Journal: Computer Networks

Volume 51, Issue 9

2219 -- 2222Josep Domingo-Ferrer, Joachim Posegga, Francesc Sebé, Vicenç Torra. Advances in smart cards
2223 -- 2233Bart Preneel. A survey of recent developments in cryptographic algorithms for smart cards
2234 -- 2248HongQian Karen Lu. Network smart card review and analysis
2249 -- 2261Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra. Advances in network smart cards authentication
2262 -- 2267Jorge Munilla, Alberto Peinado. HB-MP: A further step in the HB-family of lightweight authentication protocols
2268 -- 2279Agusti Solanas, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Vanesa Daza. A distributed architecture for scalable private RFID tag identification
2280 -- 2287Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang. Security enhancement of an IC-card-based remote login mechanism
2288 -- 2298Andrés Marín López, Daniel Díaz Sánchez, Florina Almenárez Mendoza, Carlos García-Rubio, Celeste Campo. Smart card-based agents for fair non-repudiation
2299 -- 2307Francesc Sebé, Alexandre Viejo, Josep Domingo-Ferrer. Secure many-to-one symbol transmission for implementation on smart cards
2308 -- 2310George Karetsos, Angelos N. Rouskas, Bijan Jabbari, Bernhard Walke. Topics in wireless broadband systems
2311 -- 2325Claudio Cicconetti, Luciano Lenzini, Enzo Mingozzi, Giovanni Stea. Design and performance analysis of the Real-Time HCCA scheduler for IEEE 802.11e WLANs
2326 -- 2344Xavier Pérez Costa, Daniel Camps-Mur, Albert Vidal. On distributed power saving mechanisms of wireless LANs 802.11e U-APSD vs 802.11 power save mode
2345 -- 2352Dimitris Vassis, George Kormentzas. Performance analysis of IEEE 802.11 ad hoc networks in the presence of hidden terminals
2353 -- 2367Sebastian Max, Guido R. Hiertz, Erik Weiss, Dee Denteneer, Bernhard Walke. Spectrum sharing in IEEE 802.11s wireless mesh networks
2368 -- 2378Patrick Hosein. QoS scheduling of uplink resources in OFDMA networks
2379 -- 2396Georgios Leoleis, Iakovos S. Venieris. Fast MIPv6 extensions supporting seamless multicast handovers
2397 -- 2410Vasileios Karyotis, Symeon Papavassiliou. Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework

Volume 51, Issue 8

1861 -- 1881Edith Cohen, Amos Fiat, Haim Kaplan. Associative search in peer to peer networks: Harnessing latent semantics
1882 -- 1907Alex Raj, Oliver C. Ibe. A survey of IP and multiprotocol label switching fast reroute schemes
1908 -- 1921Reuven Cohen, Amnon Shochot. The Global-ISP paradigm
1922 -- 1941Hwangnam Kim, Jennifer C. Hou, Chunyu Hu, Ye Ge. QoS provisioning in IEEE 802.11-compliant networks: Past, present, and future
1942 -- 1954Jin-Hee Choi, Young-Pil Kim, Chuck Yoo. Self-prevention of socket buffer overflow
1955 -- 1980Ye Ge, Jennifer C. Hou, Sunghyun Choi. An analytic study of tuning systems parameters in IEEE 802.11e enhanced distributed channel access
1981 -- 1997Steven Weber, Gustavo de Veciana. Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link
1998 -- 2014Laura Galluccio, Giacomo Morabito, Sergio Palazzo, Marco Pellegrini, M. Elena Renda, Paolo Santi. Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm
2015 -- 2032Jianbin Wei, Cheng-Zhong Xu. Consistent proportional delay differentiation: A fuzzy control approach
2033 -- 2048Ioannis Psaras, Vassilis Tsaoussidis. Why TCP timers (still) don t work well
2049 -- 2066Chun-Chuan Yang, Chun-Shian Tsai, Junn-Yen Hu, Tzu-Chien Chuang. On the design of mobility management scheme for 802.16-based network environment
2067 -- 2085Jeremie Leguay, Matthieu Latapy, Timur Friedman, Kavé Salamatian. Describing and simulating internet routes
2086 -- 2103Michael Cho-Hoi Chek, Yu-Kwong Kwok. Design and evaluation of practical coexistence management schemes for Bluetooth and IEEE 802.11b systems
2104 -- 2125S. S. Dhillon, Piet Van Mieghem. Performance analysis of the AntNet algorithm
2126 -- 2143B. S. Manoj, Archana Sekhar, C. Siva Ram Murthy. On the use of limited autonomous mobility for dynamic coverage maintenance in sensor networks
2144 -- 2162Glen MacLarty, Michael Fry. Towards a platform for wide-area overlay network deployment and management
2163 -- 2180Srinivasan Ramasubramanian, Harish Krishnamoorthy, Marwan Krunz. Disjoint multipath routing using colored trees
2181 -- 2197Coskun Cetinkaya. Improving the efficiency of multipath traffic via opportunistic traffic scheduling
2198 -- 2216Dawn S. L. Dolcy, Costas C. Constantinou, Steven F. Quigley. A Fokker-Planck equation method predicting Buffer occupancy in a single queue

