


default search action
Computer Communications, Volume 33
Volume 33, Number 1, January 2010
- Marco Conti

:
Editorial. 1
- John Solis, N. Asokan

, Kari Kostiainen, Philip Ginzboorg
, Jörg Ott:
Controlling resource hogs in mobile delay-tolerant networks. 2-10 - César D. Guerrero

, Miguel A. Labrador:
On the applicability of available bandwidth estimation techniques and tools. 11-22
- Wonyong Yoon, Nitin H. Vaidya:

Routing exploiting multiple heterogeneous wireless interfaces: A TCP performance study. 23-34 - Hua Wang, Xiangxu Meng, Min Zhang, Yanlong Li:

Tabu search algorithm for RP selection in PIM-SM multicast routing. 35-42 - Azita Zolfaghari, Hassan Taheri:

Improving performance of backpressured packet networks by integrating with an end-to-end congestion control algorithm. 43-53 - Ricardo de Moraes

, Francisco Vasques
, Paulo Portugal
, Pedro F. Souto
:
A forcing collision resolution approach able to prioritize traffic in CSMA-based networks. 54-64 - Jordi Perelló

, Fernando Agraz, Salvatore Spadaro
, Jaume Comellas, Gabriel Junyent
:
Using updated neighbor state information for efficient contention avoidance in OBS networks. 65-72 - Saeed Alaei

, Mohammad Ghodsi, Mohammad Toossi:
Skiptree: A new scalable distributed data structure on multidimensional data supporting range-queries. 73-82 - Mingfu Li

, Chun-Huei Wu:
A cost-effective resource allocation and management scheme for content networks supporting IPTV services. 83-91 - Zhaochun Yu, Bin Xiao

, Shuigeng Zhou:
Achieving optimal data storage position in wireless sensor networks. 92-102 - Yousra Chabchoub, Christine Fricker, Fabrice Guillemin

, Philippe Robert:
On the statistical characterization of flows in Internet traffic with application to sampling. 103-112
Volume 33, Number 2, February 2010
- Andrea Bacioccola, Claudio Cicconetti

, Carl Eklund, Luciano Lenzini, Z. Li, Enzo Mingozzi:
IEEE 802.16: History, status and future trends. 113-123 - Zhen Qin, Roberto Rojas-Cessa, Nirwan Ansari

:
Task-execution scheduling schemes for network measurement and monitoring. 124-135
- Dong-Hyun Je, Jun-Sik Lee, Yongsuk Park, Seung-Woo Seo:

Computation-and-storage-efficient key tree management protocol for secure multicast communications. 136-148 - Yi Zhang

, Alexei B. Piunovskiy
, Urtzi Ayesta, Konstantin Avrachenkov
:
Convergence of trajectories and optimal buffer sizing for MIMD congestion control. 149-159 - Jayanthi Rao, Subir Kumar Biswas:

Network-assisted sink navigation for distributed data gathering: Stability and delay-energy trade-offs. 160-175 - Sonia A. Hashish

, Ahmed Karmouch:
An adaptive rendezvous data dissemination for irregular sensor networks with multiple sinks. 176-189 - Enrique Hernández-Orallo

, Joan Vila-Carbó:
Network queue and loss analysis using histogram-based traffic models. 190-201 - Abdellatif Ezzouhairi, Alejandro Quintero, Samuel Pierre:

Towards cross layer mobility support in metropolitan networks. 202-221 - Qingshan Wang, Qi Wang, Yinlong Xu, Qingwei Guo:

A minimum transmission time encoding algorithm in multi-rate wireless networks. 222-226 - Bahram Marami, Mohammad Haeri

:
Implementation of MPC as an AQM controller. 227-239 - Ali Rajabi, Ahmad Khonsari

, Aresh Dadlani
:
On modeling optical burst switching networks with fiber delay lines: A novel approach. 240-249 - Konstantinos P. Ferentinos

, Theodore A. Tsiligiridis:
A memetic algorithm for optimal dynamic design of wireless sensor networks. 250-258
Volume 33, Number 3, February 2010
- Richard G. Clegg

, Carla Di Cairano-Gilfedder, Shi Zhou
:
A critical look at power law modelling of the Internet. 259-268 - Raffaele Bruno

, Maddalena Nurchis:
Survey on diversity-based routing in wireless mesh networks: Challenges and solutions. 269-282
- Ákos Kovács, István Gódor, Sándor Rácz, Tamás Borsos:

Cross-layer quality-based resource reservation for scalable multimedia. 283-292 - Sungwon Han, Euiyul Ko, Hyunsoo Yoon, Ikjun Yeom:

Providing forwarding assurance in multi-hop wireless networks. 293-301 - Anfeng Liu, Xian-You Wu, Zhi-Gang Chen, Wei-Hua Gui:

Research on the energy hole problem based on unequal cluster-radius for wireless sensor networks. 302-321 - Almudena Díaz

, Pedro Merino
, F. Javier Rivas:
QoS analysis of video streaming service in live cellular networks. 322-335 - Rosario Giuseppe Garroppo

