callback( { "result":{ "query":":facetid:toc:\"db/journals/comsur/comsur14.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"200.46" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"63", "@dc":"63", "@oc":"63", "@id":"43430821", "text":":facetid:toc:db/journals/comsur/comsur14.bht" } }, "hits":{ "@total":"63", "@computed":"63", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4287040", "info":{"authors":{"author":[{"@pid":"w/YangWang16","text":"Yang Wang 0016"},{"@pid":"53/5578","text":"Xiaojun Cao"}]},"title":"Multi-Granular Optical Switching: A Classified Overview for the Past and Future.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"3","pages":"698-713","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/0016C12","doi":"10.1109/SURV.2011.062211.00153","ee":"https://doi.org/10.1109/SURV.2011.062211.00153","url":"https://dblp.org/rec/journals/comsur/0016C12"}, "url":"URL#4287040" }, { "@score":"1", "@id":"4287041", "info":{"authors":{"author":[{"@pid":"44/10835","text":"Arash Azarfar"},{"@pid":"80/1206","text":"Jean-François Frigon"},{"@pid":"88/1777","text":"Brunilde Sansò"}]},"title":"Improving the Reliability of Wireless Networks Using Cognitive Radios.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"338-354","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/AzarfarFS12","doi":"10.1109/SURV.2011.021111.00064","ee":"https://doi.org/10.1109/SURV.2011.021111.00064","url":"https://dblp.org/rec/journals/comsur/AzarfarFS12"}, "url":"URL#4287041" }, { "@score":"1", "@id":"4287042", "info":{"authors":{"author":[{"@pid":"35/791","text":"Gianmarco Baldini"},{"@pid":"03/10888","text":"Taj A. Sturman"},{"@pid":"32/7883","text":"Abdur Rahim Biswas"},{"@pid":"76/11339","text":"Ruediger Leschhorn"},{"@pid":"82/3651","text":"Gyözö Gódor"},{"@pid":"57/10924","text":"Michael Street"}]},"title":"Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"355-379","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/BaldiniSBLGS12","doi":"10.1109/SURV.2011.032511.00097","ee":"https://doi.org/10.1109/SURV.2011.032511.00097","url":"https://dblp.org/rec/journals/comsur/BaldiniSBLGS12"}, "url":"URL#4287042" }, { "@score":"1", "@id":"4287043", "info":{"authors":{"author":[{"@pid":"35/336","text":"Osama Bazan"},{"@pid":"37/6792","text":"Muhammad Jaseemuddin"}]},"title":"A Survey On MAC Protocols for Wireless Adhoc Networks with Beamforming Antennas.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"216-239","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/BazanJ12","doi":"10.1109/SURV.2011.041311.00099","ee":"https://doi.org/10.1109/SURV.2011.041311.00099","url":"https://dblp.org/rec/journals/comsur/BazanJ12"}, "url":"URL#4287043" }, { "@score":"1", "@id":"4287044", "info":{"authors":{"author":[{"@pid":"73/1762","text":"Abdeltouab Belbekkouche"},{"@pid":"42/11265","text":"Md. Mahmud Hasan"},{"@pid":"34/4894","text":"Ahmed Karmouch"}]},"title":"Resource Discovery and Allocation in Network Virtualization.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"4","pages":"1114-1128","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/BelbekkoucheHK12","doi":"10.1109/SURV.2011.122811.00060","ee":"https://doi.org/10.1109/SURV.2011.122811.00060","url":"https://dblp.org/rec/journals/comsur/BelbekkoucheHK12"}, "url":"URL#4287044" }, { "@score":"1", "@id":"4287045", "info":{"authors":{"author":[{"@pid":"71/477","text":"Djohara Benyamina"},{"@pid":"73/2285","text":"Abdelhakim Hafid"},{"@pid":"08/5862","text":"Michel Gendreau"}]},"title":"Wireless Mesh Networks Design - A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"299-310","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/BenyaminaHG12","doi":"10.1109/SURV.2011.042711.00007","ee":"https://doi.org/10.1109/SURV.2011.042711.00007","url":"https://dblp.org/rec/journals/comsur/BenyaminaHG12"}, "url":"URL#4287045" }, { "@score":"1", "@id":"4287046", "info":{"authors":{"author":[{"@pid":"87/8656","text":"Aruna Prem Bianzino"},{"@pid":"75/5885","text":"Claude Chaudet"},{"@pid":"14/3340","text":"Dario Rossi 0001"},{"@pid":"61/1558","text":"Jean-Louis Rougier"}]},"title":"A Survey of Green Networking Research.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"1","pages":"3-20","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/BianzinoCRR12","doi":"10.1109/SURV.2011.113010.00106","ee":"https://doi.org/10.1109/SURV.2011.113010.00106","url":"https://dblp.org/rec/journals/comsur/BianzinoCRR12"}, "url":"URL#4287046" }, { "@score":"1", "@id":"4287047", "info":{"authors":{"author":[{"@pid":"43/8276","text":"Van Quang Bien"},{"@pid":"01/6745","text":"R. Venkatesha Prasad"},{"@pid":"23/3922","text":"Ignas G. Niemegeers"}]},"title":"A Survey on Handoffs - Lessons for 60 GHz Based Wireless Systems.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"1","pages":"64-86","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/BienPN12","doi":"10.1109/SURV.2011.101310.00005","ee":"https://doi.org/10.1109/SURV.2011.101310.00005","url":"https://dblp.org/rec/journals/comsur/BienPN12"}, "url":"URL#4287047" }, { "@score":"1", "@id":"4287048", "info":{"authors":{"author":[{"@pid":"83/7909","text":"Giovanni Branca"},{"@pid":"42/4582","text":"Luigi Atzori"}]},"title":"A Survey of SOA Technologies in NGN Network Architectures.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"3","pages":"644-661","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/BrancaA12","doi":"10.1109/SURV.2011.051111.00127","ee":"https://doi.org/10.1109/SURV.2011.051111.00127","url":"https://dblp.org/rec/journals/comsur/BrancaA12"}, "url":"URL#4287048" }, { "@score":"1", "@id":"4287049", "info":{"authors":{"author":[{"@pid":"78/3786","text":"Muhammad Fasih Uddin Butt"},{"@pid":"25/6170","text":"Soon Xin Ng"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Self-Concatenated Code Design and its Application in Power-Efficient Cooperative Communications.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"3","pages":"858-883","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/ButtNH12","doi":"10.1109/SURV.2011.081511.00104","ee":"https://doi.org/10.1109/SURV.2011.081511.00104","url":"https://dblp.org/rec/journals/comsur/ButtNH12"}, "url":"URL#4287049" }, { "@score":"1", "@id":"4287050", "info":{"authors":{"author":[{"@pid":"16/8967","text":"Neal Charbonneau"},{"@pid":"19/6102","text":"Vinod Vokkarane"}]},"title":"A Survey of Advance Reservation Routing and Wavelength Assignment in Wavelength-Routed WDM Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"4","pages":"1037-1064","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/CharbonneauV12","doi":"10.1109/SURV.2011.111411.00054","ee":"https://doi.org/10.1109/SURV.2011.111411.00054","url":"https://dblp.org/rec/journals/comsur/CharbonneauV12"}, "url":"URL#4287050" }, { "@score":"1", "@id":"4287051", "info":{"authors":{"author":[{"@pid":"01/7881","text":"Tsung-Huan Cheng"},{"@pid":"l/YingDarLin","text":"Ying-Dar Lin"},{"@pid":"12/2250","text":"Yuan-Cheng Lai"},{"@pid":"79/591","text":"Po-Ching Lin"}]},"title":"Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"4","pages":"1011-1020","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/ChengLLL12","doi":"10.1109/SURV.2011.092311.00082","ee":"https://doi.org/10.1109/SURV.2011.092311.00082","url":"https://dblp.org/rec/journals/comsur/ChengLLL12"}, "url":"URL#4287051" }, { "@score":"1", "@id":"4287052", "info":{"authors":{"author":[{"@pid":"87/58","text":"Joonho Choi"},{"@pid":"08/4053","text":"Abu S. Reaz"},{"@pid":"86/3964","text":"Biswanath Mukherjee"}]},"title":"A Survey of User Behavior in VoD Service and Bandwidth-Saving Multicast Streaming Schemes.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"1","pages":"156-169","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/ChoiRM12","doi":"10.1109/SURV.2011.030811.00051","ee":"https://doi.org/10.1109/SURV.2011.030811.00051","url":"https://dblp.org/rec/journals/comsur/ChoiRM12"}, "url":"URL#4287052" }, { "@score":"1", "@id":"4287053", "info":{"authors":{"author":[{"@pid":"97/10238","text":"Antonio De Domenico"},{"@pid":"27/2122","text":"Emilio Calvanese Strinati"},{"@pid":"64/6193","text":"Maria-Gabriella Di Benedetto"}]},"title":"A Survey on MAC Strategies for Cognitive Radio Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"1","pages":"21-44","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/DomenicoSB12","doi":"10.1109/SURV.2011.111510.00108","ee":"https://doi.org/10.1109/SURV.2011.111510.00108","url":"https://dblp.org/rec/journals/comsur/DomenicoSB12"}, "url":"URL#4287053" }, { "@score":"1", "@id":"4287054", "info":{"authors":{"author":[{"@pid":"05/2229","text":"Samina Ehsan"},{"@pid":"89/4899","text":"Bechir Hamdaoui"}]},"title":"A Survey on Energy-Efficient Routing Techniques with QoS Assurances for Wireless Multimedia Sensor Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"265-278","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/EhsanH12","doi":"10.1109/SURV.2011.020211.00058","ee":"https://doi.org/10.1109/SURV.2011.020211.00058","url":"https://dblp.org/rec/journals/comsur/EhsanH12"}, "url":"URL#4287054" }, { "@score":"1", "@id":"4287055", "info":{"authors":{"author":[{"@pid":"53/1969","text":"Xi Fang"},{"@pid":"79/2206","text":"Satyajayant Misra"},{"@pid":"64/4394","text":"Guoliang Xue"},{"@pid":"81/7890","text":"Dejun Yang"}]},"title":"Smart Grid - The New and Improved Power Grid: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"4","pages":"944-980","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/FangMXY12","doi":"10.1109/SURV.2011.101911.00087","ee":"https://doi.org/10.1109/SURV.2011.101911.00087","url":"https://dblp.org/rec/journals/comsur/FangMXY12"}, "url":"URL#4287055" }, { "@score":"1", "@id":"4287056", "info":{"authors":{"author":[{"@pid":"09/6789","text":"Stenio Fernandes"},{"@pid":"34/4894","text":"Ahmed Karmouch"}]},"title":"Vertical Mobility Management Architectures in Wireless Networks: A Comprehensive Survey and Future Directions.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"1","pages":"45-63","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/FernandesK12","doi":"10.1109/SURV.2011.082010.00099","ee":"https://doi.org/10.1109/SURV.2011.082010.00099","url":"https://dblp.org/rec/journals/comsur/FernandesK12"}, "url":"URL#4287056" }, { "@score":"1", "@id":"4287057", "info":{"authors":{"author":[{"@pid":"118/9645","text":"Felipe Gómez-Cuba"},{"@pid":"92/1425","text":"Rafael Asorey-Cacheda"},{"@pid":"12/698","text":"Francisco J. González-Castaño"}]},"title":"A Survey on Cooperative Diversity for Wireless Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"3","pages":"822-835","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/Gomez-CubaAG12","doi":"10.1109/SURV.2011.082611.00047","ee":"https://doi.org/10.1109/SURV.2011.082611.00047","url":"https://dblp.org/rec/journals/comsur/Gomez-CubaAG12"}, "url":"URL#4287057" }, { "@score":"1", "@id":"4287058", "info":{"authors":{"author":[{"@pid":"10/1926-1","text":"Kannan Govindan 0001"},{"@pid":"m/PrasantMohapatra","text":"Prasant Mohapatra"}]},"title":"Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"279-298","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/GovindanM12","doi":"10.1109/SURV.2011.042711.00083","ee":"https://doi.org/10.1109/SURV.2011.042711.00083","url":"https://dblp.org/rec/journals/comsur/GovindanM12"}, "url":"URL#4287058" }, { "@score":"1", "@id":"4287059", "info":{"authors":{"author":[{"@pid":"23/5433","text":"Mukul Goyal"},{"@pid":"96/2221","text":"Mohd Soperi"},{"@pid":"07/2121","text":"Emmanuel Baccelli"},{"@pid":"10/7584","text":"G. Choudhury"},{"@pid":"s/AmanShaikh","text":"Aman Shaikh"},{"@pid":"23/8570-1","text":"Seyed H. Hosseini"},{"@pid":"t/KishorSTrivedi","text":"Kishor S. Trivedi"}]},"title":"Improving Convergence Speed and Scalability in OSPF: A Survey.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"443-463","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/GoyalSBCSHT12","doi":"10.1109/SURV.2011.011411.00065","ee":"https://doi.org/10.1109/SURV.2011.011411.00065","url":"https://dblp.org/rec/journals/comsur/GoyalSBCSHT12"}, "url":"URL#4287059" }, { "@score":"1", "@id":"4287060", "info":{"authors":{"author":{"@pid":"45/1224","text":"Ekram Hossain 0001"}},"title":"First Quarter 2012, IEEE Communications Surveys & Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"1","pages":"1-2","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/Hossain12","doi":"10.1109/SURV.2012.020212.00000","ee":"https://doi.org/10.1109/SURV.2012.020212.00000","url":"https://dblp.org/rec/journals/comsur/Hossain12"}, "url":"URL#4287060" }, { "@score":"1", "@id":"4287061", "info":{"authors":{"author":{"@pid":"45/1224","text":"Ekram Hossain 0001"}},"title":"Second Quarter 2012, IEEE Communications Surveys & Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"213-215","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/Hossain12a","doi":"10.1109/SURV.2012.042412.00000","ee":"https://doi.org/10.1109/SURV.2012.042412.00000","url":"https://dblp.org/rec/journals/comsur/Hossain12a"}, "url":"URL#4287061" }, { "@score":"1", "@id":"4287062", "info":{"authors":{"author":{"@pid":"45/1224","text":"Ekram Hossain 0001"}},"title":"Third Quarter 2012, IEEE Communications Surveys & Tutorials.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"3","pages":"641-643","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/Hossain12b","doi":"10.1109/SURV.2012.072012.00000","ee":"https://doi.org/10.1109/SURV.2012.072012.00000","url":"https://dblp.org/rec/journals/comsur/Hossain12b"}, "url":"URL#4287062" }, { "@score":"1", "@id":"4287063", "info":{"authors":{"author":[{"@pid":"61/8968","text":"Sean Huberman"},{"@pid":"06/8970","text":"Christopher Leung"},{"@pid":"41/2926","text":"Tho Le-Ngoc"}]},"title":"Dynamic Spectrum Management (DSM) Algorithms for Multi-User xDSL.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"1","pages":"109-130","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/HubermanLL12","doi":"10.1109/SURV.2011.092110.00090","ee":"https://doi.org/10.1109/SURV.2011.092110.00090","url":"https://dblp.org/rec/journals/comsur/HubermanLL12"}, "url":"URL#4287063" }, { "@score":"1", "@id":"4287064", "info":{"authors":{"author":[{"@pid":"61/6812","text":"Sofiene Jelassi"},{"@pid":"90/5723","text":"Gerardo Rubino"},{"@pid":"45/5964","text":"Hugh Melvin"},{"@pid":"32/6182","text":"Habib Youssef"},{"@pid":"33/592","text":"Guy Pujolle"}]},"title":"Quality of Experience of VoIP Service: A Survey of Assessment Approaches and Open Issues.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"491-513","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/JelassiRMYP12","doi":"10.1109/SURV.2011.120811.00063","ee":"https://doi.org/10.1109/SURV.2011.120811.00063","url":"https://dblp.org/rec/journals/comsur/JelassiRMYP12"}, "url":"URL#4287064" }, { "@score":"1", "@id":"4287065", "info":{"authors":{"author":[{"@pid":"k/ChristoforosKachris","text":"Christoforos Kachris"},{"@pid":"56/1654","text":"Ioannis Tomkos"}]},"title":"A Survey on Optical Interconnects for Data Centers.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"4","pages":"1021-1036","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/KachrisT12","doi":"10.1109/SURV.2011.122111.00069","ee":"https://doi.org/10.1109/SURV.2011.122111.00069","url":"https://dblp.org/rec/journals/comsur/KachrisT12"}, "url":"URL#4287065" }, { "@score":"1", "@id":"4287066", "info":{"authors":{"author":[{"@pid":"33/3823","text":"Burak Kantarci"},{"@pid":"217/2530","text":"Hussein T. Mouftah"}]},"title":"Bandwidth Distribution Solutions for Performance Enhancement in Long-Reach Passive Optical Networks.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"3","pages":"714-733","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/KantarciM12","doi":"10.1109/SURV.2011.081511.00013","ee":"https://doi.org/10.1109/SURV.2011.081511.00013","url":"https://dblp.org/rec/journals/comsur/KantarciM12"}, "url":"URL#4287066" }, { "@score":"1", "@id":"4287067", "info":{"authors":{"author":[{"@pid":"58/1280","text":"Douglas J. Kelly"},{"@pid":"07/6093","text":"Richard A. Raines"},{"@pid":"92/4138","text":"Rusty O. Baldwin"},{"@pid":"g/MichaelRGrimaila","text":"Michael R. Grimaila"},{"@pid":"56/5722","text":"Barry E. Mullins"}]},"title":"Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"579-606","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/KellyRBGM12","doi":"10.1109/SURV.2011.042011.00080","ee":"https://doi.org/10.1109/SURV.2011.042011.00080","url":"https://dblp.org/rec/journals/comsur/KellyRBGM12"}, "url":"URL#4287067" }, { "@score":"1", "@id":"4287068", "info":{"authors":{"author":{"@pid":"k/AngelosDKeromytis","text":"Angelos D. Keromytis"}},"title":"A Comprehensive Survey of Voice over IP Security Research.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"514-537","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/Keromytis12","doi":"10.1109/SURV.2011.031611.00112","ee":"https://doi.org/10.1109/SURV.2011.031611.00112","url":"https://dblp.org/rec/journals/comsur/Keromytis12"}, "url":"URL#4287068" }, { "@score":"1", "@id":"4287069", "info":{"authors":{"author":[{"@pid":"36/9808","text":"Maurice Khabbaz"},{"@pid":"a/ChadiAssi","text":"Chadi M. Assi"},{"@pid":"98/6382","text":"Wissam Fawaz"}]},"title":"Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges.","venue":"IEEE Commun. Surv. Tutorials","volume":"14","number":"2","pages":"607-640","year":"2012","type":"Journal Articles","access":"closed","key":"journals/comsur/KhabbazAF12","doi":"10.1109/SURV.2011.041911.00093","ee":"https://doi.org/10.1109/SURV.2011.041911.00093","url":"https://dblp.org/rec/journals/comsur/KhabbazAF12"}, "url":"URL#4287069" } ] } } } )