Volume 51, Issue 7

1745 -- 1747Katsushi Kobayashi, Pascale Vicat-Blanc Primet, Joe Touch. Protocols for fast, long-distance networks
1748 -- 1762Sangtae Ha, Long Le, Injong Rhee, Lisong Xu. Impact of background traffic on performance of high-speed TCP variant protocols
1763 -- 1776Shan Chen, Brahim Bensaou. Can high-speed networks survive with DropTail queues management?
1777 -- 1799Yunhong Gu, Robert L. Grossman. UDT: UDP-based data transfer for high-speed wide area networks
1800 -- 1814Xiaomeng Huang, Chuang Lin, Fengyuan Ren. A novel high speed transport protocol based on explicit virtual load feedback
1815 -- 1832Pasi Sarolahti, Mark Allman, Sally Floyd. Determining an appropriate sending rate over an underutilized network path
1833 -- 1846Kiyohide Nakauchi, Katsushi Kobayashi. An explicit router feedback framework for high bandwidth-delay product networks
1847 -- 1859Lisong Xu. Extending equation-based congestion control to high-speed and long-distance networks

Volume 51, Issue 6

1379 -- 1402Hwangnam Kim, Jennifer C. Hou. Mixed-mode simulation for IEEE 802.11-operated WLANs
1403 -- 1420Jeng Farn Lee, Meng Chang Chen, Yeali S. Sun. WF:::2:::Q-M: Worst-case fair weighted fair queueing with maximum rate control
1421 -- 1443Jiang Li, Murat Yuksel, Xingzhe Fan, Shivkumar Kalyanaraman. Generalized multicast congestion control
1444 -- 1458Lan Wang, Daniel Massey, Lixia Zhang. Persistent detection and recovery of state inconsistencies
1459 -- 1482Sasu Tarkoma, Jaakko Kangasharju. On the cost and safety of handoffs in content-based routing systems
1483 -- 1498Javier Vales-Alonso, Esteban Egea-López, Alejandro S. Martínez-Sala, Pablo Pavón-Mariño, M. Victoria Bueno-Delgado, Joan García-Haro. Performance evaluation of MAC transmission power control in wireless sensor networks
1499 -- 1514Nabhendra Bisnik, Alhussein A. Abouzeid. Optimizing random walk search algorithms in P2P networks
1515 -- 1529Hari Rangarajan, J. J. Garcia-Luna-Aceves. Efficient use of route requests for loop-free on-demand routing in ad hoc networks
1530 -- 1554B. S. Manoj, K. Jayanth Kumar, C. Siva Ram Murthy. MuPAC: A new multi-power architecture for capacity enhancement in cellular networks
1555 -- 1573Yong Huat Chew, Boon Sain Yeo, Daniel Chien Ming Kuan. Sensitivity study of location management area partitioning in cellular communication systems
1574 -- 1600Bo Li, Roberto Battiti. Achieving optimal performance in IEEE 802.11 wireless LANs with the combination of link adaptation and adaptive backoff
1601 -- 1615Hechmi Khlifi, Jean-Charles Grégoire. ARTP: A buffer-aware rate control protocol for media streaming
1616 -- 1629Nikos Argiriou, Leonidas Georgiadis. Channel sharing by multi-class rate adaptive streams: Performance region and optimization
1630 -- 1642Sangheon Pack, Taekyoung Kwon, Yanghee Choi. A performance comparison of mobility anchor point selection schemes in Hierarchical Mobile IPv6 networks
1643 -- 1659Mushi Jin, Oliver W. W. Yang. APOSN: Operation, modeling and performance evaluation
1660 -- 1683Ashraf Al Daoud, Murat Alanyali. Loss-cognizant pricing in networks with greedy users
1684 -- 1704Feng Zheng, John Nelson. An H::infinity:: approach to congestion control design for AQM routers supporting TCP flows in wireless access networks
1705 -- 1724Feng Gao, Michael E. Woodward. A hybrid topological-stochastic partitioning method for scaling QoS routing algorithms
1725 -- 1743Gee-Swee Poo, Haibo Wang. Multi-path routing versus tree routing for VPN bandwidth provisioning in the hose model

Volume 51, Issue 5

1233 -- 1238Deborah A. Frincke, Andreas Wespi, Diego Zamboni. From intrusion detection to self-protection
1239 -- 1255Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest. Learning DFA representations of HTTP for protecting web applications
1256 -- 1274Georgios Portokalidis, Herbert Bos. SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
1275 -- 1283Marcos Laureano, Carlos Maziero, Edgard Jamhour. Protecting host-based intrusion detectors through virtual machines
1284 -- 1298Paul D. Williams, Eugene H. Spafford. CuPIDS: An exploration of highly focused, co-processor-based information system protection
1299 -- 1314Erol Gelenbe, George Loukas. A self-aware approach to denial of service defence
1315 -- 1333Morton Swimmer. Using the danger model of immune systems for distributed defense in modern data networks
1334 -- 1360Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford. Automated adaptive intrusion containment in systems of interacting services
1361 -- 1377Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Maier. Automatic high-performance reconstruction and recovery