, Stefano Giordano
, Luca Tavanti
:
Implementation frameworks for IEEE 802.11s systems. 336-349 - Babak Pazand, Amitava Datta

:
A three-tiered node scheduling scheme for sparse sensing in wireless sensor networks. 350-364 - Tim Stevens, Daan Pareit, Filip De Turck

, Ingrid Moerman
, Bart Dhoedt, Piet Demeester:
SCTP for robust and flexible IP anycast services. 365-371 - Yi-Pin Liao, Shuenn-Shyang Wang:

A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. 372-380 - János Tapolcai

, Pin-Han Ho, Hsiang-Fu Yu:
Switching/merging node placement in survivable optical networks with SSP. 381-389 - Ying Zhang, Lu Peng, Wencheng Lu, Lide Duan, Suresh Rai:

Expediating IP lookups with reduced power via TBM and SST supernode caching. 390-397 - Jang-Ping Sheu, Prasan Kumar Sahoo

, Chang-Hsin Su, Wei-Kai Hu:
Efficient path planning and data gathering protocols for the wireless sensor network. 398-408
Volume 33, Number 4, March 2010
- Yinying Yang, Mirela I. Fonoage, Mihaela Cardei:

Improving network lifetime with mobile wireless sensor networks. 409-419 - Jian Ren, Jie Wu:

Survey on anonymous communications in computer networks. 420-431 - Óscar Trullols-Cruces

, Marco Fiore
, Claudio Casetti, Carla-Fabiana Chiasserini
, José M. Barceló-Ordinas
:
Planning roadside infrastructure for information dissemination in intelligent transportation systems. 432-442
- Ka-Cheong Leung, Victor O. K. Li:

A resequencing model for high-speed packet-switching networks. 443-453 - Li-Hsing Yen

, Wei-Ting Tsai:
The room shortage problem of tree-based ZigBee/IEEE 802.15.4 wireless networks. 454-462 - Yingfei Dong, Xiaojiang Liu:

Novel dynamic delay allocation adjustment for improving bandwidth efficiency. 463-476 - Chia-Mei Chen, Ya-Lin Chen, Hsiao-Chung Lin:

An efficient network intrusion detection. 477-484 - Antonio de la Oliva

, Ignacio Soto
, Alberto García-Martínez
, Marcelo Bagnulo
, Arturo Azcorra:
Analytical characterization of failure recovery in REAP. 485-499 - Paul Daniel Mitchell, Jian Qiu, Hengguang Li, David Grace:

Use of aerial platforms for energy efficient medium access control in wireless sensor networks. 500-512 - Michele C. Weigle

, Li Cheng, Jasleen Kaur, V. Kulkarni:
Generalized stochastic performance models for loss-based congestion control. 513-525 - Un Gi Joo, Alice E. Smith

:
Bandwidth allocation with a particle swarm meta-heuristic for ethernet passive optical networks. 526-531
Volume 33, Number 5, March 2010
- Wolfgang John

, Sven Tafvelin, Tomas Olovsson:
Passive internet measurement: Overview and guidelines based on experiences. 533-550 - Fabio Ricciato, Angelo Coluccia

, Alessandro D'Alconzo:
A review of DoS attack models for 3G cellular networks from a system-design perspective. 551-558
- Tzung-Shi Chen, Hua-Wen Tsai, Chih-Ping Chu:

Adjustable convergecast tree protocol for wireless sensor networks. 559-570 - Pablo Ameigeiras

, Juan J. Ramos-Muñoz
, Jorge Navarro-Ortiz
, Preben E. Mogensen, Juan M. López-Soler
:
QoE oriented cross-layer design of a resource allocation algorithm in beyond 3G systems. 571-582 - Ming-Feng Chang, Fang-Sun Lu, Chung-Yung Chia:

A callback mechanism for Private Telecommunications Networks. 583-588 - Jaeshin Jang, Sang Wu Kim, Jong-Hyup Lee:

Performance evaluation of a new QoS packet-scheduler for VoIP service in IEEE 802.16-based WMAN systems. 589-594 - Jalal Almhana, Zikuan Liu, Robert McGorman:

Nearly optimal power saving policies for mobile stations in wireless networks. 595-602 - Qi Guo, Pin-Han Ho, Hsiang-Fu Yu, János Tapolcai

, Hussein T. Mouftah:
Spare capacity reprovisioning for high availability shared backup path protection connections. 603-611 - Bárbara González-Arévalo, Julie Roy:

Simulating a Poisson cluster process for Internet traffic packet arrivals. 612-618 - Stefan K. Stafrace, Nick Antonopoulos:

Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks. 619-638 - Yihua Zhu, Wan-deng Wu, Jian Pan, Yiping Tang:

An energy-efficient data gathering algorithm to prolong lifetime of wireless sensor networks. 639-647 - Zornitza Genova Prodanoff:

Optimal frame size analysis for framed slotted ALOHA based RFID networks. 648-653
Volume 33, Number 6, April 2010
- Zahi Nakad, Mark T. Jones, Thomas Martin, Wissam Fawaz

