Journal: Computer Communications

Volume 31, Issue 9

1653 -- 1659Saleh Yousefi, Eitan Altman, Rachid El Azouzi, Mahmood Fathy. Improving connectivity in vehicular ad hoc networks: An analytical study
1660 -- 1671Wei Kuang Lai, Zhen Chang Zheng, Chen-Da Tsai. Fast reroute with pre-established bypass tunnel in MPLS
1672 -- 1678Lei Guo, Xingwei Wang, Juan Du, Tengfei Wu. A new heuristic routing algorithm with Hamiltonian Cycle Protection in survivable networks
1679 -- 1686Keiichi Endo, Minoru Kawahara, Yutaka Takahashi. Encoding for secure computations in distributed interactive real-time applications
1687 -- 1704Habib M. Ammari, Sajal K. Das. A trade-off between energy and delay in data dissemination for wireless sensor networks using transmission range slicing
1705 -- 1712Jui Teng Wang. Centralized and distributed joint dual transmitter receiver diversity and power control for wireless networks
1713 -- 1722Guillaume Jourjon, Emmanuel Lochin, Patrick Sénac. Design, implementation and evaluation of a QoS-aware transport protocol
1723 -- 1726Xiaolong Qian, Yuanwei Jing, Jing Tian. Network congestion avoidance strategy with particle filter
1727 -- 1738Yaning Wang, Linghang Fan, Dan He, Rahim Tafazolli. Performance comparison of scheduling algorithms in network mobility environment
1739 -- 1750Chung-Pyo Hong, Charles C. Weems, Shin-Dug Kim. An effective vertical handoff scheme based on service management for ubiquitous computing
1751 -- 1762Sahadeb Jana, Debashis Saha, Amitava Mukherjee, Pranay Chaudhuri. A novel approach for assigning wavelengths in multihop WDM optical networks
1763 -- 1776Fatma Bouabdallah, Nizar Bouabdallah. The tradeoff between maximizing the sensor network lifetime and the fastest way to report reliably an event using reporting nodes selection
1777 -- 1784Massoud Hadian Dehkordi, Samaneh Mashhadi. Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
1785 -- 1795Maode Ma, Qichao Zhu. Providing delay guaranteed service in CDMA wireless networks
1796 -- 1802Imran Raza, S. A. Hussain. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
1803 -- 1813Agustín Orfila, Javier Carbó, Arturo Ribagorda. Autonomous decision on intrusion detection with trained BDI agents
1814 -- 1823I-Shyan Hwang, Zen-Der Shyu, Liang-Yu Ke, Chun-Che Chang. A novel early DBA mechanism with prediction-based fair excessive bandwidth allocation scheme in EPON
1824 -- 1831Juan Echagüe, Jesús E. Villadangos, Vicent Cholvi, Manuel Prieto. Transforming general networks into feed-forward by using turn-prohibition
1832 -- 1841Chia-Hsin Cheng, Jen-Yung Lin, Jyh-Horng Wen, Chao-Kai Wen. On the performance of O:::3:::BPSK LDD with diversity combining techniques over fading channels
1842 -- 1855Liansheng Tan, Li Jin, Yi Pan. Efficient placement of proxies for hierarchical reliable multicast

Volume 31, Issue 8

1471 -- 1474Xiaobo Zhou, Liqiang Zhang. Special issue: Modeling, testbeds, and applications in wireless mesh networks
1475 -- 1483Nadeem Akhtar, Klaus Moessner. On the nominal capacity of multi-radio multi-channel wireless mesh networks
1484 -- 1496Danilo Valerio, Fabio Ricciato, Paul Fuxjaeger. On the feasibility of IEEE 802.11 multi-channel multi-hop mesh networks
1497 -- 1512Károly Farkas, Theus Hossmann, Franck Legendre, Bernhard Plattner, Sajal K. Das. Link quality prediction in mesh networks
1513 -- 1528A. Neishaboori, George Kesidis. Wireless mesh networks based on CDMA
1529 -- 1539Peng Cheng, Zhaoyang Zhang, Hsiao-Hwa Chen, Peiliang Qiu. A framework of cross-layer design for multiple video streams in wireless mesh networks
1540 -- 1550Roger Karrer, Alessio Botta, Antonio Pescapè. High-speed backhaul networks: Myth or reality?
1551 -- 1563Sébastien Roy, Jean-François Boudreault, Louis Dupont. An end-to-end prototyping framework for compliant wireless LAN transceivers with smart antennas
1564 -- 1578Andres Arjona, Cédric Westphal, Jukka Manner, Antti Ylä-Jääski, Sami Takala. Can the current generation of wireless mesh networks compete with cellular voice?
1579 -- 1587Vinay Sridhara, Hweechul Shin, Stephan Bohacek. Performance of 802.11b/g in the interference limited regime
1588 -- 1601Soumendra Nanda, David Kotz. Mesh-Mon: A multi-radio mesh monitoring and management system
1602 -- 1614Lin Luo, Hang Liu, Mingquan Wu, Dekai Li. End-to-end performance aware association mechanism for wireless municipal mesh networks
1615 -- 1626Fei Xie, Kien A. Hua, Ning Jiang. A cross-layer framework for video-on-demand service in multi-hop WiMax mesh networks
1627 -- 1637B. S. Manoj, Ping Zhou, Ramesh R. Rao. Dynamic adaptation of CSMA/CA MAC protocol for wide area wireless mesh networks
1638 -- 1652S. Khan, S. A. Mahmud, K. K. Loo, H. S. Al-Raweshidy. A cross layer rate adaptation solution for IEEE 802.11 networks

Volume 31, Issue 7

1255 -- 1258Xiaobo Zhou, Liqiang Zhang. Special issue: Resource management and routing in wireless mesh networks
1259 -- 1275Bing He, Bin Xie, Dharma P. Agrawal. Optimizing deployment of Internet gateway in Wireless Mesh Networks
1276 -- 1289Bo Wang, Matt W. Mutka. QoS-aware fair rate allocation in wireless mesh networks
1290 -- 1300Roberto Riggio, Daniele Miorandi, Francesco De Pellegrini, Fabrizio Granelli, Imrich Chlamtac. A traffic aggregation and differentiation scheme for enhanced QoS in IEEE 802.11-based Wireless Mesh Networks
1301 -- 1317Mesut Ali Ergin, Marco Gruteser, Lin Luo, Dipankar Raychaudhuri, Hang Liu. Available bandwidth estimation and admission control for QoS routing in wireless mesh networks
1318 -- 1328Najah A. Abu Ali, Hossam S. Hassanein. Statistical delay budget partitioning in wireless mesh networks
1329 -- 1342Ting-Yu Lin, Wai-Hong Tam, Kang-Lun Fan, Yu-Chee Tseng. Resource planning and packet forwarding in multi-radio, multi-mode, multi-channel, multi-rate (M:::4:::) wireless mesh networks
1343 -- 1353Stefano Avallone, Ian F. Akyildiz. A channel assignment algorithm for multi-radio wireless mesh networks
1354 -- 1371Irfan Sheriff, Prashanth Aravinda Kumar Acharya, Elizabeth M. Belding. Measurement-driven admission control on wireless backhaul networks
1372 -- 1384Jun Wang, Peng Du, Weijia Jia, Liusheng Huang, Huan Li. Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links
1385 -- 1399Uyen Trang Nguyen. On multicast routing in wireless mesh networks
1400 -- 1412Georgios Rodolakis, Anis Laouiti, Philippe Jacquet, Amina Meraihi Naimi. Multicast overlay spanning trees in ad hoc networks: Capacity bounds, protocol design and performance evaluation
1413 -- 1435Jangeun Jun, Mihail L. Sichitiu. MRP: Wireless mesh networks routing protocol
1436 -- 1446Xin Wang, J. J. Garcia-Luna-Aceves. Distributed joint channel assignment, routing and scheduling for wireless mesh networks
1447 -- 1459Jun Xiao, Naixue Xiong, Laurence Tianruo Yang, Yanxiang He. A joint selfish routing and channel assignment game in wireless mesh networks
1460 -- 1469Devu Manikantan Shila, Tricha Anjali. Load aware traffic engineering for mesh networks

Volume 31, Issue 6

1053 -- 1054Miguel A. Labrador, Katina Michael, Axel Küpper. Advanced location-based services
1055 -- 1066Álvaro Marco, Roberto Casas, Jorge L. Falcó, Héctor J. Gracia, José Ignacio Artigas, A. Roy. Location-based services for elderly and disabled people
1067 -- 1077Abhishek Patil, Jonathan Munson, David Wood, Alan Cole. Bluebot: Asset tracking via robotic location crawling
1078 -- 1090Paolo Bellavista, Antonio Corradi, Carlo Giannelli. The PoSIM middleware for translucent and context-aware integrated management of heterogeneous positioning systems
1091 -- 1103Sean J. Barbeau, Miguel A. Labrador, Philip L. Winters, Rafael Pérez, Nevine Labib Georggi. Location API 2.0 for J2ME - A new standard in location for Java-enabled mobile phones
1104 -- 1113Martin Dawson. The Internet location services model
1114 -- 1125Hasari Celebi, Hüseyin Arslan. Enabling location and environment awareness in cognitive radios
1126 -- 1137C. Laoudias, Christos G. Panayiotou, C. Desiniotis, John G. Markoulidakis, J. Pajunen, S. Nousiainen. Part one: The Statistical Terminal Assisted Mobile Positioning methodology and architecture
1138 -- 1147John G. Markoulidakis, C. Dessiniotis, D. Nikolaidis. Part two: Kalman filtering options for error minimization in statistical terminal assisted mobile positioning
1148 -- 1159Marian Mohr, Christopher Edwards, Ben McCarthy. A study of LBS accuracy in the UK and a novel approach to inferring the positioning technology employed
1160 -- 1172Sangeeta Bhattacharya, Chien-Liang Fok, Chenyang Lu, Gruia-Catalin Roman. MLDS: A flexible location directory service for tiered sensor networks
1173 -- 1180Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Jan Martin Surminen. Location constraints in digital rights management
1181 -- 1191Agusti Solanas, Antoni Martínez-Ballesté. A TTP-free protocol for location privacy in location-based services
1192 -- 1199M. G. Michael, Sarah Jean Fusco, Katina Michael. A research note on ethics in the emerging age of überveillance
1200 -- 1217Olabisi Emmanuel Falowo, H. Anthony Chan. Joint call admission control algorithms: Requirements, approaches, and design considerations
1218 -- 1226Enrique Hernández-Orallo, Joan Vila i Carbó. Fast and efficient routing algorithms for delay-bounded and dependable channels
1227 -- 1238Mari Carmen Domingo, Rui Prior. Energy analysis of routing protocols for underwater wireless sensor networks
1239 -- 1253Mohammad Malli, Chadi Barakat, Walid Dabbous. CHESS: An application-aware space for enhanced scalable services in overlay networks

Volume 31, Issue 5

871 -- 872Luciano Bononi, Albert Y. Zomaya. Special issue on Mobility Management and Wireless Access
873 -- 884Sangheon Pack, Byoungwook Lee, Taekyoung Kwon, Yanghee Choi. A pointer forwarding scheme with mobility-aware binding update in Mobile IPv6 networks
885 -- 895Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska. Performance analysis of multi-radio AODV in hybrid wireless mesh networks
896 -- 914Ioannis Chatzigiannakis, Athanasios Kinalis, Sotiris E. Nikoletseas. Efficient data propagation strategies in wireless sensor networks using a single mobile sink
915 -- 934Eduardo Cerqueira, Luis Veloso, Augusto Neto, Marilia Curado, Edmundo Monteiro, Paulo Mendes. Mobility management for multi-user sessions in next generation wireless systems
935 -- 949Alessandra Toninelli, Antonio Corradi, Rebecca Montanari. Semantic-based discovery to support mobile context-aware service access
950 -- 961Abd-Elhamid M. Taha, Hossam S. Hassanein, Hussein T. Mouftah. Vertical handoffs as a radio resource management tool
962 -- 979Mahesh Sooriyabandara, Tim Farnham, Costas Efthymiou, Matthias Wellens, Janne Riihijärvi, Petri Mähönen, Alain Gefflaut, José Antonio Galache, Diego Melpignano, Arthur van Rooijen. Unified Link Layer API: A generic and open API to manage wireless media access
980 -- 998Lukasz Budzisz, Ramon Ferrús, Anna Brunstrom, Karl-Johan Grinnemo, R. Fracchia, G. Galante, Ferran Casadevall. Towards transport-layer mobility: Evolution of SCTP multihoming
999 -- 1011Meng-Shiuan Pan, Yu-Chee Tseng. Quick convergecast in ZigBee beacon-enabled tree-based wireless sensor networks
1012 -- 1027Mohsin Iftikhar, Tejeshwar Singh, Björn Landfeldt, Mine Çaglar. Multiclass G/M/1 queueing system with self-similar input and non-preemptive priority
1028 -- 1039Richard Werner Nelem Pazzi, Azzedine Boukerche. Mobile data collector strategy for delay-sensitive applications over wireless sensor networks
1040 -- 1051Georg Treu, Axel Küpper, Thomas Wilder. Extending the LBS-framework TraX: Efficient proximity detection with dead reckoning

Volume 31, Issue 4

655 -- 658Sudip Misra, Subhas C. Misra, Isaac Woungang. Algorithmic and theoretical aspects of wireless ad hoc and sensor networks
659 -- 667Xuefei Cao, Weidong Kou, Lanjun Dang, Bin Zhao. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
668 -- 698Stefano Basagni, Chiara Petrioli, Roberto Petroccia. Efficiently reconfigurable backbones for wireless sensor networks
699 -- 707Sangho Yi, Hong Min, Yookun Cho, Jiman Hong. Molecule: An adaptive dynamic reconfiguration scheme for sensor operating systems
708 -- 721Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya. A game-theoretic intrusion detection model for mobile ad hoc networks
722 -- 733P. Venkata Krishna, N. Ch. S. N. Iyengar, Sudip Misra. An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid cellular and ad-hoc networks
734 -- 749Frederik Armknecht, Dirk Westhoff, Joao Girão, Alban Hessler. A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing
750 -- 759Chor Ping Low, Can Fang, Jim Mee Ng, Yew Hock Ang. Efficient Load-Balanced Clustering Algorithms for wireless sensor networks
760 -- 769Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra, Isaac Woungang. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
770 -- 781Jacques M. Bahi, Abdallah Makhoul, Ahmed Mostefaoui. Localization and coverage for high density sensor networks
782 -- 792Xianren Wu, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves. Modeling of topology evolutions and implication on proactive routing overhead in MANETs
793 -- 806Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bhargava. A role-based access in a hierarchical sensor network architecture to provide multilevel security
807 -- 817Alaa Eddien Abdallah, Thomas Fevens, Jaroslav Opatrny. High delivery rate position-based routing algorithms for 3D ad hoc networks
818 -- 826Somanath Tripathy, Sukumar Nandi. Defense against outside attacks in wireless sensor networks
827 -- 841Stéphane Maag, Cyril Grepet, Ana R. Cavalli. A formal validation methodology for MANET routing protocols based on nodes self similarity
842 -- 857Huirong Fu, Satoshi Kawamura, Ming Zhang, Liren Zhang. Replication attack on random key pre-distribution schemes for wireless sensor networks

