Journal: Computer Communications

Volume 35, Issue 12

1411 -- 1421Chongyang Xie, Hamad Alazemi, Nasir Ghani. Rerouting in advance reservation networks
1422 -- 1432Fucai Yu, Guangmin Hu, Soochang Park, Euisin Lee, Sang-Ha Kim. Quorum based sink location service for irregular wireless sensor networks
1433 -- 1446Antonio de la Oliva, Albert Banchs, Pablo Serrano. Throughput and energy-aware routing for 802.11 based mesh networks
1447 -- 1456Hanwu Wang, Weijia Jia. Design a novel fairness model in WiMAX mesh networks
1457 -- 1471Hongli Zhang, Gang Lu, Mahmoud T. Qassrawi, Yu Zhang, Xiang-Zhan Yu. Feature selection for optimizing traffic classification
1472 -- 1483Seyed Vahid Azhari, Maryam Homayouni, Hani Nemati, Javad Enayatizadeh, Ahmad Akbari. Overload control in SIP networks using no explicit feedback: A window based approach
1484 -- 1493Daochao Huang, Fuhong Lin, Lei Wu, Hongke Zhang. CPSCox: A survival analysis model of peer behavior in large scale DHT system
1494 -- 1506Piet Van Mieghem. The viral conductance of a network
1507 -- 1515Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda. PoX: Protecting users from malicious Facebook applications
1516 -- 1526Marco Gramaglia, Manuel Urueña, Isaías Martinez-Yelmo. Off-line incentive mechanism for long-term P2P backup storage
1527 -- 1533Maede Ashouri-Talouki, Ahmad Baraani-Dastjerdi, Ali Aydin Selçuk. GLP: A cryptographic approach for group location privacy