Journal: Telecommunication Systems

Volume 52, Issue 4

1713 -- 1717Dimitrios G. Stratogiannis, Georgios Tsiropoulos, Alexey V. Vinel, Yevgeni Koucheryavy, Eirini-Eleni Tsiropoulou. Special Issue on Mobile Computing and Networking Technologies
1719 -- 1729Vipin Balyan, Davinder S. Saini. Vacant codes grouping and fast OVSF code assignment scheme for WCDMA networks
1731 -- 1742Chi-Sheng Lin, Che-Kang Sun, Jia-Chin Lin, Bo-Chiuan Chen. Performance evaluations of channel estimations in IEEE 802.11p environments
1743 -- 1755Cagdas Atici, M. Oguz Sunay. Capacity of practical wireless multihop broadcast networks
1757 -- 1775Maria Striki, Tony McAuley. Using novel distributed heuristics on hexagonal connected dominating sets to model routing dissemination
1777 -- 1795Usman Ashraf, Slim Abdellatif, Guy Juanole. Route selection in IEEE 802.11 wireless mesh networks
1797 -- 1817Wassim Ramadan, Eugen Dedu, Dominique Dhoutaut, Julien Bourgeois. RELD, RTT ECN Loss Differentiation to optimize the performance of transport protocols on wireless networks
1819 -- 1829Reza Holakouei, Adão Silva, Atílio Gameiro. Multiuser precoding techniques for a distributed broadband wireless system
1831 -- 1844Apostolia Papapostolou, Vasilis Friderikos, Tara Ali-Yahiya, Hakima Chaouchi. Path selection algorithms for fault tolerance in wireless mesh networks
1845 -- 1858George T. Karetsos, Elias Z. Tragos, George Tsiropoulos. A holistic approach to minimizing handover latency in heterogeneous wireless networking environments
1859 -- 1876Peter Dedecker, Jeroen Hoebeke, Ingrid Moerman, Joris Moreau, Piet Demeester. Network virtualization as an integrated solution for emergency communication
1877 -- 1893Fatemeh Afghah, Abolfazl Razi, Ali Abedi. Stochastic game theoretical model for packet forwarding in relay networks
1895 -- 1904Wei Wang, Kejian Wu, Haiyan Luo, Guanding Yu, Zhaoyang Zhang 0001. Sensing error aware delay-optimal channel allocation scheme for cognitive radio networks
1905 -- 1916Lambros Lambrinos, Constantinos Djouvas. Improving quality of experience in wireless VoIP through novel call scheduling
1917 -- 1930Yan He, Dmitri Perkins. Achieving seamless handoffs via backhaul support in Wireless Mesh Networks
1931 -- 1944Jaeho Chung, Yusuk Yun, Seungwon Choi. Experiments on MIMO-OFDM system combined with adaptive beamforming based on IEEE 802.16e WMAN standard
1945 -- 1960Yejun Liu, Qingyang Song, Lei Guo, Xingwei Wang. Efficient scheduling algorithms for mixed services in wireless OFDMA system
1961 -- 1976Thomas Lagkas, Dimitrios G. Stratogiannis, Periklis Chatzimisios. Modeling and performance analysis of an alternative to IEEE 802.11e Hybrid Control Function
1977 -- 1987Yindong Zhang, Liusheng Huang, Hongli Xu, Zhen-Guo Yang. An incentive energy-efficient routing for data gathering in wireless cooperative networks
1989 -- 2002Kyoung Hee Lee, Hyun-Woo Lee, Won Ryu, Youn-Hee Han. A scalable network-based mobility management framework in heterogeneous IP-based networks
2003 -- 2013Stavroula Vassaki, Athanasios D. Panagopoulos, Philip Constantinou. Evaluation of channel dependent bandwidth allocation in wireless access networks: centralized and distributed approach
2015 -- 2025Durbadal Mandal, Sakti Prasad Ghoshal, Anup Kumar Bhattacharjee. Optimized radii and excitations with concentric circular antenna array for maximum sidelobe level reduction using wavelet mutation based particle swarm optimization techniques
2027 -- 2046Pampa Sadhukhan, Pradip Kumar Das, Sayantani Saha. Hybrid mobility management schemes integrating mobile IP and SIP for seamless invocation of services in All-IP network
2047 -- 2058Adnan Nadeem, Michael P. Howarth. Protection of MANETs from a range of attacks using an intrusion detection and prevention system
2059 -- 2069J. M. Luna-Rivera, Daniel U. Campos-Delgado. Distributed power control with multiuser detection for asynchronous DS-CDMA networks subject to time-delays
2071 -- 2082Lun Tang, Qianbin Chen, Guangyu Wang, Xiaoping Zeng, Huan Wang. Opportunistic power allocation strategies and fair subcarrier allocation in OFDM-based cognitive radio networks