Volume 51, Issue 4

919 -- 920Ian F. Akyildiz, Harry Rudin. Editorial
921 -- 960Ian F. Akyildiz, Tommaso Melodia, Kaushik R. Chowdhury. A survey on wireless multimedia sensor networks
961 -- 994Kurtis B. Kredo II, Prasant Mohapatra. Medium access control in wireless sensor networks
995 -- 1012Yi Li, Gaoxi Xiao, Hooshang Ghafouri-Shiraz. Performance evaluation of multi-fiber optical packet switches
1013 -- 1030Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. Evaluation of a low-rate DoS attack against iterative servers
1031 -- 1051Konstantinos P. Ferentinos, Theodore A. Tsiligiridis. Adaptive design optimization of wireless sensor networks using genetic algorithms
1052 -- 1059Theodore L. Willke, Nicholas F. Maxemchuk. Coordinated interaction using reliable broadcast in mobile wireless networks
1060 -- 1071Majid Ghaderi, Raouf Boutaba, Gary W. Kenward. Joint call and packet QoS in cellular packet networks
1072 -- 1094Jinwon Lee, Hyonik Lee, Seungwoo Kang, Su Myeon Kim, Junehwa Song. CISS: An efficient object clustering framework for DHT-based peer-to-peer applications
1095 -- 1105Shantidev Mohanty, Jiang Xie. Performance analysis of a novel architecture to integrate heterogeneous wireless systems
1106 -- 1120Mohamed G. Gouda, Alex X. Liu. Structured firewall design
1121 -- 1132Praveen Jayachandran, Praveen Bhamidipati, C. Siva Ram Murthy. On providing elastic QoS in optical burst switched networks
1133 -- 1150Yaqing Huang, Roch Guérin. A simple FIFO-based scheme for differentiated loss guarantees
1151 -- 1168Wei-Tsung Su, Ko-Ming Chang, Yau-Hwang Kuo. eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks
1169 -- 1182Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi. Robust self-keying mobile ad hoc networks
1183 -- 1204Sajjad Zarifzadeh, Nasser Yazdani, Hamed Khanmirza. A routing framework for load balancing of bandwidth sensitive traffic in differentiated service networks
1205 -- 1231Fabio Ricciato, Francesco Vacirca, Philipp Svoboda. Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis

Volume 51, Issue 3

559 -- 568B. Praveen, J. Praveen, C. Siva Ram Murthy. On using forward error correction for loss recovery in optical burst switched networks
569 -- 587Carlo K. da S. Rodrigues, Rosa M. M. Leão. Bandwidth usage distribution of multimedia servers using Patching
588 -- 605Yeim-Kuan Chang. Fast binary and multiway prefix searches for packet forwarding
606 -- 620Sungchang Kim, Young-Chon Kim, Bin-Yeong Yoon, Minho Kang. An integrated congestion control mechanism for optimized performance using two-step rate controller in optical burst switching networks
621 -- 631Young-June Choi, Jin-Ghoo Choi, Saewoong Bahk. Upper-level scheduling supporting multimedia traffic in cellular data networks
632 -- 654Dong Yu, Deborah A. Frincke. Improving the quality of alerts and predicting intruder s next goal with Hidden Colored Petri-Net
655 -- 670Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda. Access control protocols with two-layer architecture for wireless networks
671 -- 682Hailong Li, Ian Li-Jin Thng. Performance analysis of limited number of wavelength converters by share per node in optical switching network
683 -- 698Péter Hága, Krisztián Diriczi, Gábor Vattay, István Csabai. Granular model of packet pair separation in Poissonian traffic
699 -- 711Jean Marc Kelif, Eitan Altman, Ioannis Z. Koukoutsidis. Admission and GoS control in a multiservice WCDMA system
712 -- 731Yuh-Jzer Joung, Jiaw-Chang Wang. Chord:::2:::: A two-layer Chord for reducing maintenance overhead via heterogeneity
732 -- 750Zhiqiang Gao, Nirwan Ansari. A practical and robust inter-domain marking scheme for IP traceback
751 -- 766Glenn S. Benson. Portable security transaction protocol
767 -- 780Meng Chang Chen, Li-Ping Tung, Yeali S. Sun, Wei Kuan Shih. A new per-class flow fixed proportional differentiated service for multi-service wireless LAN
781 -- 797Michel Mandjes, Petteri Mannersalo, Ilkka Norros. Gaussian tandem queues with an application to dimensioning of switch fabric interfaces
798 -- 822Zhenqiang Ye, Lap Kong Law, Srikanth V. Krishnamurthy, Zhong Xu, Suvidhean Dhirakaosal, Satish K. Tripathi, Mart Molle. Predictive channel reservation for handoff prioritization in wireless cellular networks
823 -- 834Lap Kong Law, Srikanth V. Krishnamurthy, Michalis Faloutsos. A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks
835 -- 852Sergio Sánchez-López, Xavier Masip-Bruin, Josep Solé-Pareta, Jordi Domingo-Pascual. Fast setup of end-to-end paths for bandwidth constrained applications in an IP/MPLS-ATM integrated environment
853 -- 865Jianping Pan, Lin Cai, Xuemin Shen, Jon W. Mark. Identity-based secure collaboration in wireless ad hoc networks
866 -- 882Jen-Shiuh Liu, Zhi-Jian Lee, Yeh-Ching Chung. Dynamic probabilistic packet marking for efficient IP traceback
883 -- 900Yuh-Ren Tsai, Shiuh-Jeng Wang. Two-tier authentication for cluster and individual sets in mobile ad hoc networks
901 -- 917Ernst W. Biersack, Damiano Carra, Renato Lo Cigno, Pablo Rodriguez, Pascal Felber. Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases

Volume 51, Issue 2

357 -- 358Stephan Reiff-Marganiec, Mark Ryan. Guest Editorial
359 -- 381Michael Weiss, Babak Esfandiari, Yun Luo. Towards a classification of web service feature interactions
382 -- 397Rui Gustavo Crespo, Miguel Carvalho, Luigi Logrippo. Distributed resolution of feature interactions for internet applications
398 -- 425Mohamed Shehata, Armin Eberlein, Abraham O. Fapojuwo. A taxonomy for identifying requirement interactions in software systems
426 -- 438Caixia Chi, Ruibing Hao. Test generation for interaction detection in feature-rich communication systems
439 -- 455Alice Miller, Muffy Calder, Alastair F. Donaldson. A template-based approach for the generation of abstractable and reducible models of featured networks
456 -- 479Pierre Yves Schobbens, Patrick Heymans, Jean-Christophe Trigaux, Yves Bontemps. Generic semantics of feature diagrams
480 -- 495Wu-Hon F. Leung. Program entanglement, feature interaction and the feature language extensions
496 -- 514Kenneth J. Turner, Lynne Blair. Policies and conflicts in call control
515 -- 535Xiaotao Wu, Henning Schulzrinne. Handling feature interactions in the language for end system services
536 -- 557Mario Kolberg, Evan H. Magill. Managing feature interactions between distributed SIP call control services

Volume 51, Issue 18

4897 -- 4918Andreas Pitsillides, Christophoros Christophorou. MBMS Handover control: A new approach for efficient handover in MBMS enabled 3G cellular networks
4919 -- 4937Yung Yi, Sanjay Shakkottai. FluNet: A hybrid internet simulator for fast queue regimes
4938 -- 4950Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols. Cryptographic techniques for mobile ad-hoc networks
4951 -- 4978Michael E. Kounavis, Alok Kumar, Raj Yavatkar, H. Vin. Two stage packet classification using most specific filter matching and transport level sharing
4979 -- 4996Manos Dramitinos, George D. Stamoulis, Costas Courcoubetis. An auction mechanism for allocating the bandwidth of networks to their users
4997 -- 5010Kuo-Feng Ssu, Chih-Hsun Chou, Wei-Tong Wang, Shin-Hung Chung. Improving data transmission with helping nodes for geographical ad hoc routing
5011 -- 5035. Spare capacity provisioning for quasi-static traffic
5036 -- 5056Kejie Lu, Dapeng Wu, Jieyan Fan, Sinisa Todorovic, Antonio Nucci. Robust and efficient detection of DDoS attacks for large-scale internet

Volume 51, Issue 17

4711 -- 4726S. Jayashree, C. Siva Ram Murthy. Towards estimating lifetime of ad hoc wireless networks
4727 -- 4743Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh. A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation
4744 -- 4764Lisong Xu, Josh Helzer. Media streaming via TFRC: An analytical study of the impact of TFRC on user-perceived media quality
4765 -- 4779Luiz Henrique A. Correia, Daniel F. Macedo, Aldri L. dos Santos, Antonio Alfredo Ferreira Loureiro, José Marcos S. Nogueira. Transmission power control techniques for wireless sensor networks
4780 -- 4796Jianhong Xia, Lixin Gao, Teng Fei. A measurement study of persistent forwarding loops on the Internet
4797 -- 4815Luciano Paschoal Gaspary, Marinho P. Barcellos, André Detsch, Rodolfo S. Antunes. Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
4816 -- 4835Dragos Ilie, Adrian Popescu. Statistical models for Gnutella signaling traffic
4836 -- 4848Jian Chu, Chin-Tau Lea. A restorable MPLS-based hose-model VPN network
4849 -- 4866Telemaco Melia, Antonio de la Oliva, Albert Vidal, Ignacio Soto, Daniel Corujo, Rui L. Aguiar. Toward IP converged heterogeneous mobility: A network controlled approach
4867 -- 4894Minh Huynh, Prasant Mohapatra. Metropolitan Ethernet Network: A move from LAN to MAN

