Journal: J. High Speed Networks

Volume 15, Issue 4

329 -- 340Chu-Chuan Lee, Pao-Chi Chang. Integrated traffic modeling and frame skipping for pre-stored streaming videos over cellular networks
341 -- 355Maria Rizzi, Beniamino Castagnolo. Modelling and simulation of a large strictly nonblocking fault-tolerant network
357 -- 378Mingsheng Peng, S. Jagannathan, S. R. Subramanya. Rate-based end-to-end congestion control of multimedia traffic in packet switched networks
379 -- 398Lan Kong, Maher Ali, Jitender S. Deogun. Building Redundant Multicast Trees for Preplanned Recovery in WDM optical networks
399 -- 414Anwar Alyatama. Computing the equivalent Poisson traffic for the Wavelength Decomposition Method
415 -- 432Mário M. Freire, Henrique J. A. da Silva. Assessment of blocking performance in WDM chordal ring networks
433 -- 454Girish V. Chowdhary, C. Siva Ram Murthy. Efficient routing of sub-wavelength multicast sessions in WDM mesh networks

Volume 15, Issue 3

207 -- 208. Managing security policies: Modeling, verification and configuration
209 -- 227Hazem Hamed, Ehab Al-Shaer. On autonomic optimization of firewall policy organization
229 -- 245Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington. Client-side access control enforcement using trusted computing and PEI models
247 -- 260Romain Laborde, François Barrère, Abdelmalek Benzekri. Network security policy refinement process: Expression and analysis
261 -- 273Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart. Reconfiguring Role Based Access Control policies using risk semantics
275 -- 289Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shyhtsun Felix Wu. IPsec/VPN security policy correctness and assurance
291 -- 300Alan Ganek, Anthony J. Nadalin, Nataraj Nagaratnam, Dinesh Verma. An autonomic approach for managing security and identity management policies in enterprises
301 -- 313Simon N. Foley, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O Connor, John P. Morrison. Supporting heterogeneous middleware security policies in WebCom
315 -- 327Lu ay A. Wahsheh, Jim Alves-Foss. Specifying and enforcing a multi-policy paradigm for high assurance multi-enclave systems

Volume 15, Issue 2

111 -- 122Yen Chieh Ouyang, Ching-Wen Yang, Wei Shi Lian. Neural networks based variable bit rate traffic prediction for traffic control using multiple leaky bucket
123 -- 130Baoxian Zhang, Hussein T. Mouftah. Destination-driven shortest path tree algorithms
131 -- 155Galia Shabtai, Israel Cidon, Moshe Sidi. Two priority buffered multistage interconnection networks
157 -- 172Khaled Salah, K. El-Badawi. Throughput-delay analysis of interrupt-driven kernels with DMA enabled and disabled in high-speed networks
173 -- 183Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy. Convergence of IPsec in presence of resets
185 -- 205Haci A. Mantar, Ibrahim T. Okumus, Junseok Hwang, Steve J. Chapin. A scalable intra-domain resource management architecture for DiffServ networks

Volume 15, Issue 1

1 -- 3Suresh Subramaniam, Krishna M. Sivalingam, G. Manimaran. Selected papers from Trusted Internet Workshop (TIW) 2004
5 -- 19Yih Huang, David Arsenault, Arun Sood. SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates
21 -- 32Olga Gelbart, Bhagirath Narahari, Rahul Simha. SPEE: A Secure Program Execution Environment tool using code integrity checking
33 -- 51Vijay Bhuse, Ajay K. Gupta. Anomaly intrusion detection in wireless sensor networks
53 -- 72B. Venkata Ramana, B. S. Manoj, C. Siva Ram Murthy. AR-TCP: A Loss-Aware Adaptive Rate based TCP for Ad hoc Wireless Networks
73 -- 92Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy. A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks
93 -- 109Manel Guerrero Zapata. Key management and delayed verification for Ad hoc networks