Journal: IEEE Network

Volume 23, Issue 6

2 -- 3T. M. Chen. Editor s note
4 -- 5Olivier Bonaventure. New books and multimedia
6 -- 7Antonio Sánchez-Esguevillas, Belén Carro, B. Wei, W. Feng. Guest editorial
8 -- 16Spyridon L. Tompros, Nikolaos P. Mouratidis, M. Draaijer, Andreas Foglar, Halid Hrasnica. Enabling applicability of energy saving applications on the appliances of the home environment
16 -- 20Alejandro Fernández-Montes, Luis González Abril, Juan Antonio Ortega, Francisco Velasco Morente. A study on saving energy in artificial lighting by making smart use of wireless sensor networks and actuators
22 -- 28Jin-Hwan Jeong, Yong-Ju Lee, SongWoo Sok, Hag-Young Kim, Kimyoo-Hyun Park. Cable-TV-based home video streaming system: practice and experience
30 -- 35Iván Vidal, Jaime García-Reinoso, Francisco Valera, Alex Bikfalvi. Enabling layered video coding for IMS-based IPTV home services
36 -- 42Javier Aguiar, C. Garcia, H. Vega, A. Martinez, T. de Vega, P. Bouille, A. de Poorter. Multimedia services interoperability in next-generation networks for the residential environment
43 -- 49Javier Aguiar, Carlos Baladrón Zorita, B. De La Cuesta, I. O. Arnal, P. Mignot, G. Carrozzo, P. Comi. Personal multimedia services over a common home and access networking environment
50 -- 56Rob Brennan, David Lewis, John Keeney, Zohar Etzioni, Kevin Feeney, Declan O Sullivan, J. Lozano, Brendan Jennings. Policy-based integration of multiprovider digital home services

Volume 23, Issue 5

2 -- 3T. M. Chen. Future special issues [Editor s note]
4 -- 12Chan-Kyu Han, Hyoung-Kee Choi. Effective discovery of attacks using entropy of packet dynamics
14 -- 20Hyundo Park, Hyogon Kim, Heejo Lee. Is early warning of an imminent worm epidemic possible?
22 -- 29Ting Liu, Xiaohong Guan, Qinghua Zheng, Yu Qu. A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense
30 -- 37Yang Xiao. Flow-net methodology for accountability in wireless networks

Volume 23, Issue 4

2 -- 3Olivier Bonaventure, Steve Uhlig, Mike H. MacGregor. New books and multimedia
4 -- 5Matteo Cesana, Eylem Ekici, Yeheskel Bar-Ness. Networking over multi-hop cognitive networks [Guest Editorial]
6 -- 12Ian F. Akyildiz, Won-Yeol Lee, Kaushik R. Chowdhury. Spectrum management in cognitive radio ad hoc networks
14 -- 19Haythem Bany Salameh, Marwan Krunz. Channel access protocols for multihop opportunistic networks: challenges and recent developments
20 -- 25Hicham Khalife, Naceur Malouch, Serge Fdida. Multihop cognitive radio networks: to route or not to route
26 -- 32Alfred Asterjadhi, Nicola Baldo, Michele Zorzi. A distributed network coded control channel for multihop cognitive radio networks
34 -- 40Özgür B. Akan, O. Karli, O. Ergul. Cognitive radio sensor networks

Volume 23, Issue 3

2 -- 3Chava Vijaya Saradhi, Ashwin Gumaste, Ioannis Tomkos, Daniel C. Kilper. Protocols and algorithms for future cross-layer and hybrid optical networks - [Guest editorial]
4 -- 9Carolina Pinart. A multilayer fault localization framework for IP over all-optical multilayer networks
10 -- 17Marwan Batayneh, Biswanath Mukherjee, Dominic A. Schupke, Marco Hoffmann, A. Kirstaedter. Carrier-grade ethernet: etherpath protection vs. ethertunnel protection
18 -- 25Chongyang Xie, Nasir Ghani, Qing Liu, R. Kouatang, Wei Wennie Shu, Yan Qiao, Minyou Wu, Shuping Peng. Traffic engineering for ethernet over SONET/SDH: advances and frontiers
26 -- 33Kostas Christodoulopoulos, Konstantinos Manousakis, Emmanouel A. Varvarigos, Marianna Angelou. Considering physical layer impairments in offline RWA
34 -- 40Nicola Sambo, Nicola Andriolli, Alessio Giorgetti, Luca Valcarenghi, Isabella Cerutti, Piero Castoldi, Filippo Cugini. GMPLS-controlled dynamic translucent optical networks
41 -- 48Pulak Chowdhury, Biswanath Mukherjee, Suman Sarkar, G. Kramer, Sudhir S. Dixit. Hybrid wireless-optical broadband access network(woban) : prototype development and research challenges

Volume 23, Issue 2

2 -- 3Ioanis Nikolaidis. Handover [editor s note]
4 -- 0Olivier Bonaventure. New books and multimedia
5 -- 10Aiko Pras, Lambert J. M. Nieuwenhuis, Remco van de Meent, Michel Mandjes. Dimensioning network links: a new look at equivalent bandwidth
11 -- 19Piotr Cholda, János Tapolcai, Tibor Cinkler, Krzysztof Wajda, Andrzej Jajszczyk. Quality of resilience as a network reliability characterization tool
20 -- 26Emir Halepovic, Carey L. Williamson, Majid Ghaderi. Wireless data traffic: a decade of change
27 -- 34Xiao Zheng, Behçet Sarikaya. Handover keying and its uses
35 -- 42Dhafer Ben Khedher, Roch H. Glitho, Rachida Dssouli. Media handling for multimedia conferencing in multihop cellular networks
43 -- 48Di Ma, Claudio Soriente, Gene Tsudik. New adversary and new threats: security in unattended sensor networks

Volume 23, Issue 1

2 -- 0Ioanis Nikolaidis. Risk homeostasis and network security [editor s note]
4 -- 5Thomas Chen, Zhi Fu, Liwen He, Tim Strayer. Recent developments in network intrusion detection [guest editorial]
6 -- 12Georgios Androulidakis, Vasilis Chatzigiannakis, Symeon Papavassiliou. Network anomaly detection and classification via opportunistic sampling
14 -- 21Benfano Soewito, Lucas Vespa, Atul Mahajan, Ning Weng, Haibo Wang. Self-addressable memory-based FSM: a scalable intrusion detection engine
22 -- 28Shashank Shanbhag, Tilman Wolf. Accurate anomaly detection through parallelism
30 -- 35Gianni Antichi, Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci. Counting bloom filters for pattern matching and anti-evasion at the wire speed
36 -- 41André O. Castelucio, Artur Ziviani, Ronaldo M. Salles. An AS-level overlay network for IP traceback
42 -- 47Jiankun Hu, Xinghuo Yu, D. Qiu, Hsiao-Hwa Chen. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection