


default search action
Computer Communications, Volume 34
Volume 34, Number 1, January 2011
- Marco Conti

:
Editorial. 1
- Subharthi Paul, Jianli Pan, Raj Jain

:
Architectures for the future networks and the next generation Internet: A survey. 2-42 - Balachander Krishnamurthy, Walter Willinger, Phillipa Gill, Martin F. Arlitt:

A Socratic method for validation of measurement-based networking research. 43-53
- Shiao-Li Tsao, Chung-Huei Huang:

A survey of energy efficient MAC protocols for IEEE 802.11 WLAN. 54-67
- Enrico Gregori, Alessandro Improta

, Luciano Lenzini, Chiara Orsini:
The impact of IXPs on the AS-level topology structure of the Internet. 68-82 - Andreas Konstantinidis

, Kun Yang:
Multi-objective K-connected Deployment and Power Assignment in WSNs using a problem-specific constrained evolutionary algorithm based on decomposition. 83-98 - Hyun-Woo Kim, Jun-Hui Lee, Yong-Hoon Choi, Young-uk Chung, Hyukjoon Lee:

Dynamic bandwidth provisioning using ARIMA-based traffic forecasting for Mobile WiMAX. 99-106 - Ming-Yang Su:

Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. 107-117
Volume 34, Number 2, February 2011
- Chung-Ming Huang, Isaac Woungang, Ming-Chiao Chen:

Open network service technologies and applications. 119
- Chi-Chun Lo, Ting-Huan Kuo, Hsu-Yang Kung, Hsiang-Ting Kao, Chi-Hua Chen

, Che-I Wu, Ding-Yuan Cheng:
Mobile merchandise evaluation service using novel information retrieval and image recognition technology. 120-128 - Carlos Serrão

, Eva Rodríguez, Jaime Delgado
:
Approaching the rights management interoperability problem using intelligent brokerage mechanisms. 129-139 - Keith Griffin, Colin Flanagan:

Defining a call control interface for browser-based integrations using representational state transfer. 140-149 - Jinsuk Baek, Jan Fischer, Hsiao-Hwa Chen, Minho Jo

:
On a moving direction pattern based MAP selection model for HMIPv6 networks. 150-158 - Eduardo Goncalves da Silva, Luís Ferreira Pires

, Marten van Sinderen
:
Towards runtime discovery, selection and composition of semantic services. 159-168 - Ming-Chiao Chen, Jiann-Liang Chen, Teng-Wen Chang:

Android/OSGi-based vehicular network management system. 169-183 - Chin-Feng Lai

, Yi-Wei Ma, Sung-Yen Chang, Han-Chieh Chao
, Yueh-Min Huang:
OSGi-based services architecture for Cyber-Physical Home Control Systems. 184-191 - Huaming Guo, Wei Su, Hongke Zhang, Sy-Yen Kuo

:
On the convergence condition and convergence time of BGP. 192-199 - Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo Xue, Jun Li:

OpenGate: Towards an open network services gateway. 200-208 - Juan C. Yelmo

, José M. del Álamo, Rubén Trapero, Yod Samuel Martín:
A user-centric approach to service creation and delivery over next generation networks. 209-222
Volume 34, Number 3, March 2011
- Jong Hyuk Park, Sheikh Iqbal Ahamed, Willy Susilo

, Michela Taufer
:
Special issue of computer communications on information and future communication security. 223-225
- Georgios Kambourakis

, Constantinos Kolias, Stefanos Gritzalis
, Jong Hyuk Park:
DoS attacks exploiting signaling in UMTS and IMS. 226-235 - Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao

:
An RFID secure authentication mechanism in WLAN. 236-240 - Yufeng Wang, Akihiro Nakao

, Athanasios V. Vasilakos
, Jianhua Ma:
P2P soft security: On evolutionary dynamics of P2P incentive mechanism. 241-249 - Yu-Yi Chen, Meng-Lin Tsai, Jinn-ke Jan:

The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. 250-256 - Ying Sun, Chunxiang Xu, Yong Yu

, Bo Yang:
Improvement of a proxy multi-signature scheme without random oracles. 257-263 - Qixu Liu, Yuqing Zhang:

VRSS: A new system for rating and scoring vulnerabilities. 264-273 - Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:

Robust authentication and key agreement scheme preserving the privacy of secret key. 274-280 - Sudip Misra, Ankur Vaish:

Reputation-based role assignment for role-based access control in wireless sensor networks. 281-294 - Jong Sik Moon, Im-Yeong Lee:

An AAA scheme using ID-based ticket with anonymity in future mobile communication. 295-304 - Muhammad Khurram Khan

, Soo-Kyun Kim
, Khaled Alghathbar:
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. 305-309 - Bo-Chao Cheng, Ryh-Yuh Tseng:

A Context Adaptive Intrusion Detection System for MANET. 310-318 - Jing Xu, Wen Tao Zhu, Dengguo Feng:

An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. 319-325 - Binod Vaidya, Jong Hyuk Park, Sang-Soo Yeo

, Joel J. P. C. Rodrigues:
Robust one-time password authentication scheme using smart card for home network environment. 326-336 - Tzu-Chang Yeh, Chien-Hung Wu, Yuh-Min Tseng:

Improvement of the RFID authentication scheme based on quadratic residues. 337-341 - The Anh Pham

:
The improvement of the knapsack cipher. 342-343 - Zhengping Jin, Qiaoyan Wen:

Certificateless multi-proxy signature. 344-352 - Taek-Young Youn, Changhoon Lee

, Young-Ho Park
:
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes. 353-357 - Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:

Anonymity analysis of P2P anonymous communication systems. 358-366 - Daojing He

, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu:
A strong user authentication scheme with smart cards for wireless communications. 367-374 - Jian Wang, Yanheng Liu, Yu Jiao:

Novel access and remediation scheme in hierarchical trusted network. 375-383 - Dang Nguyen Duc, Kwangjo Kim:

Defending RFID authentication protocols against DoS attacks. 384-390 - Jung-Sik Cho, Sang-Soo Yeo

, Sung Kwon Kim:
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. 391-397 - Mieso K. Denko, Tao Sun, Isaac Woungang:

Trust management in ubiquitous computing: A Bayesian approach. 398-406 - Dwaine E. Clarke

:
Design and implementation of a public key-based group collaboration system. 407-422 - Longjiang Li, Yuming Mao, Supeng Leng:

Privacy addressing and autoconfiguration for mobile ad hoc networks. 423-428 - Liang Zhou, Athanasios V. Vasilakos

, Naixue Xiong, Yan Zhang, Shiguo Lian:
Scheduling security-critical multimedia applications in heterogeneous networks. 429-435 - Qi Zhang, Yi Mu, Minjie Zhang

:
Attribute-based authentication for multi-agent systems with dynamic groups. 436-446 - Lo-Yao Yeh, Yen-Cheng Chen, Jiun-Long Huang:

PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. 447-456 - Lars Völker

, Marcel Noe, Oliver P. Waldhorst, Christoph Werle, Christoph Sorge:
Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication. 457-467 - Zubair A. Baig

:
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. 468-484 - Leonardo B. Oliveira, Diego F. Aranha

, Conrado Porto Lopes Gouvêa, Michael Scott, Danilo F. Câmara, Julio López, Ricardo Dahab
:
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. 485-493 - Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:

Provably secure multi-proxy signature scheme with revocation in the standard model. 494-501 - Wei Lu

, Goaletsa Rammidi, Ali A. Ghorbani:
Clustering botnet communication traffic based on n-gram feature selection. 502-514 - Roberto Di Pietro

, Alexandre Viejo
:
Location privacy and resilience in wireless sensor networks querying. 515-523
Volume 34, Number 4, April 2011
- Yang Xiang

, Wanlei Zhou
:
Special issue: Building secure parallel and distributed networks and systems. 525
- Xiaoxun Sun, Lili Sun, Hua Wang

:
Extended k-anonymity models against sensitive attribute disclosure. 526-535 - Yu Zhang, Binxing Fang, Yongzheng Zhang:

Parallelizing weighted frequency counting in high-speed network monitoring. 536-547 - Nikhil Saxena, Mieso K. Denko, Dilip K. Banerji:

A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. 548-555 - Boyeon Song, Chris J. Mitchell

:
Scalable RFID security protocols supporting tag ownership transfer. 556-566 - Mihui Kim, Peng Ning:

SeCA: A framework for Secure Channel Assignment in wireless mesh networks. 567-576 - Zi Chu, Haining Wang:

An investigation of hotlinking and its countermeasures. 577-590 - Hongjuan Li

, Kai Lin, Keqiu Li:
Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. 591-597 - Tilman Wolf

, Russell Tessier, Gayatri Prabhu:
Securing the data path of next-generation router systems. 598-606
Volume 34, Number 5, April 2011
- Matthieu Latapy:

Complex networks. 607-608
- Adrien Friggeri, Guillaume Chelius, Eric Fleury, Antoine Fraboulet, France Mentré

, Jean-Christophe Lucet:
Reconstructing social interactions using an unreliable wireless sensor network. 609-618 - Anne-Marie Kermarrec

, Erwan Le Merrer, Bruno Sericola, Gilles Trédan:
Second order centrality: Distributed assessment of nodes criticity in complex networks. 619-628 - Belkacem Serrour, Alex Arenas

, Sergio Gómez
:
Detecting communities of triangles in complex networks using spectral optimization. 629-634 - Christophe Crespelle, Fabien Tarissan:

Evaluation of a new method for measuring the internet degree distribution: Simulation results. 635-648 - Guoqiang Zhang, Bruno Quoitin

, Shi Zhou
:
Phase changes in the evolution of the IPv4 and IPv6 AS-Level Internet topologies. 649-657 - M. Engin Tozal, Kamil Saraç:

Palmtree: An IP alias resolution algorithm with linear probing complexity. 658-669 - Frédéric Ouédraogo, Clémence Magnien:

Impact of sources and destinations on the observed properties of the internet topology. 670-679
Volume 34, Number 6, May 2011
- Vinicius C. M. Borges

, Marília Curado
, Edmundo Monteiro
:
Cross-layer routing metrics for mesh networks: Current status and research directions. 681-703 - Nils Aschenbruck, Aarti Munjal, Tracy Camp:

Trace-based mobility modeling for multi-hop wireless networks. 704-714
- Gang Chen, Zujie Ren, Lidan Shou, Ke Chen, Yijun Bei:

PISA: A framework for integrating uncooperative peers into P2P-based federated search. 715-729 - Jiyong Park, Daedong Park, Seongsoo Hong, Jungkeun Park

:
Preventing TCP performance interference on asymmetric links using ACKs-first variable-size queuing. 730-742 - Natalija Vlajic, Dusan Stevanovic, George Spanogiannopoulos:

Strategies for improving performance of IEEE 802.15.4/ZigBee WSNs with path-constrained mobile sink(s). 743-757 - Chirag K. Rupani, Trilok Chand Aseri:

An improved transport layer protocol for wireless sensor networks. 758-764 - Siyu Tang, Eva Jaho

, Ioannis Stavrakakis
, Ioannis Z. Koukoutsidis, Piet Van Mieghem:
Modeling gossip-based content dissemination and search in distributed networking. 765-779 - Yang-Ick Joo

, Kyeong Hur:
A distributed-request-based CDMA CAC for DiffServ multimedia services in wireless cellular mobile networks. 780-792 - Guiyi Wei, Yun Ling, Binfeng Guo, Bin Xiao

, Athanasios V. Vasilakos
:
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. 793-802
Volume 34, Number 7, May 2011
- Theodoros Anagnostopoulos

, Christos Anagnostopoulos
, Stathes Hadjiefthymiades
:
An adaptive location prediction model based on fuzzy control. 816-834 - Mehdi Ghatee

:
QoS-based cooperative algorithm for integral multi-commodity flow problem. 835-846 - Rosario Giuseppe Garroppo

, Stefano Giordano
, Davide Iacono, Luca Tavanti
:
Experimental and simulation analysis of a WiMAX system in an emergency marine scenario. 847-861 - Ming Xu, Shuigeng Zhou, Jihong Guan:

A new and effective hierarchical overlay structure for Peer-to-Peer networks. 862-874 - Yawen Chen

, Hong Shen, Haibo Zhang
:
Routing and wavelength assignment for hypercube communications embedded on optical chordal ring networks of degrees 3 and 4. 875-882 - Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori

, Shigeaki Harada, Haruhisa Hasegawa:
Optimally designing caches to reduce P2P traffic. 883-897 - Ralph Kühne, George B. Huitema, Georg Carle:

A simple distributed mechanism for accounting system self-configuration in next-generation charging and billing. 898-920
Volume 34, Number 8, June 2011
- Prasant Mohapatra, Jörg Ott

:
Special section on wireless mobile and multimedia networks. 921 - Paola Cappanera

, Luciano Lenzini, Alessandro Lori, Giovanni Stea
, Gigliola Vaglini:
Efficient link scheduling for online admission control of real-time traffic in wireless mesh networks. 922-934 - Marwan Krunz, David Manzi:

Channel access and traffic control for dynamic-spectrum networks with single-transmit, dual-receive radios. 935-947 - Emilio Ancillotti, Raffaele Bruno

, Marco Conti
, Antonio Pinizzotto:
Load-aware routing in mesh networks: Models, algorithms and experimentation. 948-961 - Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amorim, Farid Benbadis, Guillaume Chelius:

Volume-aware positioning in the context of a marine port terminal. 962-972 - James Gross, Michael Reyer:

Performance prediction for OFDMA systems with dynamic power and subcarrier allocation. 973-984
- Johann Márquez-Barja

, Carlos Miguel Tavares Calafate
, Juan-Carlos Cano
, Pietro Manzoni
:
An overview of vertical handover techniques: Algorithms, protocols and tools. 985-997
- Jaehun Lee, Wooyong Chung, Euntai Kim:

A new range-free localization method using quadratic programming. 998-1010 - Kerim Fouli, Lawrence R. Chen

, Martin Maier:
Time-, wavelength-, and code-domain optical reflection monitoring for next-generation access-metro networks. 1011-1021 - Farhad Faghani

, Ghasem Mirjalily
:
Shortcut Switching Strategy in Metro Ethernet networks. 1022-1032 - Jae Hoon Ko, Soonmok Kwon, Cheeha Kim:

Orthogonal signaling-based queue status investigation method in IEEE 802.11. 1033-1041
Volume 34, Number 9, June 2011
- Periklis Chatzimisios

, Ibrahim Habib, Paolo Bellavista
, Alexey V. Vinel:
Guest editorial for the special issue on "Next generation networks service management". 1043-1044
- Georgios Tsiropoulos, Dimitrios Stratogiannis, John D. Kanellopoulos, Panayotis G. Cottis:

Probabilistic framework and performance evaluation for prioritized call admission control in next generation networks. 1045-1054 - Upendra Rathnayake, Mohsin Iftikhar, Maximilian Ott

, Aruna Seneviratne
:
Realistic data transfer scheduling with uncertainty. 1055-1065 - Kandaraj Piamrat

, Adlen Ksentini, Jean-Marie Bonnin, César Viho:
Radio resource management in emerging heterogeneous wireless networks. 1066-1076 - Nikolaos Psimogiannos, Aggeliki Sgora, Dimitrios D. Vergados

:
An IMS-based network architecture for WiMAX-UMTS and WiMAX-WLAN interworking. 1077-1099 - Fabio Baroncelli, Barbara Martini, Valerio Martini, Piero Castoldi:

Extending next generation network (NGN) architecture for connection-oriented transport. 1100-1111 - Wei-Kuo Chiang

, Kai-Shun Chang:
Design and implementation of a distributed service invocation function for the IP multimedia subsystem. 1112-1124 - Ming-Fong Tsai, Naveen K. Chilamkurti, Sherali Zeadally, Alexey V. Vinel:

Concurrent multipath transmission combining forward error correction and path interleaving for video streaming. 1125-1136 - Yuan-sheng Luo, Yong Qi, Di Hou, Lin-feng Shen, Ying Chen, Xiao Zhong:

A novel heuristic algorithm for QoS-aware end-to-end service composition. 1137-1144
Volume 34, Number 10, July 2011
- Pavle V. Vuletic

