


default search action
Computer Communications, Volume 35
Volume 35, Number 1, January 2012
- Marco Conti

:
Editorial. iii
- Andrea Passarella

:
A survey on content-centric technologies for the current Internet: CDN and P2P solutions. 1-32 - António Varela, Teresa Maria Vazão

, Guilherme Arroz:
Providing service differentiation in pure IP-based networks. 33-46
- Melek Önen

, Thorsten Strufe:
Special section on Security and Social Networking. 47 - Alban Hessler, Takahiro Kakumaru, Heiner Perrey, Dirk Westhoff:

Data obfuscation with network coding. 48-61 - Iain Parris, Tristan Henderson

:
Privacy-enhanced social-network routing. 62-74 - Luca Maria Aiello

, Giancarlo Ruffo
:
LotusNet: Tunable privacy for distributed online social network services. 75-88
- Phan Thanh Hoa, Gaute Lambertsen, Takahiko Yamada:

Seamless handover supported by parallel polling and dynamic multicast group in connected WLAN micro-cells system. 89-99 - Zhen Zuo, Qin Lu, Wusheng Luo:

A two-hop clustered image transmission scheme for maximizing network lifetime in wireless multimedia sensor networks. 100-108 - Amir M. Ahmadzadeh, Juan Eulogio Sánchez-García, B. Saavedra-Moreno, Antonio Portilla-Figueras

, Sancho Salcedo-Sanz:
Capacity estimation algorithm for simultaneous support of multi-class traffic services in Mobile WiMAX. 109-119 - Keiichi Endo, Yusuke Inoue, Yutaka Takahashi:

Performance modeling of beaconless forwarding strategies in multi-hop wireless networks. 120-128 - Antonis Papadogiannakis, Giorgos Vasiliadis

, Demetres Antoniades, Michalis Polychronakis, Evangelos P. Markatos:
Improving the performance of passive network monitoring applications with memory locality enhancements. 129-140 - Shih-Lin Wu

, Jui-Te Chang, Jen-Jee Chen:
Distributed cell-centric neighborhood-related location area planning for PCS networks. 141-149
Volume 35, Number 2, January 2012
- Hao Liu, HaiQin Xu, Shuguang Zhao:

Consistent-degradation macroblock grouping for parallel video streams over DiffServ networks. 151-158 - Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski

:
Hiding information in a Stream Control Transmission Protocol. 159-169 - Roohollah Barzamini

, Masoud Shafiee
, Aresh Dadlani
:
Adaptive generalized minimum variance congestion controller for dynamic TCP/AQM networks. 170-178 - Hsiang-Fu Lo, Sghaier Guizani

, Tin Yu Wu, Wei-Tsong Lee, Hung-Wei Lin:
IEEE 802.21-based seamless multicast streaming with dynamic playback control. 179-187 - Wenmin Li, Qiaoyan Wen, Qi Su, Zhengping Jin:

An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. 188-195 - Ming Yu, Xiaoguang Ma, Wei Su, Leonard J. Tung:

A new joint strategy of radio channel allocation and power control for wireless mesh networks. 196-206 - Navid Amini, Alireza Vahdatpour, Wenyao Xu, Mario Gerla, Majid Sarrafzadeh:

Cluster size optimization in sensor networks with decentralized cluster-based protocols. 207-220 - Jianshe Wu, Licheng Jiao

, Ranran Ding:
Average time synchronization in wireless sensor networks by pairwise messages. 221-233 - Fabrice Le Fessant, Antonis Papadimitriou, Aline Carneiro Viana

, Cigdem Sengul
, Esther Palomar
:
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis. 234-248 - Emmanouil Kafetzakis, Kimon P. Kontovasilis, Ioannis Stavrakakis

:
A novel Effective Capacity-based framework for providing statistical QoS guarantees in IEEE 802.11 WLANs. 249-262 - Flávio Henrique Teles Vieira

, Flávio Geraldo Coelho Rocha, Josemar Alves dos Santos Jr.:
Loss probability estimation and control for OFDM/TDMA wireless systems considering multifractal traffic characteristics. 263-271
- Hui Tian

, Hong Jiang, Ke Zhou, Dan Feng:
Erratum to "Adaptive partial-matching steganography for voice over IP using triple M sequences" [Comput. Commun. 34 (2011) 2236-2247]. 272
Volume 35, Number 3, February 2012
- Essaid Sabir

, Rachid El Azouzi
, Yezekael Hayel:
Hierarchy sustains partial cooperation and induces a Braess-like paradox in slotted aloha-based networks. 273-286 - Vincent Lecuire:

Unequal error protection under bitrate constraint for video streaming over internet. 287-297 - Giuseppe Piro

, Luigi Alfredo Grieco, Gennaro Boggia, Pietro Camarda:
QoS in Wireless LAN: A comparison between feedback-based and earliest due-date approaches. 298-308 - Manel Bourguiba, Kamel Haddadou, Guy Pujolle:

Packet aggregation based network I/O virtualization for cloud computing. 309-319 - Ataul Bari, Arunita Jaekel, Jin Jiang

, Yufei Xu:
Design of fault tolerant wireless sensor networks satisfying survivability and lifetime requirements. 320-333 - Serkan Ayaz, Felix Hoffmann, Ulrich Epple, Reinhard German, Falko Dressler

:
Performance evaluation of network mobility handover over future aeronautical data link. 334-343 - Wenjie Yan, Mingxi Yang, Layuan Li, Huajing Fang:

Short signature scheme for multi-source network coding. 344-351 - Ying Xu, Rong Qu

:
An iterative local search approach based on fitness landscapes analysis for the delay-constrained multicast routing problem. 352-365 - Francesco Palmieri

, Ugo Fiore
, Sergio Ricciardi:
Selfish routing and wavelength assignment strategies with advance reservation in inter-domain optical networks. 366-379 - Sunho Lim, Chansu Yu, Chita R. Das:

Cache invalidation strategies for Internet-based vehicular ad hoc networks. 380-391 - Xiaonan Wang, Shan Zhong, Rong Zhou:

A mobility support scheme for 6LoWPAN. 392-404
Volume 35, Number 4, February 2012
- Kiev Gama

, Lionel Touseau, Didier Donsez:
Combining heterogeneous service technologies for building an Internet of Things middleware. 405-417 - Mukundan Venkataraman, Shamik Sengupta, Mainak Chatterjee, Raja Neogi:

Designing a collector overlay architecture for fault diagnosis in video networks. 418-430 - Seung Yeob Nam

, Sunggon Kim
, Wonyoung Park:
Analysis of minimal backlogging-based available bandwidth estimation mechanism. 431-443 - Paolo Giacomazzi, Igor Stanojev, Giacomo Verticale

:
A negotiation-based scheme for service level pricing for wireless access. 444-453 - Hsung-Pin Chang

, Hui-Wen Kan, Ming-Hsin Ho:
Adaptive TCP congestion control and routing schemes using cross-layer information for mobile ad hoc networks. 454-474 - Muhammad Ayaz

, Azween B. Abdullah
, Ibrahima Faye
, Yasir Batira:
An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks. 475-486 - Jean-Marc Robert, Hadi Otrok

, Abdelkarim Chriqi:
RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks. 487-499 - Dukhyun Chang, Kideok Cho, Nakjung Choi, Ted Taekyoung Kwon, Yanghee Choi:

A probabilistic and opportunistic flooding algorithm in wireless sensor networks. 500-506 - Young-Long Chen, Jia-Sheng Lin:

Energy efficiency analysis of a chain-based scheme via intra-grid for wireless sensor networks. 507-516 - Mehmet H. Suzer

, Kyoung-Don Kang, Can Basaran:
Active queue management via event-driven feedback control. 517-529
Volume 35, Number 5, March 2012
- Dimitri Staessens, Didier Colle, Mario Pickavet

, Ann Nowé, Kris Steenhaut, Piet Demeester:
Optimization of common pool resource sharing in multidomain IP-over-WDM networks. 531-540 - A. Argento, Matteo Cesana

, Nicola Gatti
, Ilaria Malanchini:
A game theoretical study of access point association in wireless mesh networks. 541-553 - André O. Castelucio, Antônio Tadeu A. Gomes

, Artur Ziviani
, Ronaldo M. Salles
:
Intra-domain IP traceback using OSPF. 554-564 - Pedro Casas, Federico Larroca

, Jean-Louis Rougier, Sandrine Vaton:
Taming traffic dynamics: Analysis and improvements. 565-578
- Biming Tian, Song Han, Liu Liu

, Saghar Khadem, Sazia Parvin
:
Towards enhanced key management in multi-phase ZigBee network architecture. 579-588 - Feng Zhang, Zhiping Jia, Hui Xia, Xin Li, Edwin Hsing-Mean Sha:

Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1, 1) model. 589-596 - Ramya Ramamoorthy, F. Richard Yu

, Helen Tang, Peter C. Mason, Azzedine Boukerche:
Joint authentication and quality of service provisioning in cooperative communication networks. 597-607 - Basit Qureshi

, Geyong Min, Demetres D. Kouvatsos:
A distributed reputation and trust management scheme for mobile peer-to-peer networks. 608-618 - Jiefeng (Terence) Chen, Roksana Boreli, Vijay Sivaraman:

Improving the efficiency of anonymous routing for MANETs. 619-627
- Mohamed Saad

:
On optimal spectrum-efficient routing in TDMA and FDMA multihop wireless networks. 628-636 - Eva Jaho

, Ioannis Z. Koukoutsidis, Ioannis Stavrakakis
, Ina Jaho:
Cooperative content replication in networks with autonomous nodes. 637-647
Volume 35, Number 6, March 2012
- Silvia Giordano

, Daniele Puccinelli:
Special section on Pervasive Networked Sensing. 649 - Robert K. Harle, Salman Taherian, Marcelo Pias

, George Coulouris, Andy Hopper, Jonathan Cameron, Joan Lasenby
, Gregor Kuntze, Ian N. Bezodis
, G. Irwin, David G. Kerwin:
Towards real-time profiling of sprints using wearable pressure sensors. 650-660 - Akira Mutazono, Masashi Sugano

, Masayuki Murata
:
Energy efficient self-organizing control for wireless sensor networks inspired by calling behavior of frogs. 661-669 - Swastik Brahma, Mainak Chatterjee, Kevin A. Kwiat, Pramod K. Varshney:

Traffic management in wireless sensor networks: Decoupling congestion control and fairness. 670-681
- Yuh-Jzer Joung

, Hsiu-Lin Huang:
A detailed examination of the overlay construction and maintenance mechanism in BitTorrent. 682-695 - Jie Feng, Lisong Xu:

Throughput-smoothness tradeoff in preventing competing TCP from starvation. 696-708 - Jun Li, Yifeng Zhou, Louise Lamont, F. Richard Yu

, Camille Alain Rabbath:
Swarm mobility and its impact on performance of routing protocols in MANETs. 709-719 - José Manuel Bande Serrano, José Hernández Palancar:

String alignment pre-detection using unique subsequences for FPGA-based network intrusion detection. 720-728 - Po-Kai Tseng, Wei-Ho Chung

:
Near optimal link on/off scheduling and weight assignment for minimizing IP network energy consumption. 729-737 - Zhian Deng, Yubin Xu, Lin Ma:

Indoor positioning via nonlinear discriminative feature extraction in wireless local area network. 738-747 - Rami J. Haddad

, Michael P. McGarry:
Feed Forward Bandwidth Indication (FFBI): Cooperation for an accurate bandwidth forecast. 748-758 - Rosario Giuseppe Garroppo

, Stefano Giordano
, Stella Spagna, Saverio Niccolini, Jan Seedorf:
Topology control strategies on P2P live video streaming service with peer churning. 759-770
Volume 35, Number 7, April 2012
- Jordi Domingo-Pascual, Sergio Palazzo, Caterina M. Scoglio

:
Special Section on Selected Papers from IFIP Networking 2011. 771 - Pedro Casas, Johan Mazel, Philippe Owezarski:

Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge. 772-783 - Saptarshi Ghosh, Ajitesh Srivastava, Niloy Ganguly

:
Effects of a soft cut-off on node-degree in the Twitter social network. 784-795 - Christian Doerr, Norbert Blenn, Siyu Tang, Piet Van Mieghem:

Are friends overrated? A study for the social news aggregator Digg.com. 796-809 - Yehuda Afek, Anat Bremler-Barr

, Yaron Koral:
Space efficient deep packet inspection of compressed web traffic. 810-819 - Eitan Altman, Konstantin Avrachenkov

, Sreenath Ramanath:
Multiscale fairness and its application to resource allocation in wireless networks. 820-828
- Hakem Beitollahi, Geert Deconinck

:
Ferris wheel: A ring based onion circuit for hidden services. 829-841 - Stefano Bregni

, Paolo Giacomazzi, Gabriella Saddemi:
Long-range dependence of traffic across schedulers with multiple service classes. 842-848 - Zhiliang Tu, Qiang Wang

, Hairong Qi, Yi Shen:
Flocking based sensor deployment in mobile sensor networks. 849-860 - Yuh-Shyan Chen

, Kang-Wei Hung:
VC2-MAC: A two-cycle cooperative MAC protocol in vehicular networks. 861-874 - Samuel P. Kozaitis

, W. Petsuwan:
Improved anomaly detection using block-matching denoising. 875-884 - Hooman Lal Dehghani, Saeed Golmohammadi, Kamal Shadi:

Extract Non-Line-of-Sight state of base stations and error mitigation technique for wireless localization in micro-cell networks. 885-893
Volume 35, Number 8, May 2012
- Dan Tao, Shaojie Tang, Haitao Zhang, XuFei Mao, Huadong Ma:

Strong barrier coverage in directional sensor networks. 895-905 - Abdallah Jarray, Ahmad Nahar Quttoum

, Hadi Otrok
, Zbigniew Dziong:
DDP: A Dynamic Dimensioning and Partitioning model of Virtual Private Networks resources. 906-915 - Neda Edalat, Chen-Khong Tham

, Wendong Xiao:
An auction-based strategy for distributed task allocation in wireless sensor networks. 916-928 - Wissam Fawaz

:
Enhancement of blocking performance in all-optical WDM networks via wavelength reassignment and route deviation. 929-935 - Shih-Jung Wu, Shih-Yi Huang, Kuo-Feng Huang:

Efficient Quality of Service scheduling mechanism for WiMAX networks. 936-951 - Chao-Chun Chen, Da-Chung Mao:

PPZTEM: An efficient approximate trajectory extraction method with error bound constraint for wireless sensor networks. 952-969 - Hui-Kai Su:

A Local Fast-Reroute mechanism for single node or link protection in hop-by-hop routed networks. 970-979 - Shin'ichi Arakawa, Tetsuya Takine, Masayuki Murata

:
Analyzing and modeling router-level internet topology and application to routing control. 980-992 - Luis J. de la Cruz Llopis

, Andrés Vázquez Rodas, Emilio Sanvicente Gargallo, Mónica Aguilar-Igartua
:
Load splitting in clusters of video servers. 993-1003 - Alex Borges Vieira, Pedro de Carvalho Gomes, José Augusto Miranda Nacif, Rodrigo Mantini, Jussara M. Almeida, Sérgio Vale Aguiar Campos:

Characterizing SopCast client behavior. 1004-1016
Volume 35, Number 9, May 2012
- Jiming Chen, Hannes Frey, Xu Li:

Special issue: Wireless sensor and robot networks: Algorithms and experiments. iii-iv
- Baozhi Chen, Dario Pompili:

Team formation and steering algorithms for underwater gliders using acoustic communications. 1017-1028 - Kaoru Ota

, Mianxiong Dong
, Zixue Cheng, Junbo Wang
, Xu Li, Xuemin (Sherman) Shen
:
ORACLE: Mobility control in wireless sensor and actor networks. 1029-1037 - Arnaud Casteigts, Jeremie Albert, Serge Chaumette, Amiya Nayak

, Ivan Stojmenovic:
Biconnecting a network of mobile robots using virtual angular forces. 1038-1046 - Carmelo Costanzo, Valeria Loscrì

, Enrico Natalizio
, Tahiry Razafindralambo
:
Nodes self-deployment for coverage maximization in mobile robot networks using an evolving neural network. 1047-1055 - Ahmed E. A. A. Abdulla, Hiroki Nishiyama

, Nei Kato:
Extending the lifetime of wireless sensor networks: A hybrid routing algorithm. 1056-1063 - Hualiang Chen, Yueming Cai, Weiwei Yang, Dongmei Zhang, Yingbo Hu:

Throughput and energy efficiency of a novel cooperative ARQ strategy for wireless sensor networks. 1064-1073 - Parth H. Pathak, Rudra Dutta

:
Centrality-based power control for hot-spot mitigation in multi-hop wireless networks. 1074-1085 - Dhia Mahjoub, David W. Matula:

Constructing efficient rotating backbones in wireless sensor networks using graph coloring. 1086-1097 - Der-Chen Huang, Hsing-Chien Tseng, Der-Jiunn Deng, Han-Chieh Chao

:
A queue-based prolong lifetime methods for wireless sensor node. 1098-1106 - Peng Cheng, Xianghui Cao

, Jing Bai, Youxian Sun:
On optimizing sensing quality with guaranteed coverage in autonomous mobile sensor networks. 1107-1114 - Yao Zhao, Zhipeng Yang, Hongyi Wu:

Local information guided autonomous exploration in sensor networks: Algorithms and experiments. 1115-1124 - Peng Guo, Tao Jiang, Kui Zhang:

Novel 2-hop coloring algorithm for time-slot assignment of newly deployed sensor nodes without ID in wireless sensor and robot networks. 1125-1131 - Hamed Yousefi, Mohammad Hossein Yeganeh, Naser Alinaghipour, Ali Movaghar

:
Structure-free real-time data aggregation in wireless sensor networks. 1132-1140 - Huai-Lei Fu, Hou-Chun Chen, Phone Lin

:
APS: Distributed air pollution sensing system on Wireless Sensor and Robot Networks. 1141-1150 - Hüseyin Akcan, Cem Evrendilek:

GPS-free directional localization via dual wireless radios. 1151-1163
Volume 35, Number 10, June 2012
- Tien Van Do

, Nam H. Do, Ram Chakka:
A new queueing model for spectrum renting in mobile cellular networks. 1165-1171 - Der-Rong Din, Jhong-Yan Jiang:

Delay-constrained survivable multicast routing problem in WDM networks. 1172-1184 - Can Komar, Mehmet Yunus Donmez, Cem Ersoy

:
Detection quality of border surveillance wireless sensor networks in the existence of trespassers' favorite paths. 1185-1199 - Ricardo M. Silva, Jorge Sá Silva

, Fernando Boavida
:
A proposal for proxy-based mobility in WSNs. 1200-1216 - Yang Xia, Chai Kiat Yeo

:
Mitigating the impact of node mobility using mobile backbone for heterogeneous MANETs. 1217-1230 - Djohara Benyamina, Abdelhakim Hafid, Nasreddine Hallam, Michel Gendreau, J. C. Maureira:

A hybrid nature-inspired optimizer for wireless mesh networks design. 1231-1246 - Jung-Shian Li, Kun-Hsuan Liu, Chien-Hung Wu:

Efficient group multicast node scheduling schemes in multi-hop wireless networks. 1247-1258 - Claudia Campolo

, Antonio Iera
, Leonardo Militano, Antonella Molinaro:
Scenario-adaptive and gain-aware content sharing policies for cooperative wireless environments. 1259-1271 - Ming Tao, Huaqiang Yuan, Shoubin Dong

, Hewei Yu:
Initiative movement prediction assisted adaptive handover trigger scheme in fast MIPv6. 1272-1282
Volume 35, Number 11, June 2012
- Franca Delmastro

:
Introduction to the special section on Pervasive Healthcare. 1283 - Franca Delmastro

:
Pervasive communications in healthcare. 1284-1295 - Gennaro Tartarisco

, Giovanni Baldus, Daniele Corda, Rossella Raso, Antonino Arnao
, Marcello Ferro
, Andrea Gaggioli
, Giovanni Pioggia
:
Personal Health System architecture for stress monitoring and support to clinical decisions. 1296-1305 - Mélodie Vidal, Jayson Turner, Andreas Bulling

, Hans Gellersen
:
Wearable eye tracking for mental health monitoring. 1306-1311
- Hakem Beitollahi, Geert Deconinck

:
Analyzing well-known countermeasures against distributed denial of service attacks. 1312-1332
- Javad Akbari Torkestani:

An adaptive backbone formation algorithm for wireless sensor networks. 1333-1344 - Jae-Young Seol, Seong-Lyun Kim:

Node mobility and capacity in wireless controllable ad hoc networks. 1345-1354 - Wooguil Pak, Saewoong Bahk:

Centralized route recovery based on multi-hop wakeup time estimation for wireless sensor networks with ultra low duty cycles. 1355-1367 - Mahboobeh Soleimani, Ali A. Ghorbani:

Multi-layer episode filtering for the multi-step attack detection. 1368-1379 - Hamza Rahmani, Nabil Sahli

, Farouk Kamoun
:
DDoS flooding attack detection scheme based on F-divergence. 1380-1391 - Eduardo Cañete

, Manuel Díaz
, Luis Llopis
, Bartolomé Rubio
:
HERO: A hierarchical, efficient and reliable routing protocol for wireless sensor and actor networks. 1392-1409
Volume 35, Number 12, July 2012
- Chongyang Xie, Hamed M. K. Alazemi, Nasir Ghani:

Rerouting in advance reservation networks. 1411-1421 - Fucai Yu, Guangmin Hu, Soochang Park, Euisin Lee

, Sang-Ha Kim
:
Quorum based sink location service for irregular wireless sensor networks. 1422-1432 - Antonio de la Oliva

, Albert Banchs, Pablo Serrano
:
Throughput and energy-aware routing for 802.11 based mesh networks. 1433-1446 - Hanwu Wang, Weijia Jia

:
Design a novel fairness model in WiMAX mesh networks. 1447-1456 - Hongli Zhang, Gang Lu, Mahmoud T. Qassrawi, Yu Zhang

, Xiang-Zhan Yu:
Feature selection for optimizing traffic classification. 1457-1471 - Seyed Vahid Azhari, Maryam Homayouni, Hani Nemati, Javad Enayatizadeh, Ahmad Akbari

:
Overload control in SIP networks using no explicit feedback: A window based approach. 1472-1483 - Daochao Huang, Fuhong Lin

, Lei Wu, Hongke Zhang:
CPSCox: A survival analysis model of peer behavior in large scale DHT system. 1484-1493 - Piet Van Mieghem:

The viral conductance of a network. 1494-1506 - Manuel Egele, Andreas Moser, Christopher Kruegel, Engin Kirda:

PoX: Protecting users from malicious Facebook applications. 1507-1515 - Marco Gramaglia, Manuel Urueña

, Isaías Martinez-Yelmo
:
Off-line incentive mechanism for long-term P2P backup storage. 1516-1526 - Maede Ashouri-Talouki

, Ahmad Baraani-Dastjerdi, Ali Aydin Selçuk
:
GLP: A cryptographic approach for group location privacy. 1527-1533
Volume 35, Number 13, July 2012
- Y. Yuan, K. Wu, Weijia Jia

, Y. Peng:
On the queueing behavior of inter-flow asynchronous network coding. 1535-1548 - Kai Bu, Qingjun Xiao, Zhixin Sun, Bin Xiao

:
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks. 1549-1560 - Vatche Ishakian, Joseph Akinwumi

, Flavio Esposito, Ibrahim Matta
:
On supporting mobility and multihoming in recursive internet architectures. 1561-1573 - David Palma

, Marília Curado
:
Onto scalable Ad-hoc networks: Deferred Routing. 1574-1589 - Andrija S. Velimirovic, Goran Lj. Djordjevic

, Maja M. Velimirovic, Milica D. Jovanovic
:
Fuzzy ring-overlapping range-free (FRORF) localization method for wireless sensor networks. 1590-1600 - Bin Wang, Qingguo Shen

:
Tide: An effective and practical design for hierarchical-structured P2P model. 1601-1612 - Theus Hossmann, George Nomikos, Thrasyvoulos Spyropoulos, Franck Legendre:

Collection and analysis of multi-dimensional network data for opportunistic networking research. 1613-1625 - Hussein Al-Zubaidy, Ioannis Lambadaris, Yannis Viniotis:

Optimal scheduling in multi-server queues with random connectivity and retransmissions. 1626-1638 - Zuoxiang Deng, Yanmin Zhu, Minglu Li:

On efficient neighbor sensing in vehicular networks. 1639-1648
Volume 35, Number 14, August 2012
- Enzo Mingozzi, Xavier Pérez Costa

, Catherine Rosenberg, Shugong Xu
:
Special issue: Wireless Green Communications and Networking. 1649-1650
- Pablo Serrano

, Antonio de la Oliva
, Paul Patras
, Vincenzo Mancuso
, Albert Banchs:
Greening wireless communications: Status and future directions. 1651-1661 - Sergey D. Andreev

, Pavel Gonchukov, Nageen Himayat, Yevgeni Koucheryavy
, Andrey M. Turlikov
:
Energy efficient communications for future broadband cellular networks. 1662-1671 - C.-Y. Wu, H.-J. Ho, S. L. Lee:

Minimizing energy consumption with QoS constraints over IEEE 802.16e networks. 1672-1683 - Dionysis Xenakis

, Nikos I. Passas, Christos V. Verikoukis:
An energy-centric handover decision algorithm for the integrated LTE macrocell-femtocell network. 1684-1694 - Anna Ukhanova, Evgeniy Belyaev, Le Wang, Søren Forchhammer

:
Power consumption analysis of constant bit rate video transmission over 3G networks. 1695-1706 - Maurizio D'Arienzo

, Francesco Oliviero, Simon Pietro Romano
:
Can cooperation improve energy efficiency in ad hoc wireless networks? 1707-1714 - Abraham Martín-Campillo, Ramon Martí

:
Energy-efficient forwarding mechanism for wireless opportunistic networks in emergency scenarios. 1715-1724 - Yoshihisa Kondo, Hiroyuki Yomo, Suhua Tang

, Masahito Iwai, Toshiyasu Tanaka, Hideo Tsutsui, Sadao Obana:
Energy-efficient WLAN with on-demand AP wake-up using IEEE 802.11 frame length modulation. 1725-1735 - Raquel A. F. Mini, Antonio Alfredo Ferreira Loureiro:

Energy-efficient design of wireless sensor networks based on finite energy budget. 1736-1748 - Huan Ma, Deying Li, Wenping Chen, Qinghua Zhu, Huiqiang Yang:

Energy efficient k-barrier coverage in limited mobile wireless sensor networks. 1749-1758 - Nicolas Fourty, Adrien van den Bossche, Thierry Val:

An advanced study of energy consumption in an IEEE 802.15.4 based network: Everything but the truth on 802.15.4 node lifetime. 1759-1767
Volume 35, Number 15, September 2012
- Min Chen, Victor C. M. Leung

, Rune Hjelsvold
, Xu Huang:
Smart and interactive ubiquitous multimedia services. 1769-1771
- Daniel Corujo

, Marcelo Lebre, Diogo Gomes
, Rui L. Aguiar
:
MINDiT: A framework for media independent access to things. 1772-1785 - Nadjet Belblidia, Marcelo Dias de Amorim, Luís Henrique Maciel Kosmalski Costa

, Jeremie Leguay
, Vania Conan
:
Part-whole dissemination of large multimedia contents in opportunistic networks. 1786-1797 - Sung-Yen Chang, Chin-Feng Lai

, Yueh-Min Huang:
Dynamic adjustable multimedia streaming service architecture over cloud computing. 1798-1808 - Tin Yu Wu, Chi-Yuan Chen, Ling-Shang Kuo, Wei-Tsong Lee, Han-Chieh Chao

:
Cloud-based image processing system with priority-based data distribution mechanism. 1809-1818 - Joel J. P. C. Rodrigues, Liang Zhou, Lucas D. P. Mendes, Kai Lin, Jaime Lloret:

Distributed media-aware flow scheduling in cloud computing environment. 1819-1827 - Yingsong Huang, Shiwen Mao, Yihan Li:

A majorization approach to downlink multiuser VBR video streaming. 1828-1837 - Zhe Song, Honggang Wang

, Yonggang Wen, Dalei Wu
, Ken C. K. Lee:
Depth-color based 3D image transmission over wireless networks with QoE provisions. 1838-1845 - Xingang Liu, Xin Guan, Qiang Liu, Hai Wang:

Multiple-layer scalable video coding technology based on MB-level data partition for wireless sensor networking. 1846-1854 - Jaime Lloret, Alejandro Canovas

, Jesús Tomás, Marcelo Atenas:
A network management algorithm and protocol for improving QoE in mobile IPTV. 1855-1870 - Sudip Misra, Bhaswar Banerjee, Bernd E. Wolfinger:

A learning automata-based uplink scheduler for supporting real-time multimedia interactive traffic in IEEE 802.16 WiMAX networks. 1871-1881 - Yuansheng Luo, Kun Yang, Qiang Tang, Jianming Zhang

, Bing Xiong:
A multi-criteria network-aware service composition algorithm in wireless environments. 1882-1892 - Xiangyang Zhang, Hossam S. Hassanein

:
Understanding the impact of neighboring strategy in peer-to-peer multimedia streaming applications. 1893-1901 - Kai Lin, Xiaohu Ge

, Xiaofei Wang, Chunsheng Zhu, Heung-Gyoon Ryu:
Research on secure data collection in wireless multimedia sensor networks. 1902-1909 - Xiaohui Liang

, Mrinmoy Barua, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen
:
HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks. 1910-1920 - Min Han Shon, Minho Jo

, Hyunseung Choo:
An interactive cluster-based MDS localization scheme for multimedia information in wireless sensor networks. 1921-1929 - Haiyang Wang, Jiangchuan Liu, Ke Xu:

Understand traffic locality of peer-to-peer video file swarming. 1930-1937
Volume 35, Number 16, September 2012
- Gabriel Deak, Kevin Curran

, Joan Condell:
A survey of active and passive indoor localisation systems. 1939-1954
- Vinod Namboodiri, Maheesha DeSilva, Kavindya Deegala, Suresh Ramamoorthy:

An extensive study of slotted Aloha-based RFID anti-collision protocols. 1955-1966 - Liqiang Tao, Fengqi Yu:

Delay-Jitter aware slot assignment for Real-Time applications in wireless multimedia ad hoc sensor networks. 1967-1982 - Haitao Zhang, Huadong Ma, Xiang-Yang Li, Shaojie Tang, Xiaohua Xu:

Energy-efficient scheduling with delay constraints for wireless sensor networks: A calculus-based perspective. 1983-1993 - Xian Chen, Yoo-Ah Kim, Bing Wang, Yuan Song, Hieu Dinh, Guanling Chen:

Sniffer channel selection for monitoring wireless LANs. 1994-2003 - A. Antony Franklin

, Athula Balachandran, C. Siva Ram Murthy:
Online reconfiguration of channel assignment in Multi-Channel Multi-Radio wireless mesh networks. 2004-2013 - Stuart M. Allen

, Ian M. Cooper, Roger M. Whitaker:
Optimising multi-rate link scheduling for wireless mesh networks. 2014-2024 - Wen-Hwa Liao

, Sital Prasad Kedia, Avinash Kumar Dubey:
Scheduling and channel assignment algorithm for IEEE 802.16 mesh networks using clique partitioning technique. 2025-2034 - Dong Mei Shan, Kee Chaing Chua, Gurusamy Mohan

:
Wavelength converter allocation considering the streamline effect in OBS networks. 2035-2043 - Xianfu Meng, Yalin Ding, Yue Gong:

@Trust: A trust model based on feedback-arbitration in structured P2P network. 2044-2053
Volume 35, Number 17, October 2012
- Mariem Zekri, Badii Jouaber, Djamal Zeghlache

:
A review on mobility management and vertical handover solutions over heterogeneous wireless networks. 2055-2068
- Dirk Trossen, Janne Riihijärvi, Pekka Nikander, Petri Jokela, Jimmy Kjällman, Jarno Rajahalme:

Designing, implementing and evaluating a new internetworking architecture. 2069-2081 - Mingwei Xu, Qing Li

, Lingtao Pan, Qi Li, Dan Wang
:
Minimum Protection Cost Tree: A tunnel-based IP Fast Reroute Scheme. 2082-2092 - Victoria Beltran, Josep Paradells

:
Control mechanisms of presence updates: A tradeoff between traffic optimization and information consistency. 2093-2105 - Jongchan Lee

, Seong-Moo Yoo:
Intelligent cell selection satisfying user requirements for inter-system handover in heterogeneous networks. 2106-2114 - Ruiliang Chen, Jung-Min "Jerry" Park, Kaigui Bian:

Robustness against Byzantine Failures in Distributed Spectrum Sensing. 2115-2124 - Dong Hao, Xiaojuan Liao, Avishek Adhikari, Kouichi Sakurai, Makoto Yokoo

:
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks. 2125-2137 - Usman Ashraf, Slim Abdellatif, Guy Juanole:

Interference-Aware Bandwidth Reservation in multi-radio multi-channel mesh networks. 2138-2149 - Tao Liu, Qingrui Li, Ping Liang:

An energy-balancing clustering approach for gradient-based routing in wireless sensor networks. 2150-2161 - Mari Carmen Domingo

, Mehmet C. Vuran
:
Cross-layer analysis of error control in underwater wireless sensor networks. 2162-2172
Volume 35, Number 18, November 2012
- Björn Landfeldt, Luciano Bononi

:
Special section on wireless network behaviour and design. 2173-2174 - Min Kyung An

, Nhat X. Lam, Dung T. Huynh, Trac N. Nguyen:
Minimum latency data aggregation in the physical interference model. 2175-2186 - Azzedine Boukerche, Dionysios Efstathiou, Sotiris E. Nikoletseas, Christoforos L. Raptopoulos:

Exploiting limited density information towards near-optimal energy balanced data propagation. 2187-2200 - Andrea Passarella

, Robin I. M. Dunbar, Marco Conti
, Fabio Pezzoni:
Ego network models for Future Internet social networking environments. 2201-2217 - Luca Anchora, Marco Mezzavilla

, Leonardo Badia
, Michele Zorzi:
A performance evaluation tool for spectrum sharing in multi-operator LTE networks. 2218-2226 - Sara Modarres Razavi, Di Yuan:

Mitigating signaling congestion in LTE location management by overlapping tracking area lists. 2227-2235
- Thorsten Herfet, Marco Ajmone Marsan:

Special section on Networked Electronic Media - The new internet experience. 2236 - Robert Birke, Csaba Király

, Emilio Leonardi
, Marco Mellia
, Michela Meo
, Stefano Traverso:
A delay-based aggregate rate control for P2P streaming systems. 2237-2244 - Jochen Miroll, Thorsten Herfet:

Efficient OFDM-based WLAN-multicast with feedback aggregation, power control and rate adaptation. 2245-2253 - Lorenzo Favalli, Marco Folli, Alfio Lombardo

, Diego Reforgiato Recupero
, Giovanni Schembra
:
Design of a service platform for delay-sensitive video streaming applications based on multicast p2p and scalable MDC encoding. 2254-2263 - Manuel Gorius, Goran Petrovic, Thorsten Herfet:

Efficient and low-delay error control for large-BDP networks. 2264-2273
- Boangoat Jarupan, Eylem Ekici

:
Mobility management for efficient data delivery in infrastructure-to-vehicle networks. 2274-2280 - Jinsheng Sun, Sammy Chan

, Moshe Zukerman
:
IAPI: An intelligent adaptive PI active queue management scheme. 2281-2293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














