Journal: Computer Communications

Volume 32, Issue 7-10

1131 -- 1137Ahmed Mohamed Abdelsalam Ahmed, Ian Marsland. Downlink co-channel interference cancellation in multihop relay networks
1138 -- 1147Hangxing Wu, Fengyuan Ren, Dejun Mu, Xianwu Gong. An efficient and fair explicit congestion control protocol for high bandwidth-delay product networks
1148 -- 1153Hejiao Huang, Xiaolu Cao, Xiaohua Jia, Xiaolong Wang. Channel assignment using block design in wireless mesh networks
1154 -- 1171Tuan D. Le, Wen Hu, Peter I. Corke, Sanjay Jha. ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks
1172 -- 1184Kostas Christodoulopoulos, Vasileios Sourlas, I. Mpakolas, Emmanouel A. Varvarigos. A comparison of centralized and distributed meta-scheduling architectures for computation and communication tasks in Grid networks
1185 -- 1193Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro, Juan E. Tapiador. Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
1194 -- 1199Alex X. Liu, LeRoy A. Bailey. PAP: A privacy and authentication protocol for passive RFID tags
1200 -- 1206Hamed Nassar, Hassan Al-Mahdi. Design and analysis of a TDMA call assignment scheme for cellular networks
1207 -- 1218Amit Sahoo, Krishna Kant, Prasant Mohapatra. BGP convergence delay after multiple simultaneous router failures: Characterization and solutions
1219 -- 1227Victor Morales-Rocha, Miguel Soriano, Jordi Puiggali. New voter verification scheme using pre-encrypted ballots
1228 -- 1232Sergey N. Moiseev, Mikhail S. Kondakov. Fast system load estimation in the IEEE 802.16 OFDMA network
1233 -- 1244Kemal Akkaya, Andrew Newell. Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks
1245 -- 1254Yih-Shyh Chiou, Chin-Liang Wang, Sheng-Cheng Yeh, Ming-Yang Su. Design of an adaptive positioning system based on WiFi radio signals

Volume 32, Issue 6

1015 -- 1017Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, Jian-Xin Li. Cryptanalysis of a mutual authentication scheme based on nonce and smart cards
1018 -- 1021Sang-Kyun Kim, Min Gyo Chung. More secure remote user authentication scheme
1022 -- 1033Frans J. M. Panken, Geert Jan Hoekstra. Multi-service traffic profiles to realise and maintain QoS guarantees in wireless LANs
1034 -- 1038Erl-Huei Lu, Yi-Nan Lin, Wei-Wen Hung. Improvement of turbo decoding using cross-entropy
1039 -- 1049Yung-Chung Wang, Chwan-Lu Tseng, Ren-Guey Chu, Shu-Ming Tseng. Completed analysis of cellular networks with PH-renewal arrival call
1050 -- 1057Haitao Zhao, Emiliano Garcia-Palacios, Jibo Wei, Yong Xi. Accurate available bandwidth estimation in IEEE 802.11-based ad hoc networks
1058 -- 1061Tingting Chen, Sheng Zhong. Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks
1062 -- 1071Kyungbaek Kim. Dynamic nodeID based heterogeneity aware p2p system
1072 -- 1078Irfan Ahmed, Mugen Peng, Wenbo Wang, Syed Ismail Shah. Joint rate and cooperative MIMO scheme optimization for uniform energy distribution in Wireless Sensor Networks
1079 -- 1085Lei Zhang, Futai Zhang. A new certificateless aggregate signature scheme
1086 -- 1094Huanlai Xing, Yuefeng Ji, Lin Bai, Xin Liu, Zhijian Qu, Xiaoling Wang. An adaptive-evolution-based quantum-inspired evolutionary algorithm for QoS multicasting in IP/DWDM networks
1095 -- 1103Xinchang Zhang, Xiaodong Li, Wanming Luo, Baoping Yan. An application layer multicast approach based on topology-aware clustering
1104 -- 1110Rachid Beghdad. Efficient deterministic method for detecting new U2R attacks
1111 -- 1117Chao Zhang, Weidong Wang, Guo Wei. Design of ARQ protocols for two-user cooperative diversity systems in wireless networks
1118 -- 1128Raúl Peña-Ortiz, Julio Sahuquillo, Ana Pont, José A. Gil. Dweb model: Representing Web 2.0 dynamism
1129 -- 0Lei Guo, Xuetao Wei, Xingwei Wang. Erratum to New routing algorithms in trustworthy Internet [Computer Communications 31 (2008) 3533-3536]