Volume 31, Issue 3

419 -- 422Javed I. Khan, Adam Wierzbicki. Guest editors introduction: Disruptive networking with peer-to-peer systems
423 -- 436Alberto Mozo, Joaquín Salvachúa. Scalable tag search in social network applications
437 -- 451Daniel Cutting, Aaron J. Quigley, Björn Landfeldt. SPICE: Scalable P2P implicit group messaging
452 -- 463John Buford, Alan Brown, Mario Kolberg. Exploiting parallelism in the design of peer-to-peer overlays
464 -- 488Eng Keong Lua, Xiaoming Zhou, Jon Crowcroft, Piet Van Mieghem. Scalable multicasting with network-aware geometric overlay
489 -- 505Dario Pompili, Caterina M. Scoglio, Luca Lopez. Multicast algorithms in service overlay networks
506 -- 519Tai T. Do, Kien A. Hua, Mounir A. Tantaoui. Robust video-on-demand streaming in peer-to-peer environments
520 -- 536Yang Guo, Kyoungwon Suh, Jim Kurose, Donald F. Towsley. DirectStream: A directory-based peer-to-peer video streaming service
537 -- 550Sang-Seon Byun, Chuck Yoo. Minimum DVS gateway deployment in DVS-based overlay streaming
551 -- 562B. Akbari, Hamid R. Rabiee, Mohammed Ghanbari. An optimal discrete rate allocation for overlay video multicasting
563 -- 575Maya Haridasan, Robbert van Renesse. SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
576 -- 590Stefan Zöls, Zoran Despotovic, Wolfgang Kellerer. On hierarchical DHT systems - An analytical approach for optimal designs
591 -- 602Jiadi Yu, Minglu Li. CBT: A proximity-aware peer clustering system in large-scale BitTorrent-like peer-to-peer networks
603 -- 619Peter Kersch, Róbert Szabó, Lawrence Cheng, Kerry Jean, Alex Galis. Stochastic maintenance of overlays in structured P2P systems
620 -- 628Vincenza Carchiolo, Michele Malgeri, Giuseppe Mangioni, Vincenzo Nicosia. Emerging structures of P2P networks induced by social relationships
629 -- 642Javed I. Khan, Asrar U. Haque. Computing with data non-determinism: Wait time management for peer-to-peer systems
643 -- 654Thomas Zahn, Jochen H. Schiller. Designing structured peer-to-peer overlays as a platform for distributed network applications in mobile ad hoc networks

Volume 31, Issue 2

187 -- 189Javed I. Khan, Adam Wierzbicki. Guest editors introduction: Foundation of peer-to-peer computing
190 -- 200Chao Xie, Guihai Chen, Art Vandenberg, Yi Pan. Analysis of hybrid P2P overlay network topology
201 -- 211Kolja Eger, Ulrich Killat. Bandwidth trading in BitTorrent-like P2P networks for content distribution
212 -- 219Dongyu Qiu, Weiqian Sang. Global stability of Peer-to-Peer file sharing systems
220 -- 239Di Wu, Ye Tian, Kam-Wing Ng, Anwitaman Datta. Stochastic analysis of the interplay between object maintenance and churn
240 -- 256Murat Karakaya, Ibrahim Korpeoglu, Özgür Ulusoy. A connection management protocol for promoting cooperation in Peer-to-Peer networks
257 -- 265Albert Creus-Mir, Ramon Casadesus-Masanell, Andres Hervas-Drane. Bandwidth allocation in peer-to-peer file sharing networks
266 -- 279Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda. Secure content access and replication in pure P2P networks
280 -- 291Thorsten Schütt, Florian Schintke, Alexander Reinefeld. Range queries on structured overlay networks
292 -- 303Vladimir Vishnevsky, Alexander Safonov, Mikhail Yakimov, Eunsoo Shim, Alexander D. Gelman. Scalable blind search and broadcasting over Distributed Hash Tables
304 -- 317Shiping Chen, Zhan Zhang, Shigang Chen, Baile Shi. Efficient file search in non-DHT P2P networks
318 -- 331Cong Shi, Dingyi Han, Yuanjie Liu, Shicong Meng, Yong Yu. A dynamic routing protocol for keyword search in unstructured peer-to-peer networks
332 -- 345Farnoush Banaei Kashani, Cyrus Shahabi. Partial read from peer-to-peer databases
346 -- 357Duc A. Tran, T. Nguyen. Hierarchical multidimensional search in peer-to-peer networks
358 -- 374Alejandra González Beltrán, Peter Milligan, Paul Sage. Range queries over skip tree graphs
375 -- 386Wolfgang Müller 0002, P. Oscar Boykin, Vwani P. Roychowdhury, Nima Sarshar. Comparison of image similarity queries in P2P systems
387 -- 401James Walkerdine, Danny Hughes, Paul Rayson, John Simms, Kiel Mark Gilleade, John A. Mariani, Ian Sommerville. A framework for P2P application development
402 -- 412Kazuyuki Shudo, Yoshio Tanaka, Satoshi Sekiguchi. Overlay Weaver: An overlay construction toolkit

Volume 31, Issue 18

4232 -- 4233Jong Hyuk Park, Hsiao-Hwa Chen, Antonio Coronato, Gerd Kortuem. Secure multi-mode systems and their applications for pervasive computing
4234 -- 4241Marie-Luce Bourguet. Handling uncertainty in multimodal pervasive computing applications
4242 -- 4247Antonio Coronato, Giuseppe De Pietro. Middleware mechanisms for supporting multimodal interactions in smart environments
4248 -- 4254Soo-Young Kang, Deok-Gyu Lee, Im-Yeong Lee. A study on secure RFID mutual authentication scheme in pervasive computing environment
4255 -- 4258Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu. Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
4259 -- 4268Chi-Yuan Chen, Tin Yu Wu, Yueh-Min Huang, Han-Chieh Chao. An efficient end-to-end security mechanism for IP multimedia subsystem
4269 -- 4280Rabia Riaz, Ayesha Naureen, Attiya Akram, Ali Hammad Akbar, Ki-Hyung Kim, H. Farooq Ahmed. A unified security framework with three key management schemes for wireless sensor networks
4281 -- 4293Sheikh Iqbal Ahamed, Moushumi Sharmin. A trust-based secure service discovery (TSSD) model for pervasive computing
4294 -- 4303Bo Sun, Yang Xiao, Chung-Chih Li, Hsiao-Hwa Chen, T. Andrew Yang. Security co-existence of wireless sensor networks and RFID for pervasive computing
4304 -- 4311Chih-Hsiung Tseng, Sheng-Tzong Cheng. Location management scheme with WLAN positioning algorithm for integrated wireless networks
4312 -- 4323Valentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano. Self-optimization of secure web services
4324 -- 4332Guorui Li, Jingsha He, Yingfang Fu. Group-based intrusion detection system in wireless sensor networks
4333 -- 4342Markos P. Anastasopoulos, A. C. Voulkidis, Athanasios V. Vasilakos, Panayotis G. Cottis. A secure network management protocol for SmartGrid BPL networks: Design, implementation and experimental results
4343 -- 4351Azzedine Boukerche, Yonglin Ren. A trust-based security system for ubiquitous and pervasive computing environments
4352 -- 4359Bo-Chao Cheng, Huan Chen, Yi-Jean Li, Ryh-Yuh Tseng. A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks
4360 -- 4366Xuefeng Liang, Naixue Xiong, Laurence Tianruo Yang, Hui Zhang, Jong Hyuk Park. A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services
4367 -- 4375Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih Li. Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
4376 -- 4382Zhiyong Yu, Xingshe Zhou, Zhiwen Yu, Jong Hyuk Park, Jianhua Ma. iMuseum: A scalable context-aware intelligent museum system

