201-211 - Dongyu Qiu, Weiqian Sang:

Global stability of Peer-to-Peer file sharing systems. 212-219 - Di Wu, Ye Tian

, Kam-Wing Ng, Anwitaman Datta
:
Stochastic analysis of the interplay between object maintenance and churn. 220-239 - Murat Karakaya

, Ibrahim Korpeoglu
, Özgür Ulusoy
:
A connection management protocol for promoting cooperation in Peer-to-Peer networks. 240-256 - Albert Creus-Mir, Ramon Casadesus-Masanell, Andres Hervas-Drane:

Bandwidth allocation in peer-to-peer file sharing networks. 257-265 - Esther Palomar

, Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, Arturo Ribagorda:
Secure content access and replication in pure P2P networks. 266-279 - Thorsten Schütt, Florian Schintke, Alexander Reinefeld:

Range queries on structured overlay networks. 280-291 - Vladimir M. Vishnevsky

, Alexander A. Safonov, Mikhail Yakimov, Eunsoo Shim, Alexander D. Gelman:
Scalable blind search and broadcasting over Distributed Hash Tables. 292-303 - Shiping Chen, Zhan Zhang, Shigang Chen, Baile Shi:

Efficient file search in non-DHT P2P networks. 304-317 - Cong Shi, Dingyi Han, Yuanjie Liu, Shicong Meng, Yong Yu:

A dynamic routing protocol for keyword search in unstructured peer-to-peer networks. 318-331 - Farnoush Banaei Kashani, Cyrus Shahabi

:
Partial read from peer-to-peer databases. 332-345 - Duc A. Tran

, Thinh P. Nguyen:
Hierarchical multidimensional search in peer-to-peer networks. 346-357 - Alejandra N. González-Beltrán

, Peter Milligan, Paul Sage:
Range queries over skip tree graphs. 358-374 - Wolfgang Müller, P. Oscar Boykin, Vwani P. Roychowdhury, Nima Sarshar:

Comparison of image similarity queries in P2P systems. 375-386 - James Walkerdine, Danny Hughes, Paul Rayson

, John Simms, Kiel Mark Gilleade, John A. Mariani
, Ian Sommerville:
A framework for P2P application development. 387-401 - Kazuyuki Shudo, Yoshio Tanaka

, Satoshi Sekiguchi:
Overlay Weaver: An overlay construction toolkit. 402-412
Volume 31, Number 3, February 2008
- Javed I. Khan, Adam Wierzbicki

:
Guest editors' introduction: Disruptive networking with peer-to-peer systems. 419-422 - Alberto Mozo, Joaquín Salvachúa

:
Scalable tag search in social network applications. 423-436 - Daniel Cutting, Aaron J. Quigley

, Björn Landfeldt:
SPICE: Scalable P2P implicit group messaging. 437-451 - John F. Buford, Alan Brown, Mario Kolberg

:
Exploiting parallelism in the design of peer-to-peer overlays. 452-463 - Eng Keong Lua, Xiaoming Zhou, Jon Crowcroft, Piet Van Mieghem:

Scalable multicasting with network-aware geometric overlay. 464-488 - Dario Pompili, Caterina M. Scoglio

, Luca Lopez:
Multicast algorithms in service overlay networks. 489-505 - Tai T. Do, Kien A. Hua, Mounir A. Tantaoui:

Robust video-on-demand streaming in peer-to-peer environments. 506-519 - Yang Guo, Kyoungwon Suh, Jim Kurose, Donald F. Towsley

:
DirectStream: A directory-based peer-to-peer video streaming service. 520-536 - Sang-Seon Byun, Chuck Yoo:

Minimum DVS gateway deployment in DVS-based overlay streaming. 537-550 - Behzad Akbari, Hamid R. Rabiee

, Mohammed Ghanbari
:
An optimal discrete rate allocation for overlay video multicasting. 551-562 - Maya Haridasan, Robbert van Renesse:

SecureStream: An intrusion-tolerant protocol for live-streaming dissemination. 563-575 - Stefan Zöls, Zoran Despotovic, Wolfgang Kellerer

:
On hierarchical DHT systems - An analytical approach for optimal designs. 576-590 - Jiadi Yu, Minglu Li:

CBT: A proximity-aware peer clustering system in large-scale BitTorrent-like peer-to-peer networks. 591-602 - Peter Kersch, Róbert Szabó, Lawrence Cheng, Kerry Jean, Alex Galis:

Stochastic maintenance of overlays in structured P2P systems. 603-619 - Vincenza Carchiolo

, Michele Malgeri, Giuseppe Mangioni, Vincenzo Nicosia
:
Emerging structures of P2P networks induced by social relationships. 620-628 - Javed I. Khan, Asrar U. Haque

:
Computing with data non-determinism: Wait time management for peer-to-peer systems. 629-642 - Thomas Zahn, Jochen H. Schiller

:
Designing structured peer-to-peer overlays as a platform for distributed network applications in mobile ad hoc networks. 643-654
Volume 31, Number 4, March 2008
- Sudip Misra, Subhas C. Misra, Isaac Woungang:

Algorithmic and theoretical aspects of wireless ad hoc and sensor networks. 655-658 - Xuefei Cao, Weidong Kou, Lanjun Dang, Bin Zhao:

IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. 659-667 - Stefano Basagni, Chiara Petrioli

, Roberto Petroccia:
Efficiently reconfigurable backbones for wireless sensor networks. 668-698 - Sangho Yi, Hong Min, Yookun Cho, Jiman Hong:

Molecule: An adaptive dynamic reconfiguration scheme for sensor operating systems. 699-707 - Hadi Otrok

, Noman Mohammed, Lingyu Wang, Mourad Debbabi
, Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks. 708-721 - P. Venkata Krishna

, N. Ch. S. N. Iyengar
, Sudip Misra:
An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid cellular and ad-hoc networks. 722-733 - Frederik Armknecht

, Dirk Westhoff, Joao Girão, Alban Hessler:
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing. 734-749 - Chor Ping Low, Can Fang, Jim Mee Ng, Yew-Hock Ang:

Efficient Load-Balanced Clustering Algorithms for wireless sensor networks. 750-759 - Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra, Isaac Woungang:

Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. 760-769 - Jacques M. Bahi, Abdallah Makhoul

, Ahmed Mostefaoui:
Localization and coverage for high density sensor networks. 770-781 - Xianren Wu, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves:

Modeling of topology evolutions and implication on proactive routing overhead in MANETs. 782-792 - Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bhargava:

A role-based access in a hierarchical sensor network architecture to provide multilevel security. 793-806 - Alaa Eddien Abdallah

, Thomas Fevens, Jaroslav Opatrny:
High delivery rate position-based routing algorithms for 3D ad hoc networks. 807-817 - Somanath Tripathy

, Sukumar Nandi
:
Defense against outside attacks in wireless sensor networks. 818-826 - Stéphane Maag, Cyril Grepet, Ana R. Cavalli

:
A formal validation methodology for MANET routing protocols based on nodes' self similarity. 827-841 - Huirong Fu, Satoshi Kawamura, Ming Zhang, Liren Zhang:

Replication attack on random key pre-distribution schemes for wireless sensor networks. 842-857
Volume 31, Number 5, March 2008
- Luciano Bononi

, Albert Y. Zomaya
:
Special issue on "Mobility Management and Wireless Access". 871-872
- Sangheon Pack

, Byoungwook Lee, Taekyoung Kwon, Yanghee Choi:
A pointer forwarding scheme with mobility-aware binding update in Mobile IPv6 networks. 873-884 - Asad Amir Pirzada, Marius Portmann

, Jadwiga Indulska
:
Performance analysis of multi-radio AODV in hybrid wireless mesh networks. 885-895 - Ioannis Chatzigiannakis