2083 -- 2099Christos Thomos, Grigorios Kalivas. FPGA-based architecture and implementation techniques of a low-complexity hybrid RAKE receiver for a DS-UWB communication system
2101 -- 2114D. Rajini Girinath, S. Selvan. A novel hierarchical model for vehicular traffic regulation
2115 -- 2132Christos Thomos, Grigorios Kalivas. FPGA-based architecture and implementation techniques of a low-complexity hybrid RAKE receiver for a DS-UWB communication system
2133 -- 2144Jahangir H. Sarker, Hussein T. Mouftah. A self-optimized random access protocol for an infrastructure-less mission critical wireless networking system
2145 -- 0Pampa Sadhukhan, Pradip Kumar Das, Sayantani Saha. Erratum to: Hybrid mobility management schemes integrating mobile IP and SIP for seamless invocation of services in All-IP network
2147 -- 2148Aneel Rahim, Zeeshan Shafi Khan. Editorial
2149 -- 2161Mohammad Nauman, Tamleek Ali, Azhar Rauf. Using trusted computing for privacy preserving keystroke-based authentication in smartphones
2163 -- 2176Lei Zhang 0004, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini. Preserving privacy against external and internal threats in WSN data aggregation
2177 -- 2185Hong Wen, Guang Gong, Shi-Chao Lv, Pin-Han Ho. Framework for MIMO cross-layer secure communication based on STBC
2187 -- 2195Iftikhar Ahmad, Azween B. Abdullah, Abdullah Sharaf Alghamdi, Muhammad Hussain. Optimized intrusion detection mechanism using soft computing techniques
2197 -- 2204Krishna Bhowal, Debnath Bhattacharyya, Anindya Jyoti Pal, Tai-Hoon Kim. A GA based audio steganography with enhanced security
2205 -- 2218Songbo Song, Mohamed Abid, Hassnaa Moustafa, Hossam Afifi. Performance evaluation of an authentication solution for IMS services access
2219 -- 2220Binod Vaidya, Shiuh-Jeng Wang, Jongsung Kim, Ivan Lee. Special issue on wireless multimedia networks and security services
2221 -- 2236Byung-Rae Cha, Yong-Il Kim, Jong Won Kim. Design of new P2P-enabled Mobile-OTP system using fingerprint features
2237 -- 2247Chin-Feng Lee, Yu-Lin Huang. Reversible data hiding scheme based on dual stegano-images using orientation combinations
2249 -- 2257Hae-Min Moon, Seung-Hoon Chae, Daesung Moon, Yongwha Chung, Sung Bum Pan. Intelligent video surveillance system using two-factor human information
2259 -- 2270Martijn Kuipers, Ricardo N. Vaz, Mário Serafim Nunes. Video quality protection for real time video streams over wireless networks
2271 -- 2285Md. Shohrab Hossain, Mohammed Atiquzzaman. Cost analysis of mobility protocols
2287 -- 2297Pasquale Pace, Gianluca Aloi. WEVCast: wireless eavesdropping video casting architecture to overcome standard multicast transmission in Wi-Fi networks
2299 -- 2310Ivo C. Lopes, Binod Vaidya, Joel J. P. C. Rodrigues. Towards an autonomous fall detection and alerting system on a mobile and pervasive environment
2311 -- 2320Bonhyun Koo, Kyusuk Han, James J. Park, Taeshik Shon. Design and implementation of a wireless sensor network architecture using smart mobile devices
2321 -- 2323Seungmin Rho, Sajid Hussain, Sang-Soo Yeo, Bernady O. Apduhan. Advances in wireless sensor communications and applications for smart space
2325 -- 2333Han-Chiang Chen, Y. M. Huang, Chia-Hung Su, Te-Wei Chiu. Implementation of SOPC based Telecom & Datacom for monitoring wireless sensor networks
2335 -- 2346Ingeol Chun, Jeongmin Park, Hae Young Lee, Won-Tae Kim, Seung-Min Park, Eunseok Lee. An agent-based self-adaptation architecture for implementing smart devices in Smart Space
2347 -- 2356WoongChul Choi, SeokMin Lee. Implementation of the IEEE 802.15.4 module with CFP in NS-2
2357 -- 2366Yan Yu, Xuefeng Zhao, Yang Wang, Jinping Ou. A study on PVDF sensor using wireless experimental system for bridge structural local monitoring
2367 -- 2373SungSuk Kim, Sun Ok Yang. Wireless sensor gathering data during long time
2375 -- 2386Su-Chong Joo, Chang-Won Jeong, K. H. (Kane) Kim. A study of Context-Based Adaptive Service Model in home environments
