Journal: IEEE Network

Volume 27, Issue 6

2 -- 0Xuemin Shen. Open all articles [Editor's Note]
4 -- 5Zuqing Zhu, S. J. Ben Yoo, Zhaohui Li, Nicolas K. Fontaine. Optical networks in cloud computing [Guest Editorial]
6 -- 13Li Tao, Yu Ji, Jie Liu, Alan Pak Tao Lau, Nan Chi, Chao Lu. Advanced modulation formats for short reach optical communication systems
14 -- 22Jordi Perelló, Salvatore Spadaro, Sergio Ricciardi, Davide Careglio, Shuping Peng, Reza Nejabati, Georgios Zervas, Dimitra Simeonidou, Alessandro Predieri, Matteo Biancani, Harm J. S. Dorren, Stefano Di Lucente, Jun Luo, Nicola Calabretta, Giacomo Bernini, Nicola Ciulli, José Carlos Sancho, Steluta Iordache, Montse Farreras, Yolanda Becerra, Chris Liou, Iftekhar Hussain, Yawei Yin, Lei Liu, Roberto Proietti. All-optical packet/circuit switching-based data center network for enhanced scalability, latency, and throughput
23 -- 30Luis Velasco, Adria Asensio, Alberto Castro, Josep Lluis Berral, David Carrera, Víctor López, Juan P. Fernández Palacios. Cross-stratum orchestration and flexgrid optical networks for data center federations
31 -- 35Mina Taheri, Nirwan Ansari. A feasible solution to provide cloud computing over optical networks
36 -- 43Uttam Mandal, M. Farhan Habib, Shuqiang Zhang, Biswanath Mukherjee, Massimo Tornatore. Greening the cloud using renewable-energy-aware service migration
44 -- 51Miroslaw Klinkowski, Krzysztof Walkowiak. On the advantages of elastic optical networks for provisioning of cloud computing traffic
52 -- 58Weigang Hou, Lei Guo, Yejun Liu, Qingyang Song, Xuetao Wei. Virtual network planning for converged optical and data centers: ideas and challenges
60 -- 65Hongbin Luo, Yi Lin, Hongke Zhang, Moshe Zukerman. Preventing DDoS attacks by identifier/locator separation
66 -- 73Guangwu Hu, Ke Xu, Jianping Wu, Yong Cui, Fan Shi. A general framework of source address validation and traceback for IPv4/IPv6 transition scenarios
74 -- 79Yousef-Awwad Daraghmi, Chih-Wei Yi, Ivan Stojmenovic. Forwarding methods in data dissemination and routing protocols for vehicular Ad Hoc networks
80 -- 88Reza Farahbakhsh, Noël Crespi, Ángel Cuevas, Rubén Cuevas Rumín, Roberto Gonzalez. Understanding the evolution of multimedia content in the internet through bittorrent glasses
89 -- 94Xiaohua Tian, Yu Cheng. Bloom filter-based scalable multicast: methodology, design and application
95 -- 104Katarzyna Kosek-Szott, Marek Natkaniec, Szymon Szott, Artem Krasilov, Andrey Lyakhov, Alexander Safonov, Ilenia Tinnirello. What's new for QoS in IEEE 802.11?

Volume 27, Issue 5

4 -- 5Victor C. M. Leung, Min Chen, Mohsen Guizani, Branka Vucetic. Cloud-assisted mobile computing and pervasive services [Guest Editorial]
6 -- 11Dijiang Huang, Tianyi Xing, Huijun Wu. Mobile cloud computing service models: a user-centric approach
12 -- 19Tarik Taleb, Adlen Ksentini. Follow me cloud: interworking federated clouds and distributed mobile networks
20 -- 27Muhamad Felemban, Saleh Basalamah, Arif Ghafoor. A distributed cloud architecture for mobile multimedia services
28 -- 33Xiaoqiang Ma, Yuan Zhao, Lei Zhang, Haiyang Wang, Limei Peng. When mobile terminals meet the cloud: computation offloading as the bridge
34 -- 40Weiwen Zhang, Yonggang Wen, Jun Wu, Hui Li. Toward a unified elastic computing platform for smartphones with cloud support
42 -- 47Yunhao Liu, Xufei Mao, Yuan He, Kebin Liu, Wei Gong, Jiliang Wang. CitySee: not only a wireless sensor network
48 -- 55Rong Yu, Yan Zhang, Stein Gjessing, Wenlong Xia, Kun Yang. Toward cloud-based vehicular networks with efficient resource management
56 -- 61Jiafu Wan, Caifeng Zou, Sana Ullah, Chin-Feng Lai, Ming Zhou, Xiaofei Wang. Cloud-enabled wireless body area networks for pervasive healthcare
62 -- 68Yong woon Ahn, Albert M. K. Cheng, Jinsuk Baek, Minho Jo, Hsiao-Hwa Chen. An auto-scaling mechanism for virtual resources to support mobile, pervasive, real-time healthcare applications in cloud computing

