361 | -- | 362 | Sudip Misra, Mischa Dohler, Athanasios V. Vasilakos, Petros Nicopolitidis. Guest editorial - Challenges in next-generation and resource-constrained networks |
363 | -- | 374 | Jinoo Joung, Jeongmin Choi, Seungwook Min, Sunghoon Son, Younglok Kim, Jongtae Song, Young Boo Kim, Chul Soo Kim. A flow admission control in Next Generation Networks with flow aggregate information exchange |
375 | -- | 385 | Jesus Alonso-Zarate, Elli Kartsakli, Marcos D. Katz, Luis Alonso 0001, Christos V. Verikoukis. Multi-Radio Cooperative ARQ in wireless cellular networks: a MAC layer perspective |
387 | -- | 396 | Dániel Krupp, János Levendovszky. Open-loop overload control algorithm for signalling traffic |
397 | -- | 411 | Marios-Polychronis Drakos, George I. Stassinopoulos, Irene Sygkouna, Apostolos E. Nikolaidis. A QoS-aware admission control scheme for bottleneck mitigation in Next-Generation Networks |
413 | -- | 422 | Chia-Hsin Cheng. A subspace-based blind detector with rapid channel tracking structure for TH-UWB systems over time-varying multi-path channels |
423 | -- | 434 | Yang Xiao, Yanping Zhang. A critical line based boundary surveillance strategy in wireless sensor networks |
435 | -- | 444 | Jahangir H. Sarker, Hussein T. Mouftah. Self-stability of slotted ALOHA by limiting the number of retransmission trials in infrastructure-less wireless networks |
445 | -- | 459 | Jen-Wen Ding, Der-Jiunn Deng, Yu-Kang Lo, Jong Hyuk Park. Perceptual quality based error control for scalable on-demand streaming in next-generation wireless networks |
461 | -- | 473 | Y.-S. Yen, L. Y. Chen, T.-Y. Chi, H. C. Chao. A novel predictive scheduling handover on mobile IPv6 |
475 | -- | 483 | Debarshi Kumar Sanyal, Matangini Chattopadhyay, Samiran Chattopadhyay. Recovering a game model from an optimal channel access scheme for WLANs |
485 | -- | 496 | Jun Wang 0008, Min Chen, Victor C. M. Leung. A price-based approach to optimize resource sharing between cellular data networks and WLANs |
497 | -- | 512 | Li-Sheng Chen, Hwang-Cheng Wang, Isaac Woungang, Fang-Chang Kuo. EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing protocol for wireless ad hoc networks |
513 | -- | 514 | Muhammad Khurram Khan. Editorial - Chaotic cryptography and its applications in telecommunication systems |
515 | -- | 524 | Xiaomin Wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, Khaled Alghathbar. Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network |
525 | -- | 537 | Shahram Etemadi Borujeni, Mohammad Eshghi. Chaotic image encryption system using phase-magnitude transformation and pixel substitution |
539 | -- | 549 | Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith. Improvement of an image encryption algorithm based on hyper-chaos |
551 | -- | 561 | Amit Pande, Joseph Zambreno. A chaotic encryption scheme for real-time embedded systems: design and implementation |
563 | -- | 571 | C. K. Huang, C. W. Liao, S. L. Hsu, Y. C. Jeng. Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system |
573 | -- | 581 | Fahad Bin Muhaya. Chaotic and AES cryptosystem for satellite imagery |
583 | -- | 585 | Burkhard Stiller, Bruno Tuffin, Peter Reichl, Tuan Anh Trinh. Editorial |
587 | -- | 600 | Peter Reichl, Bruno Tuffin, Raimund Schatz. Logarithmic laws in service quality perception: where microeconomics meets psychophysics and quality of experience |
601 | -- | 609 | Eitan Altman, Pierre Bernhard, Stéphane Caron, George Kesidis, Julio Rojas-Mora, Sulan Wong. A model of network neutrality with usage-based prices |
611 | -- | 622 | Hélia Pouyllau, Giovanna Carofiglio. Inter-carrier SLA negotiation using Q-learning |
623 | -- | 632 | Dominique Barth, Loubna Echabbi, Chahinez Hamlaoui. Stock provisioning strategies for QoS at the interdomain level |
633 | -- | 634 | Jason J. Jung, Yue-Shan Chang, Zhiwen Yu. Advances on intelligent network management |
635 | -- | 645 | Jie Pan, Frédéric Magoulès, Yann Le Biannic, Christophe Favart. Parallelizing Multiple Group-by queries using MapReduce: optimization and cost estimation |
647 | -- | 660 | Wei-Jen Wang. Conservative snapshot-based actor garbage collection for distributed mobile actor systems |
661 | -- | 670 | Chonggun Kim, Mary Wu. Leader election on tree-based centrality in ad hoc networks |
671 | -- | 680 | Takeshi Usui, Yoshinori Kitatsuji, Hidetoshi Yokota. A study on traffic management cooperating with IMS in MPLS networks |
681 | -- | 691 | Chung-Ming Ou. Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory |
693 | -- | 700 | Xuan Hau Pham, Namhee Lee, Jason J. Jung, Abolghasem Sadeghi-Niaraki. Collaborative spam filtering based on incremental ontology learning |
701 | -- | 703 | Jacek Rak, David Tipper, Krzysztof Walkowiak. Reliable networks design and modeling (foreword) |
705 | -- | 736 | James P. G. Sterbenz, Egemen K. Çetinkaya, Mahmood A. Hameed, Abdul Jabbar, Shi Qian, Justin P. Rohrer. Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation - Invited paper |
737 | -- | 749 | Teresa Gomes, Carlos Simoes, Luis Fernandes. Resilient routing in optical networks using SRLG-disjoint path pairs of min-sum cost |
751 | -- | 766 | Egemen K. Çetinkaya, Dan Broyles, Amit Dandekar, Sripriya Srinivasan, James P. G. Sterbenz. Modelling communication network challenges for Future Internet resilience, survivability, and disruption tolerance: a simulation-based approach |
767 | -- | 782 | János Szigeti, Tibor Cinkler. Evaluation and estimation of the availability of p-cycle protected connections |
783 | -- | 797 | Ming-Lee Gan, Soung-Yue Liew. Effective algorithms for finding optimum pairs of link-disjoint paths in α+1 path protection |
799 | -- | 811 | Korn Vajanapoom, David Tipper, Sira Akavipat. Risk based resilient network design |
813 | -- | 824 | Ahmed Haddad, Elias A. Doumith, Maurice Gagnaire. A fast and accurate meta-heuristic for failure localization based on the monitoring trail concept |
825 | -- | 846 | Tibor Cinkler. Some more aspects of resilience - Multi-domain, multi-cast, physical impairments |
847 | -- | 860 | Eugene S. Myakotnykh, Otto Wittner, Bjarne E. Helvik, Atef Abdelkefi, Jon Kåre Hellan, Olav Kvittem, Trond Skjesol, Arne Øslebø. An analysis of interdomain availability and causes of failures based on active measurements |
861 | -- | 879 | Wouter Tavernier, Dimitri Papadimitriou, Didier Colle, Mario Pickavet, Piet Demeester. Packet loss reduction during rerouting using network traffic analysis |
881 | -- | 888 | Aubin Jarry. Fast reroute paths algorithms |
889 | -- | 906 | Jacek Rak, Krzysztof Walkowiak. Reliable anycast and unicast routing: protection against attacks |
907 | -- | 918 | Fernando Solano, Michal Pióro. WDM network re-optimization avoiding costly traffic disruptions |
919 | -- | 929 | Gayan de Silva, Ondrej Rysavy, Petr Matousek, Miroslav Svéda. On formal reachability analysis in networks with dynamic behavior |
931 | -- | 933 | Michal Pióro, Jacek Rak, Krzysztof Szczypiorski. Networks for the e-society |
935 | -- | 945 | Mateusz Zotkiewicz, Walid Ben-Ameur. Volume-oriented routing and its modifications |
947 | -- | 958 | David Hock, Matthias Hartmann, Michael Menth, Michal Pióro, Artur Tomaszewski, Cezary Zukowski. Comparison of IP-based and explicit paths for one-to-one fast reroute in MPLS networks |
959 | -- | 968 | Dorabella Santos, Amaro de Sousa, Filipe Alvelos, Michal Pióro. Optimizing network load balancing: an hybridization approach of metaheuristics with column generation |
969 | -- | 977 | Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Haruhisa Hasegawa. Analyzing influence of network topology on designing ISP-operated CDN |
979 | -- | 991 | Miroslaw Kantor, Piotr Cholda, Andrzej Jajszczyk. Least Cost Routing (LCR) solution for inter-domain traffic distribution - Performance and cost-efficiency improvement |
993 | -- | 1000 | Hiroshi Yamada, Takeshi Yada, Hiroto Nomura. Developing network configuration management database system and its application - data federation for network management |
1001 | -- | 1019 | Go Hasegawa, Takuro Horie, Masayuki Murata. Proactive recovery from multiple failures utilizing overlay networking technique |
1021 | -- | 1031 | Tomasz Mrugalski, Józef Wozniak, Krzysztof Nowicki. Dynamic host configuration protocol for IPv6 improvements for mobile nodes |
1033 | -- | 1042 | Raja Zahilah, Yuta Ogino, Soichiro Nishiuma, Md. Nooruzzaman, Nguyen Thi Thanh Thuy, Osanori Koyama, Yutaka Katsuyama. Lightpath design & management system for IP-over-CWDM networks with ROADMs, employing parallel processing |
1043 | -- | 1055 | Krzysztof Walkowiak, Jacek Rak. Simultaneous optimization of unicast and anycast flows and replica location in survivable optical networks |
1057 | -- | 1065 | Jean-Philippe Joseph. PSTN services migration to IMS. Are SPs finally reaching the tipping point for large scale migrations? |
1067 | -- | 1079 | Ulrich Menne, Roland Wessäly, Maren Martens, Andreas Bley. Integrated optimization of aggregation and core for varying NGN architectures |