Volume 51, Issue 16

4511 -- 4513Simon Courtenage, David Lewis, Thanassis Tiropanis. Innovations in Web communications infrastructure
4514 -- 4528Elke Michlmayr, Arno Pany, Gerti Kappel. Using taxonomies for content-based routing with ants
4529 -- 4542Juan Ignacio Vázquez, Diego López-de-Ipiña. mRDP: An HTTP-based lightweight semantic discovery protocol
4543 -- 4560Tao Gu, Hung Keng Pung, Daqing Zhang. Information retrieval in schema-based P2P systems using one-dimensional semantic space
4561 -- 4573Frank Zhigang Wang, Na Helian, Sining Wu, Yuhui Deng, Vineet R. Khare, Michael Parker. GridJet: An underlying data-transporting protocol for accelerating Web communications
4574 -- 4585Dominik Benz, Karen H. L. Tso, Lars Schmidt-Thieme. Supporting collaborative hierarchical classification: Bookmarks as an example
4586 -- 4595Trevor I. Fenner, Mark Levene, George Loizou, George Roussos. A stochastic evolutionary growth model for social networks
4596 -- 4598George Kormentzas, Thomas Magedanz. Middleware challenges for next generation networks and services
4599 -- 4616Pruet Boonma, Junichi Suzuki. BiSNET: A biologically-inspired middleware architecture for self-managing wireless sensor networks
4617 -- 4633Yassine Hadjadj Aoul, Ahmed Mehaoua, Charalabos Skianis. A fuzzy logic-based AQM for real-time traffic over internet
4634 -- 4654Jaakko Kangasharju, Tancred Lindholm, Sasu Tarkoma. XML messaging for mobile devices: From requirements to implementation
4655 -- 4668Ivar Jørstad, Do Thanh van. Personalised ubiquitous file access with XML Web Services
4669 -- 4678Eugen Borcoci, Georgios Kormentzas, Abolghasem (Hamid) Asgari, Toufik Ahmed. Service invocation admission control algorithm for multi-domain IP environments
4679 -- 4696Georgios V. Lioudakis, Eleftherios Koutsoloukas, Nikolaos L. Dellas, Nikolaos D. Tselikas, Sofia Kapellaki, George N. Prezerakos, Dimitra I. Kaklamani, Iakovos S. Venieris. A middleware architecture for privacy protection
4697 -- 4709Muhammad Sher, Thomas Magedanz. A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications

Volume 51, Issue 15

4237 -- 4251Abhishek Kashyap, Kwangil Lee, Mehdi Kalantari, Samir Khuller, Mark A. Shayman. Integrated topology control and routing in wireless optical mesh networks
4252 -- 4269Shigang Chen, Yibei Ling, Randy Chow, Ye Xia. AID: A global anti-DoS service
4270 -- 4283Pablo Pavón-Mariño, Joan García-Haro, Andrzej Jajszczyk. Parallel desynchronized block matching: A feasible scheduling algorithm for the input-buffered wavelength-routed switch
4284 -- 4302Vaishnavi Krishnamurthy, Michalis Faloutsos, Marek Chrobak, Jun-Hong Cui, Li Lao, Allon G. Percus. Sampling large Internet topologies for simulation purposes
4303 -- 4321Weichao Wang, Tylor Stransky. Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
4322 -- 4337Wesam Lootah, William Enck, Patrick McDaniel. TARP: Ticket-based address resolution protocol
4338 -- 4355Dongwook Lee, Gayathri Chandrasekaran, Mukundan Sridharan, Prasun Sinha. Association management for data dissemination over wireless mesh networks
4356 -- 4376Evangelos Papapetrou, Stylianos Karapantazis, Fotini-Niovi Pavlidou. Distributed on-demand routing for LEO satellite systems
4377 -- 4395Panagiotis Papadimitriou, Vassilis Tsaoussidis. SSVP: A congestion control scheme for real-time video streaming
4396 -- 4411Dzmitry Kliazovich, Fabrizio Granelli, Mario Gerla. Performance improvement in wireless networks using cross-layer ARQ
4412 -- 4420Roberto Cusani, Tiziano Inzerilli, Luca Valentini. Network monitoring and performance evaluation in a 3.5G network
4421 -- 4441Kenneth J. Turner, Koon Leai Larry Tan. A rigorous approach to orchestrating grid services
4442 -- 4459Hyuk Lim, Jennifer C. Hou. Identifying lossy links in wired/wireless networks by exploiting sparse characteristics
4460 -- 4474Vicent Cholvi, Juan Echagüe. Stability of FIFO networks under adversarial models: State of the art
4475 -- 4491Lijun Wang, Lin Cai, Xinzhi Liu, Xuemin Shen. Stability and TCP-friendliness of AIMD/RED systems with feedback delays
4492 -- 4510Jordi Guitart, David Carrera, Vicenç Beltran, Jordi Torres, Eduard Ayguadé. Designing an overload control strategy for secure e-commerce applications

