Journal: Computer Communications

Volume 36, Issue 9

963 -- 964Charalampos Konstantopoulos, Paolo Bellavista, Chi-Fu Huang, Damla Turgut. Special issue: Reactive wireless sensor networks
965 -- 978Majid I. Khan, Wilfried N. Gansterer, Günter Haring. Static vs. mobile sink: The influence of basic parameters on energy efficiency in wireless sensor networks
979 -- 987Ivan Mezei, Milan Lukic, Veljko Malbasa, Ivan Stojmenovic. Auctions and iMesh based task assignment in wireless sensor and actuator networks
988 -- 997Yuanyuan Zeng, Deshi Li, Athanasios V. Vasilakos. Real-time data report and task execution in wireless sensor and actuator networks using self-aware mobile actuators
998 -- 1010Fadi M. Al-Turjman, Ashraf E. Al-Fagih, Waleed Alsalih, Hossam S. Hassanein. A delay-tolerant framework for integrated RSNs in IoT
1011 -- 1023Estanislao Mercadal, Carlos Vidueira, Cormac J. Sreenan, Joan Borrell. Improving the dynamism of mobile agent applications in wireless sensor networks through separate itineraries
1024 -- 1038Samaneh Hosseini Semnani, Otman A. Basir. Target to sensor allocation: A hierarchical dynamic Distributed Constraint Optimization approach
1039 -- 1053Dimitrios Zorbas, Tahiry Razafindralambo. Prolonging network lifetime under probabilistic target coverage in wireless mobile sensor networks
1054 -- 1066Leandro A. Villas, Azzedine Boukerche, Daniel L. Guidoni, Horacio A. B. F. de Oliveira, Regina Borges de Araujo, Antonio Alfredo Ferreira Loureiro. An energy-aware spatio-temporal correlation mechanism to perform efficient data collection in wireless sensor networks
1067 -- 1077Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li. Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs
1078 -- 1093Hui Xia, Zhiping Jia, Lei Ju, Xin Li, Edwin Hsing-Mean Sha. Impact of trust model on on-demand multi-path routing in mobile ad hoc networks
1094 -- 1099Lu Jin, Defeng David Huang. A slotted CSMA based reinforcement learning approach for extending the lifetime of underwater acoustic wireless sensor networks

Volume 36, Issue 8

849 -- 860Zhiting Lin, Xiufang Jiang. Universal scheme improving probabilistic routing in delay-tolerant networks
861 -- 874Nilesh Padhariya, Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa. Economic incentive-based brokerage schemes for improving data availability in mobile-P2P networks
875 -- 880Sathiamoorthy Manoharan, Tianxu Ge. A demerit point strategy to reduce free-riding in BitTorrent
881 -- 894Bernardo de la Ossa, José A. Gil, Julio Sahuquillo, Ana Pont. Referrer Graph: A cost-effective algorithm and pruning method for predicting web accesses
895 -- 907Y. Xie, S. Tang, X. Huang, C. Tang, X. Liu. Detecting latent attack behavior from aggregated Web traffic
908 -- 926Frederic Raspall-Chaure. Scalable identification and measurement of heavy-hitters
927 -- 938Brad Whitehead, Chung-Horng Lung, Peter Rabinovitch. An efficient hybrid approach to per-flow state tracking for high-speed networks
939 -- 946Sungwook Kim. A repeated Bayesian auction game for cognitive radio spectrum sharing scheme
947 -- 961Arash Azarfar, Jean-François Frigon, Brunilde Sansò. Reliability analysis of a channel restoration mechanism for opportunistic spectrum access

