Journal: JCM

Volume 5, Issue 9

647 -- 653Tingyu Wang, Sha Lu. A Low-cost Four-degree-of-freedom Motion-platform for Ship-borne Free Space Laser Communication
654 -- 664RuiYing Du, Chunyu Ai, Longjiang Guo, Jing Chen, Jianwei Liu, Jing He, Yingshu Li. A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks
665 -- 673Zuzhi Fan, Yuanzhu Peter Chen. Mobility-assisted Hierarchy for Efficient Data Collection in Wireless Sensor Networks
674 -- 683Govind R. Kadambi, Kumaresh Krishnan, B. R. Karthikeyan. HF Channel Estimation for MIMO Systems based on Particle Filter Technique
684 -- 691Hengkui Wu, Deyun Gao, Dong Yang, Hongke Zhang. A Novel Data-Oriented Name Service
692 -- 702Kouji Hirata, Khamisi Kalegele, Yoshinobu Higami, Shin-ya Kobayashi. Replica Selection and Downloading based on Wavelength Availability in λ-grid Networks
703 -- 714Xiao Su, Yan Bai, Suchreet K. Dhaliwal. On Optimal File Distribution in Practical Mesh-Based Overlay Networks

Volume 5, Issue 8

581 -- 582Khan Mohammad Iftekharuddin, Mohammed Nazrul Islam, Mohammad Ataul Karim, Mohammad A. Salam. Guest Editorial
583 -- 592Salah S. Al-Majeed, Martin Fleury. Applying Multi-Connection Video Streaming to WiMAX Broadband Wireless
593 -- 603Muhammad Mahfuzul Alam, Md. Majharul Islam Rajib, Sumon Jumar Biswas. Design and Performance Analysis of Smart Antenna System for DECT Radio Base Station in Wireless Local Loop
604 -- 611Ruixue Li, Zhiyi Fang. LLA: A New High Precision Mobile Node Localization Algorithm Based on TOA
612 -- 619Khaled Mahbub Morshed, Debabrata Kumar Karmokar, Mitun Talukder. Numerical and Experimental Analysis of Impedance Matched Inverted-L and Stair Inverted-L Antenna for 5 GHz WLAN Operation
620 -- 626Li-Ping Zhang, Yi Wang. An ID-Based Authenticated Key Agreement Protocol for Wireless Sensor Networks
627 -- 636Jannatul Ferdous, Tanay Dey. A Comprehensive Analysis of CBCDACP in Wireless Sensor Networks
637 -- 645Priti R. Hathy, Sasmita Kumari Padhy, Siba Prasada Panigrahi, Prashant K. Patra. A Novel Channel Equalizer Using Large Margin Algebraic Perceptron Network

Volume 5, Issue 7

509 -- 510Khan Mohammad Iftekharuddin, Mohammed Nazrul Islam, Mohammad Ataul Karim, Mohammad A. Salam. Guest Editorial
511 -- 520Zhao Li, Jiawei Yang, Junliang Yao. Adaptive Opportunistic Transmission in MU-MIMO Downlink with Reduced Feedback
521 -- 529Abolfazl Mehbodniya, Sonia Aïssa, Jalil Chitizadeh. A Location-Aware Vertical Handoff Algorithm for Hybrid Networks
530 -- 536Ping Wang, Lijun Zu, Fuqiang Liu, Yiling Wang. A Radio Resource Allocation Algorithm for QoS Provision in PMP-based Systems
537 -- 544Sabbir Ahmed, Makoto Kawai. Adaptive Selection of Spreading Code Subsets from Orthogonal Binary Code Sets for Reduced PAPR in MC-CDMA Systems
545 -- 550Li-Ping Zhang, Yi Wang. A New Group Key Agreement Protocol for Ad Hoc Networks
551 -- 561Khalid A. Darabkh. Queuing Analysis and Simulation of Wireless Access and End Point Systems using Fano Decoding
562 -- 570Shujaat Ali Khan Tanoli, Imran Khan, Nandana Rajatheva. Cooperative Networks: Bit-Interleaved Coded Modulation with Iterative Decoding
571 -- 580Farah Haroon, Kazi Mohiuddin Ahmed. An Adaptive IEEE 802.15.4a TH-TDMA UWB Industrial Field Level Network

