Journal: Computer Communications

Volume 31, Issue 9

1653 -- 1659Saleh Yousefi, Eitan Altman, Rachid El Azouzi, Mahmood Fathy. Improving connectivity in vehicular ad hoc networks: An analytical study
1660 -- 1671Wei Kuang Lai, Zhen Chang Zheng, Chen-Da Tsai. Fast reroute with pre-established bypass tunnel in MPLS
1672 -- 1678Lei Guo, Xingwei Wang, Juan Du, Tengfei Wu. A new heuristic routing algorithm with Hamiltonian Cycle Protection in survivable networks
1679 -- 1686Keiichi Endo, Minoru Kawahara, Yutaka Takahashi. Encoding for secure computations in distributed interactive real-time applications
1687 -- 1704Habib M. Ammari, Sajal K. Das. A trade-off between energy and delay in data dissemination for wireless sensor networks using transmission range slicing
1705 -- 1712Jui Teng Wang. Centralized and distributed joint dual transmitter receiver diversity and power control for wireless networks
1713 -- 1722Guillaume Jourjon, Emmanuel Lochin, Patrick Sénac. Design, implementation and evaluation of a QoS-aware transport protocol
1723 -- 1726Xiaolong Qian, Yuanwei Jing, Jing Tian. Network congestion avoidance strategy with particle filter
1727 -- 1738Yaning Wang, Linghang Fan, Dan He, Rahim Tafazolli. Performance comparison of scheduling algorithms in network mobility environment
1739 -- 1750Chung-Pyo Hong, Charles C. Weems, Shin-Dug Kim. An effective vertical handoff scheme based on service management for ubiquitous computing
1751 -- 1762Sahadeb Jana, Debashis Saha, Amitava Mukherjee, Pranay Chaudhuri. A novel approach for assigning wavelengths in multihop WDM optical networks
1763 -- 1776Fatma Bouabdallah, Nizar Bouabdallah. The tradeoff between maximizing the sensor network lifetime and the fastest way to report reliably an event using reporting nodes selection
1777 -- 1784Massoud Hadian Dehkordi, Samaneh Mashhadi. Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
1785 -- 1795Maode Ma, Qichao Zhu. Providing delay guaranteed service in CDMA wireless networks
1796 -- 1802Imran Raza, S. A. Hussain. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
1803 -- 1813Agustín Orfila, Javier Carbó, Arturo Ribagorda. Autonomous decision on intrusion detection with trained BDI agents
1814 -- 1823I-Shyan Hwang, Zen-Der Shyu, Liang-Yu Ke, Chun-Che Chang. A novel early DBA mechanism with prediction-based fair excessive bandwidth allocation scheme in EPON
1824 -- 1831Juan Echagüe, Jesús E. Villadangos, Vicent Cholvi, Manuel Prieto. Transforming general networks into feed-forward by using turn-prohibition
1832 -- 1841Chia-Hsin Cheng, Jen-Yung Lin, Jyh-Horng Wen, Chao-Kai Wen. On the performance of O:::3:::BPSK LDD with diversity combining techniques over fading channels
1842 -- 1855Liansheng Tan, Li Jin, Yi Pan. Efficient placement of proxies for hierarchical reliable multicast