Volume 36, Issue 7

719 -- 720Bengt Ahlgren, Holger Karl, Dirk Kutscher, Lixia Zhang 0001. Special section on Information-Centric Networking
721 -- 735Christian Dannewitz, Dirk Kutscher, Börje Ohlman, Stephen Farrell, Bengt Ahlgren, Holger Karl. Network of Information (NetInf) - An information-centric networking architecture
736 -- 749Christian Dannewitz, Matteo D'Ambrosio, Vinicio Vercellone. Hierarchical DHT-based name resolution for information-centric networks
750 -- 757Giovanna Carofiglio, Massimo Gallo, Luca Muscariello, Diego Perino. Evaluating per-application storage management in content-centric networks
758 -- 770Wei Koong Chai, Diliang He, Ioannis Psaras, George Pavlou. Cache "less for more" in information-centric networks (extended version)
771 -- 778Giuseppe Rossini, Dario Rossi. Evaluating CCN multi-path interest forwarding strategies
779 -- 791Cheng Yi, Alexander Afanasyev, Ilya Moiseenko, Lan Wang, Beichuan Zhang, Lixia Zhang 0001. A case for stateful forwarding plane
792 -- 803Marica Amadeo, Antonella Molinaro, Giuseppe Ruggeri. E-CHANET: Routing, forwarding and transport in Information-Centric multihop wireless networks
804 -- 816Osama Khader, Andreas Willig. An energy consumption analysis of the Wireless HART TDMA protocol
817 -- 833Pelayo Nuño, Juan C. Granda, Francisco J. Suárez, Daniel F. García. ∗ in Multimedia Communication Overlays
834 -- 848Youngwon Kim An, Seong-Moo Yoo, Changhyuk An, B. Earl Wells. Doppler effect on target tracking in wireless sensor networks

Volume 36, Issue 6

607 -- 610Piotr Cholda, Bjarne E. Helvik. Reliable network-based services
611 -- 620Héctor Cancela, Franco Robledo, Gerardo Rubino, Pablo Sartor. Monte Carlo estimation of diameter-constrained network reliability conditioned by pathsets and cutsets
621 -- 629Samir Sebbah, Brigitte Jaumard. Differentiated quality-of-protection in survivable WDM mesh networks using p-structures
630 -- 644M. Farhan Habib, Massimo Tornatore, Ferhat Dikbiyik, Biswanath Mukherjee. Disaster survivability in optical communication networks
645 -- 655Levente Csikor, János Tapolcai, Gábor Rétvári. Optimizing IGP link costs for improving IP-level resilience with Loop-Free Alternates
656 -- 665Sachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet, Piet Demeester. OpenFlow: Meeting carrier-grade recovery requirements
666 -- 677Victor Yu Liu, David Tipper. Spare capacity allocation using shared backup path protection for dual link failures
678 -- 688Iyad Katib, Deep Medhi. Network protection design models, a heuristic, and a study for concurrent single-link per layer failures in three-layer networks
689 -- 697Dahai Xu, Guangzhi Li, Byrav Ramamurthy, Angela L. Chiu, Dongmei Wang, Robert D. Doverspike. On provisioning diverse circuits in heterogeneous multi-layer optical networks
698 -- 707Sahel Sahhaf, Wouter Tavernier, Didier Colle, Mario Pickavet, Piet Demeester. Link failure recovery technique for greedy routing in the hyperbolic plane
708 -- 717Andrés J. Gonzalez, Bjarne E. Helvik. SLA success probability assessment in networks with correlated failures

Volume 36, Issue 5

481 -- 503Stefano Ferretti. Shaping opportunistic networks
504 -- 519Seunghun Cha, Elmurod Talipov, Hojung Cha. Data delivery scheme for intermittently connected mobile sensor networks
520 -- 532Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutaba. Reliable and energy efficient cooperative detection in wireless sensor networks
533 -- 541Andrei Pruteanu, Lucia D'Acunto, Stefan Dulman. Distributed online flash-crowd detection in P2P swarming systems
542 -- 550Josep Domingo-Ferrer, David Megías. Distributed multicast of fingerprinted content based on a rational peer-to-peer community
551 -- 561Jason Brown, Jamil Y. Khan. Key performance aspects of an LTE FDD based Smart Grid communications network
562 -- 574Dongwon Seo, Heejo Lee, Ejovi Nuwere. SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree
575 -- 588Yoshiki Kanda, Romain Fontugne, Kensuke Fukuda, Toshiharu Sugawara. ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches
589 -- 599Mohamed Lamine Lamali, Hélia Pouyllau, Dominique Barth. Path computation in multi-layer multi-domain networks: A language theoretic approach
600 -- 606James Yiming Zhang, Jing Wu, Gregor von Bochmann. A proof of wavelength conversion not improving Lagrangian bounds of the sliding scheduled RWA problem