Volume 5, Issue 6

445 -- 446Hsiao-Chun Wu, Tho Le-Ngoc, Jitendra K. Tugnait, Shih Yu Chang. Guest Editorial
447 -- 454M. Shamim Kaiser, Kazi Mohiuddin Ahmed. Radio Resource Allocation for Heterogeneous Services in Relay Enhanced OFDMA Systems
455 -- 466Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat, Min Song. A Low-Complexity Optimum Multiuser Receiver for DS-CDMA Wireless Systems
467 -- 474Bin Wang, Jinkuan Wang, Xin Song, Yinghua Han. Research on Adaptive Waveform Selection Algorithm in Cognitive Radar
475 -- 482Jui-Fa Chen, Ying-Hong Wang, Kuo-Feng Huang, Ting-Wei Chang. Grid-based Mobile Target Tracking Mechanism in Wireless Sensor Networks
483 -- 492Kung Yao, Flavio Lorenzelli. Analysis of Performance Degradation using Convex Optimization for a Mismatched Receiver
493 -- 500Shang-hui Xiao, Zhong-pei Zhang, Zhi-ping Shi. Notice of Violation of Academy Publisher Publication Principles "Clustered Multi-point Coordinating Transmission Systems with the Reduced Overhead"
501 -- 508Jih-Hsin Ho. Performance Evaluation of Transmission Algorithms for CSMA/ID WDM Ring Networks

Volume 5, Issue 5

355 -- 357Fan Zhai, Homer H. Chen, Thomas Stockhammer, Touradj Ebrahimi. Guest Editorial
358 -- 373Marie-José Montpetit, Thomas Mirlacher, Michael Ketcham. IPTV: An End to End Perspective (Invited Paper)
374 -- 389JongWon Kim, Sangwoo Han, Dong-Hoon Yi, Namgon Kim, C. C. Jay Kuo. Media-Oriented Service Composition with Service Overlay Networks: Challenges, Approaches and Future Trends (Invited Paper)
390 -- 399Ajmal Muhammad, Peter Johansson, Robert Forchheimer. Performance Evaluation of Rate-Control Strategies for real-time Systems Over a Rate-Varying Channel
400 -- 408Kun Guo, Yong Hei, Shushan Qiao. A Parallel-Layered Belief-Propagation Decoder for Non-layered LDPC Codes
409 -- 424Carlo Bellettini, Gianluca Mazzini. A Framework for Robust Audio Fingerprinting
425 -- 435Kouji Hirata, Khamisi Kalegele, Yoshinobu Higami, Shin-ya Kobayashi. Dynamic Parallel Downloading with Network Coding in /lambda -Grid Networks
436 -- 443Zuowen Tan. An Enhanced Three-Party Authentication Key Exchange Protocol for Mobile Commerce Environments

Volume 5, Issue 4

263 -- 264Xiang-Gen Xia, Wei Zhang, See Ho Ting. Guest Editorial
265 -- 281K. Vinodh, N. Prakash, V. Lalitha, P. Vijay Kumar. DMT of Wireless Networks: An Overview (Invited Paper)
297 -- 306Imran Khan, Shujaat Ali Khan Tanoli, Nandana Rajatheva. Performance Bounds for Bit-Interleaved Space-Time Coded Modulation with Iterative Decoding based Cooperative Network
307 -- 316Weijia Lei, Xianzhong Xie, Guangjun Li. Performance Analysis of Wireless Dynamic Cooperative Relay Networks Using Fountain Codes
317 -- 331Feng Tian, Xiang-Gen Xia, Wing-Kin Ma, Pak-Chung Ching. On the Full Diversity Property of A Space-Frequency Code Family with Multiple Carrier Frequency Offsets in Cooperative Communication Systems
332 -- 339De-Li Jia, Gang Wu, Wei Lin, Shaoqian Li. Downlink Cooperative Transmission by Superposition Modulation: Performance Analysis and Power Allocation Strategy
340 -- 347Shuang Qin, Gang Feng, Yide Zhang. Cooperative Communications for Reliable Data Transport with Fountain Codes
348 -- 353Xiaojuan Zhang, Yi Gong. A Simple Amplify-and-Forward Relaying Scheme Based on Clipping and Forwarding for Dual-Hop Transmissions

Volume 5, Issue 3

179 -- 180Min Song, Yang Yang, Fang Sheng. Guest Editorial
181 -- 188Harry Gao, Seth Utecht, Gregory Patrick, George Hsieh, Fengyuan Xu, Haodong Wang, Qun Li. High Speed Data Routing in Vehicular Sensor Networks
189 -- 196Paulo Alexandre Correia da Silva Neves, Joel José Puga Coelho Rodrigues. Internet Protocol over Wireless Sensor Networks, from Myth to Reality
197 -- 204Simon Hauger, Michael Scharf, Jochen Kögel, Chawapong Suriyajan. Evaluation of Router Implementations for Explicit Congestion Control Schemes
205 -- 210Joseph Y. Hui, Lingie Li. First-Fit Scheduling for Multi-Stage Packet Switching Networks
211 -- 231José Núñez-Martínez, Josep Mangues-Bafalluy. A Survey on Routing Protocols that really Exploit Wireless Mesh Network Features
232 -- 238Chongqing Zhang. Cluster-based Routing Algorithms Using Spatial Data Correlation for Wireless Sensor Networks
239 -- 246Ronghui Hou, Ka-Chung Leung, King-Shan Lui, Ka-Cheong Leung, Fred Baker. Aggregation-Based QoS Routing in the Internet
247 -- 261John D. Garofalakis, Eleftherios Stergiou. An Approximate Analytical Performance Model for Multistage Interconnection Networks with Backpressure Blocking Mechanism

Volume 5, Issue 2

89 -- 91Joel J. P. C. Rodrigues, Farid Farahmand, Wai Chen. Guest Editorial
92 -- 105Ari Keränen, Teemu Kärkkäinen, Jörg Ott. Simulating Mobility and DTNs with the ONE (Invited Paper)
106 -- 116Carlo Caini, Rosario Firrincieli, Marco Livini. DTN Bundle Layer over TCP: Retransmission Algorithms in the Presence of Channel Disruptions
117 -- 129Gabriel Sandulescu, Simin Nadjm-Tehrani. Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
130 -- 143Mingliu Zhang, Richard S. Wolff. A Border Node Based Routing Protocol for Partially Connected Vehicular Ad Hoc Networks
144 -- 151Nesrine Ouferhat, Abdelhamid Mellouk. Stochastic Time Evolving Routing Protocol based on Energy and Delay Metrics
152 -- 163Hany Samuel, Weihua Zhuang. Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks
164 -- 168Abedelaziz Mohaisen, DaeHun Nyang. On the Inefficiency of the Resources Optimal Key Pre-Distribution Scheme for Wireless Sensor Network
169 -- 177Marcos Paredes-Farrera, Martin Fleury, Ken Guild, Mohammed Ghanbari. Measurement and Analysis Study of Congestion Detection for Internet Video Streaming

Volume 5, Issue 1

1 -- 4Athanasios V. Vasilakos, Neal N. Xiong, Laurence Tianruo Yang, Chuan Lin, Lei Shu. Guest Editorial
5 -- 12Chin-Chen Chang, Pei-Yu Lin, Zhi-Hui Wang, Ming-Chu Li. A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper)
13 -- 22Wenping Deng, Peidong Zhu, Xicheng Lu, Bernhard Plattner. On Evaluating BGP Routing Stress Attack
23 -- 30Guangjie Han, Lei Shu, Jianhua Ma, Jong Hyuk Park, Jianjun Ni. Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks
31 -- 38Naixue Xiong, Jing He, Yan Yang, Yanxiang He, Tai-Hoon Kim, Chuan Lin. A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper)
39 -- 49Massimiliano Rak, Rocco Aversa, Beniamino Di Martino, Antonio Sgueglia. Web Services Resilience Evaluation using LDS Load dependent Server Models.
50 -- 56Pramod K. Suri, Kavita Taneja. M3S: Markovian Mobility Management Simulator for Mobility Conscious Routing in Global Networks
57 -- 62Guiyi Wei, Yun Ling, Ye Gu, Yujia Ge. A Dependable Cluster Based Topology in P2P Networks
63 -- 70Hongju Cheng, Naixue Xiong, Guolong Chen, Xiaofang Zhuang. Channel Assignment with Topology Preservation for Multi-radio Wireless Mesh Networks
71 -- 80Toshikazu Uemura, Tadashi Dohi. Optimal Security Patch Management Policies Maximizing System Availability
81 -- 87Zizhong Chen. Adaptive Checkpointing (Invited Paper)