:
Networking in E-textiles. 655-666 - Francesc Sebé

, Josep M. Miret
, Jordi Pujolàs
, Jordi Puiggali:
Simple and efficient hash-based verifiable mixing for remote electronic voting. 667-675 - Yoon-Ho Choi, Peng Liu, Seung-Woo Seo:

Creation of the importance scanning worm using information collected by Botnets. 676-688 - Sandeep S. Kulkarni, Bezawada Bruhadeshwar

:
Key-update distribution in secure group communication. 689-705 - Hann-Jang Ho, Jung-Chun Liu:

Improvement of multi-hop packet transmission scheduling in WDM optical star networks. 706-713 - Stefano Bregni

, Paolo Giacomazzi, Gabriella Saddemi:
Characterization of long-range dependent traffic regulated by leaky-bucket policers and shapers. 714-720 - Javad Akbari Torkestani, Mohammad Reza Meybodi:

Mobility-based multicast routing algorithm for wireless mobile Ad-hoc networks: A learning automata approach. 721-735 - Oscar Garcia, Alejandro Quintero, Samuel Pierre:

A global profile-based algorithm for energy minimization in object tracking sensor networks. 736-744 - Aloor Gopakumar, Lillykutty Jacob:

Distributed wireless sensor network localization using stochastic proximity embedding. 745-755 - Ming Lei:

Low-complexity detection by exploiting suboptimal detection order and subcarrier grouping for Multi-Layer MIMO-OFDM. 756-761 - David Rebollo-Monedero

, Jordi Forné
, Agusti Solanas
, Antoni Martínez-Ballesté
:
Private location-based information retrieval through user collaboration. 762-774
Volume 33, Number 7, May 2010
- Ekram Hossain, Garland Chow, Victor C. M. Leung

, Robert D. McLeod, Jelena V. Misic, Vincent W. S. Wong
, Oliver W. W. Yang:
Vehicular telematics over heterogeneous wireless networks: A survey. 775-793
- Giuseppe Anastasi, Ilaria Giannetti, Andrea Passarella

:
A BitTorrent proxy for Green Internet file sharing: Design and experimental evaluation. 794-802 - Weiying Zhu, Min Song:

Performance analysis of large multicast packet switches with multiple input queues and gathered traffic. 803-815 - Eyal Felstaine, Eldad Chai, Niv Gilboa

, Avi Elisha:
Distributed flow detection over multi-path sessions. 816-827 - Chu-Fu Wang, Chun-Chia Lee:

The optimization of sensor relocation in wireless mobile sensor networks. 828-840 - Meiqin Tang, Chengnian Long, Xinping Guan:

Nonconvex maximization for communication systems based on particle swarm optimization. 841-847 - Jerry Chi-Yuan Chou, Bill Lin:

Birkhoff-von Neumann switching with statistical traffic profiles. 848-851 - Fengdan Wan, Lin Cai

, Emad Shihab, T. Aaron Gulliver
:
Admission region of triple-play services in wireless home networks. 852-859 - Martín López Nores

, José Juan Pazos-Arias, Jorge García Duque, Yolanda Blanco-Fernández
, Alberto Gil-Solla
, Manuel Ramos Cabrer
, Rebeca P. Díaz Redondo
, Ana Fernández Vilas
:
Application-level assessment of approaches to coordinate node mobility in wireless sensor and actor networks. 860-867 - Sheng Chen, Tee Hiang Cheng, Gee-Swee Poo:

Placement of wavelength converters and light splitters in a WDM network using the generic graph model. 868-883 - Jorge Munilla

, Alberto Peinado:
Attacks on a distance bounding protocol. 884-889 - Jianjie Zhao, Dawu Gu, Yali Li:

An efficient fault-tolerant group key agreement protocol. 890-895
Volume 33, Number 8, May 2010
- Raffaele Bruno

:
Computer Communications: Introduction to the Special Section on Hot Topics in Mesh Networking. 897
- David Coudert, Napoleão Nepomuceno

, Hervé Rivano
:
Power-efficient radio configuration in fixed broadband wireless networks. 898-906 - Levente Buttyán, László Dóra, Fabio Martinelli, Marinella Petrocchi:

Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks. 907-922
- Guido Maier, Achille Pattavina:

Multicast three-stage Clos networks. 923-928
- Massimo Vecchio

, Aline Carneiro Viana, Artur Ziviani
, Roy Friedman:
DEEP: Density-based proactive data dissemination protocol for wireless sensor networks with uncontrolled sink mobility. 929-939 - Hua Wang, Lars Dittmann

:
Downlink resource management for QoS scheduling in IEEE 802.16 WiMAX networks. 940-953 - Michael Adeyeye

, Neco Ventura
:
A SIP-based web client for HTTP session mobility and multimedia services. 954-964 - Yongning Yin, Gee-Swee Poo:

User-oriented hierarchical bandwidth scheduling for ethernet passive optical networks. 965-975 - Sanaa Sharafeddine

, Zaher Dawy:
Robust network dimensioning for realtime services over IP networks with traffic deviation. 976-983 - Antony Chazapis

, Athanasia Asiki, Georgios Tsoukalas, Dimitrios Tsoumakos, Nectarios Koziris:
Replica-aware, multi-dimensional range queries in Distributed Hash Tables. 984-996 - Yuhua Liu, Naixue Xiong, Yuling Li, Kaihua Xu, Jong Hyuk Park, Chuan Lin:

A secure model for controlling the hubs in P2P wireless network based on trust value. 997-1004 - Hamza Drid, Bernard Cousin

, Miklós Molnár
, Samer Lahoud
:
A survey of survivability in multi-domain optical networks. 1005-1012
Volume 33, Number 9, June 2010
- Yi-Cheng Chan, Chia-Liang Lin, Chia-Tai Chan, Cheng-Yuan Ho:

CODE TCP: A competitive delay-based TCP. 1013-1029 - Chun-Shian Tsai, Chun-Chuan Yang:

Design of the multicast service for mobile users in the 802.16 network environment. 1030-1048 - Widyo Cahyono Andi, Chai Kiat Yeo

, Bu-Sung Lee
:
Environment-aware QoS framework for multi-interface terminal. 1049-1055 - Chiara Boldrini

, Andrea Passarella
:
HCMM: Modelling spatial and temporal properties of human mobility driven by users' social relationships. 1056-1074 - Richard Rouil

, Nada Golmie, Nicolas Montavont:
Media independent handover transport using cross-layer optimized stream control transmission protocol. 1075-1085 - Javier López

, Rodrigo Roman, Isaac Agudo
, M. Carmen Fernández Gago
:
Trust management systems for wireless sensor networks: Best practices. 1086-1093 - Kaouther Drira, Hamida Seba, Hamamache Kheddouci:

ECGK: An efficient clustering scheme for group key management in MANETs. 1094-1107 - Rade Stanojevic, Robert Shorten:

Trading link utilization for queueing delays: An adaptive approach. 1108-1121 - Jing Wang, R. Venkatesha Prasad, Ignas G. Niemegeers:

Solving the uncertainty of vertical handovers in multi-radio home networks. 1122-1132 - Chang-Seop Park:

Two-way Handshake protocol for improved security in IEEE 802.11 wireless LANs. 1133-1140
Volume 33, Number 10, June 2010
- Ke Xu, Ming Zhang, Mingjiang Ye, Dah-Ming Chiu, Jianping Wu:

Identify P2P traffic by inspecting data transfer behavior. 1141-1150 - Antonio Capone

, Matteo Cesana
, Danilo De Donno
, Ilario Filippini
:
Deploying multiple interconnected gateways in heterogeneous wireless sensor networks: An optimization approach. 1151-1161 - Sébastien Doirieux, Bruno Baynat, Masood Maqbool, Marceau Coupechoux:

An efficient analytical model for the dimensioning of WiMAX networks supporting multi-profile best effort traffic. 1162-1179 - Ashley Flavel, Jeremy McMahon, Aman Shaikh, Matthew Roughan

, Nigel G. Bean
:
BGP route prediction within ISPs. 1180-1190 - Jun Lei, Xiaoming Fu

, Dieter Hogrefe:
D-MORE: Dynamic mesh-based overlay peer-to-peer infrastructure. 1191-1201
- Thao P. Nghiem, Tae Ho Cho:

A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks. 1202-1209 - Andrey V. Savkin, Pubudu N. Pathirana

:
Decentralized power control in cellular mobile radio systems with nonlinear and time-varying link gains. 1210-1214 - A. G. Alagu Priya, Hyesook Lim

:
Hierarchical packet classification using a Bloom filter and rule-priority tries. 1215-1226 - John G. Markoulidakis:

Received signal strength based mobile terminal positioning error analysis and optimization. 1227-1234
- Aggelos Lazaris, Polychronis Koutsakis

:
Modeling multiplexed traffic from H.264/AVC videoconference streams. 1235-1242
Volume 33, Number 11, July 2010
- Giuseppe Anastasi, Silvia Giordano

, Damla Turgut:
Special section on pervasive sensor systems. 1243 - Hyun Jung Choe, Preetam Ghosh

, Sajal K. Das
:
QoS-aware data reporting control in cluster-based wireless sensor networks. 1244-1254 - Jiaxi You, Qi Han, Dominik Lieckfeldt, Jakob Salzmann, Dirk Timmermann

:
Virtual position based geographic routing for wireless sensor networks. 1255-1265 - Kuan Lun Huang, Salil S. Kanhere

, Wen Hu
:
Preserving privacy in participatory sensing systems. 1266-1280
- Sok-Hyong Kim, Young-Joo Suh:

A distributed channel assignment protocol for rate separation in wireless mesh networks. 1281-1295 - Jung-Shian Li, Hung-Cheng Kao, Wu-Han Lin:

Achieving maximal VoIP calls in 802.11 wireless networks. 1296-1303 - Jürgen Jähnert, Patrick Mandic, Antonio Cuevas, Stefan Wesner

, José Ignacio Moreno
, Víctor A. Villagrá
, Vicente Olmedo, Burkhard Stiller:
A prototype and demonstrator of Akogrimo's architecture: An approach of merging grids, SOA, and the mobile Internet. 1304-1317 - Yinghua Cui, Yuping Zhao:

A fast zero estimation scheme for RFID systems. 1318-1324 - R. Gunasekaran, S. Siddharth, P. Krishnaraj, M. Kalaiarasan, V. Rhymend Uthariaraj:

Efficient algorithms to solve Broadcast Scheduling problem in WiMAX mesh networks. 1325-1333 - Therence Houngbadji, Samuel Pierre:

QoSNET: An integrated QoS network for routing protocols in large scale wireless sensor networks. 1334-1342 - Jongkeun Na, Young-Jin Kim, Ramesh Govindan:

Minimizing recovery overhead in geographic ad hoc routing. 1343-1353 - Mirjana D. Stojanovic, Slavica V. Bostjancic Rakas

, Vladanka S. Acimovic-Raspopovic:
End-to-end quality of service specification and mapping: The third party approach. 1354-1368
Volume 33, Number 12, July 2010
- Douglas M. Blough, Jiannong Cao

, Xiuzhen Cheng, Eylem Ekici
, Xiaohua Jia
, Paolo Santi:
Introduction to the Special Section on Mobile Ad Hoc and Sensor Networks. 1369 - Yanyan Yang, Yunhuai Liu, Lionel M. Ni:

Level the buffer wall: Fair channel assignment in wireless sensor networks. 1370-1379 - Scott Pudlewski

, Tommaso Melodia
:
A distortion-minimizing rate controller for wireless multimedia sensor networks. 1380-1390 - Shigeng Zhang, Jiannong Cao

, Yingpei Zeng, Zhuo Li, Lijun Chen, Daoxu Chen:
On accuracy of region based localization algorithms for wireless sensor networks. 1391-1403 - Xu Cheng, Ji Xu, Jian Pei

, Jiangchuan Liu:
Hierarchical distributed data classification in wireless sensor networks. 1404-1413 - Zhendong Ma, Frank Kargl, Michael Weber:

Measuring long-term location privacy in vehicular communication systems. 1414-1427 - Zheng Li, Deying Li, Ming Liu:

Interference and power constrained broadcast and multicast routing in wireless ad hoc networks using directional antennas. 1428-1439
- Abdorasoul Ghasemi

, Karim Faez
:
A non-cooperative game approach for power-aware MAC in ad hoc wireless networks. 1440-1451 - Yi Zhi Zhao, Maode Ma, Chunyan Miao

, T. N. Nguyen:
An energy-efficient and low-latency MAC protocol with Adaptive Scheduling for multi-hop wireless sensor networks. 1452-1461 - Khaled Salah

:
Modeling and analysis of PC-based software routers. 1462-1470
Volume 33, Number 13, August 2010
- Andrea Passarella

, Konstantinos Oikonomou:
Special Section on Autonomic and Opportunistic Communications. 1471 - Alessio Guerrieri, Iacopo Carreras, Francesco De Pellegrini, Daniele Miorandi, Alberto Montresor

:
Distributed estimation of global parameters in delay-tolerant networks. 1472-1482 - John Whitbeck, Vania Conan:

HYMAD: Hybrid DTN-MANET routing for dense and highly dynamic wireless networks. 1483-1492 - Abdullatif Shikfa

, Melek Önen
, Refik Molva
:
Privacy and confidentiality in context-based and epidemic forwarding. 1493-1504 - Leonidas Tzevelekas, Konstantinos Oikonomou, Ioannis Stavrakakis

:
Random walk with jumps in large-scale random geometric graphs. 1505-1514
- Duc A. Tran

, Cuong Pham:
A content-guided publish/subscribe mechanism for sensor networks without location information. 1515-1523 - Hung-Ta Pai, Jing Deng, Yunghsiang S. Han:

Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks. 1524-1530 - Ju-Hyung Son, Haiyun Luo, Seung-Woo Seo:

Denial of service attack-resistant flooding authentication in wireless sensor networks. 1531-1542 - Mohammad Sadegh Talebi, Ahmad Khonsari

, Mohammad Hassan Hajiesmaili:
Utility-proportional bandwidth sharing for multimedia transmission supporting scalable video coding. 1543-1556 - Wu-Hsiao Hsu, Yuh-Pyng Shieh, Jenhui Chen

:
Multiple path selection algorithm for DiffServ-aware MPLS traffic engineering. 1557-1565 - Di Wu

, Lichun Bao, Renfa Li:
A holistic approach to wireless sensor network routing in underground tunnel environments. 1566-1573
Volume 33, Number 14, September 2010
- Chang Wen Chen, Stefanos Gritzalis

, Pascal Lorenz
, Shiguo Lian:
Special issue on multimedia networking and security in convergent networks. 1575-1577
- Sheng-Shuen Wang, Hsu-Feng Hsiao:

TCP-friendly congestion control for the fair streaming of scalable video. 1578-1588 - Yan Ding, Jiangchuan Liu, Dan Wang

, Hongbo Jiang:
Peer-to-peer video-on-demand with scalable video coding. 1589-1597 - Constantinos Vassilakis

, Ioannis Stavrakakis
:
Minimizing node churn in peer-to-peer streaming. 1598-1614 - Liang Zhou, Min Chen, Zhiwen Yu, Joel J. P. C. Rodrigues, Han-Chieh Chao

:
Cross-layer wireless video adaptation: Tradeoff between distortion and delay. 1615-1622 - Jing Chen, Shiguo Lian, Cai Fu, Ruiying Du:

A hybrid game model based on reputation for spectrum allocation in wireless networks. 1623-1631 - Rong Yu, Yan Zhang, Chujia Huang, Ruchao Gao:

Joint admission and rate control for multimedia sharing in wireless home networks. 1632-1644 - Goran Djukanovic, Milan Sunjevaric, Natasa Gospic, Hsiao-Hwa Chen:

Dynamic guard margin CAC algorithm with ensured QoS and low CDP in heterogeneous wireless networks. 1645-1650 - Sucha Supittayapornpong, Poompat Saengudomlert, Wuttipong Kumwilaisak:

A framework for reliability aware layered multi-cast in lossy networks with network coding. 1651-1663 - Shiguo Lian, Xi Chen:

Secure and traceable multimedia distribution for convergent Mobile TV services. 1664-1673 - Eun-Jun Yoon, Kee-Young Yoo, Cheonshik Kim

, YouSik Hong, Minho Jo
, Hsiao-Hwa Chen:
A secure and efficient SIP authentication scheme for converged VoIP networks. 1674-1681 - Fernando Pereñíguez-Garcia

, Georgios Kambourakis
, Rafael Marín López, Stefanos Gritzalis
, Antonio Fernandez Gómez-Skarmeta
:
Privacy-enhanced fast re-authentication for EAP-based next generation network. 1682-1694 - Dimitrios Koukopoulos:

The impact of dynamic adversarial attacks on the stability of heterogeneous multimedia networks. 1695-1706 - Jose Oscar Fajardo

, Fidel Liberal
, Is-Haka Mkwawa, Lingfen Sun
, Harilaos Koumaras
:
QoE-driven dynamic management proposals for 3G VoIP services. 1707-1724 - Tine Stegel, Janez Sterle, Urban Sedlar, Janez Bester, Andrej Kos:

SCTP multihoming provisioning in converged IP-based multimedia environment. 1725-1735 - Iván Vidal

, Jaime García-Reinoso
, Antonio de la Oliva
, Alex Bikfalvi, Ignacio Soto
:
Supporting mobility in an IMS-based P2P IPTV service: A proactive context transfer mechanism. 1736-1751 - Juan C. Granda, Daniel F. García

, Pelayo Nuño
, Francisco J. Suárez
:
An efficient networking technique for synchronous e-learning platforms in corporate environments. 1752-1766
Volume 33, Number 15, September 2010
- Jeng-Farn Lee, Wen-Hsing Kuo

:
Fairness provisioning in multi-hop wireless backhaul networks: Challenges and solutions. 1767-1772 - Xiangyang Gong, Wendong Wang, Shiduan Cheng:

A fast IPv6 packet classification algorithm based on efficient multi-bit selection. 1773-1784 - Kun Huang, Dafang Zhang, Zheng Qin:

Accelerating the bit-split string matching algorithm using Bloom filters. 1785-1794 - Changqing Xu, Jin Teng, Weijia Jia

:
Enabling faster and smoother handoffs in AP-dense 802.11 wireless networks. 1795-1803 - M. Sabrigiriraj

, M. Meenakshi
, R. Roopkumar:
Wavelength assignment for all-to-all broadcast in WDM optical linear array with limited drops. 1804-1808 - Francesco Palmieri

, Ugo Fiore
, Sergio Ricciardi:
A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures. 1809-1822 - George B. Huitema, Ralph Kühne, Ulrike Meyer, Henk Ensing, Alf Zugenmaier, Alain Bibas, Olavi Karasti, Frens Jan Rumph, Johanneke Siljee:

Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing. 1823-1833 - Wenzhong Li, Edward Chan, Guofu Feng, Daoxu Chen, Sanglu Lu:

Analysis and performance study for coordinated hierarchical cache placement strategies. 1834-1842 - Haibo Zhou, Yuanming Wu

, Yanqi Hu, Guangzhong Xie:
A novel stable selection and reliable transmission protocol for clustered heterogeneous wireless sensor networks. 1843-1849 - Mohammad Zarafshan-Araki, Kwan-Wu Chin

:
TrainNet: A transport system for delivering non real-time data. 1850-1863 - Nelson Hernandez-Cons, Shoji Kasahara

, Yutaka Takahashi:
Dynamic Hello/Timeout timer adjustment in routing protocols for reducing overhead in MANETs. 1864-1878 - Mónica Aguilar-Igartua

, Víctor Carrascal Frías:
Self-configured multipath routing using path lifetime for video-streaming services over Ad Hoc networks. 1879-1891
Volume 33, Number 16, October 2010
- Valtteri Niemi:

Editorial for the LTE special section. 1893 - M. Rinne, Olav Tirkkonen

:
LTE, the radio technology path towards 4G. 1894-1906 - Dan Forsberg:

LTE key management analysis with session keys context. 1907-1915 - Kari Järvinen, Imed Bouazizi, Lasse Laaksonen, Pasi Ojala, Anssi Rämö:

Media coding for the next generation mobile system LTE. 1916-1927
- Chia-Chuan Chuang, Shang-Juh Kao:

Discrete-time modeling for performance analysis of real-time services in IEEE 802.16 networks. 1928-1936 - Lo-Yao Yeh, Chen-Che Huang, Cheng-En Wu, Jiun-Long Huang:

ALM: An adaptive location management scheme for approximate location queries in wireless sensor networks. 1937-1948 - Ting Wang, Chor Ping Low:

A fully distributed node allocation scheme with partition protection for Mobile Ad Hoc Networks. 1949-1960 - Eiman Alotaibi, Vishwanath Ramamurthi, Marwan Batayneh, Biswanath Mukherjee:

Interference-aware routing for multi-hop Wireless Mesh Networks. 1961-1971 - Geert Jan Hoekstra, Robert D. van der Mei:

Effective load for flow-level performance modelling of file transfers in wireless LANs. 1972-1981 - Ertugrul Yilmaz, Nasif Ekiz, Preethi Natarajan, Paul D. Amer, Jonathan T. Leighton, Fred Baker, Randall R. Stewart:

Throughput analysis of Non-Renegable Selective Acknowledgments (NR-SACKs) for SCTP. 1982-1991 - Hangxing Wu, Fengyuan Ren, Wenping Pan

, Yadong Zhai:
Analysis of efficient and fair explicit congestion control protocol with feedback delay: Stability and convergence. 1992-2000 - Jun Zhang, Hai Zhao, Jiu-Qiang Xu, Zheng Liu:

Characterizing and modeling the Internet Router-level topology - The hierarchical features and HIR model. 2001-2011
Volume 33, Number 17, November 2010
- Nicola Marchetti, Simone Frattasi:

Applied sciences in communication technologies. 2013-2014
- Lorenza Giupponi

, Ana Galindo-Serrano, Mischa Dohler:
From cognition to docition: The teaching radio paradigm for distributed & autonomous deployments. 2015-2020 - Gordhan Das Menghwar

, Christoph F. Mecklenbräuker
:
Block-Markov encoding with network coding for cooperative communications. 2021-2030 - Michael Horvat, Cecilia Carbonelli, Zijian Bai, Peter Jung:

On the performance evaluation of an LTE SFBC system with Wiener channel estimation in frequency-selective channels. 2031-2038 - Pavlos Antoniou, Andreas Pitsillides:

A bio-inspired approach for streaming applications in wireless sensor networks based on the Lotka-Volterra competition model. 2039-2047 - Jia-Ming Liang, Ho-Cheng Wu, Jen-Jee Chen, Yu-Chee Tseng:

Mini-slot scheduling for IEEE 802.16d chain and grid mesh networks. 2048-2056 - Rachid El Azouzi

, Essaid Sabir
, Sujit Kumar Samanta
, Ralph El Khoury:
Asymptotic delay analysis and timeout-based admission control for ad hoc wireless networks with asymmetric users. 2057-2069 - Ahmad Nahar Quttoum

, Hadi Otrok
, Zbigniew Dziong:
A collusion-resistant mechanism for autonomic resource management in Virtual Private Networks. 2070-2078 - Ehsan Pourfakhar, Amir Masoud Rahmani

:
A hybrid QoS multicast framework-based protocol for wireless mesh networks. 2079-2092 - Jaewook Yu

, Eric C. Noel, K. Wendy Tang:
A graph theoretic approach to ultrafast information distribution: Borel Cayley graph resizing algorithm. 2093-2104 - Soroush Akhlaghi, Abbas Kiani, Mohammad Reza Ghanavati:

Cost-bandwidth tradeoff in distributed storage systems. 2105-2115 - Soroush Akhlaghi, Alireza Borhani

:
Fairness maximization and delay analysis for multi-antenna broadcast channels using random beamforming. 2116-2124 - Yuan Tian, Xia Lei, Yue Xiao, Shaoqian Li:

SAGE based joint timing-frequency offsets and channel estimation in distributed MIMO systems. 2125-2131 - Xiangtao Lin, Bo Cheng, Junliang Chen:

Context-aware end-to-end QoS qualitative diagnosis and quantitative guarantee based on Bayesian network. 2132-2144 - Dapeng Li, Youyun Xu, Jing Liu:

Distributed relay selection over multi-source and multi-relay wireless cooperative networks with selfish nodes. 2145-2153
Volume 33, Number 18, December 2010
- Basel Alomair

, Radha Poovendran
:
Privacy versus scalability in radio frequency identification systems. 2155-2163 - Ping Du, Akihiro Nakao

:
OverCourt: DDoS mitigation through credit-based traffic segregation and path migration. 2164-2175 - Rok Libnik, Ales Svigelj

, Gorazd Kandus:
A novel SIP based procedure for congestion aware handover in heterogeneous networks. 2176-2184 - Li-Na Weng, Jie Yang:

A cross-layer stability-based routing mechanism for ultra wideband networks. 2185-2194 - Cheng Wang, Changjun Jiang, Xiang-Yang Li, Jiujun Cheng:

Improved asymptotic multicast throughput for random extended networks. 2195-2202 - Jordi Cucurull-Juan, Ramon Martí

, Guillermo Navarro-Arribas
, Sergi Robles
, Joan Borrell
, Gerard Suades
:
Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents. 2203-2214 - Mostafa Esmaeili, Feng Xu, Min Peng, Nasir Ghani, Ashwin Gumaste, Jorge M. Finochietto:

Enhanced crankback signaling for multi-domain IP/MPLS networks. 2215-2223 - Tarek Bchini, Nabil Tabbane, Sami Tabbane, Emmanuel Chaput, André-Luc Beylot:

Fuzzy logic based layers 2 and 3 handovers in IEEE 802.16e network. 2224-2245 - Pakorn Leesutthipornchai, Chalermpol Charnsripinyo, Naruemon Wattanapongsakorn:

Solving multi-objective routing and wavelength assignment in WDM network using hybrid evolutionary computation approach. 2246-2259 - Sanjay Kumar Biswash

, Chiranjeev Kumar
:
Multi home agent and pointer-based (MHA-PB) location management scheme in integrated cellular-WLAN networks for frequent moving users. 2260-2270 - Munhwan Choi, Maria Samokhina, Kirill Moklyuk, Sunghyun Choi

, Jun Heo, Seong-Jun Oh:
VPAL: Video Packet Adaptation Layer for reliable video multicast over IEEE 802.11n WLAN. 2271-2281
Volume 33, Number Supplement-1, November 2010
- Demetres D. Kouvatsos, Madjid Merabti:

Foreword. S1-S2
- António Nogueira

, Paulo Salvador
, Rui Valadas
, António Pacheco
:
Modeling self-similar traffic over multiple time scales based on hierarchical Markovian and L-System models. S3-S10 - Natalia M. Markovich

, Udo R. Krieger:
Statistical analysis and modeling of Skype VoIP flows. S11-S21 - David Erman, Dragos Ilie, Adrian Popescu:

Measuring and modeling the BitTorrent content distribution system. S22-S29
- António Almeida, Carlos Belo:

Explicit congestion control based on 1-bit probabilistic marking. S30-S40
- Ralph El Khoury, Eitan Altman, Rachid El Azouzi

:
Analysis of scalable TCP congestion control algorithm. S41-S49 - Robert E. Kooij, Robert D. van der Mei, Ran Yang:

TCP and web browsing performance in case of bi-directional packet loss. S50-S57 - Zlatka Avramova, Danny De Vleeschauwer

, Sabine Wittevrongel, Herwig Bruneel:
Dimensioning Drop-tail and AQM (RED) buffers at access networks for optimal performance with bulk data TCP traffic. S58-S70
- Pierre Delannoy, Hai Dang Nguyen, Michel Marot, Nazim Agoulmine, Monique Becker:

WiMax quality-of-service estimations and measurement. S71-S77 - Lukasz Chrost, Agnieszka Brachman

:
Towards a common benchmark in WiMAX environment. S78-S85
- Tadeusz Czachórski

, Krzysztof Grochla
, Tomasz Nycz
, Ferhan Pekergin:
A diffusion approximation model for wireless networks based on IEEE 802.11 standard. S86-S92 - Lan Wang, Geyong Min, Demetres D. Kouvatsos, Xiaolong Jin:

Analytical modeling of an integrated priority and WFQ scheduling scheme in multi-service networks. S93-S101 - János Levendovszky

, Long Tran-Thanh, Gergely Treplán, Gábor Kiss:
Fading-aware reliable and energy efficient routing in wireless sensor networks. S102-S109
- Viet Hung Nguyen, Tülin Atmaca:

Metropolitan optical packet bus-based networks: Packet bursting and emulation of TDM services. S110-S121 - Hind Castel-Taleb, Mohamad Chaitou

, Gérard Hébuterne:
Optical MAN ring performance with traffic aggregations. S122-S129 - Charalampos V. Mouchos, Athanasios Tsokanos, Demetres D. Kouvatsos:

Dynamic OBS offset allocation in WDM networks. S130-S145 - Tien Van Do

, Ram Chakka:
A new performability model for queueing and FDL-related burst loss in optical switching nodes. S146-S151
- József Bíró:

Novel bandwidth requirement estimation based on exact large deviation asymptotics. S152-S156 - Pablo Belzarena, Paola Bermolen

, Pedro Casas, María Simon:
End-to-end quality of service-based admission control using the fictitious network analysis. S157-S166 - Ioannis D. Moscholios, Michael D. Logothetis:

The Erlang multirate loss model with Batched Poisson arrival processes under the bandwidth reservation policy. S167-S179

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














