


default search action
Computer Networks [and ISDN Systems], Volume 57
Volume 57, Number 1, January 2013
- Ian F. Akyildiz, Harry Rudin:

COMNET editorial for 2012. 1-2 - Christos Papathanasiou, Nikos Dimitriou

, Leandros Tassiulas:
Dynamic radio resource and interference management for MIMO-OFDMA mobile broadband wireless access systems. 3-16 - Long Long, Ahmed E. Kamal:

Protecting multicast services in optical internet backbones. 17-28 - Ahmad Sardouk, Majdi Mansouri

, Leïla Merghem-Boulahia, Dominique Gaïti, Rana Rahim-Amoud:
Crisis management using MAS-based wireless sensor networks. 29-45 - Dong Mei Shan, Kee Chaing Chua, Gurusamy Mohan

, Jian Qiu:
Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks. 46-60 - Seung Yeob Nam

, Seong Joon Kim, Sihyung Lee
, Hyong S. Kim:
Estimation of the available bandwidth ratio of a remote link or path segments. 61-77 - Kishore Angrishi:

An end-to-end stochastic network calculus with effective bandwidth and effective capacity. 78-84 - Beakcheol Jang, Jun Bum Lim, Mihail L. Sichitiu

:
An asynchronous scheduled MAC protocol for wireless sensor networks. 85-98 - Donghyeok An, Honguk Woo, Hyunsoo Yoon, Ikjun Yeom:

Enhanced cooperative communication MAC for mobile wireless networks. 99-116 - Mingwei Xu, Meijia Hou, Dan Wang

, Jiahai Yang:
An efficient critical protection scheme for intra-domain routing using link characteristics. 117-133 - A. Mirsayar Barkoosaraei, A. Hamid Aghvami:

Dynamic partitioning of IP-based wireless access networks. 134-146 - Addisu Eshete, Yuming Jiang

:
Generalizing the CHOKe flow protection. 147-161 - Anwesha Mukherjee

, Srimoyee Bhattacherjee, Sucheta Pal, Debashis De:
Femtocell based green power consumption methods for mobile network. 162-178 - Weiwei Fang, Xiangmin Liang, Shengxin Li, Luca Chiaraviglio

, Naixue Xiong:
VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers. 179-196 - Hui Chen

, Yang Xiao
, Susan V. Vrbsky:
An update-based step-wise optimal cache replacement for wireless data access. 197-212 - Enrico Gregori, Luciano Lenzini, Chiara Orsini:

k-Dense communities in the Internet AS-level topology graph. 213-227 - Abderrahmen Mtibaa, Khaled A. Harras

:
Fairness-related challenges in mobile opportunistic networking. 228-242 - Guang Yao, Jun Bi

, Peiyao Xiao:
VASE: Filtering IP spoofing traffic with agility. 243-257 - Pablo Serrano

, Paul Patras
, Andrea Mannocci
, Vincenzo Mancuso
, Albert Banchs:
Control theoretic optimization of 802.11 WLANs: Implementation and experimental evaluation. 258-272 - Fabio R. J. Vieira, José Ferreira de Rezende

, Valmir Carneiro Barbosa
, Serge Fdida:
Local heuristic for the refinement of multi-path routing in wireless mesh networks. 273-285 - Consolee Mbarushimana, Ali Shahrabi

, Tom Buggy:
A cross-layer TCP enhancement in QoS-aware mobile ad hoc networks. 286-301 - Julia Amador, Jesus R. Artalejo:

Modeling computer virus with the BSDE approach. 302-316 - Toktam Mahmoodi

, Vasilis Friderikos
, Hamid Aghvami:
Using traffic asymmetry to enhance TCP performance. 317-329 - Devrim Unal

, Mehmet Ufuk Çaglayan
:
A formal role-based access control model for security policies in multi-domain mobile networks. 330-350 - Lin Cui, Weijia Jia

:
Cyclic stable matching for three-sided networking services. 351-363 - Berk Canberk

:
An adaptive and QoS-based spectrum awareness framework for CR networks. 364-373
Volume 57, Number 2, February 2013
- Ronaldo M. Salles

, Guofei Gu, Morton Swimmer:
Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''. 375-377 - Sérgio S. C. Silva, Rodrigo M. P. Silva, Raquel Coelho Gomes Pinto, Ronaldo M. Salles

:
Botnets: A survey. 378-403 - Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu:

The SIC botnet lifecycle model: A step beyond traditional epidemiological models. 404-421 - Marco Riccardi, Roberto Di Pietro

, Marta Palanques, Jorge Aguila Vila:
Titans' revenge: Detecting Zeus via its own flaws. 422-435 - Aditya K. Sood, Richard J. Enbody, Rohit Bansal:

Dissecting SpyEye - Understanding the design of third generation botnets. 436-450 - Juan Caballero, Dawn Song:

Automatic protocol reverse-engineering: Message format extraction and field semantics inference. 451-474 - Christian J. Dietrich, Christian Rossow, Norbert Pohlmann:

CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis. 475-486 - Roberto Perdisci

, Davide Ariu
, Giorgio Giacinto
:
Scalable fine-grained behavioral clustering of HTTP-based malware. 487-500 - Hui-Tang Lin, Ying-You Lin, Jui-Wei Chiang:

Genetic-based real-time fast-flux service networks detection. 501-513 - Chun-Ying Huang

:
Effective bot host detection based on network failure models. 514-525 - Pedro Henrique B. Las-Casas, Dorgival O. Guedes

