default search action
Computer Networks, Volume 51
Volume 51, Number 1, January 2007
- Francesc Sebé, Josep Domingo-Ferrer:
Scalability and security in biased many-to-one communication. 1-13 - Davide Careglio, Josep Solé-Pareta, Salvatore Spadaro:
Service category-to-wavelength selection technique for QoS support in connection-oriented optical packet switching. 14-30 - Ka Ki To, Jack Y. B. Lee:
Parallel overlays for high data-rate multicast data transfer. 31-42 - Junfeng Wang, Lei Li, Mingtian Zhou:
Topological dynamics characterization for LEO satellite networks. 43-53 - Zhi Li, Prasant Mohapatra:
On investigating overlay service topologies. 54-68 - Shanyu Zheng, David O. Manz, Jim Alves-Foss:
A communication-computation efficient group key algorithm for large and dynamic groups. 69-93 - Hung Tuan Tran, Thomas Ziegler:
A design framework towards the profitable operation of service overlay networks. 94-113 - Giovanna Carofiglio, Michele Garetto, Emilio Leonardi, Alessandro Tarello, Marco Ajmone Marsan:
Beyond fluid models: Modelling TCP mice in IP networks under non-stationary random traffic. 114-133 - Li Feng, Qinglin Zhao, Hanwen Zhang:
Location management based on distance and direction for PCS networks. 134-152 - Tamma Bheemarjuna Reddy, John P. John, C. Siva Ram Murthy:
Providing MAC QoS for multimedia traffic in 802.11e based multi-hop ad hoc wireless networks. 153-176 - Tao Meng, Hongfei Yan:
On the peninsula phenomenon in web graph and its implications on web search. 177-189 - Shay Kutten, David Peleg:
Asynchronous resource discovery in peer-to-peer networks. 190-206 - Salvatore Spadaro, Alessandro D'Alessandro, Antonio Manzalini, Josep Solé-Pareta:
TRIDENT: An automated approach to traffic engineering in IP/MPLS over ASON/GMPLS networks. 207-223 - Robert M. Hierons, Hasan Ural:
Reducing the cost of applying adaptive test cases. 224-238 - Javed I. Khan, Raid Zaghal:
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport. 239-257 - Hirozumi Yamaguchi, Khaled El-Fakih, Gregor von Bochmann, Teruo Higashino:
Deriving protocol specifications from service specifications written as Predicate/Transition-nets. 258-284 - Fei Hu, Waqaas Siddiqui, Krishna Sankar:
Scalable security in Wireless Sensor and Actuator Networks (WSANs): Integration re-keying with routing. 285-308 - Marcos Postigo-Boix, Joan García-Haro, José Luis Melús-Moreno:
A cost-efficient method for streaming stored content in a guaranteed QoS Internet. 309-335 - Wenting Tang, Yun Fu, Ludmila Cherkasova, Amin Vahdat:
Modeling and generating realistic streaming media server workloads. 336-356
Volume 51, Number 2, February 2007
- Stephan Reiff-Marganiec, Mark Ryan:
Guest Editorial. 357-358 - Michael Weiss, Babak Esfandiari, Yun Luo:
Towards a classification of web service feature interactions. 359-381 - Rui Gustavo Crespo, Miguel Carvalho, Luigi Logrippo:
Distributed resolution of feature interactions for internet applications. 382-397 - Mohamed Shehata, Armin Eberlein, Abraham O. Fapojuwo:
A taxonomy for identifying requirement interactions in software systems. 398-425 - Caixia Chi, Ruibing Hao:
Test generation for interaction detection in feature-rich communication systems. 426-438 - Alice Miller, Muffy Calder, Alastair F. Donaldson:
A template-based approach for the generation of abstractable and reducible models of featured networks. 439-455 - Pierre-Yves Schobbens, Patrick Heymans, Jean-Christophe Trigaux, Yves Bontemps:
Generic semantics of feature diagrams. 456-479 - Wu-Hon F. Leung:
Program entanglement, feature interaction and the feature language extensions. 480-495 - Kenneth J. Turner, Lynne Blair:
Policies and conflicts in call control. 496-514 - Xiaotao Wu, Henning Schulzrinne:
Handling feature interactions in the language for end system services. 515-535 - Mario Kolberg, Evan H. Magill:
Managing feature interactions between distributed SIP call control services. 536-557
Volume 51, Number 3, February 2007
- Bhamidipati Praveen, Jayachandran Praveen, C. Siva Ram Murthy:
On using forward error correction for loss recovery in optical burst switched networks. 559-568 - Carlo K. da Silva Rodrigues, Rosa M. M. Leão:
Bandwidth usage distribution of multimedia servers using Patching. 569-587 - Yeim-Kuan Chang:
Fast binary and multiway prefix searches for packet forwarding. 588-605 - Sungchang Kim, Young-Chon Kim, Bin-Yeong Yoon, Minho Kang:
An integrated congestion control mechanism for optimized performance using two-step rate controller in optical burst switching networks. 606-620 - Young-June Choi, Jin-Ghoo Choi, Saewoong Bahk:
Upper-level scheduling supporting multimedia traffic in cellular data networks. 621-631 - Dong Yu, Deborah A. Frincke:
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. 632-654 - Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda:
Access control protocols with two-layer architecture for wireless networks. 655-670 - Hailong Li, Ian Li-Jin Thng:
Performance analysis of limited number of wavelength converters by share per node in optical switching network. 671-682 - Péter Hága, Krisztián Diriczi, Gábor Vattay, István Csabai:
Granular model of packet pair separation in Poissonian traffic. 683-698 - Jean-Marc Kelif, Eitan Altman, Ioannis Z. Koukoutsidis:
Admission and GoS control in a multiservice WCDMA system. 699-711 - Yuh-Jzer Joung, Jiaw-Chang Wang:
Chord2: A two-layer Chord for reducing maintenance overhead via heterogeneity. 712-731 - Zhiqiang Gao, Nirwan Ansari:
A practical and robust inter-domain marking scheme for IP traceback. 732-750 - Glenn S. Benson:
Portable security transaction protocol. 751-766 - Meng Chang Chen, Li-Ping Tung, Yeali S. Sun, Wei-Kuan Shih:
A new per-class flow fixed proportional differentiated service for multi-service wireless LAN. 767-780 - Michel Mandjes, Petteri Mannersalo, Ilkka Norros:
Gaussian tandem queues with an application to dimensioning of switch fabric interfaces. 781-797 - Zhenqiang Ye, Lap Kong Law, Srikanth V. Krishnamurthy, Zhong Xu, Suvidhean Dhirakaosal, Satish K. Tripathi, Mart L. Molle:
Predictive channel reservation for handoff prioritization in wireless cellular networks. 798-822 - Lap Kong Law, Srikanth V. Krishnamurthy, Michalis Faloutsos:
A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks. 823-834 - Sergio Sánchez-López, Xavier Masip-Bruin, Josep Solé-Pareta, Jordi Domingo-Pascual:
Fast setup of end-to-end paths for bandwidth constrained applications in an IP/MPLS-ATM integrated environment. 835-852 - Jianping Pan, Lin Cai, Xuemin Shen, Jon W. Mark:
Identity-based secure collaboration in wireless ad hoc networks. 853-865 - Jen-Shiuh Liu, Zhi-Jian Lee, Yeh-Ching Chung:
Dynamic probabilistic packet marking for efficient IP traceback. 866-882 - Yuh-Ren Tsai, Shiuh-Jeng Wang:
Two-tier authentication for cluster and individual sets in mobile ad hoc networks. 883-900 - Ernst W. Biersack, Damiano Carra, Renato Lo Cigno, Pablo Rodriguez, Pascal Felber:
Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases. 901-917
Volume 51, Number 4, March 2007
- Ian F. Akyildiz, Harry Rudin:
Editorial. 919-920 - Ian F. Akyildiz, Tommaso Melodia, Kaushik R. Chowdhury:
A survey on wireless multimedia sensor networks. 921-960 - Kurtis B. Kredo II, Prasant Mohapatra:
Medium access control in wireless sensor networks. 961-994 - Yi Li, Gaoxi Xiao, Hooshang Ghafouri-Shiraz:
Performance evaluation of multi-fiber optical packet switches. 995-1012 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against iterative servers. 1013-1030 - Konstantinos P. Ferentinos, Theodore A. Tsiligiridis:
Adaptive design optimization of wireless sensor networks using genetic algorithms. 1031-1051 - Theodore L. Willke, Nicholas F. Maxemchuk:
Coordinated interaction using reliable broadcast in mobile wireless networks. 1052-1059 - Majid Ghaderi, Raouf Boutaba, Gary W. Kenward:
Joint call and packet QoS in cellular packet networks. 1060-1071 - Jinwon Lee, Hyonik Lee, Seungwoo Kang, Su Myeon Kim, Junehwa Song:
CISS: An efficient object clustering framework for DHT-based peer-to-peer applications. 1072-1094 - Shantidev Mohanty, Jiang Xie:
Performance analysis of a novel architecture to integrate heterogeneous wireless systems. 1095-1105 - Mohamed G. Gouda, Alex X. Liu:
Structured firewall design. 1106-1120 - Praveen Jayachandran, Praveen Bhamidipati, C. Siva Ram Murthy:
On providing elastic QoS in optical burst switched networks. 1121-1132 - Yaqing Huang, Roch Guérin:
A simple FIFO-based scheme for differentiated loss guarantees. 1133-1150 - Wei-Tsung Su, Ko-Ming Chang, Yau-Hwang Kuo:
eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. 1151-1168 - Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi:
Robust self-keying mobile ad hoc networks. 1169-1182 - Sajjad Zarifzadeh, Nasser Yazdani, Hamed Khanmirza:
A routing framework for load balancing of bandwidth sensitive traffic in differentiated service networks. 1183-1204 - Fabio Ricciato, Francesco Vacirca, Philipp Svoboda:
Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis. 1205-1231
Volume 51, Number 5, April 2007
- Deborah A. Frincke, Andreas Wespi, Diego Zamboni:
From intrusion detection to self-protection. 1233-1238 - Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest:
Learning DFA representations of HTTP for protecting web applications. 1239-1255 - Georgios Portokalidis, Herbert Bos:
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. 1256-1274 - Marcos Laureano, Carlos Maziero, Edgard Jamhour:
Protecting host-based intrusion detectors through virtual machines. 1275-1283 - Paul D. Williams, Eugene H. Spafford:
CuPIDS: An exploration of highly focused, co-processor-based information system protection. 1284-1298 - Erol Gelenbe, George Loukas:
A self-aware approach to denial of service defence. 1299-1314 - Morton Swimmer:
Using the danger model of immune systems for distributed defense in modern data networks. 1315-1333 - Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford:
Automated adaptive intrusion containment in systems of interacting services. 1334-1360 - Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Maier:
Automatic high-performance reconstruction and recovery. 1361-1377
Volume 51, Number 6, April 2007
- Hwangnam Kim, Jennifer C. Hou:
Mixed-mode simulation for IEEE 802.11-operated WLANs. 1379-1402 - Jeng Farn Lee, Meng Chang Chen, Yeali S. Sun:
WF2Q-M: Worst-case fair weighted fair queueing with maximum rate control. 1403-1420 - Jiang Li, Murat Yuksel, Xingzhe Fan, Shivkumar Kalyanaraman:
Generalized multicast congestion control. 1421-1443 - Lan Wang, Daniel Massey, Lixia Zhang:
Persistent detection and recovery of state inconsistencies. 1444-1458 - Sasu Tarkoma, Jaakko Kangasharju:
On the cost and safety of handoffs in content-based routing systems. 1459-1482 - Javier Vales-Alonso, Esteban Egea-López, Alejandro S. Martínez-Sala, Pablo Pavón-Mariño, M. Victoria Bueno-Delgado, Joan García-Haro:
Performance evaluation of MAC transmission power control in wireless sensor networks. 1483-1498 - Nabhendra Bisnik, Alhussein A. Abouzeid:
Optimizing random walk search algorithms in P2P networks. 1499-1514 - Hari Rangarajan, J. J. Garcia-Luna-Aceves:
Efficient use of route requests for loop-free on-demand routing in ad hoc networks. 1515-1529 - B. S. Manoj, K. Jayanth Kumar, C. Siva Ram Murthy:
MuPAC: A new multi-power architecture for capacity enhancement in cellular networks. 1530-1554 - Yong Huat Chew, Boon Sain Yeo, Daniel Chien Ming Kuan:
Sensitivity study of location management area partitioning in cellular communication systems. 1555-1573 - Bo Li, Roberto Battiti:
Achieving optimal performance in IEEE 802.11 wireless LANs with the combination of link adaptation and adaptive backoff. 1574-1600 - Hechmi Khlifi, Jean-Charles Grégoire:
ARTP: A buffer-aware rate control protocol for media streaming. 1601-1615 - Nikos Argiriou, Leonidas Georgiadis:
Channel sharing by multi-class rate adaptive streams: Performance region and optimization. 1616-1629 - Sangheon Pack, Taekyoung Kwon, Yanghee Choi:
A performance comparison of mobility anchor point selection schemes in Hierarchical Mobile IPv6 networks. 1630-1642 - Mushi Jin, Oliver W. W. Yang:
APOSN: Operation, modeling and performance evaluation. 1643-1659 - Ashraf Al Daoud, Murat Alanyali:
Loss-cognizant pricing in networks with greedy users. 1660-1683 - Feng Zheng, John Nelson:
An Hinfinity approach to congestion control design for AQM routers supporting TCP flows in wireless access networks. 1684-1704 - Feng Gao, Michael E. Woodward:
A hybrid topological-stochastic partitioning method for scaling QoS routing algorithms. 1705-1724 - Gee-Swee Poo, Haibo Wang:
Multi-path routing versus tree routing for VPN bandwidth provisioning in the hose model. 1725-1743
Volume 51, Number 7, May 2007
- Katsushi Kobayashi, Pascale Vicat-Blanc Primet, Joe Touch:
Protocols for fast, long-distance networks. 1745-1747 - Sangtae Ha, Long Le, Injong Rhee, Lisong Xu:
Impact of background traffic on performance of high-speed TCP variant protocols. 1748-1762 - Shan Chen, Brahim Bensaou:
Can high-speed networks survive with DropTail queues management? 1763-1776 - Yunhong Gu, Robert L. Grossman:
UDT: UDP-based data transfer for high-speed wide area networks. 1777-1799 - Xiaomeng Huang, Chuang Lin, Fengyuan Ren:
A novel high speed transport protocol based on explicit virtual load feedback. 1800-1814 - Pasi Sarolahti, Mark Allman, Sally Floyd:
Determining an appropriate sending rate over an underutilized network path. 1815-1832 - Kiyohide Nakauchi, Katsushi Kobayashi:
An explicit router feedback framework for high bandwidth-delay product networks. 1833-1846 - Lisong Xu:
Extending equation-based congestion control to high-speed and long-distance networks. 1847-1859
Volume 51, Number 8, June 2007
- Edith Cohen, Amos Fiat, Haim Kaplan:
Associative search in peer to peer networks: Harnessing latent semantics. 1861-1881 - Alex Raj, Oliver C. Ibe:
A survey of IP and multiprotocol label switching fast reroute schemes. 1882-1907 - Reuven Cohen, Amnon Shochot:
The "Global-ISP" paradigm. 1908-1921 - Hwangnam Kim, Jennifer C. Hou, Chunyu Hu, Ye Ge:
QoS provisioning in IEEE 802.11-compliant networks: Past, present, and future. 1922-1941 - Jin-Hee Choi, Young-Pil Kim, Chuck Yoo:
Self-prevention of socket buffer overflow. 1942-1954 - Ye Ge, Jennifer C. Hou, Sunghyun Choi:
An analytic study of tuning systems parameters in IEEE 802.11e enhanced distributed channel access. 1955-1980 - Steven Weber, Gustavo de Veciana:
Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link. 1981-1997 - Laura Galluccio, Giacomo Morabito, Sergio Palazzo, Marco Pellegrini, M. Elena Renda, Paolo Santi:
Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm. 1998-2014 - Jianbin Wei, Cheng-Zhong Xu:
Consistent proportional delay differentiation: A fuzzy control approach. 2015-2032 - Ioannis Psaras, Vassilis Tsaoussidis:
Why TCP timers (still) don't work well. 2033-2048 - Chun-Chuan Yang, Chun-Shian Tsai, Junn-Yen Hu, Tzu-Chien Chuang:
On the design of mobility management scheme for 802.16-based network environment. 2049-2066 - Jeremie Leguay, Matthieu Latapy, Timur Friedman, Kavé Salamatian:
Describing and simulating internet routes. 2067-2085 - Michael Cho-Hoi Chek, Yu-Kwong Kwok:
Design and evaluation of practical coexistence management schemes for Bluetooth and IEEE 802.11b systems. 2086-2103 - Santpal Singh Dhillon, Piet Van Mieghem:
Performance analysis of the AntNet algorithm. 2104-2125 - B. S. Manoj, Archana Sekhar, C. Siva Ram Murthy:
On the use of limited autonomous mobility for dynamic coverage maintenance in sensor networks. 2126-2143 - Glen MacLarty, Michael Fry:
Towards a platform for wide-area overlay network deployment and management. 2144-2162 - Srinivasan Ramasubramanian, Harish Krishnamoorthy, Marwan Krunz:
Disjoint multipath routing using colored trees. 2163-2180 - Coskun Cetinkaya:
Improving the efficiency of multipath traffic via opportunistic traffic scheduling. 2181-2197 - Dawn Sasha Lynette Dolcy, Costas C. Constantinou, Steven F. Quigley:
A Fokker-Planck equation method predicting Buffer occupancy in a single queue. 2198-2216
Volume 51, Number 9, June 2007
- Josep Domingo-Ferrer, Joachim Posegga, Francesc Sebé, Vicenç Torra:
Advances in smart cards. 2219-2222 - Bart Preneel:
A survey of recent developments in cryptographic algorithms for smart cards. 2223-2233 - HongQian Karen Lu:
Network smart card review and analysis. 2234-2248 - Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra:
Advances in network smart cards authentication. 2249-2261 - Jorge Munilla, Alberto Peinado:
HB-MP: A further step in the HB-family of lightweight authentication protocols. 2262-2267 - Agusti Solanas, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Vanesa Daza:
A distributed architecture for scalable private RFID tag identification. 2268-2279 - Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang:
Security enhancement of an IC-card-based remote login mechanism. 2280-2287 - Andrés Marín López, Daniel Díaz Sánchez, Florina Almenárez, Carlos García-Rubio, Celeste Campo:
Smart card-based agents for fair non-repudiation. 2288-2298 - Francesc Sebé, Alexandre Viejo, Josep Domingo-Ferrer:
Secure many-to-one symbol transmission for implementation on smart cards. 2299-2307
- George T. Karetsos, Angelos N. Rouskas, Bijan Jabbari, Bernhard Walke:
Topics in wireless broadband systems. 2308-2310 - Claudio Cicconetti, Luciano Lenzini, Enzo Mingozzi, Giovanni Stea:
Design and performance analysis of the Real-Time HCCA scheduler for IEEE 802.11e WLANs. 2311-2325 - Xavier Pérez Costa, Daniel Camps-Mur, Albert Vidal:
On distributed power saving mechanisms of wireless LANs 802.11e U-APSD vs 802.11 power save mode. 2326-2344 - Dimitris Vassis, George Kormentzas:
Performance analysis of IEEE 802.11 ad hoc networks in the presence of hidden terminals. 2345-2352 - Sebastian Max, Guido R. Hiertz, Erik Weiss, Dee Denteneer, Bernhard Walke:
Spectrum sharing in IEEE 802.11s wireless mesh networks. 2353-2367 - Patrick Hosein:
QoS scheduling of uplink resources in OFDMA networks. 2368-2378 - Georgios Leoleis, Iakovos S. Venieris:
Fast MIPv6 extensions supporting seamless multicast handovers. 2379-2396 - Vasileios Karyotis, Symeon Papavassiliou:
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework. 2397-2410
Volume 51, Number 10, July 2007
- Jelena V. Misic, Carol J. Fung:
The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network. 2411-2449 - Yigal Bejerano, Seung-Jae Han, Amit Kumar:
Efficient load-balancing routing for wireless mesh networks. 2450-2466 - Guoqiang Mao, Brian D. O. Anderson, Baris Fidan:
Path loss exponent estimation for wireless sensor network localization. 2467-2483 - Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker:
Design and implementation of a secure wide-area object middleware. 2484-2513 - Supeng Leng, Liren Zhang, Huirong Fu, Jianjun Yang:
Mobility analysis of mobile hosts with random walking in ad hoc networks. 2514-2528 - Guoqiang Mao, Baris Fidan, Brian D. O. Anderson:
Wireless sensor network localization techniques. 2529-2553 - Ning Lu, John Bigham:
On utility-fair bandwidth adaptation for multi-class traffic QoS provisioning in wireless networks. 2554-2564 - Birger Tödtmann, Erwin P. Rathgeb:
Anticipatory distributed packet filter configurations for carrier-grade IP networks. 2565-2579 - Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis:
A framework for protecting a SIP-based infrastructure against malformed message attacks. 2580-2593 - Vasudev Shah, Ece Gelal, Srikanth V. Krishnamurthy:
Handling asymmetry in power heterogeneous ad hoc networks. 2594-2615 - Zhenhai Duan, Yingfei Dong, Kartik Gopalan:
DMTP: Controlling spam through message delivery differentiation. 2616-2630 - Ibtissam El Khayat, Pierre Geurts, Guy Leduc:
Machine-learnt versus analytical models of TCP throughput. 2631-2644 - Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femminella, Gianluca Reali:
Autonomic control and personalization of a wireless access network. 2645-2676 - Andrey Belenky, Nirwan Ansari:
On deterministic packet marking. 2677-2700 - Baek-Young Choi, Sue B. Moon, Rene L. Cruz, Zhi-Li Zhang, Christophe Diot:
Quantile sampling for practical delay monitoring in Internet backbone networks. 2701-2716 - Aleksandar Kuzmanovic, Edward W. Knightly:
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions. 2717-2737 - Marco Ajmone Marsan, Claudio Casetti, Gianluca Mardente, Marco Mellia:
A framework for admission control and path allocation in DiffServ networks. 2738-2752 - Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng:
Improving the resilience of content distribution networks to large scale distributed denial of service attacks. 2753-2770 - Sun-Myeng Kim, Young-Jong Cho:
Channel time allocation scheme based on feedback information in IEEE 802.11e wireless LANs. 2771-2787 - Yujie Zhu, Aravind Velayutham, Oyebamiji Oladeji, Raghupathy Sivakumar:
Enhancing TCP for networks with guaranteed bandwidth services. 2788-2804 - Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
Secure multicast in dynamic environments. 2805-2817 - Shudong Jin, Hongbo Jiang:
Novel approaches to efficient flooding search in peer-to-peer networks. 2818-2832 - Jocelyne Elias, Fabio Martignon, Antonio Capone, Guy Pujolle:
A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds. 2833-2853 - Srinivasan Ramasubramanian, Mithun Harkara, Marwan Krunz:
Linear time distributed construction of colored trees for disjoint multipath routing. 2854-2866 - Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley:
Performance modeling of epidemic routing. 2867-2891 - Pablo Vidales, Carlos Jesus Bernardos, Ignacio Soto, David Naveen Cottingham, Javier Baliosian, Jon Crowcroft:
MIPv6 experimental evaluation using overlay networks. 2892-2915
Volume 51, Number 11, August 2007
- Georgios Smaragdakis, Nikolaos Laoutaris, Azer Bestavros, Ibrahim Matta, Ioannis Stavrakakis:
Mistreatment-resilient distributed caching. 2917-2937 - Dah-Ming Chiu, Adrian Sai-Wah Tam:
Fairness of traffic controls for inelastic flows in the Internet. 2938-2957 - Eric W. M. Wong, Andrew Zalesky, Zvi Rosberg, Moshe Zukerman:
A new method for approximating blocking probability in overflow loss networks. 2958-2975 - Ashima Gupta, Prasant Mohapatra:
A survey on ultra wide band medium access control schemes. 2976-2993 - Mário Alves, Eduardo Tovar:
Real-time communications over wired/wireless PROFIBUS networks supporting inter-cell mobility. 2994-3012 - Mehmet S. Kuran, Tuna Tugcu:
A survey on emerging broadband wireless access technologies. 3013-3046 - Lixiang Xiong, Guoqiang Mao:
Saturated throughput analysis of IEEE 802.11e EDCA. 3047-3068 - Li Lao, Jun-Hong Cui, Mario Gerla:
Tackling group-to-tree matching in large scale group communications. 3069-3089 - Hualiang Chen, Zhongxin Liu, Zengqiang Chen, Zhuzhi Yuan:
Extending TCP congestion control to multicast. 3090-3109 - Timo Vanhatupa, Marko Hännikäinen, Timo D. Hämäläinen:
Evaluation of throughput estimation models and algorithms for WLAN frequency planning. 3110-3124 - Hanping Lufei, Weisong Shi:
Energy-aware QoS for application sessions across multiple protocol domains in mobile computing. 3125-3141 - Anelise Munaretto, Mauro Fonseca:
Routing and quality of service support for mobile ad hoc networks. 3142-3156 - Xiaolong Li, Aaron Striegel:
A case for Passive Application Layer Multicast. 3157-3171 - Gilberto Flores Lucio, Martin J. Reed, Ian D. Henning:
Guided local search as a network planning algorithm that incorporates uncertain traffic demands. 3172-3196 - H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal:
