1 | -- | 2 | Ian F. Akyildiz, Harry Rudin. Editorial |
3 | -- | 19 | Hyenyoung Yoon, Junseok Hwang, Martin B. H. Weiss. An analytic research on secondary-spectrum trading mechanisms based on technical and market changes |
20 | -- | 33 | Hyunsang Choi, Heejo Lee. Identifying botnets by capturing group activities in DNS traffic |
34 | -- | 49 | Parisa D. Hossein Zadeh, Christian Schlegel, Mike H. MacGregor. Distributed optimal dynamic base station positioning in wireless sensor networks |
50 | -- | 63 | Alptekin Küpçü, Anna Lysyanskaya. Usable optimistic fair exchange |
64 | -- | 84 | Yun Mao, Boon Thau Loo, Zachary G. Ives, Jonathan M. Smith. MOSAIC: Declarative platform for dynamic overlay composition |
85 | -- | 98 | Ziqian Dong, Rohan D. W. Perera, Rajarathnam Chandramouli, K. P. Subbalakshmi. Network measurement based modeling and optimization for IP geolocation |
99 | -- | 111 | Salah A. Aly, Ahmed E. Kamal, Osameh M. Al-Kofahi. Network protection codes: Providing self-healing in autonomic networks using network coding |
112 | -- | 126 | M. Carmen Lucas-Estan, Javier Gozálvez, Joaquín Sánchez-Soriano. Integer linear programming optimization of joint RRM policies for heterogeneous wireless systems |
127 | -- | 141 | Amr Rizk, Markus Fidler. Non-asymptotic end-to-end performance bounds for networks with long range dependent fBm cross traffic |
142 | -- | 156 | Sérgio Crisóstomo, Udo Schilcher, Christian Bettstetter, João Barros. Probabilistic flooding in stochastic networks: Analysis of global information outreach |
157 | -- | 168 | Sara Modarres Razavi, Di Yuan, Fredrik Gunnarsson, Johan Moe. Performance and cost trade-off in Tracking Area reconfiguration: A Pareto-optimization approach |
169 | -- | 185 | Thomas Gamer. Collaborative anomaly-based detection of large-scale internet attacks |
186 | -- | 197 | Nicola Cordeschi, Valentina Polli, Enzo Baccarelli. Traffic Engineering for wireless connectionless access networks supporting QoS-demanding media applications |
198 | -- | 212 | Yuh-Jzer Joung, Terry Hui-Ye Chiu, Shy Min Chen. Cooperating with free riders in unstructured P2P networks |
213 | -- | 230 | Yuh-Jzer Joung, Shih-Hsiang Huang, Shi-Hang Lin. Making data-centric storage adaptive and cost-optimal |
231 | -- | 243 | Hyuntae Park, Hyejeong Hong, Sungho Kang. An efficient IP address lookup algorithm based on a small balanced tree using entry reduction |
244 | -- | 259 | Maysam Mirahmadi, Abdallah Shami. Traffic-prediction-assisted dynamic bandwidth assignment for hybrid optical wireless networks |
260 | -- | 272 | Chun-Nan Lu, Chun-Ying Huang, Ying-Dar Lin, Yuan-Cheng Lai. Session level flow classification by packet size distribution and session grouping |
273 | -- | 286 | Markus B. Moessner, Gul N. Khan. Secure authentication scheme for passive C1G2 RFID tags |
287 | -- | 302 | Enzo Baccarelli, Nicola Cordeschi, Tatiana Patriarca. QoS Stochastic Traffic Engineering for the wireless support of real-time streaming applications |
303 | -- | 314 | Matias Toril, Pablo Guerrero-García, Salvador Luna-Ramírez, Volker Wille. An efficient integer programming formulation for the assignment of base stations to controllers in cellular networks |
315 | -- | 328 | Ji-Hoon Yun. Cross-layer analysis of the random access mechanism in Universal Terrestrial Radio Access |
329 | -- | 344 | Dagang Li, Emmanuel Van Lil, Antoine Van de Capelle. Improving Slow-start based probing mechanisms for flow adaptation after handovers |
345 | -- | 364 | Mustafa Omer Kilavuz, Murat Yuksel. Path approximation for multi-hop wireless routing under application-based accuracy constraints |
365 | -- | 377 | Yiping Chen, Erwan Le Merrer, Zhe Li, YaNing Liu, Gwendal Simon. OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV |
378 | -- | 398 | Agapios Avramidis, Panayiotis Kotzanikolaou, Christos Douligeris, Mike Burmester. Chord-PKI: A distributed trust infrastructure based on P2P networks |
399 | -- | 411 | Huali Bai, Ming Chen 0003. CCIPCA-OPCSC: An online method for detecting shared congestion paths |
412 | -- | 434 | Juanjo Alins, Jorge Mata-Díaz, Jose L. Muñoz, Elizabeth Rendon-Morales, Oscar Esparza. XPLIT: A cross-layer architecture for TCP services over DVB-S2/ETSI QoS BSM |
435 | -- | 447 | Guosong Tian, Yu-Chu Tian. Modelling and performance evaluation of the IEEE 802.11 DCF for real-time control |
448 | -- | 461 | Mengjun Xie, Zhenyu Wu, Haining Wang. Secure instant messaging in enterprise-like networks |
462 | -- | 476 | Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. Behavior analysis of TCP Linux variants |
477 | -- | 489 | Weili Han, Chang Lei. A survey on policy languages in network and security management |