Journal: Int. J. Communication Systems

Volume 28, Issue 9

1521 -- 1536Nasrin Sadeghianpour, Teong Chee Chuah, Su-Wei Tan. Joint channel assignment and routing in multiradio multichannel wireless mesh networks with directional antennas
1537 -- 1550Tao Zhang, Jin Wang. Performance of fiber delay-line buffers in asynchronous packet-based optical switching networks with wavelength conversion
1551 -- 1571Ke Li, Sheng Wang, Shizhong Xu, Xiong Wang, Jin Ren, Haojun Huang, Bo Zhai. Multi-topology routing based egress selection approach to achieve hybrid intra-AS and inter-AS traffic engineering
1572 -- 1579Youssouf Ould-Cheikh-Mouhamedou. Reducing the complexity of distance measurement methods for circular turbo codes that use structured interleavers
1580 -- 1597You-Chiun Wang. Profit-based exclusive-or coding algorithm for data retransmission in DVB-H with a recovery network
1598 -- 1609Ke Zhang, Chang Duan, Haitao Jia. Genetic simulated annealing-based coverage-enhancing algorithm for multimedia directional sensor networks
1610 -- 1619Qingchen Zhang, Zhikui Chen, Laurence T. Yang. A nodes scheduling model based on Markov chain prediction for big streaming data analysis

Volume 28, Issue 8

1401 -- 1418Mohsen Shakiba, Mohammad Dakhilalian, Hamid Mala. Cryptanalysis of mCrypton-64
1419 -- 1431Majid Bayat, Mohammad Reza Aref. An attribute-based tripartite key agreement protocol
1432 -- 1449Evaggelos Chatzistavros, Savvas A. Chatzichristofis, Konstantinos Zagoris, George Stamatelos. Content-based image retrieval over IEEE 802.11b noisy wireless networks
1450 -- 1461Zhihang Li, Huilin Jiang, Zhiwen Pan, Nan Liu, Xiaohu You. Energy spectral efficiency tradeoff in downlink OFDMA network
1462 -- 1474Alireza Alizadeh, Ghosheh Abed Hodtani. Analysis of capacity and coverage region for Rayleigh fading MIMO relay channel
1475 -- 1483Raj Johri, Shyam Akashe, Sanjay Sharma. High performance 8 bit cascaded carry look ahead adder with precise power consumption
1484 -- 1492Ioannis V. Loumiotis, Evgenia F. Adamopoulou, Konstantinos P. Demestichas, Theodora A. Stamatiadi, Michael E. Theologou. On the predictability of next generation mobile network traffic using artificial neural networks
1493 -- 1507Ch. Pradeep Reddy, P. Venkata Krishna. Ant-inspired level-based congestion control for wireless mesh networks
1508 -- 1520Qiang Liu, Kun Yang. Channel capacity analysis of a diffusion-based molecular communication system with ligand receptors

Volume 28, Issue 7

1201 -- 1218Zhibo Wang, Hui Tian, Kun Yang, Ziqiang Liu. Frequency resource allocation strategy with QoS support in hybrid cellular and Device-to-Device networks
1219 -- 1249Assadallah Sahebalam, Mohammad Osmani-Bojd, Ghosheh Abed Hodtani. Ultra-wideband multiple-access relay channel with correlated noises and its diversity analysis
1250 -- 1264Kai Ma, Jie Yang, Guoqiang Hu, Xinping Guan. Cooperative Relay-Aware Spectrum leasing based on Nash bargaining solution in cognitive radio networks
1265 -- 1281Young-Pil Kim, Cheol-Ho Hong, Chuck Yoo. Performance impact of JobTracker failure in Hadoop
1282 -- 1292Yanjun Liu, Lein Harn, Chin-Chen Chang. A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets
1293 -- 1302Dubravko Sabolic. Modeling and measurement of cross-talk transmission between coupled lines
1303 -- 1315Siguang Chen, Meng Wu, Kun Wang, Zhixin Sun, Weifeng Lu. Combining network coding and compressed sensing for error correction in wireless sensor networks
1316 -- 1328Mouna Elmachkour, Abdellatif Kobbane, Essaid Sabir, Jalel Ben-Othman, Mohammed El Koutbi. Data traffic-based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation
1329 -- 1339Ahmet Sayar. Ant-based interactive workflow management: a case study on RMI
1340 -- 1351Qi Jiang, Jianfeng Ma, Youliang Tian. Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al
1352 -- 1366Judhistir Mahapatro, Sudip Misra, Manjunatha Mahadevappa, Nabiul Islam. Interference-aware MAC scheduling and admission control for multiple mobile WBANs used in healthcare monitoring
1367 -- 1386Sudip Misra, Goutam Mali, Ayan Mondal. Distributed topology management for wireless multimedia sensor networks: exploiting connectivity and cooperation
1387 -- 1399Jing Wang, Kaikai Chi, Yang Yang, Xinmei Wang. Network coding based on hyper-edge decomposition for wireless network with link failures

Volume 28, Issue 6

1001 -- 1016Nabih Alaoui, Vahid Meghdadi, Jean-Pierre Cances. Wireless sensor networks with joint network-channel code optimization
1017 -- 1029Yan Gong, Chaoqin Gan, Chenwei Wu. Highly reliable wavelength-reuse wavelength-division multiplexing semipassive optical access network architecture with double cover area and high network capacity
1030 -- 1036Gaoqi Dou, Chunquan He, Congying Li, Jun Gao. Orthogonal superimposed training design for block transmission over frequency-selective fading channels
1037 -- 1052Francisco-Javier Rodríguez-Pérez, José Luis González Sánchez, Javier Carmona-Murillo, David Cortés-Polo. An OAM function to improve the packet loss in MPLS-TP domains for prioritized QoS-aware services
1053 -- 1067Fengyu Guo, Long Yu, Shengwei Tian, Jiong Yu. A workflow task scheduling algorithm based on the resources' fuzzy clustering in cloud computing environment
1068 -- 1079Ming-Yue Zhai, Ling-Dong Su. Research on the memory order of the power-line communication channel
1080 -- 1099Jaehyun Hwang, Sang-Seon Byun. A resilient buffer allocation scheme in active queue management: a stochastic cooperative game theoretic approach
1100 -- 1111Xuexian Hu, Zhenfeng Zhang, Qihui Zhang. Universally composable three-party password-authenticated key exchange with contributiveness
1112 -- 1125Yass K. Salih, Ong Hang See, Rabha W. Ibrahim, Salman Yussof, Azlan Iqbal. A novel noncooperative game competing model using generalized simple additive weighting method to perform network selection in heterogeneous wireless networks
1126 -- 1139Heshuai Li, Junhu Zhu, Han Qiu, QingXian Wang, Tianyang Zhou, Hang Li. The new threat to internet: DNP attack with the attacking flows strategizing technology
1140 -- 1150Zhaoxi Fang, Feng Liang, Zunyi Wang, Danjiang Chen. Low complexity timing estimation and resynchronization for asynchronous bidirectional communications with multiple antenna relay
1151 -- 1167Do-Hyung Kim, Jong-Hwan Kim, Yusung Kim, Hyunsoo Yoon, Ikjun Yeom. End-to-end mobility support in content centric networks
1168 -- 1179Dharmvir Jain, Sanjay Sharma. A novel grouped multilevel dynamic space-time trellis coding scheme
1180 -- 1199S. Samoui, I. El Bouabidi, Mohammad S. Obaidat, Faouzi Zarai, K. F. Hsiao, Lotfi Kamoun. Improved IPSec tunnel establishment for 3GPP-WLAN interworking