2387 -- 2395Pranesh Sthapit, Jae-Young Pyun. Medium reservation based sensor MAC protocol for low latency and high energy efficiency
2397 -- 2406Fei Shi, JaeJong Baek, JooSeok Song, Weijie Liu. A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks
2407 -- 2409Lei Shu, Athanasios V. Vasilakos, Jaime Lloret, Al-Sakib Khan Pathan. Guest Editorial - Special Issue on Recent Advance on Mobile Sensor Systems
2411 -- 2418Enrico Natalizio, Valeria Loscrì. Controlled mobility in mobile sensor networks: advantages, issues and challenges
2419 -- 2436Guangjie Han, Huihui Xu, Trung Q. Duong, Jinfang Jiang, Takahiro Hara. Localization algorithms of Wireless Sensor Networks: a survey
2437 -- 2458Romain Kuntz, Julien Montavont, Thomas Noël. Improving the medium access in highly mobile Wireless Sensor Networks
2459 -- 2474Bilal Muhammad Khan, Falah H. Ali. Collision Free Mobility Adaptive (CFMA) MAC for wireless sensor networks
2475 -- 2488Abbas Nayebi, Hamid Sarbazi-Azad. Optimum hello interval for a connected homogeneous topology in mobile wireless sensor networks
2489 -- 2502Miguel Garcia, Sandra Sendra, Jaime Lloret, Alejandro Canovas. Saving energy and improving communications using cooperative group-based Wireless Sensor Networks
2503 -- 2517Long Cheng, Weiwei Jiao, Min Chen, Canfeng Chen, Jian Ma. Wait, focus and spray: efficient data delivery in wireless sensor networks with ubiquitous mobile data collectors
2519 -- 2532Xiannuan Liang, Yang Xiao, Jingyuan Zhang, Hongmei Deng, Athanasios V. Vasilakos. Stochastic event capturing with a single mobile robot in rectangular perimeters
2533 -- 2540Yu-Shiang Wong, Yang-Sheng Chen, Der-Jiunn Deng, Der-Chen Huang. Nonpreemptive priority scheme for the S-MAC protocol in multimedia mobile sensor networks
2541 -- 2560Nidal Nasser, Anwar Al-Yatama, Kassem Saleh. Zone-based routing protocol with mobility consideration for wireless sensor networks
2561 -- 2568Xinqing Yan, Xuemei Liu. Evaluating the energy consumption of the RFID tag collision resolution protocols
2569 -- 2571Pedro Cuenca, Dora Maros. Wireless and mobile networking (WMNC 2010)
2573 -- 2583Jasvinder Pal Singh, Dirk Pesch. Application of energy efficient soft-decision error control in wireless sensor networks
2585 -- 2597Kahina Ait Ali, Oumaya Baala, Alexandre Caminada. Revisiting vehicular network connectivity with radio propagation model
2599 -- 2609Jesús Delicado, Francisco Delicado, Luis Orozco-Barbosa. On the optimization of the contention resolution mechanism for IEEE 802.16 networks
2611 -- 2635Ta Vinh Thong, Levente Buttyán. On automating the verification of secure ad-hoc network routing protocols
2637 -- 2654Xi Li, Umar Toseef, Dominik Dulas, Wojciech Bigos, Carmelita Görg, Andreas Timm-Giel, Andreas Klug. Dimensioning of the LTE access network
2655 -- 2666Rosario Garrido-Cantos, Jan De Cock, José Luis Martínez, Sebastiaan Van Leuven, Antonio Garrido. Video transcoding for mobile digital television
2667 -- 2675Jong Chern Lim, Chris J. Bleakley. Trading sensing coverage for an extended network lifetime
2677 -- 2685Naoto Kobatake, Yasushi Yamao. High-throughput time group access MCR-SS-CSMA/CA for wireless ad hoc networks with layered-tree topology
2687 -- 2697Antonio Manuel Ortiz, Fernando Royo, Teresa Olivares, José Carlos Castillo, Luis Orozco-Barbosa, Pedro José Marrón. Fuzzy-logic based routing for dense wireless sensor networks
2699 -- 2712Jonathan Petit, Zoubir Mammeri. Authentication and consensus overhead in vehicular ad hoc networks
2713 -- 2720Przemyslaw Machan, Józef Wozniak. On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
2721 -- 2732Juan I. del-Castillo, María A. Santos, José Villalón. Evaluation of OFDMA resource allocation algorithms in broadband wireless access networks
2733 -- 2748Ardian Ulvan, Robert Bestak, Melvi Ulvan. Handover procedure and decision strategy in LTE-based femtocell network

Volume 52, Issue 3

1409 -- 1412Ibrahiem M. M. El Emary, S. Ramakrishnan. Preface to the special issue on "Signal Processing Applications in Human Computer Interaction"