Volume 51, Issue 14

3959 -- 3977Qi He, Constantinos Dovrolis, Mostafa H. Ammar. On the predictability of large transfer TCP throughput
3978 -- 3988Yang Yang, Feiyi Huang, Xiaohu Ge, Xiaodong Zhang, Xuanye Gu, Mohsen Guizani, Hsiao-Hwa Chen. Double sense multiple access for wireless ad hoc networks
3989 -- 4004Luca Sanna Randaccio, Luigi Atzori. Group multicast routing problem: A genetic algorithms based approach
4005 -- 4031Mahasweta Sarkar, Rene L. Cruz. A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
4032 -- 4049Tomaso de Cola, Harald Ernst, Mario Marchese. Performance analysis of CCSDS File Delivery Protocol and erasure coding techniques in deep space environments
4050 -- 4069Wenji Wu, Matt Crawford. Interactivity vs. fairness in networked Linux systems
4070 -- 4091Chih-Yung Chang, Chao-Tsun Chang. TARP: A traffic-aware restructuring protocol for Bluetooth radio networks
4092 -- 4111Mario Baldi, Guido Marchetto, Yoram Ofek. A scalable solution for engineering streaming traffic in the future Internet
4112 -- 4130Ahmad Al Hanbali, Arzad Alam Kherani, Robin Groenevelt, Philippe Nain, Eitan Altman. Impact of mobility on the performance of relaying in ad hoc networks - Extended version
4131 -- 4152Ta Nguyen Binh Duong, Suiping Zhou. A two-phase approach to interactivity enhancement for large-scale distributed virtual environments
4153 -- 4173Mehmet Hadi Gunes, Sevcan Bilir, Kamil Saraç, Turgay Korkmaz. A measurement study on overhead distribution of value-added internet services
4174 -- 4188Sagy Bar, Mira Gonen, Avishai Wool. A geographic directed preferential internet topology model
4189 -- 4211Thierry Rakotoarivelo, Patrick Sénac, Aruna Seneviratne, Michel Diaz. SPAD: A distributed middleware architecture for QoS enhanced alternate path discovery
4212 -- 4233Samphel Norden, Katherine Guo. Support for resilient Peer-to-Peer gaming

Volume 51, Issue 13

3673 -- 3692Abdullah Balamash, Marwan Krunz, Philippe Nain. Performance analysis of a client-side caching/prefetching system for Web traffic
3693 -- 3714Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu. On the scalability of rendezvous-based location services for geographic wireless ad hoc routing
3715 -- 3726Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam. SPP: An anti-phishing single password protocol
3727 -- 3749Serdar Vural, Eylem Ekici. Probability distribution of multi-hop-distance in one-dimensional sensor networks
3750 -- 3772Issa Khalil, Saurabh Bagchi, Ness B. Shroff. LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
3773 -- 3798Marios Lestas, Andreas Pitsillides, Petros A. Ioannou, George Hadjipollas. Adaptive congestion protocol: A congestion control protocol with learning capability
3799 -- 3811Sakib A. Mondal, Faisal B. Luqman. Improving TCP performance over wired-wireless networks
3812 -- 3827Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konstantina Papagiannaki, Christophe Diot. Analysis of point-to-point packet delay in an operational network
3828 -- 3843Zhi Li, Lihua Yuan, Prasant Mohapatra, Chen-Nee Chuah. On the analysis of overlay failure detection and recovery
3844 -- 3863Allen B. Downey. TCP self-clocking and bandwidth sharing
3864 -- 3877Anat Bremler-Barr, Nir Halachmi, Hanoch Levy. Protecting bursty applications against traffic aggressiveness
3878 -- 3901Nizar Bouabdallah, Harry G. Perros. Cost-effective single-hub WDM ring networks: A proposal and analysis
3902 -- 3918Ignacio Más Ivars, Gunnar Karlsson. Probe-based admission control for a differentiated-services internet
3919 -- 3934Yongxiang Zhao, Changjia Chen. A redundant overbooking reservation algorithm for OBS/OPS networks
3935 -- 3955Animesh Patcha, Jung Min Park. Network anomaly detection with incomplete audit data

Volume 51, Issue 12

3323 -- 3337Ahsan Habib, John Chuang. Improving application QoS with residential multihoming
3338 -- 3353Soo Young Shin, Hong Seong Park, Wook Hyun Kwon. Mutual interference analysis of IEEE 802.15.4 and IEEE 802.11b
3354 -- 3367Lih-Chyau Wuu, Tzong-Jye Liu, Kuo-Ming Chen. A longest prefix first search tree for IP lookup
3368 -- 3379Jiann-Liang Chen, Ming-Chiao Chen, Yi-Ru Chian. QoS management in heterogeneous home networks
3380 -- 3391Sumit Naiksatam, Stephen A. Chiappari, Silvia M. Figueira. Efficient bandwidth utilization in LambdaGrids using pricing incentives
3392 -- 3412Vinay Sridhara, Stephan Bohacek. Realistic propagation simulation of urban mesh networks
3413 -- 3426Luis López, Antonio Fernández, Vicent Cholvi. A game theoretic comparison of TCP and digital fountain based protocols
3427 -- 3447Saravanan Balasubramanian, Demet Aksoy. Adaptive energy-efficient registration and online scheduling for asymmetric wireless sensor networks
3448 -- 3470Animesh Patcha, Jung Min Park. An overview of anomaly detection techniques: Existing solutions and latest technological trends
3471 -- 3490Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis. Defending against hitlist worms using network address space randomization
3491 -- 3506Stylianos Karapantazis, Fotini-Niovi Pavlidou. Call admission control in multiservice high altitude platform (HAP) W-CDMA cellular systems
3507 -- 3524Grigorios Zachariadis, Javier A. Barria. Demand management for telecommunications services
3525 -- 3548Ritesh Mukherjee, J. William Atwood. Scalable solutions for secure group communications
3549 -- 3563Christos Bouras, Afrodite Sevasti. An analytical QoS service model for delay-based differentiation
3564 -- 3573Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang. A queueing analysis for the denial of service (DoS) attacks in computer networks
3574 -- 3594W.-Y. Tam, King-Shan Lui, Suleyman Uludag, Klara Nahrstedt. Quality-of-Service routing with path information aggregation
3595 -- 3616Himabindu Pucha, Saumitra M. Das, Y. Charlie Hu. The performance impact of traffic patterns on routing protocols in mobile ad hoc networks
3617 -- 3631Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee. Cellular universal IP for nested network mobility
3632 -- 3649Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi. Threshold cryptography in P2P and MANETs: The case of access control
3650 -- 3654Saralees Nadarajah, Samuel Kotz. On the convolution of Pareto and gamma distributions
3655 -- 3671Do Young Eun, Xinbing Wang. Performance analysis of TCP/AQM with generalized AIMD under intermediate buffer sizes