Volume 28, Issue 5

801 -- 817Sudip Misra, Shankha Subhra Chatterjee, Mohsen Guizani. Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks
818 -- 841Minglei Fu, Maolin He, Zichun Le, Weiwen Wang, Bisheng Quan. Performance evaluation of the survivability schemes in WOBAN: a quality of recovery (QoR) method
842 -- 847Yongchun Liu, Peng Gong, Xiaopeng Yan, Ping Li. On the security of a dynamic identity-based remote user authentication scheme with verifiable password update
848 -- 860Xin Liu, Qingfeng Jing, Yun Jia, Weizhi Zhong, Yong Liang Guan. Sensing-throughput tradeoff for cooperative multiple-input single-output cognitive radio
861 -- 872Bing Zhang, Maode Ma, Chunfeng Liu, Yantai Shu. Performance improvements of HCCA scheduling in V2R environments
873 -- 888M. K. Bhuyan, B. K. Chakraborty. Motion adaptive video coding scheme for time-varying network
889 -- 900Laisen Nie, Dingde Jiang. A compressive sensing-based network tomography approach to estimating origin-destination flow traffic in large-scale backbone networks
901 -- 909Zhu Xiao, Zhongfeng Li, Xu Zhang, Enjie Liu, Kechu Yi. An efficient interference mitigation approach via quasi-access in two-tier macro-femto heterogeneous networks
910 -- 927Cecília A. C. César, Solon V. Carvalho. A queuing model for distributed scheduling in IEEE 802.16 wireless mesh networks
928 -- 943Giulio Bartoli, Romano Fantacci, Francesco Gei, Dania Marabissi, Luigia Micciullo. A novel emergency management platform for smart public safety
944 -- 951K. Ujwal Deep, Vidhyacharan Bhaskar. Fast turbo codes with space-time block codes in fast fading channels
952 -- 971Ching-Hsien Hsu, Tai-Lung Chen, Chao-Tung Yang, Hai-Cheng Chu. Scheduling contention-free broadcasts in heterogeneous networks
972 -- 989Amjad Mehmood, Shafiullah Khan, Bilal Shams, Jaime Lloret Mauri. Energy-efficient multi-level and distance-aware clustering mechanism for WSNs
990 -- 1000Enxiao Liu, Weixiao Meng, Shuai Han. A dense overlapped linear subarray architecture for interference suppressing in small-scale arrays

Volume 28, Issue 4

601 -- 614Cristian Tanas, Jordi Herrera-Joancomartí. When users become sensors: can we trust their readings?
615 -- 624Zhiyu Fan, Yuanan Liu, Hu Li, Dongming Yuan, Hefei Hu. A servo design for slave clock in IEEE 1588 synchronization networks
625 -- 644Hsu-Yang Kung, Sumalee Chaisit, Nguyen Thi Mai Phuong. Optimization of an RFID location identification scheme based on the neural network
645 -- 658Jianhong Zhang, Jian Mao. An improved anonymous multi-receiver identity-based encryption scheme
659 -- 674Young-Sik Jeong, Ji Soo Park, Jong Hyuk Park. An efficient authentication system of smart device using multi factors in mobile cloud service architecture
675 -- 681Yumin Yuan. On the security of a proxy signature scheme in the standard model
682 -- 704Quan Sun, Liusheng Huang, Haoran Zhang, Hongli Xu. Handoff optimization and load balancing in wireless LANs using association control
705 -- 722Lei Tang, Fengfan Yang, Shun-wai Zhang, Lin Luo. The performance of uplink LDPC-coded multirelay cooperation based on virtual V-BLAST processing
723 -- 742Liu Yong-lei, Jin Zhi-gang. Distributed method for cracking WPA/WPA2-PSK on multi-core CPU and GPU architecture
743 -- 761Chunyan An, Renchao Xie, Hong Ji, Yi Li. Pricing and power control for energy-efficient radio resource management in cognitive femtocell networks
762 -- 778Victor Torres-Padrosa, Marc Manzano, Eusebi Calle, Josep L. Marzo. Community-based traffic preservation in telecommunication networks
779 -- 800Harry Leib, Wenjing Lin. Performance analysis of multi-input multi-output systems with maximum likelihood detection over shadowed fading channels

Volume 28, Issue 3

401 -- 413Xiaolin Jia, Quanyuan Feng. An improved anti-collision protocol for radio frequency identification tag
414 -- 425Yun Jia, Zhongzhao Zhang, Xuezhi Tan, Xin Liu. Asymmetric active cooperation strategy in spectrum sharing game with imperfect information
426 -- 436Yunji Li, Xiaolong Yang, Zeyang Dai, Changming Zhao, Keping Long. A novel rateless codes design scheme based on two-stage encoding and forward equal probability
437 -- 456Ayaz Ahmad, Nadir Shah. A joint resource optimization and adaptive modulation framework for uplink single-carrier frequency-division multiple access systems
457 -- 471Lucas Eznarriaga, Cigdem Sengul, Nico Bayer, José Ignacio Moreno, Patricia Lozano, María Simon. Experiences with SoftToken: a token-based coordination layer for WLANs
472 -- 482Weidong Wang, Jun-an Yang, Chun Zhang. A novel compressed sensing ultra-wideband channel estimation method based on non-convex optimization
483 -- 496Yi Wang, Jun-an Yang, Jun Lu, Hui Liu, Lun-wu Wang. Hierarchical deep belief networks based point process model for keywords spotting in continuous speech
497 -- 512Rajeev Anand Sahu, Sahadeo Padhye. Provable secure identity-based multi-proxy signature scheme
513 -- 533Yuan Sheng Wu, Bing Guo, Yan Shen, Jihe Wang, Xiaobin Liu. Toward energy-proportional Internet core networks: an energy-minimized routing and virtual topology design for Internet protocol layer
534 -- 545Zuowen Tan. An efficient pairing-free identity-based authenticated group key agreement protocol
546 -- 559Ahmad M. Rateb, Sharifah Kamilah Syed Yusof. Recovery error bounds on compressed sensing of noisy signals
560 -- 573Zhi Ren, Shuang Peng, Hong Chen, Jun Fang, Qianbin Chen. Epidemic routing based on adaptive compression of vectors: efficient low-delay routing for opportunistic networks based on adaptive compression of vectors
574 -- 584Ahmed Nabih Zaki Rashed, Abd El Fattah A. Saad. Transmission behavior improvement of electro-optic modulators for integrated photonic systems in the present communication technology
585 -- 600Min Xiang, Chao Wen, Xing Zhe Hou. A hybrid relay control mechanism for ribbon topology in low-voltage power line communication networks

