


default search action
Computer Communications, Volume 32
Volume 32, Number 1, January 2009
- Yew Fai Wong, Lek Heng Ngoh, Winston Khoon Guan Seah

, Wai-Choong Wong
:
Dual wakeup design for wireless sensor networks. 1-13 - Jianhong Zhang, Jian Mao:

A novel identity-based multi-signcryption scheme. 14-18 - Xinbing Wang, Yun Han, Youyun Xu:

APS-FeW: Improving TCP throughput over multihop adhoc networks. 19-24 - P. P. Deepthi, P. S. Sathidevi:

New stream ciphers based on elliptic curve point multiplication. 25-33 - Yuanqing He, Tianyun Huang:

Objective quality definition of scalable video coding and its application for optimal streaming of FGS-coded videos. 34-40 - Hasan Sözer

, Metin Tekkalmaz, Ibrahim Korpeoglu
:
A peer-to-peer file search and download protocol for wireless ad-hoc networks. 41-50 - Seung Chul Han, Ye Xia:

Network load-aware content distribution in overlay networks. 51-61 - Jie Feng, Zhipeng Ouyang, Lisong Xu, Byrav Ramamurthy

:
Packet reordering in high-speed networks and its impact on high-speed TCP variants. 62-68 - Kuei-Ping Shih

, Wen-Hwa Liao
, Hung-Chang Chen, Chien-Min Chou:
On avoiding RTS collisions for IEEE 802.11-based wireless ad hoc networks. 69-77 - Fernando A. Kuipers, Freek Dijkstra:

Path selection in multi-layer networks. 78-85 - Hamid Shokrzadeh

, A. T. Haghighat, Abbas Nayebi:
New routing framework base on rumor routing in wireless sensor networks. 86-93 - Ai Chen, Dongwook Lee, Gayathri Chandrasekaran, Prasun Sinha:

High throughput MAC layer multicasting over time-varying channels. 94-104 - Li Zhang, Lian-bo Cai, Meng Li, Fa-hui Wang:

A method for least-cost QoS multicast routing based on genetic simulated annealing algorithm. 105-110 - Zizhan Zheng

, Prasun Sinha:
Buffer Coding for Reliable Transmissions over Wireless Networks. 111-123 - Boqing Zhou, Sujun Li, Qiaoliang Li, Xingming Sun, Xiaoming Wang:

An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge. 124-133 - Wan-Seon Lim, Dong-Wook Kim, Young-Joo Suh, Jeong-Jae Won:

Implementation and performance study of IEEE 802.21 in integrated IEEE 802.11/802.16e networks. 134-143 - Liang Dai, Yanchuan Cao, Yi Cui, Yuan Xue:

On scalability of proximity-aware peer-to-peer streaming. 144-153 - Ángel M. Pérez-Bellido, Sancho Salcedo-Sanz, Emilio G. Ortíz-García, Antonio Portilla-Figueras

, Maurizio Naldi
:
A dandelion-encoded evolutionary algorithm for the delay-constrained capacitated minimum spanning tree problem. 154-158 - Hisham A. Mahmoud, Hüseyin Arslan

, Mehmet Kemal Özdemir:
An efficient initial ranging algorithm for WiMAX (802.16e) OFDMA. 159-168 - Peng-Jung Wu, Chung-Nan Lee:

Connection-oriented multi-channel MAC protocol for ad-hoc networks. 169-178 - Khaled Salah

, Abdulhakim Ali Qahtan
:
Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme. 179-188 - Yan Zhang, Jim Mee Ng, Chor Ping Low:

A distributed group mobility adaptive clustering algorithm for mobile ad hoc networks. 189-202 - Stelios Dritsas, Vicky Dritsou, Bill Tsoumas, Panos Constantopoulos

, Dimitris Gritzalis:
OntoSPIT: SPIT management through ontologies. 203-212 - Noshin Bigdeli, Mohammad Haeri

:
CDM-based design and performance evaluation of a robust AQM method for dynamic TCP/AQM networks. 213-229
Volume 32, Number 2, February 2009
- Jui Teng Wang:

Combined switching and power control for diversity and multiplexing in MIMO systems with cochannel interference. 231-234 - Seungwoon Kim, Minwook Lee, Ikjun Yeom:

Impact of bandwidth request schemes for Best-Effort traffic in IEEE 802.16 networks. 235-245 - Stylianos Dimitriou, Vassilis Tsaoussidis

