callback( { "result":{ "query":":facetid:toc:\"db/journals/comsur/comsur9.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"197.98" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"26", "@dc":"26", "@oc":"26", "@id":"43430841", "text":":facetid:toc:db/journals/comsur/comsur9.bht" } }, "hits":{ "@total":"26", "@computed":"26", "@sent":"26", "@first":"0", "hit":[{ "@score":"1", "@id":"5453306", "info":{"authors":{"author":[{"@pid":"89/1226","text":"Fekri M. Abduljalil"},{"@pid":"57/5554","text":"Shrikant K. Bodhe"}]},"title":"A survey of integrating IP mobility protocols and mobile ad hoc networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"14-30","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/AbduljalilB07","doi":"10.1109/COMST.2007.358969","ee":"https://doi.org/10.1109/COMST.2007.358969","url":"https://dblp.org/rec/journals/comsur/AbduljalilB07"}, "url":"URL#5453306" }, { "@score":"1", "@id":"5453307", "info":{"authors":{"author":[{"@pid":"39/5699","text":"Reaz Ahmed"},{"@pid":"82/281","text":"Noura Limam"},{"@pid":"62/4290","text":"Jin Xiao"},{"@pid":"07/5150","text":"Youssef Iraqi"},{"@pid":"b/RaoufBoutaba","text":"Raouf Boutaba"}]},"title":"Resource and service discovery in large-scale multi-domain networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"2-30","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/AhmedLXIB07","doi":"10.1109/COMST.2007.4444748","ee":"https://doi.org/10.1109/COMST.2007.4444748","url":"https://dblp.org/rec/journals/comsur/AhmedLXIB07"}, "url":"URL#5453307" }, { "@score":"1", "@id":"5453308", "info":{"authors":{"author":[{"@pid":"87/6417","text":"Todd R. Andel"},{"@pid":"y/AYasinsac","text":"Alec Yasinsac"}]},"title":"Surveying security analysis techniques in MANET routing protocols.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"70-84","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/AndelY07","doi":"10.1109/COMST.2007.4444751","ee":"https://doi.org/10.1109/COMST.2007.4444751","url":"https://dblp.org/rec/journals/comsur/AndelY07"}, "url":"URL#5453308" }, { "@score":"1", "@id":"5453309", "info":{"authors":{"author":[{"@pid":"35/2569","text":"Dazhi Chen"},{"@pid":"v/PKVarshney","text":"Pramod K. Varshney"}]},"title":"A survey of void handling techniques for geographic routing in wireless networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"50-67","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/ChenV07","doi":"10.1109/COMST.2007.358971","ee":"https://doi.org/10.1109/COMST.2007.358971","url":"https://dblp.org/rec/journals/comsur/ChenV07"}, "url":"URL#5453309" }, { "@score":"1", "@id":"5453310", "info":{"authors":{"author":[{"@pid":"13/4355","text":"Piotr Cholda"},{"@pid":"60/1859","text":"Anders Mykkeltveit"},{"@pid":"00/1663","text":"Bjarne E. Helvik"},{"@pid":"50/3245","text":"Otto J. Wittner"},{"@pid":"28/6064","text":"Andrzej Jajszczyk"}]},"title":"A survey of resilience differentiation frameworks in communication networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"32-55","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/CholdaMHWJ07","doi":"10.1109/COMST.2007.4444749","ee":"https://doi.org/10.1109/COMST.2007.4444749","url":"https://dblp.org/rec/journals/comsur/CholdaMHWJ07"}, "url":"URL#5453310" }, { "@score":"1", "@id":"5453311", "info":{"authors":{"author":[{"@pid":"27/3281","text":"Benoit Donnet"},{"@pid":"62/609","text":"Timur Friedman"}]},"title":"Internet topology discovery: A survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"56-69","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/DonnetF07","doi":"10.1109/COMST.2007.4444750","ee":"https://doi.org/10.1109/COMST.2007.4444750","url":"https://dblp.org/rec/journals/comsur/DonnetF07"}, "url":"URL#5453311" }, { "@score":"1", "@id":"5453312", "info":{"authors":{"author":{"@pid":"f/NelsonLSdaFonseca","text":"Nelson L. S. da Fonseca"}},"title":"Editor note - Welcome to issue 1 of volume 9 of IEEE Communications Surveys and Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"0","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/Fonseca07","ee":"http://dl.comsoc.org/cocoon/comsoc/servlets/OntologySearch?query=&node=TOC1775&render=false&type=1","url":"https://dblp.org/rec/journals/comsur/Fonseca07"}, "url":"URL#5453312" }, { "@score":"1", "@id":"5453313", "info":{"authors":{"author":{"@pid":"f/NelsonLSdaFonseca","text":"Nelson L. S. da Fonseca"}},"title":"Editor note - Welcome to issue 2 of volume 9 of IEEE Communications Surveys and Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/Fonseca07a","ee":"http://dl.comsoc.org/cocoon/comsoc/servlets/OntologySearch?query=&node=TOC1796&render=false&type=1","url":"https://dblp.org/rec/journals/comsur/Fonseca07a"}, "url":"URL#5453313" }, { "@score":"1", "@id":"5453314", "info":{"authors":{"author":{"@pid":"f/NelsonLSdaFonseca","text":"Nelson