, Jelica Protic:
Self-similar cross-traffic analysis as a foundation for choosing among active available bandwidth measurement strategies. 1145-1158 - Xu Li, Hongyu Huang, Xuegang Yu, Wei Shu, Minglu Li, Min-You Wu:

A new paradigm for urban surveillance with vehicular sensor networks. 1159-1168 - Ying-Dar Lin, Shun-Lee Chang, Shi-Hung Tao, Jui-Hung Yeh:

Realizing and benchmarking broadcast algorithms in wireless mesh networks. 1169-1181 - Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori

, Shigeaki Harada, Haruhisa Hasegawa:
Parallel video streaming optimizing network throughput. 1182-1194 - Ching-Lung Chang, Yue-Shan Chang, Ching-Hung Chang, Fang-Jie Chen:

XOR-based frame loss recovery scheme for video streaming. 1195-1201 - Ye Zhu, Huirong Fu:

Traffic analysis attacks on Skype VoIP calls. 1202-1212 - Daniel F. Macedo

, Aldri L. dos Santos
, José Marcos S. Nogueira
, Guy Pujolle:
Modeling multiple hop wireless networks with varying transmission power and data rate. 1213-1221 - Laercio Cruvinel, Teresa Maria Vazão

:
Improving performance for multimedia traffic with distributed dynamic QoS adaptation. 1222-1234 - Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:

Poly: A reliable and energy efficient topology control protocol for wireless sensor networks. 1235-1242 - Jianxin Liao, Jinzhu Wang, Tonghong Li

, Jingyu Wang, Xiaomin Zhu:
A token-bucket based notification traffic control mechanism for IMS presence service. 1243-1257 - Vasileios Karyotis

, Maria Fazio
, Symeon Papavassiliou, Antonio Puliafito
:
Comparison of efficient random walk strategies for wireless multi-hop networks. 1258-1267
Volume 34, Number 11, July 2011
- Wei Yu

, Xun Wang, Adam C. Champion, Dong Xuan, David Lee:
On detecting active worms with varying scan rate. 1269-1282 - Massimo Bernaschi, Filippo Cacace

, Antonio Davoli, Davide Guerri, Matteo Latini, Luca Vollero:
A CAPWAP-based solution for frequency planning in large scale networks of WiFi Hot-Spots. 1283-1293 - Halder Subir

, Amrita Ghosal
, DasBit Sipra
:
A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network. 1294-1306 - Gabriele Oligeri, Stefano Chessa

, Gaetano Giunta
:
Loss tolerant video streaming authentication in heterogeneous wireless networks. 1307-1315 - Hakyung Jung, Ted Taekyoung Kwon, Kideok Cho, Yanghee Choi:

REACT: Rate Adaptation using Coherence Time in 802.11 WLANs. 1316-1327 - P. Arun Raj Kumar

, S. Selvakumar
:
Distributed denial of service attack detection using an ensemble of neural classifier. 1328-1341 - Bahador Bakhshi

, Siavash Khorsandi, Antonio Capone
:
On-line joint QoS routing and channel assignment in multi-channel multi-radio wireless mesh networks. 1342-1360 - Chanmin Yoon, Hojung Cha:

Experimental analysis of IEEE 802.15.4a CSS ranging and its implications. 1361-1374 - Yu Liu, Chi Zhou, Yu Cheng

:
S2U: An efficient algorithm for optimal integrated points placement in hybrid optical-wireless access networks. 1375-1388
Volume 34, Number 12, August 2011
- Jens Buysse, Marc De Leenheer, Bart Dhoedt, Chris Develder

:
Providing resiliency for optical grids by exploiting relocation: A dimensioning study based on ILP. 1389-1398 - Diane Prisca Onguetou, Wayne D. Grover:

p-Cycle protection at the glass fiber level. 1399-1409 - Krzysztof Walkowiak

, Michal Przewozniczek
:
Modeling and optimization of survivable P2P multicasting. 1410-1424 - William Liu

, Krzysztof Pawlikowski, Harsha R. Sirisena:
Algebraic connectivity metric for spare capacity allocation problem in survivable networks. 1425-1435 - Ali Tizghadam, Alberto Leon-Garcia:

Robust network planning in nonuniform traffic scenarios. 1436-1449
- Anna V. Manolova, Sarah Ruepp

, Lars Dittmann
, Eusebi Calle
, José-Luis Marzo
:
Restoration in multi-domain GMPLS-based networks. 1450-1459 - Mukul Goyal, Dawn Rohm, Weigao Xie, Seyed H. Hosseini

, Kishor S. Trivedi, Yusuf Bashir, August Divjak:
A stochastic model for beaconless IEEE 802.15.4 MAC operation. 1460-1474 - Floriano De Rango, Fiore Veltri, Peppino Fazio

:
Interference Aware-based Ad-Hoc On Demand Distance Vector (IA-AODV) ultra wideband system routing protocol. 1475-1483 - Sudip Misra, Manikonda Pavan Kumar, Mohammad S. Obaidat

:
Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks. 1484-1496 - Luca Caviglione

, Cristiano Cervellera:
Design, optimization and performance evaluation of a content distribution overlay for streaming. 1497-1509
- Yanxiao Zhao, Min Song, Chunsheng Xin:

A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks. 1510-1517 - Vasilios A. Siris

, Manolis Delakis:
Interference-aware channel assignment in a metropolitan multi-radio wireless mesh network with directional antennas. 1518-1528 - Hamidou Tembine

, Abdellatif Kobbane
, Mohammed El Koutbi:
Dynamic robust power allocation games under channel uncertainty and time delays. 1529-1537
Volume 34, Number 13, August 2011
- Yaoxue Zhang, Yuezhi Zhou:

Separating computation and storage with storage virtualization. 1539-1548 - Yong Liao, Dong Yin, Lixin Gao:

Network virtualization substrate with parallelized data plane. 1549-1558
- Luciano Bononi

, Marco Di Felice, Antonella Molinaro, Sara Pizzi:
Enhancing multi-hop communication over multi-radio multi-channel wireless mesh networks: A cross-layer approach. 1559-1569 - Constantinos Marios Angelopoulos

, Sotiris E. Nikoletseas:
Aggregated mobility-based topology inference for fast sensor data collection. 1570-1579
- Vaggelis G. Douros

, George C. Polyzos
:
Review of some fundamental approaches for power control in wireless networks. 1580-1592
- Jia Hu, Geyong Min, Mike E. Woodward:

Performance analysis of the TXOP burst transmission scheme in single-hop ad hoc networks with unbalanced stations. 1593-1603 - Usman Ashraf, Slim Abdellatif, Guy Juanole:

Route Maintenance in IEEE 802.11 wireless mesh networks. 1604-1621 - Jie Yu, Liming Lu

, Peng Xiao, Zhoujun Li, Yuan Zhou:
Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT. 1622-1629 - Chun-Yu Lin, Chen-Lung Chan, Chung-Ta King, Huang-Chen Lee

:
A cyclic MAC scheduler for collecting data from heterogeneous sensors. 1630-1644 - Christelle Caillouet

, Stéphane Pérennes, Hervé Rivano
:
Framework for optimizing the capacity of wireless mesh networks. 1645-1659
Volume 34, Number 14, September 2011
- Yi-Mao Hsiao, Jeng-Farn Lee, Jai-Shiarng Chen, Yuan-Sun Chu:

H.264 video transmissions over wireless networks: Challenges and solutions. 1661-1672
- Kazushi Ikeda, Thilmee M. Baduge, Takaaki Umedu, Hirozumi Yamaguchi

, Teruo Higashino:
ALMware: A middleware for application layer multicast protocols. 1673-1684 - Sébastien Barré, John Ronan

, Olivier Bonaventure:
Implementation and evaluation of the Shim6 protocol in the Linux kernel. 1685-1695 - Y. Peng Hu, R. Li, S. Wang Zhou, Y. Ping Lin:

CCS-MAC: Exploiting the overheard data for compression in wireless sensor networks. 1696-1707 - António Pinto

, Manuel Ricardo
:
On performance of group key distribution techniques when applied to IPTV services. 1708-1721 - Bahador Bakhshi

, Siavash Khorsandi:
Complexity and design of QoS routing algorithms in wireless mesh networks. 1722-1737 - Abdulghani Ali Ahmed

, Aman Jantan
, Tat Chee Wan
:
SLA-based complementary approach for network intrusion detection. 1738-1749 - Yoon-Ho Choi, Moon-Young Jung, Seung-Woo Seo:

A fast pattern matching algorithm with multi-byte search unit for high-speed network security. 1750-1763 - Zhenhai Duan, Kartik Gopalan

, Xin Yuan:
An empirical study of behavioral characteristics of spammers: Findings and implications. 1764-1776
Volume 34, Number 15, September 2011
- Jeroen Famaey

, Tim Wauters, Filip De Turck
, Bart Dhoedt, Piet Demeester:
Network-aware service placement and selection algorithms on large-scale overlay networks. 1777-1787 - Tebatso Nage, F. Richard Yu

, Marc St-Hilaire:
TCP-aware network coding with opportunistic scheduling in wireless mobile ad hoc networks. 1788-1797 - Martin O. Nicholes, Chen-Nee Chuah

, Shyhtsun Felix Wu, Biswanath Mukherjee:
Inter-domain collaborative routing (IDCR): Server selection for optimal client performance. 1798-1809 - Yukinobu Fukushima, Tutomu Murase

, Masayoshi Kobayashi, Hiroki Fujiwara, Ryohei Fujimaki, Tokumi Yokohira:
Multi-stage change-point detection scheme for large-scale simultaneous events. 1810-1821 - Ajithkumar Thamarakuzhi, John A. Chandy

:
2-Dilated flattened butterfly: A nonblocking switching topology for high-radix networks. 1822-1835 - Arjuna Sathiaseelan, Gorry Fairhurst

:
TCP-Friendly Rate Control (TFRC) for bursty media flows. 1836-1847 - Xin Huang, Suili Feng, Hongcheng Zhuang:

Jointly optimal congestion control, channel allocation and power control in multi-channel wireless multihop networks. 1848-1857 - A. Antony Franklin

, Vibhav Bukkapatanam, C. Siva Ram Murthy:
On the end-to-end flow allocation and channel assignment in multi-channel multi-radio wireless mesh networks with partially overlapped channels. 1858-1869 - Hongseok Yoo, Dongkyun Kim:

Repetition-based cooperative broadcasting for vehicular ad-hoc networks. 1870-1882 - Kinda Khawam, Marc Ibrahim

, Marwen Abdennebi, Dana Marinca, Samir Tohmé:
Analytical modelling in 802.11 ad hoc networks. 1883-1891
Volume 34, Number 16, October 2011
- Raffaele Bruno

:
Introduction to the Special Section on Hot Topics in Mesh Networking. 1893 - Mina Yazdanpanah, Chadi Assi, Yousef R. Shayan:

Cross-layer optimization for wireless mesh networks with smart antennas. 1894-1911 - Simon Frohn, Sascha Gübner, Christoph Lindemann:

Analyzing the effective throughput in multi-hop IEEE 802.11n networks. 1912-1921
- Jessie Hui Wang, Changqing An

, Jiahai Yang:
A study of traffic, user behavior and pricing policies in a large campus network. 1922-1931 - Fatih Senel, Mohamed F. Younis

:
Relay node placement in structurally damaged wireless sensor networks via triangular steiner tree approximation. 1932-1941 - Abdul Jabbar, Justin P. Rohrer, Victor S. Frost, James P. G. Sterbenz

:
Survivable millimeter-wave mesh networks. 1942-1955 - Jing Wu, Michel Savoie:

Recovery from control plane failures in the RSVP-TE signaling protocol. 1956-1967 - Jimmy Leblet, Zhe Li, Gwendal Simon

, Di Yuan:
Optimal network locality in distributed virtualized data-centers. 1968-1979 - Marta Carbone, Luigi Rizzo

:
An emulation tool for PlanetLab. 1980-1990 - M. Aykut Yigitel, Özlem Durmaz Incel

, Cem Ersoy
:
Design and implementation of a QoS-aware MAC protocol for Wireless Multimedia Sensor Networks. 1991-2001
Volume 34, Number 17, November 2011
- Albert Banchs, Luciano Lenzini, Ioannis Stavrakakis

:
Special Section on Wireless networking. iii-iv - Sajal K. Das

, Jun-Won Ho:
A synopsis on node compromise detection in wireless sensor networks using sequential analysis (Invited Review Article). 2003-2012 - Paolo Casari

, Michele Zorzi:
Protocol design issues in underwater acoustic networks. 2013-2025 - Claudio Cicconetti

, Luciano Lenzini, Daniele Migliorini, Enzo Mingozzi:
Power-aware opportunistic downlink scheduling in IEEE 802.16 wireless networks. 2026-2035 - Margot Deruyck, Emmeric Tanghe, Wout Joseph, Luc Martens:

Modelling and optimization of power consumption in wireless access networks. 2036-2046 - Jesús Aísa, José Luis Villarroel:

The WICKPro protocol with the Packet Delivery Ratio metric. 2047-2056 - Ramon S. Schwartz, Rafael Ramos Regis Barbosa, Nirvana Meratnia, Geert J. Heijenk

, Hans Scholten:
A directional data dissemination protocol for vehicular environments. 2057-2071 - Mario Orne Díaz-Anadón, Kin K. Leung:

TDMA scheduling for event-triggered data aggregation in irregular wireless sensor networks. 2072-2081
- Michael Menth, Frank Lehrieder:

PCN-based marked flow termination. 2082-2093 - Kunal Shah, Mario Di Francesco, Giuseppe Anastasi, Mohan Kumar:

A framework for Resource-Aware Data Accumulation in sparse wireless sensor networks. 2094-2103 - Elias Yaacoub

, Zaher Dawy, Mohamad Adnan Al-Alaoui:
A novel distributed scheduling scheme for OFDMA uplink using channel information and probabilistic transmission. 2104-2113
Volume 34, Number 18, December 2011
- Marco Conti

, Song Chong, Serge Fdida, Weijia Jia
, Holger Karl, Ying-Dar Lin, Petri Mähönen, Martin Maier, Refik Molva
, Steve Uhlig
, Moshe Zukerman
:
Research challenges towards the Future Internet. 2115-2134
- Mustafa Ilhan Akbas

, Matthias R. Brust
, Damla Turgut:
SOFROP: Self-organizing and fair routing protocol for wireless networks with mobile sensors and stationary actors. 2135-2146 - Dulanjalie C. Dhanapala, Anura P. Jayasumana:

Convex Subspace Routing (CSR): Routing via anchor-based convex virtual subspaces in sensor networks. 2147-2161 - Ramy Eltarras, Mohamed Eltoweissy:

Associative routing for wireless sensor networks. 2162-2173 - Dong-Min Kim, Young Ju Hwang, Seong-Lyun Kim, Gwang-Ja Jin:

Testbed results of an opportunistic routing for multi-robot wireless networks. 2174-2183 - Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb:

Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks. 2184-2194 - Ramón Agüero

, Johnny Choque
, Jose Angel Irastorza
, Luis Muñoz
:
Coverage extension by means of non-conventional multi-hop communications. 2195-2206 - Carlos Henrique Pereira Augusto, Celso Barbosa Carvalho

, Marcel William Rocha da Silva, José Ferreira de Rezende
:
REUSE: A combined routing and link scheduling mechanism for wireless mesh networks. 2207-2216
- Jianhui Zhang, Xingfa Shen, Shaojie Tang, Guojun Dai

:
Energy efficient joint data aggregation and link scheduling in solar sensor networks. 2217-2226 - Phurivit Sangkatsanee, Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo:

Practical real-time intrusion detection using machine learning approaches. 2227-2235 - Hui Tian

, Hong Jiang, Ke Zhou, Dan Feng:
Adaptive partial-matching steganography for voice over IP using triple M sequences. 2236-2247
- Mu'awya Naser

, Pedro Peris-Lopez
, Rahmat Budiarto
, Benjamín Ramos Álvarez:
A note on the security of PAP. 2248-2249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