Volume 32, Issue 5

783 -- 786Jia-Lun Tsai. Convertible multi-authenticated encryption scheme with one-way hash function
787 -- 799Ali A. Kanso. Modified clock-controlled alternating step generators
800 -- 805Lei Ye, Zhijun Wang, Hao Che, Henry C. B. Chan, Constantino M. Lagoa. Utility function of TCP
806 -- 813Rashid A. Saeed, Hafizal Mohamad, Borhanuddin Mohd Ali. Dynamic hybrid automatic repeat request (DHARQ) for WiMAX - Mobile multihop relay using adaptive power control
814 -- 827Nikolaos D. Doulamis, Pantelis N. Karamolegkos, Anastasios D. Doulamis, Ioannis G. Nikolakopoulos. Exploiting semantic proximities for content search over p2p networks
828 -- 833Bazil Taha Ahmed, Miguel Calvo-Ramón. UMTS-HSDPA in High Altitude Platforms (HAPs) communications with finite transmitted power and unequal cell s load
834 -- 846Kevin F. Chen, Edwin Hsing-Mean Sha, Si-Qing Zheng. Fast and noniterative scheduling in input-queued switches: Supporting QoS
847 -- 857Byungseung Kim, Hyogon Kim, Saewoong Bahk. FDF: Frequency detection-based filtering of scanning worms
858 -- 866Rachid Hadid, Mehmet Hakan Karaata. An adaptive stabilizing algorithm for finding all disjoint paths in anonymous mesh networks
867 -- 879Jacob Engel, Taskin Koçak. Off-chip communication architectures for high throughput network processors
880 -- 887Yuhong Zhang, Ezzatollah Salari. A hybrid channel allocation algorithm with priority to handoff calls in mobile cellular networks
888 -- 895Ioannis Psaras, Vassilis Tsaoussidis. On the properties of an adaptive TCP Minimum RTO
896 -- 906Giuseppe Amato, Antonio Caruso, Stefano Chessa. Application-driven, energy-efficient communication in wireless sensor networks
907 -- 912Bazil Taha Ahmed, Miguel Calvo-Ramón. Uplink multiservice capacity and interference statistics of WCDMA macrocells with antenna diversity reception in a multipath fading environment
913 -- 926Li Tang, Jun Li, Yanda Li, Scott Shenker. An investigation of the Internet s IP-layer connectivity
927 -- 934Zhi-Ting Lin, Yugui Qu, Xiao-Fang Zhou, Baohua Zhao. Analysis and design of mobile Wireless Social Model
935 -- 942Shih-Wei Pan, Jung-Shyr Wu. Throughput analysis of IEEE 802.11e EDCA under heterogeneous traffic
943 -- 953Shenghai Liu, Suili Feng, Wu Ye, Hongcheng Zhuang. Slot allocation algorithms in centralized scheduling scheme for IEEE 802.16 based wireless mesh networks
954 -- 960Zhong Fan. Bandwidth allocation in UWB WPANs with ECMA-368 MAC
961 -- 973Dheeraj K. Klair, Kwan-Wu Chin, Raad Raad. On the energy consumption of Pure and Slotted Aloha based RFID anti-collision protocols
974 -- 984Xiaowen Zhang, Hao Zhu, Jinsong Zhang. RANC: Relay-aided network coding in multi-hop wireless networks
985 -- 991Marzieh Varposhti, Naser Movahhedinia. Supporting QoS in IEEE 802.11e wireless LANs over fading channel
992 -- 999Seokhee Lee, JongWon Kim. Transparency analysis and delay compensation scheme for haptic-based networked virtual environments
1000 -- 1005Xingwei Wang, Lei Guo, Cunqian Yu, Dong Wang, Weigang Hou, Ying Li, Chongshan Wang, Xin Liu. A new heuristic protection algorithm based on survivable integrated auxiliary graph in waveband switching optical networks
1006 -- 1013Sascha Rehbock, Ray Hunt. Trustworthy clients: Extending TNC to web-based environments

Volume 32, Issue 4

569 -- 582Ahmad Belhoul, Y. Ahmet Sekercioglu, Nallasamy Mani. Mobility-Aware RSVP: A framework for improving the performance of multimedia services over wireless IP-based mobile networks
586 -- 593Hua Wang, Zhao Shi, Anfeng Ge, Chaoying Yu. An optimized ant colony algorithm based on the gradual changing orientation factor for multi-constraint QoS routing
594 -- 601Satish M. Srinivasan, Azad H. Azadmanesh. Data aggregation in partially connected networks
602 -- 610Yaohui Lei, Alejandro Quintero, Samuel Pierre. Mobile services access and payment through reusable tickets
611 -- 618Chin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu. Enhanced authentication scheme with anonymity for roaming service in global mobility networks
619 -- 633Habib Rostami, Jafar Habibi, Emad Livani. Semantic partitioning of peer-to-peer search space
634 -- 639Md. Golam Kaosar, Tarek R. Sheltami. Voice transmission over ad hoc network adapting optimum approaches to maximize the performance
640 -- 648Paolo Giacomazzi. Closed-form analysis of end-to-end network delay with Markov-modulated Poisson and fluid traffic
649 -- 652Han-Cheng Hsiang, Wei Kuan Shih. Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
653 -- 661Achraf Gazdar, Abdelfattah Belghith. Interactive slotted stream tapping
662 -- 667Dilip Kumar, Trilok C. Aseri, R. B. Patel. EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks
668 -- 678Öznur Özkasap. End-to-end epidemic multicast loss recovery: Analysis of scalability and robustness
679 -- 684Satish Chand, Bijendra Kumar, Hari Om. Segmented patching broadcasting protocol for video data
685 -- 690Tomaz Dobravec, Borut Robic. Restricted shortest paths in 2-circulant graphs
691 -- 702Sameer Ladiwala, Ramaswamy Ramaswamy, Tilman Wolf. Transparent TCP acceleration
703 -- 711Won-Hyoung Park, Saewoong Bahk. Resource management policies for fixed relays in cellular networks
712 -- 729Jordi Cucurull-Juan, Ramon Martí, Guillermo Navarro-Arribas, Sergi Robles, B. Overeinder, Joan Borrell. Agent mobility architecture based on IEEE-FIPA standards
730 -- 735Bazil Taha Ahmed, Miguel Calvo-Ramón. Infostations for highway cigar-shaped cells
736 -- 739Jorge Munilla, Alberto Peinado. Security flaw of Hölbl et al. s protocol
740 -- 749Kenji Yoshigoe. Trends in highly scalable crossbar-based packet switch architecture
750 -- 765Minh Huynh, Prasant Mohapatra, Stuart Goose. Spanning tree elevation protocol: Enhancing metro Ethernet performance and QoS
766 -- 776Yu-Chang Chen. Next generation CATV networks with QoS guarantees
777 -- 781Xingwei Wang, Lei Guo, Xuekui Wang, Yu Zhang, Xiaobing Zheng, Weigang Hou, Hongming Li, Hongpeng Wang. A new algorithm based on auxiliary virtual topology for sub-path protection in WDM optical networks