Volume 28, Issue 2

201 -- 212Yuzhen Huang, QiHui Wu, JinLong Wang, Yunpeng Cheng, YuMing Zhang. Unified performance analysis of maximal-ratio combining for spectrum sharing systems with antenna correlation
213 -- 230Sudip Misra, Sukhchain Singh, Manas Khatua, Mohammad S. Obaidat. Extracting mobility pattern from target trajectory in wireless sensor networks
231 -- 249Yunchuan Yang, Wenbo Wang 0007, Hui Zhao. Achievable rate region with secrecy constraints for secure communication in two-way relay networks
250 -- 261Yasmine A. Fahmy, Hoda Hafez, Mohamed M. Khairy. Time domain leakage in DFT-based channel estimation for OFDM systems with guard bands
262 -- 280Jin Wang, Kejie Lu, Shukui Zhang, Jianxi Fan, Yanqin Zhu, Baolei Cheng. An efficient communication relay placement algorithm for content-centric wireless mesh networks
281 -- 295Shang-Juh Kao, Hsiu-Lang Wang. Dynamic Orthogonal Frequency Division Multiple Access resource management for downlink interference avoidance in two-tier networks
296 -- 308Mustapha Khiati, Djamel Djenouri. BOD-LEACH: broadcasting over duty-cycled radio using LEACH clustering for delay/power efficient dissimilation in wireless sensor networks
309 -- 324Said Fouchal, Djamel Mansouri, Lynda Mokdad, M. Iouallalen. Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks
325 -- 343Hai Huang. Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique
344 -- 357Fan Wu, Lili Xu. An improved and provable self-certified digital signature scheme with message recovery
358 -- 373Weiguo Ju, Shanguo Huang, Zhenzhen Xu, Jie Zhang, Wanyi Gu. Spectrum defragmentation in flexgrid optical networks using a genetic algorithm
374 -- 382Xiong Li, Jianwei Niu, Junguo Liao, Wei Liang. Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
383 -- 393Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li. Improvement of robust smart-card-based password authentication scheme
394 -- 400Z.-J. Guan, X.-L. Zhou. An amplify-and-forward and decode-and-forward mixed relay communication system and its performance analysis

Volume 28, Issue 18

2239 -- 2254Sima Ahmadpour, Zohreh Toghrayee, Tat Chee Wan. An extended discrete autoregressive model for variable bit rate video traffic encoded by scalable video codec
2255 -- 2274Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani. Dynamics of a rumor-spreading model with diversity of configurations in scale-free networks
2275 -- 2288Shuang Qin, Gang Feng. Performance modeling of data transmission by using random linear network coding in DTNs
2289 -- 2310Huan Yan, Deyun Gao, Wei Su, Han-Chieh Chao. A forwarding strategy of counteracting redundancy data in named data networking
2311 -- 2325Jaehyo Jung, Jihoon Lee, Jihwan Lee, Youn Tae Kim. A smartphone-based U-Healthcare system for real-time monitoring of acute myocardial infarction

Volume 28, Issue 17

2167 -- 2179Jing Ren, Kejie Lu, Fei Tang, Jin Wang, Jianping Wang, Sheng Wang, Shucheng Liu. CAKA: a novel cache-aware K-anycast routing scheme for publish/subscribe-based information-centric network
2180 -- 2196Hien Nguyen, Ebtissam Wahman, Niki Pissinou, S. S. Iyengar, Kia Makki. Mobile learning object authoring tool and management system for mobile ad hoc wireless networks
2197 -- 2213Najam Ul Hasan, Wanqing Tu. On energy-efficient performance-guaranteed channel assignment in cognitive radio-based wireless mesh networks
2214 -- 2238Datong Xu, Pinyi Ren, Li Sun. ESPS scheme for two-tier interference suppression in a heterogeneous network with cooperative femtocells

Volume 28, Issue 16

2099 -- 2111Yuxi Liu, Sitong Lv, Peng Chen. Capacity of SSTS for downlink-distributed antenna systems in multicell environment
2112 -- 2121Panagiotis Melidis, Petros Nicopolitidis, Georgios I. Papadimitriou, Emmanouel A. Varvarigos. Green optical backbone networks: virtual topology adaptation using a page rank-based rating system
2122 -- 2144Doraid Dalalah. Proportional fairness: more secrets revealed
2145 -- 2166Jiankang Ren, Guowei Wu, Xinjiao Li, Poria Pirozmand, Mohammad S. Obaidat. Probabilistic response-time analysis for real-time systems in body area sensor networks

Volume 28, Issue 15

2035 -- 2050Yahui Wu, Su Deng, Hongbin Huang. Performance analysis of hop-limited epidemic routing in DTN with limited forwarding times
2051 -- 2066Basab Chatterjee, B. N. Biswas, Sudhbindu Ray. A novel DSP-based PFC-DPLL with fuzzy controlled acquisition aid to improve acquisition performance and noise immunity
2067 -- 2081Joona Kannisto, Takeshi Takahashi, Jarmo Harju, Seppo Heikkinen, Marko Helenius, Shin'ichiro Matsuo, Bilhanan Silverajan. A non-repudiable negotiation protocol for security service level agreements
2082 -- 2097Kuo-Lung Wang, Tsan-Pin Wang, Chien-Chao Tseng. Reducing wireless multi-hop delay via RSU re-routing in vehicular wireless networks

Volume 28, Issue 14

1965 -- 1986Masafumi Hashimoto, Go Hasegawa, Masayuki Murata. An analysis of energy consumption for TCP data transfer with burst transmission over a wireless LAN
1987 -- 2002Maurizio Aiello, Maurizio Mongelli, Gianluca Papaleo. DNS tunneling detection through statistical fingerprints of protocol messages and machine learning
2003 -- 2019Harris Simaremare, Abdelhafid Abouaissa, Riri Fitri Sari, Pascal Lorenz. Security and performance enhancement of AODV routing protocol
2020 -- 2034Hiep H. Nguyen, Suk Hwan Lee, Won-Joo Hwang. Optimal resource allocation for energy efficiency in coordinated multicell OFDMA networks

Volume 28, Issue 13

1899 -- 1920Sung Won Ahn, Chuck Yoo, Shinhyung Lee, Hyung-Soo Lee, Sung-Jo Kim. Implementing virtual platform for global-scale cyber physical system networks
1921 -- 1930Min Lin, Heng Wei, Kang An, Jian Ouyang, Yongming Huang. Effect of imperfect channel state information and co-channel interferences on two-hop fixed gain amplify-and-forward relay networks with beamforming
1931 -- 1954Jun-Da Chen, Fang-Biau Ueng, Ye-Shun Shen, Yuan-Hung Cheng. Performance analyses of adaptive noncoherent receivers for MC-CDMA communications
1955 -- 1963Jia-Lun Tsai, Nai-Wei Lo. A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card

Volume 28, Issue 12

1829 -- 1846Michael Slavik, Imad Mahgoub, Mohammed Alwakeel. Efficient multi-hop wireless broadcast protocol in vehicular networks using automated threshold function design
1847 -- 1861Hang Long, Wei Xiang, Jing Wang, Xiaoli Zhang, Wenbo Wang 0007. Enhancing secrecy capacity of multi-relay wiretap systems with partial channel state information
1862 -- 1883Kavitha Athota, Atul Negi. A topology preserving cluster-based channel assignment for wireless mesh networks
1884 -- 1897Jun Liu, Nan Chang, Sanguo Zhang, Zhenming Lei. Recognizing and characterizing dynamics of cellular devices in cellular data network through massive data analysis