Volume 36, Issue 4

363 -- 372Stojan Trajanovski, Fernando A. Kuipers, Javier Martín Hernández, Piet Van Mieghem. Generating graphs that approach a prescribed modularity
373 -- 385Yossi Kanizo, David Hay, Isaac Keslassy. Access-efficient Balanced Bloom Filters
386 -- 395Raúl Peña-Ortiz, José A. Gil, Julio Sahuquillo, Ana Pont. Analyzing web server performance under dynamic user workloads
396 -- 410Raffaele Bolla, Roberto Bruschi. An open-source platform for distributed Linux Software Routers
411 -- 420Jie Wu 0001, Ying Dai, Yanchao Zhao. Effective channel assignments in cognitive radio networks
421 -- 430Seyed Mohamad Alavi, Chi Zhou, Wan Wang-Gen. Efficient resource allocation algorithm for OFDMA systems with delay constraint
431 -- 444Jaeseon Hwang, Taewoon Kim, Jungmin So, Hyuk Lim. A receiver-centric multi-channel MAC protocol for wireless networks
445 -- 458Tzung-Shi Chen, Hua-Wen Tsai, Yu-Hsin Chang, Tzung-Cheng Chen. Geographic convergecast using mobile sink in wireless sensor networks
459 -- 467Shanshan Li, Shaoliang Peng, Weifeng Chen, Xiaopei Lu. INCOME: Practical land monitoring in precision agriculture with sensor networks
468 -- 480Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe. PSP: Private and secure payment with RFID

Volume 36, Issue 3

243 -- 255Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah. A new class of Hash-Chain based key pre-distribution schemes for WSN
256 -- 268Huan Li, Yanlei Liu, Weifeng Chen, Weijia Jia, Bing Li, Junwu Xiong. COCA: Constructing optimal clustering architecture to maximize sensor network lifetime
269 -- 278Qin Liu, Yanan Chang, Xiaohua Jia. A hybrid method of CSMA/CA and TDMA for real-time data aggregation in wireless sensor networks
279 -- 290Philip Ginzboorg, Valtteri Niemi, Jörg Ott. Fragmentation algorithms for DTN links
291 -- 302Feng Zhong, Chai Kiat Yeo, Bu-Sung Lee. EFLoM: An Efficient Framework for Local Mobility
303 -- 319P. Arun Raj Kumar, S. Selvakumar. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
320 -- 332Sangho Lee, Jong Kim. Fluxing botnet command and control channels with URL shortening services
333 -- 341Malabika Sengupta, Swapan Kumar Mondal, Debashis Saha. Distributed lightpath establishment techniques using Multi-wavelength Reservation Protocols in WDM optical networks
342 -- 350Weigang Hou, Lei Guo, Xiaoxue Gong, Zhimin Sun. Multi-domain integrated grooming algorithm for green IP over WDM network
351 -- 359Mingdong Tang, Guoqiang Zhang, Tao Lin, Jianxun Liu. HDLBR: A name-independent compact routing scheme for power-law networks
360 -- 361Agassi Z. Melikov, Leonid Ponomarenko. Comment on "Probabilistic framework and performance evaluation for prioritized call admission control in next generation networks"