Volume 32, Issue 3

453 -- 455Hsiao-Hwa Chen, Symeon Papavassiliou, Lingyang Song, Yan Zhang. Adaptive multicarrier communications and networks
456 -- 464Yun Rui, Honglin Hu, Huiyue Yi, Hsiao-Hwa Chen, Yueh-Min Huang. Frequency domain discrete fourier transform spread generalized multi-carrier system and its performance analysis
465 -- 476Eugene Golovins, Neco Ventura. Optimisation of the pilot-to-data power ratio in the wireless MIMO-OFDM system with low-complexity MMSE channel estimation
477 -- 481D. Mavares Terán, Rafael P. Torres. Space-time code selection for OFDM-MISO systems
482 -- 491Yung-Ping Tu, Wen-Hsien Fang, Hoang-Yang Lu. Efficient groupwise multiuser detection with iterative soft interference cancellation for multi-rate MC-CDMA
492 -- 500Jingtao Zhang, David W. Matolak. Multiple level orthogonal codes and their application in MC-CDMA systems
501 -- 510Wenhua Jiao, Linghe Cai, Meixia Tao. Competitive scheduling for OFDMA systems with guaranteed transmission rate
511 -- 521Najah A. Abu Ali, Pratik Dhrona, Hossam S. Hassanein. A performance study of uplink scheduling algorithms in point-to-multipoint WiMAX networks
522 -- 530Dimitra Zarbouti, Ioannis Stiakogiannakis, George V. Tsoulos, Georgia E. Athanasiadou, Dimitra I. Kaklamani. OFDMA techniques in multicellular networks with total frequency reuse
531 -- 539Tara Ali-Yahiya, André-Luc Beylot, Guy Pujolle. An adaptive cross-layer design for multiservice scheduling in OFDMA based mobile WiMAX systems
540 -- 545Li Zhang 0011, Wei Heng. Cross-layer adaptive modulation and coding design for space-time block coded MIMO-OFDM systems
546 -- 551Yingji Zhong, Kyung Sup Kwak, Dongfeng Yuan. Cross layer multicarrier MIMO cognitive cooperation scheme for wireless hybrid ad hoc networks
552 -- 559Jianfeng Guan, Hongbin Luo, Hongke Zhang, Han-Chieh Chao, Jong Hyuk Park. Design and implementation of light-weight mobile multicast for fast MIPv6
560 -- 567Naixue Xiong, Laurence Tianruo Yang, Yingshu Li. ODMCA: An adaptive data mining control algorithm in multicarrier networks

Volume 32, Issue 2

231 -- 234Jui Teng Wang. Combined switching and power control for diversity and multiplexing in MIMO systems with cochannel interference
235 -- 245Seungwoon Kim, Minwook Lee, Ikjun Yeom. Impact of bandwidth request schemes for Best-Effort traffic in IEEE 802.16 networks
246 -- 256Stylianos Dimitriou, Vassilis Tsaoussidis. Adaptive Head-to-Tail: Active Queue Management based on implicit congestion signals
257 -- 267Zhenyu Li, Zengyang Zhu, Gaogang Xie, Zhongcheng Li. Fast and proximity-aware multi-source overlay multicast under heterogeneous environment
268 -- 280S. Y. Wang, C. L. Chou, C. C. Lin. Increasing wide-area download throughputs on the roads by trunking multiple cellular channels over a vehicular ad hoc network
281 -- 293Yu-Chang Chen, Ja-Hsing Hsia, Yi-Ju Liao. Advanced seamless vertical handoff architecture for WiMAX and WiFi heterogeneous networks with QoS guarantees
294 -- 304Antonio Robles-Gómez, Aurelio Bermúdez, Rafael Casado, Åshild Grønstad Solheim, Thomas Sødring, Tor Skeie. A new distributed management mechanism for ASI based networks
305 -- 316Gabriel Ioan Ivascu, Samuel Pierre, Alejandro Quintero. QoS routing with traffic distribution in mobile ad hoc networks
317 -- 323Okan Yilmaz, Ing-Ray Chen. Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks
324 -- 331Seyed Mohammad Mahdi Alavi, Martin J. Hayes. Robust active queue management design: A loop-shaping approach
332 -- 342Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai, Che-Wen Wu. Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations
343 -- 348Taoyu Li, Yuncheng Zhu, Ke Xu, Maoke Chen. Performance model and evaluation on geographic-based routing
349 -- 356Yuhua Chen, Oladapo Oguntoyinbo. Power efficient packet classification using cascaded bloom filter and off-the-shelf ternary CAM for WDM networks
357 -- 367Akbar Ghaffar Pour Rahbar, Oliver W. W. Yang. LGRR: A new packet scheduling algorithm for differentiated services packet-switched networks
368 -- 375Mehdi Kadivar, M. E. Shiri, Mehdi Dehghan. Distributed topology control algorithm based on one- and two-hop neighbors information for ad hoc networks
376 -- 385Timotheos Kastrinogiannis, Symeon Papavassiliou. Game theoretic distributed uplink power control for CDMA networks with real-time services
386 -- 393Huanlai Xing, Xin Liu, Xing Jin, Lin Bai, Yuefeng Ji. A multi-granularity evolution based Quantum Genetic Algorithm for QoS multicast routing problem in WDM networks
394 -- 396Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong-Hoon Lee. Constructing PEKS schemes secure against keyword guessing attacks is possible?
397 -- 408Der-Rong Din, Chia-Yu Li. A genetic algorithm for solving virtual source placement problem on WDM networks
409 -- 418Bahri Atay Ozgovde, Cem Ersoy. WCOT: A utility based lifetime metric for wireless sensor networks
419 -- 430Safaa O. Al-Mamory, Hongli Zhang. Intrusion detection alarms reduction using root cause analysis and clustering
431 -- 438Wenyu Liu, Zhenhua Tang, Shuang Zhao. Transmission distortion estimation for real-time video delivery over hybrid channels with bit errors and packet erasures
439 -- 452Rodolfo Oliveira, Luis Bernardo, Paulo Pinto. The influence of broadcast traffic on IEEE 802.11 DCF networks

Volume 32, Issue 18

1903 -- 1904Abderrahim Benslimane, Chadi Assi, Ekram Hossain, Mehmet C. Vuran. Special issue of Computer Communications on Cognitive Radio and Dynamic Spectrum Sharing Systems
1905 -- 1913Show-Shiow Tzeng. Call admission control policies in cellular wireless networks with spectrum renting
1914 -- 1922Qinghai Xiao, Yunzhou Li, Ming Zhao 0001, Shidong Zhou, Jing Wang 0001. Opportunistic channel selection approach under collision probability constraint in cognitive radio systems
1923 -- 1930Lutfa Akter, Balasubramaniam Natarajan. QoS constrained resource allocation to secondary users in cognitive radio networks
1931 -- 1943Si Chen, Alexander M. Wyglinski. Efficient spectrum utilization via cross-layer optimization in distributed cognitive radio networks
1944 -- 1954Chao Zou, Chunxiao Chigan. On game theoretic DSA-driven MAC for cognitive radio networks
1955 -- 1964László Toka, Attila Vidács. General distributed economic framework for dynamic spectrum allocation
1965 -- 1974Chengshi Zhao, Mingrui Zou, Kyungsup Kwak. Mutual interference considered power allocation in OFDM-based cognitive networks: The single SU case
1975 -- 1982Yanbo Ma, Haixia Zhang, Dongfeng Yuan, Hsiao-Hwa Chen. Adaptive power allocation with quality-of-service guarantee in cognitive radio networks
1983 -- 1997Kaushik Roy Chowdhury, Marco Di Felice. Search: A routing protocol for mobile cognitive radio ad-hoc networks
1998 -- 2011Matthias Wellens, Janne Riihijärvi, Petri Mähönen. Spatial statistics and models of spectrum use

Volume 32, Issue 17

1781 -- 1789Aggelos Lazaris, Polychronis Koutsakis. Pricing-based call admission control for wireless MPEG-4 traffic
1790 -- 1801Jing Dong, Reza Curtmola, Cristina Nita-Rotaru. Secure network coding for wireless mesh networks: Threats, challenges, and directions
1802 -- 1809Jiong Jin, Wei-Hua Wang, Marimuthu Palaniswami. Utility max-min fair resource allocation for communication networks with multipath routing
1810 -- 1819Yuhan Moon, Violet R. Syrotiuk. A cooperative CDMA-based multi-channel MAC protocol for mobile ad hoc networks
1820 -- 1828Hongli Xu, Liusheng Huang, Wang Liu, Gang Wang, Yang Wang. Topology control for delay-constraint data collection in wireless sensor networks
1829 -- 1836Ting Yi Chang. An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
1837 -- 1851Xinhua Yang, Tracy Camp, Hailong Yang, Athina P. Petropulu. Extending network lifetime for ALLIANCES
1852 -- 1861Prithula Dhungel, Di Wu, Keith W. Ross. Measurement and mitigation of BitTorrent leecher attacks
1862 -- 1870Ming-Kuei Yeh, Jehn-Ruey Jiang, Shing-Tsaan Huang. Adaptive splitting and pre-signaling for RFID tag anti-collision
1871 -- 1880Guillaume Valadon, Clémence Magnien, Ryuji Wakikawa. Mobile IPv6 deployments: Graph-based analysis and practical guidelines
1881 -- 1892Niandong Liao, Shengfeng Tian, Tinghua Wang. Network forensics based on fuzzy logic and expert system
1893 -- 1901Zhijun Wang, Hao Che, Jiannong Cao, Jingshan Wang. A TCAM-based solution for integrated traffic anomaly detection and policy filtering

