Journal: Computer Communications

Volume 34, Issue 9

1043 -- 1044Periklis Chatzimisios, Ibrahim Habib, Paolo Bellavista, Alexey V. Vinel. Guest editorial for the special issue on Next generation networks service management
1045 -- 1054Georgios Tsiropoulos, Dimitrios Stratogiannis, John D. Kanellopoulos, Panayotis G. Cottis. Probabilistic framework and performance evaluation for prioritized call admission control in next generation networks
1055 -- 1065Upendra Rathnayake, Mohsin Iftikhar, Maximilian Ott, Aruna Seneviratne. Realistic data transfer scheduling with uncertainty
1066 -- 1076Kandaraj Piamrat, Adlen Ksentini, Jean-Marie Bonnin, César Viho. Radio resource management in emerging heterogeneous wireless networks
1077 -- 1099Nikolaos Psimogiannos, Aggeliki Sgora, Dimitrios D. Vergados. An IMS-based network architecture for WiMAX-UMTS and WiMAX-WLAN interworking
1100 -- 1111Fabio Baroncelli, Barbara Martini, Valerio Martini, Piero Castoldi. Extending next generation network (NGN) architecture for connection-oriented transport
1112 -- 1124Wei-Kuo Chiang, Kai-Shun Chang. Design and implementation of a distributed service invocation function for the IP multimedia subsystem
1125 -- 1136Ming-Fong Tsai, Naveen K. Chilamkurti, Sherali Zeadally, Alexey V. Vinel. Concurrent multipath transmission combining forward error correction and path interleaving for video streaming
1137 -- 1144Yuan-sheng Luo, Yong Qi, Di Hou, Lin-feng Shen, Ying Chen, Xiao Zhong. A novel heuristic algorithm for QoS-aware end-to-end service composition

Volume 34, Issue 8

921 -- 0Prasant Mohapatra, Jörg Ott. Special section on wireless mobile and multimedia networks
922 -- 934Paola Cappanera, Luciano Lenzini, Alessandro Lori, Giovanni Stea, Gigliola Vaglini. Efficient link scheduling for online admission control of real-time traffic in wireless mesh networks
935 -- 947Marwan Krunz, David Manzi. Channel access and traffic control for dynamic-spectrum networks with single-transmit, dual-receive radios
948 -- 961Emilio Ancillotti, Raffaele Bruno, Marco Conti, Antonio Pinizzotto. Load-aware routing in mesh networks: Models, algorithms and experimentation
962 -- 972Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amorim, Farid Benbadis, Guillaume Chelius. Volume-aware positioning in the context of a marine port terminal
973 -- 984James Gross, Michael Reyer. Performance prediction for OFDMA systems with dynamic power and subcarrier allocation
985 -- 997Johann Márquez-Barja, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni. An overview of vertical handover techniques: Algorithms, protocols and tools
998 -- 1010Jaehun Lee, Wooyong Chung, Euntai Kim. A new range-free localization method using quadratic programming
1011 -- 1021Kerim Fouli, Lawrence R. Chen, Martin Maier. Time-, wavelength-, and code-domain optical reflection monitoring for next-generation access-metro networks
1022 -- 1032Farhad Faghani, Ghasem Mirjalily. Shortcut Switching Strategy in Metro Ethernet networks
1033 -- 1041Jae Hoon Ko, Soonmok Kwon, Cheeha Kim. Orthogonal signaling-based queue status investigation method in IEEE 802.11

