


default search action
IEEE Network, Volume 30
Volume 30, Number 1, January - February 2016
- Nei Kato

:
On cloud computing [Editor's Note]. 2 - Song Guo

, Shui Yu
, Jie Li
, Nirwan Ansari
:
Big data for networking [Guest Editorial]. 4-5 - Bo Fan, Supeng Leng, Kun Yang:

A dynamic bandwidth allocation algorithm in mobile networks with big data of users and networks. 6-10 - Eleni Stai, Vasileios Karyotis

, Symeon Papavassiliou:
A hyperbolic space analytics framework for big network data and their applications. 11-17 - Chengchen Hu, Hao Li

, Yuming Jiang
, Yu Cheng
, Poul E. Heegaard
:
Deep semantics inspection over big network data at wire speed. 18-23 - Mauro De Sanctis

, Igor Bisio, Giuseppe Araniti:
Data mining algorithms for communication networks control: concepts, survey and guidelines. 24-29 - Liwei Kuang, Laurence T. Yang, Xiaokang Wang, Puming Wang

, Yaliang Zhao:
A tensor-based big data model for QoS improvement in software defined networks. 30-35 - Kun Wang, Yun Shao, Lei Shu

, Chunsheng Zhu, Yan Zhang:
Mobile big data fault-tolerant processing for ehealth networks. 36-42 - Kan Zheng, Zhe Yang, Kuan Zhang, Periklis Chatzimisios

, Kan Yang
, Wei Xiang
:
Big data-driven optimization for mobile networks toward 5G. 44-51 - Zhou Su, Qichao Xu, Qifan Qi:

Big data in mobile social networks: a QoE-oriented framework. 52-57 - Laizhong Cui, F. Richard Yu

, Qiao Yan:
When big data meets software-defined networking: SDN for big data and big data for SDN. 58-65 - Nirwan Ansari

, Tao Han:
Freenet: Spectrum and energy harvesting wireless networks. 66-71 - You Wang, Jun Bi, Athanasios V. Vasilakos

:
An identifier-based approach to internet mobility: a survey. 72-79 - Lorenzo Carla, Romano Fantacci, Francesco Gei, Dania Marabissi, Luigia Micciullo:

LTE enhancements for public safety and security communications to support group multimedia communications. 80-85 - Toshikazu Sakano, Satoshi Kotabe, Tetsuro Komukai, Tomoaki Kumagai, Yoshitaka Shimizu, Atsushi Takahara, Thuan Ngo, Zubair Md Fadlullah

, Hiroki Nishiyama
, Nei Kato
:
Bringing movable and deployable networks to disaster areas: development and field test of MDRU. 86-91 - Lingyang Song, Xiang Cheng, Minghua Chen

, Shengli Zhang
, Ying Jun Zhang
:
Coordinated device-to-device local area networks: the approach of the China 973 project D2D-LAN. 92-99 - Zubair Md Fadlullah

, Daisuke Takaishi, Hiroki Nishiyama
, Nei Kato
, Ryu Miura:
A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV-aided networks. 100-105 - Sachin Sharma

, Dimitri Staessens, Didier Colle, Mario Pickavet, Piet Demeester:
In-band control, queuing, and failure recovery functionalities for openflow. 106-112
Volume 30, Number 2, March - April 2016
- Nei Kato

:
On 5G wireless systems [Editor's Note]. 2-3 - Matthew Andrews, Mung Chiang, Sangtae Ha, Jianwei Huang, Soumya Sen:

Innovation in network pricing [Guest Editorial]. 4-5 - Eran Simhon, David Starobinski:

A game-theoretic perspective on advance reservations. 6-11 - Xin Wang, Richard T. B. Ma

, Yinlong Xu:
The role of data cap in two-part pricing under market competition. 12-17 - Dusit Niyato

, Dinh Thai Hoang, Nguyen Cong Luong, Ping Wang, Dong In Kim
, Zhu Han:
Smart data pricing models for the internet of things: a bundling strategy approach. 18-25 - Hassan Habibi Gharakheili

, Arun Vishwanath, Vijay Sivaraman:
An economic model for a new broadband ecosystem based on fast and slow lanes. 26-31 - Fraida Fund

, S. Amir Hosseini, Shivendra S. Panwar:
Under a cloud of uncertainty: legal questions affecting internet storage and transmission of copyright-protected video content. 32-38 - Yong Li, Fengli Xu:

Trace-driven analysis for location-dependent pricing in mobile cellular networks. 40-45 - Tamer Abdelkader

, Kshirasagar Naik, Amiya Nayak
, Nishith Goel, Vineet Srivastava:
A performance comparison of delay-tolerant network routing protocols. 46-53 - Enzo Baccarelli, Nicola Cordeschi

, Alessandro Mei
, Massimo Panella
, Mohammad Shojafar
, Julinda Stefa:
Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study. 54-61 - Heng Zhang, Yuanchao Shu

, Peng Cheng, Jiming Chen:
Privacy and performance trade-off in cyber-physical systems. 62-66 - Yong Cui, Lian Wang, Xin Wang, Yisen Wang, Fengyuan Ren, Shu-Tao Xia:

End-to-end coding for TCP. 68-73 - Huacheng Zeng, Feng Tian, Y. Thomas Hou

, Wenjing Lou, Scott F. Midkiff:
Interference alignment for multihop wireless networks: challenges and research directions. 74-80 - Haojun Huang, Hao Yin, Yan Luo, Xu Zhang, Geyong Min

, Qilin Fan:
Three-dimensional geographic routing in wireless mobile ad hoc and sensor networks. 82-90 - Marica Amadeo

, Claudia Campolo
, José Quevedo
, Daniel Corujo
, Antonella Molinaro, Antonio Iera
, Rui L. Aguiar
, Athanasios V. Vasilakos
:
Information-centric networking for the internet of things: challenges and opportunities. 92-100 - Ke Xu, Yi Qu, Kun Yang:

A tutorial on the internet of things: from a heterogeneous network integration perspective. 102-108 - Faqir Zarrar Yousaf, Tarik Taleb:

Fine-grained resource-aware virtual network function management for 5G carrier cloud. 110-115 - Haijun Zhang, Chunxiao Jiang, Rose Qingyang Hu, Yi Qian:

Self-organization in disaster-resilient heterogeneous small cell networks. 116-121 - Li Wang, Gordon L. Stüber:

Pairing for resource sharing in cellular device-to-device underlays. 122-128
Volume 30, Number 3, May - June 2016
- Nei Kato

:
On device-to-device (D2D) communication [Editor's note]. 2 - Jun Guo, Mischa Dohler

, Whoi-Yul Kim, Ah Chung Tsoi
, Kan Zheng
:
Mobile big data [Guest editorial]. 4-5 - Fengli Xu, Yong Li, Min Chen

, Sheng Chen
:
Mobile cellular big data: linking cyberspace and the physical world with social ecology. 6-12 - Yuanyuan Qiao, Xiao-Xing Zhao, Jie Yang, Jiajia Liu

:
Mobile big-data-driven rating framework: measuring the relationship between human mobility and app usage behavior. 14-21 - Mohammad Abu Alsheikh

, Dusit Niyato
, Shaowei Lin, Hwee-Pink Tan
, Zhu Han:
Mobile big data analytics using deep learning and apache spark. 22-29 - Wei Xiang

, Gengkun Wang
, Mark Pickering
, Yongbing Zhang:
Big video data for light-field-based 3D telemedicine. 30-38 - Jun Bi, Shuyong Zhu, Chen Sun, Guang Yao, Hongxin Hu:

Supporting virtualized network functions with stateful data plane abstraction. 40-45 - Hongke Zhang, Wei Quan, Han-Chieh Chao

, Chunming Qiao:
Smart identifier network: A collaborative architecture for the future internet. 46-51 - Ian F. Akyildiz, Ahyoung Lee, Pu Wang

, Min Luo
, Wu Chou:
Research challenges for traffic engineering in software defined networks. 52-58 - An-Dee Lin, Hubertus Franke, Chung-Sheng Li, Wanjiun Liao

:
Toward performance optimization with CPU offloading for virtualized multi-tenant data center networks. 59-63 - Ming Zhu, Jiannong Cao

, Zhiping Cai, Zongjian He, Ming Xu:
Providing flexible services for heterogeneous vehicles: an NFV-based approach. 64-71 - Carla Mouradian, Tonmoy Saha, Jagruti Sahoo, Mohammad Abu-Lebdeh, Roch H. Glitho

, Monique Morrow, Paul A. Polakos:
Network functions virtualization architecture for gateways for virtualized wireless sensor and actuator networks. 72-80 - Zilong Ye, Xiaojun Cao

, Jianping Wang, Hong-Fang Yu, Chunming Qiao:
Joint topology design and mapping of service function chains for efficient, scalable, and reliable network functions virtualization. 81-87 - Hossein Shokri Ghadikolaei, Carlo Fischione

, Petar Popovski
, Michele Zorzi:
Design aspects of short-range millimeter-wave networks: A MAC layer perspective. 88-96
Volume 30, Number 4, July - August 2016
- Nei Kato

:
Statistics for the past six months [Editor's Note]. 2 - Bruno Chatras

, François Frédéric Ozog:
Network functions virtualization: the portability challenge. 4-8 - Zongjian He, Jiannong Cao

, Xuefeng Liu:
SDVN: enabling rapid network innovation for heterogeneous vehicular communication. 10-15 - Yong Cui, Zeqi Lai, Ningwei Dai:

A first look at mobile cloud storage services: architecture, experimentation, and challenges. 16-21 - Hassan Aboubakr Omar, Ning Lu, Weihua Zhuang

:
Wireless access technologies for vehicular network safety applications. 22-26 - Jianwei Niu

, Danning Wang, Milica Stojmenovic:
How does information diffuse in large recommendation social networks? 28-33 - Yuehua Wang, Yu Chen, Chuan Li, Hongwei Zhang, Jayanthi Rao, Patrick Gossman, Jing Zhu:

VLnsight: enabling open innovation in networked vehicle sensing and control. 34-44 - Mugen Peng

, Shi Yan, Kecheng Zhang, Chonggang Wang:
Fog-computing-based radio access networks: issues and challenges. 46-53 - Xiaoming Li, Qing Yang, Xiaodong Lin, Shaoen Wu, Mike P. Wittie:

Itrust: interpersonal trust measurements from social interactions. 54-58 - Fei-Yue Wang, Liuqing Yang, Xiang Cheng, Shuangshuang Han, Jian Yang:

Network softwarization and parallel networks: beyond software-defined networks. 60-65 - Yao Zheng

, Assad Moini, Wenjing Lou, Y. Thomas Hou
, Yuichi Kawamoto
:
Cognitive security: securing the burgeoning landscape of mobile networks. 66-71 - Kan Zheng

, Lu Hou, Hanlin Meng, Qiang Zheng, Ning Lu, Lei Lei
:
Soft-defined heterogeneous vehicular network: architecture and challenges. 72-80
Volume 30, Number 5, September - October 2016
- Nei Kato

:
Challenges of anything as a service in the cloud [Editor's Note]. 2 - Xiaohua Tian:

Scanning the literature. 3 - Wenlong Shen, Bo Yin, Xianghui Cao

, Lin X. Cai
, Yu Cheng
:
Secure device-to-device communications over WiFi direct. 4-9 - Qiang Duan, Nirwan Ansari

, Mehmet Toy:
Software-defined network virtualization: an architectural framework for integrating SDN and NFV for service provisioning in future networks. 10-16 - Baochun Li, Y. Thomas Hou

:
The new automated IEEE INFOCOM review assignment system. 18-24 - Qiang Liu, Xiping Hu

, Edith C. H. Ngai, Min Liang, Victor C. M. Leung, Zhiping Cai, Jianping Yin:
A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard. 26-34 - Zhi Wang, Jiangchuan Liu, Wenwu Zhu:

Social-aware video delivery: challenges, approaches, and directions. 35-39 - Mingjie Feng, Shiwen Mao:

Harvest the potential of massive MIMO with multi-layer techniques. 40-45 - Tianyu Wang, Lingyang Song, Zhu Han, Walid Saad:

Overlapping coalition formation games for emerging communication networks. 46-53 - Wei Song, Weihua Zhuang

:
Packet assignment under resource constraints with D2D communications. 54-60 - Shengling Wang, Rongfang Bie, Feng Zhao

, Nan Zhang, Xiuzhen Cheng, Hyeong-Ah Choi:
Security in wearable communications. 61-67 - Zhengguo Bian, Ruhai Wang, Kanglian Zhao

, Dongming Bian, Zhidong Xie, Yi Qian:
Bundle protocol for data delivery over highly asymmetric deep-space channels. 68-73 - Yulong Zou

, Jia Zhu, Xuelong Li
, Lajos Hanzo
:
Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective. 74-79
Volume 30, Number 6, November - December 2016
- Nei Kato:

Mobile Social Networks: Prospects and Challenges. 2 - Xiaodong Lin, Kim-Kwang Raymond Choo, Ying-Dar Lin, Peter Mueller

:
Guest Editorial: Network Forensics and Surveillance for Emerging Networks. 4-5 - Suleman Khan, Abdullah Gani

, Ainuddin Wahid Abdul Wahab
, Ahmed Abdelaziz
, Kwangman Ko, Muhammad Khurram Khan
, Mohsen Guizani:
Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges. 6-13 - Krzysztof Cabaj

, Wojciech Mazurczyk
:
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall. 14-20 - Taejin Ha, Seunghyun Yoon

, Aris Cahyadi Risdianto
, JongWon Kim, Hyuk Lim:
Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks. 22-27 - Peng Zhang, Huanzhao Wang, Chengchen Hu, Chuang Lin:

On Denial of Service Attacks in Software Defined Networks. 28-33 - Ana Nieto

, Rodrigo Roman
, Javier López:
Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices. 34-41 - Seon-Ho Shin, Jooyoung Lee, Ji-Man Jeong, HyunBong Kim, Jong-Hyun Kim, Ikkyun Kim, MyungKeun Yoon

:
PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording. 42-48 - Kun Wang, Miao Du, Yanfei Sun, Alexey V. Vinel, Yan Zhang:

Attack Detection and Distributed Forensics in Machine-to-Machine Networks. 49-55 - Jiajia Liu

, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Cooperative Jammer Placement for Physical Layer Security Enhancement. 56-61 - Rong Yu, Yan Zhang, Yi Liu, Stein Gjessing, Mohsen Guizani:

Securing Cognitive Radio Networks against Primary User Emulation Attacks. 62-69 - Peican Zhu

, Jie Han, Yangming Guo, Fabrizio Lombardi:
Reliability and Criticality Analysis of Communication Networks by Stochastic Computation. 70-76 - Lifang Feng, Rose Qingyang Hu, Jianping Wang, Peng Xu, Yi Qian:

Applying VLC in 5G Networks: Architectures and Key Technologies. 77-83 - Tarik Taleb, Adlen Ksentini, Riku Jäntti

:
"Anything as a Service" for 5G Mobile Systems. 84-91 - Jia Peng, Yanmin Zhu, Wei Shu, Min-You Wu:

Behavior Dynamics of Multiple Crowdsourcers in Mobile Crowdsourcing Markets. 92-96

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