, Athanasios Kinalis, Sotiris E. Nikoletseas:
Efficient data propagation strategies in wireless sensor networks using a single mobile sink. 896-914 - Eduardo Cerqueira, Luis Veloso, Augusto Neto

, Marília Curado
, Edmundo Monteiro
, Paulo Mendes
:
Mobility management for multi-user sessions in next generation wireless systems. 915-934 - Alessandra Toninelli

, Antonio Corradi
, Rebecca Montanari
:
Semantic-based discovery to support mobile context-aware service access. 935-949 - Abd-Elhamid M. Taha, Hossam S. Hassanein

, Hussein T. Mouftah:
Vertical handoffs as a radio resource management tool. 950-961 - Mahesh Sooriyabandara, Tim Farnham, Costas Efthymiou, Matthias Wellens, Janne Riihijärvi, Petri Mähönen, Alain Gefflaut, José Antonio Galache, Diego Melpignano, Arthur van Rooijen:

Unified Link Layer API: A generic and open API to manage wireless media access. 962-979 - Lukasz Budzisz, Ramon Ferrús

, Anna Brunström, Karl-Johan Grinnemo, R. Fracchia, Giulio Galante, Ferran Casadevall
:
Towards transport-layer mobility: Evolution of SCTP multihoming. 980-998 - Meng-Shiuan Pan

, Yu-Chee Tseng:
Quick convergecast in ZigBee beacon-enabled tree-based wireless sensor networks. 999-1011 - Mohsin Iftikhar, Tejeshwar Singh, Björn Landfeldt, Mine Çaglar

:
Multiclass G/M/1 queueing system with self-similar input and non-preemptive priority. 1012-1027 - Richard Werner Nelem Pazzi

, Azzedine Boukerche:
Mobile data collector strategy for delay-sensitive applications over wireless sensor networks. 1028-1039 - Georg Treu, Axel Küpper

, Thomas Wilder:
Extending the LBS-framework TraX: Efficient proximity detection with dead reckoning. 1040-1051
Volume 31, Number 6, April 2008
- Miguel A. Labrador, Katina Michael

, Axel Küpper
:
Advanced location-based services. 1053-1054
- Álvaro Marco

, Roberto Casas, Jorge L. Falcó, Héctor J. Gracia, José Ignacio Artigas
, Armando Roy:
Location-based services for elderly and disabled people. 1055-1066 - Abhishek Patil, Jonathan P. Munson, David Wood, Alan Cole:

Bluebot: Asset tracking via robotic location crawling. 1067-1077 - Paolo Bellavista

, Antonio Corradi
, Carlo Giannelli:
The PoSIM middleware for translucent and context-aware integrated management of heterogeneous positioning systems. 1078-1090 - Sean J. Barbeau

, Miguel A. Labrador, Philip L. Winters
, Rafael A. Pérez, Nevine Labib Georggi:
Location API 2.0 for J2ME - A new standard in location for Java-enabled mobile phones. 1091-1103 - Martin Dawson:

The Internet location services model. 1104-1113 - Hasari Celebi, Hüseyin Arslan

:
Enabling location and environment awareness in cognitive radios. 1114-1125 - Christos Laoudias

, Christos G. Panayiotou
, Christos Desiniotis, John G. Markoulidakis, Juuso Pajunen, S. Nousiainen:
Part one: The Statistical Terminal Assisted Mobile Positioning methodology and architecture. 1126-1137 - John G. Markoulidakis, C. Dessiniotis, D. Nikolaidis:

Part two: Kalman filtering options for error minimization in statistical terminal assisted mobile positioning. 1138-1147 - Marian Mohr, Christopher Edwards, Ben McCarthy:

A study of LBS accuracy in the UK and a novel approach to inferring the positioning technology employed. 1148-1159 - Sangeeta Bhattacharya, Chien-Liang Fok, Chenyang Lu, Gruia-Catalin Roman:

MLDS: A flexible location directory service for tiered sensor networks. 1160-1172 - Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard

, Jan Martin Surminen:
Location constraints in digital rights management. 1173-1180 - Agusti Solanas

, Antoni Martínez-Ballesté
:
A TTP-free protocol for location privacy in location-based services. 1181-1191 - Michael G. Michael, Sarah Jean Fusco, Katina Michael

:
A research note on ethics in the emerging age of überveillance. 1192-1199
- Olabisi Emmanuel Falowo

, H. Anthony Chan:
Joint call admission control algorithms: Requirements, approaches, and design considerations. 1200-1217
- Enrique Hernández-Orallo

, Joan Vila i Carbó:
Fast and efficient routing algorithms for delay-bounded and dependable channels. 1218-1226 - Mari Carmen Domingo

, Rui Prior
:
Energy analysis of routing protocols for underwater wireless sensor networks. 1227-1238 - Mohammad Malli, Chadi Barakat

, Walid Dabbous:
CHESS: An application-aware space for enhanced scalable services in overlay networks. 1239-1253
Volume 31, Number 7, May 2008
- Xiaobo Zhou, Liqiang Zhang:

Special issue: Resource management and routing in wireless mesh networks. 1255-1258
- Bing He, Bin Xie, Dharma P. Agrawal:

Optimizing deployment of Internet gateway in Wireless Mesh Networks. 1259-1275 - Bo Wang, Matt W. Mutka

:
QoS-aware fair rate allocation in wireless mesh networks. 1276-1289 - Roberto Riggio

, Daniele Miorandi, Francesco De Pellegrini, Fabrizio Granelli
, Imrich Chlamtac:
A traffic aggregation and differentiation scheme for enhanced QoS in IEEE 802.11-based Wireless Mesh Networks. 1290-1300 - Mesut Ali Ergin, Marco Gruteser, Lin Luo, Dipankar Raychaudhuri, Hang Liu:

Available bandwidth estimation and admission control for QoS routing in wireless mesh networks. 1301-1317 - Najah A. Abu Ali

, Hossam S. Hassanein
:
Statistical delay budget partitioning in wireless mesh networks. 1318-1328 - Ting-Yu Lin, Wai-Hong Tam, Kang-Lun Fan, Yu-Chee Tseng:

Resource planning and packet forwarding in multi-radio, multi-mode, multi-channel, multi-rate (M4) wireless mesh networks. 1329-1342 - Stefano Avallone

, Ian F. Akyildiz:
A channel assignment algorithm for multi-radio wireless mesh networks. 1343-1353 - Irfan Sheriff, Prashanth Aravinda Kumar Acharya, Elizabeth M. Belding:

Measurement-driven admission control on wireless backhaul networks. 1354-1371 - Jun Wang

, Peng Du, Weijia Jia, Liusheng Huang, Huan Li:
Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links. 1372-1384 - Uyen Trang Nguyen:

On multicast routing in wireless mesh networks. 1385-1399 - Georgios Rodolakis, Anis Laouiti, Philippe Jacquet, Amina Meraihi Naimi:

Multicast overlay spanning trees in ad hoc networks: Capacity bounds, protocol design and performance evaluation. 1400-1412 - Jangeun Jun, Mihail L. Sichitiu

:
MRP: Wireless mesh networks routing protocol. 1413-1435 - Xin Wang, J. J. Garcia-Luna-Aceves:

Distributed joint channel assignment, routing and scheduling for wireless mesh networks. 1436-1446 - Jun Xiao, Naixue Xiong, Laurence Tianruo Yang, Yanxiang He:

A joint selfish routing and channel assignment game in wireless mesh networks. 1447-1459 - Devu Manikantan Shila, Tricha Anjali:

Load aware traffic engineering for mesh networks. 1460-1469
Volume 31, Number 8, May 2008
- Xiaobo Zhou, Liqiang Zhang:

Special issue: Modeling, testbeds, and applications in wireless mesh networks. 1471-1474
- Nadeem Akhtar, Klaus Moessner

:
On the nominal capacity of multi-radio multi-channel wireless mesh networks. 1475-1483 - Danilo Valerio, Fabio Ricciato, Paul Fuxjäger:

On the feasibility of IEEE 802.11 multi-channel multi-hop mesh networks. 1484-1496 - Károly Farkas, Theus Hossmann, Franck Legendre, Bernhard Plattner, Sajal K. Das

:
Link quality prediction in mesh networks. 1497-1512 - Azin Neishaboori, George Kesidis:

Wireless mesh networks based on CDMA. 1513-1528 - Peng Cheng, Zhaoyang Zhang

, Hsiao-Hwa Chen, Peiliang Qiu:
A framework of cross-layer design for multiple video streams in wireless mesh networks. 1529-1539 - Roger P. Karrer, Alessio Botta

, Antonio Pescapè:
High-speed backhaul networks: Myth or reality? 1540-1550 - Sébastien Roy

, Jean-François Boudreault, Louis Dupont:
An end-to-end prototyping framework for compliant wireless LAN transceivers with smart antennas. 1551-1563 - Andres Arjona, Cédric Westphal, Jukka Manner, Antti Ylä-Jääski, Sami Takala:

Can the current generation of wireless mesh networks compete with cellular voice? 1564-1578 - Vinay Sridhara, Hweechul Shin, Stephan Bohacek:

Performance of 802.11b/g in the interference limited regime. 1579-1587 - Soumendra Nanda, David Kotz

:
Mesh-Mon: A multi-radio mesh monitoring and management system. 1588-1601 - Lin Luo, Hang Liu, Mingquan Wu, Dekai Li:

End-to-end performance aware association mechanism for wireless municipal mesh networks. 1602-1614 - Fei Xie, Kien A. Hua, Ning Jiang:

A cross-layer framework for video-on-demand service in multi-hop WiMax mesh networks. 1615-1626 - B. S. Manoj

, Ping Zhou, Ramesh R. Rao:
Dynamic adaptation of CSMA/CA MAC protocol for wide area wireless mesh networks. 1627-1637 - Shahbaz Khan, S. A. Mahmud, Kok-Keong Loo, Hamed S. Al-Raweshidy

:
A cross layer rate adaptation solution for IEEE 802.11 networks. 1638-1652
Volume 31, Number 9, June 2008
- Saleh Yousefi, Eitan Altman, Rachid El Azouzi

, Mahmood Fathy:
Improving connectivity in vehicular ad hoc networks: An analytical study. 1653-1659
- Wei Kuang Lai, Zhen Chang Zheng, Chen-Da Tsai:

Fast reroute with pre-established bypass tunnel in MPLS. 1660-1671 - Lei Guo

, Xingwei Wang, Juan Du, Tengfei Wu:
A new heuristic routing algorithm with Hamiltonian Cycle Protection in survivable networks. 1672-1678 - Keiichi Endo, Minoru Kawahara, Yutaka Takahashi:

Encoding for secure computations in distributed interactive real-time applications. 1679-1686 - Habib M. Ammari, Sajal K. Das

:
A trade-off between energy and delay in data dissemination for wireless sensor networks using transmission range slicing. 1687-1704 - Jui Teng Wang:

Centralized and distributed joint dual transmitter receiver diversity and power control for wireless networks. 1705-1712 - Guillaume Jourjon, Emmanuel Lochin

, Patrick Sénac:
Design, implementation and evaluation of a QoS-aware transport protocol. 1713-1722 - Xiaolong Qian, Yuanwei Jing, Jing Tian:

Network congestion avoidance strategy with particle filter. 1723-1726 - Yaning Wang, Linghang Fan, Dan He, Rahim Tafazolli

:
Performance comparison of scheduling algorithms in network mobility environment. 1727-1738 - Chung-Pyo Hong, Charles C. Weems, Shin-Dug Kim:

An effective vertical handoff scheme based on service management for ubiquitous computing. 1739-1750 - Sahadeb Jana, Debashis Saha

, Amitava Mukherjee
, Pranay Chaudhuri:
A novel approach for assigning wavelengths in multihop WDM optical networks. 1751-1762 - Fatma Bouabdallah

, Nizar Bouabdallah:
The tradeoff between maximizing the sensor network lifetime and the fastest way to report reliably an event using reporting nodes' selection. 1763-1776 - Massoud Hadian Dehkordi, Samaneh Mashhadi

:
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves. 1777-1784 - Maode Ma, Qichao Zhu:

Providing delay guaranteed service in CDMA wireless networks. 1785-1795 - Imran Raza

, Syed Asad Hussain:
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. 1796-1802 - Agustín Orfila, Javier Carbó

, Arturo Ribagorda:
Autonomous decision on intrusion detection with trained BDI agents. 1803-1813 - I-Shyan Hwang, Zen-Der Shyu, Liang-Yu Ke, Chun-Che Chang:

A novel early DBA mechanism with prediction-based fair excessive bandwidth allocation scheme in EPON. 1814-1823 - Juan Echagüe

, Jesús E. Villadangos
, Vicent Cholvi
, Manuel Prieto:
Transforming general networks into feed-forward by using turn-prohibition. 1824-1831 - Chia-Hsin Cheng, Jen-Yung Lin, Jyh-Horng Wen, Chao-Kai Wen

:
On the performance of O3BPSK LDD with diversity combining techniques over fading channels. 1832-1841 - Liansheng Tan, Li Jin, Yi Pan:

Efficient placement of proxies for hierarchical reliable multicast. 1842-1855
Volume 31, Number 10, June 2008
- Désiré Oulaï Khyda, Steven Chamberland, Samuel Pierre:

Routing and admission control with multiconstrained end-to-end quality of service in MPLS networks. 1857-1864 - Chin-Chi Wu, Hsien-Ming Wu, Woei Lin:

High-performance packet scheduling to provide relative delay differentiation in future high-speed networks. 1865-1876 - Shikha Srivastava, Subrat Kar:

Analysis of UMTS radio channel access delay. 1877-1889 - Mohamed Tekala, Róbert Szabó:

Dynamic adjustment of Scalable TCP congestion control parameters. 1890-1900 - Young-Long Chen, Yung-Sheng Lin, Jyu-Wei Wang, Jyh-Horng Wen:

Adaptive fuzzy-based rate management and power control in multimedia CDMA cellular systems. 1901-1910 - Jianxin Wang, Liang Rong, Yunhao Liu:

Design of a stabilizing AQM controller for large-delay networks based on internal model control. 1911-1918 - Jun Yu, Ling Chen, Gencai Chen:

Fuzzy priority based overlay multicast. 1919-1933 - Hadi Otrok

, Mona Mehrandish, Chadi Assi, Mourad Debbabi
, Prabir Bhattacharya:
Game theoretic models for detecting network intrusions. 1934-1944 - Marko Hölbl

, Tatjana Welzer, Bostjan Brumen
:
Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol. 1945-1951 - Jia Xu, Zhi Li, Qian-Mu Li, Feng-Yu Liu:

An adaptive clustering routing transition protocol in ad hoc networks. 1952-1960 - Zuhua Shao:

Fair exchange protocol of signatures based on aggregate signatures. 1961-1969 - Satish Chand, Bijendra Kumar

, Hari Om:
Patching-based broadcasting scheme for video services. 1970-1978 - Konstantinos Kalpakis, Shilang Tang:

Collaborative data gathering in wireless sensor networks using measurement co-occurrence. 1979-1992 - Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai:

Multiple-resource request scheduling for differentiated QoS at website gateway. 1993-2004 - Wujuan Lin, Bharadwaj Veeravalli:

Design and analysis of an adaptive object replication algorithm in distributed network systems. 2005-2015 - Christian Makaya, Samuel Pierre:

Enhanced fast handoff scheme for heterogeneous wireless networks. 2016-2029 - Jung-Chun Liu, Hann-Jang Ho, Sing-Ling Lee:

Optimization of logical rings for multi-hop transmissions in WDM optical star networks. 2030-2038 - Chieh-Ling Huang, Pau-Choo Chung, Ming-Hua Tsai, Yen-Kuang Yang, Yu-Chia Hsu:

Reliability improvement for an RFID-based psychiatric patient localization system. 2039-2048 - Kimaya Mittal, Elizabeth M. Belding, Subhash Suri:

A game-theoretic analysis of wireless access point selection by mobile users. 2049-2062 - Mingon Kim, JungYul Choi, Minho Kang:

Trade-off guidelines for power management mechanism in the IEEE 802.16e MAC. 2063-2070 - Xiaonan Wang:

Analysis and design of a k-Anycast communication model in IPv6. 2071-2077 - Jenq-Shiou Leu:

A lightweight brokering system for content/service charging in a cellular network centric business model. 2078-2085 - Mohammad Fraiwan, G. Manimaran:

Link stress reduction in topology-aware overlay path monitoring. 2086-2093 - Christian Makaya, Samuel Pierre:

Adaptive handoff scheme for heterogeneous IP wireless networks. 2094-2108 - Joseph S. Kong, Jesse S. A. Bridgewater, Vwani P. Roychowdhury:

Resilience of structured P2P systems under churn: The reachable component method. 2109-2123 - Jyh-Horng Wen, Gwo-Ruey Lee, Jia-Wei Liu, Te-Lung Kung:

Frame synchronization, channel estimation scheme and signal compensation using regression method in OFDM systems. 2124-2130 - Wen-Hwa Liao, Wan-Chi Wu:

Effective hotspot storage management schemes in wireless sensor networks. 2131-2141 - Fengjiao Wang, Yuqing Zhang:

A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. 2142-2149 - Qian Wu, Mingwei Gong, Carey L. Williamson:

TCP fairness issues in IEEE 802.11 wireless LANs. 2150-2161 - Dong-Hee Kwon, Woo-Jae Kim, Young-Joo Suh:

An efficient mobile multicast mechanism for fast handovers: A study from design and implementation in experimental networks. 2162-2177 - Omer Mahmoud, Farhat Anwar, Momoh-Jimoh E. Salami:

Simulation and analysis of an admission control mechanism for MPLS DS-TE. 2178-2184 - Evgueni Doukhnitch

, Muhammed Salamah:
General approach to simple algorithms for 2-D positioning techniques in cellular networks. 2185-2194 - Gang Zhao, Xiangqian Liu, Min-Te Sun, Xiaoli Ma:

Energy-efficient geographic routing with virtual anchors based on projection distance. 2195-2204 - Jia-Yong Liu, An-Min Zhou, Min-Xu Gao:

A new mutual authentication scheme based on nonce and smart cards. 2205-2209 - Osama S. Youness

, Wail S. El-Kilani
, Waiel F. Abd El-Wahed:
A behavior and delay equivalent petri net model for performance evaluation of communication protocols. 2210-2230 - Chenn-Jung Huang

, Yi-Ta Chuang, Chih-Tai Guan, Yun-Cheng Luo, Kai-Wen Hu, Chun-Hua Chen:
A hybrid priority-based video-on-demand resource sharing scheme. 2231-2241 - Hala ElAarag, Andrew Moedinger, Chris Hogg:

TCP friendly protocols for media streams over heterogeneous wired-wireless networks. 2242-2256 - Lei Shi, Changbin Liu, Bin Liu:

Network utility maximization for triple-play services. 2257-2269 - Hsiang-Fu Yu, Ying-Nan Chen, Hung-Chang Yang, Zeng-Yuan Yang, Li-Ming Tseng:

An efficient scheme for broadcasting popular videos at low buffer demand. 2270-2279 - Ben-Jye Chang, Yan-Ling Chen:

Adaptive hierarchical polling and Markov decision process based CAC for increasing network reward and reducing average delay in IEEE 802.16 WiMAX networks. 2280-2292 - Jukka Manner, Simone Leggio, Tommi Mikkonen, Jussi Saarinen, Pekka Vuorela, Antti Ylä-Jääski:

Seamless service interworking of ad-hoc networks and the Internet. 2293-2307 - Gang Cheng, Nirwan Ansari

, Symeon Papavassiliou:
Adaptive QoS provisioning by pricing incentive QoS routing for next generation networks. 2308-2318 - Jingyu Wang

, Jianxin Liao, Xiaomin Zhu:
Latent Handover: A flow-oriented progressive handover mechanism. 2319-2340 - Yuan-Cheng Lai, Yu-Chin Szu:

Achieving proportional loss rate differentiation in a wireless network with a multi-state link. 2341-2349 - Shiao-Li Tsao, You-Lin Chen:

Energy-efficient packet scheduling algorithms for real-time communications in a mobile WiMAX system. 2350-2359 - Mohamed R. M. Rizk

, Moawad I. Dessouky
, Sami A. El-Dolil, Mohammed Abd-Elnaby:
Near optimal fair delay based resource allocation for video traffic over wireless multimedia system. 2360-2366 - Joachim Fabini, Rudolf Pailer, Peter Reichl:

Location-based assisted handover for the IP Multimedia Subsystem. 2367-2380 - Ben-Jye Chang, Chien-Ming Chou, Ying-Hsin Liang:

Markov chain analysis of uplink subframe in polling-based WiMAX networks. 2381-2390 - Xuetao Wei, Lemin Li, Hongfang Yu:

An improved lightpath allocation for grade of services in survivable WDM mesh networks. 2391-2397 - Yan Jin, Ju-Yeon Jo, Ling Wang, Yoohwan Kim, Xiaozong Yang:

ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks. 2398-2407 - Alexandre Viejo

, Francesc Sebé
, Josep Domingo-Ferrer:
Secure and scalable many-to-one symbol transmission for sensor networks. 2408-2413 - Jin Myoung Kim, Tae Ho Cho:

A*-based key tree structure generation for group key management in wireless sensor networks. 2414-2419 - Yin-Fu Huang, Kun-Hao Lin:

Global data allocation based on user behaviors in mobile computing environments. 2420-2427 - Show-Shiow Tzeng, Hsin-Yi Lu:

Dual-threshold admission control for non-real-time traffic in wireless data networks. 2428-2434 - Xingwei Wang, Lei Guo, Xuetao Wei, Weigang Hou, Fei Yang, Lan Pang:

Survivability in waveband switching optical networks: Challenges and new ideas. 2435-2442 - Sven Ehlert, Ge Zhang, Dimitris Geneiatakis, Georgios Kambourakis

, Tasos Dagiuklas, Jirí Markl, Dorgham Sisalem:
Two layer Denial of Service prevention on SIP VoIP infrastructures. 2443-2456 - Andrei V. Gurtov

, Dmitry G. Korzun
, Andrey Lukyanenko, Pekka Nikander:
Hi3: An efficient and secure networking architecture for mobile hosts. 2457-2467 - Jianxin Wang, Liang Rong, Yunhao Liu:

A robust proportional controller for AQM based on optimized second-order system model. 2468-2477 - Jesús Téllez Isaac, José Sierra Camara

, Sherali Zeadally, Joaquín Torres Márquez:
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. 2478-2484 - Luca Caviglione

, Franco Davoli
:
Traffic volume analysis of a nation-wide eMule community. 2485-2495 - Wen-Hwa Liao

, Kuei-Ping Shih
, Yu-Chee Lee:
A localization protocol with adaptive power control in wireless sensor networks. 2496-2504 - Rana Forsati, A. T. Haghighat, Mehrdad Mahdavi:

Harmony search based algorithms for bandwidth-delay-constrained least-cost multicast routing. 2505-2519 - Der-Rong Din, Yu-Sheng Chiu:

A genetic algorithm for solving virtual topology reconfiguration problem in survivable WDM networks with reconfiguration constraint. 2520-2533 - Chun-Ta Li

, Min-Shiang Hwang, Chi-Yu Liu:
An electronic voting protocol with deniable authentication for mobile ad hoc networks. 2534-2540 - Satoshi Utsumi, Salahuddin Muhammad Salim Zabir, Norio Shiratori:

TCP-Cherry: A new approach for TCP congestion control over satellite IP networks. 2541-2561 - M. Sabrigiriraj

, M. Meenakshi
:
All-to-all broadcast in optical WDM networks under light-tree model. 2562-2565 - Keen-Mun Yong, Gee-Swee Poo, Tee-Hiang Cheng:

Proactive rearrangement in delay constrained dynamic membership multicast. 2566-2580 - Lianghui Ding, Xinbing Wang, Youyun Xu, Wenjun Zhang:

Improve throughput of TCP-Vegas in multihop ad hoc networks. 2581-2588 - Yoshihiro Ito, Shuji Tasaka

:
Feasibility of QoS control based on QoS mapping over IP networks. 2589-2595 - S. Y. Wang, C. C. Lin, C. L. Chou:

Implementing and evaluating three routing protocols in dual-radio-dual-mode IEEE 802.11(b) wireless mesh networks. 2596-2606
- Meriem Kassar, Brigitte Kervella, Guy Pujolle:

An overview of vertical handover decision strategies in heterogeneous wireless networks. 2607-2620 - Sunhun Lee, Kwangsue Chung:

Buffer-driven adaptive video streaming with TCP-friendliness. 2621-2630
- Yun-Sheng Yen, Yi-Kung Chan, Han-Chieh Chao

, Jong Hyuk Park:
A genetic algorithm for energy-efficient based multicast routing on MANETs. 2632-2641
Volume 31, Number 11, July 2008
- Sherali Zeadally, Bin Wei, Björn Landfeldt:

End-to-end support over Heterogeneous Wired-Wireless Networks. 2643-2645
- Mari Carmen Domingo

, David Remondo
:
QoS support between ad hoc networks and fixed IP networks. 2646-2655 - Chih-Heng Ke, Naveen K. Chilamkurti:

A new framework for MPEG video delivery over heterogeneous networks. 2656-2668 - Myungjin Lee, Moonsoo Kang, Myungchul Kim, Jeonghoon Mo:

A cross-layer approach for TCP optimization over wireless and mobile networks. 2669-2675 - Árpád Huszák, Sándor Imre

:
Source controlled semi-reliable multimedia streaming using selective retransmission in DCCP/IP networks. 2676-2684 - Preetam Ghosh

, Kalyan Basu, Sajal K. Das
:
Improving end-to-end quality-of-service in online multi-player wireless gaming networks. 2685-2698 - Nicolas Van Wambeke, François Armando, Christophe Chassot, Ernesto Exposito

:
A model-based approach for self-adaptive Transport protocols. 2699-2705 - Abdelhamid Mellouk, Said Hoceini, Mustapha Cheurfa:

Reinforcing probabilistic selective Quality of Service routes in dynamic irregular networks. 2706-2715 - Azzedine Boukerche, Richard Werner Nelem Pazzi

, Jing Feng:
An end-to-end virtual environment streaming technique for thin mobile devices over heterogeneous networks. 2716-2725 - Hung-Yun Hsieh, Chung-Wei Li, Shuo-Wei Liao, Yu-Wen Chen

, Tsung-Lin Tsai, Hsiao-Pu Lin:
Moving toward end-to-end support for handoffs across heterogeneous telephony systems on dual-mode mobile devices. 2726-2738 - Luis Loyola, Paulo Mendes

, Monica Jimenez Abelleira:
Organizational virtual zones: Control of Internet edges using multi-level flat identifiers. 2739-2754 - Hyung-Soo Park, Hyung-Woo Lee, Dong Hoon Lee, Hong-Ki Ko:

Multi-protocol authentication for SIP/SS7 mobile network. 2755-2763
Volume 31, Number 12, July 2008
- Han-Chieh Chao

, Sherali Zeadally:
Mobility protocols for ITS/VANET. 2765-2766
- Yao Hua Ho, Ai Hua Ho, Kien A. Hua:

Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments. 2767-2780 - Govardhanan Kousalya

, P. Narayanasamy, Jong Hyuk Park, Tai-Hoon Kim:
Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS. 2781-2789 - Paolo Cencioni, Roberto Di Pietro

:
A mechanism to enforce privacy in vehicle-to-infrastructure communication. 2790-2802 - Chun-Ta Li

, Min-Shiang Hwang, Yen-Ping Chu:
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. 2803-2814 - Chung-Ming Huang, Meng-Shu Chiang, Tz-Heng Hsu:

PFC: A packet forwarding control scheme for vehicle handover over the ITS networks. 2815-2826 - Neng-Wen Wang, Yueh-Min Huang, Wei-Ming Chen:

A novel secure communication scheme in vehicular ad hoc networks. 2827-2837 - Azzedine Boukerche, Horacio A. B. F. de Oliveira, Eduardo Freire Nakamura

, Antonio Alfredo Ferreira Loureiro:
Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems. 2838-2849 - José Santa

, Antonio Fernandez Gómez-Skarmeta
, Marc Sánchez Artigas:
Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks. 2850-2861 - Lalit Kane

, Bhupendra Verma
, Sanjeev Jain:
Vehicle tracking in public transport domain and associated spatio-temporal query processing. 2862-2869 - Liang Zhou, Baoyu Zheng, Benoit Geller

, Anne Wei, Shan Xu, Yajun Li:
Cross-layer rate control, medium access control and routing design in cooperative VANET. 2870-2882 - Gongjun Yan, Stephan Olariu, Michele C. Weigle

:
Providing VANET security through active position detection. 2883-2897 - Ehsan Karamad, Farid Ashtiani:

A modified 802.11-based MAC scheme to assure fair access for vehicle-to-roadside communications. 2898-2906 - Jérôme Härri

, Christian Bonnet
, Fethi Filali
:
Kinetic mobility management applied to vehicular ad hoc network protocols. 2907-2924 - Wei-Hsun Lee, Shian-Shyong Tseng, Ching-Hung Wang:

Design and implementation of electronic toll collection system based on vehicle positioning system techniques. 2925-2933
Volume 31, Number 13, August 2008
- José Neuman de Souza

, John Strassner:
Self-organization and self-management in communications as applied to autonomic networks. 2935-2936
- Peng Jiang, John Bigham, Jiayi Wu:

Self-organizing relay stations in relay based cellular networks. 2937-2945 - Yingji Zhong, Kyung Sup Kwak, Dongfeng Yuan:

A novel cross layer game knowledge sharing algorithm based on neural fuzzy connection admission controller for cellular Ad Hoc networking. 2946-2950 - Kyungmin Park, Young Yong Kim:

Analysis of AntNet routing scheme by using queueing model. 2951-2958 - Yuanyuan Zhang, Dawu Gu, Juanru Li:

Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks. 2959-2971 - Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz

, Farouk Kamoun
:
CASAN: Clustering algorithm for security in ad hoc networks. 2972-2980 - Steven Davy

, Brendan Jennings
, John Strassner:
The policy continuum-Policy authoring and conflict analysis. 2981-2995 - Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara

:
Policy-based BGP-control architecture for inter-AS routing adjustment. 2996-3002 - Karim Guennoun, Khalil Drira, Nicolas Van Wambeke, Christophe Chassot, François Armando, Ernesto Exposito

:
A framework of models for QoS-oriented adaptive deployment of multi-layer communication services in group cooperative activities. 3003-3017 - Falko Dressler