Volume 34, Issue 7

803 -- 815Yong Ding, Li Xiao. Channel allocation in multi-channel wireless mesh networks
816 -- 834Theodoros Anagnostopoulos, Christos Anagnostopoulos, Stathes Hadjiefthymiades. An adaptive location prediction model based on fuzzy control
835 -- 846Mehdi Ghatee. QoS-based cooperative algorithm for integral multi-commodity flow problem
847 -- 861Rosario Giuseppe Garroppo, Stefano Giordano, Davide Iacono, Luca Tavanti. Experimental and simulation analysis of a WiMAX system in an emergency marine scenario
862 -- 874Ming Xu, Shuigeng Zhou, Jihong Guan. A new and effective hierarchical overlay structure for Peer-to-Peer networks
875 -- 882Yawen Chen, Hong Shen, Haibo Zhang. Routing and wavelength assignment for hypercube communications embedded on optical chordal ring networks of degrees 3 and 4
883 -- 897Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Shigeaki Harada, Haruhisa Hasegawa. Optimally designing caches to reduce P2P traffic
898 -- 920Ralph Kühne, George B. Huitema, Georg Carle. A simple distributed mechanism for accounting system self-configuration in next-generation charging and billing

Volume 34, Issue 6

681 -- 703Vinicius C. M. Borges, Marilia Curado, Edmundo Monteiro. Cross-layer routing metrics for mesh networks: Current status and research directions
704 -- 714Nils Aschenbruck, Aarti Munjal, Tracy Camp. Trace-based mobility modeling for multi-hop wireless networks
715 -- 729Gang Chen, Zujie Ren, Lidan Shou, Ke Chen 0005, Yijun Bei. PISA: A framework for integrating uncooperative peers into P2P-based federated search
730 -- 742Jiyong Park, Daedong Park, Seongsoo Hong, Jungkeun Park. Preventing TCP performance interference on asymmetric links using ACKs-first variable-size queuing
743 -- 757Natalija Vlajic, Dusan Stevanovic, George Spanogiannopoulos. Strategies for improving performance of IEEE 802.15.4/ZigBee WSNs with path-constrained mobile sink(s)
758 -- 764Chirag K. Rupani, Trilok C. Aseri. An improved transport layer protocol for wireless sensor networks
765 -- 779Siyu Tang, Eva Jaho, Ioannis Stavrakakis, Ioannis Z. Koukoutsidis, Piet Van Mieghem. Modeling gossip-based content dissemination and search in distributed networking
780 -- 792Yang-Ick Joo, Kyeong Hur. A distributed-request-based CDMA CAC for DiffServ multimedia services in wireless cellular mobile networks
793 -- 802Guiyi Wei, Yun Ling, Binfeng Guo, Bin Xiao, Athanasios V. Vasilakos. Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter

Volume 34, Issue 5

609 -- 618Adrien Friggeri, Guillaume Chelius, Eric Fleury, Antoine Fraboulet, F. Mentré, J. C. Lucet. Reconstructing social interactions using an unreliable wireless sensor network
619 -- 628Anne-Marie Kermarrec, Erwan Le Merrer, Bruno Sericola, Gilles Trédan. Second order centrality: Distributed assessment of nodes criticity in complex networks
629 -- 634Belkacem Serrour, Alex Arenas, Sergio Gómez. Detecting communities of triangles in complex networks using spectral optimization
635 -- 648Christophe Crespelle, Fabien Tarissan. Evaluation of a new method for measuring the internet degree distribution: Simulation results
649 -- 657Guoqiang Zhang, Bruno Quoitin, Shi Zhou. Phase changes in the evolution of the IPv4 and IPv6 AS-Level Internet topologies
658 -- 669M. Engin Tozal, Kamil Saraç. Palmtree: An IP alias resolution algorithm with linear probing complexity
670 -- 679Frédéric Ouédraogo, Clémence Magnien. Impact of sources and destinations on the observed properties of the internet topology

Volume 34, Issue 4

525 -- 0Yang Xiang, Wanlei Zhou. Special issue: Building secure parallel and distributed networks and systems
526 -- 535Xiaoxun Sun, Lili Sun, Hua Wang. Extended k-anonymity models against sensitive attribute disclosure
536 -- 547Yu Zhang, Binxing Fang, Yongzheng Zhang 0002. Parallelizing weighted frequency counting in high-speed network monitoring
548 -- 555Nikhil Saxena, Mieso K. Denko, Dilip Banerji. A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
556 -- 566Boyeon Song, Chris J. Mitchell. Scalable RFID security protocols supporting tag ownership transfer
567 -- 576Mihui Kim, Peng Ning. SeCA: A framework for Secure Channel Assignment in wireless mesh networks
577 -- 590Zi Chu, Haining Wang. An investigation of hotlinking and its countermeasures
591 -- 597Hongjuan Li, Kai Lin, Keqiu Li. Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks
598 -- 606Tilman Wolf, Russell Tessier, Gayatri Prabhu. Securing the data path of next-generation router systems

Volume 34, Issue 3

223 -- 225Jong Hyuk Park, Sheikh Iqbal Ahamed, Willy Susilo, Michela Taufer. Special issue of computer communications on information and future communication security
226 -- 235Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park. DoS attacks exploiting signaling in UMTS and IMS
236 -- 240Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao. An RFID secure authentication mechanism in WLAN
241 -- 249Yufeng Wang, Akihiro Nakao, Athanasios V. Vasilakos, Jianhua Ma. P2P soft security: On evolutionary dynamics of P2P incentive mechanism
250 -- 256Yu-Yi Chen, Meng-Lin Tsai, Jinn-ke Jan. The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
257 -- 263Ying Sun, Chunxiang Xu, Yong Yu, Bo Yang. Improvement of a proxy multi-signature scheme without random oracles
264 -- 273Qixu Liu, Yuqing Zhang. VRSS: A new system for rating and scoring vulnerabilities
274 -- 280Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei. Robust authentication and key agreement scheme preserving the privacy of secret key
281 -- 294Sudip Misra, Ankur Vaish. Reputation-based role assignment for role-based access control in wireless sensor networks
295 -- 304Jong Sik Moon, Im-Yeong Lee. An AAA scheme using ID-based ticket with anonymity in future mobile communication
305 -- 309Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar. Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme
310 -- 318Bo-Chao Cheng, Ryh-Yuh Tseng. A Context Adaptive Intrusion Detection System for MANET
319 -- 325Jing Xu, Wen Tao Zhu, Dengguo Feng. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
326 -- 336Binod Vaidya, Jong Hyuk Park, Sang-Soo Yeo, Joel J. P. C. Rodrigues. Robust one-time password authentication scheme using smart card for home network environment
337 -- 341Tzu-Chang Yeh, Chien-Hung Wu, Yuh-Min Tseng. Improvement of the RFID authentication scheme based on quadratic residues
342 -- 343The Anh Pham. The improvement of the knapsack cipher
344 -- 352Zhengping Jin, Qiaoyan Wen. Certificateless multi-proxy signature
353 -- 357Taek-Young Youn, Changhoon Lee, Young-Ho Park. An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
358 -- 366Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu. Anonymity analysis of P2P anonymous communication systems
367 -- 374Daojing He, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu. A strong user authentication scheme with smart cards for wireless communications
375 -- 383Jian Wang, Yanheng Liu, Yu Jiao. Novel access and remediation scheme in hierarchical trusted network
384 -- 390Dang Nguyen Duc, Kwangjo Kim. Defending RFID authentication protocols against DoS attacks
391 -- 397Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
398 -- 406Mieso K. Denko, Tao Sun, Isaac Woungang. Trust management in ubiquitous computing: A Bayesian approach
407 -- 422Dwaine E. Clarke. Design and implementation of a public key-based group collaboration system
423 -- 428Longjiang Li, Yuming Mao, Supeng Leng. Privacy addressing and autoconfiguration for mobile ad hoc networks
429 -- 435Liang Zhou, Athanasios V. Vasilakos, Naixue Xiong, Yan Zhang, Shiguo Lian. Scheduling security-critical multimedia applications in heterogeneous networks
436 -- 446Qi Zhang, Yi Mu, Minjie Zhang. Attribute-based authentication for multi-agent systems with dynamic groups
447 -- 456Lo-Yao Yeh, Yen-Cheng Chen, Jiun-Long Huang. PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks
457 -- 467Lars Völker, Marcel Noe, Oliver P. Waldhorst, Christoph Werle, Christoph Sorge. Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication
468 -- 484Zubair A. Baig. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
485 -- 493Leonardo B. Oliveira, Diego F. Aranha, Conrado Porto Lopes Gouvêa, Michael Scott, Danilo F. Cåmara, Julio López, Ricardo Dahab. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
494 -- 501Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma. Provably secure multi-proxy signature scheme with revocation in the standard model
502 -- 514Wei Lu, Goaletsa Rammidi, Ali A. Ghorbani. Clustering botnet communication traffic based on n-gram feature selection
515 -- 523Roberto Di Pietro, Alexandre Viejo. Location privacy and resilience in wireless sensor networks querying

Volume 34, Issue 2

119 -- 0Chung-Ming Huang, Isaac Woungang, Ming-Chiao Chen. Open network service technologies and applications
120 -- 128Chi-Chun Lo, Ting-Huan Kuo, Hsu-Yang Kung, Hsiang-Ting Kao, Chi-Hua Chen, Che-I Wu, Ding-Yuan Cheng. Mobile merchandise evaluation service using novel information retrieval and image recognition technology
129 -- 139Carlos Serrão, Eva Rodríguez, Jaime Delgado. Approaching the rights management interoperability problem using intelligent brokerage mechanisms
140 -- 149Keith Griffin, Colin Flanagan. Defining a call control interface for browser-based integrations using representational state transfer
150 -- 158Jinsuk Baek, Jan Fischer, Hsiao-Hwa Chen, Minho Jo. On a moving direction pattern based MAP selection model for HMIPv6 networks
159 -- 168Eduardo Goncalves da Silva, Luís Ferreira Pires, Marten van Sinderen. Towards runtime discovery, selection and composition of semantic services
169 -- 183Ming-Chiao Chen, Jiann-Liang Chen, Teng-Wen Chang. Android/OSGi-based vehicular network management system
184 -- 191Chin-Feng Lai, Yi-Wei Ma, Sung-Yen Chang, Han-Chieh Chao, Yueh-Min Huang. OSGi-based services architecture for Cyber-Physical Home Control Systems
192 -- 199Huaming Guo, Wei Su, Hongke Zhang, Sy-Yen Kuo. On the convergence condition and convergence time of BGP
200 -- 208Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo Xue, Jun Li. OpenGate: Towards an open network services gateway
209 -- 222Juan C. Yelmo, José M. del Álamo, Rubén Trapero, Yod-Samuel Martín. A user-centric approach to service creation and delivery over next generation networks

Volume 34, Issue 18

2115 -- 2134Marco Conti, Song Chong, Serge Fdida, Weijia Jia, Holger Karl, Ying-Dar Lin, Petri Mähönen, Martin Maier, Refik Molva, Steve Uhlig, Moshe Zukerman. Research challenges towards the Future Internet
2135 -- 2146Mustafa Ilhan Akbas, Matthias R. Brust, Damla Turgut. SOFROP: Self-organizing and fair routing protocol for wireless networks with mobile sensors and stationary actors
2147 -- 2161Dulanjalie C. Dhanapala, Anura P. Jayasumana. Convex Subspace Routing (CSR): Routing via anchor-based convex virtual subspaces in sensor networks
2162 -- 2173Ramy Eltarras, Mohamed Eltoweissy. Associative routing for wireless sensor networks
2174 -- 2183Dong-Min Kim, Young Ju Hwang, Seong-Lyun Kim, Gwang-Ja Jin. Testbed results of an opportunistic routing for multi-robot wireless networks
2184 -- 2194Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb. Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks
2195 -- 2206Ramón Agüero, Johnny Choque, Jose Angel Irastorza, Luis Muñoz. Coverage extension by means of non-conventional multi-hop communications
2207 -- 2216Carlos Henrique Pereira Augusto, Celso Barbosa Carvalho, Marcel William Rocha da Silva, José Ferreira de Rezende. REUSE: A combined routing and link scheduling mechanism for wireless mesh networks
2217 -- 2226Jianhui Zhang, Xingfa Shen, ShaoJie Tang, Guojun Dai. Energy efficient joint data aggregation and link scheduling in solar sensor networks
2227 -- 2235Phurivit Sangkatsanee, Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo. Practical real-time intrusion detection using machine learning approaches
2236 -- 2247Hui Tian, Hong Jiang, Ke Zhou, Dan Feng. Adaptive partial-matching steganography for voice over IP using triple M sequences
2248 -- 2249Mu'awya Naser, Pedro Peris-Lopez, Rahmat Budiarto, Benjamín Ramos Álvarez. A note on the security of PAP

Volume 34, Issue 17

0 -- 0Albert Banchs, Luciano Lenzini, Ioannis Stavrakakis. Special Section on Wireless networking
2003 -- 2012Sajal K. Das, Jun-Won Ho. A synopsis on node compromise detection in wireless sensor networks using sequential analysis (Invited Review Article)
2013 -- 2025Paolo Casari, Michele Zorzi. Protocol design issues in underwater acoustic networks
2026 -- 2035Claudio Cicconetti, Luciano Lenzini, Daniele Migliorini, Enzo Mingozzi. Power-aware opportunistic downlink scheduling in IEEE 802.16 wireless networks
2036 -- 2046Margot Deruyck, Emmeric Tanghe, Wout Joseph, Luc Martens. Modelling and optimization of power consumption in wireless access networks
2047 -- 2056Jesús Aísa, José Luis Villarroel. The WICKPro protocol with the Packet Delivery Ratio metric
2057 -- 2071Ramon S. Schwartz, Rafael Ramos Regis Barbosa, Nirvana Meratnia, Geert J. Heijenk, Hans Scholten. A directional data dissemination protocol for vehicular environments
2072 -- 2081Mario Orne Díaz-Anadón, Kin K. Leung. TDMA scheduling for event-triggered data aggregation in irregular wireless sensor networks
2082 -- 2093Michael Menth, Frank Lehrieder. PCN-based marked flow termination
2094 -- 2103Kunal Shah, Mario Di Francesco, Giuseppe Anastasi, Mohan Kumar. A framework for Resource-Aware Data Accumulation in sparse wireless sensor networks
2104 -- 2113Elias Yaacoub, Zaher Dawy, Mohamad Adnan Al-Alaoui. A novel distributed scheduling scheme for OFDMA uplink using channel information and probabilistic transmission

Volume 34, Issue 16

1893 -- 0Raffaele Bruno. Introduction to the Special Section on Hot Topics in Mesh Networking
1894 -- 1911Mina Yazdanpanah, Chadi Assi, Yousef R. Shayan. Cross-layer optimization for wireless mesh networks with smart antennas
1912 -- 1921Simon Frohn, Sascha Gübner, Christoph Lindemann. Analyzing the effective throughput in multi-hop IEEE 802.11n networks
1922 -- 1931Jessie Hui Wang, Changqing An, Jiahai Yang. A study of traffic, user behavior and pricing policies in a large campus network
1932 -- 1941Fatih Senel, Mohamed F. Younis. Relay node placement in structurally damaged wireless sensor networks via triangular steiner tree approximation
1942 -- 1955Abdul Jabbar, Justin P. Rohrer, Victor S. Frost, James P. G. Sterbenz. Survivable millimeter-wave mesh networks
1956 -- 1967Jing Wu, Michel Savoie. Recovery from control plane failures in the RSVP-TE signaling protocol
1968 -- 1979Jimmy Leblet, Zhe Li, Gwendal Simon, Di Yuan. Optimal network locality in distributed virtualized data-centers
1980 -- 1990Marta Carbone, Luigi Rizzo. An emulation tool for PlanetLab
1991 -- 2001M. Aykut Yigitel, Özlem Durmaz Incel, Cem Ersoy. Design and implementation of a QoS-aware MAC protocol for Wireless Multimedia Sensor Networks

Volume 34, Issue 15

1777 -- 1787Jeroen Famaey, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester. Network-aware service placement and selection algorithms on large-scale overlay networks
1788 -- 1797Tebatso Nage, F. Richard Yu, Marc St-Hilaire. TCP-aware network coding with opportunistic scheduling in wireless mobile ad hoc networks
1798 -- 1809Martin O. Nicholes, Chen-Nee Chuah, Shyhtsun Felix Wu, Biswanath Mukherjee. Inter-domain collaborative routing (IDCR): Server selection for optimal client performance
1810 -- 1821Yukinobu Fukushima, Tutomu Murase, Masayoshi Kobayashi, Hiroki Fujiwara, Ryohei Fujimaki, Tokumi Yokohira. Multi-stage change-point detection scheme for large-scale simultaneous events
1822 -- 1835Ajithkumar Thamarakuzhi, John A. Chandy. 2-Dilated flattened butterfly: A nonblocking switching topology for high-radix networks
1836 -- 1847Arjuna Sathiaseelan, Gorry Fairhurst. TCP-Friendly Rate Control (TFRC) for bursty media flows
1848 -- 1857Xin Huang, Suili Feng, Hongcheng Zhuang. Jointly optimal congestion control, channel allocation and power control in multi-channel wireless multihop networks
1858 -- 1869A. Antony Franklin, Vibhav Bukkapatanam, C. Siva Ram Murthy. On the end-to-end flow allocation and channel assignment in multi-channel multi-radio wireless mesh networks with partially overlapped channels
1870 -- 1882Hongseok Yoo, Dongkyun Kim. Repetition-based cooperative broadcasting for vehicular ad-hoc networks
1883 -- 1891Kinda Khawam, Marc Ibrahim, Marwen Abdennebi, Dana Marinca, Samir Tohmé. Analytical modelling in 802.11 ad hoc networks

Volume 34, Issue 14

1661 -- 1672Yi-Mao Hsiao, Jeng Farn Lee, Jai-Shiarng Chen, Yuan-Sun Chu. H.264 video transmissions over wireless networks: Challenges and solutions
1673 -- 1684Kazushi Ikeda, Thilmee M. Baduge, Takaaki Umedu, Hirozumi Yamaguchi, Teruo Higashino. ALMware: A middleware for application layer multicast protocols
1685 -- 1695Sébastien Barré, J. Ronan, Olivier Bonaventure. Implementation and evaluation of the Shim6 protocol in the Linux kernel
1696 -- 1707Y. Peng Hu, R. Li, S. Wang Zhou, Y. Ping Lin. CCS-MAC: Exploiting the overheard data for compression in wireless sensor networks
1708 -- 1721António Pinto, Manuel Ricardo. On performance of group key distribution techniques when applied to IPTV services
1722 -- 1737Bahador Bakhshi, Siavash Khorsandi. Complexity and design of QoS routing algorithms in wireless mesh networks
1738 -- 1749Abdulghani Ali Ahmed, Aman Jantan, Tat Chee Wan. SLA-based complementary approach for network intrusion detection
1750 -- 1763Yoon Ho Choi, Moon-Young Jung, Seung-Woo Seo. A fast pattern matching algorithm with multi-byte search unit for high-speed network security
1764 -- 1776Zhenhai Duan, Kartik Gopalan, Xin Yuan. An empirical study of behavioral characteristics of spammers: Findings and implications

