Journal: Computer Communications

Volume 36, Issue 8

849 -- 860Zhiting Lin, Xiufang Jiang. Universal scheme improving probabilistic routing in delay-tolerant networks
861 -- 874Nilesh Padhariya, Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa. Economic incentive-based brokerage schemes for improving data availability in mobile-P2P networks
875 -- 880Sathiamoorthy Manoharan, Tianxu Ge. A demerit point strategy to reduce free-riding in BitTorrent
881 -- 894Bernardo de la Ossa, José A. Gil, Julio Sahuquillo, Ana Pont. Referrer Graph: A cost-effective algorithm and pruning method for predicting web accesses
895 -- 907Y. Xie, S. Tang, X. Huang, C. Tang, X. Liu. Detecting latent attack behavior from aggregated Web traffic
908 -- 926Frederic Raspall-Chaure. Scalable identification and measurement of heavy-hitters
927 -- 938Brad Whitehead, Chung-Horng Lung, Peter Rabinovitch. An efficient hybrid approach to per-flow state tracking for high-speed networks
939 -- 946Sungwook Kim. A repeated Bayesian auction game for cognitive radio spectrum sharing scheme
947 -- 961Arash Azarfar, Jean-François Frigon, Brunilde Sansò. Reliability analysis of a channel restoration mechanism for opportunistic spectrum access