1413 -- 1422Anderson Pierre Passos. Transformation of whispering voice to pseudo-real voice for unvoiced telephony and communication aid for voice-handicapped persons
1423 -- 1433Moses Ekpenyong, Eno-Abasi Urua. Agent-based framework for intelligent natural language interface
1435 -- 1448Surya Prakash, Phalguni Gupta. An efficient ear recognition technique invariant to illumination and pose
1449 -- 1456R. M. Farouk, M. G. S. Ali. Ultrasonic digital signal processing simulation in viscoelastic medium with generalized parametric function
1457 -- 1466R. K. Aggarwal, M. Dave. Performance evaluation of sequentially combined heterogeneous feature streams for Hindi speech recognition system
1467 -- 1478S. Ramakrishnan, Ibrahiem M. M. El Emary. Speech emotion recognition approaches in human computer interaction
1479 -- 1489Tomás Palleja, A. Guillamet, Marcel Tresanchez, Mercè Teixidó, Alicia Fernández del Viso, Carlos Rebate Sánchez, Jordi Palacín. Implementation of a robust absolute virtual head mouse combining face detection, template matching and optical flow algorithms
1491 -- 1501Azzam Sleit, Yacoub Massad, Mohammed Musaddaq. An alternative clustering approach for reconstructing cross cut shredded text documents
1503 -- 1504Karol Molnar, Norbert Herencsar, Attila Vidács. Guest Editorial
1505 -- 1515Slavisa Aleksic. Optically transparent integrated metro-access network
1517 -- 1523Kimio Oguchi, Tomoki Sakai, Dai Hanawa. WDM passive network design for small wavelength-count in local area/home applications
1525 -- 1532Ahmad Yassine, Peter Farkas. One hybrid ARQ for broadcasting or multicasting in wireless erasure channel
1533 -- 1539Darina Jarinová. On autoregressive model order for long-range prediction of fast fading wireless channel
1541 -- 1547Hristo Gochev, Vladimir Poulkov, Georgi Iliev. Improving cell edge throughput for LTE using combined uplink power control
1549 -- 1558Patrik Moravek, Dan Komosny, Milan Simek, Mojmir Jelinek, David Girbau, Antonio Lázaro. Investigation of radio channel uncertainty in distance estimation in wireless sensor networks
1559 -- 1572Iztok Humar, Matevz Podnar. Implementation and performance evaluation of IGMP snooping supporting multicast functionality on Linux-based Ethernet switches
1573 -- 1582Michal Skorepa, Richard Klugl. Enhanced analytical method for IP mobility handover schemes cost evaluation
1583 -- 1593Miroslav Voznak, Jan Rozhon. Approach to stress tests in SIP environment based on marginal analysis
1595 -- 1604Jiri Hosek, Karol Molnar, Lukas Rucka, Milan Bartl. SNMP-based acquisition system for DiffServ parameters
1605 -- 1614Brikena Statovci-Halimi, Gerald Franzl. QoS differentiation and Internet neutrality - A controversial issue within the future Internet challenge
1615 -- 1616Gregor Rozinaj. Editorial
1617 -- 1631Radovan Ridzon, Dusan Levický. Content protection in grayscale and color images based on robust digital watermarking
1633 -- 1641Jin Heo, Yo-Sung Ho. VLC table prediction for CAVLC in H.264/AVC using correlation, statistics, and structural characteristics of mode information
1643 -- 1655Rafael H. C. de Melo, Aura Conci. How Succolarity could be used as another fractal measure in image analysis
1657 -- 1675P. M. Papazoglou, D. A. Karras, Rallis C. Papademetriou. On Multi Agent based modeling and control in large scale wireless communication systems for improved resource allocation performance
1677 -- 1682K. Kotuliaková, D. Simlastíková, J. Polec. Analysis of ARQ schemes
1683 -- 1696Juraj Kacur, Gregor Rozinaj. Building accurate and robust HMM models for practical ASR systems
1697 -- 1704Pavel Mach, Robert Bestak, Zdenek Becvar. Optimization of association procedure in WiMAX networks with relay stations
1705 -- 1711R. Vargic, I. Kotuliak, A. Vrábel, F. Husák. Provisioning of VoIP services for mobile subscribers using WiFi access network

Volume 52, Issue 2

361 -- 362Sudip Misra, Mischa Dohler, Athanasios V. Vasilakos, Petros Nicopolitidis. Guest editorial - Challenges in next-generation and resource-constrained networks