, Jussara M. Almeida, Artur Ziviani
, Humberto T. Marques-Neto
:
SpaDeS: Detecting spammers at the source network. 526-539 - Guanhua Yan:

Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. 540-555 - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:

Design and analysis of a social botnet. 556-578 - Jingyu Hua, Kouichi Sakurai:

Botnet command and control based on Short Message Service and human mobility. 579-597
Volume 57, Number 3, February 2013
- Antonio de la Oliva

, Tito R. Vargas Hernández
, Juan Carlos Guerri
, José Alberto Hernández
, Pedro Reviriego
:
Performance analysis of Energy Efficient Ethernet on video streaming servers. 599-608 - Evan Tan, Chun Tung Chou

:
Joint optimization of continuity and quality for streaming video. 609-621 - Chong Han, Josep Miquel Jornet

, Etimad A. Fadel
, Ian F. Akyildiz:
A cross-layer communication module for the Internet of Things. 622-633 - Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia

:
Blog or block: Detecting blog bots through behavioral biometrics. 634-646 - Kush Kothari, Matthew K. Wright

:
Mimic: An active covert channel that evades regularity-based detection. 647-657 - Noriaki Kamiyama:

Designing data center network by analytic hierarchy process. 658-667 - Yu Wang, Hari Krishna Garg, Mehul Motani

:
Downlink scheduling for user equipment served by multiple mobile terminals in cellular systems. 668-681 - Tudor Dumitras, Priya Narasimhan:

A study of unpredictability in fault-tolerant middleware. 682-698 - Vincent Lucas, Jean-Jacques Pansiot

, Dominique Grad, Benoît Hilt:
Robust and fair Multicast Congestion Control (M2C). 699-724 - Joo-Young Baek, Jeong-Yoon Lee, Young-Joo Suh:

An elastic compensation model for frame-based scheduling algorithms in wireless networks. 725-740 - Noriaki Kamiyama, Tatsuya Mori

, Ryoichi Kawahara:
Autonomic load balancing of flow monitors. 741-761 - Faqir Zarrar Yousaf, Christian Wietfeld

:
Optimizing throughput performance of FMIPv6 over legacy 802.11 networks using iterative scanning. 762-781 - Yi-Mao Hsiao, Yuan-Sun Chu, Jeng-Farn Lee, Jinn-Shyan Wang:

A high-throughput and high-capacity IPv6 routing lookup system. 782-794 - Emiliano Casalicchio

, Luca Silvestri:
Mechanisms for SLA provisioning in cloud-based service providers. 795-810 - Aruna Jamdagni, Zhiyuan Tan

, Xiangjian He
, Priyadarsi Nanda, Ren Ping Liu
:
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. 811-824 - Reduan H. Khan, Jamil Y. Khan

:
A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network. 825-845
Volume 57, Number 4, March 2013
- Ren-Huang Liou, Yi-Bing Lin:

Mobility management with the central-based location area policy. 847-857 - Wei-Tong Wang, Kuo-Feng Ssu:

Obstacle detection and estimation in wireless sensor networks. 858-868 - Zhen Ling, Junzhou Luo, Wei Yu

, Xinwen Fu
, Weijia Jia
, Wei Zhao
:
Protocol-level attacks against Tor. 869-886 - Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, Chin-Laung Lei:

An adaptive sector-based routing model over structured peer-to-peer networks. 887-896 - Juhoon Kim, Luigi Iannone, Anja Feldmann

:
Caching Locator/ID mappings: An experimental scalability analysis and its implications. 897-909 - Kaikai Chi, Xiaohong Jiang, Yi-hua Zhu, Jing Wang, Yanjun Li:

Block-level packet recovery with network coding for wireless reliable multicast. 910-923 - Mohamed Diallo, Vasilis Sourlas

, Paris Flegkas, Serge Fdida, Leandros Tassiulas:
A content-based publish/subscribe framework for large-scale content delivery. 924-943 - Xiuzhong Chen, Marc De Leenheer, Rui Wang, Chaitanya S. K. Vadrevu, Lei Shi, Jie Zhang, Biswanath Mukherjee:

High-performance routing for hose-based VPNs in multi-domain backbone networks. 944-953 - José M. Camacho, Alberto García-Martínez

, Marcelo Bagnulo
, Francisco Valera
:
BGP-XM: BGP eXtended Multipath for transit Autonomous Systems. 954-975 - Stefano Secci

, Kunpeng Liu, Bijan Jabbari:
Efficient inter-domain traffic engineering with transit-edge hierarchical routing. 976-989 - Yuting Miao, Qiang Yang, Chunming Wu, Ming Jiang, Jinzhou Chen:

Multicast virtual network mapping for supporting multiple description coding-based video applications. 990-1002 - Rachid El Azouzi

, Francesco De Pellegrini, Habib B. A. Sidi, Vijay Kamble:
Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation. 1003-1018 - Alex Borges Vieira, Rafael Barra de Almeida, Jussara Marques de Almeida, Sérgio Vale Aguiar Campos:

SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming. 1019-1036 - Xiaoyuan Luo, Yanlin Yan, Shaobao Li, Xinping Guan:

Topology control based on optimally rigid graph in wireless sensor networks. 1037-1047 - Sungoh Kwon

, Neung-Hyung Lee:
Cell ID extension in femtocell environments. 1048-1062
Volume 57, Number 5, April 2013
- Feng Shan, Weifa Liang

, Jun Luo, Xiaojun Shen:
Network lifetime maximization for time-sensitive data gathering in wireless sensor networks. 1063-1077 - Christian Bauer:

A Secure Correspondent Router Protocol for NEMO Route Optimization. 1078-1100 - Mehmet Yunus Donmez, Sinan Isik, Cem Ersoy

:
Combined analysis of contention window size and duty cycle for throughput and energy optimization in wireless sensor networks. 1101-1112 - Mohammad A. Raayatpanah

, H. Salehi Fathabadi
, Babak H. Khalaj, Salman Khodayifar:
Minimum cost multiple multicast network coding with quantized rates. 1113-1123 - Efe Karasabun, Ibrahim Korpeoglu

, Cevdet Aykanat:
Active node determination for correlated data gathering in wireless sensor networks. 1124-1138 - Donggyu Yun, Jungseul Ok, Bongjhin Shin, Soobum Park, Yung Yi:

Embedding of virtual network requests over static wireless multihop networks. 1139-1152 - Ji-Hoon Yun

:
Performance analysis of IEEE 802.11 WLANs with rate adaptation in time-varying fading channels. 1153-1166 - Pavlos Antoniou, Andreas Pitsillides, Tim Blackwell, Andries P. Engelbrecht

, Loizos Michael:
Congestion control in wireless sensor networks based on bird flocking behavior. 1167-1191 - Necati Kilic, Vehbi Cagri Gungor:

Analysis of low power wireless links in smart grid environments. 1192-1203 - Gregory Detal, Christoph Paasch, Simon van der Linden, Pascal Mérindol, Gildas Avoine, Olivier Bonaventure:

Revisiting flow-based load balancing: Stateless path selection in data center networks. 1204-1216 - Slavisa Aleksic

, Margot Deruyck, Willem Vereecken, Wout Joseph, Mario Pickavet
, Luc Martens:
Energy efficiency of femtocell deployment in combined wireless/optical access networks. 1217-1233 - Peristera A. Baziana

, Ioannis E. Pountourakis:
An access protocol for efficiency optimization in WDM networks: A propagation delay and collisions avoidance analysis. 1234-1252 - Lucia D'Acunto

, Nitin Chiluka, Tamás Vinkó
, Henk J. Sips:
BitTorrent-like P2P approaches for VoD: A comparative study. 1253-1276 - Daniele Casagrande

, Pier Luca Montessoro, Franco Blanchini
:
Fair and optimal dynamic admission control of elastic flows. 1277-1288 - Saeed Salah

, Gabriel Maciá-Fernández
, Jesús Esteban Díaz Verdejo:
A model-based survey of alert correlation techniques. 1289-1317 - Christian Esposito

, Domenico Cotroneo, Stefano Russo
:
On reliability in publish/subscribe services. 1318-1343 - Wenye Wang

, Zhuo Lu:
Cyber security in the Smart Grid: Survey and challenges. 1344-1371
Volume 57, Number 6, April 2013
- Márton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly

, Gergely Biczók
:
Incrementally upgradable data center architecture using hyperbolic tessellations. 1373-1393 - Christos Anagnostopoulos

, Stathes Hadjiefthymiades
:
Multivariate context collection in mobile sensor networks. 1394-1407 - Kai-Wei Ke, Chia-Hui Huang:

Performance evaluation of multisource Application Layer Multicast (ALM): Theoretical and simulative aspects. 1408-1424 - Urs Hunkeler, Clemens Lombriser, Hong Linh Truong, Beat Weiss

:
A case for centrally controlled wireless sensor networks. 1425-1442 - Conrado Borraz-Sánchez, Diego Klabjan:

Optimal placement of reconfigurable optical add/drop multiplexers with packing, blocking, and signal loss. 1443-1458 - Adel Ali Ahmed

:
An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks. 1459-1473 - Linjun Fan, Yunxiang Ling, Tao Wang, Xiaomin Zhu, Xiaoyong Tang:

Novel clock synchronization algorithm of parametric difference for parallel and distributed simulations. 1474-1487 - Youghourta Benfattoum, Steven Martin, Khaldoun Al Agha:

QoS for real-time reliable multicasting in wireless multi-hop networks using a Generation-Based Network Coding. 1488-1502 - Edoardo Amaldi, Antonio Capone

, Luca Giovanni Gianoli:
Energy-aware IP traffic engineering with shortest path routing. 1503-1517 - Rajarshi Mahapatra

, Antonio De Domenico, Rohit Gupta, Emilio Calvanese Strinati:
Green framework for future heterogeneous wireless networks. 1518-1528 - Xiaoping Wang, Yunhao Liu, Zheng Yang, Kai Lu, Jun Luo:

OFA: An optimistic approach to conquer flip ambiguity in network localization. 1529-1544 - S. Chiappetta, Claudio Mazzariello, Roberta Presta

, Simon Pietro Romano
:
An anomaly-based approach to the analysis of the social behavior of VoIP users. 1545-1559 - Ryoichi Kawahara, Tetsuya Takine, Tatsuya Mori

, Noriaki Kamiyama, Keisuke Ishibashi:
Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management. 1560-1576
Volume 57, Number 7, May 2013
- S. H. Shah Newaz, Ángel Cuevas

, Gyu Myoung Lee, Noël Crespi, Jun Kyun Choi:
Adaptive Delay-Aware Energy Efficient TDM-PON. 1577-1596 - Christian Facchini, Oliver Holland, Fabrizio Granelli

, Nelson L. S. da Fonseca
, Hamid Aghvami:
Dynamic green self-configuration of 3G base stations using fuzzy cognitive maps. 1597-1610 - Weibo Chu, Xiaohong Guan, Zhongmin Cai, Lixin Gao:

Real-time volume control for interactive network traffic replay. 1611-1629 - Tobias Jung, Sylvain Martin, Mohamed Nassar

, Damien Ernst, Guy Leduc:
Outbound SPIT filter with optimal performance guarantees. 1630-1643 - Jongwook Lee, Jin-Ghoo Choi, Saewoong Bahk:

Opportunistic downlink data delivery for mobile collaborative communities. 1644-1655 - T. D. Lagkas

, Panagiotis G. Sarigiannidis
, Malamati D. Louta
:
On analyzing the intra-frame power saving potentials of the IEEE 802.16e downlink vertical mapping. 1656-1673 - Weijie Wu, John C. S. Lui, Richard T. B. Ma

:
On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation. 1674-1688 - Wei Kuang Lai, Chang-Lung Tang:

QoS-aware downlink packet scheduling for LTE networks. 1689-1698 - Cristina Rottondi

, Giacomo Verticale
, Antonio Capone
:
Privacy-preserving smart metering with multiple data Consumers. 1699-1713 - Javad Akbari Torkestani:

An energy-efficient topology construction algorithm for wireless sensor networks. 1714-1725 - Ahmad Vakili, Jean-Charles Grégoire:

QoE management for video conferencing applications. 1726-1738
Volume 57, Number 8, June 2013
- Stamatios Arkoulis, Evangelos Anifantis, Vasileios Karyotis

, Symeon Papavassiliou, Nikolas Mitrou:
On the optimal, fair and channel-aware cognitive radio network reconfiguration. 1739-1757 - László Gyarmati, András Gulyás, Balázs Sonkoly

, Tuan Anh Trinh, Gergely Biczók
:
Free-scaling your data center. 1758-1773 - Gongqi Lin, Sieteng Soh

, Kwan-Wu Chin
, Mihai M. Lazarescu
:
Efficient heuristics for energy-aware routing in networks with bundled links. 1774-1788 - Giacomo Bacci

, Marco Luise:
QoS-aware game-theoretic rate & power control for CDMA wireless communication networks. 1789-1804 - Shengbo Yang, Chai Kiat Yeo

, Bu-Sung Lee
:
MaxCD: Efficient multi-flow scheduling and cooperative downloading for improved highway drive-thru Internet systems. 1805-1820 - Michele Rondinone

, Javier Gozálvez
:
Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks. 1821-1837 - Giovanna Carofiglio, Luca Muscariello, Dario Rossi, Claudio Testa, Silvio Valenti:

Rethinking the Low Extra Delay Background Transport (LEDBAT) Protocol. 1838-1852 - Zoltán Czirkos, Gábor Hosszú

:
Solution for the broadcasting in the Kademlia peer-to-peer overlay. 1853-1862 - Stefano Iellamo, Lin Chen, Marceau Coupechoux:

Proportional and double imitation rules for spectrum access in cognitive radio networks. 1863-1879 - Alexandre Andrade Pires, José Ferreira de Rezende

:
Independent links: A new approach to increase spatial reuse in wireless networks. 1880-1893
Volume 57, Number 9, June 2013
- Xi Fang, Dejun Yang

, Guoliang Xue:
Pathbook: Cross-layer optimization for full-duplex wireless networks. 1895-1912 - Habib M. Ammari:

On the energy-delay trade-off in geographic forwarding in always-on wireless sensor networks: A multi-objective optimization problem. 1913-1935 - Michal Ficek, Tomás Pop, Lukas Kencl

:
Active tracking in mobile networks: An in-depth view. 1936-1954 - Leonardo Militano, Antonio Iera

, Francesco Scarcello
:
A fair cooperative content-sharing service. 1955-1973 - Péter Babarczi

, Gergely Biczók
, Harald Øverby, János Tapolcai
, Péter Soproni:
Realization strategies of dedicated path protection: A bandwidth cost perspective. 1974-1990 - Waleed Alsalih, Kashif Ali, Hossam S. Hassanein

:
A power control technique for anti-collision schemes in RFID systems. 1991-2003 - Angelo Coiro, Marco Listanti

, Alessandro Valenti, Francesco Matera:
Energy-aware traffic engineering: A routing-based distributed solution for connection-oriented IP networks. 2004-2020 - Juan Felipe Botero

, Xavier Hesselbach
:
Greener networking in a network virtualization environment. 2021-2039 - Adil Fahad, Zahir Tari, Ibrahim Khalil, Ibrahim Habib, Hussein M. Alnuweiri:

Toward an efficient and scalable feature selection approach for internet traffic classification. 2040-2057 - Sasho Gramatikov, Fernando Jaureguizar

, Julián Cabrera, Narciso García
:
Stochastic modelling of peer-assisted VoD streaming in managed networks. 2058-2074 - Evariste Logota

, Carlos Campos, Susana Sargento
, Augusto Neto
:
Advanced multicast class-based bandwidth over-provisioning. 2075-2092 - Giuseppe Aceto, Alessio Botta

, Walter de Donato, Antonio Pescapè:
Cloud monitoring: A survey. 2093-2115
Volume 57, Number 10, July 2013
- Stephan J. Eidenbenz

, Madhav V. Marathe, Arunabha Sen:
Editorial for Computer Networks special issue on ''Towards a Science of Cyber Security''. 2119-2120 - Chris J. Kuhlman, V. S. Anil Kumar, S. S. Ravi:

Controlling opinion propagation in online networks. 2121-2132 - Nam P. Nguyen, Guanhua Yan, My T. Thai:

Analysis of misinformation containment in online social networks. 2133-2146 - Yi Wang, Marios Iliofotou, Michalis Faloutsos

, Bin Wu:
Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies. 2147-2158 - Jaafar Almasizadeh, Mohammad Abdollahi Azgomi

:
A stochastic model of attack process for the evaluation of security metrics. 2159-2180 - Bugra Çaskurlu, Ashish Gehani, Cemal Çagatay Bilgin, K. Subramani

:
Analytical models for risk-based intrusion response. 2181-2192 - Udi Ben-Porat, Anat Bremler-Barr

, Hanoch Levy:
On the exploitation of CDF based wireless scheduling. 2193-2205 - Klaus Julisch:

Understanding and overcoming cyber security anti-patterns. 2206-2211
- Tapio Levä, Miika Komu, Ari Keränen, Sakari Luukkainen:

Adoption barriers of network layer protocols: The case of host identity protocol. 2218-2232 - Elena Torroglosa-García, Antonio D. Perez-Morales, Pedro Martinez-Julia

, Diego R. López:
Integration of the OAuth and Web Service family security standards. 2233-2249 - Yang Xiang, Xingang Shi, Jianping Wu, Zhiliang Wang, Xia Yin:

Sign what you really care about - Secure BGP AS-paths efficiently. 2250-2265 - Rodrigo Roman, Jianying Zhou

, Javier López
:
On the features and challenges of security and privacy in distributed internet of things. 2266-2279 - Pedro Martinez-Julia

, Antonio Fernandez Gómez-Skarmeta
:
Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet. 2280-2300
Volume 57, Number 11, August 2013
- Paola Cappanera

, Luciano Lenzini, Alessandro Lori, Giovanni Stea
, Gigliola Vaglini:
Optimal joint routing and link scheduling for real-time traffic in TDMA Wireless Mesh Networks. 2301-2312 - Soham Sengupta:

An approach to provide a network layer security model with QR code generated with shuffled GPS parameters as embedded keys traveling over Internet using existing IPv4 mechanism. 2313-2330 - Fabien Tarissan, Bruno Quoitin

, Pascal Mérindol, Benoit Donnet
, Jean-Jacques Pansiot
, Matthieu Latapy:
Towards a bipartite graph modeling of the internet topology. 2331-2347 - Xiao-Yang Liu, Kai-Liang Wu, Yanmin Zhu, Linghe Kong

, Min-You Wu:
Mobility increases the surface coverage of distributed sensor networks. 2348-2363 - Md. Nooruzzaman

, Osanori Koyama, Yutaka Katsuyama:
Congestion removing performance of stackable ROADM in WDM networks under dynamic traffic. 2364-2373 - Mirjana D. Stojanovic, Aleksandra Kostic-Ljubisavljevic

, Vesna M. Radonjic-Djogatovic:
SLA-controlled interconnection charging in next generation networks. 2374-2394
Volume 57, Number 12, August 2013
- Kenneth J. Turner, Evan H. Magill:

Special Issue on Feature interaction in communications and software systems. 2395-2398 - Sven Apel

, Alexander von Rhein, Thomas Thüm, Christian Kästner
:
Feature-interaction detection based on feature-based specifications. 2399-2409 - Mario Kolberg, John F. Buford, Krishna Kishore Dhara, Xiaotao Wu, Venky Krishnaswamy:

Feature interaction in a federated communications-enabled collaboration platform. 2410-2428 - Claire Maternaghan, Kenneth J. Turner:

Policy conflicts in home automation. 2429-2441 - Masahide Nakamura

, Kousuke Ikegami, Shinsuke Matsumoto:
Considering impacts and requirements for better understanding of environment interactions in home network services. 2442-2453 - Thein Than Tun, Robin C. Laney

, Yijun Yu
, Bashar Nuseibeh
:
Specifying software features for composition: A tool-supported approach. 2454-2464
Volume 57, Number 13, September 2013
- Yusung Kim, Ikjun Yeom:

Performance analysis of in-network caching for content-centric networking. 2465-2482 - Chao-Tsun Chang, Chih-Yung Chang, Tzu-Lin Wang, Yun-Jung Lu:

Throughput enhancement by exploiting spatial reuse opportunities with smart antenna systems in wireless ad hoc networks. 2483-2498 - Jérémy Serror, Hui Zang, Jean-Chrysostome Bolot:

Measurement and modeling of paging channel overloads on a cellular network. 2499-2513 - Hui-Tang Lin, Ying-You Lin, Chung-Jui Sun:

Efficient and adaptive resource scheduling in IEEE 802.16j transparent relay networks. 2514-2535 - Klaus Wehmuth

, Artur Ziviani
:
DACCER: Distributed Assessment of the Closeness CEntrality Ranking in complex networks. 2536-2548 - Jaehoon (Paul) Jeong, Tian He, David H. C. Du:

TMA: Trajectory-based Multi-Anycast forwarding for efficient multicast data delivery in vehicular networks. 2549-2563 - Silvia Boiardi, Antonio Capone

, Brunilde Sansò:
Radio planning of energy-aware cellular networks. 2564-2577 - Hasan Tuncer, Andres Kwasinski, Nirmala Shenoy:

Performance analysis of Virtual Mobility Domain scheme vs. IPv6 mobility protocols. 2578-2596 - Tolga Acar, Mira Belenkiy, Alptekin Küpçü

:
Single password authentication. 2597-2614 - Jeng-Wei Lee, I-Hsun Chuang, Win-Bin Huang

, Yau-Hwang Kuo:
An opportunistic resource allocation approach for mixed QoS and non-QoS connections in OFDMA wireless networks. 2615-2627 - Seungwon Shin, Zhaoyan Xu, Guofei Gu:

EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection. 2628-2642 - Ben-Jye Chang, Ying-Hsin Liang, Yu-Hsien Lee:

Dynamic-cost-reward connection admission control for maximizing system reward in 4G wireless multihop relaying networks. 2643-2655 - Natalia Castro Fernandes

, Marcelo Duffles Donato Moreira, Otto Carlos Muniz Bandeira Duarte:
Safeguarding ad hoc networks with a self-organized membership control system. 2656-2674
Volume 57, Number 14, October 2013
- Boris Bellalta

, Azadeh Faridi
, Dirk Staehle, Jaume Barceló, Alexey V. Vinel, Miquel Oliver
:
Performance analysis of CSMA/CA protocols with multi-packet transmission. 2675-2688 - Pengfei Zhang, Gaoxi Xiao

, Hwee-Pink Tan
:
Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors. 2689-2704 - Hung-Yu Chien:

Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. 2705-2717 - José Camacho

, Pablo Padilla
, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo:
A generalizable dynamic flow pairing method for traffic classification. 2718-2732 - Hai-Heng Ng, Wee-Seng Soh

, Mehul Motani
:
An underwater acoustic MAC protocol using reverse opportunistic packet appending. 2733-2751 - Faouzi Bouali

, Oriol Sallent
, Jordi Pérez-Romero
, Ramón Agustí
:
A cognitive management framework for spectrum selection. 2752-2765 - Ibrahima Diarrassouba, Ali Lourimi, Ali Ridha Mahjoub, Habib Youssef:

Hose workload based exact algorithm for the optimal design of virtual private networks. 2766-2774 - Florian Tschorsch, Björn Scheuermann:

An algorithm for privacy-preserving distributed user statistics. 2775-2787 - Ze Wang, Yunlong Wang, Maode Ma, Jigang Wu:

Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method. 2788-2801 - Giuseppe Rossini, Dario Rossi, Christophe Betoule, Remi Clavier, Gilles Thouénon:

FIB Aplasia through probabilistic routing and autoforwarding. 2802-2816 - Dariusz Gasior, Maciej Drwal:

Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks. 2817-2832 - Delfina Malandrino

, Vittorio Scarano
:
Privacy leakage on the Web: Diffusion and countermeasures. 2833-2855 - Kai-Lung Hua

, Ge-Ming Chiu, Hsing-Kuo Pao, Yi-Chi Cheng:
An efficient scheduling algorithm for scalable video streaming over P2P networks. 2856-2868
Volume 57, Number 15, October 2013
- Sunheui Ryoo, Changhee Joo, Saewoong Bahk:

Location-based spectrum allocation and partitioning scheme for cross-tier interference mitigation in macro-femtocell networks. 2869-2879 - Mingwei Xu, Yunfei Shang, Dan Li, Xin Wang:

Greening data center networks with throughput-guaranteed power-aware routing. 2880-2899 - Xiang Meng, Pui-Sze Tsang, King-Shan Lui:

Analysis of distribution time of multiple files in a P2P network. 2900-2915 - Yuh-Rong Chen, Sridhar Radhakrishnan, Sudarshan K. Dhall, Suleyman Karabuk:

On multi-stream multi-source multicast routing. 2916-2930 - Luca Chiaraviglio

, Antonio Cianfrani
, Esther Le Rouzic, Marco Polverini
:
Sleep modes effectiveness in backbone networks with limited configurations. 2931-2948 - Minh Duc Pham, Syed Mahfuzul Aziz

:
Object extraction scheme and protocol for energy efficient image communication over wireless sensor networks. 2949-2960 - Khalim Amjad Meerja

, Pin-Han Ho, Bin Wu, Hsiang-Fu Yu:
Media access protocol for a coexisting cognitive femtocell network. 2961-2975 - Xudong Xiang, Jianxiong Wan, Chuang Lin, Xin Chen:

A dynamic programming approximation for downlink channel allocation in cognitive femtocell networks. 2976-2991 - Pramila Mouttappa, Stephane Maag, Ana R. Cavalli

:
Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols. 2992-3008 - Chao Hu, Ming Chen, Chang-you Xing:

Towards efficient video chunk dissemination in peer-to-peer live streaming. 3009-3024 - Stefania Tosi, Sara Casolari, Michele Colajanni

:
Data clustering based on correlation analysis applied to highly variable domains. 3025-3038 - Chao Zhou, Xinggong Zhang, Zongming Guo:

Optimal adaptive channel scheduling for scalable video broadcasting over MIMO wireless networks. 3039-3050 - Luca Chiaraviglio

, Delia Ciullo, Marco Mellia
, Michela Meo
:
Modeling sleep mode gains in energy-aware networks. 3051-3066 - Karim Habak

, Moustafa Youssef
, Khaled A. Harras
:
An optimal deployable bandwidth aggregation system. 3067-3080 - Noriaki Kamiyama, Ryoichi Kawahara, Haruhisa Hasegawa:

Optimum profit allocation in coalitional VoD service. 3081-3097 - Sabrina Sicari, Alberto Coen-Porisini

, Roberto Riggio
:
DARE: evaluating Data Accuracy using node REputation. 3098-3111
Volume 57, Number 16, November 2013
- Andrea Detti

, Diego Perino, Mario Gerla, Yanghee Choi:
Editorial: Special issue on Information Centric Networking. 3113-3115
- Giovanna Carofiglio, Giacomo Morabito

, Luca Muscariello, Ignacio Solis, Matteo Varvello:
From content delivery today to information centric networking. 3116-3127 - Guoqiang Zhang, Yang Li, Tao Lin:

Caching in information centric networking: A survey. 3128-3141 - HyunYong Lee, Akihiro Nakao

:
User-assisted in-network caching in information-centric networking. 3142-3153 - Suyong Eum, Kiyohide Nakauchi, Masayuki Murata

, Yozo Shoji
, Nozomu Nishinaga:
Potential based routing as a secondary best-effort routing for Information Centric Networking (ICN). 3154-3164 - Yi Wang

, Huichen Dai, Ting Zhang, Wei Meng, Jindou Fan, Bin Liu:
GPU-accelerated name lookup with component encoding. 3165-3177 - Mauro Conti

, Paolo Gasti, Marco Teoli:
A lightweight mechanism for detection of cache pollution attacks in Named Data Networking. 3178-3191 - Matthias Wählisch

, Thomas C. Schmidt
, Markus Vahlenkamp:
Backscatter from the data plane - Threats to stability and security in information-centric network infrastructure. 3192-3206 - Stefano Salsano

, Nicola Blefari-Melazzi, Andrea Detti
, Giacomo Morabito
, Luca Veltri:
Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed. 3207-3221 - Marica Amadeo

, Claudia Campolo
, Antonella Molinaro:
Enhancing content-centric networking for vehicular environments. 3222-3234 - H. M. N. Dilum Bandara

, Anura P. Jayasumana:
Distributed, multi-user, multi-application, and multi-sensor data fusion over named data networks. 3235-3248 - Ben Tagger, Dirk Trossen, Alexandros Kostopoulos, Stuart Porter, George Parisis

:
Realising an application environment for information-centric networking. 3249-3266
Volume 57, Number 17, December 2013
- Luiz Filipe M. Vieira, Mario Gerla, Archan Misra

:
Fundamental limits on end-to-end throughput of network coding in multi-rate and multicast wireless networks. 3267-3275 - Marco Ajmone Marsan, Luca Chiaraviglio

, Delia Ciullo, Michela Meo
:
On the effectiveness of single and multiple base station sleep modes in cellular networks. 3276-3290 - Xiaohui Chen, Jing Xu, Wei Yuan

, Wei Liu, Wenqing Cheng:
Channel assignment in heterogeneous multi-radio multi-channel wireless networks: A game theoretic approach. 3291-3299 - Elena Baralis, Andrea Bianco

, Tania Cerquitelli
, Luca Chiaraviglio
, Marco Mellia
:
NetCluster: A clustering-based framework to analyze internet passive measurements data. 3300-3315 - Ricardo Campanha Carrano, Diego G. Passos

, Luiz Claudio Schara Magalhães, Célio Vinicius N. de Albuquerque
:
Nested block designs: Flexible and efficient schedule-based asynchronous duty cycling. 3316-3326 - Honghuing Liu, Patrick P. C. Lee

, John C. S. Lui:
On the credit evolution of credit-based incentive protocols in wireless mesh networks. 3327-3343 - Genki Matsui, Takuji Tachibana, Yukinori Nakamura, Kenji Sugimoto:

Distributed power adjustment based on control theory for cognitive radio networks. 3344-3356 - João Marco C. Silva

, Paulo Carvalho
, Solange Rito Lima
:
A multiadaptive sampling technique for cost-effective network measurements. 3357-3369 - Zoltán Faigl, László Bokor

, Jani Pellikka, Andrei V. Gurtov
:
Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core. 3370-3388 - Eleonora Borgia

, Giuseppe Anastasi, Marco Conti
:
Energy efficient and reliable data delivery in urban sensing applications: A performance analysis. 3389-3409 - Brett Hagelstein, Mehran Abolhasan

, Daniel Robert Franklin
, Farzad Safaei
:
Improving fairness in IEEE 802.11 networks using MAC layer opportunistic retransmission. 3410-3427 - Lei Chen

, Di Yuan:
Mathematical modeling for optimal design of in-building distributed antenna systems. 3428-3445 - Angelo Coluccia

, Alessandro D'Alconzo, Fabio Ricciato:
Distribution-based anomaly detection via generalized likelihood ratio test: A general Maximum Entropy approach. 3446-3462 - Konstantin Avrachenkov

, Urtzi Ayesta, Josu Doncel
, Peter Jacko
:
Congestion control of TCP flows in Internet routers by means of index policy. 3463-3478 - Nicola Cordeschi

, Mohammad Shojafar
, Enzo Baccarelli:
Energy-saving self-configuring networked data centers. 3479-3491 - Chengzhe Lai, Hui Li, Rongxing Lu, Xuemin (Sherman) Shen

:
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. 3492-3510 - Ce-Kuen Shieh, Chia-Yu Yu, Cheng-Han Lin, J. Morris Chang:

Efficiency-driven selection of bandwidth request mechanism in broadband wireless access networks. 3511-3521 - Peng Zhou

, Xiapu Luo
, Ang Chen, Rocky K. C. Chang
:
SGor: Trust graph based onion routing. 3522-3544 - Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan

, Rodolfo W. L. Coutinho
, João Crisóstomo Weyl Albuquerque Costa:
A semi-Markov decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless networks. 3545-3562 - Jihun Ha, Jiung Yu, Byungjo Kim, Hyogon Kim:

On UDP continuity over vertical handovers. 3563-3580 - Le Wang, Jukka Manner

:
Energy-efficient mobile web in a bundle. 3581-3600 - Nuutti Varis, Jukka Manner

, Mikko Särelä, Timo Kiravuo:
DBridges: Flexible floodless frame forwarding. 3601-3616 - Byung-Gook Kim, Jeong-Ahn Kwon, Jang-Won Lee

:
Subchannel allocation for the OFDMA-based femtocell system. 3617-3629 - Yuxin Meng

, Wenjuan Li
, Lam-for Kwok
:
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection. 3630-3640 - Marc Manzano, Eusebi Calle

, Victor Torres-Padrosa, Juan Segovia, David Harle:
Endurance: A new robustness measure for complex networks under multiple failure scenarios. 3641-3653 - Emre Atsan, Öznur Özkasap

:
SCALAR: Scalable data lookup and replication protocol for mobile ad hoc networks. 3654-3672 - Martin Zubeldia, Andrés Ferragut

, Fernando Paganini:
Overcoming performance pitfalls in rate-diverse high speed WLANs. 3673-3685 - Matjaz Fras, Joze Mohorko, Zarko Cucej:

Limitations of a Mapping Algorithm with Fragmentation Mimics (MAFM) when modeling statistical data sources based on measured packet network traffic. 3686-3700 - Cuiqin Hou, Yibin Hou, Zhangqin Huang:

A framework based on barycentric coordinates for localization in wireless sensor networks. 3701-3712 - Liliana Bolea, Jordi Pérez-Romero

, Ramón Agustí
:
ML aided context feature extraction for cognitive radio. 3713-3727 - Alfonso Iacovazzi

, Alessandro D'Alconzo, Fabio Ricciato, Martin Burkhart:
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment. 3728-3742 - Giovanna Carofiglio, Massimo Gallo, Luca Muscariello:

On the performance of bandwidth and storage sharing in information-centric networks. 3743-3758
Volume 57, Number 18, December 2013
- Angelos-Christos G. Anadiotis, Charalampos Z. Patrikakis

, Iakovos S. Venieris:
On the performance improvement of gossip protocols for content-based publish-subscribe through caching. 3759-3772 - Peng Lin, Alan Kai-Hau Yeung

, Angus Kin Yeung Wong:
Multi-portal association based dispatching and a virtual-queue method in wireless mesh networks. 3773-3789 - Nadine Akkari

:
An IMS-based integration architecture for WiMax/LTE handover. 3790-3798 - Yifeng Cai, Konstantinos Pelechrinis, Xin Wang, Prashant Krishnamurthy, Yijun Mo:

Joint reactive jammer detection and localization in an enterprise WiFi network. 3799-3811 - Fatemeh Ghods, Hamed Yousefi, Ali Mohammad Afshin Hemmatyar, Ali Movaghar

:
MC-MLAS: Multi-channel Minimum Latency Aggregation Scheduling in Wireless Sensor Networks. 3812-3825 - Elias Bou-Harb

, Mourad Debbabi
, Chadi Assi:
A systematic approach for detecting and clustering distributed cyber scanning. 3826-3839 - Baozhi Chen, Dario Pompili:

Minimizing position uncertainty for under-ice autonomous underwater vehicles. 3840-3854 - Zohar Naor, Sajal K. Das

:
A scalable framework for mobile real-time group communication services. 3855-3865 - Seung Yeob Nam

, Sirojiddin Djuraev, Minho Park
:
Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks. 3866-3884 - Wen Sun, Yu Ge

, Wai-Choong Wong
:
A lightweight distributed scheme for mitigating inter-user interference in body sensor networks. 3885-3896 - Ignasi Paredes-Oliva, Pere Barlet-Ros

, Xenofontas A. Dimitropoulos:
FaRNet: Fast recognition of high-dimensional patterns from big network traffic data. 3897-3913 - Zakwan Al-Arnaout

, Qiang Fu
, Marcus Frean:
A divide-and-conquer approach for content replication in WMNs. 3914-3928 - Weigang Wu, Jiannong Cao

, Hejun Wu, Jingjing Li:
Robust and dynamic data aggregation in wireless sensor networks: A cross-layer approach. 3929-3940 - Seung-Ho Lee, Han-You Jeong, Seung-Woo Seo:

Optimal pricing and capacity partitioning for tiered access service in virtual networks. 3941-3956 - Wanzhi Qiu, Efstratios Skafidas

:
Distributed routing for signal detection in wireless sensor networks. 3957-3966 - Mohammad Rajiullah, Reine Lundin, Anna Brunström, Stefan Lindskog:

Performance analysis and improvement of PR-SCTP for small messages. 3967-3986 - Zhenhua Wu, Yu Hen Hu:

How many wireless resources are needed to resolve the hidden terminal problem? 3987-3996 - Giovanni Accongiagioco, Matteo Maria Andreozzi

, Daniele Migliorini, Giovanni Stea
:
Throughput-optimal resource allocation in LTE-Advanced with distributed antennas. 3997-4009 - M. Sarper Gokturk, Özgür Gürbüz, Elza Erkip

:
A cross-layer multi-hop cooperative network architecture for wireless ad hoc networks. 4010-4029 - Tahir Mehmood, Lavy Libman, Hooman Reisi Dehkordi, Sanjay K. Jha

:
Optimal opportunistic routing and network coding for bidirectional wireless flows. 4030-4046 - Shahabeddin Geravand, Mahmood Ahmadi

:
Bloom filter applications in network security: A state-of-the-art survey. 4047-4064

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