Volume 51, Issue 11

2917 -- 2937Georgios Smaragdakis, Nikolaos Laoutaris, Azer Bestavros, Ibrahim Matta, Ioannis Stavrakakis. Mistreatment-resilient distributed caching
2938 -- 2957Dah-Ming Chiu, Adrian Sai-Wah Tam. Fairness of traffic controls for inelastic flows in the Internet
2958 -- 2975Eric W. M. Wong, Andrew Zalesky, Zvi Rosberg, Moshe Zukerman. A new method for approximating blocking probability in overflow loss networks
2976 -- 2993Ashima Gupta, Prasant Mohapatra. A survey on ultra wide band medium access control schemes
2994 -- 3012Mário Alves, Eduardo Tovar. Real-time communications over wired/wireless PROFIBUS networks supporting inter-cell mobility
3013 -- 3046Mehmet S. Kuran, Tuna Tugcu. A survey on emerging broadband wireless access technologies
3047 -- 3068Lixiang Xiong, Guoqiang Mao. Saturated throughput analysis of IEEE 802.11e EDCA
3069 -- 3089Li Lao, Jun-Hong Cui, Mario Gerla. Tackling group-to-tree matching in large scale group communications
3090 -- 3109Hualiang Chen, Zhongxin Liu, Zengqiang Chen, Zhuzhi Yuan. Extending TCP congestion control to multicast
3110 -- 3124Timo Vanhatupa, Marko Hännikäinen, Timo D. Hämäläinen. Evaluation of throughput estimation models and algorithms for WLAN frequency planning
3125 -- 3141Hanping Lufei, Weisong Shi. Energy-aware QoS for application sessions across multiple protocol domains in mobile computing
3142 -- 3156Anelise Munaretto, Mauro Fonseca. Routing and quality of service support for mobile ad hoc networks
3157 -- 3171Xiaolong Li, Aaron Striegel. A case for Passive Application Layer Multicast
3172 -- 3196Gilberto Flores Lucio, Martin J. Reed, Ian D. Henning. Guided local search as a network planning algorithm that incorporates uncertain traffic demands
3197 -- 3219H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal. Key management for content access control in a hierarchy
3220 -- 3231Yuan-Cheng Lai. Two schedulers to provide delay proportion and reduce queueing delay simultaneously
3232 -- 3251Sebastian Kiesel, Michael Scharf. Modeling and performance evaluation of transport protocols for firewall control
3252 -- 3264Jelena V. Misic. Algorithm for equalization of cluster lifetimes in a multi-level Beacon enabled 802.15.4 sensor network
3265 -- 3277Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai. Capacity analysis and MAC enhancement for UWB broadband wireless access networks
3278 -- 3293Zhenjiang Li, J. J. Garcia-Luna-Aceves. Loop-free constrained path computation for hop-by-hop QoS routing
3294 -- 3304Steven Shelford, Gholamali C. Shoja, Eric G. Manning. Achieving optimal revenues in dynamically priced network services with QoS guarantees
3305 -- 3321Dusit Niyato, Ekram Hossain. QoS-aware bandwidth allocation and admission control in IEEE 802.16 broadband wireless access networks: A non-cooperative game theoretic approach