Volume 31, Issue 17

3883 -- 3893Ling-Jyh Chen, Tony Sun, Bo-Chun Wang, M. Y. Sanadidi, Mario Gerla. PBProbe: A capacity estimation tool for high speed networks
3894 -- 3904Lynda Mokdad, Hind Castel-Taleb. Stochastic comparisons: A methodology for the performance evaluation of fixed and mobile networks
3905 -- 3921José Villalón, Pedro Cuenca, Luis Orozco-Barbosa, Antonio Garrido. B-EDCA: A QoS mechanism for multimedia communications over heterogeneous 802.11/802.11e WLANs
3922 -- 3928Iftekhar Ahmad, Joarder Kamruzzaman, Daryoush Habibi. Rerouting in advance for preempted IR calls in QoS-enabled networks
3929 -- 3932Yong Ho Kim, Dong-Hoon Lee. An authentication scheme for filtering injected bogus data in sensor networks
3933 -- 3940Tinus Strauss, Derrick G. Kourie, Martin S. Olivier. A comparison of simulated traffic conditioner performance
3941 -- 3953Suat Özdemir. Functional reputation based reliable data aggregation and transmission for wireless sensor networks
3954 -- 3963Mohamed Ashour, Tho Le-Ngoc. Priority queuing of long-range dependent traffic
3964 -- 3977Wesley Chee-Wah Tan, Sanjay K. Bose. Throughput and lifetime performance of cost-credit-based routing protocols for power constrained ad hoc networks
3978 -- 3983Polychronis Koutsakis. A new framework for multiple access and call admission control in wireless cellular networks
3984 -- 3994K. Vijayalakshmi, S. Radhakrishnan. Artificial immune based hybrid GA for QoS based multicast routing in large scale networks (AISMR)
3995 -- 4004Jun Wang, Huan Li, Weijia Jia, Liusheng Huang, Jingyuan Li. Interface assignment and bandwidth allocation for multi-channel wireless mesh networks
4005 -- 4017Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan. Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
4018 -- 4025Yang Li, Li Guo, Zhi-Hong Tian, Tianbo Lu. A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms
4026 -- 4034Yoram Revah, Michael Segal. Improved bounds for data-gathering time in sensor networks
4035 -- 4048Kiran Anna, Mostafa A. Bassiouni. A new framework for QoS provisioning in WLANS using p-persistent 802.11 MAC
4049 -- 4059Guillermo L. Taboada, Juan Touriño, Ramon Doallo. Java Fast Sockets: Enabling high-speed Java communications on high performance clusters
4060 -- 4071B. Sathish Babu, Pallapa Venkataram. Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS)
4072 -- 4080Xiaobo Zhou, Dennis Ippoliti, Liqiang Zhang. Fair bandwidth sharing and delay differentiation: Joint packet scheduling with buffer management
4081 -- 4088Tz-Heng Hsu, Jyun-Sian Wu. An application-specific duty cycle adjustment MAC protocol for energy conserving over wireless sensor networks
4089 -- 4097Bo Yang, Yanyan Shen, Gang Feng, Chengnian Long, Zhong-Ping Jiang, Xinping Guan. Distributed power control and random access for spectrum sharing with QoS constraint
4098 -- 4106Vidhyacharan Bhaskar, Kondo H. Adjallah. A hybrid open queuing network model approach for multi-threaded dataflow architecture
4107 -- 4116Won-Ju Yoon, Sang-Hwa Chung, Seong Joon Lee. Implementation and performance evaluation of an active RFID system for fast tag collection
4117 -- 4123Manzar Saeed, Mohammad Saleem Mian. Methods of finding multiplicative inverses in GF(2:::8:::)
4124 -- 4129Evgueni Doukhnitch, Muhammed Salamah, E. Ozen. An efficient approach for trilateration in 3D positioning
4130 -- 4135Khoa N. Le. Inter-carrier interference power of OFDM in a uniform scattering channel
4136 -- 4137Likic Robert, Bosnjak Darko, Maxwell Simon, Marinovic Darko, Francetic Igor, Cikes Nada. To VoIP or not to VoIP, is this really the question now?
4138 -- 4148Bin Wu, Ajay D. Kshemkalyani. Modeling message propagation in random graph networks
4149 -- 4161Ayaz Isazadeh, Mohsen Heydarian. Optimal multicast multichannel routing in computer networks
4162 -- 4166Anup K. Ghosh, Amitava Mukherjee, Debashis Saha. TCP throughput enhancement in wired-cum-wireless network
4167 -- 4175Patricia Della Mea Plentz, Carlos Montez, Rômulo Silva de Oliveira. Deadline missing predictor based on aperiodic server queue length for distributed systems
4176 -- 4191Thierry Villemur, Emir Hammami. Design and evaluation of a context-aware service deployment for collaborative sessions
4192 -- 4198Nikolaos Papandreou, Theodore Antonakopoulos. A low-complexity bandwidth allocation algorithm for frequency-selective multiuser OFDM systems
4199 -- 4205Fucai Zhou, Jun Zhang, Jian Xu. Research on anonymous signatures and group signatures
4206 -- 4211Zhiquan Bai, Dongfeng Yuan, Kyungsup Kwak. Performance evaluation of STBC based cooperative systems over slow Rayleigh fading channel
4212 -- 4219Jaehak Yu, Hansung Lee, Myung-Sup Kim, Daihee Park. Traffic flooding attack detection with SNMP MIB using SVM
4220 -- 4229Jeng-Feng Weng, Jyh-Cheng Chen, Kai-Wen Cheng. Comparative study of broadcast and multicast in 3GPP and 3GPP2 networks
4230 -- 0Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai. Erratum to Multiple-resource request scheduling for differentiated QoS at website gateway

Volume 31, Issue 16

3739 -- 3740Mohammad S. Obaidat. Guest editorial: Performance evaluation of communication networks
3741 -- 3751Rossano Giuseppe Garroppo, Stefano Giordano, Michele Pagano, Gregorio Procissi. On traffic prediction for resource allocation: A Chebyshev bound based allocation scheme
3752 -- 3759Noureddine Boudriga, Mohammad S. Obaidat, Faouzi Zarai. Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis
3760 -- 3770Jingxiang Luo, Carey L. Williamson. Performance implications of fluctuating server capacity
3771 -- 3777Phuong Nga Tran, Ulrich Killat. Resource efficient logical topology design for IP-over-WDM backbone networks
3778 -- 3788Per Hurtig, Anna Brunstrom. Enhancing SCTP loss recovery: An experimental evaluation of early retransmit
3789 -- 3798Go Hasegawa, Takeshi Tomioka, Kentarou Tada, Masayuki Murata. Simulation studies on router buffer sizing for short-lived and pacing TCP flows
3799 -- 3809Thomas A. Babbitt, Christopher Morrell, Boleslaw K. Szymanski, Joel W. Branch. Self-selecting reliable paths for wireless sensor network routing
3810 -- 3821Xianren Wu, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves, Hui Xu. A hybrid view of mobility in MANETs: Analytical models and simulation study
3822 -- 3830Laurence A. Hey. Reduced complexity algorithms for cognitive packet network routers
3831 -- 3842Pravin Pawar, Bert-Jan van Beijnum, Marten van Sinderen, Akshai Aggarwal, Pierre Maret, Frédéric De Clercq. Performance evaluation of the context-aware handover mechanism for the nomadic mobile services in remote patient monitoring
3843 -- 3854Floriano De Rango, Juan-Carlos Cano, Marco Fotino, Carlos Miguel Tavares Calafate, Pietro Manzoni, Salvatore Marano. OLSR vs DSR: A comparative analysis of proactive and reactive mechanisms from an energetic point of view in wireless ad hoc networks
3855 -- 3869Chandrasekar Ramachandran, Sudip Misra, Mohammad S. Obaidat. FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks
3870 -- 3875Hong-Bin Chen, Chi Kong Tse, Jiuchao Feng. Performance evaluation of source extraction in wireless sensor networks
3876 -- 3882Luca Caviglione, Cristiano Cervellera, Franco Davoli, Filippo Aldo Grassia. Optimization of an eMule-like modifier strategy