Volume 32, Issue 16

1685 -- 1686Vinny Cahill, Stephen Farrell, Jörg Ott. Special issue of computer communications on delay and disruption tolerant networking
1687 -- 1698Khaled A. Harras, Lara B. Deek, Caitlin Holman, Kevin C. Almeroth. DBS-IC: An adaptive Data Bundling System for Intermittent Connectivity
1699 -- 1709Mike P. Wittie, Khaled A. Harras, Kevin C. Almeroth, Elizabeth M. Belding. On the implications of routing metric staleness in delay tolerant networks
1710 -- 1723Hyewon Jun, Mostafa H. Ammar, Mark D. Corner, Ellen W. Zegura. Hierarchical power management in disruption tolerant networks using traffic-aware optimization
1724 -- 1730Michael J. Demmer, Kevin R. Fall. The design and implementation of a session layer for delay-tolerant networks
1731 -- 1741Qing Ye, Liang Cheng, Mooi Choo Chuah, Brian D. Davison. Performance comparison of different multicast routing strategies in disruption tolerant networks
1742 -- 1756Yong Xi, Mooi Choo Chuah. An encounter-based multicast scheme for disruption tolerant networks
1757 -- 1767Giorgos Papastergiou, Ioannis Psaras, Vassilis Tsaoussidis. Deep-Space Transport Protocol: A novel transport scheme for Space DTNs
1768 -- 1780Adel Javanmard, Farid Ashtiani. Analytical evaluation of average delay and maximum stable throughput along a typical two-way street for vehicular ad hoc networks in sparse situations

Volume 32, Issue 15

1577 -- 1587Preethi Natarajan, Nasif Ekiz, Paul D. Amer, Randall R. Stewart. Concurrent Multipath Transfer during path failure
1588 -- 1599Youngkyu Choi, Sunghyun Choi. Energy-aware WLAN scanning in integrated IEEE 802.16e/802.11 networks
1600 -- 1612John Fitzpatrick, Seán Murphy, Mohammed Atiquzzaman, John Murphy. Using cross-layer metrics to improve the performance of end-to-end handover mechanisms
1613 -- 1630Yuh-Shyan Chen, Chih-Shun Hsu, Po-Tsai Hsieh. An efficient bow-based on-demand QoS routing protocol for MIMO ad hoc networks
1631 -- 1641Zhen G. Gao, L. Wang. A passive tree-based backbone construction scheme for MANETs
1642 -- 1654Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Masato Tsuru, Yuji Oie. Locating congested segments over the Internet by clustering the delay performance of multiple paths
1655 -- 1665Konstantinos Kalpakis, Shilang Tang. A combinatorial algorithm for the maximum lifetime data gathering with aggregation problem in sensor networks
1666 -- 1676Yuyan Xue, Byrav Ramamurthy, Yong Wang. LTRES: A loss-tolerant reliable event sensing protocol for wireless sensor networks
1677 -- 1684Wissam Fawaz, Timothy Sawah, Chadi Abou-Rjeily. Priority-aware optical shared protection: An offline evaluation study

Volume 32, Issue 13-14

1427 -- 1436Bang Wang, Hock-Beng Lim, Di Ma. A survey of movement strategies for improving network coverage in wireless sensor networks
1437 -- 1444Kensaku Wakuda, Shoji Kasahara, Yutaka Takahashi, Yoshinobu Kure, Eisaburo Itakura. A packet scheduling algorithm for max-min fairness in multihop wireless LANs
1445 -- 1459Diego N. da Hora, Daniel F. Macedo, Leonardo B. Oliveira, Isabela G. Siqueira, Antonio Alfredo Ferreira Loureiro, José Marcos S. Nogueira, Guy Pujolle. Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks
1460 -- 1484Sándor Molnár, Balázs Sonkoly, Tuan Anh Trinh. A comprehensive TCP fairness analysis in high speed networks
1485 -- 1494Mathieu Bouet, Guy Pujolle. L-VIRT: Range-free 3-D localization of RFID tags based on topological constraints
1495 -- 1504Min-Xiou Chen, Yin-Din Wang. An efficient location tracking structure for wireless sensor networks
1505 -- 1514Juan J. Alcaraz, Gaspar Pedreño, Fernando Cerdán, Joan García-Haro, Felipe Garcia-Sanchez. Discrete-time control analysis of transport channel synchronization in 3G radio access networks
1515 -- 1524Jiangwen Wan, Ning Yu, Renjian Feng, Yinfeng Wu, Changming Su. Localization refinement for wireless sensor networks
1525 -- 1530Wu Chen, Shuang-Hua Yang. The mechanism of adapting RED parameters to TCP traffic
1531 -- 1540Hyunjue Kim, Jong-Moon Chung, Chang-Hyun Kim. Secured communication protocol for internetworking ZigBee cluster networks
1541 -- 1551Jordi Castellà-Roca, Alexandre Viejo, Jordi Herrera-Joancomartí. Preserving user s privacy in web search engines
1552 -- 1558Marc Ciurana, Francisco Barceló-Arroyo, Sebastiano Cugno. Tracking mobile targets indoors using WLAN and time of arrival
1559 -- 1567Daishi Kato, Kazuo Kunieda, Keiji Yamada. An emulator for peer-to-peer distributed hash tables
1568 -- 1575Abdellah Chehri, Paul Fortier, Pierre-Martin Tardif. Cross-layer link adaptation design for UWB-based sensor networks
1576 -- 0Marco Conti. Editor-in-chief Note of Concern

Volume 32, Issue 12

1353 -- 1354Ekram Hossain, Qian Zhang. Special Issue of Computer Communications on Heterogeneous Networking for Quality, Reliability, Security, and Robustness - Part-II
1355 -- 1370Enzo Mingozzi, Giovanni Stea, María Ángeles Callejo-Rodríguez, José Enríquez-Gabeiras, Gerardo García-de-Blas, F. J. Ramón-Salquero, Wojciech Burakowski, Andrzej Beben, Jaroslaw Sliwinski, Halina Tarasiuk, Olivier Dugeon, Michel Diaz, L. Baresse, Edmundo Monteiro. EuQoS: End-to-End Quality of Service over Heterogeneous Networks
1371 -- 1376Abdelhamid Mellouk, Said Hoceini, Sherali Zeadally. Design and performance analysis of an inductive QoS routing algorithm
1377 -- 1383Satoshi Utsumi, Salahuddin Muhammad Salim Zabir, Norio Shiratori. TCP-Cherry for satellite IP networks: Analytical model and performance evaluation
1384 -- 1399Anjali Sardana, Ramesh C. Joshi. An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks
1400 -- 1409Natalya Fedotova, Luca Veltri. Reputation management algorithms for DHT-based peer-to-peer environment
1410 -- 1417Jialing Xu, Victor O. K. Li. Request-driven swarming scheme for P2P data streaming
1418 -- 1425Sirui Yang, Hai Jin, Bo Li, Xiaofei Liao, Hong Yao, Qi Huang, Xuping Tu. Measuring web feature impacts in Peer-to-Peer file sharing systems

Volume 32, Issue 11

1255 -- 1256Ekram Hossain, Qian Zhang. Special issue of computer communications on heterogeneous networking for quality, reliability, security, and robustness - Part-I
1257 -- 1262Feng Wang, Jian Pu, Mounir Hamdi. QoS based scheduling in the downlink of multi-user wireless systems (extended)
1263 -- 1270Qiang Shen, Xuming Fang, Rongsheng Huang, Pan Li, Yuguang Fang. Improving throughput by tuning carrier sensing in 802.11 wireless networks
1271 -- 1280Joshua Wall, Jamil Y. Khan. Efficient multimedia transmission using adaptive packet bursting for wireless LANs
1281 -- 1297Jorge Navarro-Ortiz, Pablo Ameigeiras, Juan J. Ramos-Muñoz, Juan M. López-Soler. An 802.11e HCCA scheduler with an end-to-end quality aware territory method
1298 -- 1305Weiwei Wang, Zihua Guo, Jun Cai, Xuemin Shen, Changjia Chen. Multiple frequency reuse schemes in the two-hop IEEE 802.16j wireless relay networks with asymmetrical topology
1306 -- 1315Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat. User-input driven QoS management in ad hoc networks
1316 -- 1325Chao Song, Ming Liu, Jiannong Cao, Yuan Zheng, Hai-gang Gong, Guihai Chen. Maximizing network lifetime based on transmission range adjustment in wireless sensor networks
1326 -- 1335Vojislav B. Misic, Jelena V. Misic. Reducing sensing error in cognitive PANs through reduction of the channel set and split sensing
1336 -- 1345An an Luo, Chuang Lin, Kai Wang, Lei Lei, Chanfang Liu. Quality of protection analysis and performance modeling in IP multimedia subsystem
1346 -- 1352Chonggang Wang, Mahmoud Daneshmand, Kazem Sohraby. Optimization of tag reading performance in generation-2 RFID protocol

