default search action
Computer Networks [and ISDN Systems], Volume 57
Volume 57, Number 1, January 2013
- Ian F. Akyildiz, Harry Rudin:
COMNET editorial for 2012. 1-2 - Christos Papathanasiou, Nikos Dimitriou, Leandros Tassiulas:
Dynamic radio resource and interference management for MIMO-OFDMA mobile broadband wireless access systems. 3-16 - Long Long, Ahmed E. Kamal:
Protecting multicast services in optical internet backbones. 17-28 - Ahmad Sardouk, Majdi Mansouri, Leïla Merghem-Boulahia, Dominique Gaïti, Rana Rahim-Amoud:
Crisis management using MAS-based wireless sensor networks. 29-45 - Dong Mei Shan, Kee Chaing Chua, Gurusamy Mohan, Jian Qiu:
Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks. 46-60 - Seung Yeob Nam, Seong Joon Kim, Sihyung Lee, Hyong S. Kim:
Estimation of the available bandwidth ratio of a remote link or path segments. 61-77 - Kishore Angrishi:
An end-to-end stochastic network calculus with effective bandwidth and effective capacity. 78-84 - Beakcheol Jang, Jun Bum Lim, Mihail L. Sichitiu:
An asynchronous scheduled MAC protocol for wireless sensor networks. 85-98 - Donghyeok An, Honguk Woo, Hyunsoo Yoon, Ikjun Yeom:
Enhanced cooperative communication MAC for mobile wireless networks. 99-116 - Mingwei Xu, Meijia Hou, Dan Wang, Jiahai Yang:
An efficient critical protection scheme for intra-domain routing using link characteristics. 117-133 - A. Mirsayar Barkoosaraei, A. Hamid Aghvami:
Dynamic partitioning of IP-based wireless access networks. 134-146 - Addisu Eshete, Yuming Jiang:
Generalizing the CHOKe flow protection. 147-161 - Anwesha Mukherjee, Srimoyee Bhattacherjee, Sucheta Pal, Debashis De:
Femtocell based green power consumption methods for mobile network. 162-178 - Weiwei Fang, Xiangmin Liang, Shengxin Li, Luca Chiaraviglio, Naixue Xiong:
VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers. 179-196 - Hui Chen, Yang Xiao, Susan V. Vrbsky:
An update-based step-wise optimal cache replacement for wireless data access. 197-212 - Enrico Gregori, Luciano Lenzini, Chiara Orsini:
k-Dense communities in the Internet AS-level topology graph. 213-227 - Abderrahmen Mtibaa, Khaled A. Harras:
Fairness-related challenges in mobile opportunistic networking. 228-242 - Guang Yao, Jun Bi, Peiyao Xiao:
VASE: Filtering IP spoofing traffic with agility. 243-257 - Pablo Serrano, Paul Patras, Andrea Mannocci, Vincenzo Mancuso, Albert Banchs:
Control theoretic optimization of 802.11 WLANs: Implementation and experimental evaluation. 258-272 - Fabio R. J. Vieira, José Ferreira de Rezende, Valmir Carneiro Barbosa, Serge Fdida:
Local heuristic for the refinement of multi-path routing in wireless mesh networks. 273-285 - Consolee Mbarushimana, Ali Shahrabi, Tom Buggy:
A cross-layer TCP enhancement in QoS-aware mobile ad hoc networks. 286-301 - Julia Amador, Jesus R. Artalejo:
Modeling computer virus with the BSDE approach. 302-316 - Toktam Mahmoodi, Vasilis Friderikos, Hamid Aghvami:
Using traffic asymmetry to enhance TCP performance. 317-329 - Devrim Unal, Mehmet Ufuk Çaglayan:
A formal role-based access control model for security policies in multi-domain mobile networks. 330-350 - Lin Cui, Weijia Jia:
Cyclic stable matching for three-sided networking services. 351-363 - Berk Canberk:
An adaptive and QoS-based spectrum awareness framework for CR networks. 364-373
Volume 57, Number 2, February 2013
- Ronaldo M. Salles, Guofei Gu, Morton Swimmer:
Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''. 375-377 - Sérgio S. C. Silva, Rodrigo M. P. Silva, Raquel Coelho Gomes Pinto, Ronaldo M. Salles:
Botnets: A survey. 378-403 - Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu:
The SIC botnet lifecycle model: A step beyond traditional epidemiological models. 404-421 - Marco Riccardi, Roberto Di Pietro, Marta Palanques, Jorge Aguila Vila:
Titans' revenge: Detecting Zeus via its own flaws. 422-435 - Aditya K. Sood, Richard J. Enbody, Rohit Bansal:
Dissecting SpyEye - Understanding the design of third generation botnets. 436-450 - Juan Caballero, Dawn Song:
Automatic protocol reverse-engineering: Message format extraction and field semantics inference. 451-474 - Christian J. Dietrich, Christian Rossow, Norbert Pohlmann:
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis. 475-486 - Roberto Perdisci, Davide Ariu, Giorgio Giacinto:
Scalable fine-grained behavioral clustering of HTTP-based malware. 487-500 - Hui-Tang Lin, Ying-You Lin, Jui-Wei Chiang:
Genetic-based real-time fast-flux service networks detection. 501-513 - Chun-Ying Huang:
Effective bot host detection based on network failure models. 514-525 - Pedro Henrique B. Las-Casas, Dorgival O. Guedes, Jussara M. Almeida, Artur Ziviani, Humberto T. Marques-Neto:
SpaDeS: Detecting spammers at the source network. 526-539 - Guanhua Yan:
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. 540-555 - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
Design and analysis of a social botnet. 556-578 - Jingyu Hua, Kouichi Sakurai:
Botnet command and control based on Short Message Service and human mobility. 579-597
Volume 57, Number 3, February 2013
- Antonio de la Oliva, Tito R. Vargas Hernández, Juan Carlos Guerri, José Alberto Hernández, Pedro Reviriego:
Performance analysis of Energy Efficient Ethernet on video streaming servers. 599-608 - Evan Tan, Chun Tung Chou:
Joint optimization of continuity and quality for streaming video. 609-621 - Chong Han, Josep Miquel Jornet, Etimad A. Fadel, Ian F. Akyildiz:
A cross-layer communication module for the Internet of Things. 622-633 - Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia:
Blog or block: Detecting blog bots through behavioral biometrics. 634-646 - Kush Kothari, Matthew K. Wright:
Mimic: An active covert channel that evades regularity-based detection. 647-657 - Noriaki Kamiyama:
Designing data center network by analytic hierarchy process. 658-667 - Yu Wang, Hari Krishna Garg, Mehul Motani:
Downlink scheduling for user equipment served by multiple mobile terminals in cellular systems. 668-681 - Tudor Dumitras, Priya Narasimhan:
A study of unpredictability in fault-tolerant middleware. 682-698 - Vincent Lucas, Jean-Jacques Pansiot, Dominique Grad, Benoît Hilt:
Robust and fair Multicast Congestion Control (M2C). 699-724 - Joo-Young Baek, Jeong-Yoon Lee, Young-Joo Suh:
An elastic compensation model for frame-based scheduling algorithms in wireless networks. 725-740 - Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara:
Autonomic load balancing of flow monitors. 741-761 - Faqir Zarrar Yousaf, Christian Wietfeld:
Optimizing throughput performance of FMIPv6 over legacy 802.11 networks using iterative scanning. 762-781 - Yi-Mao Hsiao, Yuan-Sun Chu, Jeng-Farn Lee, Jinn-Shyan Wang:
A high-throughput and high-capacity IPv6 routing lookup system. 782-794 - Emiliano Casalicchio, Luca Silvestri:
Mechanisms for SLA provisioning in cloud-based service providers. 795-810 - Aruna Jamdagni, Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. 811-824 - Reduan H. Khan, Jamil Y. Khan:
A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network. 825-845
Volume 57, Number 4, March 2013
- Ren-Huang Liou, Yi-Bing Lin:
Mobility management with the central-based location area policy. 847-857 - Wei-Tong Wang, Kuo-Feng Ssu:
Obstacle detection and estimation in wireless sensor networks. 858-868 - Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, Wei Zhao:
Protocol-level attacks against Tor. 869-886 - Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, Chin-Laung Lei:
An adaptive sector-based routing model over structured peer-to-peer networks. 887-896 - Juhoon Kim, Luigi Iannone, Anja Feldmann:
Caching Locator/ID mappings: An experimental scalability analysis and its implications. 897-909 - Kaikai Chi, Xiaohong Jiang, Yi-hua Zhu, Jing Wang, Yanjun Li:
Block-level packet recovery with network coding for wireless reliable multicast. 910-923 - Mohamed Diallo, Vasilis Sourlas, Paris Flegkas, Serge Fdida, Leandros Tassiulas:
A content-based publish/subscribe framework for large-scale content delivery. 924-943 - Xiuzhong Chen, Marc De Leenheer, Rui Wang, Chaitanya S. K. Vadrevu, Lei Shi, Jie Zhang, Biswanath Mukherjee:
High-performance routing for hose-based VPNs in multi-domain backbone networks. 944-953 - José M. Camacho, Alberto García-Martínez, Marcelo Bagnulo, Francisco Valera:
BGP-XM: BGP eXtended Multipath for transit Autonomous Systems. 954-975 - Stefano Secci, Kunpeng Liu, Bijan Jabbari:
Efficient inter-domain traffic engineering with transit-edge hierarchical routing. 976-989 - Yuting Miao, Qiang Yang, Chunming Wu, Ming Jiang, Jinzhou Chen:
Multicast virtual network mapping for supporting multiple description coding-based video applications. 990-1002 - Rachid El Azouzi, Francesco De Pellegrini, Habib B. A. Sidi, Vijay Kamble:
Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation. 1003-1018 - Alex Borges Vieira, Rafael Barra de Almeida, Jussara Marques de Almeida, Sérgio Vale Aguiar Campos:
SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming. 1019-1036 - Xiaoyuan Luo, Yanlin Yan, Shaobao Li, Xinping Guan:
Topology control based on optimally rigid graph in wireless sensor networks. 1037-1047 - Sungoh Kwon, Neung-Hyung Lee:
Cell ID extension in femtocell environments. 1048-1062
Volume 57, Number 5, April 2013
- Feng Shan, Weifa Liang, Jun Luo, Xiaojun Shen:
Network lifetime maximization for time-sensitive data gathering in wireless sensor networks. 1063-1077 - Christian Bauer:
A Secure Correspondent Router Protocol for NEMO Route Optimization. 1078-1100 - Mehmet Yunus Donmez, Sinan Isik, Cem Ersoy:
Combined analysis of contention window size and duty cycle for throughput and energy optimization in wireless sensor networks. 1101-1112 - Mohammad A. Raayatpanah, H. Salehi Fathabadi, Babak H. Khalaj, Salman Khodayifar:
Minimum cost multiple multicast network coding with quantized rates. 1113-1123 - Efe Karasabun, Ibrahim Korpeoglu, Cevdet Aykanat:
Active node determination for correlated data gathering in wireless sensor networks. 1124-1138 - Donggyu Yun, Jungseul Ok, Bongjhin Shin, Soobum Park, Yung Yi:
Embedding of virtual network requests over static wireless multihop networks. 1139-1152 - Ji-Hoon Yun:
Performance analysis of IEEE 802.11 WLANs with rate adaptation in time-varying fading channels. 1153-1166 - Pavlos Antoniou, Andreas Pitsillides, Tim Blackwell, Andries P. Engelbrecht, Loizos Michael:
Congestion control in wireless sensor networks based on bird flocking behavior. 1167-1191 - Necati Kilic, Vehbi Cagri Gungor:
Analysis of low power wireless links in smart grid environments. 1192-1203 - Gregory Detal, Christoph Paasch, Simon van der Linden, Pascal Mérindol, Gildas Avoine, Olivier Bonaventure:
Revisiting flow-based load balancing: Stateless path selection in data center networks. 1204-1216 - Slavisa Aleksic, Margot Deruyck, Willem Vereecken, Wout Joseph, Mario Pickavet, Luc Martens:
Energy efficiency of femtocell deployment in combined wireless/optical access networks. 1217-1233 - Peristera A. Baziana, Ioannis E. Pountourakis:
An access protocol for efficiency optimization in WDM networks: A propagation delay and collisions avoidance analysis. 1234-1252 - Lucia D'Acunto, Nitin Chiluka, Tamás Vinkó, Henk J. Sips:
BitTorrent-like P2P approaches for VoD: A comparative study. 1253-1276 - Daniele Casagrande, Pier Luca Montessoro, Franco Blanchini:
Fair and optimal dynamic admission control of elastic flows. 1277-1288 - Saeed Salah, Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo:
A model-based survey of alert correlation techniques. 1289-1317 - Christian Esposito, Domenico Cotroneo, Stefano Russo:
On reliability in publish/subscribe services. 1318-1343 - Wenye Wang, Zhuo Lu:
Cyber security in the Smart Grid: Survey and challenges. 1344-1371
Volume 57, Number 6, April 2013
- Márton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly, Gergely Biczók:
Incrementally upgradable data center architecture using hyperbolic tessellations. 1373-1393 - Christos Anagnostopoulos, Stathes Hadjiefthymiades:
Multivariate context collection in mobile sensor networks. 1394-1407 - Kai-Wei Ke, Chia-Hui Huang:
Performance evaluation of multisource Application Layer Multicast (ALM): Theoretical and simulative aspects. 1408-1424 - Urs Hunkeler, Clemens Lombriser, Hong Linh Truong, Beat Weiss:
A case for centrally controlled wireless sensor networks. 1425-1442 - Conrado Borraz-Sánchez, Diego Klabjan:
Optimal placement of reconfigurable optical add/drop multiplexers with packing, blocking, and signal loss. 1443-1458 - Adel Ali Ahmed:
An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks. 1459-1473 - Linjun Fan, Yunxiang Ling, Tao Wang, Xiaomin Zhu, Xiaoyong Tang:
Novel clock synchronization algorithm of parametric difference for parallel and distributed simulations. 1474-1487 - Youghourta Benfattoum, Steven Martin, Khaldoun Al Agha:
QoS for real-time reliable multicasting in wireless multi-hop networks using a Generation-Based Network Coding. 1488-1502 - Edoardo Amaldi, Antonio Capone, Luca Giovanni Gianoli:
Energy-aware IP traffic engineering with shortest path routing. 1503-1517 - Rajarshi Mahapatra, Antonio De Domenico, Rohit Gupta, Emilio Calvanese Strinati:
Green framework for future heterogeneous wireless networks. 1518-1528 - Xiaoping Wang, Yunhao Liu, Zheng Yang, Kai Lu, Jun Luo:
OFA: An optimistic approach to conquer flip ambiguity in network localization. 1529-1544 - S. Chiappetta, Claudio Mazzariello, Roberta Presta, Simon Pietro Romano:
An anomaly-based approach to the analysis of the social behavior of VoIP users. 1545-1559 - Ryoichi Kawahara, Tetsuya Takine, Tatsuya Mori, Noriaki Kamiyama, Keisuke Ishibashi:
Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management. 1560-1576
Volume 57, Number 7, May 2013
- S. H. Shah Newaz, Ángel Cuevas, Gyu Myoung Lee, Noël Crespi, Jun Kyun Choi:
Adaptive Delay-Aware Energy Efficient TDM-PON. 1577-1596 - Christian Facchini, Oliver Holland, Fabrizio Granelli, Nelson L. S. da Fonseca, Hamid Aghvami:
Dynamic green self-configuration of 3G base stations using fuzzy cognitive maps. 1597-1610 - Weibo Chu, Xiaohong Guan, Zhongmin Cai, Lixin Gao:
Real-time volume control for interactive network traffic replay. 1611-1629 - Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, Guy Leduc:
Outbound SPIT filter with optimal performance guarantees. 1630-1643 - Jongwook Lee, Jin-Ghoo Choi, Saewoong Bahk:
Opportunistic downlink data delivery for mobile collaborative communities. 1644-1655 - T. D. Lagkas, Panagiotis G. Sarigiannidis, Malamati D. Louta:
On analyzing the intra-frame power saving potentials of the IEEE 802.16e downlink vertical mapping. 1656-1673 - Weijie Wu, John C. S. Lui, Richard T. B. Ma:
On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation. 1674-1688 - Wei Kuang Lai, Chang-Lung Tang:
QoS-aware downlink packet scheduling for LTE networks. 1689-1698 - Cristina Rottondi, Giacomo Verticale, Antonio Capone:
Privacy-preserving smart metering with multiple data Consumers. 1699-1713 - Javad Akbari Torkestani:
An energy-efficient topology construction algorithm for wireless sensor networks. 1714-1725 - Ahmad Vakili, Jean-Charles Grégoire:
QoE management for video conferencing applications. 1726-1738
Volume 57, Number 8, June 2013
- Stamatios Arkoulis, Evangelos Anifantis, Vasileios Karyotis, Symeon Papavassiliou, Nikolas Mitrou:
On the optimal, fair and channel-aware cognitive radio network reconfiguration. 1739-1757 - László Gyarmati, András Gulyás, Balázs Sonkoly, Tuan Anh Trinh, Gergely Biczók:
Free-scaling your data center. 1758-1773 - Gongqi Lin, Sieteng Soh, Kwan-Wu Chin, Mihai M. Lazarescu:
Efficient heuristics for energy-aware routing in networks with bundled links. 1774-1788 - Giacomo Bacci, Marco Luise:
QoS-aware game-theoretic rate & power control for CDMA wireless communication networks. 1789-1804 - Shengbo Yang, Chai Kiat Yeo, Bu-Sung Lee:
MaxCD: Efficient multi-flow scheduling and cooperative downloading for improved highway drive-thru Internet systems. 1805-1820 - Michele Rondinone, Javier Gozálvez:
Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks. 1821-1837 - Giovanna Carofiglio, Luca Muscariello, Dario Rossi, Claudio Testa, Silvio Valenti:
Rethinking the Low Extra Delay Background Transport (LEDBAT) Protocol. 1838-1852 - Zoltán Czirkos, Gábor Hosszú:
Solution for the broadcasting in the Kademlia peer-to-peer overlay. 1853-1862 - Stefano Iellamo, Lin Chen, Marceau Coupechoux:
Proportional and double imitation rules for spectrum access in cognitive radio networks. 1863-1879 - Alexandre Andrade Pires, José Ferreira de Rezende:
Independent links: A new approach to increase spatial reuse in wireless networks. 1880-1893
Volume 57, Number 9, June 2013
- Xi Fang, Dejun Yang, Guoliang Xue:
Pathbook: Cross-layer optimization for full-duplex wireless networks. 1895-1912 - Habib M. Ammari:
On the energy-delay trade-off in geographic forwarding in always-on wireless sensor networks: A multi-objective optimization problem. 1913-1935 - Michal Ficek, Tomás Pop, Lukas Kencl:
Active tracking in mobile networks: An in-depth view. 1936-1954 - Leonardo Militano, Antonio Iera, Francesco Scarcello:
A fair cooperative content-sharing service. 1955-1973 - Péter Babarczi, Gergely Biczók, Harald Øverby, János Tapolcai, Péter Soproni:
Realization strategies of dedicated path protection: A bandwidth cost perspective. 1974-1990 - Waleed Alsalih, Kashif Ali, Hossam S. Hassanein:
A power control technique for anti-collision schemes in RFID systems. 1991-2003 - Angelo Coiro, Marco Listanti, Alessandro Valenti, Francesco Matera:
Energy-aware traffic engineering: A routing-based distributed solution for connection-oriented IP networks. 2004-2020 - Juan Felipe Botero, Xavier Hesselbach:
Greener networking in a network virtualization environment. 2021-2039 - Adil Fahad, Zahir Tari, Ibrahim Khalil, Ibrahim Habib, Hussein M. Alnuweiri:
Toward an efficient and scalable feature selection approach for internet traffic classification. 2040-2057 - Sasho Gramatikov, Fernando Jaureguizar, Julián Cabrera, Narciso García:
Stochastic modelling of peer-assisted VoD streaming in managed networks. 2058-2074 - Evariste Logota, Carlos Campos, Susana Sargento, Augusto Neto:
Advanced multicast class-based bandwidth over-provisioning. 2075-2092 - Giuseppe Aceto, Alessio Botta, Walter de Donato, Antonio Pescapè:
Cloud monitoring: A survey. 2093-2115
Volume 57, Number 10, July 2013
- Stephan J. Eidenbenz, Madhav V. Marathe, Arunabha Sen:
Editorial for Computer Networks special issue on ''Towards a Science of Cyber Security''. 2119-2120 - Chris J. Kuhlman, V. S. Anil Kumar, S. S. Ravi:
Controlling opinion propagation in online networks. 2121-2132 - Nam P. Nguyen, Guanhua Yan, My T. Thai:
Analysis of misinformation containment in online social networks. 2133-2146 - Yi Wang, Marios Iliofotou, Michalis Faloutsos, Bin Wu:
Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies. 2147-2158 - Jaafar Almasizadeh, Mohammad Abdollahi Azgomi:
A stochastic model of attack process for the evaluation of security metrics. 2159-2180 - Bugra Çaskurlu, Ashish Gehani, Cemal Çagatay Bilgin, K. Subramani:
Analytical models for risk-based intrusion response. 2181-2192 - Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
On the exploitation of CDF based wireless scheduling. 2193-2205 - Klaus Julisch:
Understanding and overcoming cyber security anti-patterns. 2206-2211
- Tapio Levä, Miika Komu, Ari Keränen, Sakari Luukkainen:
Adoption barriers of network layer protocols: The case of host identity protocol. 2218-2232 - Elena Torroglosa-García, Antonio D. Perez-Morales, Pedro Martinez-Julia, Diego R. López:
Integration of the OAuth and Web Service family security standards. 2233-2249 - Yang Xiang, Xingang Shi, Jianping Wu, Zhiliang Wang, Xia Yin:
Sign what you really care about - Secure BGP AS-paths efficiently. 2250-2265 - Rodrigo Roman, Jianying Zhou, Javier López:
On the features and challenges of security and privacy in distributed internet of things. 2266-2279 - Pedro Martinez-Julia, Antonio Fernandez Gómez-Skarmeta:
Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet. 2280-2300
Volume 57, Number 11, August 2013
- Paola Cappanera, Luciano Lenzini, Alessandro Lori, Giovanni Stea, Gigliola Vaglini:
Optimal joint routing and link scheduling for real-time traffic in TDMA Wireless Mesh Networks. 2301-2312 - Soham Sengupta:
An approach to provide a network layer security model with QR code generated with shuffled GPS parameters as embedded keys traveling over Internet using existing IPv4 mechanism. 2313-2330 - Fabien Tarissan, Bruno Quoitin, Pascal Mérindol, Benoit Donnet, Jean-Jacques Pansiot, Matthieu Latapy:
Towards a bipartite graph modeling of the internet topology. 2331-2347 - Xiao-Yang Liu, Kai-Liang Wu, Yanmin Zhu, Linghe Kong, Min-You Wu:
Mobility increases the surface coverage of distributed sensor networks. 2348-2363 - Md. Nooruzzaman, Osanori Koyama, Yutaka Katsuyama:
Congestion removing performance of stackable ROADM in WDM networks under dynamic traffic. 2364-2373 - Mirjana D. Stojanovic, Aleksandra Kostic-Ljubisavljevic, Vesna M. Radonjic-Djogatovic:
SLA-controlled interconnection charging in next generation networks. 2374-2394
Volume 57, Number 12, August 2013
- Kenneth J. Turner, Evan H. Magill:
Special Issue on Feature interaction in communications and software systems. 2395-2398 - Sven Apel, Alexander von Rhein, Thomas Thüm, Christian Kästner:
Feature-interaction detection based on feature-based specifications. 2399-2409 - Mario Kolberg, John F. Buford, Krishna Kishore Dhara, Xiaotao Wu, Venky Krishnaswamy:
Feature interaction in a federated communications-enabled collaboration platform. 2410-2428 - Claire Maternaghan, Kenneth J. Turner:
Policy conflicts in home automation. 2429-2441 - Masahide Nakamura, Kousuke Ikegami, Shinsuke Matsumoto:
Considering impacts and requirements for better understanding of environment interactions in home network services. 2442-2453 - Thein Than Tun, Robin C. Laney, Yijun Yu, Bashar Nuseibeh:
Specifying software features for composition: A tool-supported approach. 2454-2464
Volume 57, Number 13, September 2013
- Yusung Kim, Ikjun Yeom:
Performance analysis of in-network caching for content-centric networking. 2465-2482 - Chao-Tsun Chang, Chih-Yung Chang, Tzu-Lin Wang, Yun-Jung Lu:
Throughput enhancement by exploiting spatial reuse opportunities with smart antenna systems in wireless ad hoc networks. 2483-2498 - Jérémy Serror, Hui Zang, Jean-Chrysostome Bolot:
Measurement and modeling of paging channel overloads on a cellular network. 2499-2513 - Hui-Tang Lin, Ying-You Lin, Chung-Jui Sun:
Efficient and adaptive resource scheduling in IEEE 802.16j transparent relay networks. 2514-2535 - Klaus Wehmuth, Artur Ziviani:
DACCER: Distributed Assessment of the Closeness CEntrality Ranking in complex networks. 2536-2548 - Jaehoon (Paul) Jeong, Tian He, David H. C. Du:
TMA: Trajectory-based Multi-Anycast forwarding for efficient multicast data delivery in vehicular networks. 2549-2563 - Silvia Boiardi, Antonio Capone, Brunilde Sansò:
Radio planning of energy-aware cellular networks. 2564-2577 - Hasan Tuncer, Andres Kwasinski, Nirmala Shenoy:
Performance analysis of Virtual Mobility Domain scheme vs. IPv6 mobility protocols. 2578-2596 - Tolga Acar, Mira Belenkiy, Alptekin Küpçü:
Single password authentication. 2597-2614 - Jeng-Wei Lee, I-Hsun Chuang, Win-Bin Huang, Yau-Hwang Kuo:
An opportunistic resource allocation approach for mixed QoS and non-QoS connections in OFDMA wireless networks. 2615-2627 - Seungwon Shin, Zhaoyan Xu, Guofei Gu:
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection. 2628-2642 - Ben-Jye Chang, Ying-Hsin Liang, Yu-Hsien Lee:
Dynamic-cost-reward connection admission control for maximizing system reward in 4G wireless multihop relaying networks. 2643-2655 - Natalia Castro Fernandes, Marcelo Duffles Donato Moreira, Otto Carlos Muniz Bandeira Duarte:
Safeguarding ad hoc networks with a self-organized membership control system. 2656-2674
Volume 57, Number 14, October 2013
- Boris Bellalta, Azadeh Faridi, Dirk Staehle, Jaume Barceló, Alexey V. Vinel, Miquel Oliver:
Performance analysis of CSMA/CA protocols with multi-packet transmission. 2675-2688 - Pengfei Zhang, Gaoxi Xiao, Hwee-Pink Tan:
Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors. 2689-2704 - Hung-Yu Chien:
Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. 2705-2717 - José Camacho, Pablo Padilla, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo:
A generalizable dynamic flow pairing method for traffic classification. 2718-2732 - Hai-Heng Ng, Wee-Seng Soh, Mehul Motani:
An underwater acoustic MAC protocol using reverse opportunistic packet appending. 2733-2751 - Faouzi Bouali, Oriol Sallent, Jordi Pérez-Romero, Ramón Agustí:
A cognitive management framework for spectrum selection. 2752-2765 - Ibrahima Diarrassouba, Ali Lourimi, Ali Ridha Mahjoub, Habib Youssef:
Hose workload based exact algorithm for the optimal design of virtual private networks. 2766-2774 - Florian Tschorsch, Björn Scheuermann:
An algorithm for privacy-preserving distributed user statistics. 2775-2787 - Ze Wang, Yunlong Wang, Maode Ma, Jigang Wu:
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method. 2788-2801 - Giuseppe Rossini, Dario Rossi, Christophe Betoule, Remi Clavier, Gilles Thouénon:
FIB Aplasia through probabilistic routing and autoforwarding. 2802-2816 - Dariusz Gasior, Maciej Drwal:
Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks. 2817-2832 - Delfina Malandrino, Vittorio Scarano:
Privacy leakage on the Web: Diffusion and countermeasures. 2833-2855 - Kai-Lung Hua, Ge-Ming Chiu, Hsing-Kuo Pao, Yi-Chi Cheng:
An efficient scheduling algorithm for scalable video streaming over P2P networks. 2856-2868
Volume 57, Number 15, October 2013
- Sunheui Ryoo, Changhee Joo, Saewoong Bahk:
Location-based spectrum allocation and partitioning scheme for cross-tier interference mitigation in macro-femtocell networks. 2869-2879 - Mingwei Xu, Yunfei Shang, Dan Li, Xin Wang:
Greening data center networks with throughput-guaranteed power-aware routing. 2880-2899 - Xiang Meng, Pui-Sze Tsang, King-Shan Lui:
Analysis of distribution time of multiple files in a P2P network. 2900-2915 - Yuh-Rong Chen, Sridhar Radhakrishnan, Sudarshan K. Dhall, Suleyman Karabuk:
On multi-stream multi-source multicast routing. 2916-2930 - Luca Chiaraviglio, Antonio Cianfrani, Esther Le Rouzic, Marco Polverini:
Sleep modes effectiveness in backbone networks with limited configurations. 2931-2948 - Minh Duc Pham, Syed Mahfuzul Aziz:
Object extraction scheme and protocol for energy efficient image communication over wireless sensor networks. 2949-2960 - Khalim Amjad Meerja, Pin-Han Ho, Bin Wu, Hsiang-Fu Yu:
Media access protocol for a coexisting cognitive femtocell network. 2961-2975 - Xudong Xiang, Jianxiong Wan, Chuang Lin, Xin Chen:
A dynamic programming approximation for downlink channel allocation in cognitive femtocell networks. 2976-2991 - Pramila Mouttappa, Stephane Maag, Ana R. Cavalli:
Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols. 2992-3008 - Chao Hu, Ming Chen, Chang-you Xing:
Towards efficient video chunk dissemination in peer-to-peer live streaming. 3009-3024 - Stefania Tosi, Sara Casolari, Michele Colajanni:
Data clustering based on correlation analysis applied to highly variable domains. 3025-3038 - Chao Zhou, Xinggong Zhang, Zongming Guo:
Optimal adaptive channel scheduling for scalable video broadcasting over MIMO wireless networks. 3039-3050 - Luca Chiaraviglio, Delia Ciullo, Marco Mellia, Michela Meo:
Modeling sleep mode gains in energy-aware networks. 3051-3066 - Karim Habak, Moustafa Youssef, Khaled A. Harras:
An optimal deployable bandwidth aggregation system. 3067-3080 - Noriaki Kamiyama, Ryoichi Kawahara, Haruhisa Hasegawa:
Optimum profit allocation in coalitional VoD service. 3081-3097 - Sabrina Sicari, Alberto Coen-Porisini, Roberto Riggio:
DARE: evaluating Data Accuracy using node REputation. 3098-3111
Volume 57, Number 16, November 2013
- Andrea Detti, Diego Perino, Mario Gerla, Yanghee Choi:
Editorial: Special issue on Information Centric Networking. 3113-3115