Volume 36, Issue 2

121 -- 134Jiguo Yu, Nannan Wang, Guanghui Wang, Dongxiao Yu. Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey
135 -- 148Fadi M. Al-Turjman, Hossam S. Hassanein, Mohamed Ibnkahla. Efficient deployment of wireless sensor networks targeting environment monitoring applications
149 -- 161Rone Ilidio da Silva, Daniel Fernandes Macedo, José Marcos S. Nogueira. Duty cycle aware spatial query processing in wireless sensor networks
162 -- 169Lin Xing, Wei Wang 0015. Energy-balanced cross layer traffic and coding optimality in battery-powered wireless mesh networks
170 -- 179Sheng-Shih Wang, Yi-Shiun Lin. PassCAR: A passive clustering aided routing protocol for vehicular ad hoc networks
180 -- 190Abderrahmen Mtibaa, Khaled A. Harras. CAF: Community aware framework for large scale mobile opportunistic networks
191 -- 202Flavio Roberto Santos, Weverton Luis da Costa Cordeiro, Luciano Paschoal Gaspary, Antônio Marinho Pilla Barcellos. Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems
203 -- 210Yanmin Zhu, Lei Ni, Bo Li 0001. Exploiting mobility patterns for inter-technology handover in mobile environments
211 -- 222Yang Liu, Zheng Zheng, Kai Liu, Xingchun Liu. Delay-SRLG constrained, backup-shared path protection in WDM networks with sleep scheduling
223 -- 241Krishanthmohan Ratnam, Mohan Gurusamy, Kee Chaing Chua. A flexible optical switch architecture for efficient transmission of optical bursts

Volume 36, Issue 17-18

1665 -- 1697Emilio Ancillotti, Raffaele Bruno, Marco Conti. The role of communication systems in smart grids: Architectures, technical solutions and research challenges
1698 -- 1707Haesun Byun, Meejeong Lee. A P4P-integrated data-driven P2P system for the live multimedia streaming service
1708 -- 1725Hasan T. Karaoglu, Aparna Gupta, Murat Yuksel, Weini Liu, Koushik Kar. Bailout forward contracts for edge-to-edge internet services
1726 -- 1744Iván Vidal, Jaime García-Reinoso, Ignacio Soto, Antonio de la Oliva. A solution for transparent mobility with route optimization in the IP multimedia subsystem
1745 -- 1753Ronghui Hou, Sikai Qu, King-Shan Lui, Jiandong Li. Coding- and interference-aware routing protocol in wireless networks
1754 -- 1767Yuan-Cheng Lai, Ling-Yen Hsiao, Bor-shen Lin. An RFID anti-collision algorithm with dynamic condensation and ordering binary tree

Volume 36, Issue 15-16

1581 -- 1591Xiaojun Zhu, Xiaobing Wu, Guihai Chen. Relative localization for wireless sensor networks with linear topology
1592 -- 1605Andrey Sapegin, Steve Uhlig. On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events
1606 -- 1607Fernando Boavida, Eduardo Cerqueira, Andreas Mauthe, Marília Curado, Eng Keong Lua, Mikolaj Leszczuk. Special section on human-centric multimedia networking: Guest editorial
1608 -- 1620Alberto Alvarez, Laura Pozueco, Sergio Cabrero, Xabiel G. Pañeda, Roberto García, David Melendi, Gabriel Díaz Orueta. Subjective evaluation of critical success factors for a QoE aware adaptive system
1621 -- 1628Jalal Awed, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi. Perception-aware packet-loss resilient compression for networked haptic systems
1629 -- 1638Ianire Taboada, Fidel Liberal, Jose Oscar Fajardo, Urtzi Ayesta. QoE-aware optimization of multimedia flow scheduling
1639 -- 1656Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones, Faycal Bouhafs. Exploiting linked data to create rich human digital memories
1657 -- 1664Thomas C. Schmidt, Matthias Wählisch, Dominik Charousset, Sebastian Meiling. On name-based group communication: Challenges, concepts, and transparent deployment