L. S. da Fonseca"}},"title":"Editor note - Welcome to issue 3 of volume 9 of IEEE Communications Surveys and Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"0","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/Fonseca07b","ee":"http://dl.comsoc.org/cocoon/comsoc/servlets/OntologySearch?query=&node=TOC1827&render=false&type=1","url":"https://dblp.org/rec/journals/comsur/Fonseca07b"}, "url":"URL#5453314" }, { "@score":"1", "@id":"5453315", "info":{"authors":{"author":[{"@pid":"65/3529","text":"Aun Haider"},{"@pid":"19/1119-1","text":"Richard J. Harris 0001"}]},"title":"Recovery techniques in next generation networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"2-17","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/HaiderH07","doi":"10.1109/COMST.2007.4317617","ee":"https://doi.org/10.1109/COMST.2007.4317617","url":"https://dblp.org/rec/journals/comsur/HaiderH07"}, "url":"URL#5453315" }, { "@score":"1", "@id":"5453316", "info":{"authors":{"author":[{"@pid":"53/6316","text":"Marek Hajduczenia"},{"@pid":"26/2761","text":"Pedro R. M. Inácio"},{"@pid":"32/2346","text":"Henrique J. A. da Silva"},{"@pid":"70/6992","text":"Mário M. Freire"},{"@pid":"51/5855","text":"Paulo P. Monteiro"}]},"title":"On EPON security issues.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"68-83","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/HajduczeniaISFM07","doi":"10.1109/COMST.2007.358972","ee":"https://doi.org/10.1109/COMST.2007.358972","url":"https://dblp.org/rec/journals/comsur/HajduczeniaISFM07"}, "url":"URL#5453316" }, { "@score":"1", "@id":"5453317", "info":{"authors":{"author":[{"@pid":"92/5955","text":"Lajos Hanzo"},{"@pid":"18/380","text":"Rahim Tafazolli"}]},"title":"A survey of QOS routing solutions for mobile ad hoc networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"50-70","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/HanzoT07","doi":"10.1109/COMST.2007.382407","ee":"https://doi.org/10.1109/COMST.2007.382407","url":"https://dblp.org/rec/journals/comsur/HanzoT07"}, "url":"URL#5453317" }, { "@score":"1", "@id":"5453318", "info":{"authors":{"author":[{"@pid":"77/4623","text":"Mojtaba Hosseini"},{"@pid":"87/6303","text":"Dewan Tanvir Ahmed"},{"@pid":"10/2042","text":"Shervin Shirmohammadi"},{"@pid":"g/NDGeorganas","text":"Nicolas D. Georganas"}]},"title":"A survey of application-layer multicast protocols.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"58-74","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/HosseiniASG07","doi":"10.1109/COMST.2007.4317616","ee":"https://doi.org/10.1109/COMST.2007.4317616","url":"https://dblp.org/rec/journals/comsur/HosseiniASG07"}, "url":"URL#5453318" }, { "@score":"1", "@id":"5453319", "info":{"authors":{"author":[{"@pid":"03/5615","text":"Shu Huang"},{"@pid":"47/955","text":"Rudra Dutta"}]},"title":"Dynamic traffic grooming: The changing role of traffic grooming.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"32-49","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/HuangD07","doi":"10.1109/COMST.2007.358970","ee":"https://doi.org/10.1109/COMST.2007.358970","url":"https://dblp.org/rec/journals/comsur/HuangD07"}, "url":"URL#5453319" }, { "@score":"1", "@id":"5453320", "info":{"authors":{"author":[{"@pid":"30/1610","text":"Admela Jukan"},{"@pid":"40/1137","text":"Gigi Karmous-Edwards"}]},"title":"Optical control plane for the grid community.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"30-44","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/JukanK07","doi":"10.1109/COMST.2007.4317618","ee":"https://doi.org/10.1109/COMST.2007.4317618","url":"https://dblp.org/rec/journals/comsur/JukanK07"}, "url":"URL#5453320" }, { "@score":"1", "@id":"5453321", "info":{"authors":{"author":[{"@pid":"12/11160","text":"Giorgos Karopoulos"},{"@pid":"90/2058","text":"Georgios Kambourakis"},{"@pid":"83/4094","text":"Stefanos Gritzalis"}]},"title":"Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"18-28","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/KaropoulosKG07","doi":"10.1109/COMST.2007.4317619","ee":"https://doi.org/10.1109/COMST.2007.4317619","url":"https://dblp.org/rec/journals/comsur/KaropoulosKG07"}, "url":"URL#5453321" }, { "@score":"1", "@id":"5453322", "info":{"authors":{"author":[{"@pid":"120/8121","text":"Mehmet Kemal Özdemir"},{"@pid":"67/1416","text":"Hüseyin Arslan"}]},"title":"Channel estimation for wireless OFDM systems.