1081 | -- | 1090 | Kurt Majewski, Michael Koonert. Analytic uplink cell load approximation for planning fractional power control in LTE networks |
1091 | -- | 1100 | Damian Parniewicz, Maciej Stasiak, Piotr Zwierzykowski. Analytical model of the multi-service cellular network servicing multicast connections |
1101 | -- | 1111 | Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski. PadSteg: introducing inter-protocol steganography |
1113 | -- | 1121 | Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski. On information hiding in retransmissions |
1123 | -- | 1129 | Eleni Palkopoulou, Dominic A. Schupke, Thomas Bauschert. Quantifying CAPEX savings of homing architectures enabled by future optical network equipment |
1131 | -- | 1132 | Karima Ragoubi, Minglu Jin, Geetali Saha, Yan Yang. Recent advances in UWB systems: theory and applications |
1133 | -- | 1144 | Bo Zhou, Woogeun Rhee, Dongwook Kim, Zhihua Wang. Reconfigurable FM-UWB transmitter design for robust short range communications |
1145 | -- | 1158 | Luca De Nardis, Jocelyn Fiorina, Dorin Panaitopol, Maria-Gabriella Di Benedetto. Combining UWB with Time Reversal for improved communication and positioning |
1159 | -- | 1169 | S. M. Riazul Islam, Moshaddique Al Ameen, Kyung Sup Kwak. Channel estimation in ECMA-368-based UWB systems with unknown interference |
1171 | -- | 1177 | Rezaul Azim, Mohammad Tariqul Islam, Norbahiah Misran. Printed circular disc compact planar antenna for UWB applications |
1179 | -- | 1190 | Lih-Chang Wung, Szu-Lin Su, Chyi-Fan Jhun. Novel signaling and detection schemes for ultra-wideband transmitted-reference systems |
1191 | -- | 1203 | Ho-Lung Hung. Interference cancellation for HNNPSO multiuser detection of UWB systems over multipath fading channel |
1205 | -- | 1210 | Sangmin Lee, Yunho Jung, Jaeseok Kim. A frequency domain coherent detection scheme to realize DAA technique for WiMedia UWB systems |
1211 | -- | 1232 | Frank Leipold, Dimitri Tassetto, Sergio Bovelli. Wireless in-cabin communication for aircraft infrastructure - A holistic approach for on-board high data-rate UWB network |
1233 | -- | 1234 | Rongbo Zhu, Zhili Sun, Tapani Ristaniemi, Jiankun Hu. Guest Editorial - Special Issue on Green Telecommunications |
1235 | -- | 1246 | Liang Zhou. Green service over Internet of Things: a theoretical analysis paradigm |
1247 | -- | 1268 | Sergio Ricciardi, Davide Careglio, Germán Santos-Boada, Josep Solé-Pareta, Ugo Fiore, Francesco Palmieri. Towards an energy-aware Internet: modeling a cross-layer optimization approach |
1269 | -- | 1279 | Juanli Hu, Jiabin Deng, Juebo Wu. A Green Private Cloud Architecture with global collaboration |
1281 | -- | 1292 | Jun Wang 0008, Min Chen, Victor C. M. Leung. Forming priority based and energy balanced ZigBee networks - a pricing approach |
1293 | -- | 1304 | Ming-Yi Liao, Chun-Wei Tsai, Chu-Sing Yang, Ming-Chao Chiang, Chin-Feng Lai. Energy efficiency based on high performance particle swarm optimization: a case study |
1305 | -- | 1312 | Jing Zhang, Xiaohu Ge, Min Chen, Minho Jo, Xi Yang, Qu Du, Jinzhong Hu. Uplink energy efficiency analysis for two-tier cellular access networks using kernel function |
1313 | -- | 1326 | Pan Deng, Jianwei Zhang, Xiaohui Rong, Feng Chen. A model of large-scale Device Collaboration system based on PI-Calculus for green communication |
1327 | -- | 1340 | Jing Wu, James Yiming Zhang, Michel Savoie. Lightpath scheduling and routing for green data centres |
1341 | -- | 1342 | Jong Hyuk Park, Ching-Hsien Hsu, Naveen Chilamkurti, Mieso K. Denko. Advances in security and multimodality for pervasive computing environments - TS Special Issue |
1343 | -- | 1351 | Gongfu Peng, Yanxiang He, Naixue Xiong, SooCheol Lee, Seungmin Rho. A context-aware study for sentence ordering |
1353 | -- | 1365 | Jianxin Li, Xudong Liu, Lu Liu, Dazhi Sun, Bo Li. HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree |
1367 | -- | 1376 | Taek-Young Youn, Eun Sook Kang, Changhoon Lee. Efficient three-party key exchange protocols with round efficiency |
1377 | -- | 1388 | Jangseong Kim, Kwangjo Kim. A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks |
1389 | -- | 1397 | Jonggu Kang, Jaepil Lee, Chungtae Hwang, Hangbae Chang. The study on a convergence security service for manufacturing industries |
1399 | -- | 1407 | Manhyun Chung, Younghoon Lee, Taeshik Shon, Jongsub Moon. A security model for IPTV with one-time password and Conditional Access System for smart mobile platform |