:
A study of self-organization mechanisms in ad hoc and sensor networks. 3018-3029 - Evangelos Pournaras, Georgios Exarchakos

, Nick Antonopoulos:
Load-driven neighbourhood reconfiguration of Gnutella overlay. 3030-3039 - Dario Bottazzi, Rebecca Montanari

, Giovanni Rossi:
A self-organizing group management middleware for mobile ad-hoc networks. 3040-3048 - Jorge E. López de Vergara

, Víctor A. Villagrá
, Carlos Fadón, Juan Manuel González, José A. Lozano, Manuel Alvarez-Campana
:
An autonomic approach to offer services in OSGi-based home gateways. 3049-3058
Volume 31, Number 14, September 2008
- Xin-Xin Ma, Zhi-Guang Qin:

Partition and multi-path transmission: An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network. 3059-3063
- M. A. Elshaikh, Mohamed Othman, Subramaniam Shamala, Jalil M. Desa:

A new fair marker algorithm for DiffServ networks. 3064-3070 - Mehmet Hakan Karaata, Rachid Hadid:

An optimal snap-stabilizing wave algorithm in arbitrary graphs. 3071-3077 - Vidhyacharan Bhaskar:

A closed queuing network model with multiple servers for multi-threaded architecture. 3078-3089 - Mehammed Daoui, Abdelaziz Mzoughi, Mustapha Lalam, Malika Belkadi, Rachida Aoudjit:

Mobility prediction based on an ant system. 3090-3097 - Wei Kuang Lai, Chen-Da Tsai, Chin-Shiuh Shieh:

Dynamic appointment of ABR for the OSPF routing protocol. 3098-3102 - Min-Xiou Chen:

Efficient integration OVSF code management strategies in UMTS. 3103-3112 - Jue-Sam Chou

, Yalin Chen, Tsung-Heng Chen:
An efficient session key generation for NTDR networks based on bilinear paring. 3113-3123 - Kuei-Ping Shih

, Sheng-Shih Wang
, Hung-Chang Chen, Pao-Hwa Yang:
CollECT: Collaborative event detection and tracking in wireless heterogeneous sensor networks. 3124-3136 - Luis A. Villaseñor-González, Ana L. Gonzalez-Sanchez, Jaime Sánchez-García

, Raul Aquino-Santos:
Macromobility support for mobile ad hoc networks using IPv6 and the OLSR routing protocol. 3137-3144 - Rung-Shiang Cheng, Hui-Tang Lin:

A cross-layer design for TCP end-to-end performance improvement in multi-hop wireless networks. 3145-3152 - Desislava C. Dimitrova, Georgios Karagiannis, Pieter-Tjerk de Boer:

Severe congestion handling approaches in NSIS RMD domains with bi-directional reservations. 3153-3162 - Jin-Han Jeon, Seung-Chul Son, Ji-Seung Nam:

Overlay multicast tree recovery scheme using a proactive approach. 3163-3168 - Kyung-Joon Park

, Chong-Ho Choi:
Optimization driven bandwidth provisioning in service overlay networks. 3169-3177 - John Felix Charles Joseph, Amitabha Das, Boon-Chong Seet, Bu-Sung Lee

:
Opening the Pandora's Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks. 3178-3189 - Adel Ali Ahmed

, Norsheila Fisal:
A real-time routing protocol with load distribution in wireless sensor networks. 3190-3203 - JungRyun Lee, DongHo Cho:

An optimal power-saving class II for VoIP traffic and its performance evaluations in IEEE 802.16e. 3204-3208 - Lorenzo Bettini

:
Timed buffers: A technique for update propagation in nomadic environments. 3209-3222 - Pranay Chaudhuri, Thomas Edward:

An algorithm for k-mutual exclusion in decentralized systems. 3223-3235 - Qinghai Yang, Kyung Sup Kwak:

Multiuser channel estimation and prediction in two dimensions for MIMO-OFDM uplinks. 3236-3241 - Cao Yuan, Liansheng Tan, Lachlan L. H. Andrew, Wei Zhang, Moshe Zukerman

:
A Generalized FAST TCP scheme. 3242-3249 - Min-Shiang Hwang, Cheng-Chi Lee

, Song-Kong Chong:
An improved address ownership in mobile IPv6. 3250-3252 - Huiqing Wang, Kin Choong Yow

:
A QoS framework to support integrated services in multihop wireless networks with infrastructure support. 3253-3266 - Kshirasagar Naik, David S. L. Wei, Stephan Olariu:

Utilizing the synchrony among base stations for better performance of channel assignment algorithms. 3267-3274 - Chung-Ming Huang, Ming-Sian Lin, Hon-Long Wong:

The handoff control scheme for computing powerless devices and its applications in the digital home network. 3275-3285 - Kshirasagar Naik, David S. L. Wei, Yu T. Su

, Norio Shiratori:
A random graph-based model to analyze packet interference between frequency hopping systems with an application to Bluetooth. 3286-3291 - Jaehoon Jung, Seunghak Lee, Namgi Kim, Hyunsoo Yoon:

Efficient service discovery mechanism for wireless sensor networks. 3292-3298 - Hiroshi Tsunoda, Kohei Ohta, Atsunori Yamamoto, Nirwan Ansari

, Yuji Waizumi, Yoshiaki Nemoto:
Detecting DRDoS attacks by a simple response packet confirmation mechanism. 3299-3306 - Pierluigi Salvo Rossi, Francesco Palmieri

:
On time diversity for packet channels. 3307-3314 - Christos Xenakis

, Christoforos Ntantogian
, Ioannis Stavrakakis
:
A network-assisted mobile VPN for securing users data in UMTS. 3315-3327 - Andrea Baiocchi, Alfredo Todini:

Power-delay trade-off in a many-to-many wireless access. 3328-3336 - Chansophea Chuon, Sumanta Guha:

Individual profile graphs for location management in PCS networks. 3337-3343 - James Aweya, Michel Ouellette, Delfin Y. Montuno, Kent Felske:

Design of rate-based controllers for active queue management in TCP/IP networks. 3344-3359 - Mikhail Smirnov:

On model-driven self-engineering of inter-domain traffic. 3360-3371 - Joon Yoo, Haiyun Luo, Chong-kwon Kim:

Joint uplink/downlink opportunistic scheduling for Wi-Fi WLANs. 3372-3383 - Sajjad Zarifzadeh, Nasser Yazdani:

Joint resource conserving and load distributing approaches for routing of survivable connections. 3384-3393 - Kostas Tsagkaris

, Apostolos Katidiotis, Panagiotis Demestichas
:
Neural network-based learning schemes for cognitive radio systems. 3394-3404 - Taskin Koçak

, Mohit Jagetia:
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation. 3405-3409 - Jang-Ping Sheu, Shin-Chih Tu, Chi-Hung Hsu:

Location-free topology control protocol in wireless ad hoc networks. 3410-3419 - Qixu Liu, Yuqing Zhang:

TFTP vulnerability finding technique based on fuzzing. 3420-3426 - Jingnan Yao, Jiani Guo, Laxmi N. Bhuyan:

Fair link striping with FIFO delivery on heterogeneous channels. 3427-3437 - Jaime Lloret, Carlos Enrique Palau

, Fernando Boronat
, Jesús Tomás:
Improving networks using group-based topologies. 3438-3450 - Ataul Bari, Arunita Jaekel, Subir Bandyopadhyay:

Clustering strategies for improving the lifetime of two-tiered sensor networks. 3451-3459 - Stergios D. Spanos, Apostolos Meliones, George I. Stassinopoulos:

The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface. 3460-3468 - Myeong-Hyeon Lee, Yoon-Hwa Choi:

Fault detection of wireless sensor networks. 3469-3475 - Spiridon Bakiras

, Feng Wang, Dimitris Papadias, Mounir Hamdi
:
Vertical dimensioning: A novel DRR implementation for efficient fair queueing. 3476-3484 - Yu Wang, Lemin Li, Du Xu:

Pervasive QoS routing in next generation networks. 3485-3491 - Chu-Fu Wang, Jen-Wen Ding:

The optimum sensor redeployment scheme using the most frangible clusters set. 3492-3502 - Marcos Postigo-Boix

, José Luis Melús-Moreno:
Utilization-based prices for elastic services. 3503-3509 - Yuxia Lin, Vincent W. S. Wong

:
An admission control algorithm for multi-hop 802.11e-based WLANs. 3510-3520 - Peerapon Siripongwutikorn, Bundit Thipakorn:

Mobility-aware topology control in mobile ad hoc networks. 3521-3532 - Xingwei Wang, Lei Guo

, Ting Yang, Wei Ji, Ying Li, Xin Liu, Yu Zhang:
New routing algorithms in trustworthy Internet. 3533-3536
- Shuo Ding:

A survey on integrating MANETs with the Internet: Challenges and designs. 3537-3551
Volume 31, Number 15, September 2008
- Hojin Ha, Changhoon Yim

, Young Yong Kim:
Cross-layer multiuser resource allocation for video communication over OFDM networks. 3553-3563 - Naouel Ben Ali, Abdelfattah Belghith

, Joanna Moulierac, Miklós Molnár
:
QoS multicast aggregation under multiple additive constraints. 3564-3578 - Huifang Chen, Hiroshi Mineno

, Tadanori Mizuno:
Adaptive data aggregation scheme in clustered wireless sensor networks. 3579-3585 - Nadeem Jamali, Hongxing Geng:

A mailbox ownership based mechanism for curbing spam. 3586-3593 - Hanh Van Nguyen, Soonghwan Ro, Jungkwan Ryu:

Simplified fast handover in mobile IPv6 networks. 3594-3603 - Vicent Cholvi

, Juan Segarra
:
Analysis and placement of storage capacity in large distributed video servers. 3604-3612 - Yu-Fen Kao, Jen-Hung Huang:

Price-based resource allocation for wireless ad hoc networks with multi-rate capability and energy constraints. 3613-3624 - Paulo Sérgio Sausen

, José Renato de Brito Sousa, Marco Aurélio Spohn
, Angelo Perkusich
, Antonio Marcus Nogueira de Lima
:
Dynamic Power Management with Scheduled Switching Modes. 3625-3637 - Xu Zhang, Qiang Gao, Jun Zhang, Gang Wang:

Impact of transmit power on throughput performance in wireless ad hoc networks with variable rate control. 3638-3642 - Bo Zhou, Qi Shi

, Madjid Merabti:
Balancing intrusion detection resources in ubiquitous computing networks. 3643-3653 - Xuguang Shao, Liren Zhang, Ping Shum

:
Modeling and performance analysis of realizable optical queue with service differentiation capability. 3654-3661 - Hanane Fathi, SeongHan Shin

, Kazukuni Kobara
, Hideki Imai:
Protocols for purpose-restricted anonymous communications in IP-based wireless networks. 3662-3671 - Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Park

:
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast. 3672-3682 - Ke Zhang, Cheng Peng Fu:

An enhancement of TCP Veno with forward acknowledgement. 3683-3690 - Marco Benini, Sabrina Sicari:

Risk assessment in practice: A real case study. 3691-3699 - Hichem Ayed Harhira, Samuel Pierre:

Joint routing and admission control problem under statistical delay and jitter constraints in MPLS networks. 3700-3706 - Ramanarayana Kandikattu, Lillykutty Jacob:

A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6). 3707-3718 - Jung Yeon Hwang, Kyu Young Choi

, Dong Hoon Lee:
Security weakness in an authenticated group key agreement protocol in two rounds. 3719-3724 - Ching-Wen Chen, Chuan-Chi Weng, Chang-Jung Ku:

Design of a low power and low latency MAC protocol with node grouping and transmission pipelining in wireless sensor networks. 3725-3738
Volume 31, Number 16, October 2008
- Mohammad S. Obaidat

:
Guest editorial: Performance evaluation of communication networks. 3739-3740
- Rosario Giuseppe Garroppo

, Stefano Giordano, Michele Pagano
, Gregorio Procissi
:
On traffic prediction for resource allocation: A Chebyshev bound based allocation scheme. 3741-3751 - Noureddine Boudriga, Mohammad S. Obaidat

, Faouzi Zarai
:
Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis. 3752-3759 - Jingxiang Luo, Carey L. Williamson:

Performance implications of fluctuating server capacity. 3760-3770 - Phuong Nga Tran, Ulrich Killat:

Resource efficient logical topology design for IP-over-WDM backbone networks. 3771-3777 - Per Hurtig, Anna Brunström:

Enhancing SCTP loss recovery: An experimental evaluation of early retransmit. 3778-3788 - Go Hasegawa

, Takeshi Tomioka, Kentarou Tada, Masayuki Murata
:
Simulation studies on router buffer sizing for short-lived and pacing TCP flows. 3789-3798 - Thomas A. Babbitt, Christopher Morrell, Boleslaw K. Szymanski

, Joel W. Branch:
Self-selecting reliable paths for wireless sensor network routing. 3799-3809 - Xianren Wu, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves, Hui Xu:

A hybrid view of mobility in MANETs: Analytical models and simulation study. 3810-3821 - Laurence A. Hey:

Reduced complexity algorithms for cognitive packet network routers. 3822-3830 - Pravin Pawar, Bert-Jan van Beijnum, Marten van Sinderen

, Akshai Aggarwal, Pierre Maret, Frédéric De Clercq:
Performance evaluation of the context-aware handover mechanism for the nomadic mobile services in remote patient monitoring. 3831-3842 - Floriano De Rango, Juan-Carlos Cano

, Marco Fotino, Carlos Miguel Tavares Calafate
, Pietro Manzoni
, Salvatore Marano:
OLSR vs DSR: A comparative analysis of proactive and reactive mechanisms from an energetic point of view in wireless ad hoc networks. 3843-3854 - Chandrasekar Ramachandran

, Sudip Misra, Mohammad S. Obaidat
:
FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks. 3855-3869 - Hongbin Chen, Chi Kong Tse

, Jiuchao Feng:
Performance evaluation of source extraction in wireless sensor networks. 3870-3875 - Luca Caviglione

, Cristiano Cervellera, Franco Davoli
, Filippo Aldo Grassia:
Optimization of an eMule-like modifier strategy. 3876-3882
Volume 31, Number 17, November 2008
- Ling-Jyh Chen

, Tony Sun, Bo-Chun Wang, M. Y. Sanadidi, Mario Gerla:
PBProbe: A capacity estimation tool for high speed networks. 3883-3893 - Lynda Mokdad, Hind Castel-Taleb:

Stochastic comparisons: A methodology for the performance evaluation of fixed and mobile networks. 3894-3904 - José Villalón

, Pedro Cuenca
, Luis Orozco-Barbosa
, Antonio Garrido
:
B-EDCA: A QoS mechanism for multimedia communications over heterogeneous 802.11/802.11e WLANs. 3905-3921 - Iftekhar Ahmad

, Joarder Kamruzzaman
, Daryoush Habibi
:
Rerouting in advance for preempted IR calls in QoS-enabled networks. 3922-3928 - Yong Ho Kim, Dong Hoon Lee:

An authentication scheme for filtering injected bogus data in sensor networks. 3929-3932 - Tinus Strauss, Derrick G. Kourie, Martin S. Olivier

:
A comparison of simulated traffic conditioner performance. 3933-3940 - Suat Özdemir