Volume 34, Issue 13

1539 -- 1548Yaoxue Zhang, Yuezhi Zhou. Separating computation and storage with storage virtualization
1549 -- 1558Yong Liao, Dong Yin, Lixin Gao. Network virtualization substrate with parallelized data plane
1559 -- 1569Luciano Bononi, Marco Di Felice, Antonella Molinaro, Sara Pizzi. Enhancing multi-hop communication over multi-radio multi-channel wireless mesh networks: A cross-layer approach
1570 -- 1579Constantinos Marios Angelopoulos, Sotiris E. Nikoletseas. Aggregated mobility-based topology inference for fast sensor data collection
1580 -- 1592Vaggelis G. Douros, George C. Polyzos. Review of some fundamental approaches for power control in wireless networks
1593 -- 1603Jia Hu, Geyong Min, Mike E. Woodward. Performance analysis of the TXOP burst transmission scheme in single-hop ad hoc networks with unbalanced stations
1604 -- 1621Usman Ashraf, Slim Abdellatif, Guy Juanole. Route Maintenance in IEEE 802.11 wireless mesh networks
1622 -- 1629Jie Yu, Liming Lu, Peng Xiao, Zhoujun Li, Yuan Zhou. Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT
1630 -- 1644Chun-Yu Lin, Chen-Lung Chan, Chung-Ta King, Huang-Chen Lee. A cyclic MAC scheduler for collecting data from heterogeneous sensors
1645 -- 1659Christelle Caillouet, Stéphane Pérennes, Hervé Rivano. Framework for optimizing the capacity of wireless mesh networks

Volume 34, Issue 12

1389 -- 1398Jens Buysse, Marc De Leenheer, Bart Dhoedt, Chris Develder. Providing resiliency for optical grids by exploiting relocation: A dimensioning study based on ILP
1399 -- 1409Diane Prisca Onguetou, Wayne D. Grover. p-Cycle protection at the glass fiber level
1410 -- 1424Krzysztof Walkowiak, Michal Przewozniczek. Modeling and optimization of survivable P2P multicasting
1425 -- 1435William Liu, Krzysztof Pawlikowski, Harsha Sirisena. Algebraic connectivity metric for spare capacity allocation problem in survivable networks
1436 -- 1449Ali Tizghadam, Alberto Leon-Garcia. Robust network planning in nonuniform traffic scenarios
1450 -- 1459Anna V. Manolova, Sarah Ruepp, Lars Dittmann, Eusebi Calle, José-Luis Marzo. Restoration in multi-domain GMPLS-based networks
1460 -- 1474Mukul Goyal, Dawn Rohm, Weigao Xie, Seyed H. Hosseini, Kishor S. Trivedi, Yusuf Bashir, August Divjak. A stochastic model for beaconless IEEE 802.15.4 MAC operation
1475 -- 1483Floriano De Rango, Fiore Veltri, Peppino Fazio. Interference Aware-based Ad-Hoc On Demand Distance Vector (IA-AODV) ultra wideband system routing protocol
1484 -- 1496Sudip Misra, Manikonda Pavan Kumar, Mohammad S. Obaidat. Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks
1497 -- 1509Luca Caviglione, Cristiano Cervellera. Design, optimization and performance evaluation of a content distribution overlay for streaming
1510 -- 1517Yanxiao Zhao, Min Song, Chunsheng Xin. A weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks
1518 -- 1528Vasilios A. Siris, Manolis Delakis. Interference-aware channel assignment in a metropolitan multi-radio wireless mesh network with directional antennas
1529 -- 1537Hamidou Tembine, Abdellatif Kobbane, Mohamed El Koutbi. Dynamic robust power allocation games under channel uncertainty and time delays