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"18-48","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/OzdemirA07","doi":"10.1109/COMST.2007.382406","ee":"https://doi.org/10.1109/COMST.2007.382406","url":"https://dblp.org/rec/journals/comsur/OzdemirA07"}, "url":"URL#5453322" }, { "@score":"1", "@id":"5453323", "info":{"authors":{"author":[{"@pid":"51/16","text":"Sangheon Pack"},{"@pid":"17/1900-1","text":"Jaeyoung Choi 0001"},{"@pid":"14/2293-1","text":"Taekyoung Kwon 0001"},{"@pid":"82/2088","text":"Yanghee Choi"}]},"title":"Fast-handoff support in IEEE 802.11 wireless networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"2-12","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/PackCKC07","doi":"10.1109/COMST.2007.358968","ee":"https://doi.org/10.1109/COMST.2007.358968","url":"https://dblp.org/rec/journals/comsur/PackCKC07"}, "url":"URL#5453323" }, { "@score":"1", "@id":"5453324", "info":{"authors":{"author":[{"@pid":"15/6580","text":"Vijoy Pandey"},{"@pid":"55/4427","text":"Dipak Ghosal"},{"@pid":"86/3964","text":"Biswanath Mukherjee"}]},"title":"Pricing-based approaches in the design of next-generation wireless networks: A review and a unified proposal.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"88-101","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/PandeyGM07","doi":"10.1109/COMST.2007.382409","ee":"https://doi.org/10.1109/COMST.2007.382409","url":"https://dblp.org/rec/journals/comsur/PandeyGM07"}, "url":"URL#5453324" }, { "@score":"1", "@id":"5453325", "info":{"authors":{"author":[{"@pid":"22/2460","text":"Nikolaos A. Pantazis"},{"@pid":"67/2009","text":"Dimitrios D. Vergados"}]},"title":"A survey on power control issues in wireless sensor networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"86-107","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/PantazisV07","doi":"10.1109/COMST.2007.4444752","ee":"https://doi.org/10.1109/COMST.2007.4444752","url":"https://dblp.org/rec/journals/comsur/PantazisV07"}, "url":"URL#5453325" }, { "@score":"1", "@id":"5453326", "info":{"authors":{"author":{"@pid":"20/2668","text":"Dana Porrat"}},"title":"Information theory of wideband communications.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"2-16","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/Porrat07","doi":"10.1109/COMST.2007.382405","ee":"https://doi.org/10.1109/COMST.2007.382405","url":"https://dblp.org/rec/journals/comsur/Porrat07"}, "url":"URL#5453326" }, { "@score":"1", "@id":"5453327", "info":{"authors":{"author":{"@pid":"26/4564","text":"Sirin Tekinay"}},"title":"News from the communications program at NSF.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"0","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/Tekinay07","ee":"http://dl.comsoc.org/cocoon/comsoc/servlets/OntologySearch?query=&node=TOC1775&render=false&type=1","url":"https://dblp.org/rec/journals/comsur/Tekinay07"}, "url":"URL#5453327" }, { "@score":"1", "@id":"5453328", "info":{"authors":{"author":{"@pid":"26/4564","text":"Sirin Tekinay"}},"title":"News from the communications program at NSF.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/Tekinay07a","ee":"http://dl.comsoc.org/cocoon/comsoc/servlets/OntologySearch?query=&node=TOC1796&render=false&type=1","url":"https://dblp.org/rec/journals/comsur/Tekinay07a"}, "url":"URL#5453328" }, { "@score":"1", "@id":"5453329", "info":{"authors":{"author":{"@pid":"26/4564","text":"Sirin Tekinay"}},"title":"News from the communications program at NSF.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"0","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/Tekinay07b","ee":"http://dl.comsoc.org/cocoon/comsoc/servlets/OntologySearch?query=&node=TOC1827&render=false&type=1","url":"https://dblp.org/rec/journals/comsur/Tekinay07b"}, "url":"URL#5453329" }, { "@score":"1", "@id":"5453330", "info":{"authors":{"author":{"@pid":"11/10822-2","text":"Steven Wright 0002"}},"title":"Admission control in multi-service IP networks: A tutorial.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"72-87","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/Wright07","doi":"10.1109/COMST.2007.382408","ee":"https://doi.org/10.1109/COMST.2007.382408","url":"https://dblp.org/rec/journals/comsur/Wright07"}, "url":"URL#5453330" }, { "@score":"1", "@id":"5453331", "info":{"authors":{"author":[{"@pid":"65/333","text":"Sebastian Zander"},{"@pid":"49/184","text":"Grenville J. Armitage"},{"@pid":"26/3899","text":"Philip Branch"}]},"title":"A survey of covert channels and countermeasures in computer network protocols.","venue":"IEEE Commun. Surv. Tutorials","volume":"9","number":"1-4","pages":"44-57","year":"2007","type":"Journal Articles","access":"closed","key":"journals/comsur/ZanderAB07","doi":"10.1109/COMST.2007.4317620","ee":"https://doi.org/10.1109/COMST.2007.4317620","url":"https://dblp.org/rec/journals/comsur/ZanderAB07"}, "url":"URL#5453331" } ] } } } )