:
Adaptive Head-to-Tail: Active Queue Management based on implicit congestion signals. 246-256 - Zhenyu Li, Zengyang Zhu, Gaogang Xie, Zhongcheng Li:

Fast and proximity-aware multi-source overlay multicast under heterogeneous environment. 257-267 - S. Y. Wang, C. L. Chou, C. C. Lin:

Increasing wide-area download throughputs on the roads by trunking multiple cellular channels over a vehicular ad hoc network. 268-280 - Yu-Chang Chen, Ja-Hsing Hsia, Yi-Ju Liao:

Advanced seamless vertical handoff architecture for WiMAX and WiFi heterogeneous networks with QoS guarantees. 281-293 - Antonio Robles-Gómez

, Aurelio Bermúdez
, Rafael Casado
, Åshild Grønstad Solheim, Thomas Sødring, Tor Skeie:
A new distributed management mechanism for ASI based networks. 294-304 - Gabriel Ioan Ivascu, Samuel Pierre, Alejandro Quintero:

QoS routing with traffic distribution in mobile ad hoc networks. 305-316 - Okan Yilmaz, Ing-Ray Chen:

Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks. 317-323 - Seyed Mohammad Mahdi Alavi, Martin J. Hayes

:
Robust active queue management design: A loop-shaping approach. 324-331 - Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai, Che-Wen Wu:

Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations. 332-342 - Taoyu Li, Yuncheng Zhu, Ke Xu, Maoke Chen:

Performance model and evaluation on geographic-based routing. 343-348 - Yuhua Chen, Oladapo Oguntoyinbo:

Power efficient packet classification using cascaded bloom filter and off-the-shelf ternary CAM for WDM networks. 349-356 - Akbar Ghaffar Pour Rahbar

, Oliver W. W. Yang:
LGRR: A new packet scheduling algorithm for differentiated services packet-switched networks. 357-367 - Mehdi Kadivar, Mohammad Ebrahim Shiri, Mehdi Dehghan

:
Distributed topology control algorithm based on one- and two-hop neighbors' information for ad hoc networks. 368-375 - Timotheos Kastrinogiannis, Symeon Papavassiliou:

Game theoretic distributed uplink power control for CDMA networks with real-time services. 376-385 - Huanlai Xing

, Xin Liu, Xing Jin, Lin Bai, Yuefeng Ji:
A multi-granularity evolution based Quantum Genetic Algorithm for QoS multicast routing problem in WDM networks. 386-393 - Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong

, Dong Hoon Lee:
Constructing PEKS schemes secure against keyword guessing attacks is possible? 394-396 - Der-Rong Din, Chia-Yu Li:

A genetic algorithm for solving virtual source placement problem on WDM networks. 397-408 - Bahri Atay Ozgovde

, Cem Ersoy
:
WCOT: A utility based lifetime metric for wireless sensor networks. 409-418 - Safaa O. Al-Mamory

, Hongli Zhang:
Intrusion detection alarms reduction using root cause analysis and clustering. 419-430 - Wenyu Liu

, Zhenhua Tang, Shuang Zhao:
Transmission distortion estimation for real-time video delivery over hybrid channels with bit errors and packet erasures. 431-438 - Rodolfo Oliveira

, Luís Bernardo
, Paulo Pinto
:
The influence of broadcast traffic on IEEE 802.11 DCF networks. 439-452
Volume 32, Number 3, February 2009
- Hsiao-Hwa Chen, Symeon Papavassiliou, Lingyang Song, Yan Zhang:

Adaptive multicarrier communications and networks. 453-455 - Yun Rui, Honglin Hu, Huiyue Yi

, Hsiao-Hwa Chen, Yueh-Min Huang:
Frequency domain discrete fourier transform spread generalized multi-carrier system and its performance analysis. 456-464 - Eugene Golovins, Neco Ventura

:
Optimisation of the pilot-to-data power ratio in the wireless MIMO-OFDM system with low-complexity MMSE channel estimation. 465-476 - Dimas Mavares Terán

, Rafael P. Torres
:
Space-time code selection for OFDM-MISO systems. 477-481 - Yung-Ping Tu, Wen-Hsien Fang, Hoang-Yang Lu:

Efficient groupwise multiuser detection with iterative soft interference cancellation for multi-rate MC-CDMA. 482-491 - Jingtao Zhang, David W. Matolak:

Multiple level orthogonal codes and their application in MC-CDMA systems. 492-500 - Wenhua Jiao, Linghe Cai, Meixia Tao:

Competitive scheduling for OFDMA systems with guaranteed transmission rate. 501-510 - Najah A. Abu Ali

, Pratik Dhrona, Hossam S. Hassanein
:
A performance study of uplink scheduling algorithms in point-to-multipoint WiMAX networks. 511-521 - Dimitra Zarbouti

, Ioannis Stiakogiannakis
, George V. Tsoulos
, Georgia E. Athanasiadou, Dimitra I. Kaklamani:
OFDMA techniques in multicellular networks with total frequency reuse. 522-530 - Tara Ali-Yahiya, André-Luc Beylot, Guy Pujolle:

An adaptive cross-layer design for multiservice scheduling in OFDMA based mobile WiMAX systems. 531-539 - Li Zhang

, Wei Heng:
Cross-layer adaptive modulation and coding design for space-time block coded MIMO-OFDM systems. 540-545 - Yingji Zhong, Kyung Sup Kwak, Dongfeng Yuan:

Cross layer multicarrier MIMO cognitive cooperation scheme for wireless hybrid ad hoc networks. 546-551 - Jianfeng Guan

, Hongbin Luo, Hongke Zhang, Han-Chieh Chao
, Jong Hyuk Park:
Design and implementation of light-weight mobile multicast for fast MIPv6. 552-559 - Naixue Xiong, Laurence Tianruo Yang, Yingshu Li

:
ODMCA: An adaptive data mining control algorithm in multicarrier networks. 560-567
Volume 32, Number 4, March 2009
- Ahmad Belhoul, Y. Ahmet Sekercioglu

, Nallasamy Mani:
Mobility-Aware RSVP: A framework for improving the performance of multimedia services over wireless IP-based mobile networks. 569-582 - Yanyan Wang, Jia-Yong Liu

, Feng-xia Xiao, Jing Dan:
A more efficient and secure dynamic ID-based remote user authentication scheme. 583-585 - Hua Wang, Zhao Shi, Anfeng Ge, Chaoying Yu:

An optimized ant colony algorithm based on the gradual changing orientation factor for multi-constraint QoS routing. 586-593 - Satish Mahadevan Srinivasan, Azad H. Azadmanesh:

Data aggregation in partially connected networks. 594-601 - Yaohui Lei, Alejandro Quintero, Samuel Pierre:

Mobile services access and payment through reusable tickets. 602-610 - Chin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu:

Enhanced authentication scheme with anonymity for roaming service in global mobility networks. 611-618 - Habib Rostami

, Jafar Habibi, Emad Livani:
Semantic partitioning of peer-to-peer search space. 619-633 - Md. Golam Kaosar, Tarek R. Sheltami

:
Voice transmission over ad hoc network adapting optimum approaches to maximize the performance. 634-639 - Paolo Giacomazzi:

Closed-form analysis of end-to-end network delay with Markov-modulated Poisson and fluid traffic. 640-648 - Han-Cheng Hsiang

, Wei-Kuan Shih:
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards. 649-652 - Achraf Gazdar, Abdelfattah Belghith

:
Interactive slotted stream tapping. 653-661 - Dilip Kumar

, Trilok Chand Aseri, R. B. Patel:
EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. 662-667 - Öznur Özkasap

:
End-to-end epidemic multicast loss recovery: Analysis of scalability and robustness. 668-678 - Satish Chand, Bijendra Kumar

, Hari Om:
Segmented patching broadcasting protocol for video data. 679-684 - Tomaz Dobravec, Borut Robic:

Restricted shortest paths in 2-circulant graphs. 685-690 - Sameer Ladiwala, Ramaswamy Ramaswamy, Tilman Wolf

:
Transparent TCP acceleration. 691-702 - Won-Hyoung Park, Saewoong Bahk:

Resource management policies for fixed relays in cellular networks. 703-711 - Jordi Cucurull-Juan, Ramon Martí

, Guillermo Navarro-Arribas
, Sergi Robles
, B. Overeinder, Joan Borrell
:
Agent mobility architecture based on IEEE-FIPA standards. 712-729 - Bazil Taha Ahmed

, Miguel Calvo-Ramón
:
Infostations for highway cigar-shaped cells. 730-735 - Jorge Munilla

, Alberto Peinado:
Security flaw of Hölbl et al.'s protocol. 736-739 - Kenji Yoshigoe:

Trends in highly scalable crossbar-based packet switch architecture. 740-749 - Minh Huynh, Prasant Mohapatra, Stuart Goose:

Spanning tree elevation protocol: Enhancing metro Ethernet performance and QoS. 750-765 - Yu-Chang Chen:

Next generation CATV networks with QoS guarantees. 766-776 - Xingwei Wang, Lei Guo, Xuekui Wang, Yu Zhang, Xiaobing Zheng, Weigang Hou, Hongming Li, Hongpeng Wang:

A new algorithm based on auxiliary virtual topology for sub-path protection in WDM optical networks. 777-781
Volume 32, Number 5, March 2009
- Jia-Lun Tsai:

Convertible multi-authenticated encryption scheme with one-way hash function. 783-786 - Ali A. Kanso

:
Modified clock-controlled alternating step generators. 787-799 - Lei Ye, Zhijun Wang, Hao Che, Henry C. B. Chan

, Constantino M. Lagoa
:
Utility function of TCP. 800-805 - Rashid A. Saeed

, Hafizal Mohamad, Borhanuddin Mohd Ali:
Dynamic hybrid automatic repeat request (DHARQ) for WiMAX - Mobile multihop relay using adaptive power control. 806-813 - Nikolaos D. Doulamis, Pantelis N. Karamolegkos, Anastasios D. Doulamis

, Ioannis G. Nikolakopoulos:
Exploiting semantic proximities for content search over p2p networks. 814-827 - Bazil Taha Ahmed

, Miguel Calvo-Ramón
:
UMTS-HSDPA in High Altitude Platforms (HAPs) communications with finite transmitted power and unequal cell's load. 828-833 - Kevin F. Chen, Edwin Hsing-Mean Sha, Si-Qing Zheng:

Fast and noniterative scheduling in input-queued switches: Supporting QoS. 834-846 - Byungseung Kim, Hyogon Kim, Saewoong Bahk:

FDF: Frequency detection-based filtering of scanning worms. 847-857 - Rachid Hadid, Mehmet Hakan Karaata:

An adaptive stabilizing algorithm for finding all disjoint paths in anonymous mesh networks. 858-866 - Jacob Engel, Taskin Koçak

:
Off-chip communication architectures for high throughput network processors. 867-879 - Yuhong Zhang, Ezzatollah Salari:

A hybrid channel allocation algorithm with priority to handoff calls in mobile cellular networks. 880-887 - Ioannis Psaras, Vassilis Tsaoussidis

:
On the properties of an adaptive TCP Minimum RTO. 888-895 - Giuseppe Amato

, Antonio Caruso
, Stefano Chessa
:
Application-driven, energy-efficient communication in wireless sensor networks. 896-906 - Bazil Taha Ahmed

, Miguel Calvo-Ramón
:
Uplink multiservice capacity and interference statistics of WCDMA macrocells with antenna diversity reception in a multipath fading environment. 907-912 - Li Tang, Jun Li, Yanda Li, Scott Shenker:

An investigation of the Internet's IP-layer connectivity. 913-926 - Zhi-Ting Lin, Yugui Qu, Xiaofang Zhou, Baohua Zhao:

Analysis and design of mobile Wireless Social Model. 927-934 - Shih-Wei Pan, Jung-Shyr Wu:

Throughput analysis of IEEE 802.11e EDCA under heterogeneous traffic. 935-942 - Shenghai Liu, Suili Feng, Wu Ye, Hongcheng Zhuang:

Slot allocation algorithms in centralized scheduling scheme for IEEE 802.16 based wireless mesh networks. 943-953 - Zhong Fan:

Bandwidth allocation in UWB WPANs with ECMA-368 MAC. 954-960 - Dheeraj K. Klair, Kwan-Wu Chin

, Raad Raad:
On the energy consumption of Pure and Slotted Aloha based RFID anti-collision protocols. 961-973 - Xiaowen Zhang, Hao Zhu, Jinsong Zhang:

RANC: Relay-aided network coding in multi-hop wireless networks. 974-984 - Marzieh Varposhti

, Naser Movahhedinia:
Supporting QoS in IEEE 802.11e wireless LANs over fading channel. 985-991 - Seokhee Lee, JongWon Kim:

Transparency analysis and delay compensation scheme for haptic-based networked virtual environments. 992-999 - Xingwei Wang, Lei Guo