Volume 31, Issue 15

3553 -- 3563Hojin Ha, Changhoon Yim, Young Yong Kim. Cross-layer multiuser resource allocation for video communication over OFDM networks
3564 -- 3578Naouel Ben Ali, Abdelfattah Belghith, Joanna Moulierac, Miklós Molnár. QoS multicast aggregation under multiple additive constraints
3579 -- 3585Huifang Chen, Hiroshi Mineno, Tadanori Mizuno. Adaptive data aggregation scheme in clustered wireless sensor networks
3586 -- 3593Nadeem Jamali, Hongxing Geng. A mailbox ownership based mechanism for curbing spam
3594 -- 3603Nguyen Van Hanh, Soonghwan Ro, Jungkwan Ryu. Simplified fast handover in mobile IPv6 networks
3604 -- 3612Vicent Cholvi, Juan Segarra. Analysis and placement of storage capacity in large distributed video servers
3613 -- 3624Yu-Fen Kao, Jen-Hung Huang. Price-based resource allocation for wireless ad hoc networks with multi-rate capability and energy constraints
3625 -- 3637Paulo Sérgio Sausen, José Renato de Brito Sousa, Marco Aurélio Spohn, Angelo Perkusich, Antonio Marcus Nogueira de Lima. Dynamic Power Management with Scheduled Switching Modes
3638 -- 3642Xu Zhang, Qiang Gao, Jun Zhang, Gang Wang. Impact of transmit power on throughput performance in wireless ad hoc networks with variable rate control
3643 -- 3653Bo Zhou, Qi Shi, Madjid Merabti. Balancing intrusion detection resources in ubiquitous computing networks
3654 -- 3661Xuguang Shao, Liren Zhang, Ping Shum. Modeling and performance analysis of realizable optical queue with service differentiation capability
3662 -- 3671Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai. Protocols for purpose-restricted anonymous communications in IP-based wireless networks
3672 -- 3682Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Park. CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast
3683 -- 3690Ke Zhang, Cheng Peng Fu. An enhancement of TCP Veno with forward acknowledgement
3691 -- 3699Marco Benini, Sabrina Sicari. Risk assessment in practice: A real case study
3700 -- 3706Hichem Ayed Harhira, Samuel Pierre. Joint routing and admission control problem under statistical delay and jitter constraints in MPLS networks
3707 -- 3718Ramanarayana Kandikattu, Lillykutty Jacob. A Secure IPv6-based Urban Wireless Mesh Network (SUMNv6)
3719 -- 3724Jung Yeon Hwang, Kyu Young Choi, Dong-Hoon Lee. Security weakness in an authenticated group key agreement protocol in two rounds
3725 -- 3738Ching-Wen Chen, Chuan-Chi Weng, Chang-Jung Ku. Design of a low power and low latency MAC protocol with node grouping and transmission pipelining in wireless sensor networks

Volume 31, Issue 14

3059 -- 3063Xin-Xin Ma, Zhi-Guang Qin. Partition and multi-path transmission: An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network
3064 -- 3070M. A. Elshaikh, Mohamed Othman, Subramaniam Shamala, Jalil M. Desa. A new fair marker algorithm for DiffServ networks
3071 -- 3077Mehmet Hakan Karaata, Rachid Hadid. An optimal snap-stabilizing wave algorithm in arbitrary graphs
3078 -- 3089Vidhyacharan Bhaskar. A closed queuing network model with multiple servers for multi-threaded architecture
3090 -- 3097Mehammed Daoui, A. M zoughi, Mustapha Lalam, Malika Belkadi, Rachida Aoudjit. Mobility prediction based on an ant system
3098 -- 3102Wei Kuang Lai, Chen-Da Tsai, Chin-Shiuh Shieh. Dynamic appointment of ABR for the OSPF routing protocol
3103 -- 3112Min-Xiou Chen. Efficient integration OVSF code management strategies in UMTS
3113 -- 3123Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen. An efficient session key generation for NTDR networks based on bilinear paring
3124 -- 3136Kuei-Ping Shih, Sheng-Shih Wang, Hung-Chang Chen, Pao-Hwa Yang. CollECT: Collaborative event detection and tracking in wireless heterogeneous sensor networks
3137 -- 3144Luis A. Villaseñor-Gonzalez, Ana L. Gonzalez-Sanchez, Jaime Sanchez-Garcia, Raul Aquino-Santos. Macromobility support for mobile ad hoc networks using IPv6 and the OLSR routing protocol
3145 -- 3152Rung-Shiang Cheng, Hui-Tang Lin. A cross-layer design for TCP end-to-end performance improvement in multi-hop wireless networks
3153 -- 3162Desislava Dimitrova, Georgios Karagiannis, Pieter-Tjerk de Boer. Severe congestion handling approaches in NSIS RMD domains with bi-directional reservations
3163 -- 3168Jin-Han Jeon, Seung-chul Son, Ji-Seung Nam. Overlay multicast tree recovery scheme using a proactive approach
3169 -- 3177Kyung-Joon Park, Chong-Ho Choi. Optimization driven bandwidth provisioning in service overlay networks
3178 -- 3189John Felix Charles Joseph, Amitabha Das, Boon-Chong Seet, Bu-Sung Lee. Opening the Pandora s Box: Exploring the fundamental limitations of designing intrusion detection for MANET routing attacks
3190 -- 3203Adel Ali Ahmed, Norsheila Fisal. A real-time routing protocol with load distribution in wireless sensor networks
3204 -- 3208JungRyun Lee, DongHo Cho. An optimal power-saving class II for VoIP traffic and its performance evaluations in IEEE 802.16e
3209 -- 3222Lorenzo Bettini. Timed buffers: A technique for update propagation in nomadic environments
3223 -- 3235Pranay Chaudhuri, Thomas Edward. An algorithm for k-mutual exclusion in decentralized systems
3236 -- 3241Qinghai Yang, Kyung Sup Kwak. Multiuser channel estimation and prediction in two dimensions for MIMO-OFDM uplinks
3242 -- 3249Cao Yuan, Liansheng Tan, Lachlan L. H. Andrew, Wei Zhang, Moshe Zukerman. A Generalized FAST TCP scheme
3250 -- 3252Min-Shiang Hwang, Cheng-Chi Lee, Song-Kong Chong. An improved address ownership in mobile IPv6
3253 -- 3266Huiqing Wang, Kin Choong Yow. A QoS framework to support integrated services in multihop wireless networks with infrastructure support
3267 -- 3274Kshirasagar Naik, David S. L. Wei, Stephan Olariu. Utilizing the synchrony among base stations for better performance of channel assignment algorithms
3275 -- 3285Chung-Ming Huang, Ming-Sian Lin, Hon-Long Wong. The handoff control scheme for computing powerless devices and its applications in the digital home network
3286 -- 3291Kshirasagar Naik, David S. L. Wei, Yu T. Su, Norio Shiratori. A random graph-based model to analyze packet interference between frequency hopping systems with an application to Bluetooth
3292 -- 3298Jaehoon Jung, Seunghak Lee, Namgi Kim, Hyunsoo Yoon. Efficient service discovery mechanism for wireless sensor networks
3299 -- 3306Hiroshi Tsunoda, Kohei Ohta, Atsunori Yamamoto, Nirwan Ansari, Yuji Waizumi, Yoshiaki Nemoto. Detecting DRDoS attacks by a simple response packet confirmation mechanism
3307 -- 3314Pierluigi Salvo Rossi, Francesco Palmieri. On time diversity for packet channels
3315 -- 3327Christos Xenakis, Christoforos Ntantogian, Ioannis Stavrakakis. A network-assisted mobile VPN for securing users data in UMTS
3328 -- 3336Andrea Baiocchi, Alfredo Todini. Power-delay trade-off in a many-to-many wireless access
3337 -- 3343Chansophea Chuon, Sumanta Guha. Individual profile graphs for location management in PCS networks
3344 -- 3359James Aweya, Michel Ouellette, Delfin Y. Montuno, Kent Felske. Design of rate-based controllers for active queue management in TCP/IP networks
3360 -- 3371Mikhail Smirnov. On model-driven self-engineering of inter-domain traffic
3372 -- 3383Joon Yoo, Haiyun Luo, Chong-kwon Kim. Joint uplink/downlink opportunistic scheduling for Wi-Fi WLANs
3384 -- 3393Sajjad Zarifzadeh, Nasser Yazdani. Joint resource conserving and load distributing approaches for routing of survivable connections
3394 -- 3404Kostas Tsagkaris, Apostolos Katidiotis, Panagiotis Demestichas. Neural network-based learning schemes for cognitive radio systems
3405 -- 3409Taskin Koçak, Mohit Jagetia. A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
3410 -- 3419Jang-Ping Sheu, Shin-Chih Tu, Chi-Hung Hsu. Location-free topology control protocol in wireless ad hoc networks
3420 -- 3426Qixu Liu, Yuqing Zhang. TFTP vulnerability finding technique based on fuzzing
3427 -- 3437Jingnan Yao, Jiani Guo, Laxmi N. Bhuyan. Fair link striping with FIFO delivery on heterogeneous channels
3438 -- 3450Jaime Lloret, Carlos E. Palau, Fernando Boronat, Jesús Tomás. Improving networks using group-based topologies
3451 -- 3459Ataul Bari, Arunita Jaekel, Subir Bandyopadhyay. Clustering strategies for improving the lifetime of two-tiered sensor networks
3460 -- 3468Stergios D. Spanos, Apostolos Meliones, George Stassinopoulos. The internals of advanced interrupt handling techniques: Performance optimization of an embedded Linux network interface
3469 -- 3475Myeong-Hyeon Lee, Yoon-Hwa Choi. Fault detection of wireless sensor networks
3476 -- 3484Spiridon Bakiras, Feng Wang, Dimitris Papadias, Mounir Hamdi. Vertical dimensioning: A novel DRR implementation for efficient fair queueing
3485 -- 3491Yu Wang, Lemin Li, Du Xu. Pervasive QoS routing in next generation networks
3492 -- 3502Chu-Fu Wang, Jen-Wen Ding. The optimum sensor redeployment scheme using the most frangible clusters set
3503 -- 3509Marcos Postigo-Boix, José Luis Melús-Moreno. Utilization-based prices for elastic services
3510 -- 3520Yuxia Lin, Vincent W. S. Wong. An admission control algorithm for multi-hop 802.11e-based WLANs
3521 -- 3532Peerapon Siripongwutikorn, Bundit Thipakorn. Mobility-aware topology control in mobile ad hoc networks
3533 -- 3536Xingwei Wang, Lei Guo, Ting Yang, Wei Ji, Ying Li, Xin Liu, Yu Zhang. New routing algorithms in trustworthy Internet
3537 -- 3551Shuo Ding. A survey on integrating MANETs with the Internet: Challenges and designs