Volume 32, Issue 1

1 -- 13Yew Fai Wong, Lek Heng Ngoh, Winston Khoon Guan Seah, Wai-Choong Wong. Dual wakeup design for wireless sensor networks
14 -- 18Jianhong Zhang, Jian Mao. A novel identity-based multi-signcryption scheme
19 -- 24Xinbing Wang, Yun Han, Youyun Xu. APS-FeW: Improving TCP throughput over multihop adhoc networks
25 -- 33P. P. Deepthi, P. S. Sathidevi. New stream ciphers based on elliptic curve point multiplication
34 -- 40Yuanqing He, Tianyun Huang. Objective quality definition of scalable video coding and its application for optimal streaming of FGS-coded videos
41 -- 50Hasan Sözer, Metin Tekkalmaz, Ibrahim Korpeoglu. A peer-to-peer file search and download protocol for wireless ad-hoc networks
51 -- 61Seung Chul Han, Ye Xia. Network load-aware content distribution in overlay networks
62 -- 68Jie Feng, Zhipeng Ouyang, Lisong Xu, Byrav Ramamurthy. Packet reordering in high-speed networks and its impact on high-speed TCP variants
69 -- 77Kuei-Ping Shih, Wen-Hwa Liao, Hung-Chang Chen, Chien-Min Chou. On avoiding RTS collisions for IEEE 802.11-based wireless ad hoc networks
78 -- 85Fernando A. Kuipers, Freek Dijkstra. Path selection in multi-layer networks
86 -- 93Hamid Shokrzadeh, A. T. Haghighat, Abbas Nayebi. New routing framework base on rumor routing in wireless sensor networks
94 -- 104Ai Chen, Dongwook Lee, Gayathri Chandrasekaran, Prasun Sinha. High throughput MAC layer multicasting over time-varying channels
105 -- 110Li Zhang, Lian-bo Cai, Meng Li, Fa-hui Wang. A method for least-cost QoS multicast routing based on genetic simulated annealing algorithm
111 -- 123Zizhan Zheng, Prasun Sinha. Buffer Coding for Reliable Transmissions over Wireless Networks
124 -- 133Boqing Zhou, Sujun Li, Qiaoliang Li, Xingming Sun, Xiaoming Wang. An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge
134 -- 143Wan-Seon Lim, Dong Wook Kim, Young-Joo Suh, Jeong-Jae Won. Implementation and performance study of IEEE 802.21 in integrated IEEE 802.11/802.16e networks
144 -- 153Liang Dai, Yanchuan Cao, Yi Cui, Yuan Xue. On scalability of proximity-aware peer-to-peer streaming
154 -- 158Ángel M. Pérez-Bellido, Sancho Salcedo-Sanz, Emilio G. Ortíz-García, Antonio Portilla-Figueras, Maurizio Naldi. A dandelion-encoded evolutionary algorithm for the delay-constrained capacitated minimum spanning tree problem
159 -- 168Hisham A. Mahmoud, Hüseyin Arslan, Mehmet K. Özdemir. An efficient initial ranging algorithm for WiMAX (802.16e) OFDMA
169 -- 178Peng-Jung Wu, Chung-Nan Lee. Connection-oriented multi-channel MAC protocol for ad-hoc networks
179 -- 188Khaled Salah, A. Qahtan. Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme
189 -- 202Yan Zhang, Jim Mee Ng, Chor Ping Low. A distributed group mobility adaptive clustering algorithm for mobile ad hoc networks
203 -- 212Stelios Dritsas, Vicky Dritsou, Bill Tsoumas, P. Constantopoulos, Dimitris Gritzalis. OntoSPIT: SPIT management through ontologies
213 -- 229N. Bigdeli, M. Haeri. CDM-based design and performance evaluation of a robust AQM method for dynamic TCP/AQM networks