Volume 36, Issue 14

1485 -- 1497Kaushik R. Chowdhury, Marco Di Felice, Luciano Bononi. XCHARM: A routing protocol for multi-channel wireless mesh networks
1498 -- 1514Shin-Jer Yang, Wen Chieh Tseng. Design novel weighted rating of multiple attributes scheme to enhance handoff efficiency in heterogeneous wireless networks
1515 -- 1526Yinan Li, Ing-Ray Chen. Hierarchical agent-based secure and reliable multicast in wireless mesh networks
1527 -- 1538Alejandro Pérez-Méndez, Fernando Pereñiguez-Garcia, Rafael Marín López, Gabriel López Millán. Out-of-band federated authentication for Kerberos based on PANA
1539 -- 1551Brigitte Jaumard, Rejaul Chowdhury. An efficient optimization scheme for WDM/TDM PON network planning
1552 -- 1558Peng Xu, Xuming Fang, Meirong Chen, Yang Xu. A Stackelberg game-based spectrum allocation scheme in macro/femtocell hierarchical networks
1559 -- 1569Hasan Erkan, Georgios Ellinas, Antonis Hadjiantonis, Roger Dorsinville, Mohamed A. Ali. Dynamic and fair resource allocation in a distributed ring-based WDM-PON architectures
1570 -- 1580Burak Kantarci, Hussein T. Mouftah. Two-stage report generation in long-reach EPON for enhanced delay performance

Volume 36, Issue 13

1387 -- 1398Shameek Bhattacharjee, Shamik Sengupta, Mainak Chatterjee. Vulnerabilities in cognitive radio networks: A survey
1399 -- 1410Junaid Ansari, Xi Zhang, Petri Mähönen. A decentralized MAC protocol for opportunistic spectrum access in cognitive wireless networks
1411 -- 1421Ahmad Abbas, Mohamed Younis. Establishing connectivity among disjoint terminals using a mix of stationary and mobile relays
1422 -- 1435Omar Abdel Wahab, Hadi Otrok, Azzam Mourad. VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks
1436 -- 1449Maria Estrella Sousa Vieira, Andrés Suárez-González, Manuel Fernández-Veiga, José C. López-Ardao, Cándido López-García. Model selection for long-memory processes in the spectral domain
1450 -- 1459Y. Sinan Hanay, Abhishek Dwaraki, Kekai Hu, Tilman Wolf. High-performance implementation of in-network traffic pacing for small-buffer networks
1460 -- 1470Guang Cheng, Yongning Tang. Line speed accurate superspreader identification using dynamic error compensation
1471 -- 1484Li Ming Chen, Meng Chang Chen, Wanjiun Liao, Yeali S. Sun. A scalable network forensics mechanism for stealthy self-propagating attacks

Volume 36, Issue 12

1269 -- 1283Bingdong Li, Esra Erdin, Mehmet Hadi Gunes, George Bebis, Todd Shipley. An overview of anonymity technology usage
1284 -- 1297Oscar García Morchon, Dmitriy Kuptsov, Andrei Gurtov, Klaus Wehrle. Cooperative security in distributed networks
1298 -- 1309Ismael de Fez, Francisco Fraile, Juan Carlos Guerri. Effect of the FDT transmission frequency for an optimum content delivery using the FLUTE protocol
1310 -- 1316Yue Han, Mingwu Yao, Zengji Liu. A scalable method for DCLC problem using hierarchical MDP model
1317 -- 1328Marcos Postigo-Boix, José Luis Melús-Moreno. A pricing method for elastic services that guarantees the GoS in a scenario of evolutionary demand
1329 -- 1340Alireza Monemi, Roozbeh Zarei, Muhammad N. Marsono. Online NetFPGA decision tree statistical traffic classifier
1341 -- 1349Waleed Ejaz, Najam Ul Hasan, Hyung Seok Kim. Distributed cooperative spectrum sensing in cognitive radio for ad hoc networks
1350 -- 1359Peter M. van de Ven, Sem C. Borst, Lei Ying. Inefficiency of MaxWeight scheduling in spatial wireless networks
1360 -- 1372Omur Ozel, Jing Yang 0002, Sennur Ulukus. Optimal transmission schemes for parallel and fading Gaussian broadcast channels with an energy harvesting rechargeable transmitter
1373 -- 1386Veeraruna Kavitha, Sreenath Ramanath, Mérouane Debbah. Satisfying demands in a multicellular network: A universal power allocation algorithm

