Journal: Computer Communications

Volume 27, Issue 16

1569 -- 1584Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús E. Díaz-Verdejo. Anomaly detection methods in wired networks: a survey and taxonomy
1585 -- 1593Meredith Lulling, John Vaughan. A simulation-based performance evaluation of Tahoe, Reno and Sack TCP as appropriate transport protocols for SIP
1594 -- 1607Wei Wei, Qingji Zeng, Jimin Liu, Jun Huang, Pengcheng Xiao. Differentiated multi-layer integrated routing in IP over WDM networks
1608 -- 1616Jose Antonio Onieva, Jianying Zhou, Javier Lopez. Non-repudiation protocols for multiple entities
1617 -- 1623Li-Hsing Yen, Ming-Chun Tsou. An OVSF code assignment scheme utilizing multiple RAKE combiners for W-CDMA
1624 -- 1636Yi-Cheng Chan, Chia-Tai Chan, Yaw-Chung Chen. RoVegas: a router-based congestion avoidance mechanism for TCP Vegas
1637 -- 1646Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin. Accelerating network security services with fast packet classification
1647 -- 1660Abhishek Jain, Abhay Karandikar, Rahul Verma. Adaptive prediction based approach for congestion estimation (APACE) in active queue management
1661 -- 1669Wuyi Yue, Koji Miyazaki, Xiaotie Deng. Optimal channel assignment in wireless communication networks with distance and frequency interferences
1670 -- 1678Antonis Oikonomou, Panagiotis Demestichas, Michael E. Theologou. Evaluation of management functionality for the power control operation of WLAN systems
1679 -- 1681Gonzalo Álvarez, Shujun Li. Breaking network security based on synchronized chaos