


default search action
Computer Networks, Volume 50
Volume 50, Number 1, January 2006
- Christos Nomikos, Aris Pagourtzis

, Katerina Potika
, Stathis Zachos:
Routing and wavelength assignment in multifiber WDM networks with non-uniform fiber cost. 1-14 - Yuming Jiang

:
Delay bound and packet scale rate guarantee for some expedited forwarding networks. 15-28 - Thijs Lambrecht, Bart Duysburgh, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester:

Optimizing multimedia transcoding multicast trees. 29-45 - Kun-Chan Lan, John S. Heidemann:

A measurement study of correlations of Internet flow characteristics. 46-62 - Daniele Miorandi, Arzad Alam Kherani, Eitan Altman:

A queueing model for HTTP traffic over IEEE 802.11 WLANs. 63-79 - Jun-Hong Cui, Li Lao, Michalis Faloutsos

, Mario Gerla:
AQoSM: Scalable QoS multicast provisioning in Diff-Serv networks. 80-105 - An-Hsun Cheng, Yuh-Jzer Joung

:
Probabilistic file indexing and searching in unstructured peer-to-peer networks. 106-127 - Novella Bartolini

, Emiliano Casalicchio:
A performance analysis of context transfer protocols for QoS enabled internet services. 128-144
Volume 50, Number 2, February 2006
- Harry G. Perros:

Optical networks. 145-148 - Li-Wei Chen, Poompat Saengudomlert, Eytan H. Modiano:

Uniform versus non-uniform band switching in WDM networks. 149-167 - Anwar Haque

, Pin-Han Ho, Raouf Boutaba:
Group shared protection for spare capacity reconfiguration in optical networks. 168-180 - Michael T. Frederick, Pallab Datta, Arun K. Somani:

Sub-graph routing: A generalized fault-tolerant strategy for link failures in WDM optical networks. 181-199 - Narendra K. Singhal, Canhui Ou, Biswanath Mukherjee:

Cross-sharing vs. self-sharing trees for protecting multicast sessions in mesh networks. 200-206 - Achille Pattavina:

Performance of deflection routing algorithms in IP optical transport networks. 207-218 - Tzvetelina Battestilli

, Harry G. Perros:
A performance study of an optical burst switched network with dynamic simultaneous link possession. 219-236 - Nizar Bouabdallah, André-Luc Beylot, Guy Pujolle:

Efficient bandwidth sharing and fair access in single-hub WDM rings. 237-250 - Eva Marín-Tordera, Xavier Masip-Bruin

, Sergio Sánchez-López, Josep Solé-Pareta
, Jordi Domingo-Pascual:
A hierarchical routing approach for optical transport networks. 251-267 - Lorne Mason, Anton Vinokurov, Ning Zhao, David V. Plant:

Topological design and dimensioning of Agile All-Photonic Networks. 268-287
Volume 50, Number 3, February 2006
- Sun-Myeng Kim

, Young-Jong Cho:
A distributed collision resolution scheme for improving the performance in wireless LANs. 289-300 - Qin Zheng, Gurusamy Mohan

:
Multi-layer protection in IP-over-WDM networks with and with no backup lightpath sharing. 301-316 - Randeep Bhatia, Murali S. Kodialam, T. V. Lakshman:

Fast network re-optimization schemes for MPLS and optical networks. 317-331 - Leopoldo Angrisani, Salvatore D'Antonio, Marcello Esposito, Michele Vadursi

:
Techniques for available bandwidth measurement in IP networks: A performance comparison. 332-349 - Yongqing Zhu, Maode Ma, Tee Hiang Cheng:

Hierarchical scheduling to support differentiated services in Ethernet passive optical networks. 350-366 - Dario Di Sorte, Mauro Femminella, Leonardo Piacentini, Gianluca Reali:

Performance evaluation of the push-mode-multicast based candidate access router discovery (PMM CARD). 367-397 - Dan Pei

, Beichuan Zhang, Daniel Massey, Lixia Zhang:
An analysis of convergence delay in path vector routing protocols. 398-421 - Kartikeya Chandrayana, Sthanunathan Ramakrishnan, Biplab Sikdar

, Shivkumar Kalyanaraman:
On randomizing the sending times in TCP and other window based algorithms. 422-447 - Nicolas Bonmariage, Guy Leduc:

A survey of optimal network congestion control for unicast and multicast transmission. 448-468
Volume 50, Number 4, March 2006
- Raouf Boutaba, Alan Marshall:

Management in peer-to-peer systems: Trust, reputation and security. 469-471 - Sergio Marti, Hector Garcia-Molina:

Taxonomy of trust: Categorizing P2P reputation systems. 472-484 - Zoran Despotovic, Karl Aberer:

P2P reputation management: Probabilistic estimation vs. social networks. 485-500 - Minaxi Gupta, Mostafa H. Ammar, Mustaque Ahamad:

Trade-offs between reliability and overheads in peer-to-peer reputation tracking. 501-522 - Rob Sherwood, Seungjoon Lee, Bobby Bhattacharjee:

Cooperative peer groups in NICE. 523-544 - Loubna Mekouar

, Youssef Iraqi
, Raouf Boutaba:
Peer-to-peer's most wanted: Malicious peers. 545-562 - Thanasis G. Papaioannou

, George D. Stamoulis:
Reputation-based policies that provide the right incentives in peer-to-peer environments. 563-578 - Vivek Pathak, Liviu Iftode:

Byzantine fault tolerant public key authentication in peer-to-peer systems. 579-596
Volume 50, Number 5, 6 April 2006
- Ian F. Akyildiz, Harry Rudin:

Editorial. 597-598 - Levente Tamási, Dániel Orincsay, Balázs Gábor Józsa:

Cost-optimal design of VoIP networks using the VPN concept. 599-614 - Edith Cohen, Balachander Krishnamurthy:

A short walk in the Blogistan. 615-630 - Hans van den Berg, Michel Mandjes, Remco van de Meent, Aiko Pras, Frank Roijers, Pieter Venemans:

QoS-aware bandwidth provisioning for IP network links. 631-647 - Shudong Jin, Azer Bestavros

:
Small-world characteristics of Internet topologies and implications on multicast scaling. 648-666 - Weiying Zhu, Min Song:

Integration of unicast and multicast scheduling in input-queued packet switches. 667-687 - Fulvio Risso

, Mario Baldi:
NetPDL: An extensible XML-based language for packet header description. 688-706 - Bo Li, Roberto Battiti

, Akira Fukuda:
Performance analysis of a service-dependent handoff scheme in voice/data integrated cellular mobile systems. 707-730
Volume 50, Number 6, 13 April 2006
- Laurent Mathy, David Hutchison

, Thomas Plagemann, Peter Steenkiste
:
Overlay distribution structures and their applications. 739-741 - Yong Zhu, Constantinos Dovrolis, Mostafa H. Ammar:

Dynamic overlay routing based on available bandwidth estimation: A simulation study. 742-762 - Ju Wang, Andrew A. Chien:

Understanding when location-hiding using overlay networks is feasible. 763-780 - Beichuan Zhang, Wenjie Wang, Sugih Jamin, Daniel Massey, Lixia Zhang:

Universal IP multicast delivery. 781-806 - Karthik Lakshminarayanan, Ananth Rao, Ion Stoica, Scott Shenker:

End-host controlled multicast routing. 807-825 - Suman Banerjee, Christopher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller:

OMNI: An efficient overlay multicast infrastructure for real-time applications. 826-841 - Jian Liang, Rakesh Kumar, Keith W. Ross:

The FastTrack overlay: A measurement study. 842-858 - Xiaotao Liu, Jiang Lan, Prashant J. Shenoy

, Krithi Ramamritham:
Consistency maintenance in dynamic peer-to-peer overlay networks. 859-876
Volume 50, Number 7, May 2006
- Vehbi C. Gungor, Frank C. Lambert:

A survey on communication networks for electric system automation. 877-897 - Maria Fazio

, Massimo Villari
, Antonio Puliafito:
IP address autoconfiguration in ad hoc networks: Design, implementation and measurements. 898-920 - Hongli Luo, Mei-Ling Shyu, Shu-Ching Chen:

An optimal resource utilization scheme with end-to-end congestion control for continuous media stream transmission. 921-937 - Erdal Cayirci, Vedat Coskun

, Caghan Cimen:
Querying sensor networks by using dynamic task sets. 938-952 - Rong-Hong Jan, Ching-Peng Lin, Maw-Sheng Chern:

An optimization model for Web content adaptation. 953-965 - Antonio Capone

, Luigi Fratta, Fabio Martignon:
Dynamic online QoS routing schemes: Performance and bounds. 966-981 - Eitan Altman, Dhiman Barman, Rachid El Azouzi

, David Ros, Bruno Tuffin:
Pricing differentiated services: A game-theoretic approach. 982-1002 - Xudong Wang:

A capacity acquisition protocol for channel reservation in CDMA networks. 1003-1021
Volume 50, Number 8, June 2006
- Giuseppe Bianchi

, Marco Listanti
, Michela Meo
, Maurizio M. Munafò:
Selected papers from the 3rd international workshop on QoS in multiservice IP networks (QoS-IP 2005). 1023-1025 - Markus Fidler, Stephan Recker:

Conjugate network calculus: A dual approach applying the Legendre transform. 1026-1039 - Alexander Sayenko, Timo Hämäläinen

, Jyrki Joutsensalo, Lari Kannisto:
Comparison and analysis of the revenue-based adaptive queuing models. 1040-1058 - Juha Leino, Jorma T. Virtamo:

Insensitive load balancing in data networks. 1059-1068 - Raffaele Bolla

, Roberto Bruschi
, Franco Davoli
:
Capacity planning in IP Virtual Private Networks under mixed traffic. 1069-1085 - Emílio C. G. Wille

, Marco Mellia
, Emilio Leonardi
, Marco Ajmone Marsan:
Algorithms for IP network design with end-to-end QoS constraints. 1086-1103 - György Dán, Viktória Fodor, Gunnar Karlsson

:
On the effects of the packet size distribution on FEC performance. 1104-1129 - Manodha Gamage, Mitsuo Hayasaka, Tetsuya Miki:

A connection-oriented network architecture with guaranteed QoS for future real-time applications over the Internet. 1130-1144 - Cédric de Launois, Bruno Quoitin

, Olivier Bonaventure:
Leveraging network performance with IPv6 multihoming and multiple provider-dependent aggregatable prefixes. 1145-1157 - Liesbeth Peters, Ingrid Moerman

, Bart Dhoedt, Piet Demeester:
Q-MEHROM: Mobility support and resource reservations for mobile senders and receivers. 1158-1175 - Giovanni Neglia, Vincenzo Falletta, Giuseppe Bianchi

:
An analytical model of a new packet marking algorithm for TCP flows. 1176-1191
Volume 50, Number 9, June 2006
- Öznur Özkasap

, Mine Çaglar
:
Traffic characterization of transport level reliable multicasting: Comparison of epidemic and feedback controlled loss recovery. 1193-1218 - Dianxun Shuai, Xiang Feng:

The parallel optimization of network bandwidth allocation based on generalized particle model. 1219-1246 - Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Jiau, Wei-Te Hu:

Detection and diagnosis of data inconsistency failures in wireless sensor networks. 1247-1260 - Flavio De Angelis, Ibrahim W. Habib, Fabrizio Davide

, Mahmoud Naghshineh:
Increasing revenues via adaptive filtering in wired/wireless networks. 1261-1280 - Tian Bu, Samphel Norden, Thomas Y. C. Woo:

A survivable DoS-resistant overlay network. 1281-1301 - Jiwei Chen, Fernando Paganini, M. Y. Sanadidi, Ren Wang, Mario Gerla:

Fluid-flow analysis of TCP Westwood with RED. 1302-1326 - Stéphane Lafrance:

Using equivalence-checking to verify robustness to denial of service. 1327-1348 - Tamma Bheemarjuna Reddy

, S. Sriram, B. S. Manoj
, C. Siva Ram Murthy:
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks. 1349-1383 - Hailong Li, Malvin Wei Liak Tan, Ian Li-Jin Thng:

Fairness issue and monitor-based algorithm in optical burst switching networks. 1384-1405 - Fu-Yuan Lee, Shiuh-Pyng Shieh:

Packet classification using diagonal-based tuple space search. 1406-1423
Volume 50, Number 10, July 2006
- Mark Levene, Alexandra Poulovassilis:

Special issue on Web dynamics. 1425-1429 - Yiping Ke

, Lin Deng, Wilfred Ng
, Dik Lun Lee
:
Web dynamics and their ramifications for the development of Web search engines. 1430-1447 - Judit Bar-Ilan

, Mazlita Mat-Hassan, Mark Levene:
Methods for comparing rankings of search engine results. 1448-1463 - Ricardo A. Baeza-Yates

, Barbara Poblete
:
Dynamics of the Chilean Web structure. 1464-1473 - Hua-Fu Li, Suh-Yin Lee, Man-Kwan Shan:

DSM-PLW: Single-pass mining of path traversal patterns over streaming Web click-sequences. 1474-1487 - Olfa Nasraoui

, Carlos Rojas, Cesar Cardona:
A framework for mining evolving trends in Web data streams using dynamic learning and retrospective validation. 1488-1512 - George Papamarkos, Alexandra Poulovassilis, Peter T. Wood

:
Event-condition-action rules on RDF metadata in P2P environments. 1513-1532 - Stefano Ceri, Florian Daniel

, Federico Michele Facca
:
Modeling web applications reacting to user behaviors. 1533-1546 - Anoop Sanka, Shravan Chamakura, Sharma Chakravarthy

:
A dataflow approach to efficient change detection of HTML/XML documents in WebVigiL. 1547-1563 - Delfina Malandrino

, Vittorio Scarano
:
Tackling Web dynamics by programmable proxies. 1564-1580
- Roberto De Prisco

, Sergio Rajsbaum
:
Algorithmic problems in distributed systems. 1581-1582 - Qixiang Sun, Neil Daswani, Hector Garcia-Molina:

Maximizing remote work in flooding-based peer-to-peer systems. 1583-1598 - J. J. Garcia-Luna-Aceves, Marc Mosko

, Charles E. Perkins:
A new approach to on-demand loop-free routing in networks using sequence numbers. 1599-1615 - Ittai Abraham, Danny Dolev

:
Asynchronous resource discovery. 1616-1629 - Pierre Fraigniaud, Cyril Gavoille:

Header-size lower bounds for end-to-end communication in memoryless networks. 1630-1638 - Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:

Secure acknowledgment aggregation and multisignatures with limited robustness. 1639-1652
Volume 50, Number 11, August 2006
- Hua Zhu, Imrich Chlamtac:

Admission control and bandwidth reservation in multi-hop ad hoc networks. 1653-1674 - Puneet Sharma, Jack Brassil, Sung-Ju Lee, Kang G. Shin:

Improving aggregated channel performance through decentralized channel monitoring. 1675-1691 - Tippyarat Tansupasiri, Kanchana Kanchanasut, Chadi Barakat

, Philippe Jacquet:
Using active networks technology for dynamic QoS. 1692-1709 - Gustavo B. Figueiredo, Nelson L. S. da Fonseca

, José Augusto Suruagy Monteiro
:
A minimum interference routing algorithm with reduced computational complexity. 1710-1732 - Hao Shang, Craig E. Wills:

Piggybacking related domain names to improve DNS performance. 1733-1748 - Albert Banchs, Luca Vollero:

Throughput analysis and optimal configuration of 802.11e EDCA. 1749-1768 - Serge A. Krashakov

, Anton B. Teslyuk, Lev N. Shchur:
On the universality of rank distributions of website popularity. 1769-1780 - Eunjin Jung, Alex X. Liu, Mohamed G. Gouda:

Key bundles and parcels: Secure communication in many groups. 1781-1798 - Eitan Altman, Rachid El Azouzi, David Ros, Bruno Tuffin:

Loss strategies for competing AIMD flows. 1799-1815 - Hyang-Won Lee, Song Chong:

A distributed utility max-min flow control algorithm. 1816-1830 - Florin Baboescu, Priyank Ramesh Warkhede, Subhash Suri, George Varghese:

Fast packet classification for two-dimensional conflict-free filters. 1831-1842 - Georgios Kambourakis

, Angelos N. Rouskas, Stefanos Gritzalis
, Dimitris Geneiatakis:
Support of subscribers' certificates in a hybrid WLAN-3G environment. 1843-1859 - Antonios Argyriou

, Vijay K. Madisetti:
A soft-handoff transport protocol for media flows in heterogeneous mobile networks. 1860-1871 - Hechmi Khlifi, Jean-Charles Grégoire:

Low-complexity offline and online clock skew estimation and removal. 1872-1884
Volume 50, Number 12, August 2006
- Jennifer C. Hou, P. R. Kumar:

Network modelling and simulation. 1885-1886 - Yijie Han, Richard J. La, Armand M. Makowski, Seungjoon Lee:

Distribution of path durations in mobile ad-hoc networks - Palm's Theorem to the rescue. 1887-1900 - Kyung-Joon Park

, Hyuk Lim
, Chong-Ho Choi:
Stochastic analysis of packet-pair probing for network bandwidth estimation. 1901-1915 - Xiaojun Hei

, Brahim Bensaou, Danny H. K. Tsang:
Model-based end-to-end available bandwidth inference using queueing analysis. 1916-1937 - Tuna Güven, Richard J. La, Mark A. Shayman, Bobby Bhattacharjee:

Measurement-based optimal routing on overlay architectures for unicast sessions. 1938-1951 - Rachid El Abdouni Khayari:

Design and evaluation of web proxies by leveraging self-similarity of web traffic. 1952-1973 - Daniel R. Figueiredo

, Benyuan Liu, Yang Guo, James F. Kurose, Donald F. Towsley
:
On the efficiency of fluid simulation of networks. 1974-1994 - Hwangnam Kim:

Integrating network-calculus-based simulation with packet-level simulation for TCP-operated networks. 1995-2012 - Xenofontas A. Dimitropoulos, George F. Riley:

Efficient large-scale BGP simulations. 2013-2027 - Yu Liu, Boleslaw K. Szymanski

, Adnan Saifee:
Genesis: A scalable distributed system for large-scale parallel network simulation. 2028-2053 - Li Lao, Jun-Hong Cui, Mario Gerla:

A framework for realistic and systematic multicast performance evaluation. 2054-2070 - Assen Golaup, Hamid Aghvami:

A multimedia traffic modeling framework for simulation-based performance evaluation studies. 2071-2087 - Mario Marchese

, Maurizio Mongelli:
On-line bandwidth control for quality of service mapping over satellite independent service access points. 2088-2111 - Frank Yong Li, Norvald Stol, Bjarne E. Helvik

:
Conformance deterioration in QoS networks: Phenomenon, analysis and elimination. 2112-2126
Volume 50, Number 13, September 2006
- Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran

, Shantidev Mohanty:
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey. 2127-2159 - Jianping Zou, M. Ümit Uyar, Mariusz A. Fecko, Sunil Samtani:

Throughput models for SCTP with parallel subflows. 2160-2182 - Mingwei Gong, Carey L. Williamson:

Revisiting unfairness in Web server scheduling. 2183-2203 - Xiaolin Chang, Jogesh K. Muppala

:
A stable queue-based adaptive controller for improving AQM performance. 2204-2224 - Venkatesh Obanaik, Lillykutty Jacob, Akkihebbal L. Ananda:

Secure performance enhancing proxy: To ensure end-to-end security and enhance TCP performance over IPv6 wireless networks. 2225-2238 - Yunkai Zhou, Harish Sethu:

On achieving fairness in the joint allocation of buffer and bandwidth resources: Principles and algorithms. 2239-2254 - Seung Chul Han, Puneet Zaroo, David K. Y. Yau, Yu Dong, Prem Gopalan, John C. S. Lui:

Quality of service provisioning for composable routing elements. 2255-2270 - Lotfi Mhamdi