Volume 27, Issue 4

1 -- 0Xuemin Shen. Open call [Editor's Note]
1 -- 0Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. Thomas Hou. Toward privacy-assured and searchable cloud data storage services
1 -- 0Ye Yan, Rose Qingyang Hu, Sajal K. Das, Hamid Sharif, Yi Qian. An efficient security protocol for advanced metering infrastructure in smart grid
1 -- 0Ryan Shea, Jiangchuan Liu, Edith C. H. Ngai, Yong Cui. Cloud gaming: architecture and performance
1 -- 0Chi Harold Liu, Andreas Kind, Athanasios V. Vasilakos. Sketching the data center network traffic
1 -- 0Toshikazu Sakano, Zubair Md. Fadlullah, Ngo Duc Thuan, Hiroki Nishiyama, Masataka Nakazawa, Fumiyuki Adachi, Nei Kato, Atsushi Takahara, Tomoaki Kumagai, Hiromichi Kasahara, Shigeki Kurihara. Disaster-resilient networking: a new vision based on movable and deployable resource units
1 -- 0Min Chen, Hai Jin, Yonggang Wen, Victor C. M. Leung. Enabling technologies for future data center networking: a primer
1 -- 0Saigopal Thota, Partha Bhaumik, Pulak Chowdhury, Biswanath Mukherjee, Suman Sarkar. Exploiting wireless connectivity for robustness in WOBAN
1 -- 0Yu Cheng. New books and multimedia
1 -- 0Yueping Cai, Yao Yan, Zhenghao Zhang, Yuanyuan Yang. Survey on converged data center networks with DCB and FCoE: standards and protocols
1 -- 0Diep N. Nguyen, Marwan Krunz. Cooperative MIMO in wireless networks: recent developments and challenges
1 -- 0Jiao Zhang, Fengyuan Ren, Chuang Lin. Survey on transport control in data center networks
1 -- 0Bo Li 0001, Baochun Li, Fangming Liu. Cloud and data center performance [Guest Editorial]

Volume 27, Issue 3

2 -- 0Kui Ren, Haojin Zhu, Zhu Han, Radha Poovendran. Security in cognitive radio networks [Guest Editorial]
4 -- 9Kefeng Tan, Shraboni Jana, Parth H. Pathak, Prasant Mohapatra. On insider misbehavior detection in cognitive radio networks
10 -- 15Roberto Di Pietro, Gabriele Oligeri. Jamming mitigation in cognitive radio networks
16 -- 21Kaigui Bian, Jung-Min Park 0001, Xiaojiang Du, Xiaoming Li. Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention
22 -- 27Changlong Chen, Min Song, Chunsheng Xin, Jonathan D. Backens. A game-theoretical anti-jamming scheme for cognitive radio networks
28 -- 33Zhihui Shu, Yi Qian, Song Ci. On physical layer security for cognitive radio networks
34 -- 39Hong Wen, Shaoqian Li, XiPing Zhu, Liang Zhou. A framework of the PHY-layer approach to defense against security threats in cognitive radio networks
40 -- 45Yan Zhang, Loukas Lazos. Vulnerabilities of cognitive radio MAC protocols and countermeasures
46 -- 50Minho Jo, Longzhe Han, Do-Hoon Kim, Hoh Peter In. Selfish attacks and detection in cognitive radio Ad-Hoc networks
51 -- 55Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, Mostafa Fouda. Intrusion detection system (IDS) for combating attacks against cognitive radio networks

Volume 27, Issue 2

2 -- 3Xuemin Shen. Green wireless communication networks [Editor's note]
4 -- 0Yu Cheng. New books and multimedia
6 -- 7Carlos Jesus Bernardos, Ulas C. Kozat, Joerg Widmer, Michele Zorzi. Video over mobile networks [Guest editorial]
8 -- 14Bo Fu, Daniele Munaretto, Telemaco Melia, Bessem Sayadi, Wolfgang Kellerer. Analyzing the combination of different approaches for video transport optimization for next generation cellular networks
14 -- 21Faqir Zarrar Yousaf, Marco Liebsch, Andreas Maeder, Stefan Schmid. Mobile CDN enhancements for QoE-improved content delivery in mobile operator networks
22 -- 27Yi Sun, Yang Guo, Zhenyu Li, Jiali Lin, Gaogang Xie, Xiaobing Zhang, Kavé Salamatian. The case for P2P mobile video system over wireless broadband networks: A practical study of challenges for a mobile video provider
28 -- 33Dong-Hoon Shin, Danny Moses, Muthaiah Venkatachalam, Saurabh Bagchi. Distributed mobility management for efficient video delivery over all-IP mobile networks: Competing approaches
34 -- 40Panayiotis Kolios, Vasilis Friderikos, Katerina Papadaki 0001. Energy-aware mobile video transmission utilizing mobility
40 -- 46Yeonchul Shin, Munhwan Choi, Jonghoe Koo, Sunghyun Choi. Video multicast over WLANs: Power saving and reliability perspectives

Volume 27, Issue 1

2 -- 0Xuemin Shen. Editor's note
3 -- 4Saeed Abu-Nimeh, Ernest Foo, Igor Nai Fovino, Manimaran Govindarasu, Thomas Morris. Cyber security of networked critical infrastructures [Guest Editorial]
5 -- 11Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah. Authentication and authorization mechanisms for substation automation in smart grid network
12 -- 18Huayang Cao, Peidong Zhu, Xicheng Lu, Andrei Gurtov. A layered encryption mechanism for networked critical infrastructures
19 -- 24Saurabh Amin, Galina A. Schwartz, Alefiya Hussain. In quest of benchmarking security risks to cyber-physical systems
25 -- 31Emiliano Casalicchio, Marco Caselli, Alessio Coletta. Measuring the global domain name system
32 -- 36Emiliano De Cristofaro, Claudio Soriente. Participatory privacy: Enabling privacy in participatory sensing
37 -- 44Salekul Islam, Jean-Charles Grégoire. Converged access of IMS and web services: A virtual client model
45 -- 51Nuno Filipe Coutinho, Susana Sargento. On the analysis of hierarchical autonomic control of multiparty services
52 -- 58Chaitanya S. K. Vadrevu, Massimo Tornatore, Chin Guok, Inder Monga, Biswanath Mukherjee. Vertical and horizontal circuit/packet integration techniques for the future optical internet
59 -- 64Aniket Mahanti, Niklas Carlsson, Anirban Mahanti, Martin F. Arlitt, Carey Williamson. A tale of the tails: Power-laws in internet measurements