Journal: Computer Communications

Volume 33, Issue 5

533 -- 550Wolfgang John, Sven Tafvelin, Tomas Olovsson. Passive internet measurement: Overview and guidelines based on experiences
551 -- 558Fabio Ricciato, Angelo Coluccia, Alessandro D Alconzo. A review of DoS attack models for 3G cellular networks from a system-design perspective
559 -- 570Tzung-Shi Chen, Hua-Wen Tsai, Chih-Ping Chu. Adjustable convergecast tree protocol for wireless sensor networks
571 -- 582Pablo Ameigeiras, Juan J. Ramos-Muñoz, Jorge Navarro-Ortiz, Preben E. Mogensen, Juan M. López-Soler. QoE oriented cross-layer design of a resource allocation algorithm in beyond 3G systems
583 -- 588Ming-Feng Chang, Fang-Sun Lu, Chung-Yung Chia. A callback mechanism for Private Telecommunications Networks
589 -- 594Jaeshin Jang, Sang Wu Kim, Jong Hyup Lee. Performance evaluation of a new QoS packet-scheduler for VoIP service in IEEE 802.16-based WMAN systems
595 -- 602Jalal Almhana, Zikuan Liu, Robert McGorman. Nearly optimal power saving policies for mobile stations in wireless networks
603 -- 611Qi Guo, Pin-Han Ho, Hsiang-Fu Yu, János Tapolcai, Hussein T. Mouftah. Spare capacity reprovisioning for high availability shared backup path protection connections
612 -- 618Bárbara González-Arévalo, Julie Roy. Simulating a Poisson cluster process for Internet traffic packet arrivals
619 -- 638Stefan K. Stafrace, Nick Antonopoulos. Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks
639 -- 647Yi-hua Zhu, Wan-deng Wu, Jian Pan, Yi-ping Tang. An energy-efficient data gathering algorithm to prolong lifetime of wireless sensor networks
648 -- 653Zornitza Genova Prodanoff. Optimal frame size analysis for framed slotted ALOHA based RFID networks