Volume 51, Issue 10

2411 -- 2449Jelena V. Misic, Carol J. Fung. The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network
2450 -- 2466Yigal Bejerano, Seung-Jae Han, Amit Kumar. Efficient load-balancing routing for wireless mesh networks
2467 -- 2483Guoqiang Mao, Brian D. O. Anderson, Baris Fidan. Path loss exponent estimation for wireless sensor network localization
2484 -- 2513Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker. Design and implementation of a secure wide-area object middleware
2514 -- 2528Supeng Leng, Liren Zhang, Huirong Fu, Jianjun Yang. Mobility analysis of mobile hosts with random walking in ad hoc networks
2529 -- 2553Guoqiang Mao, Baris Fidan, Brian D. O. Anderson. Wireless sensor network localization techniques
2554 -- 2564Ning Lu, John Bigham. On utility-fair bandwidth adaptation for multi-class traffic QoS provisioning in wireless networks
2565 -- 2579Birger Tödtmann, Erwin P. Rathgeb. Anticipatory distributed packet filter configurations for carrier-grade IP networks
2580 -- 2593Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis. A framework for protecting a SIP-based infrastructure against malformed message attacks
2594 -- 2615Vasudev Shah, Ece Gelal, Srikanth V. Krishnamurthy. Handling asymmetry in power heterogeneous ad hoc networks
2616 -- 2630Zhenhai Duan, Yingfei Dong, Kartik Gopalan. DMTP: Controlling spam through message delivery differentiation
2631 -- 2644Ibtissam El Khayat, Pierre Geurts, Guy Leduc. Machine-learnt versus analytical models of TCP throughput
2645 -- 2676Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femminella, Gianluca Reali. Autonomic control and personalization of a wireless access network
2677 -- 2700Andrey Belenky, Nirwan Ansari. On deterministic packet marking
2701 -- 2716Baek-Young Choi, Sue B. Moon, Rene L. Cruz, Zhi-Li Zhang, Christophe Diot. Quantile sampling for practical delay monitoring in Internet backbone networks
2717 -- 2737Aleksandar Kuzmanovic, Edward W. Knightly. Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
2738 -- 2752Marco Ajmone Marsan, Claudio Casetti, Gianluca Mardente, Marco Mellia. A framework for admission control and path allocation in DiffServ networks
2753 -- 2770Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng. Improving the resilience of content distribution networks to large scale distributed denial of service attacks
2771 -- 2787Sun-Myeng Kim, Young-Jong Cho. Channel time allocation scheme based on feedback information in IEEE 802.11e wireless LANs
2788 -- 2804Yujie Zhu, Aravind Velayutham, Oyebamiji Oladeji, Raghupathy Sivakumar. Enhancing TCP for networks with guaranteed bandwidth services
2805 -- 2817Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei. Secure multicast in dynamic environments
2818 -- 2832Shudong Jin, Hongbo Jiang. Novel approaches to efficient flooding search in peer-to-peer networks
2833 -- 2853Jocelyne Elias, Fabio Martignon, Antonio Capone, Guy Pujolle. A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds
2854 -- 2866Srinivasan Ramasubramanian, Mithun Harkara, Marwan Krunz. Linear time distributed construction of colored trees for disjoint multipath routing
2867 -- 2891Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley. Performance modeling of epidemic routing
2892 -- 2915Pablo Vidales, Carlos Jesus Bernardos, Ignacio Soto, David N. Cottingham, Javier Baliosian, Jon Crowcroft. MIPv6 experimental evaluation using overlay networks

Volume 51, Issue 1

1 -- 13Francesc Sebé, Josep Domingo-Ferrer. Scalability and security in biased many-to-one communication
14 -- 30Davide Careglio, Josep Solé-Pareta, Salvatore Spadaro. Service category-to-wavelength selection technique for QoS support in connection-oriented optical packet switching
31 -- 42Ka Ki To, Jack Y. B. Lee. Parallel overlays for high data-rate multicast data transfer
43 -- 53Junfeng Wang, Lei Li, Mingtian Zhou. Topological dynamics characterization for LEO satellite networks
54 -- 68Zhi Li, Prasant Mohapatra. On investigating overlay service topologies
69 -- 93Shanyu Zheng, David Manz, Jim Alves-Foss. A communication-computation efficient group key algorithm for large and dynamic groups
94 -- 113Hung Tuan Tran, Thomas Ziegler. A design framework towards the profitable operation of service overlay networks
114 -- 133Giovanna Carofiglio, Michele Garetto, Emilio Leonardi, Alessandro Tarello, Marco Ajmone Marsan. Beyond fluid models: Modelling TCP mice in IP networks under non-stationary random traffic
134 -- 152Li Feng, Qinglin Zhao, Hanwen Zhang. Location management based on distance and direction for PCS networks
153 -- 176Tamma Bheemarjuna Reddy, John P. John, C. Siva Ram Murthy. Providing MAC QoS for multimedia traffic in 802.11e based multi-hop ad hoc wireless networks
177 -- 189Tao Meng, Hong-Fei Yan. On the peninsula phenomenon in web graph and its implications on web search
190 -- 206Shay Kutten, David Peleg. Asynchronous resource discovery in peer-to-peer networks
207 -- 223Salvatore Spadaro, Alessandro D Alessandro, Antonio Manzalini, Josep Solé-Pareta. TRIDENT: An automated approach to traffic engineering in IP/MPLS over ASON/GMPLS networks
224 -- 238Robert M. Hierons, Hasan Ural. Reducing the cost of applying adaptive test cases
239 -- 257Javed I. Khan, Raid Zaghal. Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport
258 -- 284Hirozumi Yamaguchi, Khaled El-Fakih, Gregor von Bochmann, Teruo Higashino. Deriving protocol specifications from service specifications written as Predicate/Transition-nets
285 -- 308Fei Hu, Waqaas Siddiqui, Krishna Sankar. Scalable security in Wireless Sensor and Actuator Networks (WSANs): Integration re-keying with routing
309 -- 335Marcos Postigo-Boix, Joan García-Haro, José Luis Melús-Moreno. A cost-efficient method for streaming stored content in a guaranteed QoS Internet
336 -- 356Wenting Tang, Yun Fu, Ludmila Cherkasova, Amin Vahdat. Modeling and generating realistic streaming media server workloads