


Остановите войну!
for scientists:


default search action
Computer Networks, Volume 51
Volume 51, Number 1, January 2007
- Francesc Sebé
, Josep Domingo-Ferrer:
Scalability and security in biased many-to-one communication. 1-13 - Davide Careglio
, Josep Solé-Pareta
, Salvatore Spadaro
:
Service category-to-wavelength selection technique for QoS support in connection-oriented optical packet switching. 14-30 - Ka Ki To, Jack Y. B. Lee:
Parallel overlays for high data-rate multicast data transfer. 31-42 - Junfeng Wang, Lei Li, Mingtian Zhou:
Topological dynamics characterization for LEO satellite networks. 43-53 - Zhi Li, Prasant Mohapatra:
On investigating overlay service topologies. 54-68 - Shanyu Zheng, David Manz
, Jim Alves-Foss:
A communication-computation efficient group key algorithm for large and dynamic groups. 69-93 - Hung Tuan Tran, Thomas Ziegler:
A design framework towards the profitable operation of service overlay networks. 94-113 - Giovanna Carofiglio, Michele Garetto
, Emilio Leonardi
, Alessandro Tarello, Marco Ajmone Marsan:
Beyond fluid models: Modelling TCP mice in IP networks under non-stationary random traffic. 114-133 - Li Feng, Qinglin Zhao, Hanwen Zhang:
Location management based on distance and direction for PCS networks. 134-152 - Tamma Bheemarjuna Reddy
, John P. John, C. Siva Ram Murthy:
Providing MAC QoS for multimedia traffic in 802.11e based multi-hop ad hoc wireless networks. 153-176 - Tao Meng, Hongfei Yan:
On the peninsula phenomenon in web graph and its implications on web search. 177-189 - Shay Kutten, David Peleg:
Asynchronous resource discovery in peer-to-peer networks. 190-206 - Salvatore Spadaro
, Alessandro D'Alessandro, Antonio Manzalini, Josep Solé-Pareta
:
TRIDENT: An automated approach to traffic engineering in IP/MPLS over ASON/GMPLS networks. 207-223 - Robert M. Hierons
, Hasan Ural:
Reducing the cost of applying adaptive test cases. 224-238 - Javed I. Khan, Raid Zaghal:
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport. 239-257 - Hirozumi Yamaguchi
, Khaled El-Fakih, Gregor von Bochmann, Teruo Higashino:
Deriving protocol specifications from service specifications written as Predicate/Transition-nets. 258-284 - Fei Hu, Waqaas Siddiqui, Krishna Sankar:
Scalable security in Wireless Sensor and Actuator Networks (WSANs): Integration re-keying with routing. 285-308 - Marcos Postigo-Boix
, Joan García-Haro
, José Luis Melús-Moreno:
A cost-efficient method for streaming stored content in a guaranteed QoS Internet. 309-335 - Wenting Tang, Yun Fu, Ludmila Cherkasova, Amin Vahdat:
Modeling and generating realistic streaming media server workloads. 336-356
Volume 51, Number 2, February 2007
- Stephan Reiff-Marganiec
, Mark Ryan
:
Guest Editorial. 357-358 - Michael Weiss, Babak Esfandiari, Yun Luo:
Towards a classification of web service feature interactions. 359-381 - Rui Gustavo Crespo, Miguel Carvalho
, Luigi Logrippo:
Distributed resolution of feature interactions for internet applications. 382-397 - Mohamed Shehata, Armin Eberlein
, Abraham O. Fapojuwo:
A taxonomy for identifying requirement interactions in software systems. 398-425 - Caixia Chi, Ruibing Hao:
Test generation for interaction detection in feature-rich communication systems. 426-438 - Alice Miller, Muffy Calder
, Alastair F. Donaldson:
A template-based approach for the generation of abstractable and reducible models of featured networks. 439-455 - Pierre-Yves Schobbens
, Patrick Heymans, Jean-Christophe Trigaux, Yves Bontemps:
Generic semantics of feature diagrams. 456-479 - Wu-Hon F. Leung:
Program entanglement, feature interaction and the feature language extensions. 480-495 - Kenneth J. Turner, Lynne Blair:
Policies and conflicts in call control. 496-514 - Xiaotao Wu, Henning Schulzrinne:
Handling feature interactions in the language for end system services. 515-535 - Mario Kolberg
, Evan H. Magill:
Managing feature interactions between distributed SIP call control services. 536-557
Volume 51, Number 3, February 2007
- Bhamidipati Praveen, Jayachandran Praveen, C. Siva Ram Murthy:
On using forward error correction for loss recovery in optical burst switched networks. 559-568 - Carlo K. da Silva Rodrigues, Rosa M. M. Leão:
Bandwidth usage distribution of multimedia servers using Patching. 569-587 - Yeim-Kuan Chang:
Fast binary and multiway prefix searches for packet forwarding. 588-605 - Sungchang Kim, Young-Chon Kim, Bin-Yeong Yoon, Minho Kang:
An integrated congestion control mechanism for optimized performance using two-step rate controller in optical burst switching networks. 606-620 - Young-June Choi, Jin-Ghoo Choi, Saewoong Bahk:
Upper-level scheduling supporting multimedia traffic in cellular data networks. 621-631 - Dong Yu, Deborah A. Frincke:
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net. 632-654 - Zhiguo Wan, Robert H. Deng
, Feng Bao, Akkihebbal L. Ananda:
Access control protocols with two-layer architecture for wireless networks. 655-670 - Hailong Li, Ian Li-Jin Thng:
Performance analysis of limited number of wavelength converters by share per node in optical switching network. 671-682 - Péter Hága, Krisztián Diriczi, Gábor Vattay, István Csabai
:
Granular model of packet pair separation in Poissonian traffic. 683-698 - Jean Marc Kelif, Eitan Altman, Ioannis Z. Koukoutsidis:
Admission and GoS control in a multiservice WCDMA system. 699-711 - Yuh-Jzer Joung
, Jiaw-Chang Wang:
Chord2: A two-layer Chord for reducing maintenance overhead via heterogeneity. 712-731 - Zhiqiang Gao, Nirwan Ansari
:
A practical and robust inter-domain marking scheme for IP traceback. 732-750 - Glenn S. Benson:
Portable security transaction protocol. 751-766 - Meng Chang Chen, Li-Ping Tung, Yeali S. Sun, Wei-Kuan Shih:
A new per-class flow fixed proportional differentiated service for multi-service wireless LAN. 767-780 - Michel Mandjes, Petteri Mannersalo, Ilkka Norros:
Gaussian tandem queues with an application to dimensioning of switch fabric interfaces. 781-797 - Zhenqiang Ye, Lap Kong Law, Srikanth V. Krishnamurthy
, Zhong Xu, Suvidhean Dhirakaosal, Satish K. Tripathi, Mart L. Molle:
Predictive channel reservation for handoff prioritization in wireless cellular networks. 798-822 - Lap Kong Law, Srikanth V. Krishnamurthy
, Michalis Faloutsos
:
A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks. 823-834 - Sergio Sánchez-López, Xavier Masip-Bruin
, Josep Solé-Pareta
, Jordi Domingo-Pascual:
Fast setup of end-to-end paths for bandwidth constrained applications in an IP/MPLS-ATM integrated environment. 835-852 - Jianping Pan
, Lin Cai
, Xuemin Shen
, Jon W. Mark:
Identity-based secure collaboration in wireless ad hoc networks. 853-865 - Jen-Shiuh Liu, Zhi-Jian Lee, Yeh-Ching Chung:
Dynamic probabilistic packet marking for efficient IP traceback. 866-882 - Yuh-Ren Tsai
, Shiuh-Jeng Wang:
Two-tier authentication for cluster and individual sets in mobile ad hoc networks. 883-900 - Ernst W. Biersack, Damiano Carra, Renato Lo Cigno
, Pablo Rodriguez, Pascal Felber
:
Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases. 901-917
Volume 51, Number 4, March 2007
- Ian F. Akyildiz, Harry Rudin:
Editorial. 919-920 - Ian F. Akyildiz, Tommaso Melodia, Kaushik R. Chowdhury
:
A survey on wireless multimedia sensor networks. 921-960 - Kurtis B. Kredo II, Prasant Mohapatra:
Medium access control in wireless sensor networks. 961-994 - Yi Li, Gaoxi Xiao
, Hooshang Ghafouri-Shiraz:
Performance evaluation of multi-fiber optical packet switches. 995-1012 - Gabriel Maciá-Fernández
, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against iterative servers. 1013-1030 - Konstantinos P. Ferentinos
, Theodore A. Tsiligiridis:
Adaptive design optimization of wireless sensor networks using genetic algorithms. 1031-1051 - Theodore L. Willke, Nicholas F. Maxemchuk:
Coordinated interaction using reliable broadcast in mobile wireless networks. 1052-1059 - Majid Ghaderi, Raouf Boutaba, Gary W. Kenward:
Joint call and packet QoS in cellular packet networks. 1060-1071 - Jinwon Lee, Hyonik Lee, Seungwoo Kang, Su Myeon Kim, Junehwa Song:
CISS: An efficient object clustering framework for DHT-based peer-to-peer applications. 1072-1094 - Shantidev Mohanty, Jiang Xie:
Performance analysis of a novel architecture to integrate heterogeneous wireless systems. 1095-1105 - Mohamed G. Gouda, Alex X. Liu:
Structured firewall design. 1106-1120 - Praveen Jayachandran, Praveen Bhamidipati, C. Siva Ram Murthy:
On providing elastic QoS in optical burst switched networks. 1121-1132 - Yaqing Huang, Roch Guérin:
A simple FIFO-based scheme for differentiated loss guarantees. 1133-1150 - Wei-Tsung Su, Ko-Ming Chang, Yau-Hwang Kuo:
eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. 1151-1168 - Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi
:
Robust self-keying mobile ad hoc networks. 1169-1182 - Sajjad Zarifzadeh, Nasser Yazdani, Hamed Khanmirza:
A routing framework for load balancing of bandwidth sensitive traffic in differentiated service networks. 1183-1204 - Fabio Ricciato, Francesco Vacirca, Philipp Svoboda
:
Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis. 1205-1231
Volume 51, Number 5, April 2007
- Deborah A. Frincke, Andreas Wespi, Diego Zamboni:
From intrusion detection to self-protection. 1233-1238 - Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest
:
Learning DFA representations of HTTP for protecting web applications. 1239-1255 - Georgios Portokalidis, Herbert Bos
:
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. 1256-1274 - Marcos Laureano, Carlos Maziero, Edgard Jamhour:
Protecting host-based intrusion detectors through virtual machines. 1275-1283 - Paul D. Williams, Eugene H. Spafford
:
CuPIDS: An exploration of highly focused, co-processor-based information system protection. 1284-1298 - Erol Gelenbe
, George Loukas
:
A self-aware approach to denial of service defence. 1299-1314 - Morton Swimmer:
Using the danger model of immune systems for distributed defense in modern data networks. 1315-1333 - Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford
:
Automated adaptive intrusion containment in systems of interacting services. 1334-1360 - Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Maier:
Automatic high-performance reconstruction and recovery. 1361-1377
Volume 51, Number 6, April 2007
- Hwangnam Kim, Jennifer C. Hou:
Mixed-mode simulation for IEEE 802.11-operated WLANs. 1379-1402 - Jeng Farn Lee, Meng Chang Chen, Yeali S. Sun:
WF2Q-M: Worst-case fair weighted fair queueing with maximum rate control. 1403-1420 - Jiang Li, Murat Yuksel, Xingzhe Fan, Shivkumar Kalyanaraman:
Generalized multicast congestion control. 1421-1443 - Lan Wang, Daniel Massey, Lixia Zhang:
Persistent detection and recovery of state inconsistencies. 1444-1458 - Sasu Tarkoma, Jaakko Kangasharju:
On the cost and safety of handoffs in content-based routing systems. 1459-1482 - Javier Vales-Alonso
, Esteban Egea-López
, Alejandro S. Martínez-Sala
, Pablo Pavón-Mariño, M. Victoria Bueno-Delgado
, Joan García-Haro
:
Performance evaluation of MAC transmission power control in wireless sensor networks. 1483-1498 - Nabhendra Bisnik, Alhussein A. Abouzeid
:
Optimizing random walk search algorithms in P2P networks. 1499-1514 - Hari Rangarajan, J. J. Garcia-Luna-Aceves:
Efficient use of route requests for loop-free on-demand routing in ad hoc networks. 1515-1529 - B. S. Manoj
, K. Jayanth Kumar, C. Siva Ram Murthy:
MuPAC: A new multi-power architecture for capacity enhancement in cellular networks. 1530-1554 - Yong Huat Chew, Boon Sain Yeo, Daniel Chien Ming Kuan:
Sensitivity study of location management area partitioning in cellular communication systems. 1555-1573 - Bo Li, Roberto Battiti
:
Achieving optimal performance in IEEE 802.11 wireless LANs with the combination of link adaptation and adaptive backoff. 1574-1600 - Hechmi Khlifi, Jean-Charles Grégoire:
ARTP: A buffer-aware rate control protocol for media streaming. 1601-1615 - Nikos Argiriou, Leonidas Georgiadis:
Channel sharing by multi-class rate adaptive streams: Performance region and optimization. 1616-1629 - Sangheon Pack
, Taekyoung Kwon, Yanghee Choi:
A performance comparison of mobility anchor point selection schemes in Hierarchical Mobile IPv6 networks. 1630-1642 - Mushi Jin, Oliver W. W. Yang:
APOSN: Operation, modeling and performance evaluation. 1643-1659 - Ashraf Al Daoud, Murat Alanyali:
Loss-cognizant pricing in networks with greedy users. 1660-1683 - Feng Zheng, John Nelson:
An Hinfinity approach to congestion control design for AQM routers supporting TCP flows in wireless access networks. 1684-1704 - Feng Gao, Michael E. Woodward:
A hybrid topological-stochastic partitioning method for scaling QoS routing algorithms. 1705-1724 - Gee-Swee Poo, Haibo Wang:
Multi-path routing versus tree routing for VPN bandwidth provisioning in the hose model. 1725-1743
Volume 51, Number 7, May 2007
- Katsushi Kobayashi
, Pascale Vicat-Blanc Primet, Joe Touch:
Protocols for fast, long-distance networks. 1745-1747 - Sangtae Ha, Long Le, Injong Rhee, Lisong Xu:
Impact of background traffic on performance of high-speed TCP variant protocols. 1748-1762 - Shan Chen, Brahim Bensaou:
Can high-speed networks survive with DropTail queues management? 1763-1776 - Yunhong Gu, Robert L. Grossman
:
UDT: UDP-based data transfer for high-speed wide area networks. 1777-1799 - Xiaomeng Huang, Chuang Lin, Fengyuan Ren:
A novel high speed transport protocol based on explicit virtual load feedback. 1800-1814 - Pasi Sarolahti, Mark Allman, Sally Floyd:
Determining an appropriate sending rate over an underutilized network path. 1815-1832 - Kiyohide Nakauchi, Katsushi Kobayashi
:
An explicit router feedback framework for high bandwidth-delay product networks. 1833-1846 - Lisong Xu:
Extending equation-based congestion control to high-speed and long-distance networks. 1847-1859
Volume 51, Number 8, June 2007
- Edith Cohen, Amos Fiat, Haim Kaplan:
Associative search in peer to peer networks: Harnessing latent semantics. 1861-1881 - Alex Raj, Oliver C. Ibe:
A survey of IP and multiprotocol label switching fast reroute schemes. 1882-1907 - Reuven Cohen, Amnon Shochot:
The "Global-ISP" paradigm. 1908-1921 - Hwangnam Kim, Jennifer C. Hou, Chunyu Hu, Ye Ge:
QoS provisioning in IEEE 802.11-compliant networks: Past, present, and future. 1922-1941 - Jin-Hee Choi, Young-Pil Kim
, Chuck Yoo:
Self-prevention of socket buffer overflow. 1942-1954 - Ye Ge, Jennifer C. Hou, Sunghyun Choi
:
An analytic study of tuning systems parameters in IEEE 802.11e enhanced distributed channel access. 1955-1980 - Steven Weber, Gustavo de Veciana:
Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link. 1981-1997 - Laura Galluccio
, Giacomo Morabito
, Sergio Palazzo, Marco Pellegrini
, M. Elena Renda
, Paolo Santi:
Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm. 1998-2014 - Jianbin Wei, Cheng-Zhong Xu
:
Consistent proportional delay differentiation: A fuzzy control approach. 2015-2032 - Ioannis Psaras, Vassilis Tsaoussidis
:
Why TCP timers (still) don't work well. 2033-2048 - Chun-Chuan Yang, Chun-Shian Tsai, Junn-Yen Hu, Tzu-Chien Chuang:
On the design of mobility management scheme for 802.16-based network environment. 2049-2066 - Jeremie Leguay
, Matthieu Latapy, Timur Friedman
, Kavé Salamatian
:
Describing and simulating internet routes. 2067-2085 - Michael Cho-Hoi Chek, Yu-Kwong Kwok:
Design and evaluation of practical coexistence management schemes for Bluetooth and IEEE 802.11b systems. 2086-2103 - Santpal Singh Dhillon, Piet Van Mieghem:
Performance analysis of the AntNet algorithm. 2104-2125 - B. S. Manoj
, Archana Sekhar, C. Siva Ram Murthy:
On the use of limited autonomous mobility for dynamic coverage maintenance in sensor networks. 2126-2143 - Glen MacLarty, Michael Fry:
Towards a platform for wide-area overlay network deployment and management. 2144-2162 - Srinivasan Ramasubramanian, Harish Krishnamoorthy, Marwan Krunz:
Disjoint multipath routing using colored trees. 2163-2180