363 -- 374Jinoo Joung, Jeongmin Choi, Seungwook Min, Sunghoon Son, Younglok Kim, Jongtae Song, Young Boo Kim, Chul Soo Kim. A flow admission control in Next Generation Networks with flow aggregate information exchange
375 -- 385Jesus Alonso-Zarate, Elli Kartsakli, Marcos D. Katz, Luis Alonso 0001, Christos V. Verikoukis. Multi-Radio Cooperative ARQ in wireless cellular networks: a MAC layer perspective
387 -- 396Dániel Krupp, János Levendovszky. Open-loop overload control algorithm for signalling traffic
397 -- 411Marios-Polychronis Drakos, George I. Stassinopoulos, Irene Sygkouna, Apostolos E. Nikolaidis. A QoS-aware admission control scheme for bottleneck mitigation in Next-Generation Networks
413 -- 422Chia-Hsin Cheng. A subspace-based blind detector with rapid channel tracking structure for TH-UWB systems over time-varying multi-path channels
423 -- 434Yang Xiao, Yanping Zhang. A critical line based boundary surveillance strategy in wireless sensor networks
435 -- 444Jahangir H. Sarker, Hussein T. Mouftah. Self-stability of slotted ALOHA by limiting the number of retransmission trials in infrastructure-less wireless networks
445 -- 459Jen-Wen Ding, Der-Jiunn Deng, Yu-Kang Lo, Jong Hyuk Park. Perceptual quality based error control for scalable on-demand streaming in next-generation wireless networks
461 -- 473Y.-S. Yen, L. Y. Chen, T.-Y. Chi, H. C. Chao. A novel predictive scheduling handover on mobile IPv6
475 -- 483Debarshi Kumar Sanyal, Matangini Chattopadhyay, Samiran Chattopadhyay. Recovering a game model from an optimal channel access scheme for WLANs
485 -- 496Jun Wang 0008, Min Chen, Victor C. M. Leung. A price-based approach to optimize resource sharing between cellular data networks and WLANs
497 -- 512Li-Sheng Chen, Hwang-Cheng Wang, Isaac Woungang, Fang-Chang Kuo. EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing protocol for wireless ad hoc networks
513 -- 514Muhammad Khurram Khan. Editorial - Chaotic cryptography and its applications in telecommunication systems
515 -- 524Xiaomin Wang, Wei Guo, Wenfang Zhang, Muhammad Khurram Khan, Khaled Alghathbar. Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network
525 -- 537Shahram Etemadi Borujeni, Mohammad Eshghi. Chaotic image encryption system using phase-magnitude transformation and pixel substitution
539 -- 549Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith. Improvement of an image encryption algorithm based on hyper-chaos
551 -- 561Amit Pande, Joseph Zambreno. A chaotic encryption scheme for real-time embedded systems: design and implementation
563 -- 571C. K. Huang, C. W. Liao, S. L. Hsu, Y. C. Jeng. Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system
573 -- 581Fahad Bin Muhaya. Chaotic and AES cryptosystem for satellite imagery
583 -- 585Burkhard Stiller, Bruno Tuffin, Peter Reichl, Tuan Anh Trinh. Editorial
587 -- 600Peter Reichl, Bruno Tuffin, Raimund Schatz. Logarithmic laws in service quality perception: where microeconomics meets psychophysics and quality of experience
601 -- 609Eitan Altman, Pierre Bernhard, Stéphane Caron, George Kesidis, Julio Rojas-Mora, Sulan Wong. A model of network neutrality with usage-based prices
611 -- 622Hélia Pouyllau, Giovanna Carofiglio. Inter-carrier SLA negotiation using Q-learning
623 -- 632Dominique Barth, Loubna Echabbi, Chahinez Hamlaoui. Stock provisioning strategies for QoS at the interdomain level
633 -- 634Jason J. Jung, Yue-Shan Chang, Zhiwen Yu. Advances on intelligent network management
635 -- 645Jie Pan, Frédéric Magoulès, Yann Le Biannic, Christophe Favart. Parallelizing Multiple Group-by queries using MapReduce: optimization and cost estimation
647 -- 660Wei-Jen Wang. Conservative snapshot-based actor garbage collection for distributed mobile actor systems
661 -- 670Chonggun Kim, Mary Wu. Leader election on tree-based centrality in ad hoc networks
671 -- 680Takeshi Usui, Yoshinori Kitatsuji, Hidetoshi Yokota. A study on traffic management cooperating with IMS in MPLS networks
681 -- 691Chung-Ming Ou. Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory
693 -- 700Xuan Hau Pham, Namhee Lee, Jason J. Jung, Abolghasem Sadeghi-Niaraki. Collaborative spam filtering based on incremental ontology learning
701 -- 703Jacek Rak, David Tipper, Krzysztof Walkowiak. Reliable networks design and modeling (foreword)
705 -- 736James P. G. Sterbenz, Egemen K. Çetinkaya, Mahmood A. Hameed, Abdul Jabbar, Shi Qian, Justin P. Rohrer. Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation - Invited paper
737 -- 749Teresa Gomes, Carlos Simoes, Luis Fernandes. Resilient routing in optical networks using SRLG-disjoint path pairs of min-sum cost
751 -- 766Egemen K. Çetinkaya, Dan Broyles, Amit Dandekar, Sripriya Srinivasan, James P. G. Sterbenz. Modelling communication network challenges for Future Internet resilience, survivability, and disruption tolerance: a simulation-based approach
767 -- 782János Szigeti, Tibor Cinkler. Evaluation and estimation of the availability of p-cycle protected connections
783 -- 797Ming-Lee Gan, Soung-Yue Liew. Effective algorithms for finding optimum pairs of link-disjoint paths in α+1 path protection
799 -- 811Korn Vajanapoom, David Tipper, Sira Akavipat. Risk based resilient network design
813 -- 824Ahmed Haddad, Elias A. Doumith, Maurice Gagnaire. A fast and accurate meta-heuristic for failure localization based on the monitoring trail concept
825 -- 846Tibor Cinkler. Some more aspects of resilience - Multi-domain, multi-cast, physical impairments
847 -- 860Eugene S. Myakotnykh, Otto Wittner, Bjarne E. Helvik, Atef Abdelkefi, Jon Kåre Hellan, Olav Kvittem, Trond Skjesol, Arne Øslebø. An analysis of interdomain availability and causes of failures based on active measurements
861 -- 879Wouter Tavernier, Dimitri Papadimitriou, Didier Colle, Mario Pickavet, Piet Demeester. Packet loss reduction during rerouting using network traffic analysis
881 -- 888Aubin Jarry. Fast reroute paths algorithms
889 -- 906Jacek Rak, Krzysztof Walkowiak. Reliable anycast and unicast routing: protection against attacks
907 -- 918Fernando Solano, Michal Pióro. WDM network re-optimization avoiding costly traffic disruptions
919 -- 929Gayan de Silva, Ondrej Rysavy, Petr Matousek, Miroslav Svéda. On formal reachability analysis in networks with dynamic behavior
931 -- 933Michal Pióro, Jacek Rak, Krzysztof Szczypiorski. Networks for the e-society
935 -- 945Mateusz Zotkiewicz, Walid Ben-Ameur. Volume-oriented routing and its modifications
947 -- 958David Hock, Matthias Hartmann, Michael Menth, Michal Pióro, Artur Tomaszewski, Cezary Zukowski. Comparison of IP-based and explicit paths for one-to-one fast reroute in MPLS networks
959 -- 968Dorabella Santos, Amaro de Sousa, Filipe Alvelos, Michal Pióro. Optimizing network load balancing: an hybridization approach of metaheuristics with column generation
969 -- 977Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Haruhisa Hasegawa. Analyzing influence of network topology on designing ISP-operated CDN
979 -- 991Miroslaw Kantor, Piotr Cholda, Andrzej Jajszczyk. Least Cost Routing (LCR) solution for inter-domain traffic distribution - Performance and cost-efficiency improvement
993 -- 1000Hiroshi Yamada, Takeshi Yada, Hiroto Nomura. Developing network configuration management database system and its application - data federation for network management
1001 -- 1019Go Hasegawa, Takuro Horie, Masayuki Murata. Proactive recovery from multiple failures utilizing overlay networking technique
1021 -- 1031Tomasz Mrugalski, Józef Wozniak, Krzysztof Nowicki. Dynamic host configuration protocol for IPv6 improvements for mobile nodes
1033 -- 1042Raja Zahilah, Yuta Ogino, Soichiro Nishiuma, Md. Nooruzzaman, Nguyen Thi Thanh Thuy, Osanori Koyama, Yutaka Katsuyama. Lightpath design & management system for IP-over-CWDM networks with ROADMs, employing parallel processing
1043 -- 1055Krzysztof Walkowiak, Jacek Rak. Simultaneous optimization of unicast and anycast flows and replica location in survivable optical networks
1057 -- 1065Jean-Philippe Joseph. PSTN services migration to IMS. Are SPs finally reaching the tipping point for large scale migrations?