Volume 36, Issue 10-11

1101 -- 1119Behrouz Shahgholi Ghahfarokhi, Naser Movahhedinia. A survey on applications of IEEE 802.21 Media Independent Handover framework in next generation wireless networks
1120 -- 1129Faraz Ahmed, Muhammad Abulaish. A generic statistical approach for spam detection in Online Social Networks
1130 -- 1144Valerio Arnaboldi, Andrea Guazzini, Andrea Passarella. Egocentric online social networks: Analysis of key features and prediction of tie strength in Facebook
1145 -- 1158Slimane Lemmouchi, Mohammed Haddad, Hamamache Kheddouci. Robustness study of emerged communities from exchanges in peer-to-peer networks
1159 -- 1171Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior. Trust-based security for the OLSR routing protocol
1172 -- 1185Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, Serge Fdida. SURF: A distributed channel selection strategy for data dissemination in multi-hop cognitive radio networks
1186 -- 1192Sang-Seon Byun, Ilangko Balasingham, Heung-No Lee. An inventory model-based spectrum pooling for wireless service provider and unlicensed users
1193 -- 1208Hairui Zhou, Chengchen Hu, Lina He. Improving the efficiency and fairness of eXplicit Control Protocol in multi-bottleneck networks
1209 -- 1224Daisuke Satoh, Harutaka Ueno. Marking algorithm of distinguishing three traffic load states with two encoding states for pre-congestion notification
1225 -- 1234Hakki Ulas Ünal, Daniel Melchor-Aguilar, Deniz Üstebay, Silviu-Iulian Niculescu, Hitay Özbay. Comparison of PI controllers designed for the delay model of TCP/AQM networks
1235 -- 1244Jianxin Wang, Pingping Dong, Jie Chen, Jiawei Huang, Shigeng Zhang, Weiping Wang 0003. Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks
1245 -- 1254Sebastian Schildt, Johannes Morgenroth, Lars C. Wolf. Efficient false positive free set synchronization using an extended bloom filter approach
1255 -- 1267Derek Pao, Nga Lam Or, Ray C. C. Cheung. A memory-based NFA regular expression match engine for signature-based intrusion detection

Volume 36, Issue 1

1 -- 7Kyung-Joon Park, Rong Zheng, Xue Liu. Cyber-physical systems: Milestones and research challenges
8 -- 19Ahmad T. Al-Hammouri. A comprehensive co-simulation platform for cyber-physical systems
20 -- 28Junbeom Hur, Kyungtae Kang. Dependable and secure computing in medical information systems
29 -- 41Gregory Hackmann, Fei Sun, Nestor Castaneda, Chenyang Lu, Shirley Dyke. A holistic approach to decentralized structural damage localization using wireless sensor networks
42 -- 50Santiago J. Barro Torres, Tiago M. Fernández-Caramés, Héctor J. Pérez-Iglesias, Carlos J. Escudero. Real-time personal protective equipment monitoring system
51 -- 62Hwantae Kim, Suk-Kyu Lee, Hyunsoon Kim, Hwangnam Kim. Implementing home energy management system with UPnP and mobile applications
63 -- 79Hasan Tuncer, Sumita Mishra, Nirmala Shenoy. A survey of identity and handoff management approaches for the future Internet
80 -- 89Wenjie Zhang, Chai Kiat Yeo. Joint iterative algorithm for optimal cooperative spectrum sensing in cognitive radio networks
90 -- 104Juan Vera del Campo, Josep Pegueroles, Juan Hernández-Serrano, Miguel Soriano. Design of a P2P content recommendation system using affinity networks
105 -- 112Chao Zhang, Jun Zhang, Guo Wei, Pinyi Ren. An efficient cooperative ARQ protocol for wireless relay networks
113 -- 120Seyed Hossein Khasteh, Saeed Bagheri Shouraki, Nima Hajiabdorahim, Ehsan Dadashnialehi. A new approach for integrated coverage and connectivity in wireless sensor networks