Journal: Computer Communications

Volume 36, Issue 3

243 -- 255Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah. A new class of Hash-Chain based key pre-distribution schemes for WSN
256 -- 268Huan Li, Yanlei Liu, Weifeng Chen, Weijia Jia, Bing Li, Junwu Xiong. COCA: Constructing optimal clustering architecture to maximize sensor network lifetime
269 -- 278Qin Liu, Yanan Chang, Xiaohua Jia. A hybrid method of CSMA/CA and TDMA for real-time data aggregation in wireless sensor networks
279 -- 290Philip Ginzboorg, Valtteri Niemi, Jörg Ott. Fragmentation algorithms for DTN links
291 -- 302Feng Zhong, Chai Kiat Yeo, Bu-Sung Lee. EFLoM: An Efficient Framework for Local Mobility
303 -- 319P. Arun Raj Kumar, S. Selvakumar. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
320 -- 332Sangho Lee, Jong Kim. Fluxing botnet command and control channels with URL shortening services
333 -- 341Malabika Sengupta, Swapan Kumar Mondal, Debashis Saha. Distributed lightpath establishment techniques using Multi-wavelength Reservation Protocols in WDM optical networks
342 -- 350Weigang Hou, Lei Guo, Xiaoxue Gong, Zhimin Sun. Multi-domain integrated grooming algorithm for green IP over WDM network
351 -- 359Mingdong Tang, Guoqiang Zhang, Tao Lin, Jianxun Liu. HDLBR: A name-independent compact routing scheme for power-law networks
360 -- 361Agassi Z. Melikov, Leonid Ponomarenko. Comment on "Probabilistic framework and performance evaluation for prioritized call admission control in next generation networks"