1067 -- 1079Ulrich Menne, Roland Wessäly, Maren Martens, Andreas Bley. Integrated optimization of aggregation and core for varying NGN architectures
1081 -- 1090Kurt Majewski, Michael Koonert. Analytic uplink cell load approximation for planning fractional power control in LTE networks
1091 -- 1100Damian Parniewicz, Maciej Stasiak, Piotr Zwierzykowski. Analytical model of the multi-service cellular network servicing multicast connections
1101 -- 1111Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski. PadSteg: introducing inter-protocol steganography
1113 -- 1121Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski. On information hiding in retransmissions
1123 -- 1129Eleni Palkopoulou, Dominic A. Schupke, Thomas Bauschert. Quantifying CAPEX savings of homing architectures enabled by future optical network equipment
1131 -- 1132Karima Ragoubi, Minglu Jin, Geetali Saha, Yan Yang. Recent advances in UWB systems: theory and applications
1133 -- 1144Bo Zhou, Woogeun Rhee, Dongwook Kim, Zhihua Wang. Reconfigurable FM-UWB transmitter design for robust short range communications
1145 -- 1158Luca De Nardis, Jocelyn Fiorina, Dorin Panaitopol, Maria-Gabriella Di Benedetto. Combining UWB with Time Reversal for improved communication and positioning
1159 -- 1169S. M. Riazul Islam, Moshaddique Al Ameen, Kyung Sup Kwak. Channel estimation in ECMA-368-based UWB systems with unknown interference
1171 -- 1177Rezaul Azim, Mohammad Tariqul Islam, Norbahiah Misran. Printed circular disc compact planar antenna for UWB applications
1179 -- 1190Lih-Chang Wung, Szu-Lin Su, Chyi-Fan Jhun. Novel signaling and detection schemes for ultra-wideband transmitted-reference systems
1191 -- 1203Ho-Lung Hung. Interference cancellation for HNNPSO multiuser detection of UWB systems over multipath fading channel
1205 -- 1210Sangmin Lee, Yunho Jung, Jaeseok Kim. A frequency domain coherent detection scheme to realize DAA technique for WiMedia UWB systems
1211 -- 1232Frank Leipold, Dimitri Tassetto, Sergio Bovelli. Wireless in-cabin communication for aircraft infrastructure - A holistic approach for on-board high data-rate UWB network
1233 -- 1234Rongbo Zhu, Zhili Sun, Tapani Ristaniemi, Jiankun Hu. Guest Editorial - Special Issue on Green Telecommunications
1235 -- 1246Liang Zhou. Green service over Internet of Things: a theoretical analysis paradigm
1247 -- 1268Sergio Ricciardi, Davide Careglio, Germán Santos-Boada, Josep Solé-Pareta, Ugo Fiore, Francesco Palmieri. Towards an energy-aware Internet: modeling a cross-layer optimization approach
1269 -- 1279Juanli Hu, Jiabin Deng, Juebo Wu. A Green Private Cloud Architecture with global collaboration
1281 -- 1292Jun Wang 0008, Min Chen, Victor C. M. Leung. Forming priority based and energy balanced ZigBee networks - a pricing approach
1293 -- 1304Ming-Yi Liao, Chun-Wei Tsai, Chu-Sing Yang, Ming-Chao Chiang, Chin-Feng Lai. Energy efficiency based on high performance particle swarm optimization: a case study
1305 -- 1312Jing Zhang, Xiaohu Ge, Min Chen, Minho Jo, Xi Yang, Qu Du, Jinzhong Hu. Uplink energy efficiency analysis for two-tier cellular access networks using kernel function
1313 -- 1326Pan Deng, Jianwei Zhang, Xiaohui Rong, Feng Chen. A model of large-scale Device Collaboration system based on PI-Calculus for green communication
1327 -- 1340Jing Wu, James Yiming Zhang, Michel Savoie. Lightpath scheduling and routing for green data centres
1341 -- 1342Jong Hyuk Park, Ching-Hsien Hsu, Naveen Chilamkurti, Mieso K. Denko. Advances in security and multimodality for pervasive computing environments - TS Special Issue
1343 -- 1351Gongfu Peng, Yanxiang He, Naixue Xiong, SooCheol Lee, Seungmin Rho. A context-aware study for sentence ordering
1353 -- 1365Jianxin Li, Xudong Liu, Lu Liu, Dazhi Sun, Bo Li. HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree
1367 -- 1376Taek-Young Youn, Eun Sook Kang, Changhoon Lee. Efficient three-party key exchange protocols with round efficiency
1377 -- 1388Jangseong Kim, Kwangjo Kim. A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks
1389 -- 1397Jonggu Kang, Jaepil Lee, Chungtae Hwang, Hangbae Chang. The study on a convergence security service for manufacturing industries
1399 -- 1407Manhyun Chung, Younghoon Lee, Taeshik Shon, Jongsub Moon. A security model for IPTV with one-time password and Conditional Access System for smart mobile platform

Volume 52, Issue 1

1 -- 14S. M. Riazul Islam, Kyung Sup Kwak. Preamble-based improved channel estimation for multiband UWB system in presence of interferences
15 -- 29Claudio Sacchi, Massimiliano Panizza. Multi-rate group-orthogonal OFDMA-CDMA for broadband mobile transmission
31 -- 38Faisal S. Al-kamali, Moawad I. Dessouky, Bassiuny M. Sallam, Farid Shawki, Fathi E. Abd El-Samie. Impact of the power amplifier on the performance of the single carrier frequency division multiple access system
39 -- 50Ivana M. Petrovic, Mihajlo C. Stefanovic, Petar C. Spalevic, Stefan Panic, Dusan Stefanovic. Outage analysis of selection diversity over Rayleigh fading channels with multiple co-channel interferers
51 -- 60Guido Maier, Achille Pattavina. Deflection routing in IP optical networks
61 -- 71Hefdhallah Sakran, Mona Shokair. Hard and softened combination for cooperative spectrum sensing over imperfect channels in cognitive radio networks
73 -- 83Bálint Dávid Ary, Sándor Imre. Partial CDR database dimensioning
85 -- 96Yuna Kim, Ki-Young Jung, Tae Hyung Kim, Jong Kim. A distributed energy-efficient clustering scheme for deploying IDS in MANETs
97 -- 104Neng-Chung Wang, Young-Long Chen, Chia-Hsin Cheng, Yung-Kuei Chiang, Ying-Yuan Wang. Improving TCP performance with fast adaptive congestion control during soft vertical handoff
105 -- 119Michael Pascoe, Javier Gomez, Victor Rangel, Miguel López-Guerrero, F. Mendoza. A mobility-based upper bound on route length in MANETs
121 -- 137D. S. Ilcev. Development and characteristics of African Satellite Augmentation System (ASAS) network
139 -- 149Kayhan Zrar Ghafoor, Kamalrulnizam Abu Bakar, Martijn van Eenennaam, Rashid Hafeez Khokhar, Alberto J. Gonzalez. A fuzzy logic approach to beaconing for vehicular ad hoc networks
151 -- 160Xiaonan Wang, Shan Zhong. An IPv6 address configuration scheme for wireless sensor networks based on location information
161 -- 181Cosimo Stallo, Ernestina Cianca, Sandeep Mukherjee, Tommaso Rossi, Mauro De Sanctis, Marina Ruggieri. UWB for multi-gigabit/s communications beyond 60 GHz
183 -- 193Sabbir Ahmed, Makoto Kawai. Interleaving effects on BER fairness and PAPR in OFDMA System
195 -- 202Mohammad Fathi, Samaneh Rashidi-Bajgan, Alireza Khalilzadeh, Hassan Taheri. A dynamic joint scheduling and call admission control scheme for IEEE 802.16 networks
203 -- 215José M. F. Craveirinha, João C. N. Clímaco, Lúcia Martins, Carlos Gomes da Silva, Nuno Ferreira. A bi-criteria minimum spanning tree routing model for MPLS/overlay networks
217 -- 227Bo Gu, Xiaoyan Hong, Pu Wang. Analysis for bio-inspired thrown-box assisted message dissemination in delay tolerant networks
229 -- 244Nazbanoo Farzaneh, Reza Monsefi, Mohammad Hossein Yaghmaee, AmirHossein Mohajerzadeh. A novel congestion control protocol with AQM support for IP-based networks
245 -- 259Chung-Ming Huang, Ming-Sian Lin. The unreliable-concurrent multipath transfer (U-CMT) protocol for multihomed networks - U-CMT
261 -- 270Sheng-Wei Wang. Allocation of light splitters in all-optical WDM networks with sparse light splitting capabilities
271 -- 283Abdolkarim Mardanian Dehkordi, Vahid Tabataba Vakili. An improved equation based rate adaptation scheme for video streaming over UMTS
285 -- 297Jen-Yi Pan, Tsung-Yin Lee, Wen-Sung Lee, Chin-Ya Tsao. Improving the R-score of an adaptive VoIP codec in IEEE 802.16 networks
299 -- 315María Canales, José Ramón Gállego, Ángela Hernández, Antonio Valdovinos. An adaptive location management scheme for mobile broadband cellular systems
317 -- 325Peng Xu, Xuming Fang, Rong He, Zheng Xiang. An efficient handoff algorithm based on received signal strength and wireless transmission loss in hierarchical cell networks
327 -- 340Jinglong Zhou, R. Venkatesha Prasad, Yue Lu, Ignas G. Niemegeers. Simulation-based analysis of a multi-hop integrated UMTS and WLAN network
341 -- 357Nuno Vasco Lopes, Maria João Nicolau, Alexandre Santos. A QoS-enabled resource management scheme for F-HMIPv6 micro mobility approach
359 -- 0Jong Hyuk Park, Qun Jin. Erratum to: Effective session key distribution for secure fast handover in mobile networks