:
Functional reputation based reliable data aggregation and transmission for wireless sensor networks. 3941-3953 - Mohamed Ashour, Tho Le-Ngoc:

Priority queuing of long-range dependent traffic. 3954-3963 - Wesley Chee-Wah Tan, Sanjay K. Bose

:
Throughput and lifetime performance of cost-credit-based routing protocols for power constrained ad hoc networks. 3964-3977 - Polychronis Koutsakis

:
A new framework for multiple access and call admission control in wireless cellular networks. 3978-3983 - K. Vijayalakshmi, S. Radhakrishnan:

Artificial immune based hybrid GA for QoS based multicast routing in large scale networks (AISMR). 3984-3994 - Jun Wang

, Huan Li, Weijia Jia, Liusheng Huang, Jingyuan Li
:
Interface assignment and bandwidth allocation for multi-channel wireless mesh networks. 3995-4004 - Wei Yu

, Sriram Chellappan, Xun Wang, Dong Xuan:
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. 4005-4017 - Yang Li, Li Guo, Zhihong Tian, Tianbo Lu

:
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms. 4018-4025 - Yoram Revah, Michael Segal

:
Improved bounds for data-gathering time in sensor networks. 4026-4034 - Kiran Anna, Mostafa A. Bassiouni:

A new framework for QoS provisioning in WLANS using p-persistent 802.11 MAC. 4035-4048 - Guillermo L. Taboada

, Juan Touriño
, Ramon Doallo:
Java Fast Sockets: Enabling high-speed Java communications on high performance clusters. 4049-4059 - B. Sathish Babu

, Pallapa Venkataram:
Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS). 4060-4071 - Xiaobo Zhou, Dennis Ippoliti, Liqiang Zhang:

Fair bandwidth sharing and delay differentiation: Joint packet scheduling with buffer management. 4072-4080 - Tz-Heng Hsu, Jyun-Sian Wu:

An application-specific duty cycle adjustment MAC protocol for energy conserving over wireless sensor networks. 4081-4088 - Bo Yang, Yanyan Shen, Gang Feng

, Chengnian Long, Zhong-Ping Jiang, Xinping Guan:
Distributed power control and random access for spectrum sharing with QoS constraint. 4089-4097 - Vidhyacharan Bhaskar, Kondo H. Adjallah

:
A hybrid open queuing network model approach for multi-threaded dataflow architecture. 4098-4106 - Won-Ju Yoon, Sang-Hwa Chung, Seong-Joon Lee:

Implementation and performance evaluation of an active RFID system for fast tag collection. 4107-4116 - Manzar Saeed, Mohammad Saleem Mian:

Methods of finding multiplicative inverses in GF(28). 4117-4123 - Evgueni Doukhnitch, Muhammed Salamah, Emre Ozen:

An efficient approach for trilateration in 3D positioning. 4124-4129 - Khoa N. Le:

Inter-carrier interference power of OFDM in a uniform scattering channel. 4130-4135 - Robert Likic, Darko Bosnjak, Simon Maxwell, Darko Marinovic, Igor Francetic, Nada Cikes:

To VoIP or not to VoIP, is this really the question now? 4136-4137 - Bin Wu, Ajay D. Kshemkalyani

:
Modeling message propagation in random graph networks. 4138-4148 - Ayaz Isazadeh, Mohsen Heydarian:

Optimal multicast multichannel routing in computer networks. 4149-4161 - Anup K. Ghosh, Amitava Mukherjee

, Debashis Saha
:
TCP throughput enhancement in wired-cum-wireless network. 4162-4166 - Patricia Della Méa Plentz, Carlos Montez

, Rômulo Silva de Oliveira
:
Deadline missing predictor based on aperiodic server queue length for distributed systems. 4167-4175 - Thierry Villemur, Emir Hammami:

Design and evaluation of a context-aware service deployment for collaborative sessions. 4176-4191 - Nikolaos Papandreou, Theodore Antonakopoulos:

A low-complexity bandwidth allocation algorithm for frequency-selective multiuser OFDM systems. 4192-4198 - Fucai Zhou, Jun Zhang, Jian Xu:

Research on anonymous signatures and group signatures. 4199-4205 - Zhiquan Bai, Dongfeng Yuan, Kyungsup Kwak:

Performance evaluation of STBC based cooperative systems over slow Rayleigh fading channel. 4206-4211 - Jaehak Yu, Hansung Lee

, Myung-Sup Kim, Daihee Park:
Traffic flooding attack detection with SNMP MIB using SVM. 4212-4219
- Jeng-Feng Weng, Jyh-Cheng Chen, Kai-Wen Cheng:

Comparative study of broadcast and multicast in 3GPP and 3GPP2 networks. 4220-4229
- Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai:

Erratum to "Multiple-resource request scheduling for differentiated QoS at website gateway". 4230
Volume 31, Number 18, December 2008
- Jong Hyuk Park, Hsiao-Hwa Chen, Antonio Coronato

, Gerd Kortuem
:
Secure multi-mode systems and their applications for pervasive computing. 4232-4233 - Marie-Luce Bourguet:

Handling uncertainty in multimodal pervasive computing applications. 4234-4241 - Antonio Coronato

, Giuseppe De Pietro
:
Middleware mechanisms for supporting multimodal interactions in smart environments. 4242-4247 - Soo-Young Kang, Deok-Gyu Lee, Im-Yeong Lee:

A study on secure RFID mutual authentication scheme in pervasive computing environment. 4248-4254 - Chun-Ta Li

, Min-Shiang Hwang, Yen-Ping Chu:
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. 4255-4258 - Chi-Yuan Chen, Tin Yu Wu, Yueh-Min Huang, Han-Chieh Chao

:
An efficient end-to-end security mechanism for IP multimedia subsystem. 4259-4268 - Rabia Riaz

, Ayesha Naureen, Attiya Akram, Ali Hammad Akbar, Ki-Hyung Kim, H. Farooq Ahmed:
A unified security framework with three key management schemes for wireless sensor networks. 4269-4280 - Sheikh Iqbal Ahamed, Moushumi Sharmin:

A trust-based secure service discovery (TSSD) model for pervasive computing. 4281-4293 - Bo Sun, Yang Xiao

, Chung-Chih Li, Hsiao-Hwa Chen, T. Andrew Yang:
Security co-existence of wireless sensor networks and RFID for pervasive computing. 4294-4303 - Chih-Hsiung Tseng, Sheng-Tzong Cheng:

Location management scheme with WLAN positioning algorithm for integrated wireless networks. 4304-4311 - Valentina Casola

, Emilio Pasquale Mancini, Nicola Mazzocca
, Massimiliano Rak
, Umberto Villano:
Self-optimization of secure web services. 4312-4323 - Guorui Li, Jingsha He

, Yingfang Fu:
Group-based intrusion detection system in wireless sensor networks. 4324-4332 - Markos P. Anastasopoulos

, Artemis C. Voulkidis
, Athanasios V. Vasilakos
, Panayotis G. Cottis:
A secure network management protocol for SmartGrid BPL networks: Design, implementation and experimental results. 4333-4342 - Azzedine Boukerche, Yonglin Ren:

A trust-based security system for ubiquitous and pervasive computing environments. 4343-4351 - Bo-Chao Cheng, Huan Chen, Yi-Jean Li, Ryh-Yuh Tseng:

A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks. 4352-4359 - Xuefeng Liang, Naixue Xiong, Laurence Tianruo Yang, Hui Zhang, Jong Hyuk Park:

A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services. 4360-4366 - Ming Lei, Yang Xiao

, Susan V. Vrbsky, Chung-Chih Li:
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing. 4367-4375 - Zhiyong Yu

, Xingshe Zhou, Zhiwen Yu, Jong Hyuk Park, Jianhua Ma:
iMuseum: A scalable context-aware intelligent museum system. 4376-4382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