, Cunqian Yu, Dong Wang, Weigang Hou, Ying Li, Chongshan Wang, Xin Liu:
A new heuristic protection algorithm based on survivable integrated auxiliary graph in waveband switching optical networks. 1000-1005 - Sascha Rehbock, Ray Hunt:

Trustworthy clients: Extending TNC to web-based environments. 1006-1013
Volume 32, Number 6, April 2009
- Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Jianxin Li:

Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. 1015-1017 - Sang-Kyun Kim, Min Gyo Chung:

More secure remote user authentication scheme. 1018-1021 - Frans J. M. Panken, Geert Jan Hoekstra:

Multi-service traffic profiles to realise and maintain QoS guarantees in wireless LANs. 1022-1033 - Erl-Huei Lu, Yi-Nan Lin, Wei-Wen Hung:

Improvement of turbo decoding using cross-entropy. 1034-1038 - Yung-Chung Wang, Chwan-Lu Tseng, Ren-Guey Chu, Shu-Ming Tseng

:
Completed analysis of cellular networks with PH-renewal arrival call. 1039-1049 - Haitao Zhao, Emiliano Garcia-Palacios, Jibo Wei, Yong Xi:

Accurate available bandwidth estimation in IEEE 802.11-based ad hoc networks. 1050-1057 - Tingting Chen, Sheng Zhong:

Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks. 1058-1061 - Kyungbaek Kim

:
Dynamic nodeID based heterogeneity aware p2p system. 1062-1071 - Irfan Ahmed

, Mugen Peng
, Wenbo Wang, Syed Ismail Shah:
Joint rate and cooperative MIMO scheme optimization for uniform energy distribution in Wireless Sensor Networks. 1072-1078 - Lei Zhang, Futai Zhang:

A new certificateless aggregate signature scheme. 1079-1085 - Huanlai Xing

, Yuefeng Ji, Lin Bai, Xin Liu, Zhijian Qu, Xiaoling Wang:
An adaptive-evolution-based quantum-inspired evolutionary algorithm for QoS multicasting in IP/DWDM networks. 1086-1094 - Xinchang Zhang, Xiaodong Li, Wanming Luo, Baoping Yan:

An application layer multicast approach based on topology-aware clustering. 1095-1103 - Rachid Beghdad

:
Efficient deterministic method for detecting new U2R attacks. 1104-1110 - Chao Zhang, Weidong Wang, Guo Wei:

Design of ARQ protocols for two-user cooperative diversity systems in wireless networks. 1111-1117 - Raúl Peña-Ortiz

, Julio Sahuquillo
, Ana Pont
, José A. Gil
:
Dweb model: Representing Web 2.0 dynamism. 1118-1128 - Lei Guo, Xuetao Wei, Xingwei Wang:

Erratum to "New routing algorithms in trustworthy Internet" [Computer Communications 31 (2008) 3533-3536]. 1129
Volume 32, Numbers 7-10, May 2009
- Ahmed Mohamed Abdelsalam Ahmed, Ian D. Marsland:

Downlink co-channel interference cancellation in multihop relay networks. 1131-1137 - Hangxing Wu, Fengyuan Ren, Dejun Mu, Xianwu Gong:

An efficient and fair explicit congestion control protocol for high bandwidth-delay product networks. 1138-1147 - Hejiao Huang, Xiaolu Cao, Xiaohua Jia

, Xiaolong Wang:
Channel assignment using block design in wireless mesh networks. 1148-1153 - Tuan Dinh Le, Wen Hu

, Peter I. Corke
, Sanjay Jha
:
ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks. 1154-1171 - Kostas Christodoulopoulos

, Vasileios Sourlas
, I. Mpakolas, Emmanouel A. Varvarigos
:
A comparison of centralized and distributed meta-scheduling architectures for computation and communication tasks in Grid networks. 1172-1184 - Pedro Peris-Lopez

, Tieyan Li, Julio C. Hernandez-Castro
, Juan E. Tapiador
:
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. 1185-1193 - Alex X. Liu, LeRoy A. Bailey:

PAP: A privacy and authentication protocol for passive RFID tags. 1194-1199 - Hamed Nassar

, Hassan Al Mahdi:
Design and analysis of a TDMA call assignment scheme for cellular networks. 1200-1206 - Amit Sahoo, Krishna Kant, Prasant Mohapatra:

BGP convergence delay after multiple simultaneous router failures: Characterization and solutions. 1207-1218 - Victor Morales-Rocha, Miguel Soriano