Volume 34, Issue 11

1269 -- 1282Wei Yu, Xun Wang, Adam C. Champion, Dong Xuan, David Lee. On detecting active worms with varying scan rate
1283 -- 1293Massimo Bernaschi, Filippo Cacace, A. Davoli, D. Guerri, M. Latini, Luca Vollero. A CAPWAP-based solution for frequency planning in large scale networks of WiFi Hot-Spots
1294 -- 1306Halder Subir, Amrita Ghosal, DasBit Sipra. A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network
1307 -- 1315Gabriele Oligeri, Stefano Chessa, Gaetano Giunta. Loss tolerant video streaming authentication in heterogeneous wireless networks
1316 -- 1327Hakyung Jung, Ted Taekyoung Kwon, Kideok Cho, Yanghee Choi. REACT: Rate Adaptation using Coherence Time in 802.11 WLANs
1328 -- 1341P. Arun Raj Kumar, S. Selvakumar. Distributed denial of service attack detection using an ensemble of neural classifier
1342 -- 1360Bahador Bakhshi, Siavash Khorsandi, Antonio Capone. On-line joint QoS routing and channel assignment in multi-channel multi-radio wireless mesh networks
1361 -- 1374Chanmin Yoon, Hojung Cha. Experimental analysis of IEEE 802.15.4a CSS ranging and its implications
1375 -- 1388Yu Liu, Chi Zhou, Yu Cheng. S:::2:::U: An efficient algorithm for optimal integrated points placement in hybrid optical-wireless access networks

Volume 34, Issue 10

1145 -- 1158Pavle Vuletic, Jelica Protic. Self-similar cross-traffic analysis as a foundation for choosing among active available bandwidth measurement strategies
1159 -- 1168Xu Li, Hongyu Huang, Xuegang Yu, Wei Shu, Minglu Li, Min-You Wu. A new paradigm for urban surveillance with vehicular sensor networks
1169 -- 1181Ying-Dar Lin, Shun-Lee Chang, Shi-Hung Tao, Jui-Hung Yeh. Realizing and benchmarking broadcast algorithms in wireless mesh networks
1182 -- 1194Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Shigeaki Harada, Haruhisa Hasegawa. Parallel video streaming optimizing network throughput
1195 -- 1201Ching-Lung Chang, Yue-Shan Chang, Ching-Hung Chang, Fang-Jie Chen. XOR-based frame loss recovery scheme for video streaming
1202 -- 1212Ye Zhu, Huirong Fu. Traffic analysis attacks on Skype VoIP calls
1213 -- 1221Daniel F. Macedo, Aldri L. dos Santos, José Marcos S. Nogueira, Guy Pujolle. Modeling multiple hop wireless networks with varying transmission power and data rate
1222 -- 1234Laercio Cruvinel, Teresa Vazão. Improving performance for multimedia traffic with distributed dynamic QoS adaptation
1235 -- 1242Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan. Poly: A reliable and energy efficient topology control protocol for wireless sensor networks
1243 -- 1257Jianxin Liao, Jinzhu Wang, Tonghong Li, Jingyu Wang, Xiaomin Zhu. A token-bucket based notification traffic control mechanism for IMS presence service
1258 -- 1267Vasileios Karyotis, Maria Fazio, Symeon Papavassiliou, Antonio Puliafito. Comparison of efficient random walk strategies for wireless multi-hop networks

Volume 34, Issue 1

1 -- 0Marco Conti. Editorial
2 -- 42Subharthi Paul, Jianli Pan, Raj Jain. Architectures for the future networks and the next generation Internet: A survey
43 -- 53Balachander Krishnamurthy, Walter Willinger, Phillipa Gill, Martin F. Arlitt. A Socratic method for validation of measurement-based networking research
54 -- 67Shiao Li Tsao, Chung-Huei Huang. A survey of energy efficient MAC protocols for IEEE 802.11 WLAN
68 -- 82Enrico Gregori, Alessandro Improta, Luciano Lenzini, Chiara Orsini. The impact of IXPs on the AS-level topology structure of the Internet
83 -- 98Andreas Konstantinidis 0002, Kun Yang. Multi-objective K-connected Deployment and Power Assignment in WSNs using a problem-specific constrained evolutionary algorithm based on decomposition
99 -- 106Hyun Woo Kim, Jun-Hui Lee, Yong-Hoon Choi, Young-uk Chung, Hyukjoon Lee. Dynamic bandwidth provisioning using ARIMA-based traffic forecasting for Mobile WiMAX
107 -- 117Ming-Yang Su. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems