


Остановите войну!
for scientists:


default search action
Computer Communications, Volume 31
Volume 31, Number 1, January 2008
- Polychronis Koutsakis
:
On modeling multiplexed VBR videoconference traffic from H.263 video coders. 1-4
- Ali Mohammad Zareh Bidoki, Nasser Yazdani, Sayed Vahid Azhari:
A logarithmic scheduling algorithm for high speed input-queued switches. 5-18 - Gurusamy Mohan
, E. Cheng Tien:
QoS routing in GMPLS-capable integrated IP/WDM networks with router cost constraints. 19-34 - Yih-Fuh Wang:
Non-blocking extended OVSF codes on multi-rate CDMA systems. 35-48 - Salman AlQahtani, Ashraf S. Hasan Mahmoud
:
Performance analysis of two throughput-based call admission control schemes for 3G WCDMA wireless networks supporting multiservices. 49-57 - Wei Wang, Xiaohong Guan, Xiangliang Zhang:
Processing of massive audit data streams for real-time anomaly intrusion detection. 58-72 - Vitalio Alfonso Reguera
, Félix F. Álvarez Paliza, Walter Godoy Jr., Evelio M. García Fernández
:
On the impact of active queue management on VoIP quality of service. 73-87 - Bazil Taha Ahmed
, Miguel Calvo-Ramón
:
WCDMA downlink capacity of cigar-shaped microcells using soft hand-over with SIR-based power control for over-ground train service. 88-94 - Thamer Al-Meshhadany, Wessam Ajib:
The impact of code allocation on the multiple access interference in WCDMA systems. 95-102 - Salman AlQahtani:
Adaptive rate scheduling for 3G networks with shared resources using the generalized processor sharing performance model. 103-111 - Xingwei Wang, Lei Guo, Cunqian Yu:
RLDP: A novel risk-level disjoint protection routing algorithm with shared backup resources for survivable backbone optical transport networks. 112-118 - Vidhyacharan Bhaskar, Kondo H. Adjallah
:
A hybrid closed queuing network approach to model dataflow in networked distributed processors. 119-128 - Stylianos Georgoulas, Panos Trimintzios, George Pavlou, Kin-Hon Ho:
An integrated bandwidth allocation and admission control framework for the support of heterogeneous real-time traffic in class-based IP networks. 129-152 - Namhoon Kim, Jongman Heo, Hyung Seok Kim, Wook Hyun Kwon:
Reconfiguration of clusterheads for load balancing in wireless sensor networks. 153-159 - Sajjad Zarifzadeh, Amir Nayyeri, Nasser Yazdani:
Efficient construction of network topology to conserve energy in wireless ad hoc networks. 160-173 - Won-Hyoung Park, Sunghyun Cho, Saewoong Bahk:
Scheduler design for multiple traffic classes in OFDMA networks. 174-184
- Saralees Nadarajah:
Comment on "Modeling and analysis of mobility management state of packet-switched (PS) services in GPRS". 185-186
Volume 31, Number 2, February 2008
- Javed I. Khan, Adam Wierzbicki
:
Guest editors' introduction: Foundation of peer-to-peer computing. 187-189 - Chao Xie, Guihai Chen
, Art Vandenberg, Yi Pan:
Analysis of hybrid P2P overlay network topology. 190-200 - Kolja Eger, Ulrich Killat:
Bandwidth trading in BitTorrent-like P2P networks for content distribution. 201-211 - Dongyu Qiu, Weiqian Sang:
Global stability of Peer-to-Peer file sharing systems. 212-219 - Di Wu, Ye Tian
, Kam-Wing Ng, Anwitaman Datta
:
Stochastic analysis of the interplay between object maintenance and churn. 220-239 - Murat Karakaya
, Ibrahim Korpeoglu, Özgür Ulusoy:
A connection management protocol for promoting cooperation in Peer-to-Peer networks. 240-256 - Albert Creus-Mir, Ramon Casadesus-Masanell, Andres Hervas-Drane:
Bandwidth allocation in peer-to-peer file sharing networks. 257-265 - Esther Palomar, Juan M. Estévez-Tapiador
, Julio César Hernández Castro
, Arturo Ribagorda:
Secure content access and replication in pure P2P networks. 266-279 - Thorsten Schütt, Florian Schintke, Alexander Reinefeld:
Range queries on structured overlay networks. 280-291 - Vladimir M. Vishnevsky
, Alexander A. Safonov, Mikhail Yakimov, Eunsoo Shim, Alexander D. Gelman:
Scalable blind search and broadcasting over Distributed Hash Tables. 292-303 - Shiping Chen, Zhan Zhang, Shigang Chen, Baile Shi:
Efficient file search in non-DHT P2P networks. 304-317 - Cong Shi, Dingyi Han, Yuanjie Liu, Shicong Meng, Yong Yu:
A dynamic routing protocol for keyword search in unstructured peer-to-peer networks. 318-331 - Farnoush Banaei Kashani, Cyrus Shahabi
:
Partial read from peer-to-peer databases. 332-345 - Duc A. Tran
, Thinh P. Nguyen:
Hierarchical multidimensional search in peer-to-peer networks. 346-357 - Alejandra N. González-Beltrán
, Peter Milligan, Paul Sage:
Range queries over skip tree graphs. 358-374 - Wolfgang Müller, P. Oscar Boykin, Vwani P. Roychowdhury, Nima Sarshar:
Comparison of image similarity queries in P2P systems. 375-386 - James Walkerdine, Danny Hughes, Paul Rayson
, John Simms, Kiel Mark Gilleade, John A. Mariani
, Ian Sommerville:
A framework for P2P application development. 387-401 - Kazuyuki Shudo, Yoshio Tanaka
, Satoshi Sekiguchi:
Overlay Weaver: An overlay construction toolkit. 402-412
Volume 31, Number 3, February 2008
- Javed I. Khan, Adam Wierzbicki
:
Guest editors' introduction: Disruptive networking with peer-to-peer systems. 419-422 - Alberto Mozo, Joaquín Salvachúa
:
Scalable tag search in social network applications. 423-436 - Daniel Cutting, Aaron J. Quigley
, Björn Landfeldt:
SPICE: Scalable P2P implicit group messaging. 437-451 - John F. Buford, Alan Brown, Mario Kolberg
:
Exploiting parallelism in the design of peer-to-peer overlays. 452-463 - Eng Keong Lua, Xiaoming Zhou, Jon Crowcroft, Piet Van Mieghem:
Scalable multicasting with network-aware geometric overlay. 464-488 - Dario Pompili, Caterina M. Scoglio
, Luca Lopez:
Multicast algorithms in service overlay networks. 489-505 - Tai T. Do, Kien A. Hua, Mounir A. Tantaoui:
Robust video-on-demand streaming in peer-to-peer environments. 506-519 - Yang Guo, Kyoungwon Suh, Jim Kurose, Donald F. Towsley
:
DirectStream: A directory-based peer-to-peer video streaming service. 520-536 - Sang-Seon Byun, Chuck Yoo:
Minimum DVS gateway deployment in DVS-based overlay streaming. 537-550 - Behzad Akbari, Hamid R. Rabiee
, Mohammed Ghanbari
:
An optimal discrete rate allocation for overlay video multicasting. 551-562 - Maya Haridasan, Robbert van Renesse:
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination. 563-575 - Stefan Zöls, Zoran Despotovic, Wolfgang Kellerer
:
On hierarchical DHT systems - An analytical approach for optimal designs. 576-590 - Jiadi Yu, Minglu Li:
CBT: A proximity-aware peer clustering system in large-scale BitTorrent-like peer-to-peer networks. 591-602 - Peter Kersch, Róbert Szabó, Lawrence Cheng, Kerry Jean, Alex Galis:
Stochastic maintenance of overlays in structured P2P systems. 603-619 - Vincenza Carchiolo
, Michele Malgeri, Giuseppe Mangioni, Vincenzo Nicosia
:
Emerging structures of P2P networks induced by social relationships. 620-628 - Javed I. Khan, Asrar U. Haque
:
Computing with data non-determinism: Wait time management for peer-to-peer systems. 629-642 - Thomas Zahn, Jochen H. Schiller
:
Designing structured peer-to-peer overlays as a platform for distributed network applications in mobile ad hoc networks. 643-654
Volume 31, Number 4, March 2008
- Sudip Misra, Subhas C. Misra, Isaac Woungang:
Algorithmic and theoretical aspects of wireless ad hoc and sensor networks. 655-658 - Xuefei Cao, Weidong Kou, Lanjun Dang, Bin Zhao:
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks. 659-667 - Stefano Basagni, Chiara Petrioli
, Roberto Petroccia:
Efficiently reconfigurable backbones for wireless sensor networks. 668-698 - Sangho Yi, Hong Min, Yookun Cho, Jiman Hong:
Molecule: An adaptive dynamic reconfiguration scheme for sensor operating systems. 699-707 - Hadi Otrok
, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya:
A game-theoretic intrusion detection model for mobile ad hoc networks. 708-721 - P. Venkata Krishna
, N. Ch. S. N. Iyengar, Sudip Misra:
An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid cellular and ad-hoc networks. 722-733 - Frederik Armknecht, Dirk Westhoff, Joao Girão, Alban Hessler:
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing. 734-749 - Chor Ping Low, Can Fang, Jim Mee Ng, Yew-Hock Ang:
Efficient Load-Balanced Clustering Algorithms for wireless sensor networks. 750-759 - Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra, Isaac Woungang:
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. 760-769 - Jacques M. Bahi, Abdallah Makhoul
, Ahmed Mostefaoui:
Localization and coverage for high density sensor networks. 770-781 - Xianren Wu, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves:
Modeling of topology evolutions and implication on proactive routing overhead in MANETs. 782-792 - Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bhargava:
A role-based access in a hierarchical sensor network architecture to provide multilevel security. 793-806 - Alaa Eddien Abdallah
, Thomas Fevens, Jaroslav Opatrny:
High delivery rate position-based routing algorithms for 3D ad hoc networks. 807-817 - Somanath Tripathy
, Sukumar Nandi
:
Defense against outside attacks in wireless sensor networks. 818-826 - Stéphane Maag, Cyril Grepet, Ana R. Cavalli:
A formal validation methodology for MANET routing protocols based on nodes' self similarity. 827-841 - Huirong Fu, Satoshi Kawamura, Ming Zhang, Liren Zhang:
Replication attack on random key pre-distribution schemes for wireless sensor networks. 842-857
Volume 31, Number 5, March 2008
- Luciano Bononi, Albert Y. Zomaya
:
Special issue on "Mobility Management and Wireless Access". 871-872
- Sangheon Pack
, Byoungwook Lee, Taekyoung Kwon, Yanghee Choi:
A pointer forwarding scheme with mobility-aware binding update in Mobile IPv6 networks. 873-884 - Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska
:
Performance analysis of multi-radio AODV in hybrid wireless mesh networks. 885-895 - Ioannis Chatzigiannakis
, Athanasios Kinalis, Sotiris E. Nikoletseas:
Efficient data propagation strategies in wireless sensor networks using a single mobile sink. 896-914 - Eduardo Cerqueira, Luis Veloso, Augusto Neto
, Marília Curado
, Edmundo Monteiro
, Paulo Mendes
:
Mobility management for multi-user sessions in next generation wireless systems. 915-934 - Alessandra Toninelli
, Antonio Corradi
, Rebecca Montanari
:
Semantic-based discovery to support mobile context-aware service access. 935-949 - Abd-Elhamid M. Taha, Hossam S. Hassanein, Hussein T. Mouftah:
Vertical handoffs as a radio resource management tool. 950-961 - Mahesh Sooriyabandara, Tim Farnham, Costas Efthymiou, Matthias Wellens, Janne Riihijärvi, Petri Mähönen, Alain Gefflaut, José Antonio Galache, Diego Melpignano, Arthur van Rooijen:
Unified Link Layer API: A generic and open API to manage wireless media access. 962-979 - Lukasz Budzisz, Ramon Ferrús
, Anna Brunström, Karl-Johan Grinnemo, R. Fracchia, Giulio Galante, Ferran Casadevall
:
Towards transport-layer mobility: Evolution of SCTP multihoming. 980-998 - Meng-Shiuan Pan
, Yu-Chee Tseng:
Quick convergecast in ZigBee beacon-enabled tree-based wireless sensor networks. 999-1011 - Mohsin Iftikhar, Tejeshwar Singh, Björn Landfeldt, Mine Çaglar
:
Multiclass G/M/1 queueing system with self-similar input and non-preemptive priority. 1012-1027 - Richard Werner Nelem Pazzi
, Azzedine Boukerche:
Mobile data collector strategy for delay-sensitive applications over wireless sensor networks. 1028-1039 - Georg Treu, Axel Küpper
, Thomas Wilder:
Extending the LBS-framework TraX: Efficient proximity detection with dead reckoning. 1040-1051
Volume 31, Number 6, April 2008
- Miguel A. Labrador, Katina Michael
, Axel Küpper
:
Advanced location-based services. 1053-1054
- Álvaro Marco
, Roberto Casas, Jorge L. Falcó, Héctor J. Gracia, José Ignacio Artigas
, Armando Roy:
Location-based services for elderly and disabled people. 1055-1066 - Abhishek Patil, Jonathan P. Munson, David Wood, Alan Cole:
Bluebot: Asset tracking via robotic location crawling. 1067-1077 - Paolo Bellavista
, Antonio Corradi
, Carlo Giannelli:
The PoSIM middleware for translucent and context-aware integrated management of heterogeneous positioning systems. 1078-1090 - Sean J. Barbeau
, Miguel A. Labrador, Philip L. Winters
, Rafael A. Pérez, Nevine Labib Georggi:
Location API 2.0 for J2ME - A new standard in location for Java-enabled mobile phones. 1091-1103 - Martin Dawson:
The Internet location services model. 1104-1113 - Hasari Celebi, Hüseyin Arslan
:
Enabling location and environment awareness in cognitive radios. 1114-1125 - Christos Laoudias
, Christos G. Panayiotou
, Christos Desiniotis, John G. Markoulidakis, Juuso Pajunen, S. Nousiainen:
Part one: The Statistical Terminal Assisted Mobile Positioning methodology and architecture. 1126-1137 - John G. Markoulidakis, C. Dessiniotis, D. Nikolaidis:
Part two: Kalman filtering options for error minimization in statistical terminal assisted mobile positioning. 1138-1147 - Marian Mohr, Christopher Edwards, Ben McCarthy:
A study of LBS accuracy in the UK and a novel approach to inferring the positioning technology employed. 1148-1159 - Sangeeta Bhattacharya, Chien-Liang Fok, Chenyang Lu, Gruia-Catalin Roman:
MLDS: A flexible location directory service for tiered sensor networks. 1160-1172 - Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Jan Martin Surminen:
Location constraints in digital rights management. 1173-1180 - Agusti Solanas
, Antoni Martínez-Ballesté
:
A TTP-free protocol for location privacy in location-based services. 1181-1191 - Michael G. Michael, Sarah Jean Fusco, Katina Michael
:
A research note on ethics in the emerging age of überveillance. 1192-1199
- Olabisi Emmanuel Falowo
, H. Anthony Chan:
Joint call admission control algorithms: Requirements, approaches, and design considerations. 1200-1217
- Enrique Hernández-Orallo
, Joan Vila i Carbó:
Fast and efficient routing algorithms for delay-bounded and dependable channels. 1218-1226 - Mari Carmen Domingo
, Rui Prior
:
Energy analysis of routing protocols for underwater wireless sensor networks. 1227-1238 - Mohammad Malli, Chadi Barakat
, Walid Dabbous:
CHESS: An application-aware space for enhanced scalable services in overlay networks. 1239-1253
Volume 31, Number 7, May 2008
- Xiaobo Zhou, Liqiang Zhang:
Special issue: Resource management and routing in wireless mesh networks. 1255-1258
- Bing He, Bin Xie, Dharma P. Agrawal:
Optimizing deployment of Internet gateway in Wireless Mesh Networks. 1259-1275 - Bo Wang, Matt W. Mutka
:
QoS-aware fair rate allocation in wireless mesh networks. 1276-1289 - Roberto Riggio
, Daniele Miorandi, Francesco De Pellegrini, Fabrizio Granelli
, Imrich Chlamtac:
A traffic aggregation and differentiation scheme for enhanced QoS in IEEE 802.11-based Wireless Mesh Networks. 1290-1300 - Mesut Ali Ergin, Marco Gruteser, Lin Luo, Dipankar Raychaudhuri, Hang Liu:
Available bandwidth estimation and admission control for QoS routing in wireless mesh networks. 1301-1317 - Najah A. Abu Ali
, Hossam S. Hassanein:
Statistical delay budget partitioning in wireless mesh networks. 1318-1328 - Ting-Yu Lin, Wai-Hong Tam, Kang-Lun Fan, Yu-Chee Tseng:
Resource planning and packet forwarding in multi-radio, multi-mode, multi-channel, multi-rate (M4) wireless mesh networks. 1329-1342 - Stefano Avallone
, Ian F. Akyildiz:
A channel assignment algorithm for multi-radio wireless mesh networks. 1343-1353 - Irfan Sheriff, Prashanth Aravinda Kumar Acharya, Elizabeth M. Belding:
Measurement-driven admission control on wireless backhaul networks. 1354-1371 - Jun Wang
, Peng Du, Weijia Jia, Liusheng Huang, Huan Li:
Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links. 1372-1384 - Uyen Trang Nguyen:
On multicast routing in wireless mesh networks. 1385-1399 - Georgios Rodolakis, Anis Laouiti, Philippe Jacquet, Amina Meraihi Naimi:
Multicast overlay spanning trees in ad hoc networks: Capacity bounds, protocol design and performance evaluation. 1400-1412 - Jangeun Jun, Mihail L. Sichitiu
:
MRP: Wireless mesh networks routing protocol. 1413-1435 - Xin Wang, J. J. Garcia-Luna-Aceves:
Distributed joint channel assignment, routing and scheduling for wireless mesh networks. 1436-1446 - Jun Xiao, Naixue Xiong, Laurence Tianruo Yang, Yanxiang He:
A joint selfish routing and channel assignment game in wireless mesh networks. 1447-1459 - Devu Manikantan Shila, Tricha Anjali:
Load aware traffic engineering for mesh networks. 1460-1469
Volume 31, Number 8, May 2008
- Xiaobo Zhou, Liqiang Zhang:
Special issue: Modeling, testbeds, and applications in wireless mesh networks. 1471-1474