Journal: IEEE Wireless Commun.

Volume 11, Issue 6

2 -- 0Michele Zorzi. Wireless sensor networks
4 -- 5Paul J. M. Havinga, Jennifer C. Hou, Feng Zhao. Wireless sensor networks
6 -- 28Jamal N. Al-Karaki, Ahmed E. Kamal. Routing techniques in wireless sensor networks: a survey
29 -- 37Ivan Stojmenovic. Geocasting with guaranteed delivery in sensor networks
38 -- 43Elaine Shi, Adrian Perrig. Designing secure sensor networks
44 -- 53Yalin Evren Sagduyu, Anthony Ephremides. The problem of medium access control in wireless sensor networks
54 -- 61Kay Römer, Friedemann Mattern. The design space of wireless sensor networks
62 -- 68Jie Liu, Feng Zhao, Patrick Cheung, Leonidas J. Guibas. Apply geometric duality to energy-efficient non-local phenomenon awareness using sensor networks
70 -- 77Jeremy Elson, Lewis Girod, Deborah Estrin. EmStar: development with high system visibility
78 -- 86Lodewijk van Hoesel, Tim Nieberg, Jian Wu, Paul J. M. Havinga. Prolonging the lifetime of wireless sensor networks by cross-layer interaction
87 -- 96Ying Zhang, Lee Ackerson, David Duff, Craig Eldershaw, Mark Yim. STAM: a system of tracking and mapping in real environments

Volume 11, Issue 5

2 -- 0Michele Zorzi. Mobility support and radio resource management
3 -- 5Theodore B. Zahariadis, Bharat T. Doshi. Applications and services for the B3G/4G era
6 -- 12Mario Muñoz, Carlos García-Rubio. A new model for service and application convergence in B3G/4G networks
14 -- 20Dimitrios I. Axiotis, Tareq Al-Gizawi, Kostas Peppas, Emmanuel N. Protonotarios, Fotis I. Lazarakis, Constantinos B. Papadias, Panos Philippopoulos. Services in interworking 3G and WLAN environments
22 -- 30Mohammad Mahfuzul Islam, Manzur M. Murshed. Novel velocity and call duration support for QoS provision in mobile wireless networks
32 -- 40Panagiotis Demestichas, Vera Stavroulaki. Issues in introducing resource brokerage functionality in B3G composite radio environments
42 -- 47Dong-Hoon Yang, Seongcheol Kim, Changi Nam, Ji-Sook Moon. Fixed and mobile service convergence and reconfiguration of telecommunications value chains
48 -- 56Sascha Karlich, Theodore Zahariadis, Nicholaos Zervos, Nikos A. Nikolaou, Brendan Jennings, Vangelis Kollias, Thomas Magedanz. A self-adaptive service provisioning framework for 3G+/4G mobile applications
58 -- 64Ichiro Satoh. Software testing for wireless mobile computing

Volume 11, Issue 4

6 -- 14Hua Zhu, Ming Li, Imrich Chlamtac, Balakrishnan Prabhakaran. A survey of quality of service in IEEE 802.11 networks
16 -- 28Ian F. Akyildiz, Jiang (Linda) Xie, Shantidev Mohanty. A survey of mobility management in next-generation all-IP-based wireless systems
30 -- 43Ai-Chun Pang, Jyh-Cheng Chen, Yuan-Kai Chen, Prathima Agrawal. Mobility and session management: UMTS vs. cdma2000
44 -- 51Li Ma, Fei Yu, Victor C. M. Leung, Tejinder S. Randhawa. A new method to support UMTS/WLAN vertical handover using SCTP
52 -- 58Jihui Zhang 0002, Jinpeng Huai, Renyi Xiao, Bo Li. Resource management in the next-generation DS-CDMA cellular networks
59 -- 65Abhishek Roy, Sajal K. Das, Archan Misra. Exploiting information theory for adaptive mobility and resource management in future cellular networks
66 -- 75Minghui Shi, Xuemin Shen, Jon W. Mark. IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
76 -- 88Christos Politis, Kar Ann Chew, Nadeem Akhtar, Michael Georgiades, Rahim Tafazolli, Tasos Dagiuklas. Hybrid multilayer mobility management with AAA context transfer capabilities for all-IP networks

Volume 11, Issue 3

2 -- 0Michele Zorzi. Message from the editor-in-chief - Implementing 4G technology
6 -- 7Theodore B. Zahariadis. Migration toward 4G wireless communications
8 -- 15Janise McNair, Fang Zhu. Vertical handoffs in fourth-generation multinetwork environments
16 -- 23Giannis F. Marias. Two-tier framework for channel acquisition in public wireless LANs
24 -- 34Xia Gao, Gang Wu, Toshio Miki. End-to-end QoS provisioning in mobile heterogeneous networks
36 -- 42Juhani Latvakoski, Daniel Pakkala, Pekka Pääkkönen. A communication architecture for spontaneous systems
44 -- 49Suthikshn Kumar. Smart volume tuner for cellular phones
50 -- 61Apostolis K. Salkintzis. Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks
62 -- 71Xiaoxin Wu, Biswanath Mukherjee, Dipak Ghosal. Hierarchical architectures in the third-generation cellular network
72 -- 79Yang Xiao. IEEE 802.11e: QoS provisioning at the MAC layer

Volume 11, Issue 2

2 -- 0Michele Zorzi. Implementimg 4G technology
4 -- 6Willie W. Lu, Bernhard Walke, Xuemin Shen. 4G mobile communications: toward open wireless architecture
7 -- 13Gustavo Carneiro, José Ruela, Manuel Ricardo. Cross-layer design in 4G wireless terminals
14 -- 22Norbert Niebert, Andreas Schieder, Henrik Abramowicz, Göran Malmgren, Joachim Sachs, Uwe Horn, Christian Prehofer, Holger Karl. Ambient networks: an architecture for communication networks beyond 3G
24 -- 30Hung-Yu Wei, Richard D. Gitlin. Two-hop-relay architecture for next-generation WWAN/WLAN integration
32 -- 39Dongmei Zhao, Terence D. Todd. Real-time traffic support in relayed wireless access networks using IEEE 802.11
40 -- 47Stavros Xynogalas, Maria Chantzara, Irene Sygkouna, Stavros Vrontis, Ioanna Roussaki, Miltiades E. Anagnostou. Context management for the provision of adaptive services to roaming users
48 -- 54Hai Jiang, Weihua Zhuang. Quality-of-service provisioning in future 4G CDMA cellular networks
56 -- 63Masugi Inoue, Khaled Mahmud, Homare Murakami, Mikio Hasegawa, Hiroyuki Morikawa. Novel out-of-band signaling for seamless interworking betweem heterogeneous networks
64 -- 71Samer L. Hijazi, Balasubramaniam Natarajan, Marco Michelini, Zhiqiang Wu 0001, Carl R. Nassar. Flexible spectrum use and better coexistence at the physical layer of future wireless systems via a multicarrier platform

Volume 11, Issue 1

2 -- 0Michele Zorzi. Security in wireless systems
6 -- 7Thomas Y. C. Woo, Yacov Yacobi. Topics in wireless security
8 -- 18Geir M. Køien. An introduction to access security in UMTS
19 -- 25Greg Rose, Geir M. Køien. Access security in CDMA2000, including a comparison with UMTS access security
26 -- 36Arunesh Mishra, Minho Shin, Nick L. Petroni Jr., T. Charles Clancy, William A. Arbaugh. Proactive key distribution using neighbor graphs
38 -- 47Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang 0001. Security in mobile ad hoc networks: challenges and solutions
48 -- 60Amitabh Mishra, Ketan Nadkarni, Animesh Patcha. Intrusion detection in wireless ad hoc networks
62 -- 67Kristin Lauter. The advantages of elliptic curve cryptography for wireless security
68 -- 71Kamal Jain. Security based on network topology against the wiretapping attack