, Jordi Puiggali
:
New voter verification scheme using pre-encrypted ballots. 1219-1227 - Sergey N. Moiseev, Mikhail S. Kondakov:

Fast system load estimation in the IEEE 802.16 OFDMA network. 1228-1232 - Kemal Akkaya, Andrew Newell:

Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks. 1233-1244 - Yih-Shyh Chiou

, Chin-Liang Wang, Sheng-Cheng Yeh, Ming-Yang Su:
Design of an adaptive positioning system based on WiFi radio signals. 1245-1254
Volume 32, Number 11, July 2009
- Ekram Hossain, Qian Zhang

:
Special issue of computer communications on heterogeneous networking for quality, reliability, security, and robustness - Part-I. 1255-1256
- Feng Wang, Jian Pu, Mounir Hamdi

:
QoS based scheduling in the downlink of multi-user wireless systems (extended). 1257-1262 - Qiang Shen, Xuming Fang, Rongsheng Huang, Pan Li

, Yuguang Fang
:
Improving throughput by tuning carrier sensing in 802.11 wireless networks. 1263-1270 - Joshua Wall, Jamil Y. Khan

:
Efficient multimedia transmission using adaptive packet bursting for wireless LANs. 1271-1280 - Weiwei Wang, Zihua Guo, Jun Cai, Xuemin Shen

, Changjia Chen:
Multiple frequency reuse schemes in the two-hop IEEE 802.16j wireless relay networks with asymmetrical topology. 1298-1305 - Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:

User-input driven QoS management in ad hoc networks. 1306-1315 - Chao Song, Ming Liu, Jiannong Cao

, Yuan Zheng, Hai-gang Gong, Guihai Chen
:
Maximizing network lifetime based on transmission range adjustment in wireless sensor networks. 1316-1325 - Vojislav B. Misic, Jelena V. Misic:

Reducing sensing error in cognitive PANs through reduction of the channel set and split sensing. 1326-1335 - An'an Luo, Chuang Lin, Kai Wang, Lei Lei

, Chanfang Liu:
Quality of protection analysis and performance modeling in IP multimedia subsystem. 1336-1345 - Chonggang Wang, Mahmoud Daneshmand, Kazem Sohraby:

Optimization of tag reading performance in generation-2 RFID protocol. 1346-1352
Volume 32, Number 12, July 2009
- Ekram Hossain, Qian Zhang

:
Special Issue of Computer Communications on Heterogeneous Networking for Quality, Reliability, Security, and Robustness - Part-II. 1353-1354
- Enzo Mingozzi, Giovanni Stea

, María Ángeles Callejo-Rodríguez, José Enríquez-Gabeiras, Gerardo García-de-Blas, Francisco Javier Ramón-Salguero, Wojciech Burakowski
, Andrzej Beben
, Jaroslaw Sliwinski, Halina Tarasiuk
, Olivier Dugeon, Michel Diaz, Laurent Baresse, Edmundo Monteiro
:
EuQoS: End-to-End Quality of Service over Heterogeneous Networks. 1355-1370 - Abdelhamid Mellouk, Said Hoceini, Sherali Zeadally:

Design and performance analysis of an inductive QoS routing algorithm. 1371-1376 - Satoshi Utsumi, Salahuddin Muhammad Salim Zabir, Norio Shiratori:

TCP-Cherry for satellite IP networks: Analytical model and performance evaluation. 1377-1383 - Anjali Sardana, Ramesh C. Joshi:

An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks. 1384-1399 - Natalya Fedotova, Luca Veltri:

Reputation management algorithms for DHT-based peer-to-peer environment. 1400-1409 - Jialing Xu, Victor O. K. Li:

Request-driven swarming scheme for P2P data streaming. 1410-1417 - Sirui Yang, Hai Jin, Bo Li, Xiaofei Liao, Hong Yao, Qi Huang, Xuping Tu:

Measuring web feature impacts in Peer-to-Peer file sharing systems. 1418-1425
Volume 32, Numbers 13-14, August 2009
- Bang Wang, Hock-Beng Lim, Di Ma

:
A survey of movement strategies for improving network coverage in wireless sensor networks. 1427-1436
- Kensaku Wakuda, Shoji Kasahara

, Yutaka Takahashi, Yoshinobu Kure, Eisaburo Itakura:
A packet scheduling algorithm for max-min fairness in multihop wireless LANs. 1437-1444 - Diego N. da Hora, Daniel F. Macedo

, Leonardo B. Oliveira, Isabela G. Siqueira, Antonio Alfredo Ferreira Loureiro, José Marcos S. Nogueira
, Guy Pujolle:
Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks. 1445-1459 - Sándor Molnár

, Balázs Sonkoly
, Tuan Anh Trinh:
A comprehensive TCP fairness analysis in high speed networks. 1460-1484 - Mathieu Bouet

, Guy Pujolle:
L-VIRT: Range-free 3-D localization of RFID tags based on topological constraints. 1485-1494 - Min-Xiou Chen, Yin-Din Wang:

An efficient location tracking structure for wireless sensor networks. 1495-1504 - Juan J. Alcaraz

, Gaspar Pedreño, Fernando Cerdán
, Joan García-Haro
, Felipe García-Sánchez:
Discrete-time control analysis of transport channel synchronization in 3G radio access networks. 1505-1514 - Jiangwen Wan, Ning Yu

, Renjian Feng, Yinfeng Wu, Changming Su:
Localization refinement for wireless sensor networks. 1515-1524 - Wu Chen, Shuang-Hua Yang

:
The mechanism of adapting RED parameters to TCP traffic. 1525-1530 - Hyunjue Kim, Jong-Moon Chung, Chang Hyun Kim:

Secured communication protocol for internetworking ZigBee cluster networks. 1531-1540 - Jordi Castellà-Roca

, Alexandre Viejo
, Jordi Herrera-Joancomartí
:
Preserving user's privacy in web search engines. 1541-1551 - Marc Ciurana, Francisco Barceló-Arroyo, Sebastiano Cugno:

Tracking mobile targets indoors using WLAN and time of arrival. 1552-1558 - Daishi Kato, Kazuo Kunieda, Keiji Yamada:

An emulator for peer-to-peer distributed hash tables. 1559-1567 - Abdellah Chehri

, Paul Fortier
, Pierre-Martin Tardif
:
Cross-layer link adaptation design for UWB-based sensor networks. 1568-1575
- Marco Conti

:
Editor-in-chief Note of Concern. 1576
Volume 32, Number 15, September 2009
- Preethi Natarajan, Nasif Ekiz, Paul D. Amer, Randall R. Stewart:

Concurrent Multipath Transfer during path failure. 1577-1587 - Youngkyu Choi, Sunghyun Choi

:
Energy-aware WLAN scanning in integrated IEEE 802.16e/802.11 networks. 1588-1599 - John Fitzpatrick, Seán Murphy, Mohammed Atiquzzaman

, John Murphy:
Using cross-layer metrics to improve the performance of end-to-end handover mechanisms. 1600-1612
- Yuh-Shyan Chen

, Chih-Shun Hsu, Po-Tsai Hsieh:
An efficient bow-based on-demand QoS routing protocol for MIMO ad hoc networks. 1613-1630 - Zhenguo Gao, Ling Wang:

A passive tree-based backbone construction scheme for MANETs. 1631-1641 - Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Masato Tsuru, Yuji Oie:

Locating congested segments over the Internet by clustering the delay performance of multiple paths. 1642-1654 - Konstantinos Kalpakis, Shilang Tang:

A combinatorial algorithm for the maximum lifetime data gathering with aggregation problem in sensor networks. 1655-1665 - Yuyan Xue, Byrav Ramamurthy

, Yong Wang:
LTRES: A loss-tolerant reliable event sensing protocol for wireless sensor networks. 1666-1676 - Wissam Fawaz

, Timothy Sawah, Chadi Abou-Rjeily
:
Priority-aware optical shared protection: An offline evaluation study. 1677-1684
Volume 32, Number 16, October 2009
- Vinny Cahill, Stephen Farrell, Jörg Ott:

Special issue of computer communications on delay and disruption tolerant networking. 1685-1686
- Khaled A. Harras

, Lara B. Deek, Caitlin Holman, Kevin C. Almeroth:
DBS-IC: An adaptive Data Bundling System for Intermittent Connectivity. 1687-1698 - Mike P. Wittie, Khaled A. Harras

, Kevin C. Almeroth, Elizabeth M. Belding:
On the implications of routing metric staleness in delay tolerant networks. 1699-1709 - Hyewon Jun, Mostafa H. Ammar, Mark D. Corner, Ellen W. Zegura:

Hierarchical power management in disruption tolerant networks using traffic-aware optimization. 1710-1723 - Michael J. Demmer, Kevin R. Fall:

The design and implementation of a session layer for delay-tolerant networks. 1724-1730 - Qing Ye, Liang Cheng, Mooi Choo Chuah, Brian D. Davison

:
Performance comparison of different multicast routing strategies in disruption tolerant networks. 1731-1741 - Yong Xi, Mooi Choo Chuah:

An encounter-based multicast scheme for disruption tolerant networks. 1742-1756 - Giorgos Papastergiou, Ioannis Psaras, Vassilis Tsaoussidis

:
Deep-Space Transport Protocol: A novel transport scheme for Space DTNs. 1757-1767 - Adel Javanmard, Farid Ashtiani:

Analytical evaluation of average delay and maximum stable throughput along a typical two-way street for vehicular ad hoc networks in sparse situations. 1768-1780
Volume 32, Number 17, November 2009
- Aggelos Lazaris, Polychronis Koutsakis

:
Pricing-based call admission control for wireless MPEG-4 traffic. 1781-1789 - Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:

Secure network coding for wireless mesh networks: Threats, challenges, and directions. 1790-1801
- Jiong Jin

, Wei-Hua Wang, Marimuthu Palaniswami:
Utility max-min fair resource allocation for communication networks with multipath routing. 1802-1809 - Yuhan Moon, Violet R. Syrotiuk:

A cooperative CDMA-based multi-channel MAC protocol for mobile ad hoc networks. 1810-1819 - Hongli Xu, Liusheng Huang, Wang Liu, Gang Wang, Yang Wang:

Topology control for delay-constraint data collection in wireless sensor networks. 1820-1828 - Ting Yi Chang:

An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks. 1829-1836 - Xinhua Yang, Tracy Camp, Hailong Yang, Athina P. Petropulu:

Extending network lifetime for ALLIANCES. 1837-1851 - Prithula Dhungel, Di Wu, Keith W. Ross:

Measurement and mitigation of BitTorrent leecher attacks. 1852-1861 - Ming-Kuei Yeh, Jehn-Ruey Jiang, Shing-Tsaan Huang:

Adaptive splitting and pre-signaling for RFID tag anti-collision. 1862-1870 - Guillaume Valadon, Clémence Magnien, Ryuji Wakikawa:

Mobile IPv6 deployments: Graph-based analysis and practical guidelines. 1871-1880 - Niandong Liao, Shengfeng Tian, Tinghua Wang:

Network forensics based on fuzzy logic and expert system. 1881-1892 - Zhijun Wang, Hao Che, Jiannong Cao

, Jingshan Wang:
A TCAM-based solution for integrated traffic anomaly detection and policy filtering. 1893-1901
Volume 32, Number 18, December 2009
- Abderrahim Benslimane

, Chadi Assi, Ekram Hossain, Mehmet C. Vuran
:
Special issue of "Computer Communications" on Cognitive Radio and Dynamic Spectrum Sharing Systems. 1903-1904
- Show-Shiow Tzeng:

Call admission control policies in cellular wireless networks with spectrum renting. 1905-1913 - Qinghai Xiao, Yunzhou Li, Ming Zhao, Shidong Zhou, Jing Wang:

Opportunistic channel selection approach under collision probability constraint in cognitive radio systems. 1914-1922 - Lutfa Akter, Balasubramaniam Natarajan

:
QoS constrained resource allocation to secondary users in cognitive radio networks. 1923-1930 - Si Chen, Alexander M. Wyglinski

:
Efficient spectrum utilization via cross-layer optimization in distributed cognitive radio networks. 1931-1943 - Chao Zou, Chunxiao Chigan:

On game theoretic DSA-driven MAC for cognitive radio networks. 1944-1954 - László Toka, Attila Vidács:

General distributed economic framework for dynamic spectrum allocation. 1955-1964 - Chengshi Zhao, Mingrui Zou, Kyungsup Kwak:

Mutual interference considered power allocation in OFDM-based cognitive networks: The single SU case. 1965-1974 - Yanbo Ma, Haixia Zhang, Dongfeng Yuan, Hsiao-Hwa Chen:

Adaptive power allocation with quality-of-service guarantee in cognitive radio networks. 1975-1982 - Kaushik R. Chowdhury

, Marco Di Felice:
Search: A routing protocol for mobile cognitive radio ad-hoc networks. 1983-1997 - Matthias Wellens, Janne Riihijärvi, Petri Mähönen:

Spatial statistics and models of spectrum use. 1998-2011

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














