Journal: Computer Communications

Volume 31, Issue 15

3553 -- 3563Hojin Ha, Changhoon Yim, Young Yong Kim. Cross-layer multiuser resource allocation for video communication over OFDM networks
3564 -- 3578Naouel Ben Ali, Abdelfattah Belghith, Joanna Moulierac, Miklós Molnár. QoS multicast aggregation under multiple additive constraints
3579 -- 3585Huifang Chen, Hiroshi Mineno, Tadanori Mizuno. Adaptive data aggregation scheme in clustered wireless sensor networks
3586 -- 3593Nadeem Jamali, Hongxing Geng. A mailbox ownership based mechanism for curbing spam
3594 -- 3603Nguyen Van Hanh, Soonghwan Ro, Jungkwan Ryu. Simplified fast handover in mobile IPv6 networks
3604 -- 3612Vicent Cholvi, Juan Segarra. Analysis and placement of storage capacity in large distributed video servers
3613 -- 3624Yu-Fen Kao, Jen-Hung Huang. Price-based resource allocation for wireless ad hoc networks with multi-rate capability and energy constraints
3625 -- 3637Paulo Sérgio Sausen, José Renato de Brito Sousa, Marco Aurélio Spohn, Angelo Perkusich, Antonio Marcus Nogueira de Lima. Dynamic Power Management with Scheduled Switching Modes
3638 -- 3642Xu Zhang, Qiang Gao, Jun Zhang, Gang Wang. Impact of transmit power on throughput performance in wireless ad hoc networks with variable rate control
3643 -- 3653Bo Zhou, Qi Shi, Madjid Merabti. Balancing intrusion detection resources in ubiquitous computing networks
3654 -- 3661Xuguang Shao, Liren Zhang, Ping Shum. Modeling and performance analysis of realizable optical queue with service differentiation capability
3662 -- 3671Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai. Protocols for purpose-restricted anonymous communications in IP-based wireless networks
3672 -- 3682Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Park. CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast
3683 -- 3690Ke Zhang, Cheng Peng Fu. An enhancement of TCP Veno with forward acknowledgement
3691 -- 3699Marco Benini, Sabrina Sicari. Risk assessment in practice: A real case study
3700 -- 3706Hichem Ayed Harhira, Samuel Pierre. Joint routing and admission control problem under statistical delay and jitter constraints in MPLS networks
3707 -- 3718Ramanarayana Kandikattu, Lillykutty Jacob. A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6)
3719 -- 3724Jung Yeon Hwang, Kyu Young Choi, Dong-Hoon Lee. Security weakness in an authenticated group key agreement protocol in two rounds
3725 -- 3738Ching-Wen Chen, Chuan-Chi Weng, Chang-Jung Ku. Design of a low power and low latency MAC protocol with node grouping and transmission pipelining in wireless sensor networks