Computer Networks [and ISDN Systems], Volume 55
Volume 55, Number 1, January 2011
, Jing Xu
: Provable secure authentication protocol with anonymity for roaming service in global mobility networks.
: A distributed routing algorithm for sensor networks derived from macroscopic models.
, Xiaojun Lin
: On the queue-overflow probabilities of a class of distributed scheduling algorithms.
Volume 55, Number 2, February 2011
, Zwi Altman
: Self-organizing networks in next generation radio access networks: Application to fractional power control.
Volume 55, Number 3, February 2011
, Isabelle Augé-Blum
: Delivery ratio-maximized wakeup scheduling for ultra-low duty-cycled WSNs under real-time constraints.
: A route-aware MAC for wireless multihop networks with a convergecast traffic pattern.
, Andrew H. Kemp
: Energy-efficient geographic routing in the presence of localization errors.
Volume 55, Number 4, March 2011
Part I - Future Internet Architectures
Joseph D. Touch
, Ilia Baldine
, Rudra Dutta
, Gregory G. Finn
, Bryan Ford
, Scott Jordan
, Daniel Massey
, Abraham Matta
, Christos Papadopoulos
, Peter L. Reiher
, George N. Rouskas
: A Dynamic Recursive Unified Internet Design (DRUID).
Part II - Locator/Identifier Split
Part III - Specific Aspects of Future Internet Architectures
Volume 55, Number 5, April 2011
Volume 55, Number 6, April 2011
, Maode Ma
: Cognitive radio-based framework and self-optimizing temporal-spectrum block scheduling for QoS provisioning in WiMAX.
, Tetsuya Takine
: Design of a sliding window scheme for detecting high packet-rate flows via random packet sampling.
: Capacity analysis of a diffusion-based short-range molecular nano-communication channel.
Volume 55, Number 7, May 2011
Volume 55, Number 8, June 2011
, Jang-Won Lee
: User-level satisfaction aware end-to-end rate control in communication networks.
Jui Teng Wang
: Rate adaptation with joint receive diversity and power control for cognitive radio networks.
, Yang Xiao
: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks.
, Tijani Chahed
: Flow-level performance of proportional fairness with hierarchical modulation in OFDMA-based networks.
: Comparison of end-to-end and network-supported fast startup congestion control schemes.
Volume 55, Number 9, June 2011
, Jean Leneutre
: Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy.
Volume 55, Number 10, July 2011
, George Kesidis
: Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra.
, Kai Zeng
, Wenjing Lou
: Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Volume 55, Number 11, August 2011
, Wenye Wang
: Toward robust multi-hop data forwarding in large scale wireless networks.
: A survey of WDM network reconfiguration: Strategies and triggering methods.
, Eylem Ekici
: Utilizing dynamic spectrum leasing for cognitive radios in 802.11-based wireless networks.
Volume 55, Number 12, August 2011
, Jiang Xie
: OPNET-based modeling and simulation study on handoffs in Internet-based infrastructure wireless mesh networks.
, Shangyun Liu
: Comparison of different meta-heuristics to solve the global planning problem of UMTS networks.
Volume 55, Number 13, September 2011
, Fatih Alagöz
: Efficient integration of HAPs and mobile satellites via free-space optical links.
, Thomas Kuhn
: Black Burst Synchronization (BBS) - A protocol for deterministic tick and time synchronization in wireless networks.
Özlem Durmaz Incel
: A survey on multi-channel communication in wireless sensor networks.
Volume 55, Number 14, October 2011
: V2X communication in Europe - From research projects towards standardization and field testing of vehicle communication technology.
: The latest trend of v2x driver assistance systems in Japan.
: A methodology for testing intersection related Vehicle-2-X applications.
: V2X simulation runtime infrastructure VSimRTI: An assessment tool to design smart traffic management systems.
Volume 55, Number 15, October 2011
, John A. Clark
: Evolutionary computation techniques for intrusion detection in mobile ad hoc networks.
Volume 55, Number 16, November 2011
, Wuyi Yue
: Performance analysis for power saving class type III of IEEE 802.16 in WiMAX.
Volume 55, Number 17, December 2011
Aldar C.-F. Chan
: Efficient defence against misbehaving TCP receiver DoS attacks.
Volume 55, Number 18, December 2011
, Lisong Xu
: On tradeoffs between cross-ISP P2P traffic and P2P streaming performance.