Key management for content access control in a hierarchy. 3197-3219 - Yuan-Cheng Lai:
Two schedulers to provide delay proportion and reduce queueing delay simultaneously. 3220-3231 - Sebastian Kiesel, Michael Scharf:
Modeling and performance evaluation of transport protocols for firewall control. 3232-3251 - Jelena V. Misic:
Algorithm for equalization of cluster lifetimes in a multi-level Beacon enabled 802.15.4 sensor network. 3252-3264 - Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai:
Capacity analysis and MAC enhancement for UWB broadband wireless access networks. 3265-3277 - Zhenjiang Li, J. J. Garcia-Luna-Aceves:
Loop-free constrained path computation for hop-by-hop QoS routing. 3278-3293 - Steven Shelford, Gholamali C. Shoja, Eric G. Manning:
Achieving optimal revenues in dynamically priced network services with QoS guarantees. 3294-3304 - Dusit Niyato, Ekram Hossain:
QoS-aware bandwidth allocation and admission control in IEEE 802.16 broadband wireless access networks: A non-cooperative game theoretic approach. 3305-3321
Volume 51, Number 12, August 2007
- Ahsan Habib, John Chuang:
Improving application QoS with residential multihoming. 3323-3337 - Soo Young Shin, Hong Seong Park, Wook Hyun Kwon:
Mutual interference analysis of IEEE 802.15.4 and IEEE 802.11b. 3338-3353 - Lih-Chyau Wuu, Tzong-Jye Liu, Kuo-Ming Chen:
A longest prefix first search tree for IP lookup. 3354-3367 - Jiann-Liang Chen, Ming-Chiao Chen, Yi-Ru Chian:
QoS management in heterogeneous home networks. 3368-3379 - Sumit Naiksatam, Stephen A. Chiappari, Silvia M. Figueira:
Efficient bandwidth utilization in LambdaGrids using pricing incentives. 3380-3391 - Vinay Sridhara, Stephan Bohacek:
Realistic propagation simulation of urban mesh networks. 3392-3412 - Luis López, Antonio Fernández, Vicent Cholvi:
A game theoretic comparison of TCP and digital fountain based protocols. 3413-3426 - Saravanan Balasubramanian, Demet Aksoy:
Adaptive energy-efficient registration and online scheduling for asymmetric wireless sensor networks. 3427-3447 - Animesh Patcha, Jung-Min Park:
An overview of anomaly detection techniques: Existing solutions and latest technological trends. 3448-3470 - Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis:
Defending against hitlist worms using network address space randomization. 3471-3490 - Stylianos Karapantazis, Fotini-Niovi Pavlidou:
Call admission control in multiservice high altitude platform (HAP) W-CDMA cellular systems. 3491-3506 - Grigorios Zachariadis, Javier A. Barria:
Demand management for telecommunications services. 3507-3524 - Ritesh Mukherjee, J. William Atwood:
Scalable solutions for secure group communications. 3525-3548 - Christos Bouras, Afrodite Sevasti:
An analytical QoS service model for delay-based differentiation. 3549-3563 - Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang:
A queueing analysis for the denial of service (DoS) attacks in computer networks. 3564-3573 - Wing-Yan Tam, King-Shan Lui, Suleyman Uludag, Klara Nahrstedt:
Quality-of-Service routing with path information aggregation. 3574-3594 - Himabindu Pucha, Saumitra M. Das, Y. Charlie Hu:
The performance impact of traffic patterns on routing protocols in mobile ad hoc networks. 3595-3616 - Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee:
Cellular universal IP for nested network mobility. 3617-3631 - Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Threshold cryptography in P2P and MANETs: The case of access control. 3632-3649 - Saralees Nadarajah, Samuel Kotz:
On the convolution of Pareto and gamma distributions. 3650-3654 - Do Young Eun, Xinbing Wang:
Performance analysis of TCP/AQM with generalized AIMD under intermediate buffer sizes. 3655-3671
Volume 51, Number 13, September 2007
- Abdullah Balamash, Marwan Krunz, Philippe Nain:
Performance analysis of a client-side caching/prefetching system for Web traffic. 3673-3692 - Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu:
On the scalability of rendezvous-based location services for geographic wireless ad hoc routing. 3693-3714 - Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam:
SPP: An anti-phishing single password protocol. 3715-3726 - Serdar Vural, Eylem Ekici:
Probability distribution of multi-hop-distance in one-dimensional sensor networks. 3727-3749 - Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff:
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. 3750-3772 - Marios Lestas, Andreas Pitsillides, Petros A. Ioannou, George Hadjipollas:
Adaptive congestion protocol: A congestion control protocol with learning capability. 3773-3798 - Sakib A. Mondal, Faisal B. Luqman:
Improving TCP performance over wired-wireless networks. 3799-3811 - Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konstantina Papagiannaki, Christophe Diot:
Analysis of point-to-point packet delay in an operational network. 3812-3827 - Zhi Li, Lihua Yuan, Prasant Mohapatra, Chen-Nee Chuah:
On the analysis of overlay failure detection and recovery. 3828-3843 - Allen B. Downey:
TCP self-clocking and bandwidth sharing. 3844-3863 - Anat Bremler-Barr, Nir Halachmi, Hanoch Levy:
Protecting bursty applications against traffic aggressiveness. 3864-3877 - Nizar Bouabdallah, Harry G. Perros:
Cost-effective single-hub WDM ring networks: A proposal and analysis. 3878-3901 - Ignacio Más Ivars, Gunnar Karlsson:
Probe-based admission control for a differentiated-services internet. 3902-3918 - Yongxiang Zhao, Changjia Chen:
A redundant overbooking reservation algorithm for OBS/OPS networks. 3919-3934 - Animesh Patcha, Jung-Min Park:
Network anomaly detection with incomplete audit data. 3935-3955
Volume 51, Number 14, October 2007
- Qi He, Constantinos Dovrolis, Mostafa H. Ammar:
On the predictability of large transfer TCP throughput. 3959-3977 - Yang Yang, Feiyi Huang, Xiaohu Ge, Xiaodong Zhang, Xuanye Gu, Mohsen Guizani, Hsiao-Hwa Chen:
Double sense multiple access for wireless ad hoc networks. 3978-3988 - Luca Sanna Randaccio, Luigi Atzori:
Group multicast routing problem: A genetic algorithms based approach. 3989-4004 - Mahasweta Sarkar, Rene L. Cruz:
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN. 4005-4031 - Tomaso de Cola, Harald Ernst, Mario Marchese:
Performance analysis of CCSDS File Delivery Protocol and erasure coding techniques in deep space environments. 4032-4049 - Wenji Wu, Matt Crawford:
Interactivity vs. fairness in networked Linux systems. 4050-4069 - Chih-Yung Chang, Chao-Tsun Chang:
TARP: A traffic-aware restructuring protocol for Bluetooth radio networks. 4070-4091 - Mario Baldi, Guido Marchetto, Yoram Ofek:
A scalable solution for engineering streaming traffic in the future Internet. 4092-4111 - Ahmad Al Hanbali, Arzad Alam Kherani, Robin Groenevelt, Philippe Nain, Eitan Altman:
Impact of mobility on the performance of relaying in ad hoc networks - Extended version. 4112-4130 - Ta Nguyen Binh Duong, Suiping Zhou:
A two-phase approach to interactivity enhancement for large-scale distributed virtual environments. 4131-4152 - Mehmet Hadi Gunes, Sevcan Bilir, Kamil Saraç, Turgay Korkmaz:
A measurement study on overhead distribution of value-added internet services. 4153-4173 - Sagy Bar, Mira Gonen, Avishai Wool:
A geographic directed preferential internet topology model. 4174-4188 - Thierry Rakotoarivelo, Patrick Sénac, Aruna Seneviratne, Michel Diaz:
SPAD: A distributed middleware architecture for QoS enhanced alternate path discovery. 4189-4211 - Samphel Norden, Katherine Guo:
Support for resilient Peer-to-Peer gaming. 4212-4233
Volume 51, Number 15, October 2007
- Abhishek Kashyap, Kwangil Lee, Mehdi Kalantari, Samir Khuller, Mark A. Shayman:
Integrated topology control and routing in wireless optical mesh networks. 4237-4251 - Shigang Chen, Yibei Ling, Randy Chow, Ye Xia:
AID: A global anti-DoS service. 4252-4269 - Pablo Pavón-Mariño, Joan García-Haro, Andrzej Jajszczyk:
Parallel desynchronized block matching: A feasible scheduling algorithm for the input-buffered wavelength-routed switch. 4270-4283 - Vaishnavi Krishnamurthy, Michalis Faloutsos, Marek Chrobak, Jun-Hong Cui, Li Lao, Allon G. Percus:
Sampling large Internet topologies for simulation purposes. 4284-4302 - Weichao Wang, Tylor Stransky:
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network. 4303-4321 - Wesam Lootah, William Enck, Patrick D. McDaniel:
TARP: Ticket-based address resolution protocol. 4322-4337 - Dongwook Lee, Gayathri Chandrasekaran, Mukundan Sridharan, Prasun Sinha:
Association management for data dissemination over wireless mesh networks. 4338-4355 - Evangelos Papapetrou, Stylianos Karapantazis, Fotini-Niovi Pavlidou:
Distributed on-demand routing for LEO satellite systems. 4356-4376 - Panagiotis Papadimitriou, Vassilis Tsaoussidis:
SSVP: A congestion control scheme for real-time video streaming. 4377-4395 - Dzmitry Kliazovich, Fabrizio Granelli, Mario Gerla:
Performance improvement in wireless networks using cross-layer ARQ. 4396-4411 - Roberto Cusani, Tiziano Inzerilli, Luca Valentini:
Network monitoring and performance evaluation in a 3.5G network. 4412-4420 - Kenneth J. Turner, Koon Leai Larry Tan:
A rigorous approach to orchestrating grid services. 4421-4441 - Hyuk Lim, Jennifer C. Hou:
Identifying lossy links in wired/wireless networks by exploiting sparse characteristics. 4442-4459 - Vicent Cholvi, Juan Echagüe:
Stability of FIFO networks under adversarial models: State of the art. 4460-4474 - Lijun Wang, Lin Cai, Xinzhi Liu, Xuemin Shen:
Stability and TCP-friendliness of AIMD/RED systems with feedback delays. 4475-4491 - Jordi Guitart, David Carrera, Vicenç Beltran, Jordi Torres, Eduard Ayguadé:
Designing an overload control strategy for secure e-commerce applications. 4492-4510
Volume 51, Number 16, November 2007
- Simon Courtenage, David Lewis, Thanassis Tiropanis:
Innovations in Web communications infrastructure. 4511-4513 - Elke Michlmayr, Arno Pany, Gerti Kappel:
Using taxonomies for content-based routing with ants. 4514-4528 - Juan Ignacio Vázquez, Diego López-de-Ipiña:
mRDP: An HTTP-based lightweight semantic discovery protocol. 4529-4542 - Tao Gu, Hung Keng Pung, Daqing Zhang:
Information retrieval in schema-based P2P systems using one-dimensional semantic space. 4543-4560 - Frank Zhigang Wang, Na Helian, Sining Wu, Yuhui Deng, Vineet R. Khare, Michael Parker:
GridJet: An underlying data-transporting protocol for accelerating Web communications. 4561-4573 - Dominik Benz, Karen H. L. Tso, Lars Schmidt-Thieme:
Supporting collaborative hierarchical classification: Bookmarks as an example. 4574-4585 - Trevor I. Fenner, Mark Levene, George Loizou, George Roussos:
A stochastic evolutionary growth model for social networks. 4586-4595
- George Kormentzas, Thomas Magedanz:
Middleware challenges for next generation networks and services. 4596-4598 - Pruet Boonma, Junichi Suzuki:
BiSNET: A biologically-inspired middleware architecture for self-managing wireless sensor networks. 4599-4616 - Yassine Hadjadj Aoul, Ahmed Mehaoua, Charalabos Skianis:
A fuzzy logic-based AQM for real-time traffic over internet. 4617-4633 - Jaakko Kangasharju, Tancred Lindholm, Sasu Tarkoma:
XML messaging for mobile devices: From requirements to implementation. 4634-4654 - Ivar Jørstad, Do Van Thanh:
Personalised ubiquitous file access with XML Web Services. 4655-4668 - Eugen Borcoci, Georgios Kormentzas, Abolghasem (Hamid) Asgari, Toufik Ahmed:
Service invocation admission control algorithm for multi-domain IP environments. 4669-4678 - Georgios V. Lioudakis, Eleftherios Koutsoloukas, Nikolaos L. Dellas, Nikolaos D. Tselikas, Sofia Kapellaki, George N. Prezerakos, Dimitra I. Kaklamani, Iakovos S. Venieris:
A middleware architecture for privacy protection. 4679-4696 - Muhammad Sher, Thomas Magedanz:
A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications. 4697-4709
Volume 51, Number 17, December 2007
- S. Jayashree, C. Siva Ram Murthy:
Towards estimating lifetime of ad hoc wireless networks. 4711-4726 - Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh:
A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation. 4727-4743 - Lisong Xu, Josh Helzer:
Media streaming via TFRC: An analytical study of the impact of TFRC on user-perceived media quality. 4744-4764 - Luiz Henrique A. Correia, Daniel F. Macedo, Aldri L. dos Santos, Antonio Alfredo Ferreira Loureiro, José Marcos S. Nogueira:
Transmission power control techniques for wireless sensor networks. 4765-4779 - Jianhong Xia, Lixin Gao, Teng Fei:
A measurement study of persistent forwarding loops on the Internet. 4780-4796 - Luciano Paschoal Gaspary, Marinho P. Barcellos, André Detsch, Rodolfo Stoffel Antunes:
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing. 4797-4815 - Dragos Ilie, Adrian Popescu:
Statistical models for Gnutella signaling traffic. 4816-4835 - Jian Chu, Chin-Tau Lea:
A restorable MPLS-based hose-model VPN network. 4836-4848 - Telemaco Melia, Antonio de la Oliva, Albert Vidal, Ignacio Soto, Daniel Corujo, Rui L. Aguiar:
Toward IP converged heterogeneous mobility: A network controlled approach. 4849-4866 - Minh Huynh, Prasant Mohapatra:
Metropolitan Ethernet Network: A move from LAN to MAN. 4867-4894
Volume 51, Number 18, December 2007
- Andreas Pitsillides, Christophoros Christophorou:
MBMS Handover control: A new approach for efficient handover in MBMS enabled 3G cellular networks. 4897-4918 - Yung Yi, Sanjay Shakkottai:
FluNet: A hybrid internet simulator for fast queue regimes. 4919-4937 - Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Cryptographic techniques for mobile ad-hoc networks. 4938-4950 - Manos Dramitinos, George D. Stamoulis, Costas Courcoubetis:
An auction mechanism for allocating the bandwidth of networks to their users. 4979-4996 - Kuo-Feng Ssu, Chih-Hsun Chou, Wei-Tong Wang, Shin-Hung Chung:
Improving data transmission with helping nodes for geographical ad hoc routing. 4997-5010 - Shu Huang, Rudra Dutta:
Spare capacity provisioning for quasi-static traffic. 5011-5035 - Kejie Lu, Dapeng Wu, Jieyan Fan, Sinisa Todorovic, Antonio Nucci:
Robust and efficient detection of DDoS attacks for large-scale internet. 5036-5056
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.