Volume 31, Issue 13

2935 -- 2936José Neuman de Souza, John Strassner. Self-organization and self-management in communications as applied to autonomic networks
2937 -- 2945Peng Jiang, John Bigham, Jiayi Wu. Self-organizing relay stations in relay based cellular networks
2946 -- 2950Yingji Zhong, Kyung Sup Kwak, Dongfeng Yuan. A novel cross layer game knowledge sharing algorithm based on neural fuzzy connection admission controller for cellular Ad Hoc networking
2951 -- 2958Kyungmin Park, Youngyong Kim. Analysis of AntNet routing scheme by using queueing model
2959 -- 2971Yuanyuan Zhang, Dawu Gu, Juanru Li. Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks
2972 -- 2980Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz, Farouk Kamoun. CASAN: Clustering algorithm for security in ad hoc networks
2981 -- 2995Steven Davy, Brendan Jennings, John Strassner. The policy continuum-Policy authoring and conflict analysis
2996 -- 3002Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara. Policy-based BGP-control architecture for inter-AS routing adjustment
3003 -- 3017Karim Guennoun, Khalil Drira, Nicolas Van Wambeke, Christophe Chassot, François Armando, Ernesto Exposito. A framework of models for QoS-oriented adaptive deployment of multi-layer communication services in group cooperative activities
3018 -- 3029Falko Dressler. A study of self-organization mechanisms in ad hoc and sensor networks
3030 -- 3039Evangelos Pournaras, Georgios Exarchakos, Nick Antonopoulos. Load-driven neighbourhood reconfiguration of Gnutella overlay
3040 -- 3048Dario Bottazzi, Rebecca Montanari, Giovanni Rossi. A self-organizing group management middleware for mobile ad-hoc networks
3049 -- 3058Jorge E. López de Vergara, Víctor A. Villagrá, Carlos Fadón, Juan M. González, José A. Lozano, Manuel Alvarez-Campana. An autonomic approach to offer services in OSGi-based home gateways

Volume 31, Issue 12

2765 -- 2766Han-Chieh Chao, Sherali Zeadally. Mobility protocols for ITS/VANET
2767 -- 2780Yao Hua Ho, Ai Hua Ho, Kien A. Hua. Routing protocols for inter-vehicular networks: A comparative study in high-mobility and large obstacles environments
2781 -- 2789Govardhanan Kousalya, P. Narayanasamy, Jong Hyuk Park, Tai-Hoon Kim. Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS
2790 -- 2802Paolo Cencioni, Roberto Di Pietro. A mechanism to enforce privacy in vehicle-to-infrastructure communication
2803 -- 2814Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
2815 -- 2826Chung-Ming Huang, Meng-Shu Chiang, Tz-Heng Hsu. PFC: A packet forwarding control scheme for vehicle handover over the ITS networks
2827 -- 2837Neng-Wen Wang, Yueh-Min Huang, Wei-Ming Chen. A novel secure communication scheme in vehicular ad hoc networks
2838 -- 2849Azzedine Boukerche, Horacio A. B. F. de Oliveira, Eduardo Freire Nakamura, Antonio Alfredo Ferreira Loureiro. Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems
2850 -- 2861José Santa, Antonio F. Gómez-Skarmeta, Marc Sánchez Artigas. Architecture and evaluation of a unified V2V and V2I communication system based on cellular networks
2862 -- 2869Lalit Kane, Bhupendra Verma, Sanjeev Jain. Vehicle tracking in public transport domain and associated spatio-temporal query processing
2870 -- 2882Liang Zhou, Baoyu Zheng, Benoit Geller, Anne Wei, Shan Xu, Yajun Li. Cross-layer rate control, medium access control and routing design in cooperative VANET
2883 -- 2897Gongjun Yan, Stephan Olariu, Michele C. Weigle. Providing VANET security through active position detection
2898 -- 2906Ehsan Karamad, Farid Ashtiani. A modified 802.11-based MAC scheme to assure fair access for vehicle-to-roadside communications
2907 -- 2924Jérôme Härri, Christian Bonnet, Fethi Filali. Kinetic mobility management applied to vehicular ad hoc network protocols
2925 -- 2933Wei-Hsun Lee, Shian-Shyong Tseng, Ching-Hung Wang. Design and implementation of electronic toll collection system based on vehicle positioning system techniques

Volume 31, Issue 11

2643 -- 2645Sherali Zeadally, Bin Wei, Björn Landfeldt. End-to-end support over Heterogeneous Wired-Wireless Networks
2646 -- 2655Mari Carmen Domingo, David Remondo. QoS support between ad hoc networks and fixed IP networks
2656 -- 2668Chih-Heng Ke, Naveen K. Chilamkurti. A new framework for MPEG video delivery over heterogeneous networks
2669 -- 2675Myungjin Lee, Moonsoo Kang, Myungchul Kim, Jeonghoon Mo. A cross-layer approach for TCP optimization over wireless and mobile networks
2676 -- 2684Árpád Huszák, Sándor Imre. Source controlled semi-reliable multimedia streaming using selective retransmission in DCCP/IP networks
2685 -- 2698Preetam Ghosh, Kalyan Basu, Sajal K. Das. Improving end-to-end quality-of-service in online multi-player wireless gaming networks
2699 -- 2705Nicolas Van Wambeke, François Armando, Christophe Chassot, Ernesto Exposito. A model-based approach for self-adaptive Transport protocols
2706 -- 2715Abdelhamid Mellouk, Said Hoceini, Mustapha Cheurfa. Reinforcing probabilistic selective Quality of Service routes in dynamic irregular networks
2716 -- 2725Azzedine Boukerche, Richard Werner Nelem Pazzi, Jing Feng. An end-to-end virtual environment streaming technique for thin mobile devices over heterogeneous networks
2726 -- 2738Hung-Yun Hsieh, Chung-Wei Li, Shuo-Wei Liao, Yu-Wen Chen, Tsung-Lin Tsai, Hsiao-Pu Lin. Moving toward end-to-end support for handoffs across heterogeneous telephony systems on dual-mode mobile devices
2739 -- 2754Luis Loyola, Paulo Mendes, Monica Jimenez Abelleira. Organizational virtual zones: Control of Internet edges using multi-level flat identifiers
2755 -- 2763Hyung-Soo Park, Hyung-Woo Lee, Dong-Hoon Lee, Hong-Ki Ko. Multi-protocol authentication for SIP/SS7 mobile network

Volume 31, Issue 10

1857 -- 1864Désiré Oulaï Khyda, Steven Chamberland, Samuel Pierre. Routing and admission control with multiconstrained end-to-end quality of service in MPLS networks
1865 -- 1876Chin-Chi Wu, Hsien-Ming Wu, Woei Lin. High-performance packet scheduling to provide relative delay differentiation in future high-speed networks
1877 -- 1889Shikha Srivastava, Subrat Kar. Analysis of UMTS radio channel access delay
1890 -- 1900Mohamed Tekala, Robert Szabo. Dynamic adjustment of Scalable TCP congestion control parameters
1901 -- 1910Young-Long Chen, Yung-Sheng Lin, Jyu-Wei Wang, Jyh-Horng Wen. Adaptive fuzzy-based rate management and power control in multimedia CDMA cellular systems
1911 -- 1918Jianxin Wang, Liang Rong, Yunhao Liu. Design of a stabilizing AQM controller for large-delay networks based on internal model control
1919 -- 1933Jun Yu, Ling Chen, Gencai Chen. Fuzzy priority based overlay multicast
1934 -- 1944Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad Debbabi, Prabir Bhattacharya. Game theoretic models for detecting network intrusions
1945 -- 1951Marko Hölbl, Tatjana Welzer, Bostjan Brumen. Improvement of the Peyravian-Jeffries s user authentication protocol and password change protocol
1952 -- 1960Jia Xu, Zhi Li, Qian-Mu Li, Feng-Yu Liu. An adaptive clustering routing transition protocol in ad hoc networks
1961 -- 1969Zuhua Shao. Fair exchange protocol of signatures based on aggregate signatures
1970 -- 1978Satish Chand, Bijendra Kumar, Hari Om. Patching-based broadcasting scheme for video services
1979 -- 1992Konstantinos Kalpakis, Shilang Tang. Collaborative data gathering in wireless sensor networks using measurement co-occurrence
1993 -- 2004Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai. Multiple-resource request scheduling for differentiated QoS at website gateway
2005 -- 2015Wujuan Lin, Bharadwaj Veeravalli. Design and analysis of an adaptive object replication algorithm in distributed network systems
2016 -- 2029Christian Makaya, Samuel Pierre. Enhanced fast handoff scheme for heterogeneous wireless networks
2030 -- 2038Jung-Chun Liu, Hann-Jang Ho, Sing-Ling Lee. Optimization of logical rings for multi-hop transmissions in WDM optical star networks
2039 -- 2048Chieh-Ling Huang, Pau-Choo Chung, Ming-Hua Tsai, Yen-Kuang Yang, Yu-Chia Hsu. Reliability improvement for an RFID-based psychiatric patient localization system
2049 -- 2062Kimaya Mittal, Elizabeth M. Belding, Subhash Suri. A game-theoretic analysis of wireless access point selection by mobile users
2063 -- 2070Mingon Kim, JungYul Choi, Minho Kang. Trade-off guidelines for power management mechanism in the IEEE 802.16e MAC
2071 -- 2077Xiaonan Wang. Analysis and design of a k-Anycast communication model in IPv6
2078 -- 2085Jenq-Shiou Leu. A lightweight brokering system for content/service charging in a cellular network centric business model
2086 -- 2093Mohammad Fraiwan, G. Manimaran. Link stress reduction in topology-aware overlay path monitoring
2094 -- 2108Christian Makaya, Samuel Pierre. Adaptive handoff scheme for heterogeneous IP wireless networks
2109 -- 2123Joseph S. Kong, Jesse S. A. Bridgewater, Vwani P. Roychowdhury. Resilience of structured P2P systems under churn: The reachable component method
2124 -- 2130Jyh-Horng Wen, Gwo-Ruey Lee, Jia-Wei Liu, Te-Lung Kung. Frame synchronization, channel estimation scheme and signal compensation using regression method in OFDM systems
2131 -- 2141Wen-Hwa Liao, Wan-Chi Wu. Effective hotspot storage management schemes in wireless sensor networks
2142 -- 2149Fengjiao Wang, Yuqing Zhang. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
2150 -- 2161Qian Wu, Mingwei Gong, Carey L. Williamson. TCP fairness issues in IEEE 802.11 wireless LANs
2162 -- 2177Dong-Hee Kwon, Woo-Jae Kim, Young-Joo Suh. An efficient mobile multicast mechanism for fast handovers: A study from design and implementation in experimental networks
2178 -- 2184Omer Mahmoud, Farhat Anwar, Momoh-Jimoh E. Salami. Simulation and analysis of an admission control mechanism for MPLS DS-TE
2185 -- 2194Evgueni Doukhnitch, Muhammed Salamah. General approach to simple algorithms for 2-D positioning techniques in cellular networks
2195 -- 2204Gang Zhao, Xiangqian Liu, Min-Te Sun, Xiaoli Ma. Energy-efficient geographic routing with virtual anchors based on projection distance
2210 -- 2230Osama S. Youness, Wail S. El-Kilani, Waiel F. Abd El-Wahed. A behavior and delay equivalent petri net model for performance evaluation of communication protocols
2231 -- 2241Chenn-Jung Huang, Yi-Ta Chuang, Chih-Tai Guan, Yun-Cheng Luo, Kai-Wen Hu, Chun-Hua Chen. A hybrid priority-based video-on-demand resource sharing scheme
2242 -- 2256Hala ElAarag, Andrew Moedinger, Chris Hogg. TCP friendly protocols for media streams over heterogeneous wired-wireless networks
2257 -- 2269Lei Shi, Changbin Liu, Bin Liu. Network utility maximization for triple-play services
2270 -- 2279Hsiang-Fu Yu, Ying-Nan Chen, Hung-Chang Yang, Zeng-Yuan Yang, Li-Ming Tseng. An efficient scheme for broadcasting popular videos at low buffer demand
2280 -- 2292Ben-Jye Chang, Yan-Ling Chen. Adaptive hierarchical polling and Markov decision process based CAC for increasing network reward and reducing average delay in IEEE 802.16 WiMAX networks
2293 -- 2307Jukka Manner, Simone Leggio, Tommi Mikkonen, Jussi Saarinen, Pekka Vuorela, Antti Ylä-Jääski. Seamless service interworking of ad-hoc networks and the Internet
2308 -- 2318Gang Cheng, Nirwan Ansari, Symeon Papavassiliou. Adaptive QoS provisioning by pricing incentive QoS routing for next generation networks
2319 -- 2340Jingyu Wang, Jianxin Liao, Xiaomin Zhu. Latent Handover: A flow-oriented progressive handover mechanism
2341 -- 2349Yuan-Cheng Lai, Yu-Chin Szu. Achieving proportional loss rate differentiation in a wireless network with a multi-state link
2350 -- 2359Shiao Li Tsao, You-Lin Chen. Energy-efficient packet scheduling algorithms for real-time communications in a mobile WiMAX system
2360 -- 2366M. R. M. Rizk, Moawad I. Dessouky, Sami A. El-Dolil, Mohammed Abd-Elnaby. Near optimal fair delay based resource allocation for video traffic over wireless multimedia system
2367 -- 2380Joachim Fabini, Rudolf Pailer, Peter Reichl. Location-based assisted handover for the IP Multimedia Subsystem
2381 -- 2390Ben-Jye Chang, Chien-Ming Chou, Ying-Hsin Liang. Markov chain analysis of uplink subframe in polling-based WiMAX networks
2391 -- 2397Xuetao Wei, Lemin Li, Hongfang Yu. An improved lightpath allocation for grade of services in survivable WDM mesh networks
2398 -- 2407Yan Jin, Ju-Yeon Jo, Ling Wang, Yoohwan Kim, Xiaozong Yang. ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks
2408 -- 2413Alexandre Viejo, Francesc Sebé, Josep Domingo-Ferrer. Secure and scalable many-to-one symbol transmission for sensor networks
2414 -- 2419Jin Myoung Kim, Tae Ho Cho. A:::*:::-based key tree structure generation for group key management in wireless sensor networks
2420 -- 2427Yin-Fu Huang, Kun-Hao Lin. Global data allocation based on user behaviors in mobile computing environments
2428 -- 2434Show-Shiow Tzeng, Hsin-Yi Lu. Dual-threshold admission control for non-real-time traffic in wireless data networks
2435 -- 2442Xingwei Wang, Lei Guo, Xuetao Wei, Weigang Hou, Fei Yang, Lan Pang. Survivability in waveband switching optical networks: Challenges and new ideas
2443 -- 2456. Two layer Denial of Service prevention on SIP VoIP infrastructures
2457 -- 2467Andrei Gurtov, Dmitry Korzun, Andrey Lukyanenko, Pekka Nikander. Hi3: An efficient and secure networking architecture for mobile hosts
2468 -- 2477Jianxin Wang, Liang Rong, Yunhao Liu. A robust proportional controller for AQM based on optimized second-order system model
2478 -- 2484Jesús Téllez Isaac, José Sierra Camara, Sherali Zeadally, Joaquín Torres Márquez. A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks
2485 -- 2495Luca Caviglione, Franco Davoli. Traffic volume analysis of a nation-wide eMule community
2496 -- 2504Wen-Hwa Liao, Kuei-Ping Shih, Yu-Chee Lee. A localization protocol with adaptive power control in wireless sensor networks
2505 -- 2519Rana Forsati, A. T. Haghighat, Mehrdad Mahdavi. Harmony search based algorithms for bandwidth-delay-constrained least-cost multicast routing
2520 -- 2533Der-Rong Din, Yu-Sheng Chiu. A genetic algorithm for solving virtual topology reconfiguration problem in survivable WDM networks with reconfiguration constraint
2534 -- 2540Chun-Ta Li, Min-Shiang Hwang, Chi-Yu Liu. An electronic voting protocol with deniable authentication for mobile ad hoc networks
2541 -- 2561Satoshi Utsumi, Salahuddin Muhammad Salim Zabir, Norio Shiratori. TCP-Cherry: A new approach for TCP congestion control over satellite IP networks
2562 -- 2565M. Sabrigiriraj, M. Meenakshi. All-to-all broadcast in optical WDM networks under light-tree model
2566 -- 2580Keen-Mun Yong, Gee-Swee Poo, Tee Hiang Cheng. Proactive rearrangement in delay constrained dynamic membership multicast
2581 -- 2588Lianghui Ding, Xinbing Wang, Youyun Xu, Wenjun Zhang. Improve throughput of TCP-Vegas in multihop ad hoc networks
2589 -- 2595Yoshihiro Ito, Shuji Tasaka. Feasibility of QoS control based on QoS mapping over IP networks
2596 -- 2606S. Y. Wang, C. C. Lin, C. L. Chou. Implementing and evaluating three routing protocols in dual-radio-dual-mode IEEE 802.11(b) wireless mesh networks
2607 -- 2620Meriem Kassar, Brigitte Kervella, Guy Pujolle. An overview of vertical handover decision strategies in heterogeneous wireless networks
2621 -- 2630Sunhun Lee, Kwangsue Chung. Buffer-driven adaptive video streaming with TCP-friendliness
2632 -- 2641Yun-Sheng Yen, Yi-Kung Chan, Han-Chieh Chao, Jong Hyuk Park. A genetic algorithm for energy-efficient based multicast routing on MANETs