Volume 28, Issue 11

1729 -- 1740Hoang-Linh To, Suk Hwan Lee, Won-Joo Hwang. A burst loss probability model with impatient customer feature for optical burst switching networks
1741 -- 1752Jiann-Liang Chen, San-Peng Kao. QoS mechanism for virtualized wireless networks with software-defined networking
1753 -- 1771Igor Bisio, Fabio Lavagetto, Mario Marchese, Andrea Sciarrone. A smartphone-centric platform for remote health monitoring of heart failure
1772 -- 1788Zhijun Wu, Meng Yue, Douzhe Li, Ke Xie. SEDP-based detection of low-rate DoS attacks
1789 -- 1804Lei Shi, Zheng Yao, Baoxian Zhang, Cheng Li, Jian Ma. An efficient distributed routing protocol for wireless sensor networks with mobile sinks
1805 -- 1827Fenghua Wang, Dongliang Xie, Jingyu Wang, Peng Zhang, Yan Shi. Paths selection-based resequencing queue length in concurrent multipath transfer

Volume 28, Issue 10

1621 -- 1627An Li, Yizhu Xu, Yuhao Wang, Lihua Sun. Amplify-and-forward-based cooperative jamming strategy with power allocation for secure communication
1628 -- 1639Sukin Kang, Jonguk Kim, Manpyo Hong. Button-based method for the prevention of near field communication relay attacks
1640 -- 1656Shashika Biyanwilage, Upul Gunawardana, Ranjith Liyanapathirana. Power allocation in OFDM cognitive radio relay networks with outdated channel state information
1657 -- 1674Wan Du, David Navarro, Fabien Mieyeville. Performance evaluation of IEEE 802.15.4 sensor networks in industrial applications
1675 -- 1691Jui-Chi Chang, Fang-Biau Ueng, Hsuan-Fu Wang, Ming-Hsiao Hsu. Multiuser MIMO receivers for space frequency block coded SC-FDMA systems
1692 -- 1708Wenjun Xu, Yan Wang, Kai Niu, Zhiqiang He, Jiaru Lin. Joint overlay and underlay resource allocation with weighted fairness in OFDM-based cognitive radio systems
1709 -- 1728Haifeng Zhou, Liansheng Tan, Fei Ge, Sammy Chan. Traffic matrix estimation: Advanced-Tomogravity method based on a precise gravity model

Volume 28, Issue 1

1 -- 18Suleiman Zubair, Norsheila Fisal, Mohammed B. Abazeed, Bala Alhaji Salihu, Adnan Shahid Khan. Lightweight distributed geographical: a lightweight distributed protocol for virtual clustering in geographical forwarding cognitive radio sensor networks
19 -- 37Xiaocheng Wang, Qiaoni Han, Xin-Ping Guan, Kai Ma. Price-based interference management in dense femtocell systems
38 -- 48Guan Gui, Fumiyuki Adachi. Adaptive sparse system identification using normalized least mean fourth algorithm
49 -- 70Xiuquan Qiao, Sida Xue, Junliang Chen, Anna Fensel. A lightweight convergent personal mobile service delivery approach based on phone book
71 -- 90Mamoun F. Al-Mistarihi, Rami Mohaisen, Ashraf Sharaqa, Mohammad Al-Shurman, Khalid A. Darabkh. Performance evaluation of multiuser diversity in multiuser two-hop cooperative multi-relay wireless networks using maximal ratio combining over Rayleigh fading channels
91 -- 111K. S. Deepak, Anchare V. Babu. Improving energy efficiency of incremental relay based cooperative communications in wireless body area networks
112 -- 126Hongjuan Yang, Peter Han Joo Chong, Weixiao Meng, Bo Li, Yong Liang Guan. Cooperative quadrature physical layer network coding in wireless relay networks
127 -- 146Xiaonan Wang, Huanyan Qian. Dynamic and hierarchical IPv6 address configuration for a mobile ad hoc network
147 -- 160I. S. Amiri, S. E. Alavi, J. Ali. High-capacity soliton transmission for indoor and outdoor communications using integrated ring resonators
161 -- 166Petros Nicopolitidis. Performance fairness across multiple applications in wireless push systems
167 -- 186Yanzhe Che, Qinming He, Xiaoyan Hong, Kevin Chiew. X-Region: A framework for location privacy preservation in mobile peer-to-peer networks
187 -- 200Ming-Yang Su, Chen-Han Tsai. Using data mining approaches to identify voice over IP spam