- Giovanna Carofiglio, Giacomo Morabito, Luca Muscariello, Ignacio Solis, Matteo Varvello:
From content delivery today to information centric networking. 3116-3127 - Guoqiang Zhang, Yang Li, Tao Lin:
Caching in information centric networking: A survey. 3128-3141 - HyunYong Lee, Akihiro Nakao:
User-assisted in-network caching in information-centric networking. 3142-3153 - Suyong Eum, Kiyohide Nakauchi, Masayuki Murata, Yozo Shoji, Nozomu Nishinaga:
Potential based routing as a secondary best-effort routing for Information Centric Networking (ICN). 3154-3164 - Yi Wang, Huichen Dai, Ting Zhang, Wei Meng, Jindou Fan, Bin Liu:
GPU-accelerated name lookup with component encoding. 3165-3177 - Mauro Conti, Paolo Gasti, Marco Teoli:
A lightweight mechanism for detection of cache pollution attacks in Named Data Networking. 3178-3191 - Matthias Wählisch, Thomas C. Schmidt, Markus Vahlenkamp:
Backscatter from the data plane - Threats to stability and security in information-centric network infrastructure. 3192-3206 - Stefano Salsano, Nicola Blefari-Melazzi, Andrea Detti, Giacomo Morabito, Luca Veltri:
Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed. 3207-3221 - Marica Amadeo, Claudia Campolo, Antonella Molinaro:
Enhancing content-centric networking for vehicular environments. 3222-3234 - H. M. N. Dilum Bandara, Anura P. Jayasumana:
Distributed, multi-user, multi-application, and multi-sensor data fusion over named data networks. 3235-3248 - Ben Tagger, Dirk Trossen, Alexandros Kostopoulos, Stuart Porter, George Parisis:
Realising an application environment for information-centric networking. 3249-3266
Volume 57, Number 17, December 2013
- Luiz Filipe M. Vieira, Mario Gerla, Archan Misra:
Fundamental limits on end-to-end throughput of network coding in multi-rate and multicast wireless networks. 3267-3275 - Marco Ajmone Marsan, Luca Chiaraviglio, Delia Ciullo, Michela Meo:
On the effectiveness of single and multiple base station sleep modes in cellular networks. 3276-3290 - Xiaohui Chen, Jing Xu, Wei Yuan, Wei Liu, Wenqing Cheng:
Channel assignment in heterogeneous multi-radio multi-channel wireless networks: A game theoretic approach. 3291-3299 - Elena Baralis, Andrea Bianco, Tania Cerquitelli, Luca Chiaraviglio, Marco Mellia:
NetCluster: A clustering-based framework to analyze internet passive measurements data. 3300-3315 - Ricardo Campanha Carrano, Diego G. Passos, Luiz Claudio Schara Magalhães, Célio Vinicius N. de Albuquerque:
Nested block designs: Flexible and efficient schedule-based asynchronous duty cycling. 3316-3326 - Honghuing Liu, Patrick P. C. Lee, John C. S. Lui:
On the credit evolution of credit-based incentive protocols in wireless mesh networks. 3327-3343 - Genki Matsui, Takuji Tachibana, Yukinori Nakamura, Kenji Sugimoto:
Distributed power adjustment based on control theory for cognitive radio networks. 3344-3356 - João Marco C. Silva, Paulo Carvalho, Solange Rito Lima:
A multiadaptive sampling technique for cost-effective network measurements. 3357-3369 - Zoltán Faigl, László Bokor, Jani Pellikka, Andrei V. Gurtov:
Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core. 3370-3388 - Eleonora Borgia, Giuseppe Anastasi, Marco Conti:
Energy efficient and reliable data delivery in urban sensing applications: A performance analysis. 3389-3409 - Brett Hagelstein, Mehran Abolhasan, Daniel Robert Franklin, Farzad Safaei:
Improving fairness in IEEE 802.11 networks using MAC layer opportunistic retransmission. 3410-3427 - Lei Chen, Di Yuan:
Mathematical modeling for optimal design of in-building distributed antenna systems. 3428-3445 - Angelo Coluccia, Alessandro D'Alconzo, Fabio Ricciato:
Distribution-based anomaly detection via generalized likelihood ratio test: A general Maximum Entropy approach. 3446-3462 - Konstantin Avrachenkov, Urtzi Ayesta, Josu Doncel, Peter Jacko:
Congestion control of TCP flows in Internet routers by means of index policy. 3463-3478 - Nicola Cordeschi, Mohammad Shojafar, Enzo Baccarelli:
Energy-saving self-configuring networked data centers. 3479-3491 - Chengzhe Lai, Hui Li, Rongxing Lu, Xuemin (Sherman) Shen:
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. 3492-3510 - Ce-Kuen Shieh, Chia-Yu Yu, Cheng-Han Lin, J. Morris Chang:
Efficiency-driven selection of bandwidth request mechanism in broadband wireless access networks. 3511-3521 - Peng Zhou, Xiapu Luo, Ang Chen, Rocky K. C. Chang:
SGor: Trust graph based onion routing. 3522-3544 - Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Rodolfo W. L. Coutinho, João Crisóstomo Weyl Albuquerque Costa:
A semi-Markov decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless networks. 3545-3562 - Jihun Ha, Jiung Yu, Byungjo Kim, Hyogon Kim:
On UDP continuity over vertical handovers. 3563-3580 - Le Wang, Jukka Manner:
Energy-efficient mobile web in a bundle. 3581-3600 - Nuutti Varis, Jukka Manner, Mikko Särelä, Timo Kiravuo:
DBridges: Flexible floodless frame forwarding. 3601-3616 - Byung-Gook Kim, Jeong-Ahn Kwon, Jang-Won Lee:
Subchannel allocation for the OFDMA-based femtocell system. 3617-3629 - Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection. 3630-3640 - Marc Manzano, Eusebi Calle, Victor Torres-Padrosa, Juan Segovia, David Harle:
Endurance: A new robustness measure for complex networks under multiple failure scenarios. 3641-3653 - Emre Atsan, Öznur Özkasap:
SCALAR: Scalable data lookup and replication protocol for mobile ad hoc networks. 3654-3672 - Martin Zubeldia, Andrés Ferragut, Fernando Paganini:
Overcoming performance pitfalls in rate-diverse high speed WLANs. 3673-3685 - Matjaz Fras, Joze Mohorko, Zarko Cucej:
Limitations of a Mapping Algorithm with Fragmentation Mimics (MAFM) when modeling statistical data sources based on measured packet network traffic. 3686-3700 - Cuiqin Hou, Yibin Hou, Zhangqin Huang:
A framework based on barycentric coordinates for localization in wireless sensor networks. 3701-3712 - Liliana Bolea, Jordi Pérez-Romero, Ramón Agustí:
ML aided context feature extraction for cognitive radio. 3713-3727 - Alfonso Iacovazzi, Alessandro D'Alconzo, Fabio Ricciato, Martin Burkhart:
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment. 3728-3742 - Giovanna Carofiglio, Massimo Gallo, Luca Muscariello:
On the performance of bandwidth and storage sharing in information-centric networks. 3743-3758
Volume 57, Number 18, December 2013
- Angelos-Christos G. Anadiotis, Charalampos Z. Patrikakis, Iakovos S. Venieris:
On the performance improvement of gossip protocols for content-based publish-subscribe through caching. 3759-3772 - Peng Lin, Alan Kai-Hau Yeung, Angus Kin Yeung Wong:
Multi-portal association based dispatching and a virtual-queue method in wireless mesh networks. 3773-3789 - Nadine Akkari:
An IMS-based integration architecture for WiMax/LTE handover. 3790-3798 - Yifeng Cai, Konstantinos Pelechrinis, Xin Wang, Prashant Krishnamurthy, Yijun Mo:
Joint reactive jammer detection and localization in an enterprise WiFi network. 3799-3811 - Fatemeh Ghods, Hamed Yousefi, Ali Mohammad Afshin Hemmatyar, Ali Movaghar:
MC-MLAS: Multi-channel Minimum Latency Aggregation Scheduling in Wireless Sensor Networks. 3812-3825 - Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
A systematic approach for detecting and clustering distributed cyber scanning. 3826-3839 - Baozhi Chen, Dario Pompili:
Minimizing position uncertainty for under-ice autonomous underwater vehicles. 3840-3854 - Zohar Naor, Sajal K. Das:
A scalable framework for mobile real-time group communication services. 3855-3865 - Seung Yeob Nam, Sirojiddin Djuraev, Minho Park:
Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks. 3866-3884 - Wen Sun, Yu Ge, Wai-Choong Wong:
A lightweight distributed scheme for mitigating inter-user interference in body sensor networks. 3885-3896 - Ignasi Paredes-Oliva, Pere Barlet-Ros, Xenofontas A. Dimitropoulos:
FaRNet: Fast recognition of high-dimensional patterns from big network traffic data. 3897-3913 - Zakwan Al-Arnaout, Qiang Fu, Marcus Frean:
A divide-and-conquer approach for content replication in WMNs. 3914-3928 - Weigang Wu, Jiannong Cao, Hejun Wu, Jingjing Li:
Robust and dynamic data aggregation in wireless sensor networks: A cross-layer approach. 3929-3940 - Seung-Ho Lee, Han-You Jeong, Seung-Woo Seo:
Optimal pricing and capacity partitioning for tiered access service in virtual networks. 3941-3956 - Wanzhi Qiu, Efstratios Skafidas:
Distributed routing for signal detection in wireless sensor networks. 3957-3966 - Mohammad Rajiullah, Reine Lundin, Anna Brunström, Stefan Lindskog:
Performance analysis and improvement of PR-SCTP for small messages. 3967-3986 - Zhenhua Wu, Yu Hen Hu:
How many wireless resources are needed to resolve the hidden terminal problem? 3987-3996 - Giovanni Accongiagioco, Matteo Maria Andreozzi, Daniele Migliorini, Giovanni Stea:
Throughput-optimal resource allocation in LTE-Advanced with distributed antennas. 3997-4009 - M. Sarper Gokturk, Özgür Gürbüz, Elza Erkip:
A cross-layer multi-hop cooperative network architecture for wireless ad hoc networks. 4010-4029 - Tahir Mehmood, Lavy Libman, Hooman Reisi Dehkordi, Sanjay K. Jha:
Optimal opportunistic routing and network coding for bidirectional wireless flows. 4030-4046 - Shahabeddin Geravand, Mahmood Ahmadi:
Bloom filter applications in network security: A state-of-the-art survey. 4047-4064
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.