Volume 31, Issue 1

1 -- 4Polychronis Koutsakis. On modeling multiplexed VBR videoconference traffic from H.263 video coders
5 -- 18Ali Mohammad Zareh Bidoki, Nasser Yazdani, Sayed Vahid Azhari. A logarithmic scheduling algorithm for high speed input-queued switches
19 -- 34Gurusamy Mohan, E. Cheng Tien. QoS routing in GMPLS-capable integrated IP/WDM networks with router cost constraints
35 -- 48Yih-Fuh Wang. Non-blocking extended OVSF codes on multi-rate CDMA systems
49 -- 57Salman AlQahtani, Ashraf S. Hasan Mahmoud. Performance analysis of two throughput-based call admission control schemes for 3G WCDMA wireless networks supporting multiservices
58 -- 72Wei Wang, Xiaohong Guan, Xiangliang Zhang. Processing of massive audit data streams for real-time anomaly intrusion detection
73 -- 87Vitalio Alfonso Reguera, Félix F. Álvarez Paliza, Walter Godoy Jr., Evelio M. García Fernández. On the impact of active queue management on VoIP quality of service
88 -- 94Bazil Taha Ahmed, Miguel Calvo-Ramón. WCDMA downlink capacity of cigar-shaped microcells using soft hand-over with SIR-based power control for over-ground train service
95 -- 102Thamer Al-Meshhadany, Wessam Ajib. The impact of code allocation on the multiple access interference in WCDMA systems
103 -- 111Salman AlQahtani. Adaptive rate scheduling for 3G networks with shared resources using the generalized processor sharing performance model
112 -- 118Xingwei Wang, Lei Guo, Cunqian Yu. RLDP: A novel risk-level disjoint protection routing algorithm with shared backup resources for survivable backbone optical transport networks
119 -- 128Vidhyacharan Bhaskar, Kondo H. Adjallah. A hybrid closed queuing network approach to model dataflow in networked distributed processors
129 -- 152Stylianos Georgoulas, Panos Trimintzios, George Pavlou, Kin-Hon Ho. An integrated bandwidth allocation and admission control framework for the support of heterogeneous real-time traffic in class-based IP networks
153 -- 159Namhoon Kim, Jongman Heo, Hyung Seok Kim, Wook Hyun Kwon. Reconfiguration of clusterheads for load balancing in wireless sensor networks
160 -- 173Sajjad Zarifzadeh, Amir Nayyeri, Nasser Yazdani. Efficient construction of network topology to conserve energy in wireless ad hoc networks
174 -- 184Won-Hyoung Park, Sunghyun Cho, Saewoong Bahk. Scheduler design for multiple traffic classes in OFDMA networks
185 -- 186Saralees Nadarajah. Comment on Modeling and analysis of mobility management state of packet-switched (PS) services in GPRS