, Mounir Hamdi
, Christopher Kachris
, Stephan Wong, Stamatis Vassiliadis:
High-performance switching based on buffered crossbar fabrics. 2271-2285 - E. Atteo, Stefano Avallone

, Simon Pietro Romano
:
A link weight assignment algorithm for traffic-engineered networks. 2286-2294 - Tiina Heikkinen:

A potential game approach to distributed power control and scheduling. 2295-2311 - Haibin Sun, John C. S. Lui, David K. Y. Yau:

Distributed mechanism in detecting and defending against the low-rate TCP attack. 2312-2330 - Mina Guirguis, Azer Bestavros

, Ibrahim Matta
:
Exogenous-loss aware traffic management in overlay networks: Toward global fairness. 2331-2348 - Satyajeet Ahuja, Marwan Krunz, Turgay Korkmaz:

Optimal path selection for minimizing the differential delay in Ethernet-over-SONET. 2349-2363 - Shu Shen, Gaoxi Xiao

, Tee Hiang Cheng:
Benefits of advertising wavelength availability in distributed lightpath establishment. 2364-2379 - Brian F. Cooper, Hector Garcia-Molina:

SIL: A model for analyzing scalable peer-to-peer search networks. 2380-2400 - Kui Ren

, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng
:
Routing optimization security in mobile IPv6. 2401-2419
Volume 50, Number 14, October 2006
- Bernhard Plattner, James P. G. Sterbenz

:
Guest Editorial. 2421-2425
- Nadia Shalaby, Yitzchak M. Gottlieb, Mike Wawrzoniak, Larry L. Peterson:

Snow on silk: Layering NodeOS functionality on conventional operating systems. 2426-2443 - Herbert Bos

, Bart Samwel, Ilja Booij:
Dynamically extending the Corral with native code for high-speed packet processing. 2444-2461 - Austin Donnelly:

Lightweight thread tunnelling in network applications. 2462-2474 - Chetan Singh Dhillon, Mary Bond, Jim Griffioen, Kenneth L. Calvert:

Building layered active services. 2475-2487
- Stefan Schmid, Tim Chart, Manolis Sifalakis

, Andrew C. Scott:
A highly flexible service composition framework for real-life networks. 2488-2505 - Marcin Solarski, Matthias Bossardt, Thomas Becker:

Deployment and management of component-based services in active networks. 2506-2518 - Paul Smith

, Steven Simpson
, David Hutchison
:
Locating resources in a programmable networking environment. 2519-2531
- Amit Sehgal, Kenneth L. Calvert, Jim Griffioen:

A flexible concast-based grouping service. 2532-2547 - Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Dekai Li, Jonathan M. Smith:

Flexible network monitoring with FLAME. 2548-2563 - Craig Milo Rogers:

ANQL - An Active Networks Query Language. 2564-2576
Volume 50, Number 15, October 2006
- Sangheon Pack

, Kyoungae Kim, Yanghee Choi:
A cost-effective approach to selective IP paging scheme using explicit multicast. 2577-2594 - V. Vidhyashankar, B. S. Manoj

, C. Siva Ram Murthy:
Slot allocation schemes for delay sensitive traffic support in asynchronous wireless mesh networks. 2595-2613 - Jiang Li, Murat Yuksel, Shivkumar Kalyanaraman:

Explicit rate multicast congestion control. 2614-2640 - Raj Kumar Rajendran, Dan Rubenstein:

Optimizing the quality of scalable video streams on P2P networks. 2641-2658 - Ahmed Meddahi, Hossam Afifi:

"Packet-E-Model": E-Model for VoIP quality evaluation. 2659-2675 - Chia Yuan Cho, Winston Khoon Guan Seah

, Yong Huat Chew:
A framework and source model for design and evaluation of Robust Header Compression. 2676-2712 - Wenye Wang

, Guoliang Xue:
A cost-minimization algorithm for fast location tracking in mobile wireless networks. 2713-2726 - Ken Y. K. Hui, John C. S. Lui, David K. Y. Yau:

Small-world overlay P2P networks: Construction, management and handling of dynamic flash crowds. 2727-2746 - Marc St-Hilaire, Steven Chamberland, Samuel Pierre:

Uplink UMTS network design - an integrated approach. 2747-2761 - Jung-Shian Li, Chuan-Gang Liu:

Improve TCP performance with a novel adaptive queue management scheme in IEEE 802.17 RPR optical networks. 2762-2786 - Aparna Gupta, Shivkumar Kalyanaraman, Lingyi Zhang:

Pricing of risk for loss guaranteed intra-domain internet service contracts. 2787-2804 - Karol Kowalik, Martin Collier

:
Reducing traffic fluctuations of link state QoS routing algorithms in virtual circuit networks. 2805-2819 - Xiaoqiao Meng, Thyaga Nandagopal

, Li Li, Songwu Lu:
Contour maps: Monitoring and diagnosis in sensor networks. 2820-2838 - Hai Liu, Peng-Jun Wan, Xiaohua Jia

:
Maximal lifetime scheduling for K to 1 sensor-target surveillance networks. 2839-2854 - Qing Wei, Károly Farkas, Christian Prehofer, Paulo Mendes

, Bernhard Plattner:
Context-aware handover using active network technology. 2855-2872 - Huaming Wu, Alhussein A. Abouzeid

:
Error resilient image transport in wireless sensor networks. 2873-2887 - Ning Chai, Boon Sain Yeo, Yong Huat Chew:

Location management for GPRS. 2888-2901 - Sungoh Kwon

, Ness B. Shroff:
Geographic routing in the presence of location errors. 2902-2917
Volume 50, Number 16, November 2006
- Guanghui He, Jennifer C. Hou:

On sampling self-similar Internet traffic. 2919-2936 - Damianos Gavalas

, Christina Tanya Politi
:
Low-cost itineraries for multi-hop agents designed for scalable monitoring of multiple subnets. 2937-2952 - Patrick D. McDaniel, William Aiello, Kevin R. B. Butler

, John Ioannidis:
Origin authentication in interdomain routing. 2953-2980 - Francesco Vacirca, Thomas Ziegler, Eduard Hasenleithner:

An algorithm to detect TCP spurious timeouts and its application to operational UMTS/GPRS networks. 2981-3001 - Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:

Game traffic analysis: An MMORPG perspective. 3002-3023 - Ming Yu, Wenjui Li, Li-Jin W. Chung:

A practical scheme for MPLS fault monitoring and alarm correlation in backbone networks. 3024-3042 - Simon Balon, Laurent Mélon, Guy Leduc:

A scalable and decentralized fast-rerouting scheme with efficient bandwidth sharing. 3043-3063 - Demetrios Zeinalipour-Yazti

, Vana Kalogeraki
:
Structuring topologically aware overlay networks using domain names. 3064-3082 - Simon S. Lam, Huaiyu Liu:

Failure recovery for structured p2p networks: Protocol design and performance under churn. 3083-3104 - Ashraf M. Hamad, Tao Wu, Ahmed E. Kamal, Arun K. Somani:

On multicasting in wavelength-routing mesh networks. 3105-3164 - Zhenguo Gao, Ling Wang, Mei Yang, Xiaozong Yang:

CNPGSDP: An efficient group-based service discovery protocol for MANETs. 3165-3182 - Danny Dolev

, Sugih Jamin, Osnat Mokryn
, Yuval Shavitt
:
Internet resiliency to attacks and failures under BGP policy routing. 3183-3196 - Jean-Loup Guillaume

, Matthieu Latapy, Damien Magoni
:
Relevance of massively distributed explorations of the Internet topology: Qualitative results. 3197-3224
Volume 50, Number 17, December 2006
- Christos Xenakis

, Nikolaos Laoutaris
, Lazaros F. Merakos
, Ioannis Stavrakakis
:
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms. 3225-3241 - Corinne Touati, Eitan Altman, Jérôme Galtier:

Generalized Nash Bargaining Solution for bandwidth allocation. 3242-3263 - Celeste Campo

, Carlos García-Rubio
, Andrés Marín López
, Florina Almenárez
:
PDP: A lightweight discovery protocol for local-scope interactions in wireless ad hoc networks. 3264-3283 - Daniel Bauer, John N. Daigle, Ilias Iliadis

, Paolo Scotton:
Topology aggregation for combined additive and restrictive metrics. 3284-3299 - Gang Cheng, Nirwan Ansari

:
Rate-distortion based link state update. 3300-3314 - Li Xiao, Guanghui He, Klara Nahrstedt:

BGP session lifetime modeling in congested networks. 3315-3333 - Yu Ge

, Winston Khoon Guan Seah
:
A method to efficiently integrate Internet Telephony call signaling with dynamic resource negotiation. 3334-3352 - Nicolas Christin

, Jörg Liebeherr:
The QoSbox: Quantitative service differentiation in BSD routers. 3353-3374 - Inn Inn Er, Winston Khoon Guan Seah

:
Performance analysis of mobility-based d-hop (MobDHop) clustering algorithm for mobile ad hoc networks. 3375-3399 - Shi Xiao, Gaoxi Xiao

, Yiu-Wing Leung:
A network flow approach for static and dynamic traffic grooming in WDM networks. 3400-3415 - Xiaoming Fu

, Hannes Tschofenig, Dieter Hogrefe:
Beyond QoS signaling: A new generic IP signaling framework. 3416-3433 - Jongkeun Na, Chong-kwon Kim:

GLR: A novel geographic routing scheme for large wireless ad hoc networks. 3434-3448 - Yaoyao Gu, Doruk Bozdag, Robert W. Brewer, Eylem Ekici

:
Data harvesting with mobile elements in wireless sensor networks. 3449-3465 - Tuna Tugcu

, H. Birkan Yilmaz
, Feodor S. Vainstein:
Analytical modeling of CAC in next generation wireless systems. 3466-3484 - John Risson, Tim Moors:

Survey of research towards robust peer-to-peer networks: Search methods. 3485-3521
Volume 50, Number 18, December 2006
- Derek Chi-Wai Pao

, Yiu Keung Li, Peng Zhou:
Efficient packet classification using TCAMs. 3523-3535 - Miao Ma

:
Tabu marking scheme to speedup IP traceback. 3536-3549 - Amol Sahasrabudhe, D. Manjunath:

Performance of optical burst switched networks: A two moment analysis. 3550-3563 - Ugo Monaco, Francesca Cuomo

, Tommaso Melodia
, Fabio Ricciato, Marco Borghini:
Understanding optimal data gathering in the energy and latency domains of a wireless sensor network. 3564-3584 - Hongwei Zhang, Anish Arora:

Guaranteed fault containment and local stabilization in routing. 3585-3607 - Padmavathi Mundur, Poorva Arankalle:

Optimal server allocations for streaming multimedia applications on the Internet. 3608-3621 - Yingfei Dong, Changho Choi, Zhi-Li Zhang:

LIPS: A lightweight permit system for packet source origin accountability. 3622-3641 - Anuj Rawat, Mark A. Shayman:

Preventing persistent oscillations and loops in IBGP configuration with route reflection. 3642-3665 - N. Rammohan, C. Siva Ram Murthy:

On-line multicast routing with QoS constraints in WDM networks with no wavelength converters. 3666-3685 - Yin-Fu Huang, Min-Hsiu Chuang:

Fault tolerance for home agents in mobile IP. 3686-3700 - Flávia Coimbra Delicato, Fábio Protti

, Luci Pirmez, José Ferreira de Rezende
:
An efficient heuristic for selecting active nodes in wireless sensor networks. 3701-3720 - Gang Wu, Edwin K. P. Chong

, Robert Givan:
Predictive buffer control in delivering remotely stored video using proxy servers. 3721-3742 - Yanxing Zheng, Turgay Korkmaz, Wenhua Dou, Jing Tian:

Highly responsive and efficient QoS routing using pre- and on-demand computations along with a new normal measure. 3743-3762 - Novella Bartolini

:
Session based access control in geographically replicated Internet services. 3763-3783 - Kaiyu Zhou, Kwan L. Yeung, Victor O. K. Li:

Nonlinear RED: A simple yet efficient active queue management scheme. 3784-3794

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














