Volume 17, Number 1, February 2009
, Shun-Zheng Yu
: Monitoring the application-layer DDoS attacks for popular websites.
, Shun-Zheng Yu
: A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors.
, Chuanyi Ji
: Scalability of network-failure resilience: analysis using multi-layer probabilistic graphical models.
Volume 17, Number 2, April 2009
, Boris Kapchits
: An optimal wake-up scheduling algorithm for minimizing energy consumption while limiting maximum delay in a mesh sensor network.
Volume 17, Number 3, June 2009
, Chin-Tau Lea
: Optimal link weights for IP-based networks supporting hose-model VPNs.
, Yiqiang Q. Zhao
: Resequencing analysis of stop-and-wait ARQ for parallel multichannel communications.
, Eytan Modiano
: A calculus approach to energy-efficient data transmission with quality-of-service constraints.
: Multicast capacity of wireless ad hoc networks.
, Chih-Chung Lin
: Two blocking algorithms on adaptive binary splitting: single and pair resolutions for RFID tag identification.
Volume 17, Number 4, August 2009
Jonathan S. Turner
: Strong performance guarantees for asynchronous buffered crossbar scheduler.
Michael J. Neely
: Delay analysis for maximal scheduling with flow control in wireless networks with bursty traffic.
, Kang G. Shin
: On accurate and asymmetry-aware measurement of link quality in wireless mesh networks.
, D. Manjunath
: Distributed iterative optimal resource allocation with concurrent updates of routing and flow control variables.
Volume 17, Number 5, October 2009
: Taking the skeletons out of the closets: a simple and efficient topology discovery scheme for large ethernet LANs.
, Do Young Eun
: Crossing over the bounded domain: from exponential to power-law intermeeting time in mobile ad hoc networks.
Volume 17, Number 6, December 2009
, Shahzada Rasool
: Distributed and provably efficient algorithms for joint channel-assignment, scheduling, and routing in multichannel ad hoc wireless networks.
, Guido Marchetto
: Pipeline forwarding of packets based on a low-accuracy network-distributed common time reference.