Journal: Computer Communications

Volume 32, Issue 5

783 -- 786Jia-Lun Tsai. Convertible multi-authenticated encryption scheme with one-way hash function
787 -- 799Ali A. Kanso. Modified clock-controlled alternating step generators
800 -- 805Lei Ye, Zhijun Wang, Hao Che, Henry C. B. Chan, Constantino M. Lagoa. Utility function of TCP
806 -- 813Rashid A. Saeed, Hafizal Mohamad, Borhanuddin Mohd Ali. Dynamic hybrid automatic repeat request (DHARQ) for WiMAX - Mobile multihop relay using adaptive power control
814 -- 827Nikolaos D. Doulamis, Pantelis N. Karamolegkos, Anastasios D. Doulamis, Ioannis G. Nikolakopoulos. Exploiting semantic proximities for content search over p2p networks
828 -- 833Bazil Taha Ahmed, Miguel Calvo-Ramón. UMTS-HSDPA in High Altitude Platforms (HAPs) communications with finite transmitted power and unequal cell s load
834 -- 846Kevin F. Chen, Edwin Hsing-Mean Sha, Si-Qing Zheng. Fast and noniterative scheduling in input-queued switches: Supporting QoS
847 -- 857Byungseung Kim, Hyogon Kim, Saewoong Bahk. FDF: Frequency detection-based filtering of scanning worms
858 -- 866Rachid Hadid, Mehmet Hakan Karaata. An adaptive stabilizing algorithm for finding all disjoint paths in anonymous mesh networks
867 -- 879Jacob Engel, Taskin Koçak. Off-chip communication architectures for high throughput network processors
880 -- 887Yuhong Zhang, Ezzatollah Salari. A hybrid channel allocation algorithm with priority to handoff calls in mobile cellular networks
888 -- 895Ioannis Psaras, Vassilis Tsaoussidis. On the properties of an adaptive TCP Minimum RTO
896 -- 906Giuseppe Amato, Antonio Caruso, Stefano Chessa. Application-driven, energy-efficient communication in wireless sensor networks
907 -- 912Bazil Taha Ahmed, Miguel Calvo-Ramón. Uplink multiservice capacity and interference statistics of WCDMA macrocells with antenna diversity reception in a multipath fading environment
913 -- 926Li Tang, Jun Li, Yanda Li, Scott Shenker. An investigation of the Internet s IP-layer connectivity
927 -- 934Zhi-Ting Lin, Yugui Qu, Xiao-Fang Zhou, Baohua Zhao. Analysis and design of mobile Wireless Social Model
935 -- 942Shih-Wei Pan, Jung-Shyr Wu. Throughput analysis of IEEE 802.11e EDCA under heterogeneous traffic
943 -- 953Shenghai Liu, Suili Feng, Wu Ye, Hongcheng Zhuang. Slot allocation algorithms in centralized scheduling scheme for IEEE 802.16 based wireless mesh networks
954 -- 960Zhong Fan. Bandwidth allocation in UWB WPANs with ECMA-368 MAC
961 -- 973Dheeraj K. Klair, Kwan-Wu Chin, Raad Raad. On the energy consumption of Pure and Slotted Aloha based RFID anti-collision protocols
974 -- 984Xiaowen Zhang, Hao Zhu, Jinsong Zhang. RANC: Relay-aided network coding in multi-hop wireless networks
985 -- 991Marzieh Varposhti, Naser Movahhedinia. Supporting QoS in IEEE 802.11e wireless LANs over fading channel
992 -- 999Seokhee Lee, JongWon Kim. Transparency analysis and delay compensation scheme for haptic-based networked virtual environments
1000 -- 1005Xingwei Wang, Lei Guo, Cunqian Yu, Dong Wang, Weigang Hou, Ying Li, Chongshan Wang, Xin Liu. A new heuristic protection algorithm based on survivable integrated auxiliary graph in waveband switching optical networks
1006 -- 1013Sascha Rehbock, Ray Hunt. Trustworthy clients: Extending TNC to web-based environments